full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/sample_35_25.ps1
|
sample_35_25.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dataflow'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataflow.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '60441277-1663-4d77-af11-39ab99c7ac41'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataflow Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList',
'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList',
'Get-OCIDataflowPrivateEndpoint',
'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun',
'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList',
'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint',
'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement',
'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest',
'Get-OCIDataflowWorkRequestErrorsList',
'Get-OCIDataflowWorkRequestLogsList',
'Get-OCIDataflowWorkRequestsList',
'Move-OCIDataflowApplicationCompartment',
'Move-OCIDataflowPoolCompartment',
'Move-OCIDataflowPrivateEndpointCompartment',
'Move-OCIDataflowRunCompartment',
'Move-OCIDataflowSqlEndpointCompartment',
'New-OCIDataflowApplication', 'New-OCIDataflowPool',
'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun',
'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement',
'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool',
'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun',
'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement',
'Start-OCIDataflowPool', 'Stop-OCIDataflowPool',
'Update-OCIDataflowApplication', 'Update-OCIDataflowPool',
'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun',
'Update-OCIDataflowSqlEndpoint'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_60_39.ps1
|
sample_60_39.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
function Update-AzMySqlServer {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.MySql.Models.Api20171201.IServer])]
[CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Description('Updates an existing server. The request body can contain one to many of the properties present in the normal server definition. Use Update-AzMySqlConfiguration instead if you want update server parameters such as wait_timeout or net_retry_count.')]
param(
[Parameter(ParameterSetName='UpdateExpanded', Mandatory, HelpMessage='The name of the server.')]
[Alias('ServerName')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Path')]
[System.String]
${Name},
[Parameter(ParameterSetName='UpdateExpanded', Mandatory, HelpMessage='The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Path')]
[System.String]
${ResourceGroupName},
[Parameter(ParameterSetName='UpdateExpanded', HelpMessage='The subscription ID that identifies an Azure subscription.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
${SubscriptionId},
[Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage='Identity Parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Models.IMySqlIdentity]
${InputObject},
[Parameter(HelpMessage='The password of the administrator login.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.Security.SecureString]
${AdministratorLoginPassword},
[Parameter(HelpMessage='The replication role of the server.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.String]
${ReplicationRole},
[Parameter(HelpMessage='The scale up/out capacity, representing server''s compute units.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.Int32]
${SkuCapacity},
[Parameter(HelpMessage='The family of hardware.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.String]
${SkuFamily},
[Parameter(HelpMessage='The name of the sku, typically, tier + family + cores, e.g. B_Gen4_1, GP_Gen5_8.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.String]
${Sku},
[Parameter(HelpMessage='The tier of the particular SKU, e.g. Basic.')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.SkuTier])]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.SkuTier]
${SkuTier},
[Parameter(HelpMessage='Enable ssl enforcement or not when connect to server.')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.SslEnforcementEnum])]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.SslEnforcementEnum]
${SslEnforcement},
[Parameter(HelpMessage = 'Set the minimal TLS version for connections to server when SSL is enabled. Default is TLSEnforcementDisabled.accepted values: TLS1_0, TLS1_1, TLS1_2, TLSEnforcementDisabled.')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.MinimalTlsVersionEnum])]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.MinimalTlsVersionEnum]
# Enforce a minimal Tls version for the server.
${MinimalTlsVersion},
[Parameter(HelpMessage='Backup retention days for the server. Day count is between 7 and 35.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.Int32]
${BackupRetentionDay},
[Parameter(HelpMessage='Enable Storage Auto Grow.')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.StorageAutogrow])]
[Validateset('Enabled', 'Disabled')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.StorageAutogrow]
${StorageAutogrow},
[Parameter(HelpMessage='Max storage allowed for a server.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[System.Int32]
${StorageInMb},
[Parameter(HelpMessage='Application-specific metadata in the form of key-value pairs.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.MySql.Models.Api20171201.IServerUpdateParametersTags]))]
[System.Collections.Hashtable]
${Tag},
[Parameter(HelpMessage="Whether or not public network access is allowed for this server. Value is optional but if passed in, must be 'Enabled' or 'Disabled'")]
[Validateset('Enabled', 'Disabled')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.PublicNetworkAccessEnum])]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Support.PublicNetworkAccessEnum]
${PublicNetworkAccess},
[Parameter(HelpMessage = 'The credentials, account, tenant, and subscription used for communication with Azure.')]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Azure')]
[System.Management.Automation.PSObject]
${DefaultProfile},
[Parameter(HelpMessage = 'Run the command as a job.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
${AsJob},
[Parameter(DontShow, HelpMessage = 'Wait for .NET debugger to attach.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline.
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline.
${HttpPipelinePrepend},
[Parameter(HelpMessage = 'Run the command asynchronously.')]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use.
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call.
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.MySql.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy.
${ProxyUseDefaultCredentials}
)
process {
try {
if ($PSBoundParameters.ContainsKey('StorageInMb')) {
$PSBoundParameters.Add('StorageProfileStorageMb', $PSBoundParameters['StorageInMb'])
$null = $PSBoundParameters.Remove('StorageInMb')
}
if ($PSBoundParameters.ContainsKey('Sku')) {
$PSBoundParameters.Add('SkuName', $PSBoundParameters['Sku'])
$null = $PSBoundParameters.Remove('Sku')
}
if ($PSBoundParameters.ContainsKey('BackupRetentionDay')) {
$PSBoundParameters.Add('StorageProfileBackupRetentionDay', $PSBoundParameters['BackupRetentionDay'])
$null = $PSBoundParameters.Remove('BackupRetentionDay')
}
if ($PSBoundParameters.ContainsKey('StorageAutogrow')) {
$PSBoundParameters.Add('StorageProfileStorageAutogrow', $PSBoundParameters['StorageAutogrow'])
$null = $PSBoundParameters.Remove('StorageAutogrow')
}
Az.MySql.internal\Update-AzMySqlServer @PSBoundParameters
} catch {
throw
}
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCD5o5nxVv/bq5x
# jpOju0Ac1dSUj3nW0C6c0E0sPhg6u6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII3LLr1DO/xUoHm2tyT8S1tn
# EHZW0Xa0j+iv0FCl95cYMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAV1TrluUnsYjePg1/TkSYFaVqojshFBB3uXP/0R/mRliNx0m3rw5rlSVU
# sAnQocb7HkqBfCiydaOF2JhCTQ/Ec6xh0d/ODC02xxpwr7gTSFErgHpxP7MCX8+h
# obg6qpOAhswZ1OjFSnR8YnN5NYy8NdRsquSoT1nUtZ8alPBOC+HwlyCVWd8exprd
# Kl6EDGPneGUSSuw3LnJku8xnVexNfNPRZTOpvRdz9UqVFRQ/jtnUr1xvgGjFlYmR
# FR95/AYeW5uDYu6RmMhcavzTXejWAoBRr7Wtb++ok1QUnd8ABZDdfW6IrzwM7cz7
# qA7msdJ9cvAooXnW5pbFLv8GBJSjSaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDqOYDxQN80HehY0a2BaE1Fq48euES+A6Ms/2OYQoBBkwIGZkYRn0gw
# GBMyMDI0MDYwNTEwMTM0Ny4yMjdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2
# hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN
# PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F
# DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F
# QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP
# hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3
# gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm
# dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7
# Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS
# 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN
# 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc
# GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI
# D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi
# LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc
# ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE
# JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N
# 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp
# 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4
# nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N
# nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO
# pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1
# ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB
# QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7
# n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6gpEAjAiGA8yMDI0MDYwNTAxNTUx
# NFoYDzIwMjQwNjA2MDE1NTE0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqCkQC
# AgEAMAcCAQACAjusMAcCAQACAhKRMAoCBQDqC5WCAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAD0TgSegrd5R66rD/rka3UU7/KMFWQ+khLP8JWy78qX54+gQ
# 46MUBu4/7yz09BYscf7StMa9Rak1s6+Nu8Ui199/yugQUKbd7rA9qajoafZsJQdj
# sRevN9OKFxzO5FK1jdImvUnspeadp61hminqufMAHfZg8TuZpyTweMwSUWQAAAZD
# v+rVXiWg5dd3Hku48UXz7oaDPJHVHCuQ0UMFHZGVYT+H+dz1zNi4CEk8Mf7CYLgB
# Om5Q1K2yYcVARgEZob1couW3KgjLTZXqJC/w4GwbOPLMjUTade1MKbf2lt0aIU2c
# NwQzVPy1opluMUOaevV1wvusMJm09agNP5Ow9hQxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAw3ebH3/6ESgoNOZAw/+mblRog3/0zZDFLHYCD239KfDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib
# t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgUVWqRHVLUtRzvDaxydSyUqyoMiLM
# E6VxpQhpvbiH/VwwDQYJKoZIhvcNAQELBQAEggIAR1e7HLcjnhmgOP6sz7u2Y/21
# YZ7y+YVZU+7q/PfM5iPcRUrLU4Mc2TBlPpEH61hF3aT0pZxx1RdPM+sHMAkhD6+Z
# ruol1SRNyX7GkUvOEkka4JoZDHRVzht69hpPI79QXKgMWdUKNXNBMUU69DHlIQwj
# a+jcpSPaDv9LO2rcX57vj+rojK1WeaD+KRZ/kseqno7MtYKSc+1kTtreYLnos8Am
# HlffPoXqoVwvln3FfnUW3xrCLDFs8bP2hJqsedciDnUl4IOz5ABJnYJ48EXtWZSx
# eFNY8isG3akPT8EaHdP8VwjeQkkSIBeI7+tLHIQqXP1op5e/LkBNhjIqrhXznhe5
# ssLnIRDD2mAb1VLq+qNYXOTCqDCfCQMzkgjB/zX+dGO7a/bUD15nFprbzniqWcKi
# d7m4JKJckGivE0MuKP7btbDe6cMscT5EnNpftimQWgaV4ihQvTCMFfyM2VniO3q1
# pcRtXkN4yDp2hK/f1RfFLRp81iI6A6Z4pkdSJD+WKY0Is0PiSX3UypuKf93YPySQ
# vVFnbpoUTlWpO7GXkq5OSypl2QC448lsru+l9mR01zJ5mZ8yVYBJZ5NAu4TijVQd
# f1IsWg5idwbARFYSdIy2+x95+iaqjiukr2W6ghO388pA6EIPWEuey2QV9t2dvJQ3
# drhNIf8IarQIlOB+gTw=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_53_69.ps1
|
sample_53_69.ps1
|
#
# Module manifest for module 'OCI.PSModules.Licensemanager'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Licensemanager.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd5ea5795-15c4-465d-b62e-2951d092514b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Licensemanager Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Licensemanager.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCILicensemanagerBulkUploadTemplate',
'Get-OCILicensemanagerConfiguration',
'Get-OCILicensemanagerLicenseMetric',
'Get-OCILicensemanagerLicenseRecord',
'Get-OCILicensemanagerLicenseRecordsList',
'Get-OCILicensemanagerProductLicense',
'Get-OCILicensemanagerProductLicenseConsumersList',
'Get-OCILicensemanagerProductLicensesList',
'Get-OCILicensemanagerTopUtilizedProductLicensesList',
'Get-OCILicensemanagerTopUtilizedResourcesList',
'Invoke-OCILicensemanagerBulkUploadLicenseRecords',
'New-OCILicensemanagerLicenseRecord',
'New-OCILicensemanagerProductLicense',
'Remove-OCILicensemanagerLicenseRecord',
'Remove-OCILicensemanagerProductLicense',
'Update-OCILicensemanagerConfiguration',
'Update-OCILicensemanagerLicenseRecord',
'Update-OCILicensemanagerProductLicense'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Licensemanager'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_29_34.ps1
|
sample_29_34.ps1
|
<#
.SYNOPSIS
Demonstrates how to write a command that works with paths that do
not allow wildards and do not have to exist.
.DESCRIPTION
This command does not require a LiteralPath parameter because the
Path parameter can handle paths that use wildcard characters. That's
because this command does not "resolve" the supplied path. This command
also does not verify the path exists because the point of the command is
to create a new file at the specified path.
.EXAMPLE
C:\PS> New-File -Path xyzzy[1].txt -WhatIf
This example shows how the Path parameter can handle a path that happens
to use the wildcard chars "[" and "]" and does not exist to start with.
#>
function New-File {
[CmdletBinding(SupportsShouldProcess=$true)]
param(
# Specifies a path to one or more locations.
[Parameter(Mandatory=$true,
Position=0,
ParameterSetName="Path",
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Path to one or more locations.")]
[Alias("PSPath")]
[ValidateNotNullOrEmpty()]
[string[]]
$Path
)
begin {
}
process {
# Modify [CmdletBinding()] to [CmdletBinding(SupportsShouldProcess=$true)]
$paths = @()
foreach ($aPath in $Path) {
# Resolve any relative paths
$paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath)
}
foreach ($aPath in $paths) {
if ($pscmdlet.ShouldProcess($aPath, 'Operation')) {
# Process each path
$aPath
}
}
}
end {
}
}
# SIG # Begin signature block
# MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYk0v9DgxHXE7Y
# HJobQ9BIPo26EzBQvicpkPO77AOfz6CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP8eTNEiejKQB9/dYhyccEf8eROU+H+H
# ZyCB81P0RkaAMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# Z8h04ocJ7ishvlARv7Ne2c647/MtmmerrzpmaoWvChevycTEwpLXXlO15Fcvc4Xp
# aL71BLbEhbooSJJvdrtCS8NEMAYwIcBU+9lT16ZN6IWmEqJqmM46FaVtaZ6/HqnO
# ewqB4DAQyi4uHAadZTR4tqni8CcUcX7/q1UMtMrZwtEyEGExwtku7d2GgKgoDyv4
# z8hQA0C3gf6HeE0KD/SsZJ6jMxxp06MK6LAprLoINQat/8L7AY0oGKkyojokywk6
# NhrGa3jKPN0UixtgYWMqmcGmictYBjTie/svycWImc0zfO6v42dv9yMgZwsDTpid
# zJE+QRjvFIgORdJ+p7yru6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG
# SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B
# CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCCE7FaMT0H46M0uFyiJ/e3yIIbaKWmRS8c5Wt9JawrvegIGZfL2c4XqGBMyMDI0
# MDQwMzIyNTgxNi43NzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5
# NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH
# IDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0BAQsFADB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2MDJaFw0y
# NTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD
# VQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfXhlLYmGns
# UtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjHtivWGgGj
# 4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQSmE9jQRo
# BogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56xYPQikitQ
# jjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhbw+z3VetR
# wuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvniP7sfE1ut
# fi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+syO1udZOe
# KM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E41j3s7MlT
# F4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA7E5vytak
# 0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj8Ipg3uQv
# cug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+XxwIDAQAB
# o4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8GA1UdIwQY
# MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
# BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
# /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G
# CSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w61FxRxPxC
# XRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4Go9AML4l
# hA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEBPJQUxxuC
# iS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRABTUICNNrS
# 19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxewCpD4lZL
# 6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1rgReGd2uq
# QxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3ye1Z3pne
# r0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QTSTtDvU7+
# zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRiKsDF370S
# wIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8nfDjzJa8
# CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCALt0rQPJYn
# OzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL
# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV
# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X
# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb
# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO
# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw
# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW
# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w
# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK
# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2
# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH
# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF
# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW
# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH
# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF
# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw
# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7
# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO
# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL
# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L
# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5
# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE
# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB
# ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu+gYs2LRh
# a5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bfReDAiGA8yMDI0MDQwMzEzMDA0MFoYDzIw
# MjQwNDA0MTMwMDQwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt9F4AgEAMAcC
# AQACAhI1MAcCAQACAhNlMAoCBQDpuSL4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG
# CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL
# BQADggEBAJEy+5rWoRMEFwzLLvHkvGjzGu9ddkAK209quPVqHnL4PRm2G6FHJR9s
# mUi2dGKY514/KodHEAVN/FRsCzupdo00h4sP6dta93k4+O/heIhwSRMloIE1ziUY
# Y8JDe7gnTmOnHt2NXefBC6+gukJxy8b3015A0Pt+ePFvhyt5WdXRDDdm33uX+u8C
# HrFVGfMgCYG1g1LV5rh5lxJ2piOPPuiRFfDzBzfIicNy1MQfhyilVj2uSwSTkPie
# FvXLcu6hQn/JO/QpdtGYFtSHNNMFPMNKVlM6n9fTxO7caKeVVwI/0gtyvHbVhFQr
# exJf6FwVTuLbKWYNYYrkLozXmcC/a0MxggQNMIIECQIBATCBkzB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zANBglghkgB
# ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3
# DQEJBDEiBCAqONmZLnhJGDDKNrMjoln6obdXfyXXo600s6famBvzmDCB+gYLKoZI
# hvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh841sG/aDO
# wxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAHzxQpDrgPMHTEAAQAAAfMwIgQgz8OY6y2ig/3Wkwdldm0M474nUgioSU+I8g3u
# p3GLoqQwDQYJKoZIhvcNAQELBQAEggIAg6faVE9ZsrhUuhVhpxTUxPXE0jy+bZI+
# OKTIFGOiEazLZ+2pYVAr/5p1M5W1v6kljCeNd6qQP5ODjl8McWDPM6XKvGQdRXnV
# 7DV0Jdtfjt307rvc91dNlQAko6dRLBzC1kpE9u1iZLH3e8eWbo9+05XdsjALzM3f
# oDeTsGqxUCY0in4mMr+OiK+F3qaKz9KklUkWO1LAIwF5Q0qUyA1SW29TVjVbliI5
# Ux7rTCQS8S4cLBZxem7e6GwMnSfEKROjhAu7kHIqz4aeAYdnriofnGm1c29WDDTM
# BcTmK/WgFWlSvl8lR8VJdanCuq6dPdZHKwiAAUJMlWMO0HdTBbgiHDHa9KABKwcE
# CSRm0Nm2aOu42lJO3UNzu+jX0tBCSVITXZmzEykKGNABv8jNIS52BradTcDYwm7F
# 0sykVKM61i7MmFp8o7TXRxgSJVQQGo4QI0BhySK8t/kQZVMK+K56kKhMrOxU94xY
# gmX5yCcdLID1/nZxOBHhlHH4podFK3ycB5G7pNVdBE1MknyGi3GAcvHX+yQbs2hY
# vrCe6Wi2DAkutRR3huATO6uZAeKrNYqQxI/3s27gqWJm6aVacldG81XKMrMTopRr
# BeTv04935OcQYjO06bIW6cTXd35uUvLouN8j3pEztV+IIkZSJnjzQGPAAtbJMcBx
# hKUWSqETgPQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_10_1.ps1
|
sample_10_1.ps1
|
#************************************************
# DC_PStat.PS1
# Version 1.0.1
# Date: 07-10-2009
# Author: Andre Teixeira - andret@microsoft.com
# Description: PStat.exe tool, saving output to a file named $ComputerName_PStat.txt
#************************************************
if($debug -eq $true){[void]$shell.popup("Run DC_PStat.ps1")}
Import-LocalizedData -BindingVariable PStatStrings -FileName DC_PStat -UICulture en-us
Write-DiagProgress -Activity $PStatStrings.ID_PStat -Status $PStatStrings.ID_PStatRunning
if ($Env:PROCESSOR_ARCHITECTURE -ne "IA64") {
$sectionDescription = $PStatStrings.ID_PStat
$OutputFile = join-path $pwd.path ($ComputerName + "_PStat.txt")
$CommandToExecute = $Env:windir + "\system32\cmd.exe /c Pstat.exe > `"$OutputFile`""
$fileDescription = $PStatStrings.ID_PStatOutput
if ($OSArchitecture -ne 'ARM')
{
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
}
else
{
'Skipping running {' + $PStatExe + '} since it is not supported in ' + $OSArchitecture + ' architecture.' | WriteTo-StdOut
}
} else {
$PSCustom = new-object PSObject
add-member -inputobject $PSCustom -membertype noteproperty -name "PStat" -value "PStat is not supported on IA64"
$PSCustom | convertto-xml | update-diagreport -id 00_PStat -name "PStat" -verbosity "Debug"
}
Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBO9Pt6TmlkP/Lo
# MuWYoAGKhjQb2cECAvFHHpUIVbfQwaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJfTnpUlvBdhdXuMPbbA946R
# VHC+miPGBGchdArzpmcqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAEU4EMfQc7BDVafNKOYjsnhu8r+8y75sQ6dXcLrAiwfVc4vbWAJPR+NoO
# FoJ/cigEV1HwmNVRYDFbyrbuMKUxmTG7j+yYZUDCJIsxj3VkQwvbi+xknL1XGHJU
# Q8dAW6dTbM2NYYmJBR+ruUorGRtaw07xndkU9rubxPI8aJ1YZoHDN14BKIHICCfS
# FnMG2+WWVsnMswPNXm06MsmcfwfEDvKEAdRIwFhTKiel+hw4uvn9h9XSCj9llZpx
# O6n6F1eooQswsNGkSJo7Bwdd0ew09oTSZIvo+uKM4lcwa5/Lp0Fl9AyVEFh3tnbd
# jaf69nXYFmM7zNsEtah70JgJ1Zc2k6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDLgfJCxawxSexqVEZiTgU8SWZyMBI8/n8EqtzQ108P5gIGZutwxmXj
# GBMyMDI0MTAyODExNDA0Mi4yNTdaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe
# CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq
# U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf
# Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp
# ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw
# UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF
# acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi
# vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8
# /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I
# vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM
# SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92
# BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo
# PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT
# FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A
# Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW
# /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy
# tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h
# 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ
# lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr
# 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU
# PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t
# iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ
# 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx
# f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK
# AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz
# tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0
# teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey
# h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ
# N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI
# Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl
# FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgWOZwgxNWrSZA
# EoLSf9JQy1Tn74a9T607ov+L5VbqpeswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB
# MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB
# CwUABIICAGuViPfgG2qz/wGbZ3NIsTTu9FP1Zj+mEX0VtlGMOpMgFErgWENA2X0j
# dfUWezHJ1KFBGNSddsFmP+j3Wi+EBk6Yc+fJrBCi1hGAQnJUjTr3vzSCVNuWR1mP
# BUoIEb8Q3lPrULr2D4Xl2FaYoqr22a2b9mZnNF2MoxzFcYCcjThEatGg0To3n4Mk
# QkyQkcg8UIDKyo/JVQ4x3xzj4PF8jE65OLAjqPRcNOtssmA4Vc8KMz5dHyz2LJSa
# rqeBHXy1e9EiAi2yU8ue7Yx53ylBrkf26Of5bWBJjHMBHe1lLR+l2ccTksy8RO9s
# UNxBK2YJZwL+Kk7xJIUX0W1wPaWfk/qTl1k803hPBv7To5zxTI+wy1XmU++XHKEg
# 0TdW+SJgLRl4ww1YGnMLyA1aCjcBNOIc1AQKPtkTMiPONRn5TY2kOZnCnCHMMCZT
# EwqtJez7mMa2MZQ17yy6v817wwrIOJtfPL0/wBVyY42mM6M3db78zRVkzluqrxj5
# ZBsVg2jnqu5qby5aH1cP0l2k4XUY3dquK1X/QzeUlQVCApwG/kxiTVuo0cc3rfZX
# inbMcTEaqqRlVlxTy5phEfiyyBj8RZxJjITea+HD/aEDq+Tv0UWh+eKKAn9zcdGO
# i3kc3Le/SFG/Z4c9eo8gLOort15gZUM2yknfXttqpLh0VpSInJwL
# SIG # End signature block
|
combined_dataset/train/non-malicious/283.ps1
|
283.ps1
|
$clientId = " FILL ME IN "
function GetAuthToken
{
if(-not (Get-Module AzureRm.Profile)) {
Import-Module AzureRm.Profile
}
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://analysis.windows.net/powerbi/api"
$authority = "https://login.microsoftonline.com/common/oauth2/authorize";
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$authResult = $authContext.AcquireToken($resourceAppIdURI, $clientId, $redirectUri, "Auto")
return $authResult
}
function get_groups_path($group_id) {
if ($group_id -eq "me") {
return "myorg"
} else {
return "myorg/groups/$group_ID"
}
}
$token = GetAuthToken
Add-Type -AssemblyName System.Net.Http
$temp_path_root = "$PSScriptRoot\pbi-copy-workspace-temp-storage"
$auth_header = @{
'Content-Type'='application/json'
'Authorization'=$token.CreateAuthorizationHeader()
}
$uri = "https://api.powerbi.com/v1.0/myorg/groups/"
$all_groups = (Invoke-RestMethod -Uri $uri –Headers $auth_header –Method GET).value
$source_group_ID = ""
while (!$source_group_ID) {
$source_group_name = Read-Host -Prompt "Enter the name of the workspace you'd like to copy from"
if($source_group_name -eq "My Workspace") {
$source_group_ID = "me"
break
}
Foreach ($group in $all_groups) {
if ($group.name -eq $source_group_name) {
if ($group.isReadOnly -eq "True") {
"Invalid choice: you must have edit access to the group"
break
} else {
$source_group_ID = $group.id
break
}
}
}
if(!$source_group_id) {
"Please try again, making sure to type the exact name of the group"
}
}
$target_group_ID = ""
while (!$target_group_id) {
try {
$target_group_name = Read-Host -Prompt "Enter the name of the new workspace to be created"
$uri = " https://api.powerbi.com/v1.0/myorg/groups"
$body = "{`"name`":`"$target_group_name`"}"
$response = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method POST -Body $body
$target_group_id = $response.id
} catch {
"Could not create a group with that name. Please try again and make sure the name is not already taken"
"More details: "
Write-Host "StatusCode:" $_.Exception.Response.StatusCode.value__
Write-Host "StatusDescription:" $_.Exception.Response.StatusDescription
continue
}
}
$report_ID_mapping = @{}
$dataset_ID_mapping = @{}
$failure_log = @()
$import_jobs = @()
$source_group_path = get_groups_path($source_group_ID)
$target_group_path = get_groups_path($target_group_ID)
$uri = "https://api.powerbi.com/v1.0/$source_group_path/reports/"
$reports_json = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method GET
$reports = $reports_json.value
if ($source_group_ID -eq "me") {
$reports_temp = @()
Foreach($report in $reports) {
if ($report.isOwnedByMe -eq "True") {
$reports_temp += $report
}
}
$reports = $reports_temp
}
New-Item -Path $temp_path_root -ItemType Directory
"=== Exporting PBIX files to copy datasets..."
Foreach($report in $reports) {
$report_id = $report.id
$dataset_id = $report.datasetId
$report_name = $report.name
$temp_path = "$temp_path_root\$report_name.pbix"
if ($dataset_ID_mapping[$dataset_id]) {
continue
}
"== Exporting $report_name with id: $report_id to $temp_path"
$uri = "https://api.powerbi.com/v1.0/$source_group_path/reports/$report_id/Export"
try {
Invoke-RestMethod -Uri $uri –Headers $auth_header –Method GET -OutFile "$temp_path"
} catch {
Write-Host "= This report and dataset cannot be copied, skipping. This is expected for most workspaces."
continue
}
try {
"== Importing $report_name to target workspace"
$uri = "https://api.powerbi.com/v1.0/$target_group_path/imports/?datasetDisplayName=$report_name.pbix&nameConflict=Abort"
$httpClient = New-Object System.Net.Http.Httpclient $httpClientHandler
$httpClient.DefaultRequestHeaders.Authorization = New-Object System.Net.Http.Headers.AuthenticationHeaderValue("Bearer", $token.AccessToken);
$packageFileStream = New-Object System.IO.FileStream @($temp_path, [System.IO.FileMode]::Open)
$contentDispositionHeaderValue = New-Object System.Net.Http.Headers.ContentDispositionHeaderValue "form-data"
$contentDispositionHeaderValue.Name = "file0"
$contentDispositionHeaderValue.FileName = $file_name
$streamContent = New-Object System.Net.Http.StreamContent $packageFileStream
$streamContent.Headers.ContentDisposition = $contentDispositionHeaderValue
$content = New-Object System.Net.Http.MultipartFormDataContent
$content.Add($streamContent)
$response = $httpClient.PostAsync($Uri, $content).Result
if (!$response.IsSuccessStatusCode) {
$responseBody = $response.Content.ReadAsStringAsync().Result
"= This report cannot be imported to target workspace. Skipping..."
$errorMessage = "Status code {0}. Reason {1}. Server reported the following message: {2}." -f $response.StatusCode, $response.ReasonPhrase, $responseBody
throw [System.Net.Http.HttpRequestException] $errorMessage
}
$import_job_id = (ConvertFrom-JSON($response.Content.ReadAsStringAsync().Result)).id
$upload_in_progress = $true
while($upload_in_progress) {
$uri = "https://api.powerbi.com/v1.0/$target_group_path/imports/$import_job_id"
$response = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method GET
if ($response.importState -eq "Succeeded") {
"Publish succeeded!"
$report_id_mapping[$report_id] = $response.reports[0].id
$dataset_id_mapping[$dataset_id] = $response.datasets[0].id
break
}
if ($response.importState -ne "Publishing") {
"Error: publishing failed, skipping this. More details: "
$response
break
}
Write-Host -NoNewLine "."
Start-Sleep -s 5
}
} catch [Exception] {
Write-Host $_.Exception
Write-Host "== Error: failed to import PBIX"
Write-Host "= HTTP Status Code:" $_.Exception.Response.StatusCode.value__
Write-Host "= HTTP Status Description:" $_.Exception.Response.StatusDescription
continue
}
}
"=== Cloning reports"
Foreach($report in $reports) {
$report_name = $report.name
$report_id = $report.id
$target_dataset_Id = $dataset_id_mapping[$report.datasetId]
if ($target_dataset_Id -and !$report_ID_mapping[$report.id]) {
"== Cloning report $report_name"
$uri = " https://api.powerbi.com/v1.0/$source_group_path/reports/$report_id/Clone"
$body = "{`"name`":`"$report_name`",`"targetWorkspaceId`": `"$target_group_id`", `"targetModelId`": `"$target_dataset_Id`"}"
$response = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method POST -Body $body
$report_ID_mapping[$report_id] = $response.id
} else {
$failure_log += $report
}
}
"=== Cloning dashboards"
$uri = "https://api.powerbi.com/v1.0/$source_group_path/dashboards/"
$dashboards = (Invoke-RestMethod -Uri $uri –Headers $auth_header –Method GET).value
if ($source_group_ID -eq "me") {
$dashboards_temp = @()
Foreach($dashboard in $dashboards) {
if ($dashboard.isReadOnly -ne "True") {
$dashboards_temp += $dashboard
}
}
$dashboards = $dashboards_temp
}
Foreach ($dashboard in $dashboards) {
$dashboard_id = $dashboard.id
$dashboard_name = $dashboard.displayName
"== Cloning dashboard: $dashboard_name"
$uri = "https://api.powerbi.com/v1.0/$target_group_path/dashboards"
$body = "{`"name`":`"$dashboard_name`"}"
$response = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method POST -Body $body
$target_dashboard_id = $response.id
" = Cloning individual tiles..."
$uri = "https://api.powerbi.com/v1.0/$source_group_path/dashboards/$dashboard_id/tiles"
$response = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method GET
$tiles = $response.value
Foreach ($tile in $tiles) {
try {
$tile_id = $tile.id
$tile_report_Id = $tile.reportId
$tile_dataset_Id = $tile.datasetId
if ($tile_report_id) { $tile_target_report_id = $report_id_mapping[$tile_report_id] }
if ($tile_dataset_id) { $tile_target_dataset_id = $dataset_id_mapping[$tile_dataset_id] }
if (!$tile_report_id -Or $dataset_id_mapping[$tile_dataset_id]) {
$uri = " https://api.powerbi.com/v1.0/$source_group_path/dashboards/$dashboard_id/tiles/$tile_id/Clone"
$body = @{}
$body["TargetDashboardId"] = $target_dashboard_id
$body["TargetWorkspaceId"] = $target_group_id
if ($tile_report_id) { $body["TargetReportId"] = $tile_target_report_id }
if ($tile_dataset_id) { $body["TargetModelId"] = $tile_target_dataset_id }
$jsonBody = ConvertTo-JSON($body)
$response = Invoke-RestMethod -Uri $uri –Headers $auth_header –Method POST -Body $jsonBody
Write-Host -NoNewLine "."
} else {
$failure_log += $tile
}
} catch [Exception] {
"Error: skipping tile..."
Write-Host $_.Exception
}
}
"Done!"
}
"Cleaning up temporary files"
Remove-Item -path $temp_path_root -Recurse
|
combined_dataset/train/non-malicious/2571.ps1
|
2571.ps1
|
param(
$Environment
)
switch ($Environment)
{
PROD1 { $Server = 'PAPPBO20';
$BOService = 'BOE120SIAPAPPBO20';
$BOWebService = 'W3SVC';
$BODirectory = 'E:\Business Objects\BusinessObjects Enterprise 12.0\Data';
$BODirOld = 'E:\Business Objects\BusinessObjects Enterprise 12.0\DataOld';
}
PROD2 { $Server = 'PAPPBO21';
$BOService = 'BOE120SIAPAPPBO21';
$BOWebService = 'W3SVC';
$BODirectory = 'E:\Business Objects\BusinessObjects Enterprise 12.0\Data';
$BODirOld = 'E:\Business Objects\BusinessObjects Enterprise 12.0\DataOld';
}
IMP { $Server = 'IAPPBO510';
$BOService = 'BOE120SIAIAPPBO510';
$BOWebService = 'W3SVC';
$BODirectory = 'E:\Program Files\Business Objects\BusinessObjects Enterprise 12.0\Data';
$BODirOld = 'E:\Program Files\Business Objects\BusinessObjects Enterprise 12.0\DataOld';
}
}
Function BORemoveDataFolder
{
param ($Dir);
$TargetFolder = $Dir;
if (Test-Path $TargetFolder)
{
try
{
Remove-Item $TargetFolder -Recurse;
}
catch
{
Write-Host "`tTried to delete $TargetFolder and failed!";
}
finally
{
Write-Host "`tThe '$TargetFolder' folder was deleted successfully.";
}
}
Else
{
Write-Host "`tThe Folder $TargetFolder does not Exist!";
}
}
Function StopBOService
{
try
{
Stop-Service $BOService;
}
catch
{
Write-Host "The $BOService service failed to stop!";
}
finally
{
Write-Host "`tThe $BOService service was stopped successfully.";
}
}
Function StopBOWebService
{
try
{
Stop-Service $BOWebService;
}
catch
{
Write-Host "The $BOWebService service failed to stop!";
}
finally
{
Write-Host "`tThe $BOWebService service was stopped successfully.";
}
}
Function SendMail
{
$emailFrom = $Server + "@dexma.com";
$emailTo = "outage@dexma.com";
$subject = $Server + " Data Folder Maintenance";
$smtpServer = "Outbound.smtp.dexma.com";
$smtp = new-object Net.Mail.SmtpClient($smtpServer);
$smtp.Send($emailFrom, $emailTo, $subject, $body);
}
$LastDayOfMonth = (Get-Date -Year (Get-Date).Year -Month (Get-Date).Month -Day 1).AddMonths(1).AddDays(-1);
$DateDiff = New-TimeSpan $(Get-Date) $lastDayOfMonth;
if ( (Get-Date).DayOfWeek -eq 'Sunday' ) {
Write-Host "Stopping services...";
StopBOService;
StopBOWebService;
Write-Host "Moving folder...";
Move-Item $BODirectory $BODirOld;
Write-Host "Starting Services...";
Write-Host "`t...$BOService...";
Start-Service -Name $BOService;
Write-Host "`t...$BOWebService...";
Start-Service -Name $BOWebService;
Write-Host "Removing folder..."
BORemoveDataFolder $BODirOld;
$body = "The " + '"' + "$BODirectory" + '"' + " folder has been deleted to clear the old cache files.";
SendMail;
}
elseif ( ((Get-Date).Day -eq '1') -or (($DateDiff).days -eq '0') -or (($DateDiff).days -eq '1') ) {
Write-Host "The date is within two days of the end of the month or is the first of the month.";
Write-Host "Stopping BO service...";
StopBOService;
Write-Host "Starting BO Service...";
Write-Host "`t...$BOService...";
Start-Service -Name $BOService;
$body = "The Server Intelligence Agent " + '"' + "$BOService" + '"' + " service has been restarted for month end reporting availability.";
SendMail;
}
elseif ( (($DateDiff).days -ge '2') ) {
Write-Host "The end-of-month date is greater than 2 days away and it is not Sunday.";
$body = "No changes were made.";
}
Write-Host "Verifying services are started......";
Get-Service -ComputerName $Server -Name $BOService;
Get-Service -ComputerName $Server -Name $BOWebService;
|
combined_dataset/train/non-malicious/1315.ps1
|
1315.ps1
|
if( -not (Get-Command -Name 'Get-WindowsFeature*' | Where-Object { $_.ModuleName -ne 'Carbon' }) )
{
function Install-CWindowsFeature
{
[CmdletBinding(SupportsShouldProcess=$true,DefaultParameterSetName='ByName')]
param(
[Parameter(Mandatory=$true,ParameterSetName='ByName')]
[string[]]
[Alias('Features')]
$Name,
[Parameter(ParameterSetName='ByFlag')]
[Switch]
$Iis,
[Parameter(ParameterSetName='ByFlag')]
[Switch]
$IisHttpRedirection,
[Parameter(ParameterSetName='ByFlag')]
[Switch]
$Msmq,
[Parameter(ParameterSetName='ByFlag')]
[Switch]
$MsmqHttpSupport,
[Parameter(ParameterSetName='ByFlag')]
[Switch]
$MsmqActiveDirectoryIntegration
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
Write-Warning -Message ('Install-CWindowsFeature is obsolete and will be removed in a future major version of Carbon.')
if( -not (Assert-WindowsFeatureFunctionsSupported) )
{
return
}
if( $pscmdlet.ParameterSetName -eq 'ByFlag' )
{
$Name = Resolve-WindowsFeatureName -Name $PSBoundParameters.Keys
}
$componentsToInstall = $Name |
ForEach-Object {
if( (Test-CWindowsFeature -Name $_) )
{
$_
}
else
{
Write-Error ('Windows feature {0} not found.' -f $_)
}
} |
Where-Object { -not (Test-CWindowsFeature -Name $_ -Installed) }
if( -not $componentsToInstall -or $componentsToInstall.Length -eq 0 )
{
return
}
if( $pscmdlet.ShouldProcess( "Windows feature(s) '$componentsToInstall'", "install" ) )
{
if( $useServerManager )
{
servermanagercmd.exe -install $componentsToInstall
}
else
{
$featuresArg = $componentsToInstall -join ';'
& ocsetup.exe $featuresArg
$ocsetup = Get-Process 'ocsetup' -ErrorAction SilentlyContinue
if( -not $ocsetup )
{
Write-Error "Unable to find process 'ocsetup'. It looks like the Windows Optional Component setup program didn't start."
return
}
$ocsetup.WaitForExit()
}
}
}
Set-Alias -Name 'Install-WindowsFeatures' -Value 'Install-CWindowsFeature'
Set-Alias -Name 'Install-WindowsFeature' -Value 'Install-CWindowsFeature'
}
|
combined_dataset/train/non-malicious/Reset-Tray.ps1
|
Reset-Tray.ps1
|
function Reset-Tray {
Add-Type -Assembly UIAutomationClient
$Window = Add-Type -Name ([char[]](65..90 | Get-Random -count 10) -join "") -Member @"
[DllImport("user32")]
public static extern IntPtr PostMessage(IntPtr hWnd, UInt32 Msg, Int32 wParam, Int32 lParam);
public static void SendMouseMove(IntPtr hWnd, ushort x, ushort y) {
int point = (y << 16) + x;
PostMessage(hWnd, 0x200, 0, point);
}
"@ -Passthru
$tray1 = [System.Windows.Automation.AutomationElement]::RootElement.FindAll( "Descendants" , [System.Windows.Automation.Condition]::TrueCondition ) |
Where { $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ClassNameProperty) -like "SysPager" }
# On Windows7 and Vista there's this, like, sub-tray thing
$tray2 = $tray1.FindAll( "Children" , [System.Windows.Automation.Condition]::TrueCondition ) |
Where { $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::NameProperty) -eq "User Promoted Notification Area" }
$tray = $(if($tray2) { $tray2 } else { $tray1 })
$handle = $tray.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::NativeWindowHandleProperty)
$rect = $tray.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::BoundingRectangleProperty)
$y = $rect.Height/2
for ( $x = 0; $x -lt $rect.Width; $x += 8) {
$Window::SendMouseMove( $handle, $x, $y )
}
}
|
combined_dataset/train/non-malicious/sample_8_44.ps1
|
sample_8_44.ps1
|
<#
.SYNOPSIS
Collects basic information about the installed instance of WSUS Server
.DESCRIPTION
Collects basic information about the installed instance of WSUS Server and generates two files:
COMPUTERNAME_WSUS_BasicInfo.txt
(Optional) COMPUTERNAME_WSUS_UpdateApprovals.txt
.PARAMETER GetApprovedUpdates
(Optional) Collects a list of updates approved in the last 90 days.
.PARAMETER OutputDirectory
(Optional) Specify the output directory. If this is blank, the current working directory location is used.
.PARAMETER SilentExecution
(Optional) Use this to prevent any messages to get printed to the console host
.EXAMPLE
Get-WsusBasicInfo
.NOTES
10/04/2016 - Version 1.0 - Initial Version of the script
#>
[CmdletBinding()]
Param(
[Parameter(Mandatory = $false)]
[switch]$GetApprovedUpdates,
[Parameter(Mandatory = $false)]
[string]$OutputDirectory,
[Parameter(Mandatory = $false)]
[switch]$SilentExecution
)
if (-not $OutputDirectory) {
$OutputDirectory = $PWD.Path
}
$BasicOutputFile = Join-Path $OutputDirectory ($env:COMPUTERNAME + '_WSUS_BasicInfo.txt')
$ApprovalOutputFile = Join-Path $OutputDirectory ($env:COMPUTERNAME + '_WSUS_UpdateApprovals.txt')
$null | Out-File -FilePath $BasicOutputFile # Overwrite to empty file
if ($GetApprovedUpdates) {
$null | Out-File -FilePath $ApprovalOutputFile # Overwrite to empty file
}
Function Write-Out {
Param(
[string] $text,
[switch] $NoWriteHost,
[switch] $IsErrorMessage,
[string] $OutputFile
)
if ($OutputFile -eq $null -or $OutputFile -eq '') {
$OutputFile = $BasicOutputFile
}
$text | Out-File -Append -FilePath $OutputFile
if ($SilentExecution) {
return
}
if (-not $NoWriteHost) {
if ($IsErrorMessage) {
LogWarn "$text"
}
else {
LogInfo "$text"
}
}
}
Function Get-OSInfo() {
Write-Out
Write-Out 'WSUS SERVER INFORMATION:'
Write-Out
Write-Out "Server Name: $env:COMPUTERNAME"
Write-Out "Operating System: $([environment]::OSVersion)"
Write-Out "WSUS Version: $($updateServer.Version)"
Write-Out
Write-Out "Date of Report: $(Get-Date)"
Write-Out "User Running Report: $([environment]::UserDomainName)\$([environment]::UserName)"
}
Function Get-WSUSStatus() {
Write-Out
Write-Out '===='
$status = $updateServer.GetStatus()
Write-Out " Updates: $($status.UpdateCount)"
Write-Out " Approved Updates: $($status.ApprovedUpdateCount)"
Write-Out " Not Approved Updates: $($status.NotApprovedUpdateCount)"
Write-Out " Declined Updates: $($status.DeclinedUpdateCount)"
Write-Out " Expired Updates: $($status.ExpiredUpdateCount)"
Write-Out " Client Computer Count: $($status.ComputerTargetCount)"
Write-Out " Client Computers Needing Updates: $($status.ComputerTargetsNeedingUpdatesCount)"
Write-Out " Client Computers with Errors: $($status.ComputertargetsWithUpdateErrorsCount)"
Write-Out " Critical/Security Updates Not Approved: $($status.CriticalOrSecurityUpdatesNotApprovedForInstallCount)"
Write-Out " WSUS Infrastructure Updates Not Approved: $($status.WsusInfrastructureUpdatesNotApprovedForInstallCount)"
Write-Out " Number of Computer Target Groups: $($status.CustomComputerTargetGroupCount)"
Write-Out " Updates Needed by Computers: $($status.UpdatesNeededByComputersCount)"
Write-Out " Updates Needing Files: $($status.UpdatesNeedingFilesCount)"
}
Function Get-ComponentsWithErrors {
Write-Out
Write-Out '===='
Write-Out 'COMPONENTS WITH ERRORS'
Write-Out
$componentsWithErrors = $updateServer.GetComponentsWithErrors()
if ($componentsWithErrors.Count -gt 0) {
foreach ($component in $componentsWithErrors) {
Write-Out " $component"
}
}
else {
Write-Out ' None.'
}
}
Function Get-WSUSConfiguration {
Write-Out
Write-Out '===='
Write-Out 'WSUS SERVER CONFIGURATION INFORMATION'
Write-Out
$database = $updateServer.GetDatabaseConfiguration()
Write-Out 'Database Settings'
Write-Out " Database Server: $($database.ServerName)"
Write-Out " Database Name: $($database.DatabaseName)"
Write-Out " Using Windows Internal Database: $($database.IsUsingWindowsInternalDatabase)"
Write-Out
$config = $updateServer.GetConfiguration()
Write-Out 'Proxy Settings:'
Write-Out " Use Proxy: $($config.UseProxy)"
Write-Out " Allow Proxy Credentials to be sent over non-SSL links: $($config.AllowProxyCredentialsOverNonSsl)"
Write-Out " Anonymous Proxy Access: $($config.AnonymousProxyAccess)"
Write-Out " Proxy Name: $($config.ProxyName)"
Write-Out " Proxy Server Port: $($config.ProxyServerPort)"
Write-Out " Proxy User Domain: $($config.ProxyUserDomain)"
Write-Out " Proxy User Name: $($config.ProxyUserName)"
Write-Out " Has Proxy Password: $($config.HasProxyPassword)"
Write-Out
$enabledLanguages = $config.GetEnabledUpdateLanguages()
Write-Out 'Updates Settings:'
Write-Out " Auto Approve WSUS Infrastructure Updates: $($config.AutoApproveWsusInfrastructureUpdates)"
Write-Out " Auto Refresh Update Approvals: $($config.AutoRefreshUpdateApprovals)"
Write-Out " Download Express Packages: $($config.DownloadExpressPackages)"
Write-Out " Download Update Binaries As Needed: $($config.DownloadUpdateBinariesAsNeeded)"
Write-Out " Host Binaries on Microsoft Update: $($config.HostBinariesOnMicrosoftUpdate)"
Write-Out " Local Content Cache Path: $($config.LocalContentCachePath)"
Write-Out " All Update Languages Enabled: $($config.AllUpdateLanguagesEnabled)"
$temp = ' Enabled Update Languages:'
foreach ($language in $enabledLanguages) {
$temp = $temp + " $language"
}
Write-Out $temp
Write-Out
Write-Out 'Synchronization Settings:'
Write-Out " Sync from Microsoft Update: $($config.SyncFromMicrosoftUpdate)"
Write-Out " Upstream WSUS Server Name: $($config.UpstreamWsusServerName)"
Write-Out " Upstream WSUS Server Port: $($config.UpstreamWsusServerPortNumber)"
Write-Out " Upstream WSUS Server, Use SSL: $($config.UpstreamWsusServerUseSsl)"
Write-Out " Is Replica Server: $($config.IsReplicaServer)"
Write-Out
Write-Out 'Miscellaneous Settings:'
Write-Out " Client Event Expiration Time: $($config.ClientEventExpirationTime)"
Write-Out " Expired Event Detection Period: $($config.ExpiredEventDetectionPeriod)"
Write-Out " Last Configuration Change: $($config.LastConfigChange)"
Write-Out " Server Event Expiration Time: $($config.ServerEventExpirationTime)"
Write-Out " Server ID: $($config.ServerId)"
Write-Out " Targeting Mode: $($config.TargetingMode)"
}
Function Get-SubscriptionList {
Write-Out
Write-Out '===='
Write-Out 'SUBSCRIPTIONS'
$subscription = $updateServer.GetSubscription()
$categories = $subscription.GetUpdateCategories()
$classifications = $subscription.GetUpdateClassifications()
Write-Out
Write-Out ' Update Categories:'
Write-Out
foreach ($category in $categories) {
Write-Out " $($category.Title)"
}
Write-Out
Write-Out ' Update Classifications:'
Write-Out
foreach ($classification in $classifications) {
Write-Out " $($classification.Title)"
}
}
Function Get-SubscriptionInfo {
Param(
[int] $NumberOfDays
)
Write-Out
Write-Out '===='
Write-Out 'WSUS SUBSCRIPTION INFORMATION'
Write-Out
$subscription = $updateServer.GetSubscription()
$lastSyncInfo = $subscription.GetLastSynchronizationInfo()
Write-Out " Last synch start time: $($lastSyncInfo.StartTime)"
Write-Out " Last synch end time: $($lastSyncInfo.EndTime)"
Write-Out " Last synch error: $($lastSyncInfo.Error)"
Write-Out " Last synch error text: $($lastSyncInfo.ErrorText)"
Write-Out " Last synch result: $($lastSyncInfo.Result)"
Write-Out " Last synch was manual: $($lastSyncInfo.StartedManually)"
$updateErrors = $lastSyncInfo.UpdateErrors
if ($updateErrors.Count -lt 1) {
Write-Out ' Last synch got all updates!'
}
else {
Write-Out
Write-Out 'Last synch failed to get following updates:'
foreach ($updateErrorInfo in $updateErrors) {
$update = $updateServer.GetUpdate($updateErrorInfo.UpdateId)
Write-Out " Update ID: $($update.Title)"
Write-Out " Error: $($updateErrorInfo.Error)"
Write-Out " Error Text: $($updateErrorInfo.ErrorText)"
}
}
$since = [DateTime]::Now.AddDays(-$NumberOfDays)
Write-Out
Write-Out '===='
Write-Out "WSUS SUBSCRIPTION HISTORY FOR LAST $NumberOfDays DAYS (since $since):"
Write-Out
$eventHistory = $subscription.GetEventHistory($since, [DateTime]::Now)
if ($eventHistory.Count -lt 1) {
Write-Out ' None.'
return
}
foreach ($event in $eventHistory) {
Write-Out " $($event.CreationDate) - $($event.Message)"
}
}
Function Get-ComputersNotCheckingIn {
Param(
[int] $NumberOfDays
)
$since = [DateTime]::Now.AddDays(-$NumberOfDays)
Write-Out
Write-Out '===='
Write-Out "COMPUTERS THAT HAVE NOT CONTACTED THE WSUS SERVER FOR $NumberOfDays DAYS OR MORE (since $since):"
Write-Out
$computerTargets = $updateServer.GetComputerTargets()
$count = 0
foreach ($computerTarget in $computerTargets) {
if ($computerTarget.LastReportedStatusTime -lt $since) {
Write-Out " $($computerTarget.FullDomainName) last checked in: $($computerTarget.LastReportedStatusTime)"
$count++
}
}
if ($count -eq 0) {
Write-Out ' None.'
}
else {
Write-Out
Write-Out " Total: $count"
}
}
Function Get-TargetGroupList {
Param(
[switch] $ListComputersInGroup
)
Write-Out
Write-Out '===='
if ($ListComputersInGroup) {
Write-Out 'CLIENT COMPUTER LIST'
}
else {
Write-Out 'COMPUTER TARGETING GROUPS'
}
Write-Out
$computerTargetGroups = $updateServer.GetComputerTargetGroups()
if ($computerTargetGroups.Count -lt 1) {
Write-Out ' None.'
return
}
foreach ($targetGroup in $computerTargetGroups) {
$targets = $targetGroup.GetComputerTargets()
Write-Out ' ----'
Write-Out " Target Group: $($targetGroup.Name)"
Write-Out " Number of computers in group: $($targets.Count)"
if ($ListComputersInGroup) {
foreach ($computer in $targets) {
$temp = " Computer: $($computer.FullDomainName)`t"
#$temp += " ($($computer.IPAddresss))"
$temp += " LastStatus: $($computer.LastReportedStatusTime)"
$temp += " LastSync: $($computer.LastSyncTime)"
$temp += " (OS Build $($computer.OSInfo.Version.Build)"
$temp += " Version $($computer.OSInfo.Version.Major).$($computer.OSInfo.Version.Minor) SP$($computer.OSInfo.Version.ServicePackMajor))"
Write-Out $temp
}
}
Write-Out
}
}
Function Get-ApprovedUpdates {
Param(
[int] $NumberOfDays
)
$since = [DateTime]::Now.AddDays(-$NumberOfDays)
Write-Out -OutputFile $ApprovalOutputFile
Write-Out '====' -OutputFile $ApprovalOutputFile
Write-Out "UPDATES (LATEST REVISION) APPROVED IN LAST $NumberOfDays DAYS (since $since)" -OutputFile $ApprovalOutputFile
Write-Out -OutputFile $ApprovalOutputFile
$updateScope = New-Object Microsoft.UpdateServices.Administration.UpdateScope
$updateScope.FromArrivalDate = $since
$updateScope.ApprovedStates = [Microsoft.UpdateServices.Administration.ApprovedStates]::LatestRevisionApproved
$approvedUpdates = $updateServer.GetUpdateApprovals($updateScope)
if ($approvedUpdates.Count -lt 1) {
Write-Out ' None.' -OutputFile $ApprovalOutputFile
return
}
foreach ($updateApproval in $approvedUpdates) {
$updateInfo = $updateServer.GetUpdate($updateApproval.UpdateId)
Write-Out -OutputFile $ApprovalOutputFile
Write-Out "Update ID: $($updateInfo.Id.UpdateId), Revision Number: $($updateInfo.Id.RevisionNumber), Title: $($updateInfo.Title)" -OutputFile $ApprovalOutputFile
Write-Out " Classification: $($updateInfo.UpdateClassificationTitle)" -OutputFile $ApprovalOutputFile
Write-Out " Action: $($updateApproval.Action), State: $($updateApproval.State), ComputerTargetGroup: $($updateApproval.GetComputerTargetGroup().Name)" -OutputFile $ApprovalOutputFile
Write-Out " ApprovalDate: $($updateApproval.CreationDate), GoLiveTime: $($updateApproval.GoLiveTime), Deadline: $($updateApproval.Deadline)" -OutputFile $ApprovalOutputFile
}
}
# Main script
try {
[reflection.assembly]::LoadWithPartialName('Microsoft.UpdateServices.Administration') | Out-Null
$updateServer = [Microsoft.UpdateServices.Administration.AdminProxy]::GetUpdateServer()
}
catch [Exception] {
Write-Out
Write-Out ' Failed to connect to the WSUS Server.' -IsErrorMessage
Write-Out " Error: $($_.Exception.Message)" -IsErrorMessage
Write-Out
exit 2
}
try {
Get-OSInfo
Get-WSUSStatus
Get-ComponentsWithErrors
Get-WSUSConfiguration
Get-SubscriptionList
Get-SubscriptionInfo -NumberOfDays 7
Get-ComputersNotCheckingIn -NumberOfDays 7
Get-ComputersNotCheckingIn -NumberOfDays 30
Get-TargetGroupList
Get-TargetGroupList -ListComputersInGroup
if ($GetApprovedUpdates) { Get-ApprovedUpdates -NumberOfDays 30 }
}
catch [Exception] {
Write-Out 'An unexpected error occurred during execution.' -IsErrorMessage
Write-Out "Exception: $($_.Exception.Message)" -IsErrorMessage
if ($null -ne $_.Exception.ErrorRecord) {
if ($null -ne (Get-Member -InputObject $_.Exception.ErrorRecord -Name ScriptStackTrace)) {
Write-Out 'Stack Trace: ' -IsErrorMessage
Write-Out $($_.Exception.ErrorRecord.ScriptStackTrace) -IsErrorMessage
}
}
}
Write-Out
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBUzpBwWfWaUNda
# pJw4CM1MII2ppWAKw4CRU1DqWOFTBKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO8s
# gZ8ZEjz1rlm30G0gbjrVbedF+xkg8Er0jgzMmGt8MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAmu0lQ94LowNWMh3QeD6Z1ze+6jFeD3VI/NKv
# qEQF6PrFgzQfTPSOW5zjfa0uQMvoNwYPB4lxIiTMd9K9EyYQw2tdboHp8as7LEAs
# D9hmSCy7hpYhffcNKgL+5pnRKjpERBPemKVKd/1wmtHFJZm0y/Ko6BKiFi0D6KhM
# dPhfaa36BDy3pr2LuMznan6PZnItqaWatjU5qspUmaZOyoWzG+ZinROuDcuCX57v
# VKpR0YWHQBeROQK4JLw8F4ABRtiCpS0zNiBDOveiZBizoVnpfLFnhnelzOx1e60A
# DDX4M4JNoPJ7fNtT9q7bqvEnRZdWK5krGLUeFt0zjU/zkRGehaGCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBkRtREIv1Oio5zWx7SvIvV7CBdFE3PhT20
# 518GN99NtAIGZxqNTqOAGBMyMDI0MTAyODExMzUyNS4xMDVaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB
# AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv
# QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed
# zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv
# 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY
# cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT
# EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ
# UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7
# b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD
# oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe
# h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69
# mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2
# t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx
# BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X
# pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t
# aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t
# uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM
# iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw
# psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL
# zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR
# J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB
# 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX
# WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV
# PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE
# K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smo0TAi
# GA8yMDI0MTAyODA2MDgxN1oYDzIwMjQxMDI5MDYwODE3WjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDqyajRAgEAMAoCAQACAgWXAgH/MAcCAQACAhK9MAoCBQDqyvpR
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALgqZtdfGHfBazKoV8/843Ip
# TSU07I0JGfXJbnovL0Q0rAjuvBKveKlK32WumSyuoR4Ya2ULLIJOczpFhgxpuw7I
# 82xdhNLFLuUrbVXhH2XM4mZT5Ry8Zh18jBR2WevcePllwTXcOyduzQBlvbTB2ORn
# Pwfg47LNUYexuXAKFm6kwKtXFC/N72WK/zV2LeO9FPCyUETpStdYiebSahH7im5d
# DaFeNF7ZKKXp2zWG7JYvrT0HcUcAQmA+eg5ov2i7hkFxQzN008G+b+58Vq1QNSaz
# 4CF2D4RxTXGrf9ICHuX2BOf8c/Ap/pKcZN/ZDEIgvuEnjDO2pvNkCh9EbxicT/4x
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AfI+MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAYGRoWu9BFgt+EQvEAeysO
# V4n37smY7TQWaJ1Op5yg9zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPja
# Ph0uMVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgemtf
# KediGd1+I1jEAiEUlDRd8R1QCuXoLDc7YcA8zrAwDQYJKoZIhvcNAQELBQAEggIA
# ljiA24G8Zq/IuWS76UVtlxlSh4IV7tzQnx6aU/DDZWf3i3ZKmMh2KJGtzo3Jv2hP
# /CC3bX2ddDN14cpY/cJJZIr+1npC5yAc1qXQGf0BEuTLZPQazXH/seos4JeJ32gA
# Nyqo/Yo+OWAd5zbDVf0OSb5ZMh4WOY4I30hSKFIdKZ0WfPIG0h/WJk3rvfiGd13D
# 32oAPdDMaVbCJj2/S7LRD5LL107Aw5b+eQDKVxF84DUZj3bSRUWK7Mj/nKkBXSqJ
# IItTowTmPt5BOErIqQXvhyolCbxcc8tEbWG5jImV0rguF1SXrgHOpFo4tIQGOKAB
# ZHFCVBuy3NecmacoDvyDBoxMKE2ZkDFKXt+AK5NpsAljPKirSPozOsRYvmPXy1Bu
# m+595RgFGG65NMtXCJGTo7PX29nx2uYSbQtPFJEyuOWWCS/iN6liyePK2ungktR2
# T+egiv+Klx2nou1pQDGEB/QwmlH7eWLySy0Hcyz08VRvAtMgFfbx0cX7qp0M0smo
# fIMaZBqH6tZKcmQWoeh2e9TpTnlzEZ00jxbZ0u27pWJCMV67q4BAhNg+Ptw8AkbW
# X8qC5TDTX4Bdln9pAgzGxsPapdq3noFFGhaUoMP2qHXU+MnNsYbd66pg98QiQz4P
# Uxrm5bwVwXRNTAlygTMpkYv//+d+I0aye8ve+/WFGtY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_2_55.ps1
|
sample_2_55.ps1
|
###########################################################################
# DC_Hardware
# Version 1.0
# Date: 09-26-2012
# Author: mifannin
# Description: Collects Installed Hardware Data
###########################################################################
Import-LocalizedData -BindingVariable Hardware -FileName DC_Hardware -UICulture en-us
Write-DiagProgress -Activity $Hardware.ID_Hardware
$OutputFile = $ComputerName + "_Hardware.txt"
$SystemName = "System Name: " + $ComputerName + "`n"
logstart
$SystemName | Out-File $OutputFile
$Header = "Memory:"
$Header | Out-File -Append $OutputFile
$Memory = Get-CimInstance -class Win32_computerSystem | ForEach-Object {[math]::truncate($_.TotalPhysicalMemory / 1MB)}
$WriteMemory = "Total Physical Memory: " + $Memory + "MB `n"
$WriteMemory | Out-File -Append $OutputFile
$Processors = Get-CimInstance Win32_Processor
$ProcName = "Processors:`n" + $Blocks + "`n" + "Name: " + $processors.Name + "`n"
Add-Content $OutputFile $ProcName -Encoding unknown
Add-Content $OutputFile "Disks: " -Encoding Unknown
$Blocks | Out-File -Append $OutputFile
$Disks= Get-CimInstance Win32_LogicalDisk
foreach ( $Drive in $Disks )
{
if ($drive.DriveType -eq "3")
{
$Size = ForEach-Object {[math]::truncate($Drive.Size / 1GB)}
$Space = ForEach-Object {[math]::truncate($Drive.FreeSpace / 1GB)}
#{[math]::truncate($Drive.Size / 1GB)} | Out-File $OutputFile
#$Size | Out-File -Append $OutputFile
#$Sizes | Out-File -Append $OutputFile
$DriveName = "DeviceID: " + $drive.Name
$DriveType = "Drive Type: " + $drive.DriveType
$DiskSize = "Drive Size " + $Size
$FreeSpace = "Free Space: " + $Space + "`n"
$DriveName | Out-File -Append $OutputFile
$DriveType | Out-File -Append $OutputFile
$DiskSize | Out-File -Append $OutputFile
$FreeSpace | Out-File -Append $OutputFile
}
}
CollectFiles -filesToCollect $OutputFile -fileDescription "Hardware" -sectionDescription "System Information"
logstop
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDRCMuE0nhoxFSP
# kkfPtf6OKC6ZQ2QeXbM9x5XqJaJV6qCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDTb
# SdAYmbgtI1+SCVw+oWsheoxz3wKnkbHiJFJE5iFiMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAfGxefX+PxYFuLzytdy7Ajk6Ka/vur/76fiwS
# DJEm6RiexvNFp+lNfexYiatBd7uqKxvGXQ0QOcNcraGdDlPgu0o+5VELnxOehs9h
# nO3njNKJyvi+hinzv9ZStkHwNUd6EtQ5t4CK+jq9PwlohnY5j6dvXdTZRKPAHSFS
# /psfm+wYZc7VW5tPCaKqc10MZZDn2NGxctrn5dTRGkKzD82/jrYUaPIEp7Bsi5Ix
# yIt84aIatNjs/ZAHQ2OyVNq0AuOuYUoU2N4cnV7MY6ewGr9oLBWSCejmfnxIQ2HX
# fMkol6BKT7vM3bPKEzlNmhRogiCNLkvTmpQ9zS70CI7mBdXdfqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCDbTI0Zy9w7GybxW1k1pCpAtf8BuLSd7M+
# qIGI2XNLsAIGZutTTeRKGBMyMDI0MTAyODExNDA0NC45ODJaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7
# RNN3M8bTAAEAAAH6MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQzMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yhZVBM3PZcBfEpAf7fIIhygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpG
# yDGX+EbCbHhS5Td4J0Ylc83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJd
# enpQ6UciM4nMYZvdQjybA4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ4
# 5oQIp7Sx57RPQ/0O6qayJ2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVK
# rRV5YelRvWNTg1pH4EC2KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah
# 14t7Yk+xl5P4Tw3xfAGgHsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1
# NroJKwBCW11Pwi0z/ki90ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7L
# k0Z/pATRwAINqwdvzpdtX2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8p
# SwGewrffwgAbNKm82ZDFvqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbN
# h5tDv3GeJ3EKvC4vNSAxtGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG
# 3zcsYHaa4+w+YmMrhTEzD4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRjjHKbL5WV6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAuFbCorFrvodG+ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xW
# dL1kygaW5BOZ3xBlPY7Vpuf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJf
# UQRThDL4zxI2pYc1wnPp7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yat
# cm4kBqIH6db1+weM4q46NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJS
# KcJ3nMVyfNlnv6yvttYzLK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0V
# CM11rHM11ZmN0euJbbBCVfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6
# CqLKjtHSoeoAGPeeX24f5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRs
# tZajbYEeX/N7RvSbkn0djD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M
# 0TKOduihhKxAt/6Yyk17Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe
# 5N0e4HWFf8WW2ZL0+c83Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87Z
# ymXG3MO2wUjhL9HvSQzjoquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKw
# BvII6sg0Ny7aPDaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0
# MTAyOTEwMTQwMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEA
# AgIa4zAHAgEAAgITSTAKAgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBDp2k9IO7lePSuN2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypO
# a+QZHboICRCPw0/gWqlrvDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNL
# Ml1wOoWE3WfiBV23XWqiqgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKL
# Qri7U/CWGo0EhKQQh5XEqgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj
# 7KSuuVKsMWeLMNH4sRgs1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBc
# udKw24qBm3gFHJ2uSv/oCRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgw9hG276YhqEzMLPGATtLLyZ383PmK+kmto6G5SaznzYwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYoc
# bkOeVjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# +vs7RNN3M8bTAAEAAAH6MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hW
# GYq3MA0GCSqGSIb3DQEBCwUABIICAFY3PiYV0nOs/JXTGBqqYmNea1d9+3VKUYJo
# 4Mn9g3Slk566L43hTuVFoqZcVoJkUGZRyioUz72y3bQYgtkFVagUqHcSqhd782FU
# dtjf+tN2PRcj5a9JI+nT0ZdhUkuOSFfw+tu6xEmTkV5q8u7gtU863K3IqRd3pMaG
# iC33nHoO65x+CsSKji+CGatxNr5+t1gTBS3wnz2oDexjQwRg3mB0ad/0nTlFZdHr
# dBDUvzDApRrlS9Lnehem7OJrBdV+l3AGZiAl2MQrY0WHHCx6LHrRURdp+3gkJQWj
# kXK5DFJkIczmQbB8zkNkhS1OGkPPSVZiTKl1pUijQTiFF3zml22EujYkmEFlS1Pq
# vzIbgeieFlXl25qCDGXViYsp3NlCIWIMyWaMnb6LuxJb6jN9C17eoNg+nzjkC2rB
# Vmz27tLjFeiOAmdcdph7qUNzJoaIOIdXBb+2Cx5Hy2AbeBS7F6qr/0F28fdFgp/+
# WrbEzlEJ6by5WYkDhuws3w1gfuFPefcFjZehbeIlbGdbfG4zmoC9e8CCsV7AL8UM
# sNXVKW+D6/TU2h8gxCt5mEdZDYkXvCukfD/7hFNMS6257k8GAJi4okbZJon2LHuy
# 1dRZacp/NHZAqu01fTaj1ZhLCOlTAq5aTG52cwSR5WLiGTDA0wGVkpEau5ZQqQ8n
# sTPd0km1
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_47_83.ps1
|
sample_47_83.ps1
|
ConvertFrom-StringData @'
FailoverClustersModuleRequired=Nie znaleziono wymaganego modułu programu PowerShell (FailoverClusters). Użyj narzędzia Role i funkcje, aby zainstalować następujące oprogramowanie: Narzędzia administracji zdalnej serwera | Narzędzia do administrowania funkcjami | Narzędzia klastra trybu failover | Moduł Klaster trybu failover dla programu Windows PowerShell.
'@
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDsKkSTivrpWzEy
# rFRQ5lRqOVHtuByasNxiiZQkO2nR/aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIjZz5pS0lDBSnbh9OvU+g3X
# aC7eYVPdx8QcsDkMK7gPMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAfIKmSGJa26djMPmL1O0f5VF10UeDnxjItaOw+Z+lDFknRTgg8QY5tft8
# Zi0xpoNgkkYLijr6CjTvYD7p+P2pRa7jCOswwTj/1upHvK5fWgETjP2MLx1z2MHd
# RhWYlQxuHVaAbUp2CLhOsJsgCZUzJihETJTSOo6FnHLOM0RwXd/70eHDw1bvQwcm
# DjdEPnD606/0OldyXe8RWOyodkDl6M6rTZDP27XFKCgjX9cQO6IOTG7qTAMvj/x9
# bN8UANsUQ8LyqzysKiFOOyPo3ueA0aN13aNnDnitdBgONqyauiDsaN2DWo9eFQbY
# qb7ttLZqttYt1ObUDjfRM1JvN0jcoaGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBljndE826VbTKiuBSM4gNWrB7k2LZxwpTil9A+dUwl+wIGZa6UAERI
# GBMyMDI0MDEyMjIxMzE1OC4yOTFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC
# RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ
# pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm
# scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF
# UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr
# c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T
# 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J
# IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz
# z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U
# NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O
# ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2
# UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx
# /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh
# Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t
# 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0
# GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6
# vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu
# dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY
# nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ
# 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z
# 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC
# V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH
# BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf
# v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv
# E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOlZEnwwIhgPMjAyNDAxMjMwMDEyNDRaGA8yMDI0MDEyNDAwMTI0NFowczA5Bgor
# BgEEAYRZCgQBMSswKTAKAgUA6VkSfAIBADAGAgEAAgEMMAcCAQACAhFgMAoCBQDp
# WmP8AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAuFdz42Rko9M3ivrv/uG3
# QvBrIXgucD09zUgAh5KiQvvTyJhIM6Ky1mxQUGa0HyFwHfBFnXeb4rzDjWWpQLXj
# dDMDU9SYh54v43gTXWsr6WQ3XDfxOY9cs749jpwQ4qiV39UMOpCiwLQZJk+vL3Ll
# Od/6HO9LSfAvYUbiofCpaPUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB4zANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCBbyOXwG1Ij1NCTKV9apPfNI3M6GR3VXRRGqNKwLbLv9jCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4MlxBt2Crw12PTHIy5iYq
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372b
# mhxogyIAAQAAAeMwIgQgFu6r6baMtOeWRTRsHtoLRxH0nvqB5p6LBtBECvyAHE4w
# DQYJKoZIhvcNAQELBQAEggIAqcGk/BYjVtIxlQsecmC4nmuyr4tj4kIGVpsyyuys
# aTeZa7mm5kLKUXZJwfQEKLZK7ISJ9FTdZzgEl3MXXG9kF9PeqHUcmBKKAJdK+usP
# l5FBVUqistlWmtocxaY4PQrDCKLBkvSt5ef92H7NN4+LibQysJxhCFxxVSm8tRn/
# fM3UDpSz5BQ6IkvhbelTzyPDEmIQHMaDn8MG6bbGVUdNnLmeJHYdbZ5VbtaVI4Fg
# ORtcEAhBLA4uoLB3d8R7lN7DvMe3lpb+aL2+IoJG7QKT1BPxW7TXGWHnPsjqYzLc
# 9aiZdQGZBIR7K5zpsmxOei/AaeEoT2gVh7ytj+PFwVwbT63cupblC7dos59Ht/8j
# eKcJ4iTUQueKjFtmpyBIK7xupjmmHn+DZBUSIUBINrJuBMxu3vYBoriwRkrdumG0
# VwIU/SZghmygFW0R7jk2r/wEVvMEuzoCeDEt4dxhoEasKlm3whsrR8NFFXjjH2mS
# YXAVwvTFgumhxEpAst96BuqX+FTEFzBIQxBFZ+unYbCMhAEdRyoy4n5cuXWKZZfB
# RQ0+Fd5KV+Ms9zmmHbrabJvy8gJn+OiUrtYVzQnTzSPEUIzerBzubWFAfE5fGWnj
# osg99DirINQ0yYuIpDOsHRrC/hN9Pl6p6dS2z2Zi62ETukXwvNyipAnF+L61gCbg
# gDA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/351.ps1
|
351.ps1
|
function Test-PSFFeature
{
[OutputType([bool])]
[CmdletBinding()]
param (
[PsfValidateSet(TabCompletion = 'PSFramework.Feature.Name')]
[parameter(Mandatory = $true)]
[string]
$Name,
[string]
$ModuleName
)
begin
{
$featureItem = Get-PSFFeature -Name $Name
}
process
{
if (-not $featureItem.Global) { [PSFramework.Feature.FeatureHost]::ReadModuleFlag($Name, $ModuleName) }
else { [PSFramework.Feature.FeatureHost]::ReadFlag($Name, $ModuleName) }
}
}
|
combined_dataset/train/non-malicious/2627.ps1
|
2627.ps1
|
[System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO') | out-null
[System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SmoExtended") | Out-Null
[System.reflection.assembly]::LoadWithPartialName("Microsoft.SqlServer.SqlWmiManagement") | Out-Null
function Out-DataTable
{
[CmdletBinding()]
param([Parameter(Position=0, Mandatory=$true, ValueFromPipeline = $true)] [PSObject[]]$InputObject)
Begin
{
$dt = new-object Data.datatable
$First = $true
}
Process
{
foreach ($object in $InputObject)
{
$DR = $DT.NewRow()
foreach($property in $object.PsObject.get_properties())
{
if ($first)
{
$Col = new-object Data.DataColumn
$Col.ColumnName = $property.Name.ToString()
if ($property.value)
{
if ($property.value -isnot [System.DBNull])
{ $Col.DataType = $property.value.gettype() }
}
$DT.Columns.Add($Col)
}
if ($property.IsArray)
{ $DR.Item($property.Name) =$property.value | ConvertTo-XML -AS String -NoTypeInformation -Depth 1 }
else { $DR.Item($property.Name) = $property.value }
}
$DT.Rows.Add($DR)
$First = $false
}
}
End
{
Write-Output @(,($dt))
}
}
$ErrorActionPreference = "Inquire"
function Get-Instance([string]$name)
{
try
{
$smo = new-object ('Microsoft.SqlServer.Management.Smo.Server') $name
$sname = $smo.NetName
$iname = $smo.InstanceName
if($iname.Length -eq 0 -or $iname -eq $null) { $iname = "MSSQLSERVER" }
$managedcomp = new-object ('Microsoft.SqlServer.Management.Smo.WMI.ManagedComputer') $sname
$output = New-Object System.Object
$port = $managedcomp.ServerInstances[$iname].ServerProtocols["Tcp"].IPAddresses["IPAll"].IPAddressProperties["TcpPort"].Value
$ip = (Test-Connection $sname -count 1).IPV4Address.ToString()
$output | Add-Member -type NoteProperty -name InstanceName -Value $iname
$output | Add-Member -type NoteProperty -name SQLVersion -value $smo.VersionString
$output | Add-Member -type NoteProperty -name SQLVersionDesc -value $smo.ProductLevel
$output | Add-Member -type NoteProperty -name SQLEdition -value $smo.Edition
$output | Add-Member -type NoteProperty -name MemoryMinMB -value $smo.Configuration.MinServerMemory.RunValue
$output | Add-Member -type NoteProperty -name MemoryMaxMB -value $smo.Configuration.MaxServerMemory.RunValue
$output | Add-Member -type NoteProperty -name MAXDOPVal -value $smo.Configuration.MaxDegreeOfParallelism.RunValue
$output | Add-Member -type NoteProperty -name IP -value $ip
$output | Add-Member -type NoteProperty -name Port -value $port
$output | Add-Member -type NoteProperty -name ServerName -value $smo.ComputerNamePhysicalNetBIOS
return $output
}
catch
{
write-host "Error collecting $name"
return $null
}
}
function Get-Server([string]$name)
{
try{
$comp = gwmi Win32_ComputerSystem -Computer $name | select Model,Manufacturer,TotalPhysicalMemory
$proc = gwmi Win32_Processor -Computer $name | select NumberOfLogicalProcessors,MaxClockSpeed
$os = gwmi Win32_OperatingSystem -Computer $name | select OSArchitecture,Name,Version,ServicePackMajorVersion,ServicePackMinorVersion
$output = New-Object System.Object
$output | Add-Member -type NoteProperty -name ServerName -value $name
$output | Add-Member -type NoteProperty -name Model -value $comp.Model
$output | Add-Member -type NoteProperty -name Manufacturer -value $comp.Manufacturer
$output | Add-Member -type NoteProperty -name Architechture -value $os.OSArchitecture
$output | Add-Member -type NoteProperty -name PhysicalCPUs -value $(if(!$proc.Length){"1"}else{$proc.Length})
$output | Add-Member -type NoteProperty -name LogicalCPUs -value ($proc | Measure-Object NumberOfLogicalProcessors -sum).Sum
$output | Add-Member -type NoteProperty -name CPUSpeed -value ($proc | Measure-Object MaxClockSpeed -max).Maximum
$output | Add-Member -type NoteProperty -name MaxMemory -value ($comp.TotalPhysicalMemory/1MB)
$output | Add-Member -type NoteProperty -name OSName -value $os.name.split("|")[0]
$output | Add-Member -type NoteProperty -name OsVersion -value $os.Version
$SPMaj = $os.ServicePackMajorVersion
$SPMin = $os.ServicePackMinorVersion
$output | Add-Member -type NoteProperty -name SPVersion -value "$SPMaj.$SPMin"
return $output
}
catch{
write-error "Error collecting $name"
return $null
}
}
function Load-Data($dt,$cxn,$desttbl)
{
$cxn.Open()
$bulkloader = new-object("Data.SqlClient.SqlBulkCopy") $cxn
$bulkloader.DestinationTableName=$desttbl
$bulkloader.WriteToServer($dt)
$cxn.Close()
}
function Get-SQLInventory{
param([string] $invserv = "localhost",
[string] $invdb = "MSFADMIN",
[parameter(Mandatory=$true)][string[]] $invlist)
$smoadmin = new-object ('Microsoft.SqlServer.Management.Smo.Server') $invserv
$prepquery = "delete from dataload.InstanceLoad;
delete from dataload.MachineLoad;"
$smoadmin.Databases[$invdb].ExecuteNonQuery($prepquery)
$instances = @()
$servers = @()
foreach($inv in $invlist){
$newinst = $null
$newinst = Get-Instance $inv
if($newinst -ne $null) {
$instances += $newinst
if($servers.ServerName -notcontains $newinst.ServerName){
$servers += Get-Server $newinst.ServerName
}
}
}
$instload = $instances | select ServerName,InstanceName,sqlversion,sqlversiondesc,sqledition,IP,Port,memoryminmb,memorymaxmb,maxdopval | out-datatable
$srvload = $servers | select ServerName,Model,Manufacturer,Architechture,PhysicalCPUs,LogicalCPUs,CPUSpeed,MaxMemory,OSName,OSVersion,SPVersion | out-datatable
$conn = New-Object system.data.sqlclient.sqlconnection("Data Source=$invserv;Initial Catalog=$invdb;Trusted_Connection=True;")
Load-Data $instload $conn "dataload.InstanceLoad"
Load-Data $srvload $conn "dataload.MachineLoad"
$smoadmin.Databases[$invdb].ExecuteNonQuery('execute dbo.dbasp_ProcessInventory;')
}
Get-SQLInventory -invlist @('localhost','localhost\ALBEDO')
|
combined_dataset/train/non-malicious/Get-FileEncoding_1.ps1
|
Get-FileEncoding_1.ps1
|
function Get-FileEncoding {
<#
.SYNOPSIS
Gets file encoding.
.DESCRIPTION
The Get-FileEncoding function determines encoding by looking at Byte Order Mark (BOM).
Based on port of C# code from http://www.west-wind.com/Weblog/posts/197245.aspx
.EXAMPLE
Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'}
This command gets ps1 files in current directory where encoding is not ASCII
.EXAMPLE
Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'} | foreach {(get-content $_.FullName) | set-content $_.FullName -Encoding ASCII}
Same as previous example but fixes encoding using set-content
.NOTES
Version History
v1.0 - 2010/08/10, Chad Miller - Initial release
v1.1 - 2010/08/16, Jason Archer - Improved pipeline support and added detection of little endian BOMs.
#>
[CmdletBinding()]
param (
[Alias("PSPath")]
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]
[String]$Path
)
process {
$Encoding = "ASCII"
[Byte[]]$byte = Get-Content -Encoding Byte -ReadCount 4 -TotalCount 4 -Path $Path
if ($byte[0] -eq 0xEF -and $byte[1] -eq 0xBB -and $byte[2] -eq 0xBF) {
$Encoding = "UTF8"
} elseif ($byte[0] -eq 0 -and $byte[1] -eq 0 -and $byte[2] -eq 0xFE -and $byte[3] -eq 0xFF) {
## UTF-32 Big-Endian
$Encoding = "UTF32"
} elseif ($byte[0] -eq 0xFF -and $byte[1] -eq 0xFE -and $byte[2] -eq 0 -and $byte[3] -eq 0) {
## UTF-32 Little-Endian
$Encoding = "UTF32"
} elseif ($byte[0] -eq 0xFE -and $byte[1] -eq 0xFF) {
## 1201 UTF-16 Big-Endian
$Encoding = "Unicode"
} elseif ($byte[0] -eq 0xFF -and $byte[1] -eq 0xFE) {
## 1200 UTF-16 Little-Endian
$Encoding = "Unicode"
} elseif ($byte[0] -eq 0x2B -and $byte[1] -eq 0x2F -and $byte[2] -eq 0x76) {
$Encoding = "UTF7"
}
$Encoding
}
}
|
combined_dataset/train/non-malicious/Query-VeeamBackupDB.ps1
|
Query-VeeamBackupDB.ps1
|
$dbServer = "servername\\instance"
$db = "VeeamBackup"
$veeamJob = "VeeamJobName"
$Query = "SELECT [job_name],CONVERT(char(10),[creation_time], 101) AS start_date `
,CONVERT(varchar, [creation_time], 108) AS job_start,CONVERT(char(10), [end_time], 101) AS end_date `
,CONVERT(varchar, [end_time], 108) AS job_end, `
LEFT(CONVERT(VARCHAR,CAST([end_time] AS DATETIME)-CAST([creation_time] AS DATETIME), 108),5) AS total_time `
FROM [VeeamBackup].[dbo].[BSessions] WHERE [job_name] = '$veeamJob' ORDER BY start_date"
$SqlConnection = New-Object System.Data.SqlClient.SqlConnection
$SqlConnection.ConnectionString = "Server=$dbServer;Database=$db;Integrated Security=True"
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand
$SqlCmd.CommandText = $Query
$SqlCmd.Connection = $SqlConnection
$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter
$SqlAdapter.SelectCommand = $SqlCmd
$DataSet = New-Object System.Data.DataSet
$SqlAdapter.Fill($DataSet)
$SqlConnection.Close()
$DataSet.Tables[0] | Format-Table -AutoSize
|
combined_dataset/train/non-malicious/sample_65_93.ps1
|
sample_65_93.ps1
|
#
# Module manifest for module 'OCI.PSModules.Resourcemanager'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '73e0f641-602c-4457-9e79-f05b84ced282'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Resourcemanager Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider',
'Get-OCIResourcemanagerConfigurationSourceProvidersList',
'Get-OCIResourcemanagerJob',
'Get-OCIResourcemanagerJobAssociatedResourcesList',
'Get-OCIResourcemanagerJobDetailedLogContent',
'Get-OCIResourcemanagerJobLogs',
'Get-OCIResourcemanagerJobLogsContent',
'Get-OCIResourcemanagerJobOutputsList',
'Get-OCIResourcemanagerJobsList',
'Get-OCIResourcemanagerJobTfConfig',
'Get-OCIResourcemanagerJobTfPlan',
'Get-OCIResourcemanagerJobTfState',
'Get-OCIResourcemanagerPrivateEndpoint',
'Get-OCIResourcemanagerPrivateEndpointsList',
'Get-OCIResourcemanagerReachableIp',
'Get-OCIResourcemanagerResourceDiscoveryServicesList',
'Get-OCIResourcemanagerStack',
'Get-OCIResourcemanagerStackAssociatedResourcesList',
'Get-OCIResourcemanagerStackResourceDriftDetailsList',
'Get-OCIResourcemanagerStacksList',
'Get-OCIResourcemanagerStackTfConfig',
'Get-OCIResourcemanagerStackTfState',
'Get-OCIResourcemanagerTemplate',
'Get-OCIResourcemanagerTemplateCategoriesList',
'Get-OCIResourcemanagerTemplateLogo',
'Get-OCIResourcemanagerTemplatesList',
'Get-OCIResourcemanagerTemplateTfConfig',
'Get-OCIResourcemanagerTerraformVersionsList',
'Get-OCIResourcemanagerWorkRequest',
'Get-OCIResourcemanagerWorkRequestErrorsList',
'Get-OCIResourcemanagerWorkRequestLogsList',
'Get-OCIResourcemanagerWorkRequestsList',
'Invoke-OCIResourcemanagerDetectStackDrift',
'Move-OCIResourcemanagerConfigurationSourceProviderCompartment',
'Move-OCIResourcemanagerPrivateEndpointCompartment',
'Move-OCIResourcemanagerStackCompartment',
'Move-OCIResourcemanagerTemplateCompartment',
'New-OCIResourcemanagerConfigurationSourceProvider',
'New-OCIResourcemanagerJob',
'New-OCIResourcemanagerPrivateEndpoint',
'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate',
'Remove-OCIResourcemanagerConfigurationSourceProvider',
'Remove-OCIResourcemanagerPrivateEndpoint',
'Remove-OCIResourcemanagerStack',
'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob',
'Update-OCIResourcemanagerConfigurationSourceProvider',
'Update-OCIResourcemanagerJob',
'Update-OCIResourcemanagerPrivateEndpoint',
'Update-OCIResourcemanagerStack',
'Update-OCIResourcemanagerTemplate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1780.ps1
|
1780.ps1
|
return
function RemoveTestGroups
{
param([string] $basename)
$results = Get-LocalGroup $basename*
foreach ($element in $results) {
Remove-LocalGroup -SID $element.SID
}
}
function VerifyFailingTest
{
param(
[scriptblock] $sb,
[string] $expectedFqeid
)
$backupEAP = $script:ErrorActionPreference
$script:ErrorActionPreference = "Stop"
try {
& $sb
throw "Expected FullyQualifiedErrorId: $expectedFqeid"
}
catch {
$_.FullyQualifiedErrorId | Should Be $expectedFqeid
}
finally {
$script:ErrorActionPreference = $backupEAP
}
}
try {
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
$IsNotSkipped = ($IsWindows -eq $true);
$PSDefaultParameterValues["it:skip"] = !$IsNotSkipped
Describe "Verify Expected LocalGroup Cmdlets are present" -Tags "CI" {
It "Test command presence" {
$result = Get-Command -Module Microsoft.PowerShell.LocalAccounts | ForEach-Object Name
$result -contains "New-LocalGroup" | Should Be $true
$result -contains "Set-LocalGroup" | Should Be $true
$result -contains "Get-LocalGroup" | Should Be $true
$result -contains "Rename-LocalGroup" | Should Be $true
$result -contains "Remove-LocalGroup" | Should Be $true
}
}
Describe "Validate simple New-LocalGroup" -Tags @('CI', 'RequireAdminOnWindows') {
AfterEach {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupAddRemove
}
}
It "Creates New-LocalGroup using only name" {
$result = New-LocalGroup -Name TestGroupAddRemove
$result.Name | Should BeExactly TestGroupAddRemove
$result.ObjectClass | Should Be Group
}
}
Describe "Validate New-LocalGroup cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') {
AfterEach {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupAddRemove
}
}
It "Creates New-LocalGroup with name and description" {
$result = New-LocalGroup -Name TestGroupAddRemove -Description "Test Group New 1 Description"
$result.Name | Should BeExactly TestGroupAddRemove
$result.Description | Should BeExactly "Test Group New 1 Description"
$result.SID | Should Not BeNullOrEmpty
$result.ObjectClass | Should Be Group
}
It "Errors on New-LocalGroup with name collision" {
$sb = {
New-LocalGroup TestGroupAddRemove
return New-LocalGroup TestGroupAddRemove
}
VerifyFailingTest $sb "GroupExists,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
It "Can use SID for group name" {
$sidName = "S-1-5-21-3949576937-491355012-4054854628-1053"
try {
$result = New-LocalGroup -Name $sidName
$result | Should Not BeNullOrEmpty
$result.Name | Should BeExactly $sidName
$result.SID | Should Not BeExactly $sidName
$result.ObjectClass | Should Be Group
}
finally {
RemoveTestGroups -basename $sidName
}
}
It "Errors on empty group name" {
$sb = { New-LocalGroup -Name "" }
VerifyFailingTest $sb "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
It "Creates New-LocalGroup with name(256) at max" {
$nameMax = "A"*256
$desc = "D"*48
try {
$result = New-LocalGroup -Name $nameMax -Description $desc
$result.Name | Should BeExactly $nameMax
$result.Description | Should BeExactly $desc
$result.SID | Should Not BeNullOrEmpty
$result.ObjectClass | Should Be Group
}
finally {
RemoveTestGroups -basename $nameMax
}
}
It "Errors on New-LocalGroup with name(256) over max" {
$name = "A"*257
$desc = "D"*129
try {
$shouldBeNull = New-LocalGroup -Name $name -Description $desc
throw "An error was expected"
}
catch {
$_.FullyQualifiedErrorId | Should Be "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
finally {
if ($shouldBeNull) { Remove-LocalGroup -Name $name }
}
}
It "Creates New-LocalGroup with Description > 48 characters" {
$descMax = "Test Group Add Description that is longer than 48 characters"
$result = New-LocalGroup -Name TestGroupAddRemove -Description $descMax
$result.Description | Should BeExactly $descMax
}
It "Errors on Invalid characters" {
$InvalidCharacters = @"
\/"[]:|<>+=;,?*
"@
$failedCharacters = @()
$InvalidCharacters = $InvalidCharacters[0..($InvalidCharacters.Length - 1)]
foreach ($character in $InvalidCharacters) {
try {
$invalidGroup = New-LocalGroup -Name ("InvalidBecauseOf" + $character) -ErrorAction Stop
}
catch {
}
finally {
if ($invalidGroup) {
Remove-LocalGroup -Name $invalidGroup
$failedCharacters += $character
}
}
}
if ($failedCharacters.Count -gt 0) { Write-Host "characters causing test fail: $failedCharacters" }
$failedCharacters.Count -eq 0 | Should Be true
}
It "Error on names containing only spaces" {
$sb = { New-LocalGroup -Name " " }
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
It "Error on names containing only periods" {
$sb = {
New-LocalGroup -Name "..."
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
It "Errors on names ending in a period" {
$sb = {
New-LocalGroup -Name "TestEndInPeriod."
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
$sb = {
New-LocalGroup -Name ".TestEndIn.Period.."
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
It "Errors on Name over 256 characters" {
$sb = { New-LocalGroup -Name ("A"*257) }
try {
VerifyFailingTest $sb "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.NewLocalGroupCommand"
}
finally {
RemoveTestGroups -basename ("A"*257)
}
}
}
Describe "Validate simple Get-LocalGroup" -Tags @('CI', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
New-LocalGroup -Name TestGroupGet1 -Description "Test Group Get 1 Description" | Out-Null
}
}
AfterAll {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupGet
}
}
It "Can Get-LocalGroup by specific group name" {
$result = Get-LocalGroup TestGroupGet1
$result.Name | Should Be "TestGroupGet1"
$result.Description | Should Be "Test Group Get 1 Description"
$result.ObjectClass | Should Be "Group"
}
}
Describe "Validate Get-LocalGroup cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
New-LocalGroup -Name TestGroupGet1 -Description "Test Group Get 1 Description" | Out-Null
New-LocalGroup -Name TestGroupGet2 -Description "Test Group Get 2 Description" | Out-Null
}
}
AfterAll {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupGet
}
}
It "Can Get-LocalGroup of all groups" {
$result = Get-LocalGroup
$result.Count -gt 2 | Should Be true
}
It "Can Get-LocalGroup of a specific group by SID" {
$result = Get-LocalGroup TestGroupGet1
$resultBySID = Get-LocalGroup -SID $result.SID
$resultBySID.SID | Should Not BeNullOrEmpty
$resultBySID.Name | Should Be TestGroupGet1
}
It "Can Get-LocalGroup of a well-known group by SID string" {
$sid = New-Object System.Security.Principal.SecurityIdentifier -ArgumentList BG
$guestGroup = Get-LocalGroup -SID BG
$guestGroup.SID | Should Be $sid.Value
}
It "Can Get-LocalGroup by wildcard" {
$result = Get-LocalGroup TestGroupGet*
$result.Count -eq 2 | Should Be true
$result.Name -contains "TestGroupGet1" | Should Be true
$result.Name -contains "TestGroupGet2" | Should Be true
}
It "Can Get-LocalGroup gets by array of names" {
$result = Get-LocalGroup @("TestGroupGet1", "TestGroupGet2")
$result.Count -eq 2 | Should Be true
$result.Name -contains "TestGroupGet1" | Should Be true
$result.Name -contains "TestGroupGet2" | Should Be true
}
It "Can Get-LocalGroups by array of SIDs" {
$sid1 = (Get-LocalGroup TestGroupGet1).SID
$sid2 = (Get-LocalGroup TestGroupGet2).SID
$result = Get-LocalGroup -SID @($sid1, $sid2)
$result.Count -eq 2 | Should Be true
$result.Name -contains "TestGroupGet1" | Should Be true
$result.Name -contains "TestGroupGet2" | Should Be true
}
It "Can Get-LocalGroups by pipe of an array of Group objects" {
$testGroups = Get-LocalGroup TestGroupGet*
$result = @($testGroups, $testGroups) | Get-LocalGroup
$result.Count -eq 4 | Should Be true
$result.Name -contains "TestGroupGet1" | Should Be true
$result.Name -contains "TestGroupGet2" | Should Be true
}
It "Can respond to -ErrorAction Stop" {
$result = $null
try {
Get-LocalGroup @("TestGroupGet1", "TestGroupGetNameThatDoesntExist1", "TestGroupGetNameThatDoesntExist2") -ErrorAction Stop -ErrorVariable outErr -OutVariable outOut | Out-Null
}
catch {
$result = @($outErr.Count, $outErr[0].ErrorRecord.CategoryInfo.Reason, $outOut.Name)
}
if ($null -eq $result)
{
$false | Should Be $true
}
else
{
$result[0] -eq 1 | Should Be true
$result[1] -match "GroupNotFound" | Should Be true
$result[2] -match "TestGroupGet1" | Should Be true
}
}
It "Errors on Get-LocalGroup by an invalid group name" {
$sb = {
Get-LocalGroup 'TestGroupGetNameThatDoesntExist'
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
}
It "Errors on Get-LocalGroup by an invalid group SID" {
$sb = {
$result = New-LocalGroup -Name TestGroupGet3 -Description "Test Group Get 3 Description"
Remove-LocalGroup TestGroupGet3
Get-LocalGroup -SID $result.SID
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
}
It "Can get no local groups if none match wildcard" {
$localGroupName = 'TestGroupGetNameThatDoesntExist'
$result = (Get-LocalGroup $localGroupName*).Count
$result -eq 0 | Should Be true
}
}
Describe "Validate simple Set-LocalGroup" -Tags @('CI', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
$group1SID = ""
}
}
BeforeEach {
if ($IsNotSkipped) {
$group1SID = (New-LocalGroup -Name TestGroupSet1).SID
}
}
AfterEach {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupSet
$group1SID = ""
}
}
It "Can Set-LocalGroup by name" {
Set-LocalGroup -Name TestGroupSet1 -Description "Test Group Set 1 new description"
$result = Get-LocalGroup -Name TestGroupSet1
$result.Description | Should BeExactly "Test Group Set 1 new description"
}
}
Describe "Validate Set-LocalGroup cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
$group1SID = ""
}
}
BeforeEach {
if ($IsNotSkipped) {
$group1SID = (New-LocalGroup -Name TestGroupSet1).SID
}
}
AfterEach {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupSet
$group1SID = ""
}
}
It "Can Set-LocalGroup by SID" {
Set-LocalGroup -SID $group1SID -Description "Test Group Set 1 newer description"
$result = Get-LocalGroup -Name TestGroupSet1
$result.Description | Should BeExactly "Test Group Set 1 newer description"
}
It "Can Set-LocalGroup using -InputObject" {
$group = Get-LocalGroup TestGroupSet1
Set-LocalGroup -InputObject $group -Description "Test Group Set 1 newer still description"
$result = Get-LocalGroup TestGroupSet1
$result.Description | Should BeExactly "Test Group Set 1 newer still description"
}
It "Can Set-LocalGroup using pipeline" {
Get-LocalGroup TestGroupSet1 | Set-LocalGroup -Description "Test Group Set 1 newer still description"
$result = Get-LocalGroup TestGroupSet1
$result.Description | Should BeExactly "Test Group Set 1 newer still description"
}
It "Errors on Set-LocalGroup without specifying a Group" {
$sb = {
Set-LocalGroup -Description "Test Group Set 1 newer still description"
}
VerifyFailingTest $sb "AmbiguousParameterSet,Microsoft.PowerShell.Commands.SetLocalGroupCommand"
}
It "Errors on Set-LocalGroup with an invalid Group name" {
$sb = {
Set-LocalGroup -Name "NonexistantGroupName" -Description "Test Group Set 1 newer still description"
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.SetLocalGroupCommand"
}
It "Errors on Set-LocalGroup with an invalid Group SID" {
$sb = {
Set-LocalGroup -SID "S-1-5-21-1220945662-555555555-555555555-5555" -Description "Test Group Set 1 newer still description"
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.SetLocalGroupCommand"
}
It "Can Set-LocalGroup with description over 48 characters" {
$desc = "A"*129
Set-LocalGroup -Name TestGroupSet1 -Description $desc
$result = Get-LocalGroup -Name TestGroupSet1
$result.Description | Should BeExactly $desc
}
}
Describe "Validate simple Rename-LocalGroup" -Tags @('CI', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
$group1SID = ""
$group2SID = (New-LocalGroup -Name TestGroupRename2 -Description "Test Group Rename 2 Description" ).SID
}
}
BeforeEach {
if ($IsNotSkipped) {
$group1SID = ( New-LocalGroup -Name TestGroupRename1 -Description "Test Group Rename 1 Description" ).SID
}
}
AfterEach {
if ($IsNotSkipped) {
Remove-LocalGroup -SID $group1SID
$group1SID = ""
}
}
AfterAll {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupRename
}
}
It "Can Rename-LocalGroup using a valid group name" {
$group1SID | Should Not BeNullOrEmpty
Rename-LocalGroup TestGroupRename1 TestGroupRename1x
$result = Get-LocalGroup -SID $group1SID
$result.Name | Should BeExactly TestGroupRename1x
}
}
Describe "Validate Rename-LocalGroup cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
$group1SID = ""
$group2SID = (New-LocalGroup -Name TestGroupRename2 -Description "Test Group Rename 2 Description" ).SID
}
}
BeforeEach {
if ($IsNotSkipped) {
$group1SID = (New-LocalGroup -Name TestGroupRename1 -Description "Test Group Rename 1 Description" ).SID
}
}
AfterEach {
if ($IsNotSkipped) {
Remove-LocalGroup -SID $group1SID
$group1SID = ""
}
}
AfterAll {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupRename
}
}
It "Can Rename-LocalGroup using a valid group SID" {
$group1SID | Should Not BeNullOrEmpty
Rename-LocalGroup -SID $group1SID TestGroupRename1x
$result = Get-LocalGroup -SID $group1SID
$result.Name | Should BeExactly TestGroupRename1x
}
It "Can Rename-LocalGroup using a valid group -InputObject" {
$group1SID | Should Not BeNullOrEmpty
$group = Get-LocalGroup TestGroupRename1
Rename-LocalGroup -InputObject $group -NewName TestGroupRename1x
$result = Get-LocalGroup -SID $group1SID
$result.Name | Should BeExactly TestGroupRename1x
}
It "Can Rename-LocalGroup using a valid group sent using pipeline" {
$group1SID | Should Not BeNullOrEmpty
Get-LocalGroup TestGroupRename1 | Rename-LocalGroup -NewName TestGroupRename1x
$result = Get-LocalGroup -SID $group1SID
$result.Name | Should BeExactly TestGroupRename1x
}
It "Errors on Rename-LocalGroup without specifying a Group" {
$sb = {
Rename-LocalGroup
}
VerifyFailingTest $sb "AmbiguousParameterSet,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Errors onRename-LocalGroup nonexistant group name" {
$sb = {
Rename-LocalGroup nonexistantGroupName -NewName DummyNewName
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Errors onRename-LocalGroup nonexistant group SID" {
$nonexistantSid =
$sb = {
Rename-LocalGroup -SID "S-1-5-21-1220945662-555555555-555555555-5555" -NewName DummyNewName
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Errors on Rename-LocalGroup Renames a valid group to already existing name" {
$newName = "TestGroupRename2"
$sb = {
Rename-LocalGroup TestGroupRename1 $newName
}
VerifyFailingTest $sb "NameInUse,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
$group1Name = (Get-LocalGroup -SID $group1SID).Name
$group2Name = (Get-LocalGroup -SID $group2SID).Name
$group1Name | Should BeExactly TestGroupRename1
$group2Name | Should BeExactly $newName
}
It "Errors on Invalid characters" {
$InvalidCharacters = @"
\/"[]:|<>+=;,?*
"@
$InvalidCharacters = $InvalidCharacters[0..($InvalidCharacters.Length - 1)]
$failedCharacters = @()
foreach ($character in $InvalidCharacters) {
try {
Rename-LocalGroup -Name TestGroupRename1 -NewName ("InvalidBecauseOf" + $character) -ErrorAction Stop
$invalidGroup = (Get-LocalGroup ("InvalidBecauseOf" + $character))
}
catch {
}
finally {
if ($invalidGroup) {
Rename-LocalGroup -Name ("InvalidBecauseOf" + $character) -NewName TestGroupRename1
$failedCharacters += $character
}
}
}
if ($failedCharacters.Count -gt 0) { Write-Host "characters causing test fail: $failedCharacters" }
$failedCharacters.Count -eq 0 | Should Be true
}
It "Error on names containing only spaces" {
$sb = {
Rename-LocalGroup -Name TestGroupRename1 -NewName " "
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Error on names containing only periods" {
$sb = {
Rename-LocalGroup -Name TestGroupRename1 -NewName "..."
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Errors on names ending in a period" {
$sb = {
Rename-LocalGroup -Name TestGroupRename1 -NewName "TestEndInPeriod."
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
$sb = {
Rename-LocalGroup -Name TestGroupRename1 -NewName ".TestEndIn.Period.."
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Errors on Rename-LocalGroup using a valid group but invalid -NewName" {
$sb = {
Rename-LocalGroup -Name TestGroupRename1 -NewName "TestGroupRename<>1x"
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
}
It "Can Rename-LocalGroup using a valid group name at max length 256" {
$newName = "A"*256
Rename-LocalGroup TestGroupRename1 $newName
$result = Get-LocalGroup -SID $group1SID
$result.Name | Should BeExactly $newName
}
It "Errors on Rename-LocalGroup using a valid group name over max length 256" {
$newName = "A"*257
$sb = {
Rename-LocalGroup TestGroupRename1 $newName
}
VerifyFailingTest $sb "InvalidName,Microsoft.PowerShell.Commands.RenameLocalGroupCommand"
(Get-LocalGroup -SID $group1SID).Name | Should BeExactly TestGroupRename1
}
}
Describe "Validate simple Remove-LocalGroup" -Tags @('CI', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
$group1SID = ""
}
}
BeforeEach {
if ($IsNotSkipped) {
$group1SID = (New-LocalGroup -Name TestGroupRemove1 -Description "Test Group Remove 1 Description" ).SID
}
}
AfterEach {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupRemove
$group1SID = ""
}
}
It "Can Remove-LocalGroup by name" {
$initialCount = (Get-LocalGroup).Count
$initialCount -gt 1 | Should Be true
$removeResult = Remove-LocalGroup TestGroupRemove1 2>&1
$removeResult | Should BeNullOrEmpty
$sb = {
Get-LocalGroup -SID $group1SID
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
$finalCount = (Get-LocalGroup).Count
$initialCount -eq $finalCount + 1 | Should Be true
}
}
Describe "Validate Remove-LocalGroup cmdlet" -Tags @('Feature', 'RequireAdminOnWindows') {
BeforeAll {
if ($IsNotSkipped) {
$group1SID = ""
$group2SID = ""
function VerifyBasicRemoval {
param (
[scriptblock]$removalAction
)
$initialCount = (Get-LocalGroup).Count
$initialCount -gt 1 | Should Be true
& $removalAction
$sb = {
Get-LocalGroup -SID $group1SID
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
$finalCount = (Get-LocalGroup).Count
$initialCount -eq $finalCount + 1 | Should Be true
}
function VerifyArrayRemoval {
param (
[scriptblock]$removalAction
)
$initialCount = (Get-LocalGroup).Count
$initialCount -gt 1 | Should Be $true
& $removalAction
$sb = {
Get-LocalGroup -SID $group1SID
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
$sb = {
Get-LocalGroup -SID $group2SID
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
$finalCount = (Get-LocalGroup).Count
$initialCount -eq $finalCount + 2 | Should Be $true
}
}
}
BeforeEach {
if ($IsNotSkipped) {
$group1SID = [String](New-LocalGroup -Name TestGroupRemove1 -Description "Test Group Remove 1 Description" 2>&1).SID
$group2SID = [String](New-LocalGroup -Name TestGroupRemove2 -Description "Test Group Remove 2 Description" 2>&1).SID
}
}
AfterEach {
if ($IsNotSkipped) {
RemoveTestGroups -basename TestGroupRemove
$group1SID = ""
$group2SID = ""
}
}
It "Can Remove-LocalGroup by SID" {
$sb = {
$removeResult = Remove-LocalGroup -SID $group1SID 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyBasicRemoval $sb
}
It "Can Remove-LocalGroup using -InputObject" {
$sb = {
$group = Get-LocalGroup TestGroupRemove1
$removeResult = Remove-LocalGroup -InputObject $group 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyBasicRemoval $sb
}
It "Can Remove-LocalGroup using pipeline" {
$sb = {
$removeResult = Get-LocalGroup TestGroupRemove1 | Remove-LocalGroup 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyBasicRemoval $sb
}
It "Can Remove-LocalGroup by array of names" {
$sb = {
$removeResult = Remove-LocalGroup @("TestGroupRemove1","TestGroupRemove2") 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyArrayRemoval $sb
}
It "Can Remove-LocalGroup by array of SIDs" {
$sb = {
$removeResult = Remove-LocalGroup -SID @($group1SID, $group2SID) 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyArrayRemoval $sb
}
It "Can Remove-LocalGroup by array using -InputObject" {
$sb = {
$groups = Get-LocalGroup -Name @("TestGroupRemove1","TestGroupRemove2")
$removeResult = Remove-LocalGroup -InputObject $groups 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyArrayRemoval $sb
}
It "Can Remove-LocalGroup by array using pipeline" {
$sb = {
$removeResult = Get-LocalGroup -Name @("TestGroupRemove1","TestGroupRemove2") | Remove-LocalGroup 2>&1
$removeResult | Should BeNullOrEmpty
}
VerifyArrayRemoval $sb
}
It "Errors on Remove-LocalGroup without specifying a Name or SID" {
$sb = { Remove-LocalGroup }
VerifyFailingTest $sb "AmbiguousParameterSet,Microsoft.PowerShell.Commands.RemoveLocalGroupCommand"
}
It "Can Remove-LocalGroup with members" {
New-LocalUser TestUserRemove1 -NoPassword | Out-Null
Add-LocalGroupMember TestGroupRemove1 -Member TestUserRemove1 | Out-Null
$initialCount = (Get-LocalGroup).Count
$initialCount -gt 1 | Should Be true
$removeResult = Remove-LocalGroup TestGroupRemove1 2>&1
$removeResult | Should BeNullOrEmpty
Remove-LocalUser TestUserRemove1 | Out-Null
$sb = {
Get-LocalGroup TestGroupRemove1
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
$finalCount = (Get-LocalGroup).Count
$initialCount -eq $finalCount + 1 | Should Be true
}
It "Errors on Remove-LocalGroup by invalid name" {
$initialCount = (Get-LocalGroup).Count
$initialCount -gt 1 | Should Be true
$sb = {
Remove-LocalGroup TestGroupRemove1NameThatDoesntExist
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupCommand"
$finalCount = (Get-LocalGroup).Count
$initialCount -eq $finalCount | Should Be true
}
It "Errors on Remove-LocalGroup by invalid SID" {
$initialCount = (Get-LocalGroup).Count
$initialCount -gt 1 | Should Be true
$sb = {
Remove-LocalGroup -SID $group1SID
Remove-LocalGroup -SID $group1SID
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupCommand"
$finalCount = (Get-LocalGroup).Count
$initialCount -eq $finalCount + 1 | Should Be $true
}
It "Can respond to -ErrorAction Stop" {
$errCount = 0
$fqeid = ""
try {
Remove-LocalGroup @("TestGroupRemove1", "TestGroupRemoveNameThatDoesntExist1", "TestGroupRemoveNameThatDoesntExist2") -ErrorAction Stop -ErrorVariable outError
}
catch {
$errCount = $outError.Count
$fqeid = $_.FullyQualifiedErrorId
}
$errCount | Should Be 2
$fqeid | Should Be "GroupNotFound,Microsoft.PowerShell.Commands.RemoveLocalGroupCommand"
$sb = {
Get-LocalGroup "TestGroupRemove1"
}
VerifyFailingTest $sb "GroupNotFound,Microsoft.PowerShell.Commands.GetLocalGroupCommand"
}
}
}
finally {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
|
combined_dataset/train/non-malicious/sample_6_33.ps1
|
sample_6_33.ps1
|
#************************************************
# DC_KBInstallLogs.ps1
# Version 1.0.1
# Date: 8-29-2012
# Author: Kate Wang (v-kaw)
# Description: This script would collect %windir%\kb*.log when running on a Windows Server 2003 and XP to a compressed file named $ComputerName_KBInstallLogs.zip
#************************************************
Param([string]$MachineName,[string]$Path)
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_KBInstallLogsActivity -Status $ScriptStrings.ID_KBInstallLogsStatus -ErrorAction SilentlyContinue
if($Path -ne [string]::Empty)
{
$CheckOSVersion = $false #If $Path argument is present, then skip the OS check
}
else
{
$CheckOSVersion = $true
$Path = $Env:windir #If $Path argument is not present, then use $env:windir
}
if($MachineName -ne [string]::Empty)
{
$OutputFileName = $MachineName + "_KBInstallLogs.zip" #If $ComputerName is present,the zip file will use the argument.
}
else
{
$OutputFileName = $Env:COMPUTERNAME + "_KBInstallLogs.zip"
}
if($CheckOSVersion -eq $false)
{
$CollectFiles = $true
}
else
{
if($OSVersion.Major -eq 5) #windows 03\xp
{
$CollectFiles = $true
}
else
{
$CollectFiles = $false
}
}
if($CollectFiles -eq $true)
{
if(Test-Path -Path $Path)
{
[Array] $FilesToBeCollected = Join-Path -Path $Path -ChildPath "kb*.log"
CompressCollectFiles -filesToCollect $FilesToBeCollected -DestinationFileName $OutputFileName -fileDescription "KB Installation Logs" -sectionDescription "Windows hotfix installation logs"
}
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAQgLFa1TZWQnm+
# dX8mIJ8813Rw1tKaw16RMRWmX3JzZ6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP8C
# pawbFY5skmluSdGi2dPnws+mhqJ6vhwMXnGorDWkMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAMu7TBQuXeYOCD6YMme2S7OmbY2+3if3MgBA7
# X4eKjD2leX5kNtkDdhcBli3NOxPvGIfhKC13uNAlAEe/Lgt4F39yI291fuK37KtZ
# ofcfEnHqwsLX3OLM33/i+aD2qZbmrDkK6Qca6EZlLYtUs85Eh5xWiiNdm6jgW36D
# pPe8LSvB5G6LYquJIAgLnCitInfFpcQ3zOLOyagv06p+GkZjLfu6NT7k0Jw0tNSw
# o3l3XlfhXglL+VKjvjo0ojNLrbTIPBKxART5xqCCEAf0WWwiLqOv1MNKKqbB7J6Z
# YWObs3gfB2wA6ViqyxThmp0FV4lOw/IhxqN6ffzuz0bjxLAHpqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBmlrNNLrdVkMWaq7p/t8k1KIilSZVwcpUO
# yKaPaVNQ4AIGZutTTeQ1GBMyMDI0MTAyODExNDA0NC4zNDRaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7
# RNN3M8bTAAEAAAH6MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQzMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yhZVBM3PZcBfEpAf7fIIhygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpG
# yDGX+EbCbHhS5Td4J0Ylc83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJd
# enpQ6UciM4nMYZvdQjybA4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ4
# 5oQIp7Sx57RPQ/0O6qayJ2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVK
# rRV5YelRvWNTg1pH4EC2KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah
# 14t7Yk+xl5P4Tw3xfAGgHsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1
# NroJKwBCW11Pwi0z/ki90ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7L
# k0Z/pATRwAINqwdvzpdtX2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8p
# SwGewrffwgAbNKm82ZDFvqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbN
# h5tDv3GeJ3EKvC4vNSAxtGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG
# 3zcsYHaa4+w+YmMrhTEzD4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRjjHKbL5WV6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAuFbCorFrvodG+ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xW
# dL1kygaW5BOZ3xBlPY7Vpuf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJf
# UQRThDL4zxI2pYc1wnPp7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yat
# cm4kBqIH6db1+weM4q46NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJS
# KcJ3nMVyfNlnv6yvttYzLK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0V
# CM11rHM11ZmN0euJbbBCVfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6
# CqLKjtHSoeoAGPeeX24f5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRs
# tZajbYEeX/N7RvSbkn0djD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M
# 0TKOduihhKxAt/6Yyk17Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe
# 5N0e4HWFf8WW2ZL0+c83Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87Z
# ymXG3MO2wUjhL9HvSQzjoquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKw
# BvII6sg0Ny7aPDaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0
# MTAyOTEwMTQwMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEA
# AgIa4zAHAgEAAgITSTAKAgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBDp2k9IO7lePSuN2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypO
# a+QZHboICRCPw0/gWqlrvDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNL
# Ml1wOoWE3WfiBV23XWqiqgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKL
# Qri7U/CWGo0EhKQQh5XEqgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj
# 7KSuuVKsMWeLMNH4sRgs1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBc
# udKw24qBm3gFHJ2uSv/oCRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgKKqMe164+COhiWjD5EUgxOsV36j2IJ3ve5JhNBZJ/fQwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYoc
# bkOeVjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# +vs7RNN3M8bTAAEAAAH6MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hW
# GYq3MA0GCSqGSIb3DQEBCwUABIICAKRMe28j5Y+zp7Pkv7abbIrHnQ0yY9l1gXR7
# HK9Y4Guf0GdC3h2MCkgBR4l/FUswSyuvQBZ+j0ye13imQASvBj4nwwm7ErgZJACH
# PxY0ycmHGOOfYlAStbXRxqgrkTH9VgdhRcMXU57l8vVL8l9+d1fSGQko4C/EpNlz
# bniD2FzQyz3HHICha7d4XsNgf1FawuvDUMcsZs5NWSDkjwSomuCNpjQYG1kkr37e
# fswsV0yL6u1dHRp3Q37F/3lIfc2mvHFo4cD577liGoZ2CJuD4EIzJo0IYs97NFpk
# samKPT5xJzRgXi9rPFDsP2vYbYVh931wvSVCwSPTNqIoFXAxnZzlmKy/f4hbffFx
# 8GzeWL6/izT+yti4fpGIv82OU+udJTFRBdM5l31udxPpb0QdIKamjTYON2FsdwQQ
# F6l/mfK3wnM+30jybqHIP2vzygn2fyGI7ZfeM6rK1wfr2AtPuLoDVhLgaHoaMvCv
# ZsyH4s37uD/PkFw1OPJ1qSXC/wnU3aUmMAXq1+KAzkMiqWQf5H+Jxn44OHw6wF5H
# dax3H2tVmqjiA+wzjq8Ehyp9h07hGTEHWBn7TcuTAqGPwfMW04+z5F3HJo5NLOOR
# RxoIoYsboRDSUlUHaemFMcJqO9OsqC3/z9t07v6CdW6Cdg9VUDcE0aDUdjltrvCS
# 1c+bx0XQ
# SIG # End signature block
|
combined_dataset/train/non-malicious/chkhash_13.ps1
|
chkhash_13.ps1
|
# calculate SHA512 of file.
function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]'))
{
$stream = $null;
$cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider];
$hashAlgorithm = new-object $cryptoServiceProvider
$stream = $file.OpenRead();
$hashByteArray = $hashAlgorithm.ComputeHash($stream);
$stream.Close();
## We have to be sure that we close the file stream if any exceptions are thrown.
trap
{
if ($stream -ne $null)
{
$stream.Close();
}
break;
}
foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }}
return [string]$result;
}
function noequal ( $first, $second)
{
if (!($second) -or $second -eq "") {return $true}
$first+="\\"
foreach($s in $second)
{
if ($first.tolower().startswith($s.tolower())) {return $false}
}
return $true
}
# chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]]
# -u updates the XML file database and exits
# otherwise, all files are checked against the XML file database.
# -h specifies location of xml hash database
$hashespath=".\\hashes.xml"
del variable:\\args3 -ea 0
del variable:\\args2 -ea 0
del variable:\\xfiles -ea 0
del variable:\\files -ea 0
del variable:\\exclude -ea 0
$args3=@()
$args2=@($args)
$nu = 0
$errs = 0
$fc = 0
$fm = 0
$upd = $false
$create = $false
for($i=0;$i -lt $args2.count; $i++)
{
if ($args2[$i] -like "-h*") # -help specified?
{
"Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]"
"Options: -h - Help display."
" -c - Create hash database. If .xml hash database does not exist, -c will be assumed."
" -u - Update changed files and add new files to existing database."
" -x - specifies .xml database file path to use. Default is .\\hashes.xml"
" -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)."
""
"Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml"
" PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -u -x c:\\users\\alice\\hashes\\pictureshashes.xml"
" PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml"
" PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes"
""
"Note: files in subdirectories of any specified directory are automatically processed."
" if you specify only an -x option, or no option and .\\hash.xml exists, only files in the database will be checked."
exit
}
if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database?
if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified?
if ($args2[$i] -like "-x*")
{
$i++ # Get hashes xml database path
if ($i -ge $args2.count)
{
write-host "-X specified but no file path of .xml database specified. Exiting."
exit
}
$hashespath=$args2[$i]
continue
}
if ($args2[$i] -like "-e*") # Exclude files, dirs
{
do {
$i++
if ($i -ge $args2.count) {break}
$e=$args2[$i]
if (!($e.endswith("\\"))) {$e+="\\"} # add "\\" to end if not present
$exclude+=@($e) # collect array of excluded directories.
if (($i+1) -ge $args2.count) {break}
} while ($args2[$i+1] -notlike "-*")
continue
}
$args3+=@($args2[$i]) # Add files/dirs
}
"ChkHash.ps1 - .\\chkhash.ps1 -h for usage."
""
if ($args3.count -ne 0)
{
# Get list of files and SHA512 hash them.
"Enumerating files from specified locations..."
$files=@(dir $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files
if ($files.count -eq 0) {"No files found. Exiting."; exit}
if ($create -eq $true -or !(test-path $hashespath)) # Create database?
{
# Create SHA512 hashes of files and write to new database
$files = $files | %{write-host "Hashing `"$($_.fullname)`" ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru}
$files |export-clixml $hashespath
"Created $hashespath"
"$($files.count) file hash(es) saved. Exiting."
exit
}
$xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database
}
else
{
if (!(test-path $hashespath)) {"No database found or specified, exiting."; exit}
$xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database and check it
if ($xfiles.count -eq 0) {"No files specified and no files in Database. Exiting.";Exit}
$files=$xfiles
}
"Loaded $($xfiles.count) file hash(es) from $hashespath"
$hash=@{}
for($x=0;$x -lt $xfiles.count; $x++) # Build dictionary (hash) of filenames and indexes into file array
{
if ($hash.contains($xfiles[$x].fullname)) {continue}
$hash.Add($xfiles[$x].fullname,$x)
}
foreach($f in $files)
{
if ((get-item -ea 0 $f.fullname) -eq $null) {continue} # skip if file no longer exists.
$n=($hash.($f.fullname))
if ($n -eq $null)
{
$nu++ # increment needs/needed updating count
if ($upd -eq $false) {"Needs to be added: `"$($f.fullname)`"";continue} # if not updating, then continue
"Hashing `"$($f.fullname)`" ..."
# Create SHA512 hash of file
$f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force}
$xfiles+=@($f) # then add file + hash to list
continue
}
$f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force}
# Update and continue is specified.
$fc++ # File checked increment.
if ($xfiles[$n].SHA512 -eq $f.SHA512) # Check SHA512 for mixmatch.
{$fm++;continue} # if matched, increment file matches and continue loop
$errs++ # increment mixmatches
if ($upd -eq $true) { $xfiles[$n]=$f; "Updated `"$($f.fullname)`"";continue}
"Bad SHA-512 found: `"$($f.fullname)`""
}
if ($upd -eq $true) # if database updated
{
$xfiles|export-clixml $hashespath # write xml database
"Updated $hashespath"
"$nu file hash(es) added to database."
"$errs file hash(es) updated in database."
exit
}
"$errs SHA-512 mixmatch(es) found."
"$fm file(s) SHA512 matched."
"$fc file(s) checked total."
if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
|
combined_dataset/train/non-malicious/2090.ps1
|
2090.ps1
|
Describe "Cmdlet declaration statement" -Tags "CI" {
$testData = @(
@{ Name = 'Verify non-cmdlet formatted names are allowed';
Script = '
function foo
{
[CmdletBinding()]
param()
$a
}' },
@{ Name = 'Valid cmdlet names case 1';
Script = '
function foo
{
[CmdletBinding()]
param()
$a
}' },
@{ Name = 'Valid cmdlet names case 2';
Script = '
function get-foo
{
[CmdletBinding()]
param()
$a
}' },
@{ Name = 'Valid cmdlet names case 3';
Script = '
{
[CmdletBinding()]
param()
$a
}' },
@{
Name ='Using parameter annotation in script cmdlets';
Script = '
function get-foo
{
param([Parameter(mandatory=$true)]$a)
$a
}'},
@{
Name = 'Cmdlet declaration parameter: should process';
Script = '
function get-foo
{
[CmdletBinding(SupportsShouldProcess=$true)]
param([Parameter(mandatory=$true)]$a)
$a
}' },
@{
Name = 'Cmdlet declaration parameter: confirm impact';
Script = '
function get-foo
{
[CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="low")]
param([Parameter(mandatory=$true)]$a)
$a
}'},
@{
Name = 'Cmdlet declaration parameter: defaultparametersetname';
Script = '
function get-foo
{
[CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="low", defaultparametersetname="set1")]
param([Parameter(mandatory=$true)]$a)
$a
}'},
@{
Name = 'cmdlet declaration within as cmdlet';
Script = '
function get-foo {
[CmdletBinding()]
param()
function get-bar
{
param([Parameter(mandatory=$true)]$a)
$a
}
}'}
@{
Name = 'cmdlet declaration within scriptblock';
Script = '
{
param([Parameter(mandatory=$true)]$a)
$a
}'},
@{
Name = 'cmdlet declaration within scriptblock 2';
Script = '
{
param([Parameter(mandatory=$true)]$a)
$a
}'},
@{
Name = 'cmdlet declaration within scriptblock 3';
Script = '
{
[CmdletBinding(SupportsShouldProcess=$true)]
param([Parameter(mandatory=$true)]$a)
$a
}'})
It '<Name>' -TestCases $testData {
param($Name, $script)
$syntaxerrors = $null
$null = [system.management.automation.psparser]::tokenize($script, [ref] $syntaxerrors)
$syntaxerrors.Count | Should -Be 0
}
}
|
combined_dataset/train/non-malicious/2657.ps1
|
2657.ps1
|
[CmdletBinding()]
Param
(
[switch]$ShowInstallationPrompt = $false,
[switch]$ShowInstallationRestartPrompt = $false,
[switch]$CleanupBlockedApps = $false,
[switch]$ShowBlockedAppDialog = $false,
[switch]$DisableLogging = $false,
[string]$ReferringApplication = '',
[string]$Message = '',
[string]$MessageAlignment = '',
[string]$ButtonRightText = '',
[string]$ButtonLeftText = '',
[string]$ButtonMiddleText = '',
[string]$Icon = '',
[string]$Timeout = '',
[switch]$ExitOnTimeout = $false,
[boolean]$MinimizeWindows = $false,
[switch]$PersistPrompt = $false,
[int32]$CountdownSeconds,
[int32]$CountdownNoHideSeconds,
[switch]$NoCountdown = $false,
[switch]$RelaunchToolkitAsUser = $false
)
[string]$appDeployToolkitName = 'PSAppDeployToolkit'
[string]$appDeployMainScriptFriendlyName = 'App Deploy Toolkit Main'
[version]$appDeployMainScriptVersion = [version]'3.6.0'
[version]$appDeployMainScriptMinimumConfigVersion = [version]'3.6.0'
[string]$appDeployMainScriptDate = '12/18/2014'
[hashtable]$appDeployMainScriptParameters = $PSBoundParameters
[string]$currentTime = (Get-Date -UFormat '%T').ToString()
[string]$currentDate = (Get-Date -UFormat '%d-%m-%Y').ToString()
[timespan]$currentTimeZoneBias = [System.TimeZone]::CurrentTimeZone.GetUtcOffset([datetime]::Now)
[Globalization.CultureInfo]$culture = Get-Culture
[string]$currentLanguage = $culture.TwoLetterISOLanguageName.ToUpper()
[psobject]$envHost = $Host
[string]$envAllUsersProfile = $env:ALLUSERSPROFILE
[string]$envAppData = $env:APPDATA
[string]$envArchitecture = $env:PROCESSOR_ARCHITECTURE
[string]$envCommonProgramFiles = $env:CommonProgramFiles
[string]$envCommonProgramFilesX86 = ${env:CommonProgramFiles(x86)}
[string]$envComputerName = $env:COMPUTERNAME | Where-Object { $_ } | ForEach-Object { $_.ToUpper() }
[string]$envComputerNameFQDN = ([System.Net.Dns]::GetHostEntry('')).HostName
[string]$envHomeDrive = $env:HOMEDRIVE
[string]$envHomePath = $env:HOMEPATH
[string]$envHomeShare = $env:HOMESHARE
[string]$envLocalAppData = $env:LOCALAPPDATA
[string]$envProgramFiles = $env:PROGRAMFILES
[string]$envProgramFilesX86 = ${env:ProgramFiles(x86)}
[string]$envProgramData = $env:PROGRAMDATA
[string]$envPublic = $env:PUBLIC
[string]$envSystemDrive = $env:SYSTEMDRIVE
[string]$envSystemRoot = $env:SYSTEMROOT
[string]$envTemp = $env:TEMP
[string]$envUserName = $env:USERNAME
[string]$envUserProfile = $env:USERPROFILE
[string]$envWinDir = $env:WINDIR
If (-not $envCommonProgramFilesX86) { [string]$envCommonProgramFilesX86 = $env:CommonProgramFiles }
If (-not $envProgramFilesX86) { [string]$envProgramFilesX86 = $env:PROGRAMFILES }
[boolean]$IsMachinePartOfDomain = (Get-WmiObject Win32_ComputerSystem -ErrorAction 'SilentlyContinue').PartOfDomain
[string]$envMachineWorkgroup = ''
[string]$envMachineADDomain = ''
[string]$envLogonServer = ''
[string]$MachineDomainController = ''
If ($IsMachinePartOfDomain) {
[string]$envMachineADDomain = (Get-WmiObject -Class Win32_ComputerSystem -ErrorAction 'SilentlyContinue').Domain | Where-Object { $_ } | ForEach-Object { $_.ToLower() }
Try {
[string]$envLogonServer = $env:LOGONSERVER | Where-Object { (($_) -and (-not $_.Contains('\\MicrosoftAccount'))) } | ForEach-Object { $_.TrimStart('\') } | ForEach-Object { ([System.Net.Dns]::GetHostEntry($_)).HostName }
[string]$MachineDomainController = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().FindDomainController().Name
}
Catch { }
}
Else {
[string]$envMachineWorkgroup = (Get-WmiObject -Class Win32_ComputerSystem -ErrorAction 'SilentlyContinue').Domain | Where-Object { $_ } | ForEach-Object { $_.ToUpper() }
}
[string]$envMachineDNSDomain = [System.Net.NetworkInformation.IPGlobalProperties]::GetIPGlobalProperties().DomainName | Where-Object { $_ } | ForEach-Object { $_.ToLower() }
[string]$envUserDNSDomain = $env:USERDNSDOMAIN | Where-Object { $_ } | ForEach-Object { $_.ToLower() }
[string]$envUserDomain = $env:USERDOMAIN | Where-Object { $_ } | ForEach-Object { $_.ToUpper() }
[psobject]$envOS = Get-WmiObject -Class Win32_OperatingSystem -ErrorAction 'SilentlyContinue'
[string]$envOSName = $envOS.Caption.Trim()
[string]$envOSServicePack = $envOS.CSDVersion
[version]$envOSVersion = [System.Environment]::OSVersion.Version
[string]$envOSVersionMajor = $envOSVersion.Major
[string]$envOSVersionMinor = $envOSVersion.Minor
[string]$envOSVersionBuild = $envOSVersion.Build
[string]$envOSVersionRevision = $envOSVersion.Revision
[string]$envOSVersion = $envOSVersion.ToString()
[int32]$envOSProductType = $envOS.ProductType
[boolean]$IsServerOS = [boolean]($envOSProductType -eq 3)
[boolean]$IsDomainControllerOS = [boolean]($envOSProductType -eq 2)
[boolean]$IsWorkStationOS = [boolean]($envOSProductType -eq 1)
Switch ($envOSProductType) {
3 { [string]$envOSProductTypeName = 'Server' }
2 { [string]$envOSProductTypeName = 'Domain Controller' }
1 { [string]$envOSProductTypeName = 'Workstation' }
Default { [string]$envOSProductTypeName = 'Unknown' }
}
[boolean]$Is64Bit = [boolean]((Get-WmiObject -Class Win32_Processor | Where-Object { $_.DeviceID -eq 'CPU0' } | Select-Object -ExpandProperty AddressWidth) -eq '64')
If ($Is64Bit) { [string]$envOSArchitecture = '64-bit' } Else { [string]$envOSArchitecture = '32-bit' }
[boolean]$Is64BitProcess = [boolean]([System.IntPtr]::Size -eq 8)
If ($Is64BitProcess) { [string]$psArchitecture = 'x64' } Else { [string]$psArchitecture = 'x86' }
[hashtable]$envPSVersionTable = $PSVersionTable
[version]$envPSVersion = $envPSVersionTable.PSVersion
[string]$envPSVersionMajor = $envPSVersion.Major
[string]$envPSVersionMinor = $envPSVersion.Minor
[string]$envPSVersionBuild = $envPSVersion.Build
[string]$envPSVersionRevision = $envPSVersion.Revision
[string]$envPSVersion = $envPSVersion.ToString()
[version]$envCLRVersion = $envPSVersionTable.CLRVersion
[string]$envCLRVersionMajor = $envCLRVersion.Major
[string]$envCLRVersionMinor = $envCLRVersion.Minor
[string]$envCLRVersionBuild = $envCLRVersion.Build
[string]$envCLRVersionRevision = $envCLRVersion.Revision
[string]$envCLRVersion = $envCLRVersion.ToString()
[System.Security.Principal.WindowsIdentity]$CurrentProcessToken = [System.Security.Principal.WindowsIdentity]::GetCurrent()
[System.Security.Principal.SecurityIdentifier]$CurrentProcessSID = $CurrentProcessToken.User
[string]$ProcessNTAccount = $CurrentProcessToken.Name
[string]$ProcessNTAccountSID = $CurrentProcessSID.Value
[boolean]$IsAdmin = [boolean]($CurrentProcessToken.Groups -contains [System.Security.Principal.SecurityIdentifier]'S-1-5-32-544')
[boolean]$IsLocalSystemAccount = $CurrentProcessSID.IsWellKnown([System.Security.Principal.WellKnownSidType]'LocalSystemSid')
[boolean]$IsLocalServiceAccount = $CurrentProcessSID.IsWellKnown([System.Security.Principal.WellKnownSidType]'LocalServiceSid')
[boolean]$IsNetworkServiceAccount = $CurrentProcessSID.IsWellKnown([System.Security.Principal.WellKnownSidType]'NetworkServiceSid')
[boolean]$IsServiceAccount = [boolean]($CurrentProcessToken.Groups -contains [System.Security.Principal.SecurityIdentifier]'S-1-5-6')
[boolean]$IsProcessUserInteractive = [System.Environment]::UserInteractive
[string]$LocalSystemNTAccount = (New-Object -TypeName System.Security.Principal.SecurityIdentifier -ArgumentList ([Security.Principal.WellKnownSidType]::'LocalSystemSid', $null)).Translate([System.Security.Principal.NTAccount]).Value
If ($IsLocalSystemAccount -or $IsLocalServiceAccount -or $IsNetworkServiceAccount -or $IsServiceAccount) { $SessionZero = $true } Else { $SessionZero = $false }
[int32]$dpiPixels = Get-ItemProperty -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontDPI' -ErrorAction 'SilentlyContinue' | Select-Object -ExpandProperty LogPixels -ErrorAction 'SilentlyContinue'
Switch ($dpiPixels) {
96 { [int32]$dpiScale = 100 }
120 { [int32]$dpiScale = 125 }
144 { [int32]$dpiScale = 150 }
192 { [int32]$dpiScale = 200 }
Default { [int32]$dpiScale = 100 }
}
[string]$scriptPath = $MyInvocation.MyCommand.Definition
[string]$scriptName = [System.IO.Path]::GetFileNameWithoutExtension($scriptPath)
[string]$scriptFileName = Split-Path -Path $scriptPath -Leaf
[string]$scriptRoot = Split-Path -Path $scriptPath -Parent
[string]$invokingScript = (Get-Variable -Name MyInvocation).Value.ScriptName
If ($invokingScript) {
[string]$scriptParentPath = Split-Path -Path $invokingScript -Parent
}
Else {
[string]$scriptParentPath = (Get-Item -Path $scriptRoot).Parent.FullName
}
[string]$appDeployLogoIcon = Join-Path -Path $scriptRoot -ChildPath 'AppDeployToolkitLogo.ico'
[string]$appDeployLogoBanner = Join-Path -Path $scriptRoot -ChildPath 'AppDeployToolkitBanner.png'
[string]$appDeployConfigFile = Join-Path -Path $scriptRoot -ChildPath 'AppDeployToolkitConfig.xml'
[string]$appDeployToolkitDotSourceExtensions = 'AppDeployToolkitExtensions.ps1'
If (-not (Test-Path -Path $AppDeployLogoIcon -PathType Leaf)) { Throw 'App Deploy logo icon file not found.' }
If (-not (Test-Path -Path $AppDeployLogoBanner -PathType Leaf)) { Throw 'App Deploy logo banner file not found.' }
If (-not (Test-Path -Path $AppDeployConfigFile -PathType Leaf)) { Throw 'App Deploy XML configuration file not found.' }
[xml]$xmlConfigFile = Get-Content -Path $AppDeployConfigFile
$xmlConfig = $xmlConfigFile.AppDeployToolkit_Config
$configConfigDetails = $xmlConfig.Config_File
[string]$configConfigVersion = [version]$configConfigDetails.Config_Version
[string]$configConfigDate = $configConfigDetails.Config_Date
$xmlToolkitOptions = $xmlConfig.Toolkit_Options
[boolean]$configToolkitRequireAdmin = [boolean]::Parse($xmlToolkitOptions.Toolkit_RequireAdmin)
[boolean]$configToolkitAllowSystemInteraction = [boolean]::Parse($xmlToolkitOptions.Toolkit_AllowSystemInteraction)
[boolean]$configToolkitAllowSystemInteractionFallback = [boolean]::Parse($xmlToolkitOptions.Toolkit_AllowSystemInteractionFallback)
[boolean]$configToolkitAllowSystemInteractionForNonConsoleUser = [boolean]::Parse($xmlToolkitOptions.Toolkit_AllowSystemInteractionForNonConsoleUser)
[string]$configToolkitTempPath = $ExecutionContext.InvokeCommand.ExpandString($xmlToolkitOptions.Toolkit_TempPath)
[string]$configToolkitRegPath = $xmlToolkitOptions.Toolkit_RegPath
[string]$configToolkitLogDir = $ExecutionContext.InvokeCommand.ExpandString($xmlToolkitOptions.Toolkit_LogPath)
[boolean]$configToolkitCompressLogs = [boolean]::Parse($xmlToolkitOptions.Toolkit_CompressLogs)
[string]$configToolkitLogStyle = $xmlToolkitOptions.Toolkit_LogStyle
[double]$configToolkitLogMaxSize = $xmlToolkitOptions.Toolkit_LogMaxSize
[boolean]$configToolkitLogWriteToHost = [boolean]::Parse($xmlToolkitOptions.Toolkit_LogWriteToHost)
[boolean]$configToolkitLogDebugMessage = [boolean]::Parse($xmlToolkitOptions.Toolkit_LogDebugMessage)
$xmlConfigMSIOptions = $xmlConfig.MSI_Options
[string]$configMSILoggingOptions = $xmlConfigMSIOptions.MSI_LoggingOptions
[string]$configMSIInstallParams = $xmlConfigMSIOptions.MSI_InstallParams
[string]$configMSISilentParams = $xmlConfigMSIOptions.MSI_SilentParams
[string]$configMSIUninstallParams = $xmlConfigMSIOptions.MSI_UninstallParams
[string]$configMSILogDir = $ExecutionContext.InvokeCommand.ExpandString($xmlConfigMSIOptions.MSI_LogPath)
[int32]$configMSIMutexWaitTime = $xmlConfigMSIOptions.MSI_MutexWaitTime
$xmlConfigUIOptions = $xmlConfig.UI_Options
[boolean]$configShowBalloonNotifications = [boolean]::Parse($xmlConfigUIOptions.ShowBalloonNotifications)
[int32]$configInstallationUITimeout = $xmlConfigUIOptions.InstallationUI_Timeout
[int32]$configInstallationUIExitCode = $xmlConfigUIOptions.InstallationUI_ExitCode
[int32]$configInstallationDeferExitCode = $xmlConfigUIOptions.InstallationDefer_ExitCode
[int32]$configInstallationPersistInterval = $xmlConfigUIOptions.InstallationPrompt_PersistInterval
[int32]$configInstallationRestartPersistInterval = $xmlConfigUIOptions.InstallationRestartPrompt_PersistInterval
[string]$xmlUIMessageLanguage = "UI_Messages_$currentLanguage"
If (-not ($xmlConfig.$xmlUIMessageLanguage)) { [string]$xmlUIMessageLanguage = 'UI_Messages_EN' }
$xmlUIMessages = $xmlConfig.$xmlUIMessageLanguage
[string]$configDiskSpaceMessage = $xmlUIMessages.DiskSpace_Message
[string]$configBalloonTextStart = $xmlUIMessages.BalloonText_Start
[string]$configBalloonTextComplete = $xmlUIMessages.BalloonText_Complete
[string]$configBalloonTextRestartRequired = $xmlUIMessages.BalloonText_RestartRequired
[string]$configBalloonTextFastRetry = $xmlUIMessages.BalloonText_FastRetry
[string]$configBalloonTextError = $xmlUIMessages.BalloonText_Error
[string]$configProgressMessageInstall = $xmlUIMessages.Progress_MessageInstall
[string]$configProgressMessageUninstall = $xmlUIMessages.Progress_MessageUninstall
[string]$configClosePromptMessage = $xmlUIMessages.ClosePrompt_Message
[string]$configClosePromptButtonClose = $xmlUIMessages.ClosePrompt_ButtonClose
[string]$configClosePromptButtonDefer = $xmlUIMessages.ClosePrompt_ButtonDefer
[string]$configClosePromptButtonContinue = $xmlUIMessages.ClosePrompt_ButtonContinue
[string]$configClosePromptCountdownMessage = $xmlUIMessages.ClosePrompt_CountdownMessage
[string]$configDeferPromptWelcomeMessage = $xmlUIMessages.DeferPrompt_WelcomeMessage
[string]$configDeferPromptExpiryMessage = $xmlUIMessages.DeferPrompt_ExpiryMessage
[string]$configDeferPromptWarningMessage = $xmlUIMessages.DeferPrompt_WarningMessage
[string]$configDeferPromptRemainingDeferrals = $xmlUIMessages.DeferPrompt_RemainingDeferrals
[string]$configDeferPromptDeadline = $xmlUIMessages.DeferPrompt_Deadline
[string]$configBlockExecutionMessage = $xmlUIMessages.BlockExecution_Message
[string]$configDeploymentTypeInstall = $xmlUIMessages.DeploymentType_Install
[string]$configDeploymentTypeUnInstall = $xmlUIMessages.DeploymentType_UnInstall
[string]$configRestartPromptTitle = $xmlUIMessages.RestartPrompt_Title
[string]$configRestartPromptMessage = $xmlUIMessages.RestartPrompt_Message
[string]$configRestartPromptMessageTime = $xmlUIMessages.RestartPrompt_MessageTime
[string]$configRestartPromptMessageRestart = $xmlUIMessages.RestartPrompt_MessageRestart
[string]$configRestartPromptTimeRemaining = $xmlUIMessages.RestartPrompt_TimeRemaining
[string]$configRestartPromptButtonRestartLater = $xmlUIMessages.RestartPrompt_ButtonRestartLater
[string]$configRestartPromptButtonRestartNow = $xmlUIMessages.RestartPrompt_ButtonRestartNow
[string]$dirFiles = Join-Path -Path $scriptParentPath -ChildPath 'Files'
[string]$dirSupportFiles = Join-Path -Path $scriptParentPath -ChildPath 'SupportFiles'
[string]$dirAppDeployTemp = Join-Path -Path $configToolkitTempPath -ChildPath $appDeployToolkitName
If (-not $appVendor) { [string]$appVendor = 'PS' }
If (-not $appName) { [string]$appName = $appDeployMainScriptFriendlyName }
If (-not $appVersion) { [string]$appVersion = $appDeployMainScriptVersion }
If (-not $appLang) { [string]$appLang = $currentLanguage }
If (-not $appRevision) { [string]$appRevision = '01' }
If (-not $appArch) { [string]$appArch = '' }
[string]$installTitle = "$appVendor $appName $appVersion"
[char[]]$invalidFileNameChars = [System.IO.Path]::GetInvalidFileNamechars()
[string]$appVendor = $appVendor -replace "[$invalidFileNameChars]",'' -replace ' ',''
[string]$appName = $appName -replace "[$invalidFileNameChars]",'' -replace ' ',''
[string]$appVersion = $appVersion -replace "[$invalidFileNameChars]",'' -replace ' ',''
[string]$appArch = $appArch -replace "[$invalidFileNameChars]",'' -replace ' ',''
[string]$appLang = $appLang -replace "[$invalidFileNameChars]",'' -replace ' ',''
[string]$appRevision = $appRevision -replace "[$invalidFileNameChars]",'' -replace ' ',''
If ($appArch) {
[string]$installName = $appVendor + '_' + $appName + '_' + $appVersion + '_' + $appArch + '_' + $appLang + '_' + $appRevision
}
Else {
[string]$installName = $appVendor + '_' + $appName + '_' + $appVersion + '_' + $appLang + '_' + $appRevision
}
[string]$installName = $installName.Trim('_') -replace '[_]+','_'
If (-not $deploymentType) { [string]$deploymentType = 'Install' }
[string]$exeWusa = 'wusa.exe'
[string]$exeMsiexec = 'msiexec.exe'
[string]$exeSchTasks = "$envWinDir\System32\schtasks.exe"
[string]$MSIProductCodeRegExPattern = '^(\{{0,1}([0-9a-fA-F]){8}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){4}-([0-9a-fA-F]){12}\}{0,1})$'
[string[]]$regKeyApplications = 'HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall','HKLM:SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall'
If ($is64Bit) {
[string]$regKeyLotusNotes = 'HKLM:SOFTWARE\Wow6432Node\Lotus\Notes'
}
Else {
[string]$regKeyLotusNotes = 'HKLM:SOFTWARE\Lotus\Notes'
}
[string]$regKeyAppExecution = 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options'
[string]$regKeyDeferHistory = "$configToolkitRegPath\$appDeployToolkitName\DeferHistory\$installName"
[__comobject]$Shell = New-Object -ComObject WScript.Shell -ErrorAction 'SilentlyContinue'
[__comobject]$ShellApp = New-Object -ComObject Shell.Application -ErrorAction 'SilentlyContinue'
[boolean]$msiRebootDetected = $false
[boolean]$BlockExecution = $false
[boolean]$installationStarted = $false
[boolean]$runningTaskSequence = $false
If (Test-Path -Path 'variable:welcomeTimer') { Remove-Variable -Name welcomeTimer -Scope Script}
If (Test-Path -Path 'variable:deferHistory') { Remove-Variable -Name deferHistory }
If (Test-Path -Path 'variable:deferTimes') { Remove-Variable -Name deferTimes }
If (Test-Path -Path 'variable:deferDays') { Remove-Variable -Name deferDays }
[string]$logName = $installName + '_' + $appDeployToolkitName + '_' + $deploymentType + '.log'
[string]$logTempFolder = Join-Path -Path $envTemp -ChildPath $installName
If ($configToolkitCompressLogs) {
[string]$logDirectory = $logTempFolder
[string]$zipFileDate = (Get-Date -Format 'yyyy-MM-dd-hh-mm-ss').ToString()
[string]$zipFileName = Join-Path -Path $configToolkitLogDir -ChildPath ($installName + '_' + $deploymentType + '_' + $zipFileDate + '.zip')
If (Test-Path -Path $logTempFolder -PathType Container -ErrorAction 'SilentlyContinue') {
Remove-Item -Path $logTempFolder -Recurse -Force -ErrorAction 'SilentlyContinue' | Out-Null
}
}
Else {
[string]$logDirectory = $configToolkitLogDir
}
Function Write-FunctionHeaderOrFooter {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$CmdletName,
[Parameter(Mandatory=$true,ParameterSetName='Header')]
[AllowEmptyCollection()]
[hashtable]$CmdletBoundParameters,
[Parameter(Mandatory=$true,ParameterSetName='Header')]
[switch]$Header,
[Parameter(Mandatory=$true,ParameterSetName='Footer')]
[switch]$Footer
)
If ($Header) {
Write-Log -Message 'Function Start' -Source ${CmdletName} -DebugMessage
[string]$CmdletBoundParameters = $CmdletBoundParameters | Format-Table -Property @{ Label = 'Parameter'; Expression = { "[-$($_.Key)]" } }, @{ Label = 'Value'; Expression = { $_.Value }; Alignment = 'Left' } -AutoSize -Wrap | Out-String
If ($CmdletBoundParameters) {
Write-Log -Message "Function invoked with bound parameter(s): `n$CmdletBoundParameters" -Source ${CmdletName} -DebugMessage
}
Else {
Write-Log -Message 'Function invoked without any bound parameters' -Source ${CmdletName} -DebugMessage
}
}
ElseIf ($Footer) {
Write-Log -Message 'Function End' -Source ${CmdletName} -DebugMessage
}
}
Function Write-Log {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,Position=0,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[AllowEmptyCollection()]
[string[]]$Message,
[Parameter(Mandatory=$false,Position=1)]
[ValidateRange(1,3)]
[int16]$Severity = 1,
[Parameter(Mandatory=$false,Position=2)]
[ValidateNotNull()]
[string]$Source = '',
[Parameter(Mandatory=$false,Position=3)]
[ValidateNotNullorEmpty()]
[string]$ScriptSection = $script:installPhase,
[Parameter(Mandatory=$false,Position=4)]
[ValidateSet('CMTrace','Legacy')]
[string]$LogType = $configToolkitLogStyle,
[Parameter(Mandatory=$false,Position=5)]
[ValidateNotNullorEmpty()]
[string]$LogFileDirectory = $logDirectory,
[Parameter(Mandatory=$false,Position=6)]
[ValidateNotNullorEmpty()]
[string]$LogFileName = $logName,
[Parameter(Mandatory=$false,Position=7)]
[ValidateNotNullorEmpty()]
[decimal]$MaxLogFileSizeMB = $configToolkitLogMaxSize,
[Parameter(Mandatory=$false,Position=8)]
[ValidateNotNullorEmpty()]
[boolean]$WriteHost = $configToolkitLogWriteToHost,
[Parameter(Mandatory=$false,Position=9)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true,
[Parameter(Mandatory=$false,Position=10)]
[switch]$PassThru = $false,
[Parameter(Mandatory=$false,Position=11)]
[switch]$DebugMessage = $false,
[Parameter(Mandatory=$false,Position=12)]
[boolean]$LogDebugMessage = $configToolkitLogDebugMessage,
[Parameter(Mandatory=$false,Position=13)]
[switch]$DisableOnRelaunchToolkitAsUser = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
[string]$LogTime = (Get-Date -Format HH:mm:ss.fff).ToString()
[string]$LogDate = (Get-Date -Format MM-dd-yyyy).ToString()
If (-not (Test-Path -Path 'variable:LogTimeZoneBias')) { [int32]$script:LogTimeZoneBias = [System.TimeZone]::CurrentTimeZone.GetUtcOffset([datetime]::Now).TotalMinutes }
[string]$LogTimePlusBias = $LogTime + $script:LogTimeZoneBias
[boolean]$ExitLoggingFunction = $false
If ($DisableOnRelaunchToolkitAsUser -and $RelaunchToolkitAsUser) { [boolean]$ExitLoggingFunction = $true; Return }
If (($DebugMessage) -and (-not $LogDebugMessage)) { [boolean]$ExitLoggingFunction = $true; Return }
If (-not (Test-Path -Path $LogFileDirectory -PathType Container)) {
Try {
New-Item -Path $LogFileDirectory -Type 'Directory' -Force -ErrorAction 'Stop' | Out-Null
}
Catch {
[boolean]$ExitLoggingFunction = $true
If (-not $ContinueOnError) {
Write-Host "[$LogDate $LogTime] [${CmdletName}] $ScriptSection :: Failed to create the log directory [$LogFileDirectory]. `n$(Resolve-Error)" -ForegroundColor 'Red'
}
Return
}
}
If ($script:MyInvocation.Value.ScriptName) { [string]$ScriptSource = Split-Path -Path $script:MyInvocation.Value.ScriptName -Leaf } Else { [string]$ScriptSource = Split-Path -Path $script:MyInvocation.MyCommand.Definition -Leaf }
[boolean]$ScriptSectionDefined = [boolean](-not [string]::IsNullOrEmpty($ScriptSection))
If (-not (Test-Path -Path 'variable:DisableLogging')) { $DisableLogging = $false }
[scriptblock]$CMTraceLogString = {
Param (
[string]$lMessage,
[string]$lSource,
[int16]$lSeverity
)
"<![LOG[$lMessage]LOG]!>" + "<time=`"$LogTimePlusBias`" " + "date=`"$LogDate`" " + "component=`"$lSource`" " + "context=`"$([System.Security.Principal.WindowsIdentity]::GetCurrent().Name)`" " + "type=`"$lSeverity`" " + "thread=`"$PID`" " + "file=`"$ScriptSource`">"
}
[scriptblock]$WriteLogLineToHost = {
Param (
[string]$lTextLogLine,
[int16]$lSeverity
)
If ($WriteHost) {
If ($Host.UI.RawUI.ForegroundColor) {
Switch ($lSeverity) {
3 { Write-Host $lTextLogLine -ForegroundColor 'Red' -BackgroundColor 'Black' }
2 { Write-Host $lTextLogLine -ForegroundColor 'Yellow' -BackgroundColor 'Black' }
1 { Write-Host $lTextLogLine }
}
}
Else {
Write-Output $lTextLogLine
}
}
}
[string]$LogFilePath = Join-Path -Path $LogFileDirectory -ChildPath $LogFileName
}
Process {
If ($ExitLoggingFunction) { Return }
ForEach ($Msg in $Message) {
[string]$CMTraceMsg = ''
[string]$ConsoleLogLine = ''
[string]$LegacyTextLogLine = ''
If ($Msg) {
If ($ScriptSectionDefined) { [string]$CMTraceMsg = "[$ScriptSection] :: $Msg" }
[string]$LegacyMsg = "[$LogDate $LogTime]"
If ($ScriptSectionDefined) { [string]$LegacyMsg += " [$ScriptSection]" }
If ($Source) {
[string]$ConsoleLogLine = "$LegacyMsg [$Source] :: $Msg"
Switch ($Severity) {
3 { [string]$LegacyTextLogLine = "$LegacyMsg [$Source] [Error] :: $Msg" }
2 { [string]$LegacyTextLogLine = "$LegacyMsg [$Source] [Warning] :: $Msg" }
1 { [string]$LegacyTextLogLine = "$LegacyMsg [$Source] [Info] :: $Msg" }
}
}
Else {
[string]$ConsoleLogLine = "$LegacyMsg :: $Msg"
Switch ($Severity) {
3 { [string]$LegacyTextLogLine = "$LegacyMsg [Error] :: $Msg" }
2 { [string]$LegacyTextLogLine = "$LegacyMsg [Warning] :: $Msg" }
1 { [string]$LegacyTextLogLine = "$LegacyMsg [Info] :: $Msg" }
}
}
}
[string]$CMTraceLogLine = & $CMTraceLogString -lMessage $CMTraceMsg -lSource $Source -lSeverity $Severity
If ($LogType -ieq 'CMTrace') {
[string]$LogLine = $CMTraceLogLine
}
Else {
[string]$LogLine = $LegacyTextLogLine
}
If (-not $DisableLogging) {
Try {
$LogLine | Out-File -FilePath $LogFilePath -Append -NoClobber -Force -Encoding 'UTF8' -ErrorAction 'Stop'
}
Catch {
If (-not $ContinueOnError) {
Write-Host "[$LogDate $LogTime] [$ScriptSection] [${CmdletName}] :: Failed to write message [$Msg] to the log file [$LogFilePath]. `n$(Resolve-Error)" -ForegroundColor 'Red'
}
}
}
& $WriteLogLineToHost -lTextLogLine $ConsoleLogLine -lSeverity $Severity
}
}
End {
Try {
If (-not $ExitLoggingFunction) {
[System.IO.FileInfo]$LogFile = Get-ChildItem -Path $LogFilePath -ErrorAction 'Stop'
[decimal]$LogFileSizeMB = $LogFile.Length/1MB
If (($LogFileSizeMB -gt $MaxLogFileSizeMB) -and ($MaxLogFileSizeMB -gt 0)) {
[string]$ArchivedOutLogFile = [System.IO.Path]::ChangeExtension($LogFilePath, 'lo_')
[hashtable]$ArchiveLogParams = @{ ScriptSection = $ScriptSection; Source = ${CmdletName}; Severity = 2; LogFileDirectory = $LogFileDirectory; LogFileName = $LogFilePath; LogType = $LogType; MaxLogFileSizeMB = 0; WriteHost = $WriteHost; ContinueOnError = $ContinueOnError; PassThru = $false }
$ArchiveLogMessage = "Maximum log file size [$MaxLogFileSizeMB MB] reached. Rename log file to [$ArchivedOutLogFile]."
Write-Log -Message $ArchiveLogMessage @ArchiveLogParams
Move-Item -Path $LogFilePath -Destination $ArchivedOutLogFile -Force -ErrorAction 'Stop'
$NewLogMessage = "Previous log file was renamed to [$ArchivedOutLogFile] because maximum log file size of [$MaxLogFileSizeMB MB] was reached."
Write-Log -Message $NewLogMessage @ArchiveLogParams
}
}
}
Catch {
}
Finally {
If ($PassThru) { Write-Output $Message }
}
}
}
Function Exit-Script {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$ExitCode = 0
)
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
If ($formCloseApps) { $formCloseApps.Close }
If (Test-Path -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -PathType 'Leaf') {
[string]$StatusMessage = '_CloseRunspace'
$StatusMessage | Export-Clixml -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -Force
}
Start-Sleep -Seconds 5
Close-InstallationProgress
If (($BlockExecution) -and (-not $RelaunchToolkitAsUser)) { Unblock-AppExecution }
If (($terminalServerMode) -and (-not $RelaunchToolkitAsUser)) { Disable-TerminalServerInstallMode }
Switch ($exitCode) {
$configInstallationUIExitCode { $installSuccess = $false }
$configInstallationDeferExitCode { $installSuccess = $false }
3010 { $installSuccess = $true }
1641 { $installSuccess = $true }
0 { $installSuccess = $true }
Default { $installSuccess = $false }
}
If ($deployModeSilent) { [boolean]$configShowBalloonNotifications = $false }
If ($installSuccess) {
If (Test-Path -Path $regKeyDeferHistory -ErrorAction 'SilentlyContinue') {
Write-Log -Message 'Remove deferral history...' -Source ${CmdletName}
Remove-RegistryKey -Key $regKeyDeferHistory
}
[string]$balloonText = "$deploymentTypeName $configBalloonTextComplete"
If (($msiRebootDetected) -and ($AllowRebootPassThru)) {
Write-Log -Message 'A restart has been flagged as required.' -Source ${CmdletName}
[string]$balloonText = "$deploymentTypeName $configBalloonTextRestartRequired"
[int32]$exitCode = 3010
}
Else {
[int32]$exitCode = 0
}
Write-Log -Message "$installName $deploymentTypeName completed with exit code [$exitcode]." -Source ${CmdletName}
If ($configShowBalloonNotifications) { Show-BalloonTip -BalloonTipIcon 'Info' -BalloonTipText $balloonText }
}
ElseIf (-not $installSuccess) {
Write-Log -Message "$installName $deploymentTypeName completed with exit code [$exitcode]." -Source ${CmdletName}
If (($exitCode -eq $configInstallationUIExitCode) -or ($exitCode -eq $configInstallationDeferExitCode)) {
[string]$balloonText = "$deploymentTypeName $configBalloonTextFastRetry"
If ($configShowBalloonNotifications) { Show-BalloonTip -BalloonTipIcon 'Warning' -BalloonTipText $balloonText }
}
Else {
[string]$balloonText = "$deploymentTypeName $configBalloonTextError"
If ($configShowBalloonNotifications) { Show-BalloonTip -BalloonTipIcon 'Error' -BalloonTipText $balloonText }
}
}
[string]$LogDash = '-' * 79
Write-Log -Message $LogDash -Source ${CmdletName}
If (($configToolkitCompressLogs) -and (-not $RelaunchToolkitAsUser)) {
Try {
Set-Content -Path $zipFileName -Value ('PK' + [char]5 + [char]6 + ("$([char]0)" * 18)) -ErrorAction 'Stop'
$zipFile = $shellApp.NameSpace($zipFileName)
ForEach ($file in (Get-ChildItem -Path $logTempFolder -ErrorAction 'Stop')) {
Write-Log -Message "Compress log file [$($file.Name)] to [$zipFileName]..." -Source ${CmdletName}
$zipFile.CopyHere($file.FullName)
Start-Sleep -Milliseconds 500
}
If (Test-Path -Path $logTempFolder -PathType Container -ErrorAction 'Stop') {
Remove-Item -Path $logTempFolder -Recurse -Force -ErrorAction 'Stop' | Out-Null
}
}
Catch {
Write-Log -Message "Failed to compress the log file(s). `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
Exit $exitCode
}
Function Resolve-Error {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[AllowEmptyCollection()]
[array]$ErrorRecord,
[Parameter(Mandatory=$false,Position=1)]
[ValidateNotNullorEmpty()]
[string[]]$Property = ('Message','InnerException','FullyQualifiedErrorId','ScriptStackTrace','PositionMessage'),
[Parameter(Mandatory=$false,Position=2)]
[switch]$GetErrorRecord = $true,
[Parameter(Mandatory=$false,Position=3)]
[switch]$GetErrorInvocation = $true,
[Parameter(Mandatory=$false,Position=4)]
[switch]$GetErrorException = $true,
[Parameter(Mandatory=$false,Position=5)]
[switch]$GetErrorInnerException = $true
)
Begin {
If (-not $ErrorRecord) {
If ($global:Error.Count -eq 0) {
Return
}
Else {
[array]$ErrorRecord = $global:Error[0]
}
}
[scriptblock]$SelectProperty = {
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
$InputObject,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string[]]$Property
)
[string[]]$ObjectProperty = $InputObject | Get-Member -MemberType *Property | Select-Object -ExpandProperty Name
ForEach ($Prop in $Property) {
If ($Prop -eq '*') {
[string[]]$PropertySelection = $ObjectProperty
Break
}
ElseIf ($ObjectProperty -contains $Prop) {
[string[]]$PropertySelection += $Prop
}
}
Write-Output $PropertySelection
}
$LogErrorRecordMsg = $null
$LogErrorInvocationMsg = $null
$LogErrorExceptionMsg = $null
$LogErrorMessageTmp = $null
$LogInnerMessage = $null
}
Process {
If (-not $ErrorRecord) { Return }
ForEach ($ErrRecord in $ErrorRecord) {
If ($GetErrorRecord) {
[string[]]$SelectedProperties = & $SelectProperty -InputObject $ErrRecord -Property $Property
$LogErrorRecordMsg = $ErrRecord | Select-Object -Property $SelectedProperties
}
If ($GetErrorInvocation) {
If ($ErrRecord.InvocationInfo) {
[string[]]$SelectedProperties = & $SelectProperty -InputObject $ErrRecord.InvocationInfo -Property $Property
$LogErrorInvocationMsg = $ErrRecord.InvocationInfo | Select-Object -Property $SelectedProperties
}
}
If ($GetErrorException) {
If ($ErrRecord.Exception) {
[string[]]$SelectedProperties = & $SelectProperty -InputObject $ErrRecord.Exception -Property $Property
$LogErrorExceptionMsg = $ErrRecord.Exception | Select-Object -Property $SelectedProperties
}
}
If ($Property -eq '*') {
If ($LogErrorRecordMsg) { [array]$LogErrorMessageTmp += $LogErrorRecordMsg }
If ($LogErrorInvocationMsg) { [array]$LogErrorMessageTmp += $LogErrorInvocationMsg }
If ($LogErrorExceptionMsg) { [array]$LogErrorMessageTmp += $LogErrorExceptionMsg }
}
Else {
If ($LogErrorExceptionMsg) { [array]$LogErrorMessageTmp += $LogErrorExceptionMsg }
If ($LogErrorRecordMsg) { [array]$LogErrorMessageTmp += $LogErrorRecordMsg }
If ($LogErrorInvocationMsg) { [array]$LogErrorMessageTmp += $LogErrorInvocationMsg }
}
If ($LogErrorMessageTmp) {
$LogErrorMessage = 'Error Record:'
$LogErrorMessage += "`n-------------"
$LogErrorMsg = $LogErrorMessageTmp | Format-List | Out-String
$LogErrorMessage += $LogErrorMsg
}
If ($GetErrorInnerException) {
If ($ErrRecord.Exception -and $ErrRecord.Exception.InnerException) {
$LogInnerMessage = 'Error Inner Exception(s):'
$LogInnerMessage += "`n-------------------------"
$ErrorInnerException = $ErrRecord.Exception.InnerException
$Count = 0
While ($ErrorInnerException) {
[string]$InnerExceptionSeperator = '~' * 40
[string[]]$SelectedProperties = & $SelectProperty -InputObject $ErrorInnerException -Property $Property
$LogErrorInnerExceptionMsg = $ErrorInnerException | Select-Object -Property $SelectedProperties | Format-List | Out-String
If ($Count -gt 0) { $LogInnerMessage += $InnerExceptionSeperator }
$LogInnerMessage += $LogErrorInnerExceptionMsg
$Count++
$ErrorInnerException = $ErrorInnerException.InnerException
}
}
}
If ($LogErrorMessage) { $Output = $LogErrorMessage }
If ($LogInnerMessage) { $Output += $LogInnerMessage }
Write-Output $Output
If (Test-Path -Path 'variable:Output') { Clear-Variable -Name Output }
If (Test-Path -Path 'variable:LogErrorMessage') { Clear-Variable -Name LogErrorMessage }
If (Test-Path -Path 'variable:LogInnerMessage') { Clear-Variable -Name LogInnerMessage }
If (Test-Path -Path 'variable:LogErrorMessageTmp') { Clear-Variable -Name LogErrorMessageTmp }
}
}
End {
}
}
Function Show-InstallationPrompt {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Title = $installTitle,
[Parameter(Mandatory=$false)]
[string]$Message = '',
[Parameter(Mandatory=$false)]
[ValidateSet('Left','Center','Right')]
[string]$MessageAlignment = 'Center',
[Parameter(Mandatory=$false)]
[string]$ButtonRightText = '',
[Parameter(Mandatory=$false)]
[string]$ButtonLeftText = '',
[Parameter(Mandatory=$false)]
[string]$ButtonMiddleText = '',
[Parameter(Mandatory=$false)]
[ValidateSet('Application','Asterisk','Error','Exclamation','Hand','Information','None','Question','Shield','Warning','WinLogo')]
[string]$Icon = 'None',
[Parameter(Mandatory=$false)]
[switch]$NoWait = $false,
[Parameter(Mandatory=$false)]
[switch]$PersistPrompt = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$MinimizeWindows = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$Timeout = $configInstallationUITimeout,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ExitOnTimeout = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeNonInteractive) {
Write-Log -Message "Bypassing Installation Prompt [Mode: $deployMode]... $Message" -Source ${CmdletName}
Return
}
If (-not $IsProcessUserInteractive) {
$ShowInstallPromptResult = Invoke-PSCommandAsUser -PassThru -Command ([scriptblock]::Create("Show-InstallationPrompt -Title '$Title' -Message '$Message' -MessageAlignment '$MessageAlignment' -ButtonRightText '$ButtonRightText' -ButtonLeftText '$ButtonLeftText' -ButtonMiddleText '$ButtonMiddleText' -Icon '$Icon' -NoWait:`$$NoWait -PersistPrompt:`$$PersistPrompt -MinimizeWindows `$$MinimizeWindows -Timeout $Timeout -ExitOnTimeout `$$ExitOnTimeout"))
If ($ShowInstallPromptResult) {
Return $ShowInstallPromptResult
}
Else {
Return
}
}
[hashtable]$installPromptParameters = $psBoundParameters
If ($timeout -gt $configInstallationUITimeout) {
[string]$CountdownTimeoutErr = "The installation UI dialog timeout cannot be longer than the timeout specified in the XML configuration file."
Write-Log -Message $CountdownTimeoutErr -Severity 3 -Source ${CmdletName}
Throw $CountdownTimeoutErr
}
[System.Windows.Forms.Application]::EnableVisualStyles()
$formInstallationPrompt = New-Object -TypeName System.Windows.Forms.Form
$pictureBanner = New-Object -TypeName System.Windows.Forms.PictureBox
$pictureIcon = New-Object -TypeName System.Windows.Forms.PictureBox
$labelText = New-Object -TypeName System.Windows.Forms.Label
$buttonRight = New-Object -TypeName System.Windows.Forms.Button
$buttonMiddle = New-Object -TypeName System.Windows.Forms.Button
$buttonLeft = New-Object -TypeName System.Windows.Forms.Button
$buttonAbort = New-Object -TypeName System.Windows.Forms.Button
$InitialFormInstallationPromptWindowState = New-Object -TypeName System.Windows.Forms.FormWindowState
[scriptblock]$Form_Cleanup_FormClosed = {
Try {
$labelText.remove_Click($handler_labelText_Click)
$buttonLeft.remove_Click($buttonLeft_OnClick)
$buttonRight.remove_Click($buttonRight_OnClick)
$buttonMiddle.remove_Click($buttonMiddle_OnClick)
$buttonAbort.remove_Click($buttonAbort_OnClick)
$timer.remove_Tick($timer_Tick)
$timer.dispose()
$timer = $null
$timerPersist.remove_Tick($timerPersist_Tick)
$timerPersist.dispose()
$timerPersist = $null
$formInstallationPrompt.remove_Load($Form_StateCorrection_Load)
$formInstallationPrompt.remove_FormClosed($Form_Cleanup_FormClosed)
}
Catch { }
}
[scriptblock]$Form_StateCorrection_Load = {
$formInstallationPrompt.WindowState = 'Normal'
$formInstallationPrompt.AutoSize = $true
$formInstallationPrompt.TopMost = $true
$formInstallationPrompt.BringToFront()
Set-Variable -Name formInstallationPromptStartPosition -Value $formInstallationPrompt.Location -Scope Script
}
$formInstallationPrompt.Controls.Add($pictureBanner)
$paddingNone = New-Object -TypeName System.Windows.Forms.Padding
$paddingNone.Top = 0
$paddingNone.Bottom = 0
$paddingNone.Left = 0
$paddingNone.Right = 0
$labelPadding = '20,0,20,0'
$buttonWidth = 110
$buttonHeight = 23
$buttonPadding = 50
$buttonSize = New-Object -TypeName System.Drawing.Size
$buttonSize.Width = $buttonWidth
$buttonSize.Height = $buttonHeight
$buttonPadding = New-Object -TypeName System.Windows.Forms.Padding
$buttonPadding.Top = 0
$buttonPadding.Bottom = 5
$buttonPadding.Left = 50
$buttonPadding.Right = 0
$pictureBanner.DataBindings.DefaultDataSourceUpdateMode = 0
$pictureBanner.ImageLocation = $appDeployLogoBanner
$System_Drawing_Point = New-Object -TypeName System.Drawing.Point
$System_Drawing_Point.X = 0
$System_Drawing_Point.Y = 0
$pictureBanner.Location = $System_Drawing_Point
$pictureBanner.Name = 'pictureBanner'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 50
$System_Drawing_Size.Width = 450
$pictureBanner.Size = $System_Drawing_Size
$pictureBanner.SizeMode = 'CenterImage'
$pictureBanner.Margin = $paddingNone
$pictureBanner.TabIndex = 0
$pictureBanner.TabStop = $false
$pictureIcon.DataBindings.DefaultDataSourceUpdateMode = 0
If ($icon -ne 'None') { $pictureIcon.Image = ([System.Drawing.SystemIcons]::$Icon).ToBitmap() }
$System_Drawing_Point = New-Object -TypeName System.Drawing.Point
$System_Drawing_Point.X = 15
$System_Drawing_Point.Y = 105
$pictureIcon.Location = $System_Drawing_Point
$pictureIcon.Name = 'pictureIcon'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 32
$System_Drawing_Size.Width = 32
$pictureIcon.Size = $System_Drawing_Size
$pictureIcon.AutoSize = $true
$pictureIcon.Margin = $paddingNone
$pictureIcon.TabIndex = 0
$pictureIcon.TabStop = $false
$labelText.DataBindings.DefaultDataSourceUpdateMode = 0
$labelText.Name = 'labelText'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 148
$System_Drawing_Size.Width = 385
$labelText.Size = $System_Drawing_Size
$System_Drawing_Point = New-Object -TypeName System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 50
$labelText.Location = $System_Drawing_Point
$labelText.Margin = '0,0,0,0'
$labelText.Padding = $labelPadding
$labelText.TabIndex = 1
$labelText.Text = $message
$labelText.TextAlign = "Middle$($MessageAlignment)"
$labelText.Anchor = 'Top'
$labelText.add_Click($handler_labelText_Click)
$buttonLeft.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonLeft.Location = '15,200'
$buttonLeft.Name = 'buttonLeft'
$buttonLeft.Size = $buttonSize
$buttonLeft.TabIndex = 5
$buttonLeft.Text = $buttonLeftText
$buttonLeft.DialogResult = 'No'
$buttonLeft.AutoSize = $false
$buttonLeft.UseVisualStyleBackColor = $true
$buttonLeft.add_Click($buttonLeft_OnClick)
$buttonMiddle.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonMiddle.Location = '170,200'
$buttonMiddle.Name = 'buttonMiddle'
$buttonMiddle.Size = $buttonSize
$buttonMiddle.TabIndex = 6
$buttonMiddle.Text = $buttonMiddleText
$buttonMiddle.DialogResult = 'Ignore'
$buttonMiddle.AutoSize = $true
$buttonMiddle.UseVisualStyleBackColor = $true
$buttonMiddle.add_Click($buttonMiddle_OnClick)
$buttonRight.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonRight.Location = '325,200'
$buttonRight.Name = 'buttonRight'
$buttonRight.Size = $buttonSize
$buttonRight.TabIndex = 7
$buttonRight.Text = $ButtonRightText
$buttonRight.DialogResult = 'Yes'
$buttonRight.AutoSize = $true
$buttonRight.UseVisualStyleBackColor = $true
$buttonRight.add_Click($buttonRight_OnClick)
$buttonAbort.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonAbort.Name = 'buttonAbort'
$buttonAbort.Size = '1,1'
$buttonAbort.DialogResult = 'Abort'
$buttonAbort.TabIndex = 5
$buttonAbort.UseVisualStyleBackColor = $true
$buttonAbort.add_Click($buttonAbort_OnClick)
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 270
$System_Drawing_Size.Width = 450
$formInstallationPrompt.Size = $System_Drawing_Size
$formInstallationPrompt.Padding = '0,0,0,10'
$formInstallationPrompt.Margin = $paddingNone
$formInstallationPrompt.DataBindings.DefaultDataSourceUpdateMode = 0
$formInstallationPrompt.Name = 'WelcomeForm'
$formInstallationPrompt.Text = $title
$formInstallationPrompt.StartPosition = 'CenterScreen'
$formInstallationPrompt.FormBorderStyle = 'FixedDialog'
$formInstallationPrompt.MaximizeBox = $false
$formInstallationPrompt.MinimizeBox = $false
$formInstallationPrompt.TopMost = $true
$formInstallationPrompt.TopLevel = $true
$formInstallationPrompt.Icon = New-Object -TypeName System.Drawing.Icon -ArgumentList $AppDeployLogoIcon
$formInstallationPrompt.Controls.Add($pictureBanner)
$formInstallationPrompt.Controls.Add($pictureIcon)
$formInstallationPrompt.Controls.Add($labelText)
$formInstallationPrompt.Controls.Add($buttonAbort)
If ($buttonLeftText) { $formInstallationPrompt.Controls.Add($buttonLeft) }
If ($buttonMiddleText) { $formInstallationPrompt.Controls.Add($buttonMiddle) }
If ($buttonRightText) { $formInstallationPrompt.Controls.Add($buttonRight) }
$timer = New-Object -TypeName System.Windows.Forms.Timer
$timer.Interval = ($timeout * 1000)
$timer.Add_Tick({
Write-Log -Message 'Installation action not taken within a reasonable amount of time.' -Source ${CmdletName}
$buttonAbort.PerformClick()
})
If ($persistPrompt) {
$timerPersist = New-Object -TypeName System.Windows.Forms.Timer
$timerPersist.Interval = ($configInstallationPersistInterval * 1000)
[scriptblock]$timerPersist_Tick = { Refresh-InstallationPrompt }
$timerPersist.add_Tick($timerPersist_Tick)
$timerPersist.Start()
}
$InitialFormInstallationPromptWindowState = $formInstallationPrompt.WindowState
$formInstallationPrompt.add_Load($Form_StateCorrection_Load)
$formInstallationPrompt.add_FormClosed($Form_Cleanup_FormClosed)
$timer.Start()
Function Refresh-InstallationPrompt {
$formInstallationPrompt.BringToFront()
$formInstallationPrompt.Location = "$($formInstallationPromptStartPosition.X),$($formInstallationPromptStartPosition.Y)"
$formInstallationPrompt.Refresh()
}
Close-InstallationProgress
[string]$installPromptLoggedParameters = ($installPromptParameters.GetEnumerator() | ForEach-Object { If ($_.Value.GetType().Name -eq 'SwitchParameter') { "-$($_.Key):`$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Boolean') { "-$($_.Key) `$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Int32') { "-$($_.Key) $($_.Value)" } Else { "-$($_.Key) `"$($_.Value)`"" } }) -join ' '
Write-Log -Message "Displaying custom installation prompt with the non-default parameters: [$installPromptLoggedParameters]..." -Source ${CmdletName}
If ($NoWait) {
$installPromptParameters.Remove('NoWait')
[string]$installPromptParameters = ($installPromptParameters.GetEnumerator() | ForEach-Object { If ($_.Value.GetType().Name -eq 'SwitchParameter') { "-$($_.Key):`$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Boolean') { "-$($_.Key) `$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Int32') { "-$($_.Key) $($_.Value)" } Else { "-$($_.Key) `"$($_.Value)`"" } }) -join ' '
Start-Process -FilePath "$PSHOME\powershell.exe" -ArgumentList "-ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden -Command `"$scriptPath`" -ReferringApplication `"$installName`" -ShowInstallationPrompt $installPromptParameters" -WindowStyle Hidden -ErrorAction 'SilentlyContinue'
}
Else {
$showDialog = $true
While ($showDialog) {
If ($minimizeWindows) { $shellApp.MinimizeAll() | Out-Null }
$result = $formInstallationPrompt.ShowDialog()
If (($result -eq 'Yes') -or ($result -eq 'No') -or ($result -eq 'Ignore') -or ($result -eq 'Abort')) {
$showDialog = $false
}
}
$formInstallationPrompt.Dispose()
Switch ($result) {
'Yes' { Write-Output $buttonRightText }
'No' { Write-Output $buttonLeftText }
'Ignore' { Write-Output $buttonMiddleText }
'Abort' {
$shellApp.UndoMinimizeAll() | Out-Null
If ($ExitOnTimeout) {
Exit-Script -ExitCode $configInstallationUIExitCode
}
Else {
Write-Log -Message "UI timed out but `$ExitOnTimeout set to `$false. Continue..." -Source ${CmdletName}
}
}
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Show-DialogBox {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,Position=0,HelpMessage='Enter a message for the dialog box')]
[ValidateNotNullorEmpty()]
[string]$Text,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Title = $installTitle,
[Parameter(Mandatory=$false)]
[ValidateSet('OK','OKCancel','AbortRetryIgnore','YesNoCancel','YesNo','RetryCancel','CancelTryAgainContinue')]
[string]$Buttons = 'OK',
[Parameter(Mandatory=$false)]
[ValidateSet('First','Second','Third')]
[string]$DefaultButton = 'First',
[Parameter(Mandatory=$false)]
[ValidateSet('Exclamation','Information','None','Stop','Question')]
[string]$Icon = 'None',
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Timeout = $configInstallationUITimeout,
[Parameter(Mandatory=$false)]
[switch]$TopMost = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeNonInteractive) {
Write-Log -Message "Bypassing Dialog Box [Mode: $deployMode]: $Text..." -Source ${CmdletName}
Return
}
If (-not $IsProcessUserInteractive) {
[string]$DialogBoxResponse = Invoke-PSCommandAsUser -PassThru -Command ([scriptblock]::Create("Show-DialogBox -Text '$Test' -Title '$Title' -Buttons '$Buttons' -DefaultButton '$DefaultButton' -Icon '$Icon' -Timeout '$Timeout' -Topmost:`$$Topmost"))
Return $DialogBoxResponse
}
Write-Log -Message "Display Dialog Box with message: $Text..." -Source ${CmdletName}
[hashtable]$dialogButtons = @{
'OK' = 0
'OKCancel' = 1
'AbortRetryIgnore' = 2
'YesNoCancel' = 3
'YesNo' = 4
'RetryCancel' = 5
'CancelTryAgainContinue' = 6
}
[hashtable]$dialogIcons = @{
'None' = 0
'Stop' = 16
'Question' = 32
'Exclamation' = 48
'Information' = 64
}
[hashtable]$dialogDefaultButton = @{
'First' = 0
'Second' = 256
'Third' = 512
}
Switch ($TopMost) {
$true { $dialogTopMost = 4096 }
$false { $dialogTopMost = 0 }
}
$response = $Shell.Popup($Text, $Timeout, $Title, ($dialogButtons[$Buttons] + $dialogIcons[$Icon] + $dialogDefaultButton[$DefaultButton] + $dialogTopMost))
Switch ($response) {
1 {
Write-Log -Message 'Dialog Box Response: OK' -Source ${CmdletName}
Write-Output 'OK'
}
2 {
Write-Log -Message 'Dialog Box Response: Cancel' -Source ${CmdletName}
Write-Output 'Cancel'
}
3 {
Write-Log -Message 'Dialog Box Response: Abort' -Source ${CmdletName}
Write-Output 'Abort'
}
4 {
Write-Log -Message 'Dialog Box Response: Retry' -Source ${CmdletName}
Write-Output 'Retry'
}
5 {
Write-Log -Message 'Dialog Box Response: Ignore' -Source ${CmdletName}
Write-Output 'Ignore'
}
6 {
Write-Log -Message 'Dialog Box Response: Yes' -Source ${CmdletName}
Write-Output 'Yes'
}
7 {
Write-Log -Message 'Dialog Box Response: No' -Source ${CmdletName}
Write-Output 'No'
}
10 {
Write-Log -Message 'Dialog Box Response: Try Again' -Source ${CmdletName}
Write-Output 'Try Again'
}
11 {
Write-Log -Message 'Dialog Box Response: Continue' -Source ${CmdletName}
Write-Output 'Continue'
}
-1 {
Write-Log -Message 'Dialog Box Timed Out...' -Source ${CmdletName}
Write-Output 'Timeout'
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-HardwarePlatform {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message 'Retrieve hardware platform information.' -Source ${CmdletName}
$hwBios = Get-WmiObject -Class Win32_BIOS -ErrorAction 'Stop' | Select-Object -Property Version, SerialNnumber
$hwMakeModel = Get-WMIObject -Class Win32_ComputerSystem -ErrorAction 'Stop' | Select-Object -Property Model, Manufacturer
If ($hwBIOS.Version -match 'VRTUAL') { $hwType = 'Virtual:Hyper-V' }
ElseIf ($hwBIOS.Version -match 'A M I') { $hwType = 'Virtual:Virtual PC' }
ElseIf ($hwBIOS.Version -like '*Xen*') { $hwType = 'Virtual:Xen' }
ElseIf ($hwBIOS.SerialNumber -like '*VMware*') { $hwType = 'Virtual:VMWare' }
ElseIf ($hwMakeModel.Manufacturer -like '*Microsoft*') { $hwType = 'Virtual:Hyper-V' }
ElseIf ($hwMakeModel.Manufacturer -like '*VMWare*') { $hwType = 'Virtual:VMWare' }
ElseIf ($hwMakeModel.Model -like '*Virtual*') { $hwType = 'Virtual' }
Else { $hwType = 'Physical' }
Write-Output $hwType
}
Catch {
Write-Log -Message "Failed to retrieve hardware platform information. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to retrieve hardware platform information: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-FreeDiskSpace {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Drive = $envSystemDrive,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message "Retrieve free disk space for drive [$Drive]." -Source ${CmdletName}
$disk = Get-WmiObject -Class Win32_LogicalDisk -Filter "DeviceID='$Drive'" -ErrorAction 'Stop'
[double]$freeDiskSpace = [math]::Round($disk.FreeSpace / 1MB)
Write-Log -Message "Free disk space for drive [$Drive]: [$freeDiskSpace MB]." -Source ${CmdletName}
Write-Output $freeDiskSpace
}
Catch {
Write-Log -Message "Failed to retrieve free disk space for drive [$Drive]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to retrieve free disk space for drive [$Drive]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-InstalledApplication {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string[]]$Name,
[Parameter(Mandatory=$false)]
[switch]$Exact = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$ProductCode,
[Parameter(Mandatory=$false)]
[switch]$IncludeUpdatesAndHotfixes
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($name) {
Write-Log -Message "Get information for installed Application Name(s) [$($name -join ', ')]..." -Source ${CmdletName}
}
If ($productCode) {
Write-Log -Message "Get information for installed Product Code [$ProductCode]..." -Source ${CmdletName}
}
[psobject[]]$installedApplication = @()
ForEach ($regKey in $regKeyApplications) {
Try {
If (Test-Path -Path $regKey -ErrorAction 'Stop') {
[psobject[]]$regKeyApplication = Get-ChildItem -Path $regKey -ErrorAction 'Stop' | ForEach-Object { Get-ItemProperty -LiteralPath $_.PSPath -ErrorAction 'SilentlyContinue' | Where-Object { $_.DisplayName } }
ForEach ($regKeyApp in $regKeyApplication) {
Try {
[string]$appDisplayName = ''
[string]$appDisplayVersion = ''
[string]$appPublisher = ''
If (-not $IncludeUpdatesAndHotfixes) {
If ($regKeyApp.DisplayName -match '(?i)kb\d+') { Continue }
If ($regKeyApp.DisplayName -match 'Cumulative Update') { Continue }
If ($regKeyApp.DisplayName -match 'Security Update') { Continue }
If ($regKeyApp.DisplayName -match 'Hotfix') { Continue }
}
$appDisplayName = $regKeyApp.DisplayName -replace '[^\u001F-\u007F]',''
$appDisplayVersion = $regKeyApp.DisplayVersion -replace '[^\u001F-\u007F]',''
$appPublisher = $regKeyApp.Publisher -replace '[^\u001F-\u007F]',''
[boolean]$Is64BitApp = If (($is64Bit) -and ($regKey -notmatch '^HKLM:SOFTWARE\\Wow6432Node')) { $true } Else { $false }
If ($ProductCode) {
If ($regKeyApp.PSChildName -match [regex]::Escape($productCode)) {
Write-Log -Message "Found installed application [$appDisplayName] version [$appDisplayVersion] matching product code [$productCode]" -Source ${CmdletName}
$installedApplication += New-Object -TypeName PSObject -Property @{
ProductCode = $regKeyApp.PSChildName
DisplayName = $appDisplayName
DisplayVersion = $appDisplayVersion
UninstallString = $regKeyApp.UninstallString
InstallSource = $regKeyApp.InstallSource
InstallLocation = $regKeyApp.InstallLocation
InstallDate = $regKeyApp.InstallDate
Publisher = $appPublisher
Is64BitApplication = $Is64BitApp
}
}
}
If ($name) {
ForEach ($application in $Name) {
$applicationMatched = $false
If ($exact) {
If ($regKeyApp.DisplayName -eq $application) {
$applicationMatched = $true
Write-Log -Message "Found installed application [$appDisplayName] version [$appDisplayVersion] exactly matching application name [$application]" -Source ${CmdletName}
}
}
ElseIf ($regKeyApp.DisplayName -match [regex]::Escape($application)) {
$applicationMatched = $true
Write-Log -Message "Found installed application [$appDisplayName] version [$appDisplayVersion] matching application name [$application]" -Source ${CmdletName}
}
If ($applicationMatched) {
$installedApplication += New-Object -TypeName PSObject -Property @{
ProductCode = $regKeyApp.PSChildName
DisplayName = $appDisplayName
DisplayVersion = $appDisplayVersion
UninstallString = $regKeyApp.UninstallString
InstallSource = $regKeyApp.InstallSource
InstallLocation = $regKeyApp.InstallLocation
InstallDate = $regKeyApp.InstallDate
Publisher = $appPublisher
Is64BitApplication = $Is64BitApp
}
}
}
}
}
Catch {
Write-Log -Message "Failed to resolve application details from registry for [$appDisplayName]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Continue
}
}
}
}
Catch {
Write-Log -Message "Failed to resolve registry path [$regKey]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Continue
}
}
Write-Output $installedApplication
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Execute-MSI {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateSet('Install','Uninstall','Patch','Repair','ActiveSetup')]
[string]$Action,
[Parameter(Mandatory=$true,HelpMessage='Please enter either the path to the MSI/MSP file or the ProductCode')]
[ValidateScript({($_ -match $MSIProductCodeRegExPattern) -or ('.msi','.msp' -contains [System.IO.Path]::GetExtension($_))})]
[Alias('FilePath')]
[string]$Path,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Transform,
[Parameter(Mandatory=$false)]
[Alias('Arguments')]
[ValidateNotNullorEmpty()]
[string]$Parameters,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Patch,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$private:LogName,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$WorkingDirectory,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
[boolean]$PathIsProductCode = $false
If ($Path -match $MSIProductCodeRegExPattern) {
[boolean]$PathIsProductCode = $true
Write-Log -Message 'Resolve product code to a publisher, application name, and version.' -Source ${CmdletName}
[psobject]$productCodeNameVersion = Get-InstalledApplication -ProductCode $path | Select-Object -Property Publisher, DisplayName, DisplayVersion -First 1 -ErrorAction 'SilentlyContinue'
If (-not $logName) {
If ($productCodeNameVersion) {
If ($productCodeNameVersion.Publisher) {
$logName = ($productCodeNameVersion.Publisher + '_' + $productCodeNameVersion.DisplayName + '_' + $productCodeNameVersion.DisplayVersion) -replace "[$invalidFileNameChars]",'' -replace ' ',''
}
Else {
$logName = ($productCodeNameVersion.DisplayName + '_' + $productCodeNameVersion.DisplayVersion) -replace "[$invalidFileNameChars]",'' -replace ' ',''
}
}
Else {
$logName = $Path
}
}
}
Else {
If (-not $logName) { $logName = ([System.IO.FileInfo]$path).BaseName } ElseIf ('.log','.txt' -contains [System.IO.Path]::GetExtension($logName)) { $logName = [System.IO.Path]::GetFileNameWithoutExtension($logName) }
}
If ($configToolkitCompressLogs) {
[string]$logPath = Join-Path -Path $logTempFolder -ChildPath $logName
}
Else {
If (-not (Test-Path -Path $configMSILogDir -PathType Container -ErrorAction 'SilentlyContinue')) {
New-Item -Path $configMSILogDir -ItemType Directory -ErrorAction 'SilentlyContinue' | Out-Null
}
[string]$logPath = Join-Path -Path $configMSILogDir -ChildPath $logName
}
If ($deployModeSilent) {
$msiInstallDefaultParams = $configMSISilentParams
$msiUninstallDefaultParams = $configMSISilentParams
}
Else {
$msiInstallDefaultParams = $configMSIInstallParams
$msiUninstallDefaultParams = $configMSIUninstallParams
}
Switch ($action) {
'Install' { $option = '/i'; [string]$msiLogFile = "$logPath" + '_Install'; $msiDefaultParams = $msiInstallDefaultParams }
'Uninstall' { $option = '/x'; [string]$msiLogFile = "$logPath" + '_Uninstall'; $msiDefaultParams = $msiUninstallDefaultParams }
'Patch' { $option = '/update'; [string]$msiLogFile = "$logPath" + '_Patch'; $msiDefaultParams = $msiInstallDefaultParams }
'Repair' { $option = '/f'; [string]$msiLogFile = "$logPath" + '_Repair'; $msiDefaultParams = $msiInstallDefaultParams }
'ActiveSetup' { $option = '/fups'; [string]$msiLogFile = "$logPath" + '_ActiveSetup' }
}
If ([System.IO.Path]::GetExtension($msiLogFile) -ne '.log') {
[string]$msiLogFile = $msiLogFile + '.log'
[string]$msiLogFile = "`"$msiLogFile`""
}
If (Test-Path -Path (Join-Path -Path $dirFiles -ChildPath $path -ErrorAction 'SilentlyContinue') -PathType Leaf -ErrorAction 'SilentlyContinue') {
[string]$msiFile = Join-Path -Path $dirFiles -ChildPath $path
}
Else {
[string]$msiFile = $Path
}
If ((-not $PathIsProductCode) -and (-not $workingDirectory)) { [string]$workingDirectory = Split-Path -Path $msiFile -Parent }
If ($PathIsProductCode) {
[string]$MSIProductCode = $path
}
Else {
Try {
[string]$MSIProductCode = Get-MsiTableProperty -Path $msiFile -Table 'Property' -ContinueOnError $false | Select-Object -ExpandProperty ProductCode -ErrorAction 'Stop'
}
Catch {
Write-Log -Message "Failed to get the ProductCode from the MSI file. Continue with requested action [$Action]..." -Source ${CmdletName}
}
}
[string]$msiFile = "`"$msiFile`""
[string]$mstFile = "`"$transform`""
[string]$mspFile = "`"$patch`""
[string]$argsMSI = "$option $msiFile"
If ($transform) { $argsMSI = "$argsMSI TRANSFORMS=$mstFile TRANSFORMSSECURE=1" }
If ($patch) { $argsMSI = "$argsMSI PATCH=$mspFile" }
If ($Parameters) { $argsMSI = "$argsMSI $Parameters" } Else { $argsMSI = "$argsMSI $msiDefaultParams" }
$argsMSI = "$argsMSI $configMSILoggingOptions $msiLogFile"
If ($MSIProductCode) {
[psobject]$IsMsiInstalled = Get-InstalledApplication -ProductCode $MSIProductCode
}
Else {
If ($Action -eq 'Install') { [boolean]$IsMsiInstalled = $false } Else { [boolean]$IsMsiInstalled = $true }
}
If (($IsMsiInstalled) -and ($Action -eq 'Install')) {
Write-Log -Message "The MSI is already installed on this system. Skipping action [$Action]..." -Source ${CmdletName}
}
ElseIf (((-not $IsMsiInstalled) -and ($Action -eq 'Install')) -or ($IsMsiInstalled)) {
Write-Log -Message "Executing MSI action [$Action]..." -Source ${CmdletName}
If ($ContinueOnError) {
If ($WorkingDirectory) {
Execute-Process -Path $exeMsiexec -Parameters $argsMSI -WorkingDirectory $WorkingDirectory -WindowStyle Normal -ContinueOnError $true
}
Else {
Execute-Process -Path $exeMsiexec -Parameters $argsMSI -WindowStyle Normal -ContinueOnError $true
}
}
Else {
If ($WorkingDirectory) {
Execute-Process -Path $exeMsiexec -Parameters $argsMSI -WorkingDirectory $WorkingDirectory -WindowStyle Normal
}
Else {
Execute-Process -Path $exeMsiexec -Parameters $argsMSI -WindowStyle Normal
}
}
}
Else {
Write-Log -Message "The MSI is not installed on this system. Skipping action [$Action]..." -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Remove-MSIApplications {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[switch]$Exact = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($Exact) {
[psobject[]]$installedApplications = Get-InstalledApplication -Name $name -Exact
}
Else {
[psobject[]]$installedApplications = Get-InstalledApplication -Name $name
}
If (($null -ne $installedApplications) -and ($installedApplications.Count)) {
ForEach ($installedApplication in $installedApplications) {
If ($installedApplication.UninstallString -match 'msiexec') {
Write-Log -Message "Remove application [$($installedApplication.DisplayName) $($installedApplication.Version)]." -Source ${CmdletName}
If ($ContinueOnError) {
Execute-MSI -Action Uninstall -Path $installedApplication.ProductCode -ContinueOnError $true
}
Else {
Execute-MSI -Action Uninstall -Path $installedApplication.ProductCode
}
}
Else {
Write-Log -Message "[$($installedApplication.DisplayName)] uninstall string [$($installedApplication.UninstallString)] does not match `"msiexec`", so removal will not proceed." -Severity 2 -Source ${CmdletName}
}
}
}
Else {
Write-Log -Message 'No applications found for removal. Continue...' -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Execute-Process {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[Alias('FilePath')]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$false)]
[Alias('Arguments')]
[ValidateNotNullorEmpty()]
[string[]]$Parameters,
[Parameter(Mandatory=$false)]
[ValidateSet('Normal','Hidden','Maximized','Minimized')]
[System.Diagnostics.ProcessWindowStyle]$WindowStyle = 'Normal',
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[switch]$CreateNoWindow = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$WorkingDirectory,
[Parameter(Mandatory=$false)]
[switch]$NoWait = $false,
[Parameter(Mandatory=$false)]
[switch]$PassThru = $false,
[Parameter(Mandatory=$false)]
[switch]$WaitForMsiExec = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[timespan]$MsiExecWaitTime = $(New-TimeSpan -Seconds $configMSIMutexWaitTime),
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$IgnoreExitCodes,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
$returnCode = $null
If (([System.IO.Path]::IsPathRooted($Path)) -and ([System.IO.Path]::HasExtension($Path))) {
Write-Log -Message "[$Path] is a valid fully qualified path, continue." -Source ${CmdletName}
If (-not (Test-Path -Path $Path -PathType Leaf -ErrorAction 'Stop')) {
Throw "File [$Path] not found."
}
}
Else {
[string]$PathFolders = $dirFiles
[string]$PathFolders = $PathFolders + ';' + (Get-Location -PSProvider 'FileSystem').Path
$env:PATH = $PathFolders + ';' + $env:PATH
[string]$FullyQualifiedPath = Get-Command -Name $Path -CommandType 'Application' -TotalCount 1 -Syntax -ErrorAction 'SilentlyContinue'
$env:PATH = $env:PATH -replace [regex]::Escape($PathFolders + ';'), ''
If ($FullyQualifiedPath) {
Write-Log -Message "[$Path] successfully resolved to fully qualified path [$FullyQualifiedPath]." -Source ${CmdletName}
$Path = $FullyQualifiedPath
}
Else {
Throw "[$Path] contains an invalid path or file name."
}
}
If (-not $WorkingDirectory) { $WorkingDirectory = Split-Path -Path $Path -Parent -ErrorAction 'Stop' }
If (($Path -match 'msiexec') -or ($WaitForMsiExec)) {
[boolean]$MsiExecAvailable = Test-MsiExecMutex -MsiExecWaitTime $MsiExecWaitTime
Start-Sleep -Seconds 1
If (-not $MsiExecAvailable) {
[int32]$returnCode = 1618
Throw 'Please complete in progress MSI installation before proceeding with this install.'
}
}
Try {
$env:SEE_MASK_NOZONECHECKS = 1
$private:ErrorActionPreference = 'Stop'
$processStartInfo = New-Object -TypeName System.Diagnostics.ProcessStartInfo -ErrorAction 'Stop'
$processStartInfo.FileName = $Path
$processStartInfo.WorkingDirectory = $WorkingDirectory
$processStartInfo.UseShellExecute = $false
$processStartInfo.ErrorDialog = $false
$processStartInfo.RedirectStandardOutput = $true
$processStartInfo.RedirectStandardError = $true
$processStartInfo.CreateNoWindow = $CreateNoWindow
If ($Parameters) { $processStartInfo.Arguments = $Parameters }
If ($windowStyle) { $processStartInfo.WindowStyle = $WindowStyle }
$process = New-Object -TypeName System.Diagnostics.Process -ErrorAction 'Stop'
$process.StartInfo = $processStartInfo
[scriptblock]$processEventHandler = { If (-not [string]::IsNullOrEmpty($EventArgs.Data)) { $Event.MessageData.AppendLine($EventArgs.Data) } }
$stdOutBuilder = New-Object -TypeName System.Text.StringBuilder -ArgumentList ''
$stdOutEvent = Register-ObjectEvent -InputObject $process -Action $processEventHandler -EventName 'OutputDataReceived' -MessageData $stdOutBuilder -ErrorAction 'Stop'
Write-Log -Message "Working Directory is [$WorkingDirectory]" -Source ${CmdletName}
If ($Parameters) {
If ($Parameters -match '-Command \&') {
Write-Log -Message "Executing [$Path [PowerShell ScriptBlock]]..." -Source ${CmdletName}
}
Else{
Write-Log -Message "Executing [$Path $Parameters]..." -Source ${CmdletName}
}
}
Else {
Write-Log -Message "Executing [$Path]..." -Source ${CmdletName}
}
[boolean]$processStarted = $process.Start()
If ($NoWait) {
Write-Log -Message 'NoWait parameter specified. Continuing without waiting for exit code...' -Source ${CmdletName}
}
Else {
$process.BeginOutputReadLine()
$stdErr = $($process.StandardError.ReadToEnd()).ToString() -replace $null,''
$process.WaitForExit()
While (-not ($process.HasExited)) { $process.Refresh(); Start-Sleep -Seconds 1 }
[int32]$returnCode = $process.ExitCode
If ($stdOutEvent) { Unregister-Event -SourceIdentifier $stdOutEvent.Name -ErrorAction 'Stop'; $stdOutEvent = $null }
$stdOut = $stdOutBuilder.ToString() -replace $null,''
If ($stdErr.Length -gt 0) {
Write-Log -Message "Standard error output from the process: $stdErr" -Severity 3 -Source ${CmdletName}
}
}
}
Finally {
If ($stdOutEvent) { Unregister-Event -SourceIdentifier $stdOutEvent.Name -ErrorAction 'Stop'}
If ($process) { $process.Close() }
Remove-Item -Path env:SEE_MASK_NOZONECHECKS -ErrorAction 'SilentlyContinue'
}
If (-not $NoWait) {
$ignoreExitCodeMatch = $false
If ($ignoreExitCodes) {
[int32[]]$ignoreExitCodesArray = $ignoreExitCodes -split ','
ForEach ($ignoreCode in $ignoreExitCodesArray) {
If ($returnCode -eq $ignoreCode) { $ignoreExitCodeMatch = $true }
}
}
If ($ContinueOnError) { $ignoreExitCodeMatch = $true }
If ($PassThru) {
Write-Log -Message "Execution completed with exit code [$returnCode]" -Source ${CmdletName}
[psobject]$ExecutionResults = New-Object -TypeName PSObject -Property @{ ExitCode = $returnCode; StdOut = $stdOut; StdErr = $stdErr }
Write-Output $ExecutionResults
}
ElseIf ($ignoreExitCodeMatch) {
Write-Log -Message "Execution complete and the exit code [$returncode] is being ignored" -Source ${CmdletName}
}
ElseIf (($returnCode -eq 3010) -or ($returnCode -eq 1641)) {
Write-Log -Message "Execution completed successfully with exit code [$returnCode]. A reboot is required." -Severity 2 -Source ${CmdletName}
Set-Variable -Name msiRebootDetected -Value $true -Scope Script
}
ElseIf (($returnCode -eq 1605) -and ($Path -match 'msiexec')) {
Write-Log -Message "Execution failed with exit code [$returnCode] because the product is not currently installed." -Severity 3 -Source ${CmdletName}
}
ElseIf (($returnCode -eq -2145124329) -and ($Path -match 'wusa')) {
Write-Log -Message "Execution failed with exit code [$returnCode] because the Windows Update is not applicable to this system." -Severity 3 -Source ${CmdletName}
}
ElseIf (($returnCode -eq 17025) -and ($Path -match 'fullfile')) {
Write-Log -Message "Execution failed with exit code [$returnCode] because the Office Update is not applicable to this system." -Severity 3 -Source ${CmdletName}
}
ElseIf ($returnCode -eq 0) {
Write-Log -Message "Execution completed successfully with exit code [$returnCode]" -Source ${CmdletName}
}
Else {
[string]$MsiExitCodeMessage = ''
If ($Path -match 'msiexec') {
[string]$MsiExitCodeMessage = Get-MsiExitCodeMessage -MsiExitCode $returnCode
}
If ($MsiExitCodeMessage) {
Write-Log -Message "Execution failed with exit code [$returnCode]: $MsiExitCodeMessage" -Severity 3 -Source ${CmdletName}
}
Else {
Write-Log -Message "Execution failed with exit code [$returnCode]" -Severity 3 -Source ${CmdletName}
}
Exit-Script -ExitCode $returnCode
}
}
}
Catch {
If ([string]::IsNullOrEmpty([string]$returnCode)) {
[int32]$returnCode = 999
Write-Log -Message "Function failed, setting exit code to [$returnCode]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
Else {
Write-Log -Message "Execution completed with exit code [$returnCode]. Function failed. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
If ($PassThru) {
[psobject]$ExecutionResults = New-Object -TypeName PSObject -Property @{ ExitCode = $returnCode; StdOut = If ($stdOut) { $stdOut } Else { '' }; StdErr = If ($stdErr) { $stdErr } Else { '' } }
Write-Output $ExecutionResults
}
Else {
Exit-Script -ExitCode $returnCode
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-MsiExitCodeMessage {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[int32]$MsiExitCode
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$MsiExitCodeMsgSource = @'
using System;
using System.Text;
using System.Runtime.InteropServices;
public class MsiExitCode
{
enum LoadLibraryFlags : int
{
DONT_RESOLVE_DLL_REFERENCES = 0x00000001,
LOAD_IGNORE_CODE_AUTHZ_LEVEL = 0x00000010,
LOAD_LIBRARY_AS_DATAFILE = 0x00000002,
LOAD_LIBRARY_AS_DATAFILE_EXCLUSIVE = 0x00000040,
LOAD_LIBRARY_AS_IMAGE_RESOURCE = 0x00000020,
LOAD_WITH_ALTERED_SEARCH_PATH = 0x00000008
}
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = false)]
static extern IntPtr LoadLibraryEx(string lpFileName, IntPtr hFile, LoadLibraryFlags dwFlags);
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
static extern int LoadString(IntPtr hInstance, int uID, StringBuilder lpBuffer, int nBufferMax);
// Get MSI exit code message from msimsg.dll resource dll
public static string GetMessageFromMsiExitCode(int errCode)
{
IntPtr hModuleInstance = LoadLibraryEx("msimsg.dll", IntPtr.Zero, LoadLibraryFlags.LOAD_LIBRARY_AS_DATAFILE);
StringBuilder sb = new StringBuilder(255);
LoadString(hModuleInstance, errCode, sb, sb.Capacity + 1);
return sb.ToString();
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'MsiExitCode').Type) {
Add-Type -TypeDefinition $MsiExitCodeMsgSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
Write-Log -Message "Get message for exit code [$MsiExitCode]." -Source ${CmdletName}
[string]$MsiExitCodeMsg = [MsiExitCode]::GetMessageFromMsiExitCode($MsiExitCode)
Write-Output $MsiExitCodeMsg
}
Catch {
Write-Log -Message "Failed to get message for exit code [$MsiExitCode]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Test-MsiExecMutex {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[timespan]$MsiExecWaitTime = $(New-TimeSpan -Seconds $configMSIMutexWaitTime)
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$IsMsiExecFreeSource = @'
using System;
using System.Threading;
public class MsiExec
{
public static bool IsMsiExecFree(TimeSpan maxWaitTime)
{
// Wait (up to a timeout) for the MSI installer service to become free.
// Returns true for a successful wait, when the installer service has become free.
// Returns false when waiting for the installer service has exceeded the timeout.
const string installerServiceMutexName = "Global\\_MSIExecute";
Mutex MSIExecuteMutex = null;
bool isMsiExecFree = false;
try
{
MSIExecuteMutex = Mutex.OpenExisting(installerServiceMutexName, System.Security.AccessControl.MutexRights.Synchronize);
isMsiExecFree = MSIExecuteMutex.WaitOne(maxWaitTime, false);
}
catch (WaitHandleCannotBeOpenedException)
{
// Mutex doesn't exist, do nothing
isMsiExecFree = true;
}
catch (ObjectDisposedException)
{
// Mutex was disposed between opening it and attempting to wait on it, do nothing
isMsiExecFree = true;
}
finally
{
if (MSIExecuteMutex != null && isMsiExecFree)
MSIExecuteMutex.ReleaseMutex();
}
return isMsiExecFree;
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'MsiExec').Type) {
Add-Type -TypeDefinition $IsMsiExecFreeSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
If ($MsiExecWaitTime.TotalMinutes -gt 1) {
[string]$WaitLogMsg = "$($MsiExecWaitTime.TotalMinutes) minutes"
}
ElseIf ($MsiExecWaitTime.TotalMinutes -eq 1) {
[string]$WaitLogMsg = "$($MsiExecWaitTime.TotalMinutes) minute"
}
Else {
[string]$WaitLogMsg = "$($MsiExecWaitTime.TotalSeconds) seconds"
}
Write-Log -Message "Check to see if mutex [Global\\_MSIExecute] is available. Wait up to [$WaitLogMsg] for the mutex to become available." -Source ${CmdletName}
[boolean]$IsMsiExecInstallFree = [MsiExec]::IsMsiExecFree($MsiExecWaitTime)
If ($IsMsiExecInstallFree) {
Write-Log -Message 'Mutex [Global\\_MSIExecute] is available.' -Source ${CmdletName}
}
Else {
[string]$msiInProgressCmdLine = Get-WmiObject -Class Win32_Process -Filter "name = 'msiexec.exe'" | Select-Object -ExpandProperty CommandLine | Where-Object { $_ -match '\.msi' } | ForEach-Object { $_.Trim() }
Write-Log -Message "Mutex [Global\\_MSIExecute] is not available because the following MSI installation is in progress [$msiInProgressCmdLine]" -Severity 2 -Source ${CmdletName}
}
Write-Output $IsMsiExecInstallFree
}
Catch {
Write-Log -Message "Failed check for availability of mutex [Global\\_MSIExecute]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Write-Output $true
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function New-Folder {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If (-not (Test-Path -Path $Path -PathType Container)) {
Write-Log -Message "Create folder [$Path]." -Source ${CmdletName}
New-Item -Path $Path -ItemType Directory -ErrorAction 'Stop'
}
Else {
Write-Log -Message "Folder [$Path] already exists." -Source ${CmdletName}
}
}
Catch {
Write-Log -Message "Failed to create folder [$Path]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to create folder [$Path]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Remove-Folder {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If (Test-Path -Path $Path -PathType Container) {
Write-Log -Message "Delete folder(s) and file(s) recursively from path [$path]..." -Source ${CmdletName}
Remove-Item -Path $Path -Force -Recurse -ErrorAction 'Stop' | Out-Null
}
Else {
Write-Log -Message "Folder [$Path] does not exists..." -Source ${CmdletName}
}
}
Catch {
Write-Log -Message "Failed to delete folder(s) and file(s) recursively from path [$path]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to delete folder(s) and file(s) recursively from path [$path]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Copy-File {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Destination,
[Parameter(Mandatory=$false)]
[switch]$Recurse = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ((-not ([System.IO.Path]::HasExtension($Destination))) -and (-not (Test-Path -Path $Destination -PathType Container))) {
New-Item -Path $Destination -Type 'Directory' -Force -ErrorAction 'Stop' | Out-Null
}
If ($Recurse) {
Write-Log -Message "Copy file(s) recursively in path [$path] to destination [$destination]" -Source ${CmdletName}
Copy-Item -Path $Path -Destination $destination -Force -Recurse -ErrorAction 'Stop' | Out-Null
}
Else {
Write-Log -Message "Copy file in path [$path] to destination [$destination]" -Source ${CmdletName}
Copy-Item -Path $Path -Destination $destination -Force -ErrorAction 'Stop' | Out-Null
}
}
Catch {
Write-Log -Message "Failed to copy file(s) in path [$path] to destination [$destination]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to copy file(s) in path [$path] to destination [$destination]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Remove-File {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$false)]
[switch]$Recurse,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ($Recurse) {
Write-Log -Message "Delete file(s) recursively in path [$path]..." -Source ${CmdletName}
Remove-Item -Path $path -Force -Recurse -ErrorAction 'Stop' | Out-Null
}
Else {
Write-Log -Message "Delete file in path [$path]..." -Source ${CmdletName}
Remove-Item -Path $path -Force -ErrorAction 'Stop' | Out-Null
}
}
Catch {
Write-Log -Message "Failed to delete file(s) in path [$path]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to delete file(s) in path [$path]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Convert-RegistryPath {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Key,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$SID
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($Key -match '^HKLM:\\|^HKCU:\\|^HKCR:\\|^HKU:\\|^HKCC:\\|^HKPD:\\') {
$key = $key -replace '^HKLM:\\', 'HKEY_LOCAL_MACHINE\'
$key = $key -replace '^HKCR:\\', 'HKEY_CLASSES_ROOT\'
$key = $key -replace '^HKCU:\\', 'HKEY_CURRENT_USER\'
$key = $key -replace '^HKU:\\', 'HKEY_USERS\'
$key = $key -replace '^HKCC:\\', 'HKEY_CURRENT_CONFIG\'
$key = $key -replace '^HKPD:\\', 'HKEY_PERFORMANCE_DATA\'
}
ElseIf ($Key -match '^HKLM:|^HKCU:|^HKCR:|^HKU:|^HKCC:|^HKPD:') {
$key = $key -replace '^HKLM:', 'HKEY_LOCAL_MACHINE\'
$key = $key -replace '^HKCR:', 'HKEY_CLASSES_ROOT\'
$key = $key -replace '^HKCU:', 'HKEY_CURRENT_USER\'
$key = $key -replace '^HKU:', 'HKEY_USERS\'
$key = $key -replace '^HKCC:', 'HKEY_CURRENT_CONFIG\'
$key = $key -replace '^HKPD:', 'HKEY_PERFORMANCE_DATA\'
}
ElseIf ($Key -match '^HKLM\\|^HKCU\\|^HKCR\\|^HKU\\|^HKCC\\|^HKPD\\') {
$key = $key -replace '^HKLM\\', 'HKEY_LOCAL_MACHINE\'
$key = $key -replace '^HKCR\\', 'HKEY_CLASSES_ROOT\'
$key = $key -replace '^HKCU\\', 'HKEY_CURRENT_USER\'
$key = $key -replace '^HKU\\', 'HKEY_USERS\'
$key = $key -replace '^HKCC\\', 'HKEY_CURRENT_CONFIG\'
$key = $key -replace '^HKPD\\', 'HKEY_PERFORMANCE_DATA\'
}
If ($PSBoundParameters.ContainsKey('SID')) {
If ($key -match '^HKEY_CURRENT_USER\\') { $key = $key -replace '^HKEY_CURRENT_USER\\', "HKEY_USERS\$SID\" }
}
If ($key -notmatch '^Registry::') { [string]$key = "Registry::$key" }
Write-Log -Message "Return fully qualified registry key path [$key]" -Source ${CmdletName}
Write-Output $key
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-RegistryKey {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Key,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$Value,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$SID,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[switch]$ReturnEmptyKeyIfExists,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ($PSBoundParameters.ContainsKey('SID')) {
[string]$key = Convert-RegistryPath -Key $key -SID $SID
}
Else {
[string]$key = Convert-RegistryPath -Key $key
}
If (-not (Test-Path -Path $key -ErrorAction 'Stop')) {
Write-Log -Message "Registry key [$key] does not exist" -Severity 2 -Source ${CmdletName}
$regKeyValue = $null
}
Else {
If (-not $Value) {
Write-Log -Message "Get registry key [$key] and all property values" -Source ${CmdletName}
$regKeyValue = Get-ItemProperty -Path $key -ErrorAction 'Stop'
If ((-not $regKeyValue) -and ($ReturnEmptyKeyIfExists)) {
Write-Log -Message "No property values found for registry key. Get registry key [$key]" -Source ${CmdletName}
$regKeyValue = Get-Item -Path $key -Force -ErrorAction 'Stop'
}
}
Else {
Write-Log -Message "Get registry key [$key] value [$value]" -Source ${CmdletName}
$regKeyValue = Get-ItemProperty -Path $key -ErrorAction 'Stop' | Select-Object -ExpandProperty $Value -ErrorAction 'SilentlyContinue'
}
}
If ($regKeyValue) { Write-Output $regKeyValue } Else { Write-Output $null }
}
Catch {
If (-not $Value) {
Write-Log -Message "Failed to read registry key [$key]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to read registry key [$key]: $($_.Exception.Message)"
}
}
Else {
Write-Log -Message "Failed to read registry key [$key] value [$value]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to read registry key [$key] value [$value]: $($_.Exception.Message)"
}
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Set-RegistryKey {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Key,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
$Value,
[Parameter(Mandatory=$false)]
[ValidateSet('Binary','DWord','ExpandString','MultiString','None','QWord','String','Unknown')]
[Microsoft.Win32.RegistryValueKind]$Type = 'String',
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$SID,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
[string]$RegistryValueWriteAction = 'set'
If ($PSBoundParameters.ContainsKey('SID')) {
[string]$key = Convert-RegistryPath -Key $key -SID $SID
}
Else {
[string]$key = Convert-RegistryPath -Key $key
}
If (-not (Test-Path -Path $key -ErrorAction 'Stop')) {
Try {
Write-Log -Message "Create registry key [$key]." -Source ${CmdletName}
New-Item -Path $key -ItemType Registry -Force -ErrorAction 'Stop' | Out-Null
}
Catch {
Throw
}
}
If ($Name) {
If (-not (Get-ItemProperty -Path $key -Name $Name -ErrorAction 'SilentlyContinue')) {
Write-Log -Message "Set registry key value: [$key] [$name = $value]" -Source ${CmdletName}
New-ItemProperty -Path $key -Name $name -Value $value -PropertyType $Type -ErrorAction 'Stop' | Out-Null
}
Else {
[string]$RegistryValueWriteAction = 'update'
Write-Log -Message "Update registry key value: [$key] [$name = $value]" -Source ${CmdletName}
Set-ItemProperty -Path $key -Name $name -Value $value -ErrorAction 'Stop' | Out-Null
}
}
}
Catch {
If ($Name) {
Write-Log -Message "Failed to $RegistryValueWriteAction value [$value] for registry key [$key] [$name]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to $RegistryValueWriteAction value [$value] for registry key [$key] [$name]: $($_.Exception.Message)"
}
}
Else {
Write-Log -Message "Failed to set registry key [$key]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to set registry key [$key]: $($_.Exception.Message)"
}
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Remove-RegistryKey {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Key,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[switch]$Recurse,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$SID,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ($PSBoundParameters.ContainsKey('SID')) {
[string]$key = Convert-RegistryPath -Key $key -SID $SID
}
Else {
[string]$key = Convert-RegistryPath -Key $key
}
If (-not ($name)) {
If ($Recurse) {
Write-Log -Message "Delete registry key recursively [$key]" -Source ${CmdletName}
Remove-Item -Path $Key -ErrorAction 'Stop' -Force -Recurse | Out-Null
}
Else {
Write-Log -Message "Delete registry key [$key]" -Source ${CmdletName}
Remove-Item -Path $Key -ErrorAction 'Stop' -Force | Out-Null
}
}
Else {
Write-Log -Message "Delete registry value [$key] [$name]" -Source ${CmdletName}
Remove-ItemProperty -Path $Key -Name $Name -ErrorAction 'Stop' -Force | Out-Null
}
}
Catch {
If (-not ($name)) {
Write-Log -Message "Failed to delete registry key [$key]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to delete registry key [$key]: $($_.Exception.Message)"
}
}
Else {
Write-Log -Message "Failed to delete registry value [$key] [$name]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to delete registry value [$key] [$name]: $($_.Exception.Message)"
}
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Invoke-HKCURegistrySettingsForAllUsers {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[scriptblock]$RegistrySettings,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[psobject[]]$UserProfiles = (Get-UserProfiles)
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
ForEach ($UserProfile in $UserProfiles) {
Try {
[string]$UserRegistryPath = "Registry::HKEY_USERS\$($UserProfile.SID)"
[string]$UserRegistryHiveFile = Join-Path -Path $UserProfile.ProfilePath -ChildPath 'NTUSER.DAT'
[boolean]$ManuallyLoadedRegHive = $false
If (-not (Test-Path -Path $UserRegistryPath)) {
If (Test-Path -Path $UserRegistryHiveFile -PathType Leaf) {
Write-Log -Message "Load the User [$($UserProfile.NTAccount)] registry hive in path [HKEY_USERS\$($UserProfile.SID)]" -Source ${CmdletName}
[string]$HiveLoadResult = & reg.exe load "`"HKEY_USERS\$($UserProfile.SID)`"" "`"$UserRegistryHiveFile`""
If ($global:LastExitCode -ne 0) {
Throw "Failed to load the registry hive for User [$($UserProfile.NTAccount)] with SID [$($UserProfile.SID)]. Failure message [$HiveLoadResult]. Continue..."
}
[boolean]$ManuallyLoadedRegHive = $true
}
Else {
Throw "Failed to find the registry hive file [$UserRegistryHiveFile] for User [$($UserProfile.NTAccount)] with SID [$($UserProfile.SID)]. Continue..."
}
}
Else {
Write-Log -Message "The User [$($UserProfile.NTAccount)] registry hive is already loaded in path [HKEY_USERS\$($UserProfile.SID)]" -Source ${CmdletName}
}
Write-Log -Message 'Execute ScriptBlock to modify HKCU registry settings for all users.' -Source ${CmdletName}
& $RegistrySettings
}
Catch {
Write-Log -Message "Failed to modify the registry hive for User [$($UserProfile.NTAccount)] with SID [$($UserProfile.SID)] `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
Finally {
If ($ManuallyLoadedRegHive) {
Try {
Write-Log -Message "Unload the User [$($UserProfile.NTAccount)] registry hive in path [HKEY_USERS\$($UserProfile.SID)]" -Source ${CmdletName}
[string]$HiveLoadResult = & reg.exe unload "`"HKEY_USERS\$($UserProfile.SID)`""
If ($global:LastExitCode -ne 0) { Throw "$HiveLoadResult" }
}
Catch {
Write-Log -Message "Failed to unload the registry hive for User [$($UserProfile.NTAccount)] with SID [$($UserProfile.SID)]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function ConvertTo-NTAccountOrSID {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ParameterSetName='NTAccountToSID',ValueFromPipelineByPropertyName=$true)]
[ValidateNotNullOrEmpty()]
[string]$AccountName,
[Parameter(Mandatory=$true,ParameterSetName='SIDToNTAccount',ValueFromPipelineByPropertyName=$true)]
[ValidateNotNullOrEmpty()]
[string]$SID,
[Parameter(Mandatory=$true,ParameterSetName='WellKnownName',ValueFromPipelineByPropertyName=$true)]
[ValidateNotNullOrEmpty()]
[string]$WellKnownSIDName,
[Parameter(Mandatory=$false,ParameterSetName='WellKnownName')]
[ValidateNotNullOrEmpty()]
[switch]$WellKnownToNTAccount
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Switch ($PSCmdlet.ParameterSetName) {
'SIDToNTAccount' {
[string]$msg = "the SID [$SID] to an NT Account name"
Write-Log -Message "Convert $msg." -Source ${CmdletName}
$NTAccountSID = New-Object -TypeName System.Security.Principal.SecurityIdentifier -ArgumentList $SID
$NTAccount = $NTAccountSID.Translate([System.Security.Principal.NTAccount])
Write-Output $NTAccount
}
'NTAccountToSID' {
[string]$msg = "the NT Account [$AccountName] to a SID"
Write-Log -Message "Convert $msg." -Source ${CmdletName}
$NTAccount = New-Object -TypeName System.Security.Principal.NTAccount -ArgumentList $AccountName
$NTAccountSID = $NTAccount.Translate([System.Security.Principal.SecurityIdentifier])
Write-Output $NTAccountSID
}
'WellKnownName' {
If ($WellKnownToNTAccount) {
[string]$ConversionType = 'NTAccount'
}
Else {
[string]$ConversionType = 'SID'
}
[string]$msg = "the Well Known SID Name [$WellKnownSIDName] to a $ConversionType"
Write-Log -Message "Convert $msg." -Source ${CmdletName}
Try {
$MachineRootDomain = (Get-WmiObject -Class Win32_ComputerSystem -ErrorAction 'Stop').Domain.ToLower()
$ADDomainObj = New-Object -TypeName System.DirectoryServices.DirectoryEntry -ArgumentList "LDAP://$MachineRootDomain"
$DomainSidInBinary = $ADDomainObj.ObjectSid
$DomainSid = New-Object -TypeName System.Security.Principal.SecurityIdentifier -ArgumentList ($DomainSidInBinary[0], 0)
}
Catch {
Write-Log -Message 'Unable to get Domain SID from Active Directory. Setting Domain SID to $null.' -Severity 2 -Source ${CmdletName}
$DomainSid = $null
}
$WellKnownSidType = [Security.Principal.WellKnownSidType]::$WellKnownSIDName
$NTAccountSID = New-Object -TypeName System.Security.Principal.SecurityIdentifier -ArgumentList ($WellKnownSidType, $DomainSid)
If ($WellKnownToNTAccount) {
$NTAccount = $NTAccountSID.Translate([System.Security.Principal.NTAccount])
Write-Output $NTAccount
}
Else {
Write-Output $NTAccountSID
}
}
}
}
Catch {
Write-Log -Message "Failed to convert $msg. It may not be a valid account anymore or there is some other problem. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-UserProfiles {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string[]]$ExcludeNTAccount,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ExcludeSystemProfiles = $true,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$ExcludeDefaultUser = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message 'Get the User Profile Path, User Account SID, and the User Account Name for all users that log onto the machine.' -Source ${CmdletName}
[string]$UserProfileListRegKey = 'Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList'
[psobject[]]$UserProfiles = Get-ChildItem -Path $UserProfileListRegKey -ErrorAction 'Stop' |
ForEach-Object {
Get-ItemProperty -LiteralPath $_.PSPath -ErrorAction 'Stop' | Where-Object { ($_.ProfileImagePath) } |
Select-Object @{ Label = 'NTAccount'; Expression = { $(ConvertTo-NTAccountOrSID -SID $_.PSChildName).Value } }, @{ Label = 'SID'; Expression = { $_.PSChildName } }, @{ Label = 'ProfilePath'; Expression = { $_.ProfileImagePath } }
}
If ($ExcludeSystemProfiles) {
[string[]]$SystemProfiles = 'S-1-5-18', 'S-1-5-19', 'S-1-5-20'
[psobject[]]$UserProfiles = $UserProfiles | Where-Object { $SystemProfiles -notcontains $_.SID }
}
If ($ExcludeNTAccount) {
[psobject[]]$UserProfiles = $UserProfiles | Where-Object { $ExcludeNTAccount -notcontains $_.NTAccount }
}
If (-not $ExcludeDefaultUser) {
[string]$UserProfilesDirectory = Get-ItemProperty -LiteralPath $UserProfileListRegKey -Name ProfilesDirectory -ErrorAction 'Stop' | Select-Object -ExpandProperty ProfilesDirectory
If ([System.Environment]::OSVersion.Version.Major -gt 5) {
[string]$DefaultUserProfileDirectory = Get-ItemProperty -LiteralPath $UserProfileListRegKey -Name 'Default' -ErrorAction 'Stop' | Select-Object -ExpandProperty 'Default'
}
Else {
[string]$DefaultUserProfileName = Get-ItemProperty -LiteralPath $UserProfileListRegKey -Name 'DefaultUsersProfile' -ErrorAction 'Stop' | Select-Object -ExpandProperty 'DefaultUsersProfile'
[string]$DefaultUserProfileDirectory = Join-Path -Path $UserProfilesDirectory -ChildPath $DefaultUserProfileName
}
$DefaultUserProfile = New-Object -TypeName PSObject
$DefaultUserProfile | Add-Member -MemberType NoteProperty -Name NTAccount -Value 'Default User' -Force -ErrorAction 'Stop'
$DefaultUserProfile | Add-Member -MemberType NoteProperty -Name SID -Value 'S-1-5-21-Default-User' -Force -ErrorAction 'Stop'
$DefaultUserProfile | Add-Member -MemberType NoteProperty -Name ProfilePath -Value $DefaultUserProfileDirectory -Force -ErrorAction 'Stop'
$UserProfiles += $DefaultUserProfile
}
Write-Output $UserProfiles
}
Catch {
Write-Log -Message "Failed to create a custom object representing all user profiles on the machine. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-FileVersion {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$File,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message "Get file version info for file [$file]" -Source ${CmdletName}
If (Test-Path -Path $File -PathType Leaf) {
$fileVersion = (Get-Command -Name $file -ErrorAction 'Stop').FileVersionInfo.FileVersion
If ($fileVersion) {
$fileVersion = ($fileVersion -split ' ' | Select-Object -First 1)
Write-Log -Message "File version is [$fileVersion]" -Source ${CmdletName}
Write-Output $fileVersion
}
Else {
Write-Log -Message 'No file version information found.' -Source ${CmdletName}
}
}
Else {
Throw "File path [$file] does not exist."
}
}
Catch {
Write-Log -Message "Failed to get file version info. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to get file version info: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function New-Shortcut {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$TargetPath,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$Arguments,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$IconLocation,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$IconIndex,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$Description,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$WorkingDirectory,
[Parameter(Mandatory=$false)]
[ValidateSet('Normal','Maximized','Minimized')]
[string]$WindowStyle,
[Parameter(Mandatory=$false)]
[switch]$RunAsAdmin,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
If (-not $Shell) { [__comobject]$Shell = New-Object -ComObject WScript.Shell -ErrorAction 'Stop' }
}
Process {
Try {
Try {
[System.IO.FileInfo]$Path = [System.IO.FileInfo]$Path
[string]$PathDirectory = $Path.DirectoryName
If (-not (Test-Path -Path $PathDirectory -PathType Container -ErrorAction 'Stop')) {
Write-Log -Message "Create shortcut directory [$PathDirectory]" -Source ${CmdletName}
New-Item -Path $PathDirectory -ItemType Directory -Force -ErrorAction 'Stop' | Out-Null
}
}
Catch {
Write-Log -Message "Failed to create shortcut directory [$PathDirectory]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Throw
}
Write-Log -Message "Create shortcut [$($path.FullName)]" -Source ${CmdletName}
If (($path.FullName).EndsWith('.url')) {
[string[]]$URLFile = '[InternetShortcut]'
$URLFile += "URL=$targetPath"
If ($iconIndex) { $URLFile += "IconIndex=$iconIndex" }
If ($IconLocation) { $URLFile += "IconFile=$iconLocation" }
$URLFile | Out-File -FilePath $path.FullName -Force -Encoding default -ErrorAction 'Stop'
}
ElseIf (($path.FullName).EndsWith('.lnk')) {
If (($iconLocation -and $iconIndex) -and (-not ($iconLocation.Contains(',')))) {
$iconLocation = $iconLocation + ",$iconIndex"
}
Switch ($windowStyle) {
'Normal' { $windowStyleInt = 1 }
'Maximized' { $windowStyleInt = 3 }
'Minimized' { $windowStyleInt = 7 }
Default { $windowStyleInt = 1 }
}
$shortcut = $shell.CreateShortcut($path.FullName)
$shortcut.TargetPath = $targetPath
$shortcut.Arguments = $arguments
$shortcut.Description = $description
$shortcut.WorkingDirectory = $workingDirectory
$shortcut.WindowStyle = $windowStyleInt
If ($iconLocation) { $shortcut.IconLocation = $iconLocation }
$shortcut.Save()
If ($RunAsAdmin) {
Write-Log -Message 'Set shortcut to run program as administrator.' -Source ${CmdletName}
$TempFileName = [System.IO.Path]::GetRandomFileName()
$TempFile = [System.IO.FileInfo][IO.Path]::Combine($Path.Directory, $TempFileName)
$Writer = New-Object -TypeName System.IO.FileStream -ArgumentList ($TempFile, ([System.IO.FileMode]::Create)) -ErrorAction 'Stop'
$Reader = $Path.OpenRead()
While ($Reader.Position -lt $Reader.Length) {
$Byte = $Reader.ReadByte()
If ($Reader.Position -eq 22) { $Byte = 34 }
$Writer.WriteByte($Byte)
}
$Reader.Close()
$Writer.Close()
$Path.Delete()
Rename-Item -Path $TempFile -NewName $Path.Name -Force -ErrorAction 'Stop' | Out-Null
}
}
}
Catch {
Write-Log -Message "Failed to create shortcut [$($path.FullName)]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to create shortcut [$($path.FullName)]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Execute-ProcessAsUser {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$UserName,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Path,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Parameters = '',
[Parameter(Mandatory=$false)]
[ValidateSet('HighestAvailable','LeastPrivilege')]
[string]$RunLevel = 'HighestAvailable',
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$Wait = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If (Test-Path -Path 'variable:executeProcessAsUserExitCode') { Remove-Variable -Name executeProcessAsUserExitCode -Scope Global}
$global:executeProcessAsUserExitCode = $null
If (($RunLevel -eq 'HighestAvailable') -and (-not $IsAdmin)) {
Write-Log -Message "The function [${CmdletName}] requires the toolkit to be running with Administrator privileges if the [-RunLevel] parameter is set to 'HighestAvailable'." -Severity 3 -Source ${CmdletName}
If ($ContinueOnError) {
Return
}
Else {
[int32]$global:executeProcessAsUserExitCode = 1
Exit
}
}
[string]$schTaskName = "$appDeployToolkitName-ExecuteAsUser"
If (-not (Test-Path -Path $dirAppDeployTemp -PathType Container)) {
New-Item -Path $dirAppDeployTemp -ItemType Directory -Force -ErrorAction 'Stop'
}
If (($Path -eq 'PowerShell.exe') -or ((Split-Path -Path $Path -Leaf) -eq 'PowerShell.exe')) {
[string]$executeProcessAsUserParametersVBS = 'chr(34) & ' + "`"$($Path)`"" + ' & chr(34) & ' + '" ' + ($Parameters -replace '"', "`" & chr(34) & `"" -replace ' & chr\(34\) & "$','') + '"'
[string[]]$executeProcessAsUserScript = "strCommand = $executeProcessAsUserParametersVBS"
$executeProcessAsUserScript += 'set oWShell = CreateObject("WScript.Shell")'
$executeProcessAsUserScript += 'intReturn = oWShell.Run(strCommand, 0, true)'
$executeProcessAsUserScript += 'WScript.Quit intReturn'
$executeProcessAsUserScript | Out-File -FilePath "$dirAppDeployTemp\$($schTaskName).vbs" -Force -Encoding default -ErrorAction 'SilentlyContinue'
$Path = 'wscript.exe'
$Parameters = "`"$dirAppDeployTemp\$($schTaskName).vbs`""
}
[string]$xmlSchTask = @"
<?xml version="1.0" encoding="UTF-16"?>
<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo />
<Triggers />
<Settings>
<MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
<AllowHardTerminate>true</AllowHardTerminate>
<StartWhenAvailable>false</StartWhenAvailable>
<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>
<IdleSettings />
<AllowStartOnDemand>true</AllowStartOnDemand>
<Enabled>true</Enabled>
<Hidden>false</Hidden>
<RunOnlyIfIdle>false</RunOnlyIfIdle>
<WakeToRun>false</WakeToRun>
<ExecutionTimeLimit>PT72H</ExecutionTimeLimit>
<Priority>7</Priority>
</Settings>
<Actions Context="Author">
<Exec>
<Command>$Path</Command>
<Arguments>$Parameters</Arguments>
</Exec>
</Actions>
<Principals>
<Principal id="Author">
<UserId>$UserName</UserId>
<LogonType>InteractiveToken</LogonType>
<RunLevel>$RunLevel</RunLevel>
</Principal>
</Principals>
</Task>
"@
Try {
[string]$xmlSchTaskFilePath = "$dirAppDeployTemp\$schTaskName.xml"
[string]$xmlSchTask | Out-File -FilePath $xmlSchTaskFilePath -Force -ErrorAction Stop
}
Catch {
Write-Log -Message "Failed to export the scheduled task XML file. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If ($ContinueOnError) {
Return
}
Else {
[int32]$global:executeProcessAsUserExitCode = $schTaskResult.ExitCode
Exit
}
}
Try {
If ($Parameters) {
Write-Log -Message "Create scheduled task to run the process [$Path $Parameters] as the logged-on user [$userName]..." -Source ${CmdletName}
}
Else {
Write-Log -Message "Create scheduled task to run the process [$Path] as the logged-on user [$userName]..." -Source ${CmdletName}
}
[psobject]$schTaskResult = Execute-Process -Path $exeSchTasks -Parameters "/create /f /tn $schTaskName /xml `"$xmlSchTaskFilePath`"" -WindowStyle Hidden -CreateNoWindow -PassThru
If ($schTaskResult.ExitCode -ne 0) {
If ($ContinueOnError) {
Return
}
Else {
[int32]$global:executeProcessAsUserExitCode = $schTaskResult.ExitCode
Exit
}
}
}
Catch {
Write-Log -Message "Failed to create scheduled task. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If ($ContinueOnError) {
Return
}
Else {
[int32]$global:executeProcessAsUserExitCode = $schTaskResult.ExitCode
Exit
}
}
Try {
If ($Parameters) {
Write-Log -Message "Trigger execution of scheduled task with command [$Path $Parameters] as the logged-on user [$userName]..." -Source ${CmdletName}
}
Else {
Write-Log -Message "Trigger execution of scheduled task with command [$Path] as the logged-on user [$userName]..." -Source ${CmdletName}
}
[psobject]$schTaskResult = Execute-Process -Path $exeSchTasks -Parameters "/run /i /tn $schTaskName" -WindowStyle Hidden -CreateNoWindow -Passthru
If ($schTaskResult.ExitCode -ne 0) {
If ($ContinueOnError) {
Return
}
Else {
[int32]$global:executeProcessAsUserExitCode = $schTaskResult.ExitCode
Exit
}
}
}
Catch {
Write-Log -Message "Failed to trigger scheduled task. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Write-Log -Message 'Delete the scheduled task which did not to trigger.' -Source ${CmdletName}
Execute-Process -Path $exeSchTasks -Parameters "/delete /tn $schTaskName /f" -WindowStyle Hidden -CreateNoWindow -ContinueOnError $true
If ($ContinueOnError) {
Return
}
Else {
[int32]$global:executeProcessAsUserExitCode = $schTaskResult.ExitCode
Exit
}
}
If ($Wait) {
Write-Log -Message "Waiting for the process launched by the scheduled task [$schTaskName] to complete execution (this may take some time)..." -Source ${CmdletName}
Start-Sleep -Seconds 1
While ((($exeSchTasksResult = & $exeSchTasks /query /TN $schTaskName /V /FO CSV) | ConvertFrom-CSV | Select-Object -ExpandProperty 'Status' | Select-Object -First 1) -eq 'Running') {
Start-Sleep -Seconds 5
}
[int32]$global:executeProcessAsUserExitCode = ($exeSchTasksResult = & $exeSchTasks /query /TN $schTaskName /V /FO CSV) | ConvertFrom-CSV | Select-Object -ExpandProperty 'Last Result' | Select-Object -First 1
Write-Log -Message "Exit code from process launched by scheduled task [$global:executeProcessAsUserExitCode]" -Source ${CmdletName}
}
Try {
Write-Log -Message "Delete scheduled task [$schTaskName]." -Source ${CmdletName}
Execute-Process -Path $exeSchTasks -Parameters "/delete /tn $schTaskName /f" -WindowStyle Hidden -CreateNoWindow -ErrorAction 'Stop'
}
Catch {
Write-Log -Message "Failed to delete scheduled task [$schTaskName]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
Exit
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Refresh-Desktop {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$refreshDesktopSource = @'
private static readonly IntPtr HWND_BROADCAST = new IntPtr(0xffff);
private const int WM_SETTINGCHANGE = 0x1a;
private const int SMTO_ABORTIFHUNG = 0x0002;
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
static extern bool SendNotifyMessage(IntPtr hWnd, int Msg, IntPtr wParam, IntPtr lParam);
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
private static extern IntPtr SendMessageTimeout(IntPtr hWnd, int Msg, IntPtr wParam, string lParam, int fuFlags, int uTimeout, IntPtr lpdwResult);
[DllImport("shell32.dll", CharSet = CharSet.Auto, SetLastError = false)]
private static extern int SHChangeNotify(int eventId, int flags, IntPtr item1, IntPtr item2);
public static void Refresh()
{
// Update desktop icons
SHChangeNotify(0x8000000, 0x1000, IntPtr.Zero, IntPtr.Zero);
// Update environment variables
SendMessageTimeout(HWND_BROADCAST, WM_SETTINGCHANGE, IntPtr.Zero, null, SMTO_ABORTIFHUNG, 100, IntPtr.Zero);
}
'@
If (-not ([System.Management.Automation.PSTypeName]'MyWinAPI.Explorer').Type) {
Add-Type -MemberDefinition $refreshDesktopSource -Namespace MyWinAPI -Name Explorer -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
Write-Log -Message 'Refresh the Desktop and the Windows Explorer environment process block' -Source ${CmdletName}
[MyWinAPI.Explorer]::Refresh()
}
Catch {
Write-Log -Message "Failed to refresh the Desktop and the Windows Explorer environment process block. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to refresh the Desktop and the Windows Explorer environment process block: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Refresh-SessionEnvironmentVariables {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
[scriptblock]$GetEnvironmentVar = {
Param (
$Key,
$Scope
)
[System.Environment]::GetEnvironmentVariable($Key, $Scope)
}
}
Process {
Try {
Write-Log -Message 'Refresh the environment variables for this PowerShell session.' -Source ${CmdletName}
[string]$CurrentUserEnvironmentSID = [System.Security.Principal.WindowsIdentity]::GetCurrent().User.Value
[string]$MachineEnvironmentVars = 'Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment'
[string]$UserEnvironmentVars = "Registry::HKEY_USERS\$CurrentUserEnvironmentSID\Environment"
$MachineEnvironmentVars, $UserEnvironmentVars | Get-Item | Where-Object { $_ } | ForEach-Object { $envRegPath = $_.PSPath; $_ | Select-Object -ExpandProperty Property | ForEach-Object { Set-Item -Path "env:$($_)" -Value (Get-ItemProperty -Path $envRegPath -Name $_).$_ } }
[string[]]$PathFolders = 'Machine', 'User' | ForEach-Object { (& $GetEnvironmentVar -Key 'PATH' -Scope $_) } | Where-Object { $_ } | ForEach-Object { $_.Trim(';') } | ForEach-Object { $_.Split(';') } | ForEach-Object { $_.Trim() } | ForEach-Object { $_.Trim('"') } | Select-Object -Unique
$env:PATH = $PathFolders -join ';'
}
Catch {
Write-Log -Message "Failed to refresh the environment variables for this PowerShell session. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to refresh the environment variables for this PowerShell session: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-ScheduledTask {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$TaskName,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
If (-not $exeSchTasks) { [string]$exeSchTasks = "$env:WINDIR\system32\schtasks.exe" }
[psobject[]]$ScheduledTasks = @()
}
Process {
Try {
Write-Log -Message 'Retrieve Scheduled Tasks' -Source ${CmdletName}
[string[]]$exeSchtasksResults = & $exeSchTasks /Query /V /FO CSV
If ($global:LastExitCode -ne 0) { Throw "Failed to retrieve scheduled tasks using [$exeSchTasks]." }
[psobject[]]$SchtasksResults = $exeSchtasksResults | ConvertFrom-CSV -ErrorAction 'Stop'
If ($SchtasksResults) {
ForEach ($SchtasksResult in $SchtasksResults) {
If ($SchtasksResult.TaskName -match $TaskName) {
$SchtasksResult | Get-Member -MemberType Properties |
ForEach -Begin {
[hashtable]$Task = @{}
} -Process {
($Task.($($_.Name).Replace(' ','').Replace(':',''))) = If ($_.Name -ne $SchtasksResult.($_.Name)) { $SchtasksResult.($_.Name) }
} -End {
If (($Task.Values | Select-Object -Unique | Measure-Object).Count) {
$ScheduledTasks += New-Object -TypeName PSObject -Property $Task
}
}
}
}
}
}
Catch {
Write-Log -Message "Failed to retrieve scheduled tasks. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to retrieve scheduled tasks: $($_.Exception.Message)"
}
}
}
End {
Write-Output $ScheduledTasks
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Block-AppExecution {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string[]]$ProcessName
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeNonInteractive) {
Write-Log -Message "Bypassing Function [${CmdletName}] [Mode: $deployMode]" -Source ${CmdletName}
Return
}
[string]$schTaskBlockedAppsName = $installName + '_BlockedApps'
If (-not (Test-Path -Path $dirAppDeployTemp -PathType Container -ErrorAction 'SilentlyContinue')) {
New-Item -Path $dirAppDeployTemp -ItemType Directory -ErrorAction 'SilentlyContinue' | Out-Null
}
Copy-Item -Path "$scriptRoot\*.*" -Destination $dirAppDeployTemp -Exclude 'thumbs.db' -Force -Recurse -ErrorAction 'SilentlyContinue'
[string]$debuggerBlockMessageCmd = "`"powershell.exe -ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden -File `" & chr(34) & `"$dirAppDeployTemp\$scriptFileName`" & chr(34) & `" -ShowBlockedAppDialog -ReferringApplication `" & chr(34) & `"$installName`" & chr(34)"
[string[]]$debuggerBlockScript = "strCommand = $debuggerBlockMessageCmd"
$debuggerBlockScript += 'set oWShell = CreateObject("WScript.Shell")'
$debuggerBlockScript += 'oWShell.Run strCommand, 0, false'
$debuggerBlockScript | Out-File -FilePath "$dirAppDeployTemp\AppDeployToolkit_BlockAppExecutionMessage.vbs" -Force -Encoding default -ErrorAction 'SilentlyContinue'
[string]$debuggerBlockValue = "wscript.exe `"$dirAppDeployTemp\AppDeployToolkit_BlockAppExecutionMessage.vbs`""
Write-Log -Message 'Create scheduled task to cleanup blocked applications in case installation is interrupted.' -Source ${CmdletName}
If (Get-ScheduledTask -ContinueOnError $true | Select-Object -Property TaskName | Where-Object { $_.TaskName -eq "\$schTaskBlockedAppsName" }) {
Write-Log -Message "Scheduled task [$schTaskBlockedAppsName] already exists." -Source ${CmdletName}
}
Else {
[string[]]$schTaskCreationBatchFile = '@ECHO OFF'
$schTaskCreationBatchFile += "powershell.exe -ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden -File `"$dirAppDeployTemp\$scriptFileName`" -CleanupBlockedApps -ReferringApplication `"$installName`""
$schTaskCreationBatchFile | Out-File -FilePath "$dirAppDeployTemp\AppDeployToolkit_UnBlockApps.bat" -Force -Encoding default -ErrorAction 'SilentlyContinue'
$schTaskCreation = Execute-Process -Path $exeSchTasks -Parameters "/Create /TN $schTaskBlockedAppsName /RU `"$LocalSystemNTAccount`" /SC ONSTART /TR `"$dirAppDeployTemp\AppDeployToolkit_UnBlockApps.bat`"" -PassThru
}
[string[]]$blockProcessName = $processName
[string[]]$blockProcessName = $blockProcessName | ForEach-Object { $_ + '.exe' } -ErrorAction 'SilentlyContinue'
ForEach ($blockProcess in $blockProcessName) {
Write-Log -Message "Set the Image File Execution Option registry key to block execution of [$blockProcess]." -Source ${CmdletName}
Set-RegistryKey -Key (Join-Path -Path $regKeyAppExecution -ChildPath $blockProcess) -Name 'Debugger' -Value $debuggerBlockValue -ContinueOnError $true
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Unblock-AppExecution {
[CmdletBinding()]
Param (
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeNonInteractive) {
Write-Log -Message "Bypassing Function [${CmdletName}] [Mode: $deployMode]" -Source ${CmdletName}
Return
}
[psobject[]]$unblockProcesses = $null
[psobject[]]$unblockProcesses += (Get-ChildItem -Path $regKeyAppExecution -Recurse -ErrorAction 'SilentlyContinue' | ForEach-Object { Get-ItemProperty -LiteralPath $_.PSPath -ErrorAction 'SilentlyContinue'})
ForEach ($unblockProcess in ($unblockProcesses | Where-Object { $_.Debugger -like '*AppDeployToolkit_BlockAppExecutionMessage*' })) {
Write-Log -Message "Remove the Image File Execution Options registry key to unblock execution of [$($unblockProcess.PSChildName)]." -Source ${CmdletName}
$unblockProcess | Remove-ItemProperty -Name Debugger -ErrorAction 'SilentlyContinue'
}
If ($BlockExecution) {
Set-Variable -Name BlockExecution -Value $false -Scope Script
}
[string]$schTaskBlockedAppsName = $installName + '_BlockedApps'
If (Get-ScheduledTask -ContinueOnError $true | Select-Object -Property TaskName | Where-Object { $_.TaskName -eq "\$schTaskBlockedAppsName" }) {
Write-Log -Message "Delete Scheduled Task [$schTaskBlockedAppsName]." -Source ${CmdletName}
Execute-Process -Path $exeSchTasks -Parameters "/Delete /TN $schTaskBlockedAppsName /F"
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-DeferHistory {
[CmdletBinding()]
Param (
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Write-Log -Message 'Get deferral history...' -Source ${CmdletName}
Get-RegistryKey -Key $regKeyDeferHistory -ContinueOnError $true
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Set-DeferHistory {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[string]$deferTimesRemaining,
[Parameter(Mandatory=$false)]
[string]$deferDeadline
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deferTimesRemaining -and ($deferTimesRemaining -ge 0)) {
Write-Log -Message "Set deferral history: [DeferTimesRemaining = $deferTimes]" -Source ${CmdletName}
Set-RegistryKey -Key $regKeyDeferHistory -Name 'DeferTimesRemaining' -Value $deferTimesRemaining -ContinueOnError $true
}
If ($deferDeadline) {
Write-Log -Message "Set deferral history: [DeferDeadline = $deferDeadline]" -Source ${CmdletName}
Set-RegistryKey -Key $regKeyDeferHistory -Name 'DeferDeadline' -Value $deferDeadline -ContinueOnError $true
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-UniversalDate {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$DateTime = ((Get-Date -Format ($culture).DateTimeFormat.FullDateTimePattern).ToString()),
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
$ContinueOnError = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ($DateTime -match 'Z$') { $DateTime = $DateTime -replace 'Z$', '' }
[datetime]$DateTime = [datetime]::Parse($DateTime, $culture)
Write-Log -Message "Convert the date [$DateTime] to a universal sortable date time pattern based on the current culture [$($culture.Name)]" -Source ${CmdletName}
[string]$universalDateTime = (Get-Date -Date $DateTime -Format ($culture).DateTimeFormat.UniversalSortableDateTimePattern -ErrorAction 'Stop').ToString()
Write-Output $universalDateTime
}
Catch {
Write-Log -Message "The specified date/time [$DateTime] is not in a format recognized by the current culture [$($culture.Name)]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "The specified date/time [$DateTime] is not in a format recognized by the current culture: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-RunningProcesses {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[psobject[]]$ProcessObjects
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($processObjects) {
[string]$runningAppsCheck = ($processObjects | ForEach-Object { $_.ProcessName }) -join ','
Write-Log -Message "Check for running application(s) [$runningAppsCheck]..." -Source ${CmdletName}
[string]$processNames = ($processObjects | ForEach-Object { [regex]::Escape($_.ProcessName) }) -join '|'
[System.Diagnostics.Process[]]$runningProcesses = Get-Process | Where-Object { $_.ProcessName -match $processNames }
[array]$runningProcesses = $runningProcesses | ForEach-Object { $_ } | Select-Object -Property ProcessName, Description, ID
If ($runningProcesses) {
[string]$runningProcessList = ($runningProcesses | ForEach-Object { $_.ProcessName } | Select-Object -Unique) -join ','
Write-Log -Message "The following processes are running: [$runningProcessList]" -Source ${CmdletName}
Write-Log -Message 'Resolve process descriptions...' -Source ${CmdletName}
ForEach ($runningProcess in $runningProcesses) {
ForEach ($processObject in $processObjects) {
If ($runningProcess.ProcessName -eq ($processObject.ProcessName -replace '.exe', '')) {
If ($processObject.ProcessDescription) {
$runningProcess | Add-Member -MemberType NoteProperty -Name Description -Value $processObject.ProcessDescription -Force -ErrorAction 'SilentlyContinue'
}
}
}
If (-not ($runningProcess.Description)) {
$runningProcess | Add-Member -MemberType NoteProperty -Name Description -Value $runningProcess.ProcessName -Force -ErrorAction 'SilentlyContinue'
}
}
}
Else {
Write-Log -Message 'Application(s) are not running.' -Source ${CmdletName}
}
Write-Log -Message 'Finished checking running application(s).' -Source ${CmdletName}
Write-Output $runningProcesses
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Show-InstallationWelcome {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$CloseApps,
[Parameter(Mandatory=$false)]
[switch]$Silent = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$CloseAppsCountdown = 0,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$ForceCloseAppsCountdown = 0,
[Parameter(Mandatory=$false)]
[switch]$PersistPrompt = $false,
[Parameter(Mandatory=$false)]
[switch]$BlockExecution = $false,
[Parameter(Mandatory=$false)]
[switch]$AllowDefer = $false,
[Parameter(Mandatory=$false)]
[switch]$AllowDeferCloseApps = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$DeferTimes = 0,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$DeferDays = 0,
[Parameter(Mandatory=$false)]
[string]$DeferDeadline = '',
[Parameter(Mandatory=$false)]
[switch]$CheckDiskSpace = $false,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$RequiredDiskSpace = 0,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$MinimizeWindows = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeNonInteractive) { $Silent = $true }
If ($CheckDiskSpace) {
Write-Log -Message 'Evaluate disk space requirements.' -Source ${CmdletName}
[double]$freeDiskSpace = Get-FreeDiskSpace
If ($RequiredDiskSpace -eq 0) {
Try {
$fso = New-Object -ComObject Scripting.FileSystemObject -ErrorAction 'Stop'
$RequiredDiskSpace = [math]::Round((($fso.GetFolder($scriptParentPath).Size) / 1MB))
}
Catch {
Write-Log -Message "Failed to calculate disk space requirement from source files. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
If ($freeDiskSpace -lt $RequiredDiskSpace) {
Write-Log -Message "Failed to meet minimum disk space requirement. Space Required [$RequiredDiskSpace MB], Space Available [$freeDiskSpace MB]." -Severity 3 -Source ${CmdletName}
If (-not $Silent) {
Show-InstallationPrompt -Message ($configDiskSpaceMessage -f $installTitle, $RequiredDiskSpace, ($freeDiskSpace)) -ButtonRightText 'OK' -Icon 'Error'
}
Exit-Script -ExitCode $configInstallationUIExitCode
}
Else {
Write-Log -Message 'Successfully passed minimum disk space requirement check.' -Source ${CmdletName}
}
}
If ($CloseApps) {
[psobject[]]$processObjects = @()
ForEach ($process in ($CloseApps -split ',' | Where-Object { -not ([string]::IsNullOrEmpty($_)) })) {
$process = $process -split '='
$processObjects += New-Object -TypeName PSObject -Property @{
ProcessName = $process[0]
ProcessDescription = $process[1]
}
}
}
If (($allowDefer) -or ($AllowDeferCloseApps)) {
$allowDefer = $true
$deferHistory = Get-DeferHistory
$deferHistoryTimes = $deferHistory | Select-Object -ExpandProperty DeferTimesRemaining -ErrorAction 'SilentlyContinue'
$deferHistoryDeadline = $deferHistory | Select-Object -ExpandProperty DeferDeadline -ErrorAction 'SilentlyContinue'
$checkDeferDays = $false
$checkDeferDeadline = $false
If ($DeferDays -ne 0) { $checkDeferDays = $true }
If ($DeferDeadline) { $checkDeferDeadline = $true }
If ($DeferTimes -ne 0) {
If ($deferHistoryTimes -ge 0) {
Write-Log -Message "Defer history shows [$($deferHistory.DeferTimesRemaining)] deferrals remaining." -Source ${CmdletName}
$DeferTimes = $deferHistory.DeferTimesRemaining - 1
}
Else {
$DeferTimes = $DeferTimes - 1
}
Write-Log -Message "User has [$deferTimes] deferrals remaining." -Source ${CmdletName}
If ($DeferTimes -lt 0) {
Write-Log -Message 'Deferral has expired.' -Source ${CmdletName}
$AllowDefer = $false
}
}
Else {
[string]$DeferTimes = ''
}
If ($checkDeferDays -and $allowDefer) {
If ($deferHistoryDeadline) {
Write-Log -Message "Defer history shows a deadline date of [$deferHistoryDeadline]." -Source ${CmdletName}
[string]$deferDeadlineUniversal = Get-UniversalDate -DateTime $deferHistoryDeadline
}
Else {
[string]$deferDeadlineUniversal = Get-UniversalDate -DateTime (Get-Date -Date ((Get-Date).AddDays($deferDays)) -Format ($culture).DateTimeFormat.FullDateTimePattern)
}
Write-Log -Message "User has until [$deferDeadlineUniversal] before deferral expires." -Source ${CmdletName}
If ((Get-UniversalDate) -gt $deferDeadlineUniversal) {
Write-Log -Message 'Deferral has expired.' -Source ${CmdletName}
$AllowDefer = $false
}
}
If ($checkDeferDeadline -and $allowDefer) {
Try {
[string]$deferDeadlineUniversal = Get-UniversalDate -DateTime $deferDeadline -ErrorAction 'Stop'
}
Catch {
Write-Log -Message "Date is not in the correct format for the current culture. Type the date in the current locale format, such as 20/08/2014 (Europe) or 08/20/2014 (United States). If the script is intended for multiple cultures, specify the date in the universal sortable date/time format, e.g. '2013-08-22 11:51:52Z'. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Throw "Date is not in the correct format for the current culture. Type the date in the current locale format, such as 20/08/2014 (Europe) or 08/20/2014 (United States). If the script is intended for multiple cultures, specify the date in the universal sortable date/time format, e.g. '2013-08-22 11:51:52Z': $($_.Exception.Message)"
}
Write-Log -Message "User has until [$deferDeadlineUniversal] remaining." -Source ${CmdletName}
If ((Get-UniversalDate) -gt $deferDeadlineUniversal) {
Write-Log -Message 'Deferral has expired.' -Source ${CmdletName}
$AllowDefer = $false
}
}
}
If (($deferTimes -lt 0) -and (-not ($deferDeadlineUniversal))) { $AllowDefer = $false }
If (-not ($deployModeSilent) -and (-not ($silent))) {
If ($forceCloseAppsCountdown -gt 0) {
$closeAppsCountdown = $forceCloseAppsCountdown
[boolean]$forceCloseAppsCountdown = $true
}
Set-Variable -Name closeAppsCountdownGlobal -Value $closeAppsCountdown -Scope Script
While ((Get-RunningProcesses -ProcessObjects $processObjects | Select-Object -Property * -OutVariable RunningProcesses) -or (($promptResult -ne 'Defer') -and ($promptResult -ne 'Close'))) {
[string]$runningProcessDescriptions = ($runningProcesses | Select-Object -ExpandProperty Description | Select-Object -Unique | Sort-Object) -join ','
If ($allowDefer) {
If ($AllowDeferCloseApps -and ($runningProcessDescriptions -eq '')) {
Break
}
ElseIf (($promptResult -ne 'Close') -or (($runningProcessDescriptions -ne '') -and ($promptResult -ne 'Continue'))) {
[string]$promptResult = Show-WelcomePrompt -ProcessDescriptions $runningProcessDescriptions -CloseAppsCountdown $closeAppsCountdownGlobal -ForceCloseAppsCountdown $forceCloseAppsCountdown -PersistPrompt $PersistPrompt -AllowDefer -DeferTimes $deferTimes -DeferDeadline $deferDeadlineUniversal -MinimizeWindows $minimizeWindows
}
}
ElseIf ($runningProcessDescriptions -ne '') {
[string]$promptResult = Show-WelcomePrompt -ProcessDescriptions $runningProcessDescriptions -CloseAppsCountdown $closeAppsCountdownGlobal -ForceCloseAppsCountdown $forceCloseAppsCountdown -PersistPrompt $PersistPrompt -MinimizeWindows $minimizeWindows
}
Else {
Break
}
If ($promptResult -eq 'Continue') {
Write-Log -Message 'User selected to continue...' -Source ${CmdletName}
Start-Sleep -Seconds 2
If (-not ($runningProcesses)) { Break }
}
ElseIf ($promptResult -eq 'Close') {
Write-Log -Message 'User selected to force the application(s) to close...' -Source ${CmdletName}
ForEach ($runningProcess in $runningProcesses) {
Write-Log -Message "Stop process $($runningProcess.Name)..." -Source ${CmdletName}
Stop-Process -Id ($runningProcess | Select-Object -ExpandProperty Id) -Force -ErrorAction 'SilentlyContinue'
}
Start-Sleep -Seconds 2
}
ElseIf ($promptResult -eq 'Timeout') {
Write-Log -Message 'Installation not actioned before the timeout value.' -Source ${CmdletName}
$BlockExecution = $false
If (($deferTimes) -or ($deferDeadlineUniversal)) {
Set-DeferHistory -DeferTimesRemaining $DeferTimes -DeferDeadline $deferDeadlineUniversal
}
If ($script:welcomeTimer) {
Try {
$script:welcomeTimer.Dispose()
$script:welcomeTimer = $null
}
Catch { }
}
Exit-Script -ExitCode $configInstallationUIExitCode
}
ElseIf ($promptResult -eq 'Defer') {
Write-Log -Message 'Installation deferred by the user.' -Source ${CmdletName}
$BlockExecution = $false
Set-DeferHistory -DeferTimesRemaining $DeferTimes -DeferDeadline $deferDeadlineUniversal
Exit-Script -ExitCode $configInstallationDeferExitCode
}
}
}
If (($Silent -or $deployModeSilent) -and $CloseApps) {
[array]$runningProcesses = $null
[array]$runningProcesses = Get-RunningProcesses $processObjects
If ($runningProcesses) {
[string]$runningProcessDescriptions = ($runningProcesses | Select-Object -ExpandProperty Description | Select-Object -Unique | Sort-Object) -join ','
Write-Log -Message "Force close application(s) [$($runningProcessDescriptions)] without prompting user." -Source ${CmdletName}
$runningProcesses | Stop-Process -Force -ErrorAction 'SilentlyContinue'
Start-Sleep -Seconds 2
}
}
If (($processObjects | ForEach-Object { $_.ProcessName }) -match 'notes') {
[string]$notesPath = Get-Item -Path $regKeyLotusNotes -ErrorAction 'SilentlyContinue' | Get-ItemProperty | Select-Object -ExpandProperty Path
If ($notesPath) {
[string]$notesNSDExecutable = Join-Path -Path $notesPath -ChildPath 'NSD.Exe'
Try {
If (Test-Path -Path $notesNSDExecutable -PathType Leaf -ErrorAction 'Stop') {
Write-Log -Message "Execute [$notesNSDExecutable] with the -kill argument..." -Source ${CmdletName}
[System.Diagnostics.Process]$notesNSDProcess = Start-Process -FilePath $notesNSDExecutable -ArgumentList '-kill' -WindowStyle Hidden -PassThru -ErrorAction 'Stop'
If (-not ($notesNSDProcess.WaitForExit(10000))) {
Write-Log -Message "[$notesNSDExecutable] did not end in a timely manner. Force terminate process." -Source ${CmdletName}
Stop-Process -Name 'NSD' -Force -ErrorAction 'SilentlyContinue'
}
}
}
Catch {
Write-Log -Message "Failed to launch [$notesNSDExecutable]. `n$(Resolve-Error)" -Source ${CmdletName}
}
Write-Log -Message "[$notesNSDExecutable] returned exit code [$($notesNSDProcess.Exitcode)]" -Source ${CmdletName}
Stop-Process -Name 'NSD' -Force -ErrorAction 'SilentlyContinue'
}
[string[]]$notesPathExes = Get-ChildItem -Path $notesPath -Filter '*.exe' -Recurse | Select-Object -ExpandProperty BaseName | Sort-Object
If ($notesPathExes) {
[array]$processesIgnoringNotesExceptions = Compare-Object -ReferenceObject ($processObjects | Select-Object -ExpandProperty ProcessName | Sort-Object) -DifferenceObject $notesPathExes -IncludeEqual | Where-Object { ($_.SideIndicator -eq '<=') -or ($_.InputObject -eq 'notes') } | Select-Object -ExpandProperty InputObject
[array]$processObjects = $processObjects | Where-Object { $processesIgnoringNotesExceptions -contains $_.ProcessName }
}
}
If ($BlockExecution) {
Set-Variable -Name BlockExecution -Value $BlockExecution -Scope Script
Write-Log -Message '[-BlockExecution] parameter specified.' -Source ${CmdletName}
Block-AppExecution -ProcessName ($processObjects | Select-Object -ExpandProperty ProcessName)
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Show-WelcomePrompt {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[string]$ProcessDescriptions,
[Parameter(Mandatory=$false)]
[int32]$CloseAppsCountdown,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ForceCloseAppsCountdown,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$PersistPrompt = $false,
[Parameter(Mandatory=$false)]
[switch]$AllowDefer = $false,
[Parameter(Mandatory=$false)]
[int32]$DeferTimes,
[Parameter(Mandatory=$false)]
[string]$DeferDeadline,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$MinimizeWindows = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If (-not $IsProcessUserInteractive) {
[string]$promptResult = Invoke-PSCommandAsUser -PassThru -Command ([scriptblock]::Create("Show-WelcomePrompt -ProcessDescriptions '$ProcessDescriptions' -CloseAppsCountdown $CloseAppsCountdown -ForceCloseAppsCountdown `$$ForceCloseAppsCountdown -PersistPrompt `$$PersistPrompt -AllowDefer:`$$AllowDefer -DeferTimes $DeferTimes -DeferDeadline '$DeferDeadline' -MinimizeWindows `$$MinimizeWindows"))
Return $promptResult
}
[boolean]$showCloseApps = $false
[boolean]$showDefer = $false
[boolean]$persistWindow = $false
[datetime]$startTime = Get-Date
[datetime]$countdownTime = $startTime
If ($CloseAppsCountdown) {
If ($CloseAppsCountdown -gt $configInstallationUITimeout) {
Throw 'The close applications countdown time cannot be longer than the timeout specified in the XML configuration for installation UI dialogs to timeout.'
}
}
If ($processDescriptions) {
Write-Log -Message "Prompt user to close application(s) [$runningProcessDescriptions]..." -Source ${CmdletName}
$showCloseApps = $true
}
If (($allowDefer) -and (($deferTimes -ge 0) -or ($deferDeadline))) {
Write-Log -Message 'User has the option to defer.' -Source ${CmdletName}
$showDefer = $true
If ($deferDeadline) {
$deferDeadline = $deferDeadline -replace 'Z',''
[string]$deferDeadline = (Get-Date -Date $deferDeadline).ToString()
}
}
If ($showDefer) {
If ($closeAppsCountdown -gt 0) {
Write-Log -Message "Close applications countdown has [$closeAppsCountdown] seconds remaining." -Source ${CmdletName}
$showCountdown = $true
}
If ($persistPrompt) { $persistWindow = $true }
}
If ($forceCloseAppsCountdown -eq $true) {
Write-Log -Message "Close applications countdown has [$closeAppsCountdown] seconds remaining." -Source ${CmdletName}
$showCountdown = $true
}
[string[]]$processDescriptions = $processDescriptions.Split(',')
[System.Windows.Forms.Application]::EnableVisualStyles()
$formWelcome = New-Object -TypeName System.Windows.Forms.Form
$pictureBanner = New-Object -TypeName System.Windows.Forms.PictureBox
$labelAppName = New-Object -TypeName System.Windows.Forms.Label
$labelCountdown = New-Object -TypeName System.Windows.Forms.Label
$labelDefer = New-Object -TypeName System.Windows.Forms.Label
$listBoxCloseApps = New-Object -TypeName System.Windows.Forms.ListBox
$buttonContinue = New-Object -TypeName System.Windows.Forms.Button
$buttonDefer = New-Object -TypeName System.Windows.Forms.Button
$buttonCloseApps = New-Object -TypeName System.Windows.Forms.Button
$buttonAbort = New-Object -TypeName System.Windows.Forms.Button
$formWelcomeWindowState = New-Object -TypeName System.Windows.Forms.FormWindowState
$flowLayoutPanel = New-Object -TypeName System.Windows.Forms.FlowLayoutPanel
$panelButtons = New-Object -TypeName System.Windows.Forms.Panel
[scriptblock]$Form_Cleanup_FormClosed = {
Try {
$labelAppName.remove_Click($handler_labelAppName_Click)
$labelDefer.remove_Click($handler_labelDefer_Click)
$buttonCloseApps.remove_Click($buttonCloseApps_OnClick)
$buttonContinue.remove_Click($buttonContinue_OnClick)
$buttonDefer.remove_Click($buttonDefer_OnClick)
$buttonAbort.remove_Click($buttonAbort_OnClick)
$script:welcomeTimer.remove_Tick($timer_Tick)
$timerPersist.remove_Tick($timerPersist_Tick)
$formWelcome.remove_Load($Form_StateCorrection_Load)
$formWelcome.remove_FormClosed($Form_Cleanup_FormClosed)
}
Catch {
}
}
[scriptblock]$Form_StateCorrection_Load = {
$formWelcome.WindowState = 'Normal'
$formWelcome.AutoSize = $true
$formWelcome.TopMost = $true
$formWelcome.BringToFront()
Set-Variable -Name formWelcomeStartPosition -Value $formWelcome.Location -Scope Script
[datetime]$currentTime = Get-Date
[datetime]$countdownTime = $startTime.AddSeconds($CloseAppsCountdown)
$script:welcomeTimer.Start()
[timespan]$remainingTime = $countdownTime.Subtract($currentTime)
[string]$labelCountdownSeconds = [string]::Format('{0}:{1:d2}:{2:d2}', $remainingTime.Hours, $remainingTime.Minutes, $remainingTime.Seconds)
$labelCountdown.Text = "$configClosePromptCountdownMessage`n$labelCountdownSeconds"
}
If (-not ($script:welcomeTimer)) {
$script:welcomeTimer = New-Object -TypeName System.Windows.Forms.Timer
}
If ($showCountdown) {
[scriptblock]$timer_Tick = {
[datetime]$currentTime = Get-Date
[datetime]$countdownTime = $startTime.AddSeconds($CloseAppsCountdown)
[timespan]$remainingTime = $countdownTime.Subtract($currentTime)
Set-Variable -Name closeAppsCountdownGlobal -Value $remainingTime.TotalSeconds -Scope Script
If ($countdownTime -lt $currentTime) {
Write-Log -Message 'Close application(s) countdown timer has elapsed. Force closing application(s).' -Source ${CmdletName}
$buttonCloseApps.PerformClick()
}
Else {
[string]$labelCountdownSeconds = [string]::Format('{0}:{1:d2}:{2:d2}', $remainingTime.Hours, $remainingTime.Minutes, $remainingTime.Seconds)
$labelCountdown.Text = "$configClosePromptCountdownMessage`n$labelCountdownSeconds"
[System.Windows.Forms.Application]::DoEvents()
}
}
}
Else {
$script:welcomeTimer.Interval = ($configInstallationUITimeout * 1000)
[scriptblock]$timer_Tick = { $buttonAbort.PerformClick() }
}
$script:welcomeTimer.add_Tick($timer_Tick)
If ($persistWindow) {
$timerPersist = New-Object -TypeName System.Windows.Forms.Timer
$timerPersist.Interval = ($configInstallationPersistInterval * 1000)
[scriptblock]$timerPersist_Tick = { Refresh-InstallationWelcome }
$timerPersist.add_Tick($timerPersist_Tick)
$timerPersist.Start()
}
$formWelcome.Controls.Add($pictureBanner)
$formWelcome.Controls.Add($buttonAbort)
$paddingNone = New-Object -TypeName System.Windows.Forms.Padding
$paddingNone.Top = 0
$paddingNone.Bottom = 0
$paddingNone.Left = 0
$paddingNone.Right = 0
$labelPadding = '20,0,20,0'
$buttonWidth = 110
$buttonHeight = 23
$buttonPadding = 50
$buttonSize = New-Object -TypeName System.Drawing.Size
$buttonSize.Width = $buttonWidth
$buttonSize.Height = $buttonHeight
$buttonPadding = New-Object -TypeName System.Windows.Forms.Padding
$buttonPadding.Top = 0
$buttonPadding.Bottom = 5
$buttonPadding.Left = 50
$buttonPadding.Right = 0
$pictureBanner.DataBindings.DefaultDataSourceUpdateMode = 0
$pictureBanner.ImageLocation = $appDeployLogoBanner
$System_Drawing_Point = New-Object -TypeName System.Drawing.Point
$System_Drawing_Point.X = 0
$System_Drawing_Point.Y = 0
$pictureBanner.Location = $System_Drawing_Point
$pictureBanner.Name = 'pictureBanner'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 50
$System_Drawing_Size.Width = 450
$pictureBanner.Size = $System_Drawing_Size
$pictureBanner.SizeMode = 'CenterImage'
$pictureBanner.Margin = $paddingNone
$pictureBanner.TabIndex = 0
$pictureBanner.TabStop = $false
$labelAppName.DataBindings.DefaultDataSourceUpdateMode = 0
$labelAppName.Name = 'labelAppName'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
If (-not $showCloseApps) {
$System_Drawing_Size.Height = 40
}
Else {
$System_Drawing_Size.Height = 65
}
$System_Drawing_Size.Width = 450
$labelAppName.Size = $System_Drawing_Size
$System_Drawing_Size.Height = 0
$labelAppName.MaximumSize = $System_Drawing_Size
$labelAppName.Margin = '0,15,0,15'
$labelAppName.Padding = $labelPadding
$labelAppName.TabIndex = 1
If ($showCloseApps) {
$labelAppNameText = $configClosePromptMessage
}
ElseIf ($showDefer) {
$labelAppNameText = "$configDeferPromptWelcomeMessage `n$installTitle"
}
$labelAppName.Text = $labelAppNameText
$labelAppName.TextAlign = 'TopCenter'
$labelAppName.Anchor = 'Top'
$labelAppName.AutoSize = $true
$labelAppName.add_Click($handler_labelAppName_Click)
$listBoxCloseApps.DataBindings.DefaultDataSourceUpdateMode = 0
$listBoxCloseApps.FormattingEnabled = $true
$listBoxCloseApps.Name = 'listBoxCloseApps'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 100
$System_Drawing_Size.Width = 300
$listBoxCloseApps.Size = $System_Drawing_Size
$listBoxCloseApps.Margin = '75,0,0,0'
$listBoxCloseApps.TabIndex = 3
ForEach ($processDescription in $ProcessDescriptions) {
$listboxCloseApps.Items.Add($processDescription) | Out-Null
}
$labelDefer.DataBindings.DefaultDataSourceUpdateMode = 0
$labelDefer.Name = 'labelDefer'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 90
$System_Drawing_Size.Width = 450
$labelDefer.Size = $System_Drawing_Size
$System_Drawing_Size.Height = 0
$labelDefer.MaximumSize = $System_Drawing_Size
$labelDefer.Margin = $paddingNone
$labelDefer.Padding = $labelPadding
$labelDefer.TabIndex = 4
$deferralText = "$configDeferPromptExpiryMessage`n"
If ($deferTimes -ge 0) {
$deferralText = "$deferralText `n$configDeferPromptRemainingDeferrals $($deferTimes + 1)"
}
If ($deferDeadline) {
$deferralText = "$deferralText `n$configDeferPromptDeadline $deferDeadline"
}
If (($deferTimes -lt 0) -and (-not $DeferDeadline)) {
$deferralText = "$deferralText `n$configDeferPromptNoDeadline"
}
$deferralText = "$deferralText `n`n$configDeferPromptWarningMessage"
$labelDefer.Text = $deferralText
$labelDefer.TextAlign = 'MiddleCenter'
$labelDefer.AutoSize = $true
$labelDefer.add_Click($handler_labelDefer_Click)
$labelCountdown.DataBindings.DefaultDataSourceUpdateMode = 0
$labelCountdown.Name = 'labelCountdown'
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 40
$System_Drawing_Size.Width = 450
$labelCountdown.Size = $System_Drawing_Size
$System_Drawing_Size.Height = 0
$labelCountdown.MaximumSize = $System_Drawing_Size
$labelCountdown.Margin = $paddingNone
$labelCountdown.Padding = $labelPadding
$labelCountdown.TabIndex = 4
$labelCountdown.Font = 'Microsoft Sans Serif, 9pt, style=Bold'
$labelCountdown.Text = '00:00:00'
$labelCountdown.TextAlign = 'MiddleCenter'
$labelCountdown.AutoSize = $true
$labelCountdown.add_Click($handler_labelDefer_Click)
$System_Drawing_Point = New-Object -TypeName System.Drawing.Point
$System_Drawing_Point.X = 0
$System_Drawing_Point.Y = 50
$flowLayoutPanel.Location = $System_Drawing_Point
$flowLayoutPanel.AutoSize = $true
$flowLayoutPanel.Anchor = 'Top'
$flowLayoutPanel.FlowDirection = 'TopDown'
$flowLayoutPanel.WrapContents = $true
$flowLayoutPanel.Controls.Add($labelAppName)
If ($showCloseApps) { $flowLayoutPanel.Controls.Add($listBoxCloseApps) }
If ($showDefer) {
$flowLayoutPanel.Controls.Add($labelDefer)
}
If ($showCloseApps -and $showCountdown) {
$flowLayoutPanel.Controls.Add($labelCountdown)
}
$buttonCloseApps.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonCloseApps.Location = '15,0'
$buttonCloseApps.Name = 'buttonCloseApps'
$buttonCloseApps.Size = $buttonSize
$buttonCloseApps.TabIndex = 5
$buttonCloseApps.Text = $configClosePromptButtonClose
$buttonCloseApps.DialogResult = 'Yes'
$buttonCloseApps.AutoSize = $true
$buttonCloseApps.UseVisualStyleBackColor = $true
$buttonCloseApps.add_Click($buttonCloseApps_OnClick)
$buttonDefer.DataBindings.DefaultDataSourceUpdateMode = 0
If (-not $showCloseApps) {
$buttonDefer.Location = '15,0'
}
Else {
$buttonDefer.Location = '170,0'
}
$buttonDefer.Name = 'buttonDefer'
$buttonDefer.Size = $buttonSize
$buttonDefer.TabIndex = 6
$buttonDefer.Text = $configClosePromptButtonDefer
$buttonDefer.DialogResult = 'No'
$buttonDefer.AutoSize = $true
$buttonDefer.UseVisualStyleBackColor = $true
$buttonDefer.add_Click($buttonDefer_OnClick)
$buttonContinue.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonContinue.Location = '325,0'
$buttonContinue.Name = 'buttonContinue'
$buttonContinue.Size = $buttonSize
$buttonContinue.TabIndex = 7
$buttonContinue.Text = $configClosePromptButtonContinue
$buttonContinue.DialogResult = 'OK'
$buttonContinue.AutoSize = $true
$buttonContinue.UseVisualStyleBackColor = $true
$buttonContinue.add_Click($buttonContinue_OnClick)
$buttonAbort.DataBindings.DefaultDataSourceUpdateMode = 0
$buttonAbort.Name = 'buttonAbort'
$buttonAbort.Size = '1,1'
$buttonAbort.DialogResult = 'Abort'
$buttonAbort.TabIndex = 5
$buttonAbort.UseVisualStyleBackColor = $true
$buttonAbort.add_Click($buttonAbort_OnClick)
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 0
$System_Drawing_Size.Width = 0
$formWelcome.Size = $System_Drawing_Size
$formWelcome.Padding = $paddingNone
$formWelcome.Margin = $paddingNone
$formWelcome.DataBindings.DefaultDataSourceUpdateMode = 0
$formWelcome.Name = 'WelcomeForm'
$formWelcome.Text = $installTitle
$formWelcome.StartPosition = 'CenterScreen'
$formWelcome.FormBorderStyle = 'FixedDialog'
$formWelcome.MaximizeBox = $false
$formWelcome.MinimizeBox = $false
$formWelcome.TopMost = $true
$formWelcome.TopLevel = $true
$formWelcome.Icon = New-Object -TypeName System.Drawing.Icon -ArgumentList $AppDeployLogoIcon
$formWelcome.AutoSize = $true
$formWelcome.Controls.Add($pictureBanner)
$formWelcome.Controls.Add($flowLayoutPanel)
$System_Drawing_Point = New-Object -TypeName System.Drawing.Point
$System_Drawing_Point.X = 0
$System_Drawing_Point.Y = (($formWelcome.Size | Select-Object -ExpandProperty Height) - 10)
$panelButtons.Location = $System_Drawing_Point
$System_Drawing_Size = New-Object -TypeName System.Drawing.Size
$System_Drawing_Size.Height = 40
$System_Drawing_Size.Width = 450
$panelButtons.Size = $System_Drawing_Size
$panelButtons.AutoSize = $true
$panelButtons.Anchor = 'Top'
$padding = New-Object -TypeName System.Windows.Forms.Padding
$padding.Top = 0
$padding.Bottom = 0
$padding.Left = 0
$padding.Right = 0
$panelButtons.Margin = $padding
If ($showCloseApps) { $panelButtons.Controls.Add($buttonCloseApps) }
If ($showDefer) { $panelButtons.Controls.Add($buttonDefer) }
$panelButtons.Controls.Add($buttonContinue)
$formWelcome.Controls.Add($panelButtons)
$formWelcomeWindowState = $formWelcome.WindowState
$formWelcome.add_Load($Form_StateCorrection_Load)
$formWelcome.add_FormClosed($Form_Cleanup_FormClosed)
Function Refresh-InstallationWelcome {
$formWelcome.BringToFront()
$formWelcome.Location = "$($formWelcomeStartPosition.X),$($formWelcomeStartPosition.Y)"
$formWelcome.Refresh()
}
If ($minimizeWindows) { $shellApp.MinimizeAll() | Out-Null }
$result = $formWelcome.ShowDialog()
$formWelcome.Dispose()
Switch ($result) {
OK { $result = 'Continue' }
No { $result = 'Defer'; $shellApp.UndoMinimizeAll() | Out-Null }
Yes { $result = 'Close'}
Abort { $result = 'Timeout'; $shellApp.UndoMinimizeAll() | Out-Null }
}
Write-Output $result
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Show-InstallationRestartPrompt {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$CountdownSeconds = 60,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[int32]$CountdownNoHideSeconds = 30,
[Parameter(Mandatory=$false)]
[switch]$NoCountdown = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeNonInteractive) {
Write-Log -Message "Bypass Installation Restart Prompt [Mode: $deployMode]" -Source ${CmdletName}
Return
}
If (-not $IsProcessUserInteractive) {
Invoke-PSCommandAsUser -Command ([scriptblock]::Create("Show-InstallationRestartPrompt -CountdownSeconds $CountdownSeconds -CountdownNoHideSeconds $CountdownNoHideSeconds -NoCountdown:`$$NoCountdown"))
Return
}
[hashtable]$installRestartPromptParameters = $psBoundParameters
If (Get-Process | Where-Object { $_.MainWindowTitle -match $configRestartPromptTitle }) {
Write-Log -Message "${CmdletName} was invoked, but an existing restart prompt was detected. Canceling restart prompt." -Severity 2 -Source ${CmdletName}
Return
}
[datetime]$startTime = Get-Date
[datetime]$countdownTime = $startTime
[System.Windows.Forms.Application]::EnableVisualStyles()
$formRestart = New-Object -TypeName System.Windows.Forms.Form
$labelCountdown = New-Object -TypeName System.Windows.Forms.Label
$labelTimeRemaining = New-Object -TypeName System.Windows.Forms.Label
$labelMessage = New-Object -TypeName System.Windows.Forms.Label
$buttonRestartLater = New-Object -TypeName System.Windows.Forms.Button
$picturebox = New-Object -TypeName System.Windows.Forms.PictureBox
$buttonRestartNow = New-Object -TypeName System.Windows.Forms.Button
$timerCountdown = New-Object -TypeName System.Windows.Forms.Timer
$InitialFormWindowState = New-Object -TypeName System.Windows.Forms.FormWindowState
Function Perform-Restart {
Write-Log -Message 'Force restart the computer...' -Source ${CmdletName}
Restart-Computer -Force
}
[scriptblock]$FormEvent_Load = {
[datetime]$currentTime = Get-Date
[datetime]$countdownTime = $startTime.AddSeconds($countdownSeconds)
$timerCountdown.Start()
[timespan]$remainingTime = $countdownTime.Subtract($currentTime)
$labelCountdown.Text = [string]::Format('{0}:{1:d2}:{2:d2}', $remainingTime.Hours, $remainingTime.Minutes, $remainingTime.Seconds)
If ($remainingTime.TotalSeconds -le $countdownNoHideSeconds) { $buttonRestartLater.Enabled = $false }
$formRestart.WindowState = 'Normal'
$formRestart.TopMost = $true
$formRestart.BringToFront()
}
[scriptblock]$Form_StateCorrection_Load = {
$formRestart.WindowState = $InitialFormWindowState
$formRestart.AutoSize = $true
$formRestart.TopMost = $true
$formRestart.BringToFront()
Set-Variable -Name formInstallationRestartPromptStartPosition -Value $formRestart.Location -Scope Script
}
If ($NoCountdown) {
$timerPersist = New-Object -TypeName System.Windows.Forms.Timer
$timerPersist.Interval = ($configInstallationRestartPersistInterval * 1000)
[scriptblock]$timerPersist_Tick = {
$formRestart.WindowState = 'Normal'
$formRestart.TopMost = $true
$formRestart.BringToFront()
$formRestart.Location = "$($formInstallationRestartPromptStartPosition.X),$($formInstallationRestartPromptStartPosition.Y)"
$formRestart.Refresh()
[System.Windows.Forms.Application]::DoEvents()
}
$timerPersist.add_Tick($timerPersist_Tick)
$timerPersist.Start()
}
[scriptblock]$buttonRestartLater_Click = {
$formRestart.WindowState = 'Minimized'
$timerPersist.Stop()
$timerPersist.Start()
}
[scriptblock]$buttonRestartNow_Click = { Perform-Restart }
[scriptblock]$formRestart_Resize = { If ($formRestart.WindowState -eq 'Minimized') { $formRestart.WindowState = 'Minimized' } }
[scriptblock]$timerCountdown_Tick = {
[datetime]$currentTime = Get-Date
[datetime]$countdownTime = $startTime.AddSeconds($countdownSeconds)
[timespan]$remainingTime = $countdownTime.Subtract($currentTime)
If ($countdownTime -lt $currentTime) {
$buttonRestartNow.PerformClick()
}
Else {
$labelCountdown.Text = [string]::Format('{0}:{1:d2}:{2:d2}', $remainingTime.Hours, $remainingTime.Minutes, $remainingTime.Seconds)
If ($remainingTime.TotalSeconds -le $countdownNoHideSeconds) {
$buttonRestartLater.Enabled = $false
If ($formRestart.WindowState -eq 'Minimized') {
$formRestart.WindowState = 'Normal'
$formRestart.TopMost = $true
$formRestart.BringToFront()
$formRestart.Location = "$($formInstallationRestartPromptStartPosition.X),$($formInstallationRestartPromptStartPosition.Y)"
$formRestart.Refresh()
[System.Windows.Forms.Application]::DoEvents()
}
}
[System.Windows.Forms.Application]::DoEvents()
}
}
[scriptblock]$Form_Cleanup_FormClosed = {
Try {
$buttonRestartLater.remove_Click($buttonRestartLater_Click)
$buttonRestartNow.remove_Click($buttonRestartNow_Click)
$formRestart.remove_Load($FormEvent_Load)
$formRestart.remove_Resize($formRestart_Resize)
$timerCountdown.remove_Tick($timerCountdown_Tick)
$timerPersist.remove_Tick($timerPersist_Tick)
$formRestart.remove_Load($Form_StateCorrection_Load)
$formRestart.remove_FormClosed($Form_Cleanup_FormClosed)
}
Catch {
}
}
If (-not $NoCountdown) {
$formRestart.Controls.Add($labelCountdown)
$formRestart.Controls.Add($labelTimeRemaining)
}
$formRestart.Controls.Add($labelMessage)
$formRestart.Controls.Add($buttonRestartLater)
$formRestart.Controls.Add($picturebox)
$formRestart.Controls.Add($buttonRestartNow)
$formRestart.ClientSize = '450,260'
$formRestart.ControlBox = $false
$formRestart.FormBorderStyle = 'FixedDialog'
$formRestart.Icon = New-Object -TypeName System.Drawing.Icon -ArgumentList $AppDeployLogoIcon
$formRestart.MaximizeBox = $false
$formRestart.MinimizeBox = $false
$formRestart.Name = 'formRestart'
$formRestart.StartPosition = 'CenterScreen'
$formRestart.Text = "$($configRestartPromptTitle): $installTitle"
$formRestart.add_Load($FormEvent_Load)
$formRestart.add_Resize($formRestart_Resize)
$picturebox.Anchor = 'Top'
$picturebox.Image = [System.Drawing.Image]::Fromfile($AppDeployLogoBanner)
$picturebox.Location = '0,0'
$picturebox.Name = 'picturebox'
$picturebox.Size = '450,50'
$picturebox.SizeMode = 'CenterImage'
$picturebox.TabIndex = 1
$picturebox.TabStop = $false
$labelMessage.Location = '20,58'
$labelMessage.Name = 'labelMessage'
$labelMessage.Size = '400,79'
$labelMessage.TabIndex = 3
$labelMessage.Text = "$configRestartPromptMessage $configRestartPromptMessageTime `n`n$configRestartPromptMessageRestart"
If ($NoCountdown) { $labelMessage.Text = $configRestartPromptMessage }
$labelMessage.TextAlign = 'MiddleCenter'
$labelTimeRemaining.Location = '20,138'
$labelTimeRemaining.Name = 'labelTimeRemaining'
$labelTimeRemaining.Size = '400,23'
$labelTimeRemaining.TabIndex = 4
$labelTimeRemaining.Text = $configRestartPromptTimeRemaining
$labelTimeRemaining.TextAlign = 'MiddleCenter'
$labelCountdown.Font = 'Microsoft Sans Serif, 18pt, style=Bold'
$labelCountdown.Location = '20,165'
$labelCountdown.Name = 'labelCountdown'
$labelCountdown.Size = '400,30'
$labelCountdown.TabIndex = 5
$labelCountdown.Text = '00:00:00'
$labelCountdown.TextAlign = 'MiddleCenter'
$buttonRestartLater.Anchor = 'Bottom,Left'
$buttonRestartLater.Location = '20,216'
$buttonRestartLater.Name = 'buttonRestartLater'
$buttonRestartLater.Size = '159,23'
$buttonRestartLater.TabIndex = 0
$buttonRestartLater.Text = $configRestartPromptButtonRestartLater
$buttonRestartLater.UseVisualStyleBackColor = $true
$buttonRestartLater.add_Click($buttonRestartLater_Click)
$buttonRestartNow.Anchor = 'Bottom,Right'
$buttonRestartNow.Location = '265,216'
$buttonRestartNow.Name = 'buttonRestartNow'
$buttonRestartNow.Size = '159,23'
$buttonRestartNow.TabIndex = 2
$buttonRestartNow.Text = $configRestartPromptButtonRestartNow
$buttonRestartNow.UseVisualStyleBackColor = $true
$buttonRestartNow.add_Click($buttonRestartNow_Click)
If (-not $NoCountdown) { $timerCountdown.add_Tick($timerCountdown_Tick) }
$InitialFormWindowState = $formRestart.WindowState
$formRestart.add_Load($Form_StateCorrection_Load)
$formRestart.add_FormClosed($Form_Cleanup_FormClosed)
$formRestartClosing = [System.Windows.Forms.FormClosingEventHandler]{ $_.Cancel = $true }
$formRestart.add_FormClosing($formRestartClosing)
If ($deployAppScriptFriendlyName) {
If ($NoCountdown) {
Write-Log -Message "Invoking ${CmdletName} asynchronously with no countdown..." -Source ${CmdletName}
}
Else {
Write-Log -Message "Invoking ${CmdletName} asynchronously with a [$countDownSeconds] second countdown..." -Source ${CmdletName}
}
[string]$installRestartPromptParameters = ($installRestartPromptParameters.GetEnumerator() | ForEach-Object { If ($_.Value.GetType().Name -eq 'SwitchParameter') { "-$($_.Key):`$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Boolean') { "-$($_.Key) `$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Int32') { "-$($_.Key) $($_.Value)" } Else { "-$($_.Key) `"$($_.Value)`"" } }) -join ' '
Start-Process -FilePath "$PSHOME\powershell.exe" -ArgumentList "-ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden -Command `"$scriptPath`" -ReferringApplication `"$installName`" -ShowInstallationRestartPrompt $installRestartPromptParameters" -WindowStyle Hidden -ErrorAction 'SilentlyContinue'
}
Else {
If ($NoCountdown) {
Write-Log -Message 'Display restart prompt with no countdown.' -Source ${CmdletName}
}
Else {
Write-Log -Message "Display restart prompt with a [$countDownSeconds] second countdown." -Source ${CmdletName}
}
Write-Output $formRestart.ShowDialog()
$formRestart.Dispose()
[System.Diagnostics.Process]$powershellProcess = Get-Process | Where-Object { $_.MainWindowTitle -match $installTitle }
[Microsoft.VisualBasic.Interaction]::AppActivate($powershellProcess.ID)
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Show-BalloonTip {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,Position=0)]
[ValidateNotNullOrEmpty()]
[string]$BalloonTipText,
[Parameter(Mandatory=$false,Position=1)]
[ValidateNotNullorEmpty()]
[string]$BalloonTipTitle = $installTitle,
[Parameter(Mandatory=$false,Position=2)]
[ValidateSet('Error','Info','None','Warning')]
[System.Windows.Forms.ToolTipIcon]$BalloonTipIcon = 'Info',
[Parameter(Mandatory=$false,Position=3)]
[ValidateNotNullorEmpty()]
[int32]$BalloonTipTime = 10000
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If (($deployModeSilent) -or (-not $configShowBalloonNotifications)) { Return }
If (-not $IsProcessUserInteractive) {
Invoke-PSCommandAsUser -Command ([scriptblock]::Create("Show-BalloonTip -BalloonTipText '$BalloonTipText' -BalloonTipTitle '$BalloonTipTitle' -BalloonTipIcon '$BalloonTipIcon' -BalloonTipTime $BalloonTipTime"))
Return
}
If ($global:notifyIcon) { Try { $global:notifyIcon.Dispose() } Catch {} }
Try {
[string]$callingFunction = (Get-Variable -Name MyInvocation -Scope 1 -ErrorAction 'SilentlyContinue').Value.MyCommand.Name
}
Catch { }
If ($callingFunction -eq 'Exit-Script') {
Write-Log -Message "Display balloon tip notification asyhchronously with message [$BalloonTipText]" -Source ${CmdletName}
[scriptblock]$notifyIconScriptBlock = {
Param (
[Parameter(Mandatory=$true,Position=0)]
[ValidateNotNullOrEmpty()]
[string]$BalloonTipText,
[Parameter(Mandatory=$false,Position=1)]
[ValidateNotNullorEmpty()]
[string]$BalloonTipTitle,
[Parameter(Mandatory=$false,Position=2)]
[ValidateSet('Error','Info','None','Warning')]
$BalloonTipIcon,
[Parameter(Mandatory=$false,Position=3)]
[ValidateNotNullorEmpty()]
[int32]$BalloonTipTime,
[Parameter(Mandatory=$false,Position=4)]
[ValidateNotNullorEmpty()]
[string]$AppDeployLogoIcon
)
Add-Type -AssemblyName System.Windows.Forms -ErrorAction 'Stop'
Add-Type -AssemblyName System.Drawing -ErrorAction 'Stop'
[Windows.Forms.ToolTipIcon]$BalloonTipIcon = $BalloonTipIcon
$global:notifyIcon = New-Object -TypeName Windows.Forms.NotifyIcon -Property @{
BalloonTipIcon = $BalloonTipIcon
BalloonTipText = $BalloonTipText
BalloonTipTitle = $BalloonTipTitle
Icon = New-Object -TypeName System.Drawing.Icon -ArgumentList $AppDeployLogoIcon
Text = -join $BalloonTipText[0..62]
Visible = $true
}
$global:NotifyIcon.ShowBalloonTip($BalloonTipTime)
Start-Sleep -Milliseconds ($BalloonTipTime)
$global:notifyIcon.Dispose()
}
Try {
Execute-Process -Path "$PSHOME\powershell.exe" -Parameters "-ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden -Command & {$notifyIconScriptBlock} '$BalloonTipText' '$BalloonTipTitle' '$BalloonTipIcon' '$BalloonTipTime' '$AppDeployLogoIcon'" -NoWait -WindowStyle Hidden -CreateNoWindow
}
Catch { }
}
Else {
Write-Log -Message "Display balloon tip notification with message [$BalloonTipText]" -Source ${CmdletName}
[Windows.Forms.ToolTipIcon]$BalloonTipIcon = $BalloonTipIcon
$global:notifyIcon = New-Object -TypeName Windows.Forms.NotifyIcon -Property @{
BalloonTipIcon = $BalloonTipIcon
BalloonTipText = $BalloonTipText
BalloonTipTitle = $BalloonTipTitle
Icon = New-Object -TypeName System.Drawing.Icon -ArgumentList $AppDeployLogoIcon
Text = -join $BalloonTipText[0..62]
Visible = $true
}
$global:NotifyIcon.ShowBalloonTip($BalloonTipTime)
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Show-InstallationProgress {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$StatusMessage = $configProgressMessageInstall,
[Parameter(Mandatory=$false)]
[ValidateSet('Default','BottomRight')]
[string]$WindowLocation = 'Default',
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$TopMost = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($deployModeSilent) { Return }
If (($statusMessage -eq $configProgressMessageInstall) -and ($deploymentType -eq 'Uninstall')) {
$StatusMessage = $configProgressMessageUninstall
}
If ($envHost.Name -match 'PowerGUI') {
Write-Log -Message "$($envHost.Name) is not a supported host for WPF multithreading. Progress dialog with message [$statusMessage] will not be displayed." -Severity 2 -Source ${CmdletName}
Return
}
If (-not $IsProcessUserInteractive) {
Invoke-PSCommandAsUser -NoWait -Command ([scriptblock]::Create("Show-InstallationProgress -StatusMessage '$StatusMessage' -WindowLocation '$WindowLocation' -TopMost `$$TopMost"))
Return
}
If (Test-Path -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -PathType 'Leaf') {
$StatusMessage | Export-Clixml -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -Force
Return
}
Else {
$StatusMessage | Export-Clixml -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -Force
$balloonText = "$deploymentTypeName $configBalloonTextStart"
Show-BalloonTip -BalloonTipIcon 'Info' -BalloonTipText $balloonText
}
If ($global:ProgressSyncHash.Window.Dispatcher.Thread.ThreadState -ne 'Running') {
$global:ProgressSyncHash = [hashtable]::Synchronized(@{ })
$global:ProgressSyncHash.StatusMessage = $statusMessage
$global:ProgressRunspace = [runspacefactory]::CreateRunspace()
$global:ProgressRunspace.ApartmentState = 'STA'
$global:ProgressRunspace.ThreadOptions = 'ReuseThread'
$global:ProgressRunspace.Open()
$global:ProgressRunspace.SessionStateProxy.SetVariable('progressSyncHash', $global:ProgressSyncHash)
$global:ProgressRunspace.SessionStateProxy.SetVariable('installTitle', $installTitle)
$global:ProgressRunspace.SessionStateProxy.SetVariable('windowLocation', $windowLocation)
$global:ProgressRunspace.SessionStateProxy.SetVariable('topMost', [string]$topMost)
$global:ProgressRunspace.SessionStateProxy.SetVariable('appDeployLogoBanner', $appDeployLogoBanner)
$global:ProgressRunspace.SessionStateProxy.SetVariable('statusMessage', $statusMessage)
$global:ProgressRunspace.SessionStateProxy.SetVariable('AppDeployLogoIcon', $AppDeployLogoIcon)
$global:ProgressRunspace.SessionStateProxy.SetVariable('dpiScale', $dpiScale)
$powershell = [PowerShell]::Create()
$powershell.Runspace = $global:ProgressRunspace
$powershell.AddScript({
[Xml.XmlDocument]$xamlProgress = @'
<Window
xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
x:Name="Window" Title=""
MaxHeight="200" MinHeight="180" Height="180"
MaxWidth="456" MinWidth="456" Width="456" Padding="0,0,0,0" Margin="0,0,0,0"
WindowStartupLocation = "Manual"
Top=""
Left=""
Topmost=""
ResizeMode="NoResize"
Icon=""
ShowInTaskbar="True" >
<Window.Resources>
<Storyboard x:Key="Storyboard1" RepeatBehavior="Forever">
<DoubleAnimationUsingKeyFrames BeginTime="00:00:00" Storyboard.TargetName="ellipse" Storyboard.TargetProperty="(UIElement.RenderTransform).(TransformGroup.Children)[2].(RotateTransform.Angle)">
<SplineDoubleKeyFrame KeyTime="00:00:02" Value="360"/>
</DoubleAnimationUsingKeyFrames>
</Storyboard>
</Window.Resources>
<Window.Triggers>
<EventTrigger RoutedEvent="FrameworkElement.Loaded">
<BeginStoryboard Storyboard="{StaticResource Storyboard1}"/>
</EventTrigger>
</Window.Triggers>
<Grid Background="
<Grid.RowDefinitions>
<RowDefinition Height="50"/>
<RowDefinition Height="100"/>
</Grid.RowDefinitions>
<Grid.ColumnDefinitions>
<ColumnDefinition Width="45"></ColumnDefinition>
<ColumnDefinition Width="*"></ColumnDefinition>
</Grid.ColumnDefinitions>
<Image x:Name = "ProgressBanner" Grid.ColumnSpan="2" Margin="0,0,0,0" Source=""></Image>
<TextBlock x:Name = "ProgressText" Grid.Row="1" Grid.Column="1" Margin="0,5,45,10" Text="" FontSize="15" FontFamily="Microsoft Sans Serif" HorizontalAlignment="Center" VerticalAlignment="Center" TextAlignment="Center" Padding="15" TextWrapping="Wrap"></TextBlock>
<Ellipse x:Name = "ellipse" Grid.Row="1" Grid.Column="0" Margin="0,0,0,0" StrokeThickness="5" RenderTransformOrigin="0.5,0.5" Height="25" Width="25" HorizontalAlignment="Right" VerticalAlignment="Center">
<Ellipse.RenderTransform>
<TransformGroup>
<ScaleTransform/>
<SkewTransform/>
<RotateTransform/>
</TransformGroup>
</Ellipse.RenderTransform>
<Ellipse.Stroke>
<LinearGradientBrush EndPoint="0.445,0.997" StartPoint="0.555,0.003">
<GradientStop Color="White" Offset="0"/>
<GradientStop Color="
</LinearGradientBrush>
</Ellipse.Stroke>
</Ellipse>
</Grid>
</Window>
'@
$screen = [System.Windows.Forms.Screen]::PrimaryScreen
$screenWorkingArea = $screen.WorkingArea
[int32]$screenWidth = $screenWorkingArea | Select-Object -ExpandProperty Width
[int32]$screenHeight = $screenWorkingArea | Select-Object -ExpandProperty Height
If ($windowLocation -eq 'BottomRight') {
$xamlProgress.Window.Left = [string]($screenWidth - $xamlProgress.Window.Width - 10)
$xamlProgress.Window.Top = [string]($screenHeight - $xamlProgress.Window.Height - 10)
}
Else {
$xamlProgress.Window.Left = [string](($screenWidth / (2 * ($dpiscale / 100) )) - (($xamlProgress.Window.Width / 2)))
$xamlProgress.Window.Top = [string]($screenHeight / 9.5)
}
$xamlProgress.Window.TopMost = $topMost
$xamlProgress.Window.Icon = $AppDeployLogoIcon
$xamlProgress.Window.Grid.Image.Source = $appDeployLogoBanner
$xamlProgress.Window.Grid.TextBlock.Text = $statusMessage
$xamlProgress.Window.Title = $installTitle
$progressReader = New-Object -TypeName System.Xml.XmlNodeReader -ArgumentList $xamlProgress
$global:ProgressSyncHash.Window = [Windows.Markup.XamlReader]::Load($progressReader)
$global:ProgressSyncHash.ProgressText = $global:ProgressSyncHash.Window.FindName('ProgressText')
$global:ProgressSyncHash.Window.Add_Closing({ $_.Cancel = $true })
$global:ProgressSyncHash.Window.Add_MouseLeftButtonDown({ $global:ProgressSyncHash.Window.DragMove() })
$global:ProgressSyncHash.Window.ToolTip = $installTitle
$global:ProgressSyncHash.Window.ShowDialog() | Out-Null
$global:ProgressSyncHash.Error = $Error
}) | Out-Null
Write-Log -Message "Spin up progress dialog in a separate thread with message: [$statusMessage]" -Source ${CmdletName}
$progressData = $powershell.BeginInvoke()
Start-Sleep -Seconds 3
While ($global:ProgressSyncHash.StatusMessage -ne '_CloseRunspace') {
Try {
If (Test-Path -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -PathType 'Leaf') {
$global:ProgressSyncHash.StatusMessage = Import-Clixml -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -ErrorAction 'Stop'
}
If ($global:ProgressSyncHash.StatusMessage -eq '_CloseRunspace') { Break }
$global:ProgressSyncHash.Window.Dispatcher.Invoke([System.Windows.Threading.DispatcherPriority]'Normal', [Windows.Input.InputEventHandler]{ $global:ProgressSyncHash.ProgressText.Text = $global:ProgressSyncHash.StatusMessage }, $null, $null)
Start-Sleep -Seconds 1
}
Catch {
Write-Log -Message "Unable to update the progress message. `n$(Resolve-Error)" -Severity 2 -Source ${CmdletName}
Break
}
}
If ($global:ProgressSyncHash.Error) {
Write-Log -Message "Failure while displaying progress dialog. `n$(Resolve-Error -ErrorRecord $global:ProgressSyncHash.Error)" -Severity 3 -Source ${CmdletName}
}
$global:ProgressSyncHash.Window.Close()
$global:ProgressSyncHash.Window.Dispose()
$powershell.Dispose()
If (Test-Path -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -PathType 'Leaf') {
Remove-Item -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -Force -ErrorAction 'SilentlyContinue' | Out-Null
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Close-InstallationProgress {
[CmdletBinding()]
Param (
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
If ($global:ProgressSyncHash.Window.Dispatcher.Thread.ThreadState -eq 'Running') {
Write-Log -Message 'Close the installation progress dialog.' -Source ${CmdletName}
$global:ProgressSyncHash.Window.Dispatcher.InvokeShutdown()
$global:ProgressRunspace.Close()
$global:ProgressSyncHash.Clear()
}
If (Test-Path -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -PathType 'Leaf') {
Remove-Item -Path "$dirAppDeployTemp\StatusMsgFrom_ShowInstallProgress.xml" -Force -ErrorAction 'SilentlyContinue' | Out-Null
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Set-PinnedApplication {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateSet('PintoStartMenu','UnpinfromStartMenu','PintoTaskbar','UnpinfromTaskbar')]
[string]$Action,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$FilePath
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
Function Get-PinVerb {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[int32]$VerbId
)
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
$GetPinVerbSource = @'
using System;
using System.Text;
using System.Runtime.InteropServices;
namespace Verb
{
public sealed class Load
{
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern int LoadString(IntPtr h, int id, StringBuilder sb, int maxBuffer);
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern IntPtr LoadLibrary(string s);
public static string PinVerb(int VerbId)
{
IntPtr hShell32 = LoadLibrary("shell32.dll");
const int nChars = 255;
StringBuilder Buff = new StringBuilder("", nChars);
LoadString(hShell32, VerbId, Buff, Buff.Capacity);
return Buff.ToString();
}
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'Verb.Load').Type) {
Add-Type -TypeDefinition $GetPinVerbSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
Write-Log -Message "Get localized pin verb for verb id [$VerbID]." -Source ${CmdletName}
[string]$PinVerb = [Verb.Load]::PinVerb($VerbId)
Write-Log -Message "Verb ID [$VerbID] has a localized pin verb of [$PinVerb]." -Source ${CmdletName}
Write-Output $PinVerb
}
Function Invoke-Verb {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$FilePath,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Verb
)
Try {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
$verb = $verb.Replace('&','')
$path = Split-Path -Path $FilePath -Parent -ErrorAction 'Stop'
$folder = $shellApp.Namespace($path)
$item = $folder.ParseName((Split-Path -Path $FilePath -Leaf -ErrorAction 'Stop'))
$itemVerb = $item.Verbs() | Where-Object { $_.Name.Replace('&','') -eq $verb } -ErrorAction 'Stop'
If ($null -eq $itemVerb) {
Write-Log -Message "Performing action [$verb] is not programatically supported for this file [$FilePath]." -Severity 2 -Source ${CmdletName}
}
Else {
Write-Log -Message "Perform action [$verb] on [$FilePath]." -Source ${CmdletName}
$itemVerb.DoIt()
}
}
Catch {
Write-Log -Message "Failed to perform action [$verb] on [$FilePath]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
[hashtable]$Verbs = @{
'PintoStartMenu' = 5381
'UnpinfromStartMenu' = 5382
'PintoTaskbar' = 5386
'UnpinfromTaskbar' = 5387
}
}
Process {
Try {
Write-Log -Message "Execute action [$Action] for file [$FilePath]." -Source ${CmdletName}
If (-not (Test-Path -Path $FilePath -PathType Leaf -ErrorAction 'Stop')) {
Throw "Path [$filePath] does not exist."
}
If (-not ($Verbs.$Action)) {
Throw "Action [$Action] not supported. Supported actions are [$($Verbs.Keys -join ', ')]."
}
[string]$PinVerbAction = Get-PinVerb -VerbId $Verbs.$Action
If (-not ($PinVerbAction)) {
Throw "Failed to get a localized pin verb for action [$Action]. Action is not supported on this operating system."
}
Invoke-Verb -FilePath $FilePath -Verb $PinVerbAction
}
Catch {
Write-Log -Message "Failed to execute action [$Action]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-IniValue {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$FilePath,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Section,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Key,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$GetIniValueSource = @'
using System;
using System.Text;
using System.Runtime.InteropServices;
namespace IniFile
{
public sealed class GetValue
{
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern int GetPrivateProfileString(string lpAppName, string lpKeyName, string lpDefault, StringBuilder lpReturnedString, int nSize, string lpFileName);
public static string GetIniValue(string section, string key, string filepath)
{
string sDefault = "";
const int nChars = 1024;
StringBuilder Buff = new StringBuilder(nChars);
GetPrivateProfileString(section, key, sDefault, Buff, Buff.Capacity, filepath);
return Buff.ToString();
}
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'IniFile.GetValue').Type) {
Add-Type -TypeDefinition $GetIniValueSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
Write-Log -Message "Read INI Key: [Section = $Section] [Key = $Key]" -Source ${CmdletName}
If (-not (Test-Path -Path $FilePath -PathType Leaf)) { Throw "File [$filePath] could not be found." }
$IniValue = [IniFile.GetValue]::GetIniValue($Section, $Key, $FilePath)
Write-Log -Message "INI Key Value: [Section = $Section] [Key = $Key] [Value = $IniValue]" -Source ${CmdletName}
Write-Output $IniValue
}
Catch {
Write-Log -Message "Failed to read INI file key value. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to read INI file key value: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Set-IniValue {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$FilePath,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Section,
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Key,
[Parameter(Mandatory=$true)]
[AllowNull()]
$Value,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$SetIniValueSource = @'
using System;
using System.Text;
using System.Runtime.InteropServices;
namespace IniFile
{
public sealed class SetValue
{
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = false)]
[return: MarshalAs(UnmanagedType.Bool)]
public static extern bool WritePrivateProfileString(string lpAppName, string lpKeyName, StringBuilder lpString, string lpFileName);
public static void SetIniValue(string section, string key, StringBuilder value, string filepath)
{
WritePrivateProfileString(section, key, value, filepath);
}
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'IniFile.SetValue').Type) {
Add-Type -TypeDefinition $SetIniValueSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
Write-Log -Message "Write INI Key Value: [Section = $Section] [Key = $Key] [Value = $Value]" -Source ${CmdletName}
If (-not (Test-Path -Path $FilePath -PathType Leaf)) { Throw "File [$filePath] could not be found." }
[IniFile.SetValue]::SetIniValue($Section, $Key, ([System.Text.StringBuilder]$Value), $FilePath)
}
Catch {
Write-Log -Message "Failed to write INI file key value. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to write INI file key value: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-PEFileArchitecture {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[ValidateScript({$_ | Test-Path -PathType Leaf})]
[System.IO.FileInfo[]]$FilePath,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true,
[Parameter(Mandatory=$false)]
[switch]$PassThru
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
[string[]]$PEFileExtensions = '.exe', '.dll', '.ocx', '.drv', '.sys', '.scr', '.efi', '.cpl', '.fon'
[int32]$MACHINE_OFFSET = 4
[int32]$PE_POINTER_OFFSET = 60
}
Process {
ForEach ($Path in $filePath) {
Try {
If ($PEFileExtensions -notcontains $Path.Extension) {
Throw "Invalid file type. Please specify one of the following PE file types: $($PEFileExtensions -join ', ')"
}
[byte[]]$data = New-Object -TypeName System.Byte[] -ArgumentList 4096
$stream = New-Object -TypeName System.IO.FileStream -ArgumentList ($Path.FullName, 'Open', 'Read')
$stream.Read($data, 0, 4096) | Out-Null
$stream.Flush()
$stream.Close()
[int32]$PE_HEADER_ADDR = [System.BitConverter]::ToInt32($data, $PE_POINTER_OFFSET)
[uint16]$PE_IMAGE_FILE_HEADER = [System.BitConverter]::ToUInt16($data, $PE_HEADER_ADDR + $MACHINE_OFFSET)
Switch ($PE_IMAGE_FILE_HEADER) {
0 { $PEArchitecture = 'Native' }
0x014c { $PEArchitecture = '32BIT' }
0x0200 { $PEArchitecture = 'Itanium-x64' }
0x8664 { $PEArchitecture = '64BIT' }
Default { $PEArchitecture = 'Unknown' }
}
Write-Log -Message "File [$($Path.FullName)] has a detected file architecture of [$PEArchitecture]." -Source ${CmdletName}
If ($PassThru) {
Get-Item -Path $Path.FullName -Force | Add-Member -MemberType 'NoteProperty' -Name 'BinaryType' -Value $PEArchitecture -Force -PassThru | Write-Output
}
Else {
Write-Output $PEArchitecture
}
}
Catch {
Write-Log -Message "Failed to get the PE file architecture. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to get the PE file architecture: $($_.Exception.Message)"
}
Continue
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Invoke-RegisterOrUnregisterDLL {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$FilePath,
[Parameter(Mandatory=$false)]
[ValidateSet('Register','Unregister')]
[string]$DLLAction,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
[string]${InvokedCmdletName} = $MyInvocation.InvocationName
If (${InvokedCmdletName} -ne ${CmdletName}) {
Switch (${InvokedCmdletName}) {
'Register-DLL' { [string]$DLLAction = 'Register' }
'Unregister-DLL' { [string]$DLLAction = 'Unregister' }
}
}
If (-not $DLLAction) { Throw 'Parameter validation failed. Please specify the [-DLLAction] parameter to determine whether to register or unregister the DLL.' }
[string]$DLLAction = (Get-Culture).TextInfo | ForEach-Object { $_.ToTitleCase($DLLAction.ToLower()) }
Switch ($DLLAction) {
'Register' { [string]$DLLActionParameters = "/s `"$FilePath`"" }
'Unregister' { [string]$DLLActionParameters = "/s /u `"$FilePath`"" }
}
}
Process {
Try {
Write-Log -Message "$DLLAction DLL file [$filePath]." -Source ${CmdletName}
If (-not (Test-Path -Path $FilePath -PathType Leaf)) { Throw "File [$filePath] could not be found." }
[string]$DLLFileBitness = Get-PEFileArchitecture -FilePath $filePath -ContinueOnError $false -ErrorAction 'Stop'
If (($DLLFileBitness -ne '64BIT') -and ($DLLFileBitness -ne '32BIT')) {
Throw "File [$filePath] has a detected file architecture of [$DLLFileBitness]. Only 32-bit or 64-bit DLL files can be $($DLLAction.ToLower() + 'ed')."
}
If ($Is64Bit) {
If ($DLLFileBitness -eq '64BIT') {
If ($Is64BitProcess) {
[psobject]$ExecuteResult = Execute-Process -Path "$envWinDir\system32\regsvr32.exe" -Parameters $DLLActionParameters -WindowStyle Hidden -PassThru
}
Else {
[psobject]$ExecuteResult = Execute-Process -Path "$envWinDir\sysnative\regsvr32.exe" -Parameters $DLLActionParameters -WindowStyle Hidden -PassThru
}
}
ElseIf ($DLLFileBitness -eq '32BIT') {
[psobject]$ExecuteResult = Execute-Process -Path "$envWinDir\SysWOW64\regsvr32.exe" -Parameters $DLLActionParameters -WindowStyle Hidden -PassThru
}
}
Else {
If ($DLLFileBitness -eq '64BIT') {
Throw "File [$filePath] cannot be $($DLLAction.ToLower()) because it is a 64-bit file on a 32-bit operating system."
}
ElseIf ($DLLFileBitness -eq '32BIT') {
[psobject]$ExecuteResult = Execute-Process -Path "$envWinDir\system32\regsvr32.exe" -Parameters $DLLActionParameters -WindowStyle Hidden -PassThru
}
}
If ($ExecuteResult.ExitCode -ne 0) {
If ($ExecuteResult.ExitCode -eq 999) {
Throw "Execute-Process function failed with exit code [$($ExecuteResult.ExitCode)]."
}
Else {
Throw "regsvr32.exe failed with exit code [$($ExecuteResult.ExitCode)]."
}
}
}
Catch {
Write-Log -Message "Failed to $($DLLAction.ToLower()) DLL file. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to $($DLLAction.ToLower()) DLL file: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Set-Alias -Name 'Register-DLL' -Value 'Invoke-RegisterOrUnregisterDLL' -Scope Script -Force -ErrorAction 'SilentlyContinue'
Set-Alias -Name 'Unregister-DLL' -Value 'Invoke-RegisterOrUnregisterDLL' -Scope Script -Force -ErrorAction 'SilentlyContinue'
Function Get-MsiTableProperty {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateScript({ $_ | Test-Path -PathType Leaf })]
[string]$Path,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$Table = 'Property',
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
[scriptblock]$InvokeMethod = {
Param (
[__comobject]$Object,
[string]$MethodName,
[object[]]$ArgumentList
)
Write-Output $Object.GetType().InvokeMember($MethodName, [System.Reflection.BindingFlags]::InvokeMethod, $null, $Object, $ArgumentList, $null, $null, $null)
}
[scriptblock]$GetProperty = {
Param (
[__comobject]$Object,
[string]$PropertyName,
[object[]]$ArgumentList
)
Write-Output $Object.GetType().InvokeMember($PropertyName, [System.Reflection.BindingFlags]::GetProperty, $null, $Object, $ArgumentList, $null, $null, $null)
}
}
Process {
Try {
Write-Log -Message "Get properties from MSI file [$Path] in table [$Table]" -Source ${CmdletName}
[psobject]$TableProperties = New-Object -TypeName PSObject
[__comobject]$Installer = New-Object -ComObject WindowsInstaller.Installer -ErrorAction 'Stop'
[int32]$OpenMSIReadOnly = 0
[__comobject]$Database = &$InvokeMethod -Object $Installer -MethodName 'OpenDatabase' -ArgumentList @($Path, $OpenMSIReadOnly)
[__comobject]$View = &$InvokeMethod -Object $Database -MethodName 'OpenView' -ArgumentList @("SELECT * FROM $Table")
&$InvokeMethod -Object $View -MethodName 'Execute' | Out-Null
[__comobject]$Record = &$InvokeMethod -Object $View -MethodName 'Fetch'
While ($Record) {
$TableProperties | Add-Member -MemberType NoteProperty -Name (& $GetProperty -Object $Record -PropertyName 'StringData' -ArgumentList @(1)) -Value (& $GetProperty -Object $Record -PropertyName 'StringData' -ArgumentList @(2))
[__comobject]$Record = & $InvokeMethod -Object $View -MethodName 'Fetch'
}
Write-Output $TableProperties
}
Catch {
Write-Log -Message "Failed to get the MSI table [$Table]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to get the MSI table [$Table]: $($_.Exception.Message)"
}
}
Finally {
If ($View) {
& $InvokeMethod -Object $View -MethodName 'Close' -ArgumentList @() | Out-Null
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Test-MSUpdates {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,Position=0,HelpMessage='Enter the KB Number for the Microsoft Update')]
[ValidateNotNullorEmpty()]
[string]$KBNumber
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Write-Log -Message "Check if Microsoft Update [$kbNumber] is installed." -Source ${CmdletName}
[boolean]$kbFound = $false
[__comobject]$Session = New-Object -ComObject Microsoft.Update.Session
[__comobject]$Collection = New-Object -ComObject Microsoft.Update.UpdateColl
[__comobject]$Installer = $Session.CreateUpdateInstaller()
[__comobject]$Searcher = $Session.CreateUpdateSearcher()
[int32]$updateCount = $Searcher.GetTotalHistoryCount()
If ($updateCount -gt 0) {
$Searcher.QueryHistory(0, $updateCount) | Where-Object { $_.Title -match $kbNumber } | ForEach-Object { $kbFound = $true }
}
If (-not $kbFound) {
Get-Hotfix -Id $kbNumber -ErrorAction 'SilentlyContinue' | ForEach-Object { $kbFound = $true }
}
If (-not $kbFound) {
Write-Log -Message "Microsoft Update [$kbNumber] is not installed" -Source ${CmdletName}
Write-Output $false
}
Else {
Write-Log -Message "Microsoft Update [$kbNumber] is installed" -Source ${CmdletName}
Write-Output $true
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Install-MSUpdates {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$Directory
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Write-Log -Message "Recursively install all Microsoft Updates in directory [$Directory]." -Source ${CmdletName}
$kbPattern = '(?i)kb\d{6,8}'
[System.IO.FileInfo[]]$files = Get-ChildItem -Path $Directory -Recurse -Include ('*.exe','*.msu','*.msp')
ForEach ($file in $files) {
If ($file.Name -match 'redist') {
[version]$redistVersion = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($file).ProductVersion
[string]$redistDescription = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($file).FileDescription
Write-Log -Message "Install [$redistDescription $redistVersion]..." -Source ${CmdletName}
If ($redistDescription -match 'Win32 Cabinet Self-Extractor') {
Execute-Process -Path $file -Parameters '/q' -WindowStyle Hidden -ContinueOnError $true
}
Else {
Execute-Process -Path $file -Parameters '/quiet /norestart' -WindowStyle Hidden -ContinueOnError $true
}
}
Else {
[string]$kbNumber = [regex]::Match($file, $kbPattern).ToString()
If (-not $kbNumber) { Continue }
If (-not (Test-MSUpdates -KBNumber $kbNumber)) {
Write-Log -Message "KB Number [$KBNumber] was not detected and will be installed." -Source ${CmdletName}
Switch ($file.Extension) {
'.exe' { Execute-Process -Path $file -Parameters '/quiet /norestart' -WindowStyle Hidden -ContinueOnError $true }
'.msu' { Execute-Process -Path 'wusa.exe' -Parameters "`"$file`" /quiet /norestart" -WindowStyle Hidden -ContinueOnError $true }
'.msp' { Execute-MSI -Action 'Patch' -Path $file -ContinueOnError $true }
}
}
Else {
Write-Log -Message "KB Number [$kbNumber] is already installed. Continue..." -Source ${CmdletName}
}
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Send-Keys {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,Position=0)]
[ValidateNotNullorEmpty()]
[string]$WindowTitle,
[Parameter(Mandatory=$true,Position=1)]
[ValidateNotNullorEmpty()]
[string]$Keys,
[Parameter(Mandatory=$false,Position=2)]
[ValidateNotNullorEmpty()]
[int32]$WaitSeconds
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
Add-Type -AssemblyName System.Windows.Forms -ErrorAction 'Stop'
$SetForegroundWindowSource = @'
using System;
using System.Runtime.InteropServices;
public class GUIWindow
{
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
[return: MarshalAs(UnmanagedType.Bool)]
public static extern bool SetForegroundWindow(IntPtr hWnd);
}
'@
If (-not ([System.Management.Automation.PSTypeName]'GUIWindow').Type) {
Add-Type -TypeDefinition $SetForegroundWindowSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
[System.Diagnostics.Process[]]$Process = Get-Process -ErrorAction 'Stop' | Where-Object { $_.MainWindowTitle.Contains($WindowTitle) }
If ($Process) {
Write-Log -Message "Match window title found running under process [$($process.name)]..." -Source ${CmdletName}
[IntPtr]$ProcessHandle = $Process[0].MainWindowHandle
Write-Log -Message 'Bring window to foreground.' -Source ${CmdletName}
[boolean]$ActivateWindow = [GUIWindow]::SetForegroundWindow($ProcessHandle)
If ($ActivateWindow) {
Write-Log -Message 'Send key(s) [$Keys] to window.' -Source ${CmdletName}
[System.Windows.Forms.SendKeys]::SendWait($Keys)
}
Else {
Write-Log -Message 'Failed to bring window to foreground.' -Source ${CmdletName}
}
If ($WaitSeconds) { Start-Sleep -Seconds $WaitSeconds }
}
}
Catch {
Write-Log -Message "Failed to send keys to window [$WindowTitle]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Test-Battery {
[CmdletBinding()]
Param (
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
Add-Type -Assembly System.Windows.Forms -ErrorAction 'SilentlyContinue'
}
Process {
Write-Log -Message 'Check if system is using AC power or if it is running on battery...' -Source ${CmdletName}
[System.Windows.Forms.PowerStatus]$PowerStatus = [System.Windows.Forms.SystemInformation]::PowerStatus
[string]$PowerLineStatus = $PowerStatus.PowerLineStatus
[string]$BatteryChargeStatus = $PowerStatus.BatteryChargeStatus
[single]$BatteryLifePercent = $PowerStatus.BatteryLifePercent
If (($BatteryChargeStatus -eq 'NoSystemBattery') -or ($BatteryChargeStatus -eq 'Unknown')) {
[single]$BatteryLifePercent = 0.0
}
[int32]$BatteryLifeRemaining = $PowerStatus.BatteryLifeRemaining
[int32]$BatteryFullLifetime = $PowerStatus.BatteryFullLifetime
[boolean]$OnACPower = $false
If ($PowerLineStatus -eq 'Online') {
Write-Log -Message 'System is using AC power.' -Source ${CmdletName}
$OnACPower = $true
}
ElseIf ($PowerLineStatus -eq 'Offline') {
Write-Log -Message 'System is using battery power.' -Source ${CmdletName}
}
ElseIf ($PowerLineStatus -eq 'Unknown') {
If (($BatteryChargeStatus -eq 'NoSystemBattery') -or ($BatteryChargeStatus -eq 'Unknown')) {
Write-Log -Message "System power status is [$PowerLineStatus] and battery charge status is [$BatteryChargeStatus]. This is most likely due to a damaged battery so we will report system is using AC power." -Source ${CmdletName}
$OnACPower = $true
}
Else {
Write-Log -Message "System power status is [$PowerLineStatus] and battery charge status is [$BatteryChargeStatus]. Therefore, we will report system is using battery power." -Source ${CmdletName}
}
}
Write-Output $OnACPower
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Test-NetworkConnection {
[CmdletBinding()]
Param (
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Write-Log -Message 'Check if system is using a wired network connection...' -Source ${CmdletName}
[psobject[]]$networkConnected = Get-WmiObject -Class Win32_NetworkAdapter | Where-Object { ($_.NetConnectionStatus -eq 2) -and ($_.NetConnectionID -match 'Local') -and ($_.NetConnectionID -notmatch 'Wireless') -and ($_.Name -notmatch 'Virtual') } -ErrorAction 'SilentlyContinue'
[boolean]$onNetwork = $false
If ($networkConnected) {
Write-Log -Message 'Wired network connection found.' -Source ${CmdletName}
[boolean]$onNetwork = $true
}
Else {
Write-Log -Message 'Wired network connection not found.' -Source ${CmdletName}
}
Write-Output $onNetwork
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Test-PowerPoint {
[CmdletBinding()]
Param (
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$FullScreenWindowSource = @'
using System;
using System.Text;
using System.Text.RegularExpressions;
using System.Runtime.InteropServices;
namespace ScreenDetection
{
[StructLayout(LayoutKind.Sequential)]
public struct RECT
{
public int Left;
public int Top;
public int Right;
public int Bottom;
}
public class FullScreen
{
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
private static extern IntPtr GetForegroundWindow();
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
private static extern IntPtr GetDesktopWindow();
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
private static extern IntPtr GetShellWindow();
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
private static extern int GetWindowRect(IntPtr hWnd, out RECT rc);
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = false)]
static extern int GetWindowText(IntPtr hWnd, StringBuilder text, int count);
private static IntPtr desktopHandle;
private static IntPtr shellHandle;
public static bool IsFullScreenWindow(string fullScreenWindowTitle)
{
desktopHandle = GetDesktopWindow();
shellHandle = GetShellWindow();
bool runningFullScreen = false;
RECT appBounds;
System.Drawing.Rectangle screenBounds;
const int nChars = 256;
StringBuilder Buff = new StringBuilder(nChars);
string mainWindowTitle = "";
IntPtr hWnd;
hWnd = GetForegroundWindow();
if (hWnd != null && !hWnd.Equals(IntPtr.Zero))
{
if (!(hWnd.Equals(desktopHandle) || hWnd.Equals(shellHandle)))
{
if (GetWindowText(hWnd, Buff, nChars) > 0)
{
mainWindowTitle = Buff.ToString();
//Console.WriteLine(mainWindowTitle);
}
// If the main window title contains the text being searched for, then check to see if the window is in fullscreen mode.
Match match = Regex.Match(mainWindowTitle, fullScreenWindowTitle, RegexOptions.IgnoreCase);
if ((!string.IsNullOrEmpty(fullScreenWindowTitle)) && match.Success)
{
GetWindowRect(hWnd, out appBounds);
screenBounds = System.Windows.Forms.Screen.FromHandle(hWnd).Bounds;
if ((appBounds.Bottom - appBounds.Top) == screenBounds.Height && (appBounds.Right - appBounds.Left) == screenBounds.Width)
{
runningFullScreen = true;
}
}
}
}
return runningFullScreen;
}
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'ScreenDetection.FullScreen').Type) {
[string[]]$ReferencedAssemblies = 'System.Drawing', 'System.Windows.Forms'
Add-Type -TypeDefinition $FullScreenWindowSource -ReferencedAssemblies $ReferencedAssemblies -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
Write-Log -Message 'Check if PowerPoint is in fullscreen slideshow mode...' -Source ${CmdletName}
[boolean]$IsPowerPointFullScreen = $false
If (Get-Process -Name 'POWERPNT' -ErrorAction 'SilentlyContinue') {
Write-Log -Message 'PowerPoint application is running.' -Source ${CmdletName}
[boolean]$IsPowerPointFullScreen = [ScreenDetection.FullScreen]::IsFullScreenWindow('^PowerPoint Slide Show')
Write-Log -Message "PowerPoint is running in fullscreen mode: $IsPowerPointFullScreen" -Source ${CmdletName}
}
Else {
Write-Log -Message 'PowerPoint application is not running.' -Source ${CmdletName}
}
Write-Output $IsPowerPointFullScreen
}
Catch {
Write-Log -Message "Failed check to see if PowerPoint is running in fullscreen slideshow mode. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
Write-Output $false
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Invoke-SCCMTask {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateSet('HardwareInventory','SoftwareInventory','HeartbeatDiscovery','SoftwareInventoryFileCollection','RequestMachinePolicy','EvaluateMachinePolicy','LocationServicesCleanup','SoftwareMeteringReport','SourceUpdate','PolicyAgentCleanup','RequestMachinePolicy2','CertificateMaintenance','PeerDistributionPointStatus','PeerDistributionPointProvisioning','ComplianceIntervalEnforcement','SoftwareUpdatesAgentAssignmentEvaluation','UploadStateMessage','StateMessageManager','SoftwareUpdatesScan','AMTProvisionCycle')]
[string]$ScheduleID,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
[hashtable]$ScheduleIds = @{
HardwareInventory = '{00000000-0000-0000-0000-000000000001}';
SoftwareInventory = '{00000000-0000-0000-0000-000000000002}';
HeartbeatDiscovery = '{00000000-0000-0000-0000-000000000003}';
SoftwareInventoryFileCollection = '{00000000-0000-0000-0000-000000000010}';
RequestMachinePolicy = '{00000000-0000-0000-0000-000000000021}';
EvaluateMachinePolicy = '{00000000-0000-0000-0000-000000000022}';
RefreshDefaultMp = '{00000000-0000-0000-0000-000000000023}';
RefreshLocationServices = '{00000000-0000-0000-0000-000000000024}';
LocationServicesCleanup = '{00000000-0000-0000-0000-000000000025}';
SoftwareMeteringReport = '{00000000-0000-0000-0000-000000000031}';
SourceUpdate = '{00000000-0000-0000-0000-000000000032}';
PolicyAgentCleanup = '{00000000-0000-0000-0000-000000000040}';
RequestMachinePolicy2 = '{00000000-0000-0000-0000-000000000042}';
CertificateMaintenance = '{00000000-0000-0000-0000-000000000051}';
PeerDistributionPointStatus = '{00000000-0000-0000-0000-000000000061}';
PeerDistributionPointProvisioning = '{00000000-0000-0000-0000-000000000062}';
ComplianceIntervalEnforcement = '{00000000-0000-0000-0000-000000000071}';
SoftwareUpdatesAgentAssignmentEvaluation = '{00000000-0000-0000-0000-000000000108}';
UploadStateMessage = '{00000000-0000-0000-0000-000000000111}';
StateMessageManager = '{00000000-0000-0000-0000-000000000112}';
SoftwareUpdatesScan = '{00000000-0000-0000-0000-000000000113}';
AMTProvisionCycle = '{00000000-0000-0000-0000-000000000120}';
}
}
Process {
Write-Log -Message "Invoke SCCM Schedule Task ID [$ScheduleId]..." -Source ${CmdletName}
Try {
[System.Management.ManagementClass]$SmsClient = [WMIClass]'ROOT\CCM:SMS_Client'
$SmsClient.TriggerSchedule($ScheduleIds.$ScheduleID) | Out-Null
}
Catch {
Write-Log -Message "Failed to trigger SCCM Schedule Task ID [$($ScheduleIds.$ScheduleId)]. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to trigger SCCM Schedule Task ID [$($ScheduleIds.$ScheduleId)]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Install-SCCMSoftwareUpdates {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Write-Log -Message 'Scan for pending SCCM software updates...' -Source ${CmdletName}
Invoke-SCCMTask -ScheduleId 'SoftwareUpdatesScan'
Write-Log -Message 'Sleep for 180 seconds...' -Source ${CmdletName}
Start-Sleep -Seconds 180
Write-Log -Message 'Install pending software updates...' -Source ${CmdletName}
Try {
[System.Management.ManagementClass]$SmsSoftwareUpdates = [WMIClass]'ROOT\CCM:SMS_Client'
$SmsSoftwareUpdates.InstallUpdates([System.Management.ManagementObject[]](Get-WmiObject -Namespace 'ROOT\CCM\ClientSDK' -Query 'SELECT * FROM CCM_SoftwareUpdate' -ErrorAction 'Stop')) | Out-Null
}
Catch {
Write-Log -Message "Failed to trigger installation of pending SCCM software updates. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to trigger installation of pending SCCM software updates: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Update-GroupPolicy {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
[string[]]$GPUpdateCmds = '/C echo N | gpupdate.exe /Target:Computer /Force', '/C echo N | gpupdate.exe /Target:User /Force'
[int32]$InstallCount = 0
ForEach ($GPUpdateCmd in $GPUpdateCmds) {
Try {
If ($InstallCount -eq 0) {
[string]$InstallMsg = 'Update Group Policies for the Machine'
Write-Log -Message $InstallMsg -Source ${CmdletName}
}
Else {
[string]$InstallMsg = 'Update Group Policies for the User'
Write-Log -Message $InstallMsg -Source ${CmdletName}
}
[psobject]$ExecuteResult = Execute-Process -Path "$envWindir\system32\cmd.exe" -Parameters $GPUpdateCmd -WindowStyle Hidden -PassThru
If ($ExecuteResult.ExitCode -ne 0) {
If ($ExecuteResult.ExitCode -eq 999) {
Throw "Execute-Process function failed with exit code [$($ExecuteResult.ExitCode)]."
}
Else {
Throw "gpupdate.exe failed with exit code [$($ExecuteResult.ExitCode)]."
}
}
$InstallCount++
}
Catch {
Write-Log -Message "Failed to $($InstallMsg). `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to $($InstallMsg): $($_.Exception.Message)"
}
Continue
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Enable-TerminalServerInstallMode {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message 'Change terminal server into user install mode...' -Source ${CmdletName}
$terminalServerResult = change.exe User /Install
If ($global:LastExitCode -ne 0) { Throw $terminalServerResult }
}
Catch {
Write-Log -Message "Failed to change terminal server into user install mode. `n$(Resolve-Error) " -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to change terminal server into user install mode: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Disable-TerminalServerInstallMode {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message 'Change terminal server into user execute mode...' -Source ${CmdletName}
$terminalServerResult = change.exe User /Execute
If ($global:LastExitCode -ne 0) { Throw $terminalServerResult }
}
Catch {
Write-Log -Message "Failed to change terminal server into user execute mode. `n$(Resolve-Error) " -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to change terminal server into user execute mode: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Set-ActiveSetup {
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[ValidateNotNullorEmpty()]
[string]$StubExePath,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Arguments,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Description = $installName,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Key = $installName,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Version = ((Get-Date -Format 'yyMM,ddHH,mmss').ToString()),
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[string]$Locale,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[switch]$DisableActiveSetup = $false,
[Parameter(Mandatory=$false)]
[switch]$PurgeActiveSetupKey,
[Parameter(Mandatory=$false)]
[ValidateNotNullorEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
[string]$ActiveSetupKey = "HKLM:SOFTWARE\Microsoft\Active Setup\Installed Components\$Key"
[string]$HKCUActiveSetupKey = "HKCU:Software\Microsoft\Active Setup\Installed Components\$Key"
If ($PurgeActiveSetupKey) {
Write-Log -Message "Remove Active Setup entry [$ActiveSetupKey]." -Source ${CmdletName}
Remove-RegistryKey -Key $ActiveSetupKey
Write-Log -Message "Remove Active Setup entry [$HKCUActiveSetupKey] for all log on user registry hives on the system." -Source ${CmdletName}
[scriptblock]$RemoveHKCUActiveSetupKey = { Remove-RegistryKey -Key $HKCUActiveSetupKey -SID $UserProfile.SID }
Invoke-HKCURegistrySettingsForAllUsers -RegistrySettings $RemoveHKCUActiveSetupKey -UserProfiles (Get-UserProfiles -ExcludeDefaultUser)
Return
}
[string[]]$StubExePathFileExtensions = '.exe', '.vbs', '.cmd', '.ps1', '.js'
[string]$StubExeExt = [System.IO.Path]::GetExtension($StubExePath)
If ($StubExePathFileExtensions -notcontains $StubExeExt) {
Throw "Unsupported Active Setup StubPath file extension [$StubExeExt]."
}
[string]$StubExePath = [Environment]::ExpandEnvironmentVariables($StubExePath)
[string]$ActiveSetupFileName = [System.IO.Path]::GetFileName($StubExePath)
[string]$StubExeFile = Join-Path -Path $dirFiles -ChildPath $ActiveSetupFileName
If (Test-Path -Path $StubExeFile -PathType Leaf) {
Copy-File -Path $StubExeFile -Destination $StubExePath -ContinueOnError $false
}
If (-not (Test-Path -Path $StubExePath -PathType Leaf)) { Throw "Active Setup StubPath file [$ActiveSetupFileName] is missing." }
Switch ($StubExeExt) {
'.exe' {
[string]$CUStubExePath = $StubExePath
[string]$CUArguments = $Arguments
[string]$StubPath = "$CUStubExePath"
}
{'.vbs','.js' -contains $StubExeExt} {
[string]$CUStubExePath = "$envWinDir\system32\cscript.exe"
[string]$CUArguments = "//nologo `"$StubExePath`""
[string]$StubPath = "$CUStubExePath $CUArguments"
}
'.cmd' {
[string]$CUStubExePath = "$envWinDir\system32\CMD.exe"
[string]$CUArguments = "/C `"$StubExePath`""
[string]$StubPath = "$CUStubExePath $CUArguments"
}
'.ps1' {
[string]$CUStubExePath = "$PSHOME\powershell.exe"
[string]$CUArguments = "-ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden -Command `"$StubExePath`""
[string]$StubPath = "$CUStubExePath $CUArguments"
}
}
If ($Arguments) {
[string]$StubPath = "$StubPath $Arguments"
If ($StubExeExt -ne '.exe') { [string]$CUArguments = "$CUArguments $Arguments" }
}
Set-RegistryKey -Key $ActiveSetupKey -Name '(Default)' -Value $Description -ContinueOnError $false
Set-RegistryKey -Key $ActiveSetupKey -Name 'StubPath' -Value $StubPath -Type 'ExpandString' -ContinueOnError $false
Set-RegistryKey -Key $ActiveSetupKey -Name 'Version' -Value $Version -ContinueOnError $false
If ($Locale) { Set-RegistryKey -Key $ActiveSetupKey -Name 'Locale' -Value $Locale -ContinueOnError $false }
If ($DisableActiveSetup) {
Set-RegistryKey -Key $ActiveSetupKey -Name 'IsInstalled' -Value 0 -Type 'DWord' -ContinueOnError $false
}
Else {
Set-RegistryKey -Key $ActiveSetupKey -Name 'IsInstalled' -Value 1 -Type 'DWord' -ContinueOnError $false
}
If ($SessionZero) {
Write-Log -Message 'Session 0 detected: Will not execute Active Setup StubPath file. Users will have to log off and log back into their account to execute Active Setup entry.' -Source ${CmdletName}
}
Else {
Write-Log -Message 'Execute Active Setup StubPath file for the current user.' -Source ${CmdletName}
If ($CUArguments) {
$ExecuteResults = Execute-Process -FilePath $CUStubExePath -Arguments $CUArguments -PassThru
}
Else {
$ExecuteResults = Execute-Process -FilePath $CUStubExePath -PassThru
}
}
}
Catch {
Write-Log -Message "Failed to set Active Setup registry entry. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed to set Active Setup registry entry: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Test-ServiceExists {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$ComputerName = $env:ComputerName,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$PassThru,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
$ServiceObject = Get-WmiObject -ComputerName $ComputerName -Class Win32_Service -Filter "Name='$Name'" -ErrorAction 'Stop'
If ($ServiceObject) {
Write-Log -Message "Service [$Name] exists" -Source ${CmdletName}
If ($PassThru) { Write-Output $ServiceObject } Else { Write-Output $true }
}
Else {
Write-Log -Message "Service [$Name] does not exist" -Source ${CmdletName}
If ($PassThru) { Write-Output $ServiceObject } Else { Write-Output $false }
}
}
Catch {
Write-Log -Message "Failed check to see if service [$Name] exists." -Severity 3 -Source ${CmdletName}
If (-not $ContinueOnError) {
Throw "Failed check to see if service [$Name] exists: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Stop-ServiceAndDependencies {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$ComputerName = $env:ComputerName,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$SkipServiceExistsTest,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$SkipDependentServices,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$PassThru,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ((-not $SkipServiceExistsTest) -and (-not (Test-ServiceExists -ComputerName $ComputerName -Name $Name -ContinueOnError $false))) {
Write-Log -Message "Service [$Name] does not exist" -Source ${CmdletName} -Severity 2
Throw "Service [$Name] does not exist."
}
Write-Log -Message "Get the service object for service [$Name]" -Source ${CmdletName}
[System.ServiceProcess.ServiceController]$Service = Get-Service -ComputerName $ComputerName -Name $Name -ErrorAction 'Stop'
[string[]]$PendingStatus = 'ContinuePending', 'PausePending', 'StartPending', 'StopPending'
If ($PendingStatus -contains $Service.Status) {
Switch ($Service.Status) {
{'ContinuePending'} { $DesiredStatus = 'Running' }
{'PausePending'} { $DesiredStatus = 'Paused' }
{'StartPending'} { $DesiredStatus = 'Running' }
{'StopPending'} { $DesiredStatus = 'Stopped' }
}
[timespan]$WaitForStatusTime = New-TimeSpan -Seconds 60
Write-Log -Message "Waiting for up to [$($WaitForStatusTime.TotalSeconds)] seconds to allow service pending status [$($Service.Status)] to reach desired status [$DesiredStatus]." -Source ${CmdletName}
$Service.WaitForStatus([System.ServiceProcess.ServiceControllerStatus]$DesiredStatus, $WaitForStatusTime)
$Service.Refresh()
}
Write-Log -Message "Service [$($Service.ServiceName)] with display name [$($Service.DisplayName)] has a status of [$($Service.Status)]" -Source ${CmdletName}
If ($Service.Status -ne 'Stopped') {
If (-not $SkipDependentServices) {
Write-Log -Message "Discover all dependent service(s) for service [$Name] which are not 'Stopped'." -Source ${CmdletName}
[System.ServiceProcess.ServiceController[]]$DependentServices = Get-Service -ComputerName $ComputerName -Name $Service.ServiceName -DependentServices -ErrorAction 'Stop' | Where-Object { $_.Status -ne 'Stopped' }
If ($DependentServices) {
ForEach ($DependentService in $DependentServices) {
Write-Log -Message "Stop dependent service [$($DependentService.ServiceName)] with display name [$($DependentService.DisplayName)] and a status of [$($DependentService.Status)]." -Source ${CmdletName}
Try {
Stop-Service -InputObject (Get-Service -ComputerName $ComputerName -Name $DependentService.ServiceName -ErrorAction 'Stop') -Force -WarningAction 'SilentlyContinue' -ErrorAction 'Stop'
}
Catch {
Write-Log -Message "Failed to start dependent service [$($DependentService.ServiceName)] with display name [$($DependentService.DisplayName)] and a status of [$($DependentService.Status)]. Continue..." -Severity 2 -Source ${CmdletName}
Continue
}
}
}
Else {
Write-Log -Message "Dependent service(s) were not discovered for service [$Name]" -Source ${CmdletName}
}
}
Write-Log -Message "Stop parent service [$($Service.ServiceName)] with display name [$($Service.DisplayName)]" -Source ${CmdletName}
[System.ServiceProcess.ServiceController]$Service = Stop-Service -InputObject (Get-Service -ComputerName $ComputerName -Name $Service.ServiceName -ErrorAction 'Stop') -Force -PassThru -WarningAction 'SilentlyContinue' -ErrorAction 'Stop'
}
}
Catch {
Write-Log -Message "Failed to stop the service [$Name]. `n$(Resolve-Error)" -Source ${CmdletName} -Severity 3
If (-not $ContinueOnError) {
Throw "Failed to stop the service [$Name]: $($_.Exception.Message)"
}
}
Finally {
If ($PassThru -and $Service) { Write-Output $Service }
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Start-ServiceAndDependencies {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$ComputerName = $env:ComputerName,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$SkipServiceExistsTest,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$SkipDependentServices,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$PassThru,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If ((-not $SkipServiceExistsTest) -and (-not (Test-ServiceExists -ComputerName $ComputerName -Name $Name -ContinueOnError $false))) {
Write-Log -Message "Service [$Name] does not exist" -Source ${CmdletName} -Severity 2
Throw "Service [$Name] does not exist."
}
Write-Log -Message "Get the service object for service [$Name]" -Source ${CmdletName}
[System.ServiceProcess.ServiceController]$Service = Get-Service -ComputerName $ComputerName -Name $Name -ErrorAction 'Stop'
[string[]]$PendingStatus = 'ContinuePending', 'PausePending', 'StartPending', 'StopPending'
If ($PendingStatus -contains $Service.Status) {
Switch ($Service.Status) {
'ContinuePending' { $DesiredStatus = 'Running' }
'PausePending' { $DesiredStatus = 'Paused' }
'StartPending' { $DesiredStatus = 'Running' }
'StopPending' { $DesiredStatus = 'Stopped' }
}
[timespan]$WaitForStatusTime = New-TimeSpan -Seconds 60
Write-Log -Message "Waiting for up to [$($WaitForStatusTime.TotalSeconds)] seconds to allow service pending status [$($Service.Status)] to reach desired status [$DesiredStatus]." -Source ${CmdletName}
$Service.WaitForStatus([System.ServiceProcess.ServiceControllerStatus]$DesiredStatus, $WaitForStatusTime)
$Service.Refresh()
}
Write-Log -Message "Service [$($Service.ServiceName)] with display name [$($Service.DisplayName)] has a status of [$($Service.Status)]" -Source ${CmdletName}
If ($Service.Status -ne 'Running') {
Write-Log -Message "Start parent service [$($Service.ServiceName)] with display name [$($Service.DisplayName)]" -Source ${CmdletName}
[System.ServiceProcess.ServiceController]$Service = Start-Service -InputObject (Get-Service -ComputerName $ComputerName -Name $Service.ServiceName -ErrorAction 'Stop') -PassThru -WarningAction 'SilentlyContinue' -ErrorAction 'Stop'
If (-not $SkipDependentServices) {
Write-Log -Message "Discover all dependent service(s) for service [$Name] which are not 'Running'." -Source ${CmdletName}
[System.ServiceProcess.ServiceController[]]$DependentServices = Get-Service -ComputerName $ComputerName -Name $Service.ServiceName -DependentServices -ErrorAction 'Stop' | Where-Object { $_.Status -ne 'Running' }
If ($DependentServices) {
ForEach ($DependentService in $DependentServices) {
Write-Log -Message "Start dependent service [$($DependentService.ServiceName)] with display name [$($DependentService.DisplayName)] and a status of [$($DependentService.Status)]." -Source ${CmdletName}
Try {
Start-Service -InputObject (Get-Service -ComputerName $ComputerName -Name $DependentService.ServiceName -ErrorAction 'Stop') -WarningAction 'SilentlyContinue' -ErrorAction 'Stop'
}
Catch {
Write-Log -Message "Failed to start dependent service [$($DependentService.ServiceName)] with display name [$($DependentService.DisplayName)] and a status of [$($DependentService.Status)]. Continue..." -Severity 2 -Source ${CmdletName}
Continue
}
}
}
Else {
Write-Log -Message "Dependent service(s) were not discovered for service [$Name]" -Source ${CmdletName}
}
}
}
}
Catch {
Write-Log -Message "Failed to start the service [$Name]. `n$(Resolve-Error)" -Source ${CmdletName} -Severity 3
If (-not $ContinueOnError) {
Throw "Failed to start the service [$Name]: $($_.Exception.Message)"
}
}
Finally {
If ($PassThru -and $Service) { Write-Output $Service }
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-ServiceStartMode
{
[CmdLetBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$ComputerName = $env:ComputerName,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
Write-Log -Message "Get the service [$Name] startup mode." -Source ${CmdletName}
[string]$ServiceStartMode = (Get-WmiObject -ComputerName $ComputerName -Class 'Win32_Service' -Filter "Name='$Name'" -Property 'StartMode' -ErrorAction 'Stop').StartMode
If ($ServiceStartMode -eq 'Auto') { $ServiceStartMode = 'Automatic'}
If (($ServiceStartMode -eq 'Automatic') -and ([System.Environment]::OSVersion.Version.Major -gt 5)) {
Try {
[string]$ServiceRegistryPath = "HKLM:SYSTEM\CurrentControlSet\Services\$Name"
[int32]$DelayedAutoStart = Get-ItemProperty -Path $ServiceRegistryPath -ErrorAction 'SilentlyContinue' | Select-Object -ExpandProperty 'DelayedAutoStart' -ErrorAction 'Stop'
If ($DelayedAutoStart -eq 1) { $ServiceStartMode = 'Automatic (Delayed Start)' }
}
Catch { }
}
Write-Log -Message "Service [$Name] startup mode is set to [$ServiceStartMode]" -Source ${CmdletName}
Write-Output $ServiceStartMode
}
Catch {
Write-Log -Message "Failed to get the service [$Name] startup mode. `n$(Resolve-Error)" -Source ${CmdletName} -Severity 3
If (-not $ContinueOnError) {
Throw "Failed to get the service [$Name] startup mode: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Set-ServiceStartMode
{
[CmdLetBinding()]
Param (
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string]$ComputerName = $env:ComputerName,
[Parameter(Mandatory=$true)]
[ValidateSet('Automatic','Automatic (Delayed Start)','Manual','Disabled','Boot','System')]
[string]$StartMode,
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[boolean]$ContinueOnError = $true
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
}
Process {
Try {
If (($StartMode -eq 'Automatic (Delayed Start)') -and ([System.Environment]::OSVersion.Version.Major -lt 6)) { $StartMode = 'Automatic' }
Write-Log -Message "Set service [$Name] startup mode to [$StartMode]" -Source ${CmdletName}
If ($StartMode -eq 'Automatic (Delayed Start)') {
$ChangeStartMode = & sc.exe config $Name start= delayed-auto
If ($global:LastExitCode -ne 0) {
Throw "sc.exe failed with exit code [$($global:LastExitCode)] and message [$ChangeStartMode]."
}
}
Else {
$ChangeStartMode = (Get-WmiObject -ComputerName $ComputerName -Class Win32_Service -Filter "Name='$Name'" -ErrorAction 'Stop').ChangeStartMode($StartMode)
If($ChangeStartMode.ReturnValue -ne 0) {
Throw "The 'ChangeStartMode' method of the 'Win32_Service' WMI class failed with a return value of [$($ChangeStartMode.ReturnValue)]."
}
}
Write-Log -Message "Successfully set service [$Name] startup mode to [$StartMode]" -Source ${CmdletName}
}
Catch {
Write-Log -Message "Failed to set service [$Name] startup mode to [$StartMode]. `n$(Resolve-Error)" -Source ${CmdletName} -Severity 3
If (-not $ContinueOnError) {
Throw "Failed to set service [$Name] startup mode to [$StartMode]: $($_.Exception.Message)"
}
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Get-LoggedOnUser {
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[switch]$SkipIsLocalAdminCheck = $false
)
Begin {
[string]${CmdletName} = $PSCmdlet.MyInvocation.MyCommand.Name
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -CmdletBoundParameters $PSBoundParameters -Header
$QueryUserSessionSource = @'
using System;
using System.Collections.Generic;
using System.Text;
using System.Runtime.InteropServices;
using System.ComponentModel;
using FILETIME=System.Runtime.InteropServices.ComTypes.FILETIME;
namespace QueryUser
{
public class Session
{
[DllImport("wtsapi32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern IntPtr WTSOpenServer(string pServerName);
[DllImport("wtsapi32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern void WTSCloseServer(IntPtr hServer);
[DllImport("wtsapi32.dll", CharSet = CharSet.Ansi, SetLastError = false)]
public static extern bool WTSQuerySessionInformation(IntPtr hServer, int sessionId, WTS_INFO_CLASS wtsInfoClass, out IntPtr pBuffer, out int pBytesReturned);
[DllImport("wtsapi32.dll", CharSet = CharSet.Ansi, SetLastError = false)]
public static extern int WTSEnumerateSessions(IntPtr hServer, int Reserved, int Version, out IntPtr pSessionInfo, out int pCount);
[DllImport("wtsapi32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern void WTSFreeMemory(IntPtr pMemory);
[DllImport("winsta.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern int WinStationQueryInformation(IntPtr hServer, int sessionId, int information, ref WINSTATIONINFORMATIONW pBuffer, int bufferLength, ref int returnedLength);
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern int GetCurrentProcessId();
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = false)]
public static extern bool ProcessIdToSessionId(int processId, ref int pSessionId);
[StructLayout(LayoutKind.Sequential)]
private struct WTS_SESSION_INFO
{
public Int32 SessionId; [MarshalAs(UnmanagedType.LPStr)] public string SessionName; public WTS_CONNECTSTATE_CLASS State;
}
[StructLayout(LayoutKind.Sequential)]
public struct WINSTATIONINFORMATIONW
{
[MarshalAs(UnmanagedType.ByValArray, SizeConst = 70)] private byte[] Reserved1;
public int SessionId;
[MarshalAs(UnmanagedType.ByValArray, SizeConst = 4)] private byte[] Reserved2;
public FILETIME ConnectTime;
public FILETIME DisconnectTime;
public FILETIME LastInputTime;
public FILETIME LoginTime;
[MarshalAs(UnmanagedType.ByValArray, SizeConst = 1096)] private byte[] Reserved3;
public FILETIME CurrentTime;
}
public enum WINSTATIONINFOCLASS { WinStationInformation = 8 }
public enum WTS_CONNECTSTATE_CLASS { Active, Connected, ConnectQuery, Shadow, Disconnected, Idle, Listen, Reset, Down, Init }
public enum WTS_INFO_CLASS { SessionId=4, UserName, SessionName, DomainName, ConnectState, ClientBuildNumber, ClientName, ClientDirectory, ClientProtocolType=16 }
private static IntPtr OpenServer(string Name) { IntPtr server = WTSOpenServer(Name); return server; }
private static void CloseServer(IntPtr ServerHandle) { WTSCloseServer(ServerHandle); }
private static IList<T> PtrToStructureList<T>(IntPtr ppList, int count) where T : struct
{
List<T> result = new List<T>(); long pointer = ppList.ToInt64(); int sizeOf = Marshal.SizeOf(typeof(T));
for (int index = 0; index < count; index++)
{
T item = (T) Marshal.PtrToStructure(new IntPtr(pointer), typeof(T)); result.Add(item); pointer += sizeOf;
}
return result;
}
public static DateTime? FileTimeToDateTime(FILETIME ft)
{
if (ft.dwHighDateTime == 0 && ft.dwLowDateTime == 0) { return null; }
long hFT = (((long) ft.dwHighDateTime) << 32) + ft.dwLowDateTime;
return DateTime.FromFileTime(hFT);
}
public static WINSTATIONINFORMATIONW GetWinStationInformation(IntPtr server, int sessionId)
{
int retLen = 0;
WINSTATIONINFORMATIONW wsInfo = new WINSTATIONINFORMATIONW();
WinStationQueryInformation(server, sessionId, (int) WINSTATIONINFOCLASS.WinStationInformation, ref wsInfo, Marshal.SizeOf(typeof(WINSTATIONINFORMATIONW)), ref retLen);
return wsInfo;
}
public static TerminalSessionData[] ListSessions(string ServerName)
{
IntPtr server = IntPtr.Zero;
if (ServerName != "localhost" && ServerName != String.Empty) {server = OpenServer(ServerName);}
List<TerminalSessionData> results = new List<TerminalSessionData>();
try
{
IntPtr ppSessionInfo = IntPtr.Zero; int count; bool _isUserSession = false; IList<WTS_SESSION_INFO> sessionsInfo;
if (WTSEnumerateSessions(server, 0, 1, out ppSessionInfo, out count) == 0) { throw new Win32Exception(); }
try { sessionsInfo = PtrToStructureList<WTS_SESSION_INFO>(ppSessionInfo, count); }
finally { WTSFreeMemory(ppSessionInfo); }
foreach (WTS_SESSION_INFO sessionInfo in sessionsInfo)
{
if (sessionInfo.SessionName != "Services" && sessionInfo.SessionName != "RDP-Tcp") { _isUserSession = true; }
results.Add(new TerminalSessionData(sessionInfo.SessionId, sessionInfo.State, sessionInfo.SessionName, _isUserSession));
_isUserSession = false;
}
}
finally { CloseServer(server); }
TerminalSessionData[] returnData = results.ToArray();
return returnData;
}
public static TerminalSessionInfo GetSessionInfo(string ServerName, int SessionId)
{
IntPtr server = IntPtr.Zero;
IntPtr buffer = IntPtr.Zero;
int bytesReturned;
TerminalSessionInfo data = new TerminalSessionInfo();
bool _IsCurrentSessionId = false;
bool _IsConsoleSession = false;
bool _IsUserSession = false;
int currentSessionID = 0;
string _NTAccount = String.Empty;
if (ServerName != "localhost" && ServerName != String.Empty) { server = OpenServer(ServerName); }
if (ProcessIdToSessionId(GetCurrentProcessId(), ref currentSessionID) == false) { currentSessionID = -1; }
try
{
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.ClientBuildNumber, out buffer, out bytesReturned) == false) { return data; }
int lData = Marshal.ReadInt32(buffer);
data.ClientBuildNumber = lData;
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.ClientDirectory, out buffer, out bytesReturned) == false) { return data; }
string strData = Marshal.PtrToStringAnsi(buffer);
data.ClientDirectory = strData;
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.ClientName, out buffer, out bytesReturned) == false) { return data; }
strData = Marshal.PtrToStringAnsi(buffer);
data.ClientName = strData;
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.ClientProtocolType, out buffer, out bytesReturned) == false) { return data; }
Int16 intData = Marshal.ReadInt16(buffer);
if (intData == 2) {strData = "RDP";} else {strData = "";}
data.ClientProtocolType = strData;
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.ConnectState, out buffer, out bytesReturned) == false) { return data; }
lData = Marshal.ReadInt32(buffer);
data.ConnectState = (WTS_CONNECTSTATE_CLASS)Enum.ToObject(typeof(WTS_CONNECTSTATE_CLASS), lData);
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.SessionId, out buffer, out bytesReturned) == false) { return data; }
lData = Marshal.ReadInt32(buffer);
data.SessionId = lData;
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.DomainName, out buffer, out bytesReturned) == false) { return data; }
strData = Marshal.PtrToStringAnsi(buffer);
data.DomainName = strData;
if (strData != String.Empty) {_NTAccount = strData;}
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.UserName, out buffer, out bytesReturned) == false) { return data; }
strData = Marshal.PtrToStringAnsi(buffer);
data.UserName = strData;
if (strData != String.Empty) {data.NTAccount = _NTAccount + "\\" + strData;}
if (WTSQuerySessionInformation(server, SessionId, WTS_INFO_CLASS.SessionName, out buffer, out bytesReturned) == false) { return data; }
strData = Marshal.PtrToStringAnsi(buffer);
data.SessionName = strData;
if (strData != "Services" && strData != "RDP-Tcp") { _IsUserSession = true; }
data.IsUserSession = _IsUserSession;
if (strData == "Console") { _IsConsoleSession = true; }
data.IsConsoleSession = _IsConsoleSession;
WINSTATIONINFORMATIONW wsInfo = GetWinStationInformation(server, SessionId);
DateTime? _loginTime = FileTimeToDateTime(wsInfo.LoginTime);
DateTime? _lastInputTime = FileTimeToDateTime(wsInfo.LastInputTime);
DateTime? _disconnectTime = FileTimeToDateTime(wsInfo.DisconnectTime);
DateTime? _currentTime = FileTimeToDateTime(wsInfo.CurrentTime);
TimeSpan? _idleTime = (_currentTime != null && _lastInputTime != null) ? _currentTime.Value - _lastInputTime.Value : TimeSpan.Zero;
data.LogonTime = _loginTime;
data.IdleTime = _idleTime;
data.DisconnectTime = _disconnectTime;
if (currentSessionID == SessionId) { _IsCurrentSessionId = true; }
data.IsCurrentSession = _IsCurrentSessionId;
}
finally
{
WTSFreeMemory(buffer); buffer = IntPtr.Zero; CloseServer(server);
}
return data;
}
}
public class TerminalSessionData
{
public int SessionId; public Session.WTS_CONNECTSTATE_CLASS ConnectionState; public string SessionName; public bool IsUserSession;
public TerminalSessionData(int sessionId, Session.WTS_CONNECTSTATE_CLASS connState, string sessionName, bool isUserSession)
{
SessionId = sessionId; ConnectionState = connState; SessionName = sessionName; IsUserSession = isUserSession;
}
}
public class TerminalSessionInfo
{
public string NTAccount; public string UserName; public string DomainName; public int SessionId; public string SessionName;
public Session.WTS_CONNECTSTATE_CLASS ConnectState; public bool IsCurrentSession; public bool IsConsoleSession;
public bool IsUserSession; public bool IsLocalAdmin; public DateTime? LogonTime; public TimeSpan? IdleTime; public DateTime? DisconnectTime;
public string ClientName; public string ClientProtocolType; public string ClientDirectory; public int ClientBuildNumber;
}
}
'@
If (-not ([System.Management.Automation.PSTypeName]'QueryUser.Session').Type) {
Add-Type -TypeDefinition $QueryUserSessionSource -Language CSharp -IgnoreWarnings -ErrorAction 'Stop'
}
}
Process {
Try {
If (-not $SkipIsLocalAdminCheck) {
Try {
$LocalAdminGroupSID = New-Object -TypeName System.Security.Principal.SecurityIdentifier -ArgumentList 'S-1-5-32-544'
$LocalAdminGroupNTAccount = $LocalAdminGroupSID.Translate([System.Security.Principal.NTAccount])
$LocalAdminGroupName = ($LocalAdminGroupNTAccount.Value).Split('\')[1]
$LocalAdminGroup =[ADSI]"WinNT://$($env:COMPUTERNAME)/$LocalAdminGroupName"
$LocalAdminGroupMembers = @($LocalAdminGroup.PSBase.Invoke('Members'))
[string[]]$LocalAdminGroupUserName = ''
$LocalAdminGroupMembers | ForEach { [string[]]$LocalAdminGroupUserName += $_.GetType().InvokeMember('Name', 'GetProperty', $null, $_, $null) }
[string[]]$LocalAdminGroupUserName = $LocalAdminGroupUserName | Where-Object { -not [string]::IsNullOrEmpty($_) }
[string[]]$LocalAdminGroupNTAccounts = @()
[string[]]$LocalAdminGroupNTAccounts = $LocalAdminGroupUserName | ForEach-Object { (New-Object -TypeName System.Security.Principal.NTAccount -ArgumentList $_).Translate([System.Security.Principal.SecurityIdentifier]).Translate([System.Security.Principal.NTAccount]).Value }
[boolean]$IsLocalAdminCheckSuccess = $true
}
Catch {
[boolean]$IsLocalAdminCheckSuccess = $false
[string[]]$LocalAdminGroupNTAccounts = @()
}
}
Write-Log -Message 'Get session information for all logged on users.' -Source ${CmdletName} -DisableOnRelaunchToolkitAsUser
[psobject[]]$TerminalSessions = [QueryUser.Session]::ListSessions('localhost')
ForEach ($TerminalSession in $TerminalSessions) {
If (($TerminalSession.IsUserSession)) {
[psobject]$SessionInfo = [QueryUser.Session]::GetSessionInfo('localhost', $TerminalSession.SessionId)
If ($SessionInfo.UserName) {
If ((-not $SkipIsLocalAdminCheck) -and ($IsLocalAdminCheckSuccess)) {
If ($LocalAdminGroupNTAccounts -contains $SessionInfo.NTAccount) {
$SessionInfo.IsLocalAdmin = $true
}
Else {
$SessionInfo.IsLocalAdmin = $false
}
}
[psobject[]]$TerminalSessionInfo += $SessionInfo
}
}
}
Write-Output $TerminalSessionInfo
}
Catch {
Write-Log -Message "Failed to get session information for all logged on users. `n$(Resolve-Error)" -Severity 3 -Source ${CmdletName} -DisableOnRelaunchToolkitAsUser
}
}
End {
Write-FunctionHeaderOrFooter -CmdletName ${CmdletName} -Footer
}
}
Function Invoke-PSCommandAsUser {
Param (
[string]$UserName = $RelaunchToolkitAsNTAccount,
[string]$PSPath = "$PSHOME\powershell.exe",
[scriptblock]$Command,
[switch]$NoWait = $false,
[switch]$NoExit = $false,
[switch]$ExitAfterCommandExecution = $false,
[switch]$PassThru = $false,
[boolean]$ContinueOnError = $true
)
If (-not $UserName) { Throw "No valid username [$UserName] specified." }
If (-not $Variables_Application) {
[scriptblock]$Variables_Application = {
[string]$appVendor = $appVendor
[string]$appName = $appName
[string]$appVersion = $appVersion
[string]$appArch = $appArch
[string]$appLang = $appLang
[string]$appRevision = $appRevision
}
}
If (-not $Variables_AllScriptParams) {
[scriptblock]$Variables_AllScriptParams = {
[string]$DeploymentType = $DeploymentType
[string]$DeployMode = $DeployMode
}
}
If ($NoExit) {
[string]$Variables_PowerShellExeParams = "-ExecutionPolicy Bypass -NoProfile -NoLogo -NoExit -WindowStyle Hidden"
}
Else {
[string]$Variables_PowerShellExeParams = "-ExecutionPolicy Bypass -NoProfile -NoLogo -WindowStyle Hidden"
}
[scriptblock]$Variables_SkipAdminCheck = { [boolean]$SkipAdminCheck = $true }
[scriptblock]$Variables_ExitWithLastExitCode = { Exit $LastExitCode }
[string]$Variables_DotSourceToolkitForUser = ". `"$scriptPath`" -RelaunchToolkitAsUser $appDeployMainScriptParameters"
If ($PassThru) {
If (Test-Path -Path "$dirAppDeployTemp\ResultsFrom_InvokePSCommandAsUser.xml" -PathType 'Leaf') {
Remove-Item -Path "$dirAppDeployTemp\ResultsFrom_InvokePSCommandAsUser.xml" -Force -ErrorAction 'SilentlyContinue' | Out-Null
}
[scriptblock]$Command = [scriptblock]::Create($Command.ToString() + " | Export-Clixml -Path '$dirAppDeployTemp\ResultsFrom_InvokePSCommandAsUser.xml' -Force" )
}
[scriptblock]$PSPrameters = { "$Variables_PowerShellExeParams -Command `".{ $Variables_InstallPhase; $Variables_Application; $Variables_AllScriptParams; $Variables_Script; $Variables_SkipAdminCheck; $Variables_DotSourceToolkitForUser; $Command; $Variables_ExitWithLastExitCode }`"" }
[System.Diagnostics.Process]$PSProcess = Invoke-ProcessWithLogonToken -PassThru -Username $UserName -CreateProcess $PSPath -ProcessArgs (& $PSPrameters) -WarningAction 'SilentlyContinue'
If (-not $NoWait) {
$PSProcess.WaitForExit()
[int32]$PSExitCode = $PSProcess.ExitCode
}
If ($PSProcess) { $PSProcess.Close() }
If ($PassThru) {
If (Test-Path -Path "$dirAppDeployTemp\ResultsFrom_InvokePSCommandAsUser.xml" -PathType 'Leaf') {
$CommandOutput = Import-Clixml -Path "$dirAppDeployTemp\ResultsFrom_InvokePSCommandAsUser.xml" -ErrorAction 'Stop'
}
Write-Output $CommandOutput
}
}
If ($invokingScript) {
If ((Split-Path -Path $invokingScript -Leaf) -eq 'AppDeployToolkitHelp.ps1') { Return }
}
If ($ReferringApplication) {
$installName = $ReferringApplication
$installTitle = $ReferringApplication -replace '_',' '
$installPhase = 'Asynchronous'
}
Try {
Add-Type -AssemblyName System.Windows.Forms -ErrorAction 'Stop'
Add-Type -AssemblyName PresentationFramework -ErrorAction 'Stop'
Add-Type -AssemblyName Microsoft.VisualBasic -ErrorAction 'Stop'
Add-Type -AssemblyName System.Drawing -ErrorAction 'Stop'
Add-Type -AssemblyName PresentationFramework -ErrorAction 'Stop'
Add-Type -AssemblyName PresentationCore -ErrorAction 'Stop'
Add-Type -AssemblyName WindowsBase -ErrorAction 'Stop'
}
Catch {
Write-Log -Message "Failed to load assembly. `n$(Resolve-Error)" -Severity 3 -Source $appDeployToolkitName
If ($deployModeNonInteractive) {
Write-Log -Message "Continue despite assembly load error since deployment mode is [$deployMode]" -Source $appDeployToolkitName
}
Else {
Exit-Script -ExitCode 1
}
}
If ($showInstallationPrompt) {
$deployModeSilent = $true
Write-Log -Message "[$appDeployMainScriptFriendlyName] called with switch [-ShowInstallationPrompt]" -Source $appDeployToolkitName
$appDeployMainScriptParameters.Remove('ShowInstallationPrompt')
$appDeployMainScriptParameters.Remove('ReferringApplication')
Show-InstallationPrompt @appDeployMainScriptParameters
Exit 0
}
If ($showInstallationRestartPrompt) {
$deployModeSilent = $true
Write-Log -Message "[$appDeployMainScriptFriendlyName] called with switch [-ShowInstallationRestartPrompt]" -Source $appDeployToolkitName
$appDeployMainScriptParameters.Remove('ShowInstallationRestartPrompt')
$appDeployMainScriptParameters.Remove('ReferringApplication')
Show-InstallationRestartPrompt @appDeployMainScriptParameters
Exit 0
}
If ($cleanupBlockedApps) {
$deployModeSilent = $true
Write-Log -Message "[$appDeployMainScriptFriendlyName] called with switch [-CleanupBlockedApps]" -Source $appDeployToolkitName
Unblock-AppExecution
Exit 0
}
If ($showBlockedAppDialog) {
$DisableLogging = $true
Try {
$deployModeSilent = $true
Write-Log -Message "[$appDeployMainScriptFriendlyName] called with switch [-ShowBlockedAppDialog]" -Source $appDeployToolkitName
Show-InstallationPrompt -Title $installTitle -Message $configBlockExecutionMessage -Icon Warning -ButtonRightText 'OK'
Exit 0
}
Catch {
$InstallPromptErrMsg = "There was an error in displaying the Installation Prompt. `n$(Resolve-Error)"
Write-Log -Message $InstallPromptErrMsg -Severity 3 -Source $appDeployToolkitName
Show-DialogBox -Text $InstallPromptErrMsg -Icon 'Stop' | Out-Null
Exit 1
}
}
If ($RelaunchToolkitAsUser) {
Write-Log -Message "Dot-sourcing [$scriptFileName] in a separate PowerShell.exe process running under user account [$ProcessNTAccount] to allow execution of PowerShell commands in a user session." -Source $appDeployToolkitName
}
If (-not $RelaunchToolkitAsUser) {
[scriptblock]$Variables_InstallPhase = { [string]$installPhase = 'Initialization' }; .$Variables_InstallPhase
$scriptSeparator = '*' * 79
Write-Log -Message ($scriptSeparator,$scriptSeparator) -Source $appDeployToolkitName
Write-Log -Message "[$installName] setup started." -Source $appDeployToolkitName
If ($invokingScript) {
Write-Log -Message "Script [$scriptPath] dot-source invoked by [$invokingScript]" -Source $appDeployToolkitName
}
Else {
Write-Log -Message "Script [$scriptPath] invoked directly" -Source $appDeployToolkitName
}
}
If (Test-Path -Path "$scriptRoot\$appDeployToolkitDotSourceExtensions" -PathType Leaf) {
If ($RelaunchToolkitAsUser) {
. "$scriptRoot\$appDeployToolkitDotSourceExtensions" -RelaunchToolkitAsUser
}
Else {
. "$scriptRoot\$appDeployToolkitDotSourceExtensions"
}
}
If (Test-Path -Path "$scriptRoot\Invoke-ProcessWithLogonToken.ps1" -PathType Leaf) {
. "$scriptRoot\Invoke-ProcessWithLogonToken.ps1"
}
If ($deployAppScriptParameters) { [string]$deployAppScriptParameters = ($deployAppScriptParameters.GetEnumerator() | ForEach-Object { If ($_.Value.GetType().Name -eq 'SwitchParameter') { "-$($_.Key):`$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Boolean') { "-$($_.Key) `$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Int32') { "-$($_.Key) $($_.Value)" } Else { "-$($_.Key) `"$($_.Value)`"" } }) -join ' ' }
If ($appDeployMainScriptParameters) { [string]$appDeployMainScriptParameters = ($appDeployMainScriptParameters.GetEnumerator() | ForEach-Object { If ($_.Value.GetType().Name -eq 'SwitchParameter') { "-$($_.Key):`$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Boolean') { "-$($_.Key) `$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Int32') { "-$($_.Key) $($_.Value)" } Else { "-$($_.Key) `"$($_.Value)`"" } }) -join ' ' }
If ($appDeployExtScriptParameters) { [string]$appDeployExtScriptParameters = ($appDeployExtScriptParameters.GetEnumerator() | ForEach-Object { If ($_.Value.GetType().Name -eq 'SwitchParameter') { "-$($_.Key):`$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Boolean') { "-$($_.Key) `$" + "$($_.Value)".ToLower() } ElseIf ($_.Value.GetType().Name -eq 'Int32') { "-$($_.Key) $($_.Value)" } Else { "-$($_.Key) `"$($_.Value)`"" } }) -join ' ' }
If ($configConfigVersion -lt $appDeployMainScriptMinimumConfigVersion) {
[string]$XMLConfigVersionErr = "The XML configuration file version [$configConfigVersion] is lower than the supported version required by the Toolkit [$appDeployMainScriptMinimumConfigVersion]. Please upgrade the configuration file."
Write-Log -Message $XMLConfigVersionErr -Severity 3 -Source $appDeployToolkitName
Throw $XMLConfigVersionErr
}
If (-not $RelaunchToolkitAsUser) {
If ($appScriptVersion) { Write-Log -Message "[$installName] script version is [$appScriptVersion]" -Source $appDeployToolkitName }
If ($deployAppScriptFriendlyName) { Write-Log -Message "[$deployAppScriptFriendlyName] script version is [$deployAppScriptVersion]" -Source $appDeployToolkitName }
If ($deployAppScriptParameters) { Write-Log -Message "The following non-default parameters were passed to [$deployAppScriptFriendlyName]: [$deployAppScriptParameters]" -Source $appDeployToolkitName }
If ($appDeployMainScriptFriendlyName) { Write-Log -Message "[$appDeployMainScriptFriendlyName] script version is [$appDeployMainScriptVersion]" -Source $appDeployToolkitName }
If ($appDeployMainScriptParameters) { Write-Log -Message "The following non-default parameters were passed to [$appDeployMainScriptFriendlyName]: [$appDeployMainScriptParameters]" -Source $appDeployToolkitName }
If ($appDeployExtScriptFriendlyName) { Write-Log -Message "[$appDeployExtScriptFriendlyName] version is [$appDeployExtScriptVersion]" -Source $appDeployToolkitName }
If ($appDeployExtScriptParameters) { Write-Log -Message "The following non-default parameters were passed to [$appDeployExtScriptFriendlyName]: [$appDeployExtScriptParameters]" -Source $appDeployToolkitName }
Write-Log -Message "Computer Name is [$envComputerNameFQDN]" -Source $appDeployToolkitName
Write-Log -Message "Current User is [$ProcessNTAccount]" -Source $appDeployToolkitName
If ($envOSServicePack) {
Write-Log -Message "OS Version is [$envOSName $envOSServicePack $envOSArchitecture $envOSVersion]" -Source $appDeployToolkitName
}
Else {
Write-Log -Message "OS Version is [$envOSName $envOSArchitecture $envOSVersion]" -Source $appDeployToolkitName
}
Write-Log -Message "OS Type is [$envOSProductTypeName]" -Source $appDeployToolkitName
Write-Log -Message "Current Culture is [$($culture.Name)] and UI language is [$currentLanguage]" -Source $appDeployToolkitName
Write-Log -Message "Hardware Platform is [$($OriginalDisableLogging = $DisableLogging; $DisableLogging = $true; Get-HardwarePlatform; $DisableLogging = $OriginalDisableLogging)]" -Source $appDeployToolkitName
Write-Log -Message "PowerShell Host is [$($envHost.Name)] with version [$($envHost.Version)]" -Source $appDeployToolkitName
Write-Log -Message "PowerShell Version is [$envPSVersion $psArchitecture]" -Source $appDeployToolkitName
Write-Log -Message "PowerShell CLR (.NET) version is [$envCLRVersion]" -Source $appDeployToolkitName
Write-Log -Message "System has a DPI scale of [$dpiScale]." -Source $appDeployToolkitName
Write-Log -Message $scriptSeparator -Source $appDeployToolkitName
}
If (-not $RelaunchToolkitAsUser) {
[psobject[]]$LoggedOnUserSessions = Get-LoggedOnUser
}
Else {
[psobject[]]$LoggedOnUserSessions = Get-LoggedOnUser -SkipIsLocalAdminCheck
}
Write-Log -Message "Logged on user session details: `n$($LoggedOnUserSessions | Format-List | Out-String)" -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
[string[]]$usersLoggedOn = $LoggedOnUserSessions | ForEach-Object { $_.NTAccount }
If ($usersLoggedOn) {
Write-Log -Message "The following users are logged on to the system: $($usersLoggedOn -join ', ')" -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
[psobject]$CurrentLoggedOnUserSession = $LoggedOnUserSessions | Where-Object { $_.IsCurrentSession }
If ($CurrentLoggedOnUserSession) {
Write-Log -Message "Current process is running under a user account [$($CurrentLoggedOnUserSession.NTAccount)]" -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
}
Else {
Write-Log -Message "Current process is running under a system account [$ProcessNTAccount]" -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
}
[psobject]$CurrentConsoleUserSession = $LoggedOnUserSessions | Where-Object { $_.IsConsoleSession }
If ($CurrentConsoleUserSession) {
Write-Log -Message "The following user is the console user [$($CurrentConsoleUserSession.NTAccount)] (user with control of physical monitor, keyboard, and mouse)." -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
}
Else {
Write-Log -Message 'There is no console user logged in (user with control of physical monitor, keyboard, and mouse).' -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
}
If ($CurrentConsoleUserSession) {
[string]$RelaunchToolkitAsNTAccount = $CurrentConsoleUserSession.NTAccount
}
ElseIf ($configToolkitAllowSystemInteractionForNonConsoleUser) {
[string]$FirstLoggedInNonConsoleUser = $LoggedOnUserSessions | Select-Object -First 1
If ($FirstLoggedInNonConsoleUser) { [string]$RelaunchToolkitAsNTAccount = $FirstLoggedInNonConsoleUser.NTAccount }
}
Else {
[string]$RelaunchToolkitAsNTAccount = ''
}
}
Else {
Write-Log -Message 'No users are logged on to the system' -Source $appDeployToolkitName
}
Try { [boolean]$IsTerminalServerSession = [System.Windows.Forms.SystemInformation]::TerminalServerSession } Catch { }
Write-Log -Message "The process is running in a terminal server session: [$IsTerminalServerSession]." -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
Try {
[__comobject]$SMSTSEnvironment = New-Object -ComObject Microsoft.SMS.TSEnvironment -ErrorAction 'Stop'
Write-Log -Message 'Successfully loaded COM Object [Microsoft.SMS.TSEnvironment]. Therefore, script is currently running from a SCCM Task Sequence.' -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
[boolean]$runningTaskSequence = $true
}
Catch {
Write-Log -Message 'Unable to load COM Object [Microsoft.SMS.TSEnvironment]. Therefore, script is not currently running from a SCCM Task Sequence.' -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
[boolean]$runningTaskSequence = $false
}
[boolean]$IsTaskSchedulerHealthy = $true
If ($IsLocalSystemAccount) {
[scriptblock]$TestServiceHealth = {
Param (
[string]$ServiceName
)
Try {
If (Test-ServiceExists -Name $ServiceName -ContinueOnError $false) {
If ((Get-ServiceStartMode -Name $ServiceName -ContinueOnError $false) -ne 'Automatic') {
Set-ServiceStartMode -Name $ServiceName -StartMode 'Automatic' -ContinueOnError $false
}
Start-ServiceAndDependencies -Name $ServiceName -SkipServiceExistsTest -ContinueOnError $false
}
Else {
[boolean]$IsTaskSchedulerHealthy = $false
}
}
Catch {
[boolean]$IsTaskSchedulerHealthy = $false
}
}
& $TestServiceHealth -ServiceName 'EventSystem'
& $TestServiceHealth -ServiceName 'RpcSs'
& $TestServiceHealth -ServiceName 'EventLog'
& $TestServiceHealth -ServiceName 'Schedule'
Write-Log -Message "The task scheduler service is in a healthy state: $IsTaskSchedulerHealthy" -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
}
If (-not $RelaunchToolkitAsUser) {
If ($SessionZero) {
If ($deployMode -eq 'NonInteractive') {
Write-Log -Message "Session 0 detected. Deployment mode was manually set to [$deployMode]." -Source $appDeployToolkitName
}
Else {
If (-not $IsProcessUserInteractive) {
Write-Log -Message 'Session 0 detected, process not running in user interactive mode.' -Source $appDeployToolkitName
If ($configToolkitAllowSystemInteraction) {
Write-Log -Message "'Allow System Interaction' option is enabled in the toolkit XML configuration file." -Source $appDeployToolkitName
If ($CurrentConsoleUserSession) {
$deployMode = 'Interactive'
Write-Log -Message "Toolkit will use a console user account [$RelaunchToolkitAsNTAccount] to provide interaction in the SYSTEM context..." -Source $appDeployToolkitName
}
ElseIf ($configToolkitAllowSystemInteractionForNonConsoleUser) {
Write-Log -Message "'Allow System Interaction' for non-console user is enabled in the toolkit XML configuration file." -Source $appDeployToolkitName
If ($FirstLoggedInNonConsoleUser) {
$deployMode = 'Interactive'
Write-Log -Message "Toolkit will use a non-console user account [$RelaunchToolkitAsNTAccount] to provide interaction in the SYSTEM context..." -Source $appDeployToolkitName
}
Else {
Write-Log -Message 'No users are currently logged in to allow relaunching the toolkit to provide interaction in the SYSTEM context.' -Source $appDeployToolkitName
}
}
Else {
$deployMode = 'NonInteractive'
Write-Log -Message 'No users are logged on to be able to run in interactive mode.' -Source $appDeployToolkitName
}
}
Else {
Write-Log -Message "'Allow System Interaction' option is disabled in the toolkit XML configuration file." -Source $appDeployToolkitName
$deployMode = 'NonInteractive'
Write-Log -Message "Deployment mode set to [$deployMode]." -Source $appDeployToolkitName
}
}
Else {
If (-not $RelaunchToolkitAsNTAccount) {
$deployMode = 'NonInteractive'
Write-Log -Message "Session 0 detected, process running in user interactive mode, no users logged in: deployment mode set to [$deployMode]." -Source $appDeployToolkitName
}
Else {
Write-Log -Message 'Session 0 detected, process running in user interactive mode, user(s) logged in.' -Source $appDeployToolkitName
}
}
}
}
Else {
Write-Log -Message 'Session 0 not detected.' -Source $appDeployToolkitName
}
}
If ($deployMode) {
Write-Log -Message "Installation is running in [$deployMode] mode." -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser
}
Switch ($deployMode) {
'Silent' { $deployModeSilent = $true }
'NonInteractive' { $deployModeNonInteractive = $true; $deployModeSilent = $true }
Default { $deployModeNonInteractive = $false; $deployModeSilent = $false }
}
Switch ($deploymentType) {
'Install' { $deploymentTypeName = $configDeploymentTypeInstall }
'Uninstall' { $deploymentTypeName = $configDeploymentTypeUnInstall }
Default { $deploymentTypeName = $configDeploymentTypeInstall }
}
If ($deploymentTypeName) { Write-Log -Message "Deployment type is [$deploymentTypeName]" -Source $appDeployToolkitName -DisableOnRelaunchToolkitAsUser }
If ($configToolkitRequireAdmin) {
If ((-not $IsAdmin) -and (-not $ShowBlockedAppDialog) -and (-not $SkipAdminCheck)) {
[string]$AdminPermissionErr = "[$appDeployToolkitName] has an XML config file option [Toolkit_RequireAdmin] set to [True] so as to require Administrator rights for the toolkit to function. Please re-run the deployment script as an Administrator or change the option in the XML config file to not require Administrator rights."
Write-Log -Message $AdminPermissionErr -Severity 3 -Source $appDeployToolkitName
Show-DialogBox -Text $AdminPermissionErr -Icon 'Stop' | Out-Null
Throw $AdminPermissionErr
}
}
If ($terminalServerMode) { Enable-TerminalServerInstallMode }
|
combined_dataset/train/non-malicious/Get_Set Signature (CTP3).ps1
|
Get_Set Signature (CTP3).ps1
|
#Requires -version 2.0
## Authenticode.psm1 updated for CTP 3
####################################################################################################
## Wrappers for the Get-AuthenticodeSignature and Set-AuthenticodeSignature cmdlets
## These properly parse paths, so they don't kill your pipeline and script if you include a folder
##
## Usage:
## ls | Get-AuthenticodeSignature
## Get all the signatures
##
## ls | Select-Signed -Mine -Broken | Set-AuthenticodeSignature
## Re-sign anything you signed before that has changed
##
## ls | Select-Signed -NotMine -TrustedOnly | Set-AuthenticodeSignature
## Re-sign scripts that are hash-correct but not signed by me or by someone trusted
##
####################################################################################################
## History:
## 1.6 - Converted to work with CTP 3, and added function help comments
## 1.5 - Moved the default certificate setting into the module info Authenticode.psd1 file
## Note: If you get this off PoshCode, you'll have to create it yourself, see below:
## 1.4 - Moved the default certificate setting into an external psd1 file.
## 1.3 - Fixed some bugs in If-Signed and renamed it to Select-Signed
## - Added -MineOnly and -NotMineOnly switches to Select-Signed
## 1.2 - Added a hack workaround to make it appear as though we can sign and check PSM1 files
## It's important to remember that the signatures are NOT checked by PowerShell yet...
## 1.1 - Added a filter "If-Signed" that can be used like: ls | If-Signed
## - With optional switches: ValidOnly, InvalidOnly, BrokenOnly, TrustedOnly, UnsignedOnly
## - commented out the default Certificate which won't work for "you"
## 1.0 - first working version, includes wrappers for Get and Set
##
####################################################################################################
## README! README! README! README! #################################################################
## README! README! README! README! #################################################################
##
## You should set the location to your default signing certificate. The permanent way to do that is
## to modify (or create) the .psd1 file to set the PrivateData member variable. Otherwise you'll be
## prompted to provide a cert path whenever you try to sign a script without passing a certificate.
##
## The PrivateData variable should point at your code-signing certificate either with a full path
## or with the THUMBPRINT of a certificate you have available in your Cert:\\CurrentUser\\My\\ provider
##
## EG:
## F05F583BB5EA4C90E3B9BF1BDD0B657701245BD5
## OR:
## "Cert:\\CurrentUser\\My\\F05F583BB5EA4C90E3B9BF1BDD0B657701245BD5"
## OR a file name:
## "C:\\Users\\Joel\\Documents\\WindowsPowerShell\\PoshCerts\\Joel-Bennett_Code-Signing.pfx"
##
## The simplest thing is to just create a new PSD1
##
## New-ModuleManifest .\\Authenticode.psd1 -Nested .\\Authenticode.psm1 `
## -Author "" -COmpany "" -Copy "" -Desc "" `
## -Types @() -Formats @() -RequiredMod @() -RequiredAs @() -Other @() `
## -PrivateData F05F583BB5EA4C90E3B9BF1BDD0B657701245BD5
##
####################################################################################################
####################################################################################################
function Get-UserCertificate {
<#.SYNOPSIS
Gets the user's default signing certificate so we don't have to ask them over and over...
.DESCRIPTION
The Get-UserCertificate function retrieves and returns a certificate from the user. It also stores
the certificate so it can bereused without re-querying for the location and/or password ...
.RETURNVALUE
An X509Certificate2 suitable for code-signing
###################################################################################################>
[CmdletBinding()]
PARAM ()
PROCESS {
trap {
Write-Host "The authenticode script module requires configuration to function fully!"
Write-Host
Write-Host "You must put the path to your default signing certificate in the module metadata"`
"file before you can use the module's Set-Authenticode cmdlet or to the 'mine'"`
"feature of the Select-Signed or Test-Signature. To set it up, you can do this:"
Write-Host
Write-Host "PrivateData = 'C:\\Users\\${Env:UserName}\\Documents\\WindowsPowerShell\\PoshCerts\\Code-Signing.pfx'"
Write-Host
Write-Host "If you load your certificate into your 'CurrentUser\\My' store, or put the .pfx file"`
"into the folder with the Authenthenticode module script, you can just specify it's"`
"thumprint or filename, respectively. Otherwise, it should be a full path."
Write-Error $_
return
}
# Import-LocalizedData -bindingVariable CertificatePath -EA "STOP"
if(!$ExecutionContext.SessionState.Module.PrivateData) {
$certs = ls cert:\\CurrentUser\\My
if($certs.Count) {
Write-Host "You have ${certs.Count} certs in your local cert storage which you can specify by Thumbprint:" -fore cyan
$certs | Out-Host
}
$ExecutionContext.SessionState.Module.PrivateData = $(Read-Host "Please specify a user certificate")
}
if($ExecutionContext.SessionState.Module.PrivateData -isnot [System.Security.Cryptography.X509Certificates.X509Certificate2]) {
# Write-Host "CertificatePath: $ExecutionContext.SessionState.Module.PrivateData" -fore cyan
$ResolvedPath = $Null
$ResolvedPath = Resolve-Path $ExecutionContext.SessionState.Module.PrivateData -ErrorAction "SilentlyContinue"
if(!$ResolvedPath -or !(Test-Path $ResolvedPath -ErrorAction "SilentlyContinue")) {
# Write-Host "ResolvedPath: $ResolvedPath" -fore green
$ResolvedPath = Resolve-Path (Join-Path $PsScriptRoot $ExecutionContext.SessionState.Module.PrivateData -ErrorAction "SilentlyContinue") -ErrorAction "SilentlyContinue"
}
if(!$ResolvedPath -or !(Test-Path $ResolvedPath -ErrorAction "SilentlyContinue")) {
# Write-Host "ResolvedPath: $ResolvedPath" -fore yellow
$ResolvedPath = Resolve-Path (Join-Path "Cert:\\CurrentUser\\My" $ExecutionContext.SessionState.Module.PrivateData -ErrorAction "SilentlyContinue") -ErrorAction "SilentlyContinue"
}
$Certificate = get-item $ResolvedPath -ErrorAction "SilentlyContinue"
if($Certificate -is [System.IO.FileInfo]) {
$Certificate = Get-PfxCertificate $Certificate -ErrorAction "SilentlyContinue"
}
Write-Verbose "Certificate: $($Certificate | Out-String)"
$ExecutionContext.SessionState.Module.PrivateData = $Certificate
}
return $ExecutionContext.SessionState.Module.PrivateData
}
}
####################################################################################################
function Test-Signature {
<#.SYNOPSIS
Tests a script signature to see if it is valid, or at least unaltered.
.DESCRIPTION
The Test-Signature function processes the output of Get-AuthenticodeSignature to determine if it
is Valid, OR **unaltered** and signed by the user's certificate
.NOTES
Test-Signature returns TRUE even if the root CA certificate can't be verified, as long as the
signing certificate's thumbnail matches the one specified by Get-UserCertificate.
.EXAMPLE
ls *.ps1 | Get-AuthenticodeSignature | Where {Test-Signature $_}
To get the signature reports for all the scripts that we consider safely signed.
.EXAMPLE
ls | ? { gas $_ | test-signature }
List all the valid signed scripts (or scripts signed by our cert)
.INPUTTYPE
System.Management.Automation.Signature
.PARAMETER Signature
Specifies the signature object to test. This should be the output of Get-AuthenticodeSignature.
.PARAMETER ForceValid
Switch parameter, forces the signature to be valid (otherwise, even if the certificate chain can't be verified, we will accept the cert which matches the "user" certificate (see Get-UserCertificate).
Aliases Valid
.RETURNVALUE
Boolean value representing whether the script's signature is valid, or YOUR certificate
###################################################################################################>
[CmdletBinding()]
PARAM (
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)]
# The signature to test.
$Signature
,
[Alias("Valid")]
[Switch]$ForceValid
)
return ( $Signature.Status -eq "Valid" -or
( !$ForceValid -and
($Signature.Status -eq "UnknownError") -and
($_.SignerCertificate.Thumbprint -eq $(Get-UserCertificate).Thumbprint)
) )
}
####################################################################################################
function Set-AuthenticodeSignature {
<#.SYNOPSIS
Adds an Authenticode signature to a Windows PowerShell script or other file.
.DESCRIPTION
The Set-AuthenticodeSignature function adds an Authenticode signature to any file that supports Subject Interface Package (SIP).
In a Windows PowerShell script file, the signature takes the form of a block of text that indicates the end of the instructions that are executed in the script. If there is a signature in the file when this cmdlet runs, that signature is removed.
.NOTES
After the certificate has been validated, but before a signature is added to the file, the function checks the value of the $SigningApproved preference variable. If this variable is not set, or has a value other than TRUE, you are prompted to confirm the signing of the script.
When specifying multiple values for a parameter, use commas to separate the values. For example, "<parameter-name> <value1>, <value2>".
.EXAMPLE
ls *.ps1 | Set-AuthenticodeSignature -Certificate $Certificate
To sign all of the files with the specified certificate
.EXAMPLE
ls *.ps1,*.psm1,*.psd1 | Get-AuthenticodeSignature | Where {!(Test-Signature $_ -Valid)} | gci | Set-AuthenticodeSignature
List all the script files, and get and test their signatures, and then sign all of the ones that are not valid, using the user's default certificate.
.INPUTTYPE
String. You can pipe a file path to Set-AuthenticodeSignature.
.PARAMETER FilePath
Specifies the path to a file that is being signed.
Aliases Path, FullName
.PARAMETER Certificate
Specifies the certificate that will be used to sign the script or file. Enter a variable that stores an object representing the certificate or an expression that gets the certificate.
To find a certificate, use Get-PfxCertificate or use the Get-ChildItem cmdlet in the Certificate (Cert:) drive. If the certificate is not valid or does not have code-signing authority, the command fails.
.RETURNVALUE
System.Management.Automation.Signature
###################################################################################################>
[CmdletBinding()]
PARAM (
[Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("FullName","Path")]
[ValidateScript({
if((resolve-path $_).Provider.Name -ne "FileSystem") {
throw "Specified Path is not in the FileSystem: '$_'"
}
if(!(Test-Path -PathType Leaf $_)) {
throw "Specified Path is not a File: '$_'"
}
return $true
})]
[string[]]
$FilePath
,
[Parameter(Position=2, Mandatory=$false)]
$Certificate = $(Get-UserCertificate)
)
PROCESS {
Write-Verbose "Set Authenticode Signature on $FilePath with $($Certificate | Out-String)"
Microsoft.PowerShell.Security\\Set-AuthenticodeSignature -Certificate $Certificate -FilePath $FilePath
}
}
New-Alias sign Set-AuthenticodeSignature -EA "SilentlyContinue"
####################################################################################################
function Get-AuthenticodeSignature {
<#.SYNOPSIS
Gets information about the Authenticode signature in a file.
.DESCRIPTION
The Get-AuthenticodeSignature function gets information about the Authenticode signature in a file. If the file is not signed, the information is retrieved, but the fields are blank.
.NOTES
For information about Authenticode signatures in Windows PowerShell, type "get-help About_Signing".
When specifying multiple values for a parameter, use commas to separate the values. For example, "-<parameter-name> <value1>, <value2>".
.EXAMPLE
Get-AuthenticodeSignature script.ps1
To get the signature information about the script.ps1 script file.
.EXAMPLE
ls *.ps1,*.psm1,*.psd1 | Get-AuthenticodeSignature
Get the signature information for all the script and data files
.EXAMPLE
ls *.ps1,*.psm1,*.psd1 | Get-AuthenticodeSignature | Where {!(Test-Signature $_ -Valid)} | gci | Set-AuthenticodeSignature
This command gets information about the Authenticode signature in all of the script and module files, and tests the signatures, then signs all of the ones that are not valid.
.INPUTTYPE
String. You can pipe the path to a file to Get-AuthenticodeSignature.
.PARAMETER FilePath
The path to the file being examined. Wildcards are permitted, but they must lead to a single file. The parameter name ("-FilePath") is optional.
Aliases Path, FullName
.RETURNVALUE
System.Management.Automation.Signature
###################################################################################################>
[CmdletBinding()]
PARAM (
[Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("FullName","Path")]
[ValidateScript({
if((resolve-path $_).Provider.Name -ne "FileSystem") {
throw "Specified Path is not in the FileSystem: '$_'"
}
if(!(Test-Path -PathType Leaf $_)) {
throw "Specified Path is not a File: '$_'"
}
return $true
})]
[string[]]
$FilePath
)
PROCESS {
Microsoft.PowerShell.Security\\Get-AuthenticodeSignature -FilePath $FilePath
}
}
####################################################################################################
function Select-Signed {
<#.SYNOPSIS
Select files based on the status of their Authenticode Signature.
.DESCRIPTION
The Select-Signed function filters files on the pipeline based on the state of their authenticode signature.
.NOTES
For information about Authenticode signatures in Windows PowerShell, type "get-help About_Signing".
When specifying multiple values for a parameter, use commas to separate the values. For example, "-<parameter-name> <value1>, <value2>".
.EXAMPLE
ls *.ps1,*.ps[dm]1 | Select-Signed
To get the signature information about the script.ps1 script file.
.EXAMPLE
ls *.ps1,*.psm1,*.psd1 | Get-AuthenticodeSignature
Get the signature information for all the script and data files
.EXAMPLE
ls *.ps1,*.psm1,*.psd1 | Get-AuthenticodeSignature | Where {!(Test-Signature $_ -Valid)} | gci | Set-AuthenticodeSignature
This command gets information about the Authenticode signature in all of the script and module files, and tests the signatures, then signs all of the ones that are not valid.
.INPUTTYPE
String. You can pipe the path to a file to Get-AuthenticodeSignature.
.PARAMETER FilePath
The path to the file being examined. Wildcards are permitted, but they must lead to a single file. The parameter name ("-FilePath") is optional.
Aliases Path, FullName
.RETURNVALUE
System.Management.Automation.Signature
###################################################################################################>
[CmdletBinding()]
PARAM (
[Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("FullName")]
[ValidateScript({
if((resolve-path $_).Provider.Name -ne "FileSystem") {
throw "Specified Path is not in the FileSystem: '$_'"
}
return $true
})]
[string[]]
$FilePath
,
[Parameter()]
# Return only files that are signed with the users' certificate (as returned by Get-UserCertificate).
[switch]$MineOnly
,
[Parameter()]
# Return only files that are NOT signed with the users' certificate (as returned by Get-UserCertificate).
[switch]$NotMineOnly
,
[Parameter()]
[Alias("HashMismatch")]
# Return only files with signatures that are broken (where the file has been edited, and the hash doesn't match).
[switch]$BrokenOnly
,
[Parameter()]
# Returns the files that are Valid OR signed with the users' certificate (as returned by Get-UserCertificate).
#
# That is, TrustedOnly returns files returned by -ValidOnly OR -MineOnly (if you specify both parameters, you get only files that are BOTH -ValidOnly AND -MineOnly)
[switch]$TrustedOnly
,
[Parameter()]
# Return only files that are "Valid": This means signed with any cert where the certificate chain is verifiable to a trusted root certificate. This may or may not include files signed with the user's certificate.
[switch]$ValidOnly
,
[Parameter()]
# Return only files that doesn't have a "Valid" signature, which includes files that aren't signed, or that have a hash mismatch, or are signed by untrusted certs (possibly including the user's certificate).
[switch]$InvalidOnly
,
[Parameter()]
# Return only signable files that aren't signed at all. That is, only files that support Subject Interface Package (SIP) but aren't signed.
[switch]$UnsignedOnly
)
PROCESS {
if(!(Test-Path -PathType Leaf $FilePath)) {
# if($ErrorAction -ne "SilentlyContinue") {
# Write-Error "Specified Path is not a File: '$FilePath'"
# }
} else {
foreach($sig in Get-AuthenticodeSignature -FilePath $FilePath) {
# Broken only returns ONLY things which are HashMismatch
if($BrokenOnly -and $sig.Status -ne "HashMismatch")
{
Write-Debug "$($sig.Status) - Not Broken: $FilePath"
return
}
# Trusted only returns ONLY things which are Valid
if($ValidOnly -and $sig.Status -ne "Valid")
{
Write-Debug "$($sig.Status) - Not Trusted: $FilePath"
return
}
# AllValid returns only things that are SIGNED and not HashMismatch
if($TrustedOnly -and (($sig.Status -ne "HashMismatch") -or !$sig.SignerCertificate) )
{
Write-Debug "$($sig.Status) - Not Valid: $FilePath"
return
}
# NOTValid returns only things that are SIGNED and Valid
if($InvalidOnly -and ($sig.Status -eq "Valid"))
{
Write-Debug "$($sig.Status) - Valid: $FilePath"
return
}
# Unsigned returns only things that aren't signed
# NOTE: we don't test using NotSigned, because that's only set for .ps1 or .exe files??
if($UnsignedOnly -and $sig.SignerCertificate )
{
Write-Debug "$($sig.Status) - Signed: $FilePath"
return
}
# Mine returns only things that were signed by MY CertificateThumbprint
if($MineOnly -and (!($sig.SignerCertificate) -or ($sig.SignerCertificate.Thumbprint -ne $((Get-UserCertificate).Thumbprint))))
{
Write-Debug "Originally signed by someone else, thumbprint: $($sig.SignerCertificate.Thumbprint)"
Write-Debug "Does not match your default certificate print: $((Get-UserCertificate).Thumbprint)"
Write-Debug " $FilePath"
return
}
# NotMine returns only things that were signed by MY CertificateThumbprint
if($NotMineOnly -and (!($sig.SignerCertificate) -or ($sig.SignerCertificate.Thumbprint -eq $((Get-UserCertificate).Thumbprint))))
{
if($sig.SignerCertificate) {
Write-Debug "Originally signed by you, thumbprint: $($sig.SignerCertificate.Thumbprint)"
Write-Debug "Matches your default certificate print: $((Get-UserCertificate).Thumbprint)"
Write-Debug " $FilePath"
}
return
}
if(!$BrokenOnly -and !$TrustedOnly -and !$ValidOnly -and !$InvalidOnly -and !$UnsignedOnly -and !($sig.SignerCertificate) )
{
Write-Debug "$($sig.Status) - Not Signed: $FilePath"
return
}
get-childItem $sig.Path
}}
}
}
Export-ModuleMember Set-AuthenticodeSignature, Get-AuthenticodeSignature, Test-Signature, Select-Signed, Get-UserCertificate
|
combined_dataset/train/non-malicious/sample_54_15.ps1
|
sample_54_15.ps1
|
param (
[string]$Workspace,
# [bool]$UseBCTranslations = $false,
# [bool]$UseOMATranslations = $false
[string]$strUseBCTranslations = "false",
[string]$strUseOMATranslations = "false"
)
if ($strUseBCTranslations -eq "true") {
$UseBCTranslations = $true
}
else {
$UseBCTranslations = $false
}
if ($strUseOMATranslations -eq "true") {
$UseOMATranslations = $true
}
else {
$UseOMATranslations = $false
}
$TranslationSources = @()
$TranslationSources += "Language"
if ($UseBCTranslations) { $TranslationSources += "BC" }
if ($UseOMATranslations) { $TranslationSources += "OMA" }
$TranslationFunctions = Join-Path $PSScriptRoot "Get-TranslationFunctions.ps1"
.$TranslationFunctions
$Languages = Set-Languages
$xlfPath = Join-Path $Workspace "\Translations\*.g.xlf"
$TranslationsDir = Split-Path -Parent $xlfPath
if (!(Test-Path $xlfPath)) {
Write-Output "Global Translation File not found in $(Split-Path $Workspace -Leaf). Please build the current Project (Ctrl + Shift + B) and restart the Build Task"
Start-Sleep -Seconds 3
exit
}
else {
if (!$AllApps) {
Write-Output "Make sure that the Global Translation File is up to date."
}
Start-Sleep -Seconds 2
}
[xml]$xlf = Get-Content -Path $xlfPath -Encoding UTF8
$Placeholder = [ordered]@{}
foreach ($Language in $Languages.Keys) {
$Placeholder.Add($Languages[$Language]["LanguageCode"], "")
}
$gXlfHash = New-Object System.Collections.Hashtable
$gXlfComments = New-Object System.Collections.Hashtable
$ns = New-Object Xml.XmlNamespaceManager $xlf.NameTable
$ns.AddNamespace('ns', 'urn:oasis:names:tc:xliff:document:1.2')
$trans_unit_nodes = $xlf.SelectNodes('//ns:trans-unit', $ns)
foreach ($node in $trans_unit_nodes) {
# create new placeholder object for each key
$newPlaceholder = [ordered]@{}
foreach ($key in $Placeholder.Keys) {
$newPlaceholder[$key] = $Placeholder[$key]
}
$source = $node.SelectSingleNode('ns:source', $ns).InnerText
$newPlaceholder.ENU = $source
$gXlfHash[$source] = $newPlaceholder
if ($null -eq $gXlfComments[$source]) {
$note = $node.note | Where-Object {$_.from -eq "developer"}
$gXlfComments[$source] = $note.'#text'
}
}
$LanguageCodes = $Placeholder.Keys | ForEach-Object { $_ }
if ($UseBCTranslations) { #
$AppInfo = Get-Content (Join-Path $Workspace "app.json") -Raw | ConvertFrom-Json
$AppVersion = $AppInfo.version.Split(".")[0]
foreach ($Language in $Languages.Keys) {
if ($Language -eq "English") { continue }
$FilePath = "C:\Dev\Swisslos Interkantonale Landeslotterie\Tasks\Translations\Base Application." + $Languages[$Language].FileCode + ".xlf" # TODO TOAN FilePath
if (Test-Path $FilePath) { continue }
$Url = "https://raw.githubusercontent.com/StefanMaron/MSDyn365BC.Code.History/ch-" + $AppVersion + "/BaseApp/Source/Base%20Application/Translations/Base%20Application." + $Languages[$Language].FileCode + ".xlf" #TODO TOAN task to clear or update downloaded files
(New-Object System.Net.WebClient).DownloadFile($Url, $FilePath)
$FilesDownloaded = $true
}
if ($FilesDownloaded) {
Write-Output "Base Application Translation Files downloaded. Please add them to the next commit"
}
}
foreach ($sourceType in $TranslationSources) {
# read SourceType Xlfs
$VarName = $sourceType + "XlfHashes"
Set-Variable -Name $VarName -Value (New-Object System.Collections.Hashtable)
foreach ($LanguageCode in $LanguageCodes) {
$Language = $Languages.Keys | Where-Object { $Languages[$_].LanguageCode -eq $LanguageCode }
if ($sourceType -eq "BC") {
$FileName = "Base Application." + $Languages[$Language].FileCode + ".xlf"
$TempXlfPath = Join-Path $PSScriptRoot $FileName
}
elseif ($sourceType -eq "OMA") {
$FileName = "translation-" + $Languages[$Language].FileCode + ".xlf"
$TempXlfPath = Join-Path $PSScriptRoot $FileName
}
else{
$FileName = "translation-" + $Languages[$Language].FileCode + ".xlf"
$TempXlfPath = Join-Path $TranslationsDir $FileName
}
if (!(Test-Path $TempXlfPath)) {
continue
}
[xml]$TempXlf = Get-Content $TempXlfPath -Encoding UTF8
$trans_unit_nodes = $TempXlf.SelectNodes('//ns:trans-unit', $ns)
$TempXlfHash = New-Object System.Collections.Hashtable
foreach ($node in $trans_unit_nodes) {
$source = $node.SelectSingleNode('ns:source', $ns).InnerText
$target = $node.SelectSingleNode('ns:target', $ns).InnerText
$TempXlfHash[$source] = $target
}
(Get-Variable -Name $VarName -ValueOnly).Add($LanguageCode, $TempXlfHash)
}
# access SourceType Xlfs
foreach ($source in $gXlfHash.Keys) {
foreach ($LanguageCode in $LanguageCodes) {
if ($gXlfHash[$source][$LanguageCode] -ne "") {
continue
}
if ($null -ne (Get-Variable -Name $VarName -ValueOnly)[$LanguageCode].$source) {
$gXlfHash[$source][$LanguageCode] = (Get-Variable -Name $VarName -ValueOnly)[$LanguageCode][$source]
}
}
}
if ($sourceType -ne "Language") {
continue
}
# comments
$LanguageCode = "DES"
foreach ($source in $gXlfHash.Keys) {
if ($gXlfHash[$source][$LanguageCode] -ne "") {
continue
}
if ($null -ne $gXlfComments[$source]) {
$gXlfHash[$source][$LanguageCode] = $gXlfComments[$source]
}
}
}
$sortedHashtable = $gXlfHash.GetEnumerator() | Sort-Object Name -CaseSensitive
$sortedgXlfHash = New-Object System.Collections.Specialized.OrderedDictionary
$sortedHashtable | ForEach-Object {
if (![string]::IsNullOrEmpty($_.Name)) { #TODO TOAN remove empty?
$sortedgXlfHash.Add($_.Name, $_.Value)
}
}
$json = $sortedgXlfHash | ConvertTo-Json | Format-Json
$jsonFile = Join-Path $Workspace "\Translations\Translation.json"
$json | Out-File -FilePath $jsonFile -Encoding utf8 -Force
|
combined_dataset/train/non-malicious/Sith Remote logon mon.ps1
|
Sith Remote logon mon.ps1
|
' Script: Process_Monitor.vbs
' Purpose: Live process monitoring script that will trigger an e-mail to a recipient if a certain process is started
' Author: Paperclips (The Dark Lord)
' Email: magiconion_M@hotmail.com
' Date: Feb 2011
' Comments: This particular monitor monitors the LogonUI process on Win7
' Notes: -
strComputer = "." 'you can type any remote computername here
Set objNetwork = CreateObject("WScript.Network")
Set objWMIService = GetObject("winmgmts:" & _
"{impersonationLevel=Impersonate}!\\\\" & _
strComputer & "\\root\\cimv2")
'---------------------------------------------------------------------------------------LogonUI process------------------------------------------------------------------------------------------------
Set colMonitoredProcesses = objWMIService.ExecNotificationQuery("SELECT * FROM __InstanceCreationEvent Within 5 WHERE TargetInstance Isa ""Win32_Process"" And TargetInstance.Name = 'LogonUI.exe'")
Do While True
Set objProcess = colMonitoredProcesses.NextEvent
Set Items = objWMIService.ExecQuery("select * from win32_process where Name = 'LogonUI.exe'")
For Each objProcess in Items
colProperties = objProcess.GetOwner(strNameOfUser)
Next
' Email variables:
strServer = "xxx.xxx.xxx.xxx"
strTo = "aa@bb.com"
strFrom = "cc@dd.com"
strSubject = "LogonUI.exe detected on " & StrComputer & ". Process owner is: " & strNameOfUser & ". Processes monitored by "& objNetwork.Username
strBody = StrComputer & " locked OK. This is a live monitor notification. A process 'LogonUI.exe' has triggered this notification signaling that this computer is in the process of being unlocked." & VbCrLf
SendEmail strServer, strTo, strFrom, strSubject, strBody, ""
Loop
'---------------------------------------------------------------------------------------Mail Sub------------------------------------------------------------------------------------------------
Sub SendEmail(strServer, strTo, strFrom, strSubject, strBody, strAttachment)
Dim objMessage
Set objMessage = CreateObject("CDO.Message")
objMessage.To = strTo
objMessage.From = strFrom
objMessage.Subject = strSubject
objMessage.TextBody = strBody
If strAttachment <> "" Then objMessage.AddAttachment strAttachment
'==This section provides the configuration information for the remote SMTP server.
objMessage.Configuration.Fields.Item("http://schemas.microsoft.com/cdo/configuration/sendusing") = 2
'Name or IP of Remote SMTP Server
objMessage.Configuration.Fields.Item("http://schemas.microsoft.com/cdo/configuration/smtpserver") = strServer
'Server port (typically 25)
objMessage.Configuration.Fields.Item("http://schemas.microsoft.com/cdo/configuration/smtpserverport") = 25
objMessage.Configuration.Fields.Update
'==End remote SMTP server configuration section==
objMessage.Send
Set objMessage = Nothing
End Sub
|
combined_dataset/train/non-malicious/sample_3_70.ps1
|
sample_3_70.ps1
|
"use strict";(self.webpackChunkTypeScriptModule=self.webpackChunkTypeScriptModule||[]).push([[1039],{43199:i=>{i.exports=JSON.parse('{"copilot-ext-auth-sdk.apiPluginAuthMessageTextWithAppName":"Vui lòng đăng nhập vào {0} để tiếp tục. Sau khi đăng nhập thành công, chúng tôi sẽ nhanh chóng bắt đầu xử lý truy vấn của bạn.","copilot-ext-auth-sdk.apiPluginAuthMessageTextWithoutAppName":"Vui lòng đăng nhập để tiếp tục. Sau khi đăng nhập thành công, chúng tôi sẽ nhanh chóng bắt đầu xử lý truy vấn của bạn.","copilot-ext-auth-sdk.pluginAuthErrorWithAppNameText":"Để kiểm tra kết quả trong {0}, vui lòng đăng nhập và sau đó gửi lại yêu cầu của bạn.","copilot-ext-auth-sdk.pluginAuthErrorWithoutAppNameText":"Để kiểm tra kết quả, vui lòng đăng nhập và sau đó gửi lại yêu cầu của bạn.","copilot-ext-auth-sdk.pluginAuthTextWithAppName":"Đăng nhập vào {0}","copilot-ext-auth-sdk.pluginAuthTextWithoutAppName":"Đăng nhập","copilot-ext-auth-sdk.pluginConfigErrorWithAppNameText":"Để kiểm tra kết quả trong {0}, vui lòng hoàn tất thiết lập và sau đó gửi lại yêu cầu của bạn.","copilot-ext-auth-sdk.pluginConfigErrorWithoutAppNameText":"Để kiểm tra kết quả, vui lòng hoàn tất quá trình thiết lập và sau đó gửi lại yêu cầu của bạn.","copilot-ext-auth-sdk.pluginConfigTextWithAppName":"Thiết lập {0}","copilot-ext-auth-sdk.pluginConfigTextWithoutAppName":"Thiết lập","copilot-ext-msgext-card-reference-control.appIconText":"Biểu tượng Ứng dụng {0}","copilot-ext-plugin-flyout.addButtonContentText":"Thêm","copilot-ext-plugin-flyout.addingButtonContentText":"Đang thêm","copilot-ext-plugin-flyout.connectPowerPlatformConnectorText":"Kết nối","copilot-ext-plugin-flyout.enablingText":"Cho phép","copilot-ext-plugin-flyout.infoText":"Thông tin","copilot-ext-plugin-flyout.installationFailureMessage":"Đã xảy ra sự cố khi thêm ứng dụng. Liên hệ với người quản trị CNTT của bạn để được trợ giúp.","copilot-ext-plugin-flyout.managePluginsText":"Quản lý","copilot-ext-plugin-flyout.permissionsLinkText":"quyền truy nhập","copilot-ext-plugin-flyout.pluginAuthText":"Đăng nhập","copilot-ext-plugin-flyout.pluginConfigText":"Thiết lập","copilot-ext-plugin-flyout.pluginDescription":"Quản lý hộp thả xuống bạn muốn Copilot sử dụng trong phản hồi khi có liên quan đến yêu cầu của bạn. Một số dữ liệu Microsoft 365 có thể được chia sẻ khi thực hiện yêu cầu của bạn.","copilot-ext-plugin-flyout.pluginDisabledInfoText":"Phần bổ trợ đã bị vô hiệu hóa. Liên hệ với người quản trị của bạn.","copilot-ext-plugin-flyout.pluginInfoIconDescription":"Dữ liệu Microsoft 365 Enterprise bao gồm các ứng dụng Office, trang web SharePoint, tệp trên đám mây, thông tin liên lạc và nhiều nội dung khác. Tất cả đều được người quản trị CNTT của bạn cấu hình.","copilot-ext-plugin-flyout.pluginMoreAppsText":"Nhận thêm","copilot-ext-plugin-flyout.pluginNewBadge":"Mới","copilot-ext-plugin-flyout.pluginPreviewTitle":"Bản xem trước","copilot-ext-plugin-flyout.pluginRequiredText":"bắt buộc","copilot-ext-plugin-flyout.privacyPolicyLinkText":"chính sách về quyền riêng tư","copilot-ext-plugin-flyout.searchInputPlaceholderText":"Tìm kiếm","copilot-ext-plugin-flyout.storeFrontTitleText":"Hãy thử những cách sau","copilot-ext-plugin-flyout.termsOfUseLinkText":"điều khoản sử dụng","copilot-ext-plugin-flyout.webContentPluginDescription":"Bạn có thể quản lý tùy chọn nội dung web cho phản hồi của Copilot. Một số Microsoft 365 có thể được chia sẻ để thực hiện yêu cầu của bạn.","m365-ext-dialog-modal.m365chat.closeButton":"Đóng","m365-ext-dialog.dialogWithoutTitle":"Hộp thoại ứng dụng","m365-ext-dialog.dialogWithTitle":"Hộp thoại ứng dụng {0}","m365card-header-v9.appIconText":"Biểu tượng Ứng dụng {0}","m365card-header-v9.Copied":"Đã sao chép","msgext-card-preview.appNotAvailable":"Đã tắt hành động thẻ vì ứng dụng không sẵn có cho tổ chức của bạn. Vui lòng liên hệ với người quản trị của bạn","msgext-card-preview.appNotInstalled":"Tải ứng dụng từ Trang web Outlook/cửa hàng ứng dụng Windows để tiếp tục thực hiện thao tác.","msgext-card-preview.Copied":"Đã sao chép","msgext-card-preview.Copy":"Sao chép","msgext-card-preview.genericError":"Đã xảy ra lỗi.","msgext-card-preview.notAllowedInCompose":"Hành động thẻ này bị vô hiệu hóa cho kịch bản soạn thảo","msgext-card-preview.untrustedUrl":"URL có thể dẫn đến nội dung không đáng tin cậy.","officeaicopilot-chat.copilotChatStrings.ChangeTopicButtonLabel":"Thay đổi chủ đề","officeaicopilot-chat.copilotChatStrings.ChatHistoryPanelEmptyConversationName":"Cuộc trò chuyện trống","officeaicopilot-chat.copilotChatStrings.ChatHistoryPanelTitle":"Cuộc trò chuyện Copilot","officeaicopilot-chat.copilotChatStrings.CIQDefaultPlaceholder":"Bắt đầu nhập để tìm kiếm","officeaicopilot-chat.copilotChatStrings.claimChallengeChatMessage":"Chính sách của tổ chức bạn yêu cầu xác minh bổ sung để truy cập Copilot.","officeaicopilot-chat.copilotChatStrings.CopilotLabLaunchertext":"Xem tất cả gợi ý trong Copilot Lab","officeaicopilot-chat.copilotChatStrings.CopilotLabMenuSubItem":"Xem các yêu cầu khác","officeaicopilot-chat.copilotChatStrings.CopilotPromptLibraryHeader":"Yêu cầu từ Copilot Lab","officeaicopilot-chat.copilotChatStrings.CopyButtonLabel":"Sao chép","officeaicopilot-chat.copilotChatStrings.CopyButtonPopover":"Đã sao chép vào bảng tạm","officeaicopilot-chat.copilotChatStrings.CreditBannerBody":"Điểm AI sẽ được nạp lại vào đầu mỗi tháng.","officeaicopilot-chat.copilotChatStrings.CreditBannerLinkText":"Nhận thêm điểm ngay bây giờ","officeaicopilot-chat.copilotChatStrings.CreditBannerTitle":"Điểm đang sắp hết.","officeaicopilot-chat.copilotChatStrings.ErrorAuthenticationWithFix":"Đã xảy ra sự cố với tài khoản hoặc thiết bị của bạn. Hãy cùng khắc phục.","officeaicopilot-chat.copilotChatStrings.ErrorInputBlockedByDynamicGuardList":"Có vẻ như có một số nội dung ở đây mà tôi không thể xử lý được. Hãy thử yêu cầu tôi làm điều gì đó khác.","officeaicopilot-chat.copilotChatStrings.ErrorInputTooLong":"Có quá nhiều thông tin mà tôi cần xử lý. Hãy thử lại với yêu cầu có ít hơn 15.000 từ.","officeaicopilot-chat.copilotChatStrings.ErrorInvalidLanguage":"Yêu cầu của bạn bao gồm ngôn ngữ mà tôi hiện không hỗ trợ.","officeaicopilot-chat.copilotChatStrings.ErrorInvalidSignal":"Đã xảy ra lỗi. Vui lòng thử lại sau giây lát.","officeaicopilot-chat.copilotChatStrings.ErrorOffensiveInputContent":"Rất tiếc, tôi không thể xử lý nội dung đó. Hãy thử tạo một yêu cầu mới.","officeaicopilot-chat.copilotChatStrings.ErrorOffensiveOutputContent":"Rất tiếc tôi không thể tạo nội dung cho yêu cầu này. Hãy thử đưa ra yêu cầu mới.","officeaicopilot-chat.copilotChatStrings.ErrorThrottled":"Đã đạt đến số lượng yêu cầu tối đa mỗi giờ. Hãy thử lại sau giây lát.","officeaicopilot-chat.copilotChatStrings.ExtensionsDialogTitle":"Hộp thoại Phần mở rộng Copilot","officeaicopilot-chat.copilotChatStrings.InActiveChatSessionErrorString":"Phiên trò chuyện này đã kết thúc. Vui lòng đóng và mở lại ứng dụng này để vào phiên mới.","officeaicopilot-chat.copilotChatStrings.LearnMoreString":"Tìm hiểu thêm","officeaicopilot-chat.copilotChatStrings.LicenseValidationErrorMessage":"Chúng tôi đã gặp phải sự cố khi xác thực giấy phép Copilot của bạn. Để biết thêm thông tin, hãy xem https://aka.ms/copilotlicensecheck","officeaicopilot-chat.copilotChatStrings.LoadingUIStringCraftingContent":"Đang tạo nội dung của bạn...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringCreateNewConversation":"Đang tạo cuộc trò chuyện mới...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringFinishingTouches":"Đang áp dụng các bước hoàn tất cuối cùng...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringFinishingUp":"Đang hoàn tất...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringGatheringResources":"Đang thu thập tài nguyên...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringGettingEverythingReady":"Đang chuẩn bị sẵn sàng mọi thứ...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringGettingReady":"Đang chuẩn bị sẵn sàng...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringLoadingConversation":"Đang tải cuộc hội thoại...","officeaicopilot-chat.copilotChatStrings.LoadingUIStringWorkingOnRequest":"Đang thực hiện yêu cầu của bạn...","officeaicopilot-chat.copilotChatStrings.MicrophoneListeningGhostText":"Đang nghe...","officeaicopilot-chat.copilotChatStrings.PaneLoadingUIString":"Vui lòng chờ pa nen hoàn tất quá trình tải","officeaicopilot-chat.copilotChatStrings.SignInButtonLabel":"Tiếp tục","officeaicopilot-chat.copilotChatStrings.SignInButtonPopover":"Đăng nhập","officeaicopilot-chat.copilotChatStrings.SystemMessageActionButtonText":"Mở","officeaicopilot-chat.copilotChatStrings.VerifyAccessButtonLabel":"Xác minh quyền truy nhập","officeaicopilot-chat.copilotChatStrings.WorkingOnItString":"Đang thực hiện...","officeaicopilot-chatinput.chatInputStrings.AddImageButton":"Thêm một hình ảnh","officeaicopilot-chatinput.chatInputStrings.AdminBlockedPluginInfoTooltipLabel":"Dịch vụ cần thiết để sử dụng phần bổ trợ này đã bị tắt đối với tổ chức của bạn.","officeaicopilot-chatinput.chatInputStrings.atMentionGpt":"Đang trò chuyện với","officeaicopilot-chatinput.chatInputStrings.CharacterLimitReachedError":"Đã vượt quá giới hạn ký tự","officeaicopilot-chatinput.chatInputStrings.chatInputAttachmentAltTextFormat":"Tệp đính kèm: {0}","officeaicopilot-chatinput.chatInputStrings.ChatInputDefaultPlaceholder":"Chọn một yêu cầu bắt đầu hoặc nhập yêu cầu của riêng bạn","officeaicopilot-chatinput.chatInputStrings.ChatInputTitle":"Khu vực yêu cầu","officeaicopilot-chatinput.chatInputStrings.CopilotLabMenuSubItem":"Xem các yêu cầu khác","officeaicopilot-chatinput.chatInputStrings.CreditUpsellCardButton":"Nhận thêm điểm ngay bây giờ","officeaicopilot-chatinput.chatInputStrings.CreditUpsellCardDescription":"Bạn không muốn chờ đến tháng tiếp theo để sử dụng Copilot? Hãy xem qua Copilot Pro! Nhận thêm tín dụng AI và quyền truy cập ưu tiên vào các mô hình mới nhất ngay cả trong thời gian cao điểm.","officeaicopilot-chatinput.chatInputStrings.CreditUpsellCardTitle":"Bạn đã hết điểm","officeaicopilot-chatinput.chatInputStrings.DefaultCIQButtonTitle":"Đính kèm","officeaicopilot-chatinput.chatInputStrings.DefaultGroundingButtonTitle":"Quản lý tìm kiếm và phần bổ trợ","officeaicopilot-chatinput.chatInputStrings.DefaultMenuButtonTitle":"Xem yêu cầu","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutFreBody":"Xin giới thiệu các phần bổ trợ Copilot tiện dụng. Giờ đây, bạn có thể dễ dàng nhận câu trả lời chính xác cho các truy vấn.","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutFreHeader":"Mẹo","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutFrePrimaryButton":"Khám phá","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutFreSecondaryButton":"Bỏ qua","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutFreTitle":"Phần bổ trợ Copilot mở ra những khả năng mới","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutInfo":"Phần bổ trợ cho phép Copilot thay mặt bạn tham khảo các ứng dụng. Copilot có thể chia sẻ một số dữ liệu doanh nghiệp Microsoft 365 của bạn với các plugin bạn đã bật.","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutInfoLabel":"Thông tin","officeaicopilot-chatinput.chatInputStrings.GroundingPluginFlyoutInfoTooltip":"Dữ liệu Microsoft 365 Enterprise bao gồm các ứng dụng Office, trang web SharePoint, tệp trên đám mây, thông tin liên lạc và nhiều nội dung khác. Tất cả đều được người quản trị CNTT của bạn cấu hình.","officeaicopilot-chatinput.chatInputStrings.GroundingSearchAndPlugins":"Tìm kiếm và phần bổ trợ","officeaicopilot-chatinput.chatInputStrings.MicrophoneListeningGhostText":"Đang nghe...","officeaicopilot-chatinput.chatInputStrings.MicrophoneTooltipDisabled":"Micrô đã tắt","officeaicopilot-chatinput.chatInputStrings.MicrophoneTooltipListening":"Micrô đang nghe","officeaicopilot-chatinput.chatInputStrings.MicrophoneTooltipLoading":"Micrô đang tải","officeaicopilot-chatinput.chatInputStrings.MicrophoneTooltipPaused":"Micrô đã tạm dừng","officeaicopilot-chatinput.chatInputStrings.NeedHelpLink":"Bạn cần trợ giúp?","officeaicopilot-chatinput.chatInputStrings.nonImagePasteError":"Chỉ hình ảnh sẽ Hoạt động ở đây.","officeaicopilot-chatinput.chatInputStrings.NotNowMicrophoneButton":"Để sau","officeaicopilot-chatinput.chatInputStrings.PasteFromClipboardButton":"Dán từ bảng tạm","officeaicopilot-chatinput.chatInputStrings.PasteImageButton":"Dán hình ảnh","officeaicopilot-chatinput.chatInputStrings.PreviewFlagLabel":"Bản xem trước","officeaicopilot-chatinput.chatInputStrings.StarterPromptMenuTitle":"Hướng dẫn về yêu cầu","officeaicopilot-chatinput.chatInputStrings.SubmitButtonTitle":"Gửi","officeaicopilot-chatinput.chatInputStrings.TryAgainMicrophoneButton":"Thử lại","officeaicopilot-chatinput.chatInputStrings.UpdatedGroundingButtonTitle":"Quản lý các tác nhân của Copilot","officeaicopilot-chatinput.chatInputStrings.UploadImageBadContentError":"Có vẻ như có một số nội dung ở đây mà tôi không thể xử lý được. Thử sử dụng một hình ảnh khác.","officeaicopilot-chatinput.chatInputStrings.UploadImageButton":"Tải lên từ thiết bị này","officeaicopilot-chatinput.chatInputStrings.UploadImageFileTooBigErrorFormat":"Kích thước của Hình ảnh đó vượt quá giới hạn {0}MB của tôi. Vui lòng thử lại với Hình ảnh nhỏ hơn.","officeaicopilot-chatinput.chatInputStrings.UploadImageFromPhoneButton":"Tải lên từ điện thoại","officeaicopilot-chatinput.chatInputStrings.UploadImageUnsupportedTypeError":"Thật không may, tôi không thể làm việc với loại hình ảnh đó. Vui lòng Thử lại bằng BMP, JPG hoặc PNG.","officeaicopilot-chatinput.chatInputStrings.WebContentPluginLabel":"Nội dung trên web","officeaicopilot-chatinput.chatInputStrings.WorkPluginLabel":"Dữ liệu Microsoft 365","officeaicopilot-chatinput.morePluginsDialogBody":"Chúng tôi đang cố gắng để sớm tích hợp trải nghiệm cửa hàng. Trong khi chờ đợi, bạn có thể thử các bước dưới đây để cài đặt phần bổ trợ mà bạn cần:","officeaicopilot-chatinput.morePluginsDialogHeader":"Tải thêm phần bổ trợ","officeaicopilot-chatinput.morePluginsDialogPrimaryButtonText":"Tìm hiểu thêm","officeaicopilot-chatinput.morePluginsDialogSecondaryButtonText":"Bỏ qua","officeaicopilot-chatinput.morePluginsDialogStep1":"Truy cập cửa hàng tại copilot.microsoft.com","officeaicopilot-chatinput.morePluginsDialogStep2":"Truy nhập cửa hàng phần bổ trợ bằng cách bấm vào","officeaicopilot-chatinput.morePluginsDialogStep2Suffix":"biểu tượng phần bổ trợ.","officeaicopilot-chatinput.morePluginsDialogStep3":"Duyệt hoặc tìm kiếm phần bổ trợ mong muốn","officeaicopilot-chatinput.morePluginsDialogStep4":"Sau khi tìm thấy phần bổ trợ, bạn chỉ cần chọn cài đặt.","officeaicopilot-chatinput.morePluginsDialogStep5":"Phần bổ trợ hiện sẵn sàng để dùng trong hộp thả xuống","officeaicopilot-copilot-gpts.CopilotGPTStrings.CopilotChatGPTListLoadErrorText":"Không tải được một số tác nhân. Thử khởi chạy lại Copilot.","officeaicopilot-copilot-gpts.CopilotGPTStrings.CopilotChatLoadErrorHeader":"Không thể tải","officeaicopilot-copilot-gpts.CopilotGPTStrings.CopilotChatLoadErrorText":"Vui lòng thử mở lại qua menu hoặc chuyển sang tác nhân khác","officeaicopilot-copilot-gpts.CopilotGPTStrings.CopilotExtensionChatInputPlaceholderText":"Đặt câu hỏi","officeaicopilot-switcher-menu-container.copilotUiStrings.CopilotLabel":"Copilot","officeaicopilot-ui.copilotUiStrings.AIGenerated":"Do AI tạo","officeaicopilot-ui.copilotUiStrings.AIPowered":"Đề xuất hoạt động trên nền tảng AI","officeaicopilot-ui.copilotUiStrings.ChangeTopicButtonLabel":"Thay đổi chủ đề","officeaicopilot-ui.copilotUiStrings.ChatCardFooterDisclaimer":"Nội dung do AI tạo có thể không chính xác.","officeaicopilot-ui.copilotUiStrings.ChatCardFooterDisclaimerPowered":"Các đề xuất hoạt động trên nền tảng AI có thể không chính xác","officeaicopilot-ui.copilotUiStrings.ChatContainerFeedbackNudgeContent":"Vui lòng giúp chúng tôi tìm hiểu và đào tạo các mô hình của mình bằng cách cung cấp phản hồi thông qua các nút điều khiển thích và không thích đối với mỗi đầu ra mà LLM tạo ra.","officeaicopilot-ui.copilotUiStrings.ChatContainerFeedbackNudgeContentTitle":"Nội dung nhắc phản hồi","officeaicopilot-ui.copilotUiStrings.ChatContainerFeedbackNudgeHeader":"Cung cấp ý kiến phản hồi","officeaicopilot-ui.copilotUiStrings.ChatContainerFeedbackNudgeHeaderTitle":"CHỈ DÀNH CHO NỘI BỘ MICROSOFT","officeaicopilot-ui.copilotUiStrings.ChatHistoryBackButtonAriaLabel":"Quay lại trang chủ","officeaicopilot-ui.copilotUiStrings.ChatHistoryDeleteAllAriaLabel":"Xóa toàn bộ lịch sử trò chuyện","officeaicopilot-ui.copilotUiStrings.ChatHistoryDeleteButtonAriaLabel":"Xóa","officeaicopilot-ui.copilotUiStrings.ChatHistoryHeaderAriaLabel":"Cuộc trò chuyện Copilot","officeaicopilot-ui.copilotUiStrings.ChatHistoryListSecondaryButtonAriaLabel":"Có một hành động","officeaicopilot-ui.copilotUiStrings.ChatHistoryNewConversationAriaLabel":"Bắt đầu cuộc trò chuyện mới","officeaicopilot-ui.copilotUiStrings.ChatHistoryPanelAriaLabel":"Danh sách chat trong tài liệu gần đây","officeaicopilot-ui.copilotUiStrings.ChatMessagesAccessibilityLabel":"Tin nhắn Trò chuyện","officeaicopilot-ui.copilotUiStrings.ConversationListErrorStateText":"Chúng tôi đang gặp sự cố khi hiển thị cuộc trò chuyện của Copilot. Vui lòng thử lại sau.","officeaicopilot-ui.copilotUiStrings.ConversationListErrorStateTitle":"Đã xảy ra sự cố","officeaicopilot-ui.copilotUiStrings.CopilotBrandingIconId":"Logo của Copilot","officeaicopilot-ui.copilotUiStrings.CopilotBrandingTagline":"Người bạn đồng hành AI hằng ngày của bạn","officeaicopilot-ui.copilotUiStrings.CopilotBrandingTitle":"Copilot","officeaicopilot-ui.copilotUiStrings.CopilotSwitcherMenuTriggerTitle":"Chuyển Đổi copilot","officeaicopilot-ui.copilotUiStrings.CreditButtonText":"Số dư điểm AI","officeaicopilot-ui.copilotUiStrings.CreditButtonTooltipBody":"Điểm AI sẽ được nạp lại vào đầu mỗi tháng.","officeaicopilot-ui.copilotUiStrings.CreditButtonTooltipTitle":"Theo dõi mức sử dụng điểm","officeaicopilot-ui.copilotUiStrings.CreditsTeachingCalloutBodyText":"Gói đăng ký Microsoft 365 cung cấp cho bạn một số điểm AI để mở khóa các trải nghiệm Copilot và nhiều tính năng khác. Theo dõi mức sử dụng của bạn tại đây.","officeaicopilot-ui.copilotUiStrings.CreditsTeachingCalloutTitleText":"Xem số dư điểm của bạn","officeaicopilot-ui.copilotUiStrings.DCScoped":" đang phản hồi ","officeaicopilot-ui.copilotUiStrings.DCScopedUpdated":" đang phản hồi. ","officeaicopilot-ui.copilotUiStrings.DCUnscoped":" không còn phản hồi nữa","officeaicopilot-ui.copilotUiStrings.DCUnscopedUpdated":" không còn phản hồi nữa.","officeaicopilot-ui.copilotUiStrings.DeleteAllChatHistoryButtonText":"Xóa tất cả lịch sử Copilot","officeaicopilot-ui.copilotUiStrings.DislikeButtonAccessibilityLabel":"Không thích","officeaicopilot-ui.copilotUiStrings.EmptyConversationListText":"Không có cuộc trò chuyện Copilot trước đó trong tài liệu này","officeaicopilot-ui.copilotUiStrings.ErrorBoundaryActionButton":"Sao chép mã lỗi","officeaicopilot-ui.copilotUiStrings.ErrorBoundaryBody":"Vui lòng làm mới khung Copilot để thử lại.","officeaicopilot-ui.copilotUiStrings.ErrorBoundaryButton":"Làm mới","officeaicopilot-ui.copilotUiStrings.ErrorBoundaryHeader":"Đã xảy ra sự cố","officeaicopilot-ui.copilotUiStrings.FREButtonText":"Bắt đầu","officeaicopilot-ui.copilotUiStrings.FREDescriptionTextLabel":"freSharedDescription","officeaicopilot-ui.copilotUiStrings.FREHeaderText":"Copilot sẵn sàng trợ giúp!","officeaicopilot-ui.copilotUiStrings.FREHeaderTextLabel":"freSharedHeaderText","officeaicopilot-ui.copilotUiStrings.HintCardDescriptionTextLabel":"hintCardDescriptionText","officeaicopilot-ui.copilotUiStrings.HintCardHeaderTextLabel":"hintCardHeaderText","officeaicopilot-ui.copilotUiStrings.LearnMoreString":"Tìm hiểu thêm","officeaicopilot-ui.copilotUiStrings.LikeButtonAccessibilityLabel":"Thích","officeaicopilot-ui.copilotUiStrings.LoadingUiTextLabel":"loadingUiText","officeaicopilot-ui.copilotUiStrings.MoreExamplesButtonLabel":"Xem thêm ví dụ","officeaicopilot-ui.copilotUiStrings.NewChatButtonText":"Cuộc trò chuyện mới","officeaicopilot-ui.copilotUiStrings.NewConversationButtonText":"Tạo cuộc hội thoại mới","officeaicopilot-ui.copilotUiStrings.PaneSilhouetteSeeLessGPTsLabel":"Ẩn bớt","officeaicopilot-ui.copilotUiStrings.PaneSilhouetteSeeMoreGPTsLabel":"Xem thêm","officeaicopilot-ui.copilotUiStrings.PluginDisabledScoped":" sẽ được bật khi được nhắc phản hồi qua Copilot","officeaicopilot-ui.copilotUiStrings.PluginDisabledText":"đang tắt.","officeaicopilot-ui.copilotUiStrings.PluginDisabledTextUpdated":" đang tắt.","officeaicopilot-ui.copilotUiStrings.PluginEnabledScoped":" đang phản hồi qua Copilot ","officeaicopilot-ui.copilotUiStrings.PluginEnabledText":"đang bật.","officeaicopilot-ui.copilotUiStrings.PluginEnabledTextUpdated":" đang bật.","officeaicopilot-ui.copilotUiStrings.PluginTryText":"Dùng thử ngay","officeaicopilot-ui.copilotUiStrings.PluginTryTextUpdated":" Dùng thử ngay","officeaicopilot-ui.copilotUiStrings.PluginUnscoped":" không còn phản hồi nữa","officeaicopilot-ui.copilotUiStrings.ProactiveSuggestionApplyBtnText":"Áp dụng","officeaicopilot-ui.copilotUiStrings.ProactiveSuggestionBodyText":"Để có phần thuyết trình hấp dẫn hơn, đây là bản thiết kế làm nổi bật hơn nữa số liệu thống kê trên trang chiếu của bạn.","officeaicopilot-ui.copilotUiStrings.ProactiveSuggestionIconText":"Ý tưởng","officeaicopilot-ui.copilotUiStrings.ProactiveSuggestionImageAltText":"hình ảnh thẻ đề xuất chủ động","officeaicopilot-ui.copilotUiStrings.ProactiveSuggestionTitleText":"Tô sáng dữ liệu","officeaicopilot-ui.copilotUiStrings.ReferencesText":"Tham Chiếu","officeaicopilot-ui.copilotUiStrings.ReferenceText":"Tham chiếu","officeaicopilot-ui.copilotUiStrings.RestrictiveSearchMessageBodyText":"Điều này giới hạn nội dung Copilot có thể tìm kiếm và tham chiếu khi phản hồi yêu cầu của bạn.","officeaicopilot-ui.copilotUiStrings.RestrictiveSearchMessageTitleText":"Người quản trị của tổ chức bạn đã hạn chế Copilot truy nhập vào một số site SharePoint.","officeaicopilot-ui.copilotUiStrings.SendFeedbackButtonLabel":"Gửi ý kiến phản hồi","officeaicopilot-ui.copilotUiStrings.SharedHeaderActivateRealtimeVoiceButtonLabel":"Voice on","officeaicopilot-ui.copilotUiStrings.SharedHeaderCloseButtonLabel":"Đóng","officeaicopilot-ui.copilotUiStrings.SharedHeaderCollapseButtonLabel":"Thu gọn","officeaicopilot-ui.copilotUiStrings.SharedHeaderDeactivateRealtimeVoiceButtonLabel":"Voice off","officeaicopilot-ui.copilotUiStrings.SharedHeaderExpandButtonOptionsLabel":"Mở rộng","officeaicopilot-ui.copilotUiStrings.SharedHeaderHelpButtonLabel":"Trợ giúp","officeaicopilot-ui.copilotUiStrings.SharedHeaderMoveButtonLabel":"Di chuyển","officeaicopilot-ui.copilotUiStrings.SharedHeaderResizeButtonLabel":"Đổi kích cỡ","officeaicopilot-ui.copilotUiStrings.SharedHeaderTaskPaneOptionsLabel":"Tùy chọn ngăn tác vụ","officeaicopilot-ui.copilotUiStrings.ShowChatHistoryButtonText":"Lịch sử trò chuyện","officeaicopilot-ui.copilotUiStrings.ShowMeButtonText":"Hướng dẫn tôi","officeaicopilot-ui.copilotUiStrings.SlideLinksListItemText":"Trang chiếu {0}","officeaicopilot-ui.copilotUiStrings.SlideLinksMessage1Option1":"Nếu bạn muốn thêm hình ảnh, tôi đã tìm thấy một số vị trí có thể phù hợp:","officeaicopilot-ui.copilotUiStrings.SlideLinksMessage1Option2":"Khi bạn xem lại các trang chiếu này, hãy xem xét vị trí bạn muốn thêm hình ảnh.","officeaicopilot-ui.copilotUiStrings.SlideLinksMessage2Part1":"Để khám phá hình ảnh trong dải băng ở trên, hãy chọn ","officeaicopilot-ui.copilotUiStrings.SlideLinksMessage2Part2":"Tab Chèn > Ảnh.","officeaicopilot-ui.copilotUiStrings.StopGeneratingButtonLabel":"Dừng tạo","officeaicopilot-ui.copilotUiStrings.SuggestionPaneLabel":"Lời nhắc được đề xuất","officeaicopilot-ui.copilotUiStrings.SuggestionPaneRefreshButtonLabel":"Làm mới","officeaicopilot-ui.copilotUiStrings.TeachingCalloutHeaderText":"Mẹo","officeaicopilot-ui.copilotUiStrings.TeachingCalloutPrimaryButtonText":"Đã hiểu","officeaicopilot-ui.copilotUiStrings.WUCHeaderTextLabel":"wucHeaderText","officeaicopilot-ui.copilotUiStrings.ZQMHeaderTextLabel":"zqmHeaderText","scc-react-api-card-extensions.spfx-component.goToConnections":"Mở Trong Connections","scc-react-api-card-extensions.spfx-component.goToWidget":"Đi đến tiện ích","scc-react-api-card-extensions.spfx-component.iconAltText":"Viva Connections","scc-react-api-plugin-card.appNotAvailable":"Đã tắt hành động thẻ vì ứng dụng không sẵn có cho tổ chức của bạn. Vui lòng liên hệ với người quản trị của bạn","scc-react-api-plugin-card.appNotInstalled":"Tải ứng dụng từ Trang web Outlook/cửa hàng ứng dụng Windows để tiếp tục thực hiện thao tác.","scc-react-api-plugin-card.Copied":"Đã sao chép","scc-react-api-plugin-card.Copy":"Sao chép","scc-react-api-plugin-card.genericError":"Đã xảy ra lỗi.","scc-react-api-plugin-card.untrustedUrl":"URL có thể dẫn đến nội dung không đáng tin cậy.","scc-react-attachment-list-plugin.sccAttachment.addAttachmentHint":"Thêm người, tệp và nhiều nội dung khác để có kết quả tốt hơn","scc-react-attachment-list-plugin.sccAttachment.ciqAttachmentTooltip":"Tham chiếu thêm ngữ cảnh vào lời nhắc của bạn. Để sử dụng một cái khác, hãy chọn X rồi chọn một cái từ menu.","scc-react-attachment-list-plugin.sccAttachment.moreAttachmentHint":"Xem thêm","scc-react-attachment-list-plugin.sccAttachment.removeIcon":"Loại bỏ","scc-react-attachment-list-plugin.sccAttachment.uploadingAttachment":"{0} đang tải lên, {1}%","scc-react-attachment-list-plugin.sccAttachment.uploadingAttachmentFinished":"Đã hoàn tất tải lên {0}","scc-react-chat-output.chatOutputStrings.aiDisclaimer":"Nội dung do AI tạo có thể không chính xác.","scc-react-chat-output.chatOutputStrings.ReferencesShowLessLabel":"Ẩn bớt","scc-react-cloud-files.scc.attachCloudFilesMenuItemLabel":"Đính kèm tệp đám mây","scc-react-cloud-files.scc.uploadIconLabel":"Tải lên","scc-react-handoff-plugin.sccHandoffStrings.HandoffButtonEditInText":"Chỉnh sửa trong","scc-react-input-messages.m365chat.chatInputDismissMessage":"Bỏ qua tin nhắn","scc-react-local-files.DragDropFile":"Thả tệp của bạn ở đây","scc-react-local-files.sccLocalFiles.UploadDuplicatedMessageLink":"Xem trước tệp cũ hơn","scc-react-local-files.sccLocalFiles.UploadDuplicateMessage":"Đã tải lên một bản sao vì một tệp có cùng tên đã được sử dụng.","scc-react-local-files.sccLocalFiles.UploadFileEmptyErrorMessage":"Tải lên không thành công - tệp trống","scc-react-local-files.sccLocalFiles.UploadFileErrorBtn":"Hãy thử lại","scc-react-local-files.sccLocalFiles.UploadFileErrorMessage":"Đã xảy ra lỗi khi tải lên tệp của bạn. Vui lòng thử lại.","scc-react-local-files.sccLocalFiles.UploadFileExtensionErrorMessage":"Loại tệp này không được hỗ trợ. Xem:","scc-react-local-files.sccLocalFiles.UploadFileExtensionErrorMessageBtn":"Tải một tệp khác lên","scc-react-local-files.sccLocalFiles.uploadFromDeviceMenuItemLabel":"Tải lên từ thiết bị này","scc-react-local-files.sccLocalFiles.uploadIconLabel":"Tải lên","scc-react-local-files.sccLocalFiles.UploadMessage":"Việc tải lên từ thiết bị sẽ gửi một bản sao đến OneDrive cho Doanh nghiệp.","scc-react-local-files.sccLocalFiles.UploadMessageLink":"Quản lý tệp đã tải lên","scc-react-local-files.sccLocalFiles.UploadReplaceFileBtn":"Thay vào đó, hãy sử dụng tệp cũ hơn","scc-react-local-files.sccLocalFiles.UploadSupportedFileFormatLink":"Định dạng tệp được Copilot hỗ trợ","scc-react-system-message.appNameWithMessage":"{0}{1}","scc-react-system-message.GoToSettingsText":"Đi tới cài đặt","scc-react-voice-plugin.sccVoiceStrings.MicrophoneListeningGhostText":"Đang nghe...","scc-react-voice-plugin.sccVoiceStrings.MicrophoneTooltip":"Micrô","scc-react-voice-plugin.sccVoiceStrings.MicrophoneTooltipDisabled":"Micrô đã tắt","scc-react-voice-plugin.sccVoiceStrings.MicrophoneTooltipListening":"Micrô đang nghe","scc-react-voice-plugin.sccVoiceStrings.MicrophoneTooltipLoading":"Micrô đang tải","scc-react-voice-plugin.sccVoiceStrings.MicrophoneTooltipPaused":"Micrô đã tạm dừng","scc-react-voice-plugin.sccVoiceStrings.NeedHelpLink":"Bạn cần trợ giúp?","scc-react-voice-plugin.sccVoiceStrings.NotNowMicrophoneButton":"Không phải Bây giờ","scc-react-voice-plugin.sccVoiceStrings.TryAgainMicrophoneButton":"Thử lại","scc-service-input-messages.scc.chatInputFileCountErrorMessage":"Số lượng tệp bạn đang cố thêm vượt quá giới hạn tối đa. Copilot hiện hỗ trợ thêm Tối đa 5 tệp cùng một lúc.","scc-service-input-messages.scc.chatInputFileSizeErrorMessage":"Kích thước tệp vượt quá giới hạn tối đa. Copilot hiện hỗ trợ kích thước tệp lên đến 512 MB","scc-service-input-messages.scc.ODBDisabledErrorMessage":"Bạn cần OneDrive cho Doanh nghiệp để duyệt và tải tệp lên. Liên hệ với người quản trị của bạn để được hỗ trợ.","scc-service-input-messages.scc.unexpectedErrorMessage":"Đã xảy ra lỗi ngoài dự kiến. Vui lòng thử lại sau."}')}}]);
|
combined_dataset/train/non-malicious/sample_43_75.ps1
|
sample_43_75.ps1
|
#
# Module manifest for module 'OCI.PSModules.Capacitymanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Capacitymanagement.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '847ff9d9-1cd2-4050-8297-31d3b08d96b0'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Capacitymanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Capacitymanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCICapacitymanagementOccAvailabilitiesList',
'Get-OCICapacitymanagementOccAvailabilityCatalog',
'Get-OCICapacitymanagementOccAvailabilityCatalogContent',
'Get-OCICapacitymanagementOccAvailabilityCatalogsInternalList',
'Get-OCICapacitymanagementOccAvailabilityCatalogsList',
'Get-OCICapacitymanagementOccCapacityRequest',
'Get-OCICapacitymanagementOccCapacityRequestsInternalList',
'Get-OCICapacitymanagementOccCapacityRequestsList',
'Get-OCICapacitymanagementOccCustomerGroup',
'Get-OCICapacitymanagementOccCustomerGroupsList',
'Invoke-OCICapacitymanagementPatchOccCapacityRequest',
'Invoke-OCICapacitymanagementPublishOccAvailabilityCatalog',
'New-OCICapacitymanagementOccAvailabilityCatalog',
'New-OCICapacitymanagementOccCapacityRequest',
'Remove-OCICapacitymanagementOccAvailabilityCatalog',
'Remove-OCICapacitymanagementOccCapacityRequest',
'Update-OCICapacitymanagementInternalOccCapacityRequest',
'Update-OCICapacitymanagementOccAvailabilityCatalog',
'Update-OCICapacitymanagementOccCapacityRequest'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Capacitymanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_10_59.ps1
|
sample_10_59.ps1
|
ConvertFrom-StringData @'
id_mats_networkadapter=Network Adapter
id_mats_networkadaptertype=Type
id_mats_networkadapterspeed=Speed
id_mats_ipaddresses=IP Addresses
id_mats_defaultgateway=Default Gateway
id_mats_dnsservers=DNS Servers
id_mats_proxyenabled=Proxy Server
id_enabled=Enabled
id_mats_proxyserveradd=Proxy Server Adress
id_mats_proxyoverride=Do not use proxy server for
id_disabled=Disabled
id_mats_proxyautosettings=Automatic Detect Settings
id_mats_proxyautoscript=Automatic Configuration Script
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/aq2Uw1Njui02
# IIFaeazcleKpj9aBjTCRakn0T8AJJ6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIGQBdIlEie2TGST+FFAlEv8
# Y6IwcXy3cFxyhg32Suq8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAZlnJNS964vb52LXffOJQSsZQiybz+uO3rFqqQowqm2P01n3mxZY26g51
# QBd7X6pKwqFoL7P4mX7NEu/sWsdIBGaatZlSCEG5wJwmyNanf+99ztvsUEeZ/o8p
# 2E2mSBudH8IC3gCTixGnUosxej6bM0X2eQ1MXWZdW2sL+A+ij/II+zVSAntGbiza
# iaUtsVX/7IEgQmPFfuGyv9Bpir2tzgcmrAbMgkHJUdRbRcxpi3TVWuChmXJK7cG3
# O/QtZ7oL7GpjsL0HAZwF+ZLD0VD75hsAhrIHw0v4HZvDGTkHohdTBYunJ6zorHIz
# 8CsN6rYKrBUaLmY+DZp3y/4Cd/PUS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDRHK4aAPrE7dIvR9QD987uFRcXYtjIqqRT3QIn3Jix3QIGZxqDjw9o
# GBMyMDI0MTAyODExNDA0MS4yNDJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz
# OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P
# AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR
# rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C
# Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm
# xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy
# fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo
# 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAWLtfoY7fKmKgOdGn/XCODUYCzOHgvrh7nuOBv2jAF
# RzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy
# SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIAAMboz02V3xxkkzUvEhAW
# LCEK2+r58/o5RhftpkkAKI+UYpDCB+mVFa5kZ3UDJL847or4L9ip0EUmv6Fj6e2a
# Vsvrvl9q6PH51sDysSmNfNIOC5zKIa8cHFenSrdT0rEeKoUTFFxwJHDCKH/edu+x
# lQxgqMfgKi1tlpzPMlWXQMBiOUQ4tZUKnAahMFQALtaRIkMB7bBXgAIFzsM3Lx/K
# C7IR7g6I6kYwobRpAYLBvPUEuyXH3CPqv3nnJexOHeV4ZKcwQc5HSkLz2GbGwO2j
# B2kixbj2kBUoF8RqDJfiSRb/Z+iNXoX6eSNbugrTHR5IOOGxxCIBMHcHnqgnduIT
# fGuWL+82Vz9CxglAvlQ6B7dVgFOvULWyNEbRv538cR+5BeoghV1pj+lB483ygc6C
# K9wt6fIjbG2m+vPOCZfFo2J6tWP/PaO6xOizwbrbep7VBe1aTwr9YUAb3rSepv0O
# GWRjayYc8z6wu1LdTIKmegCCx46bpL5/GQdmufZhysfb+II0rGAw0Gbc4ylUTOJH
# PAqhzKEoz3lAVAOwzQ6n/DgYxnaIxWf0Uwn4KlNLZPP1ePRK2+WY6iFc6if3dWSy
# GORbut4/2+xAl2jS/IC/0yy/omWcM6bXYtH57VSH4Zx0++lWFj7M1WWGNGXtsaZF
# JOLFiNmCPE9dh8AUDCTf21k=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_33_44.ps1
|
sample_33_44.ps1
|
#
# Module manifest for module 'OCI.PSModules.Adm'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Adm.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Adm Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAdmRemediationRecipe',
'Get-OCIAdmApplicationDependencyRecommendationsList',
'Get-OCIAdmApplicationDependencyVulnerabilitiesList',
'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList',
'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList',
'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList',
'Get-OCIAdmStage', 'Get-OCIAdmStagesList',
'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList',
'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList',
'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList',
'Invoke-OCIAdmDeactivateRemediationRecipe',
'Move-OCIAdmKnowledgeBaseCompartment',
'Move-OCIAdmRemediationRecipeCompartment',
'Move-OCIAdmRemediationRunCompartment',
'Move-OCIAdmVulnerabilityAuditCompartment',
'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe',
'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit',
'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe',
'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit',
'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest',
'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe',
'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_55_80.ps1
|
sample_55_80.ps1
|
# ---------------------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# ---------------------------------------------------------------------------------------------
# Prevent installing more than once per session
if (Test-Path variable:global:__VSCodeOriginalPrompt) {
return;
}
# Disable shell integration when the language mode is restricted
if ($ExecutionContext.SessionState.LanguageMode -ne "FullLanguage") {
return;
}
$Global:__VSCodeOriginalPrompt = $function:Prompt
$Global:__LastHistoryId = -1
# Store the nonce in script scope and unset the global
$Nonce = $env:VSCODE_NONCE
$env:VSCODE_NONCE = $null
$isStable = $env:VSCODE_STABLE
$env:VSCODE_STABLE = $null
$osVersion = [System.Environment]::OSVersion.Version
$isWindows10 = $IsWindows -and $osVersion.Major -eq 10 -and $osVersion.Minor -eq 0 -and $osVersion.Build -lt 22000
if ($env:VSCODE_ENV_REPLACE) {
$Split = $env:VSCODE_ENV_REPLACE.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':'))
}
$env:VSCODE_ENV_REPLACE = $null
}
if ($env:VSCODE_ENV_PREPEND) {
$Split = $env:VSCODE_ENV_PREPEND.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':') + [Environment]::GetEnvironmentVariable($Inner[0]))
}
$env:VSCODE_ENV_PREPEND = $null
}
if ($env:VSCODE_ENV_APPEND) {
$Split = $env:VSCODE_ENV_APPEND.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], [Environment]::GetEnvironmentVariable($Inner[0]) + $Inner[1].Replace('\x3a', ':'))
}
$env:VSCODE_ENV_APPEND = $null
}
function Global:__VSCode-Escape-Value([string]$value) {
# NOTE: In PowerShell v6.1+, this can be written `$value -replace '…', { … }` instead of `[regex]::Replace`.
# Replace any non-alphanumeric characters.
[regex]::Replace($value, "[$([char]0x00)-$([char]0x1f)\\\n;]", { param($match)
# Encode the (ascii) matches as `\x<hex>`
-Join (
[System.Text.Encoding]::UTF8.GetBytes($match.Value) | ForEach-Object { '\x{0:x2}' -f $_ }
)
})
}
function Global:Prompt() {
$FakeCode = [int]!$global:?
# NOTE: We disable strict mode for the scope of this function because it unhelpfully throws an
# error when $LastHistoryEntry is null, and is not otherwise useful.
Set-StrictMode -Off
$LastHistoryEntry = Get-History -Count 1
$Result = ""
# Skip finishing the command if the first command has not yet started
if ($Global:__LastHistoryId -ne -1) {
if ($LastHistoryEntry.Id -eq $Global:__LastHistoryId) {
# Don't provide a command line or exit code if there was no history entry (eg. ctrl+c, enter on no command)
$Result += "$([char]0x1b)]633;D`a"
}
else {
# Command finished exit code
# OSC 633 ; D [; <ExitCode>] ST
$Result += "$([char]0x1b)]633;D;$FakeCode`a"
}
}
# Prompt started
# OSC 633 ; A ST
$Result += "$([char]0x1b)]633;A`a"
# Current working directory
# OSC 633 ; <Property>=<Value> ST
$Result += if ($pwd.Provider.Name -eq 'FileSystem') { "$([char]0x1b)]633;P;Cwd=$(__VSCode-Escape-Value $pwd.ProviderPath)`a" }
# Before running the original prompt, put $? back to what it was:
if ($FakeCode -ne 0) {
Write-Error "failure" -ea ignore
}
# Run the original prompt
$OriginalPrompt += $Global:__VSCodeOriginalPrompt.Invoke()
$Result += $OriginalPrompt
# Prompt
# OSC 633 ; <Property>=<Value> ST
if ($isStable -eq "0") {
$Result += "$([char]0x1b)]633;P;Prompt=$(__VSCode-Escape-Value $OriginalPrompt)`a"
}
# Write command started
$Result += "$([char]0x1b)]633;B`a"
$Global:__LastHistoryId = $LastHistoryEntry.Id
return $Result
}
# Only send the command executed sequence when PSReadLine is loaded, if not shell integration should
# still work thanks to the command line sequence
if (Get-Module -Name PSReadLine) {
$__VSCodeOriginalPSConsoleHostReadLine = $function:PSConsoleHostReadLine
function Global:PSConsoleHostReadLine {
$CommandLine = $__VSCodeOriginalPSConsoleHostReadLine.Invoke()
# Command line
# OSC 633 ; E ; <CommandLine?> ; <Nonce?> ST
$Result = "$([char]0x1b)]633;E;"
$Result += $(__VSCode-Escape-Value $CommandLine)
# Only send the nonce if the OS is not Windows 10 as it seems to echo to the terminal
# sometimes
if ($IsWindows10 -eq $false) {
$Result += ";$Nonce"
}
$Result += "`a"
# Command executed
# OSC 633 ; C ST
$Result += "$([char]0x1b)]633;C`a"
# Write command executed sequence directly to Console to avoid the new line from Write-Host
[Console]::Write($Result)
$CommandLine
}
}
# Set IsWindows property
if ($PSVersionTable.PSVersion -lt "6.0") {
# Windows PowerShell is only available on Windows
[Console]::Write("$([char]0x1b)]633;P;IsWindows=$true`a")
}
else {
[Console]::Write("$([char]0x1b)]633;P;IsWindows=$IsWindows`a")
}
# Set ContinuationPrompt property
if ($isStable -eq "0") {
$ContinuationPrompt = (Get-PSReadLineOption).ContinuationPrompt
if ($ContinuationPrompt) {
[Console]::Write("$([char]0x1b)]633;P;ContinuationPrompt=$(__VSCode-Escape-Value $ContinuationPrompt)`a")
}
}
# Set always on key handlers which map to default VS Code keybindings
function Set-MappedKeyHandler {
param ([string[]] $Chord, [string[]]$Sequence)
try {
$Handler = Get-PSReadLineKeyHandler -Chord $Chord | Select-Object -First 1
}
catch [System.Management.Automation.ParameterBindingException] {
# PowerShell 5.1 ships with PSReadLine 2.0.0 which does not have -Chord,
# so we check what's bound and filter it.
$Handler = Get-PSReadLineKeyHandler -Bound | Where-Object -FilterScript { $_.Key -eq $Chord } | Select-Object -First 1
}
if ($Handler) {
Set-PSReadLineKeyHandler -Chord $Sequence -Function $Handler.Function
}
}
function Set-MappedKeyHandlers {
Set-MappedKeyHandler -Chord Ctrl+Spacebar -Sequence 'F12,a'
Set-MappedKeyHandler -Chord Alt+Spacebar -Sequence 'F12,b'
Set-MappedKeyHandler -Chord Shift+Enter -Sequence 'F12,c'
Set-MappedKeyHandler -Chord Shift+End -Sequence 'F12,d'
# Enable suggestions if the environment variable is set and Windows PowerShell is not being used
# as APIs are not available to support this feature
if ($env:VSCODE_SUGGEST -eq '1' -and $PSVersionTable.PSVersion -ge "6.0") {
Remove-Item Env:VSCODE_SUGGEST
# VS Code send completions request (may override Ctrl+Spacebar)
Set-PSReadLineKeyHandler -Chord 'F12,e' -ScriptBlock {
Send-Completions
}
# VS Code send global completions request
Set-PSReadLineKeyHandler -Chord 'F12,f' -ScriptBlock {
# Get commands, convert to string array to reduce the payload size and send as JSON
$commands = [System.Management.Automation.CompletionCompleters]::CompleteCommand('')
$mappedCommands = Compress-Completions($commands)
$result = "$([char]0x1b)]633;CompletionsPwshCommands;commands;"
$result += $mappedCommands | ConvertTo-Json -Compress
$result += "`a"
Write-Host -NoNewLine $result
}
Set-PSReadLineKeyHandler -Chord 'F12,g' -ScriptBlock {
Import-Module "$PSScriptRoot\GitTabExpansion.psm1"
Remove-PSReadLineKeyHandler -Chord 'F12,g'
}
Set-PSReadLineKeyHandler -Chord 'F12,h' -ScriptBlock {
Import-Module "$PSScriptRoot\CodeTabExpansion.psm1"
Remove-PSReadLineKeyHandler -Chord 'F12,h'
}
}
}
function Send-Completions {
$commandLine = ""
$cursorIndex = 0
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$commandLine, [ref]$cursorIndex)
$completionPrefix = $commandLine
# Start completions sequence
$result = "$([char]0x1b)]633;Completions"
# If there is a space in the input, defer to TabExpansion2 as it's more complicated to
# determine what type of completions to use
# `[` is included here as namespace commands are not included in CompleteCommand(''),
# additionally for some reason CompleteVariable('[') causes the prompt to clear and reprint
# multiple times
if ($completionPrefix.Contains(' ') -or $completionPrefix.Contains('[') -or $PSVersionTable.PSVersion -lt "6.0") {
$completions = TabExpansion2 -inputScript $completionPrefix -cursorColumn $cursorIndex
if ($null -ne $completions.CompletionMatches) {
$result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);"
if ($completions.CompletionMatches.Count -gt 0 -and $completions.CompletionMatches.Where({ $_.ResultType -eq 3 -or $_.ResultType -eq 4 })) {
$json = [System.Collections.ArrayList]@($completions.CompletionMatches)
# Add . and .. to the completions list
$json.Add([System.Management.Automation.CompletionResult]::new(
'.', '.', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Get-Location).Path)
)
$json.Add([System.Management.Automation.CompletionResult]::new(
'..', '..', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Split-Path (Get-Location) -Parent))
)
$mappedCommands = Compress-Completions($json)
$result += $mappedCommands | ConvertTo-Json -Compress
} else {
$mappedCommands = Compress-Completions($completions.CompletionMatches)
$result += $mappedCommands | ConvertTo-Json -Compress
}
}
}
# If there is no space, get completions using CompletionCompleters as it gives us more
# control and works on the empty string
else {
# Note that CompleteCommand isn't included here as it's expensive
$completions = $(
# Add trailing \ for directories so behavior aligns with TabExpansion2
[System.Management.Automation.CompletionCompleters]::CompleteFilename($completionPrefix) | ForEach-Object {
if ($_.ResultType -eq [System.Management.Automation.CompletionResultType]::ProviderContainer) {
[System.Management.Automation.CompletionResult]::new("$($_.CompletionText)$([System.IO.Path]::DirectorySeparatorChar)", "$($_.CompletionText)$([System.IO.Path]::DirectorySeparatorChar)", $_.ResultType, $_.ToolTip)
} else {
$_
}
}
([System.Management.Automation.CompletionCompleters]::CompleteVariable($completionPrefix));
)
if ($null -ne $completions) {
$result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);"
$mappedCommands = Compress-Completions($completions)
$result += $mappedCommands | ConvertTo-Json -Compress
} else {
$result += ";0;$($completionPrefix.Length);$($completionPrefix.Length);[]"
}
}
# End completions sequence
$result += "`a"
Write-Host -NoNewLine $result
}
function Compress-Completions($completions) {
$completions | ForEach-Object {
if ($_.CompletionText -eq $_.ToolTip) {
,@($_.CompletionText, $_.ResultType)
} else {
,@($_.CompletionText, $_.ResultType, $_.ToolTip)
}
}
}
# Register key handlers if PSReadLine is available
if (Get-Module -Name PSReadLine) {
Set-MappedKeyHandlers
}
|
combined_dataset/train/non-malicious/sample_26_82.ps1
|
sample_26_82.ps1
|
#
# Module manifest for module 'OCI.PSModules.Waa'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Waa.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5e9163aa-454b-4b6c-b240-a7136ba9f82a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Waa Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waa.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWaaWebAppAcceleration',
'Get-OCIWaaWebAppAccelerationPoliciesList',
'Get-OCIWaaWebAppAccelerationPolicy',
'Get-OCIWaaWebAppAccelerationsList', 'Get-OCIWaaWorkRequest',
'Get-OCIWaaWorkRequestErrorsList', 'Get-OCIWaaWorkRequestLogsList',
'Get-OCIWaaWorkRequestsList',
'Invoke-OCIWaaPurgeWebAppAccelerationCache',
'Move-OCIWaaWebAppAccelerationCompartment',
'Move-OCIWaaWebAppAccelerationPolicyCompartment',
'New-OCIWaaWebAppAcceleration',
'New-OCIWaaWebAppAccelerationPolicy',
'Remove-OCIWaaWebAppAcceleration',
'Remove-OCIWaaWebAppAccelerationPolicy',
'Update-OCIWaaWebAppAcceleration',
'Update-OCIWaaWebAppAccelerationPolicy'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waa'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Write-Output_1.ps1
|
Write-Output_1.ps1
|
########################################################################
## Copyright (c) Joel Bennett, 2010
## Free for use under MS-PL, MS-RL, GPL 2, or BSD license. Your choice.
function Write-Output {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true)]
[AllowEmptyCollection()]
[AllowNull()]
[System.Management.Automation.PSObject]
${InputObject}
,
[Parameter()]
[Switch]
[Alias("PreventUnrolling")]
$AsCollection
)
begin
{
$Collection = New-Object System.Collections.Generic.List[PSObject]
}
process
{
if($InputObject) {
if($AsCollection) {
$Collection.AddRange( ([PSObject[]]@($InputObject)) )
} else {
$PSCmdlet.WriteObject( $InputObject, $true )
}
}
}
end
{
if($AsCollection) {
$PSCmdlet.WriteObject( $Collection, $false )
}
}
<#
.SYNOPSIS
Sends the specified objects to the next command in the pipeline. If the command is the last
command in the pipeline, the objects are displayed in the console.
.DESCRIPTION
The Write-Output function sends the specified object down the pipeline to the next command. If the command is the last command in the pipeline, the object is displayed in the console.
Write-Output sends objects down the primary pipeline, also known as the "output stream" or the "success pipeline." To send error objects down the error pipeline, use Write-Error.
This function provides a pair of enhancements to the built-in Write-Output. First, it offers the option of Passthru, which causes collections to be output without unrolling (that is, output as collections to the pipeline), and second, it includes an option to collect input from the pipeline and output it all at once at the end.
.PARAMETER InputObject
Specifies the objects to send down the pipeline. Enter a variable that contains the objects, or type a command or expression that gets the objects.
.PARAMETER AsCollection
Specifies that pipeline input should be collected and output all at once at the end.
This effectively allows you to take streaming input and turn it into a collection, or output an array from your function without unrolling.
Note that this causes the output to be a List[PSObject].
.EXAMPLE
$p = get-process
C:\\PS>write-output $p
Description
-----------
These commands get objects representing the processes running on the computer and display the objects on the console.
.EXAMPLE
$p = get-process | Select-Object -First 10
C:\\PS>write-output $p | ForEach-Object { $_.GetType() }
IsPublic IsSerial Name BaseType
-------- -------- ---- --------
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
True False Process System.ComponentModel.Component
C:\\PS>write-output $p -AsCollection | ForEach-Object { $_.GetType() }
IsPublic IsSerial Name BaseType
-------- -------- ---- --------
True True List`1 System.Array
Description
-----------
These commands demonstrate the difference between using and not using -AsCollection. Without it, each object passes through the ForEach and it's type is output. With -AsCollection, only a single object is output, with a collection type of List`1
.EXAMPLE
Get-Process | Select-Object -First 10 | Write-Output -AsCollection | ForEach-Object { $_.GetType() }
Description
-----------
This command pipes the first ten processes to the ForEach-Object, demonstrating that -AsCollection will force the output to be a collection.
.EXAMPLE
Get-Process | Write-Output -AsCollection | ForEach-Object { $_.GetType() }
Description
-----------
This command collects all of the processes before outputting them to the ForEach-Object as a List[PSObject]
#>
}
|
combined_dataset/train/non-malicious/sample_42_52.ps1
|
sample_42_52.ps1
|
#
# Module manifest for module 'OCI.PSModules.Governancerulescontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Governancerulescontrolplane.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '96ae80bb-9cf9-48b1-b722-28d177d3da7a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Governancerulescontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Governancerulescontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRule',
'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRulesList',
'Get-OCIGovernancerulescontrolplaneGovernanceRule',
'Get-OCIGovernancerulescontrolplaneGovernanceRulesList',
'Get-OCIGovernancerulescontrolplaneInclusionCriteriaList',
'Get-OCIGovernancerulescontrolplaneInclusionCriterion',
'Get-OCIGovernancerulescontrolplaneTenancyAttachment',
'Get-OCIGovernancerulescontrolplaneTenancyAttachmentsList',
'Get-OCIGovernancerulescontrolplaneWorkRequest',
'Get-OCIGovernancerulescontrolplaneWorkRequestErrorsList',
'Get-OCIGovernancerulescontrolplaneWorkRequestLogsList',
'Get-OCIGovernancerulescontrolplaneWorkRequestsList',
'Invoke-OCIGovernancerulescontrolplaneRetryGovernanceRule',
'Invoke-OCIGovernancerulescontrolplaneRetryTenancyAttachment',
'New-OCIGovernancerulescontrolplaneGovernanceRule',
'New-OCIGovernancerulescontrolplaneInclusionCriterion',
'Remove-OCIGovernancerulescontrolplaneGovernanceRule',
'Remove-OCIGovernancerulescontrolplaneInclusionCriterion',
'Stop-OCIGovernancerulescontrolplaneWorkRequest',
'Update-OCIGovernancerulescontrolplaneGovernanceRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Governancerulescontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_46_79.ps1
|
sample_46_79.ps1
|
#
# Module manifest for module 'OCI.PSModules.Healthchecks'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Healthchecks.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ec09c1dc-6260-4794-9b17-b24077d3c55a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Healthchecks Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Healthchecks.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIHealthchecksHttpMonitor',
'Get-OCIHealthchecksHttpMonitorsList',
'Get-OCIHealthchecksHttpProbeResultsList',
'Get-OCIHealthchecksPingMonitor',
'Get-OCIHealthchecksPingMonitorsList',
'Get-OCIHealthchecksPingProbeResultsList',
'Get-OCIHealthchecksVantagePointsList',
'Move-OCIHealthchecksHttpMonitorCompartment',
'Move-OCIHealthchecksPingMonitorCompartment',
'New-OCIHealthchecksHttpMonitor',
'New-OCIHealthchecksOnDemandHttpProbe',
'New-OCIHealthchecksOnDemandPingProbe',
'New-OCIHealthchecksPingMonitor',
'Remove-OCIHealthchecksHttpMonitor',
'Remove-OCIHealthchecksPingMonitor',
'Update-OCIHealthchecksHttpMonitor',
'Update-OCIHealthchecksPingMonitor'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Healthchecks'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_53_6.ps1
|
sample_53_6.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Gets the DNSSEC configuration.
.Description
Gets the DNSSEC configuration.
.Example
Get-AzDnsDnssecConfig -ResourceGroupName dnssecrg -ZoneName contoso.com
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.IDnsIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.Api20230701Preview.IDnssecConfig
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IDnsIdentity>: Identity Parameter
[Id <String>]: Resource identity path
[RecordType <RecordType?>]: The type of DNS record in this record set.
[RelativeRecordSetName <String>]: The name of the record set, relative to the name of the zone.
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[SubscriptionId <String>]: The ID of the target subscription.
[ZoneName <String>]: The name of the DNS zone (without a terminating dot).
.Link
https://learn.microsoft.com/powershell/module/az.dns/get-azdnsdnssecconfig
#>
function Get-AzDnsDnssecConfig {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.Api20230701Preview.IDnssecConfig])]
[CmdletBinding(DefaultParameterSetName='Get', PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='List', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Get')]
[Parameter(ParameterSetName='List')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='List', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[System.String]
# The name of the DNS zone (without a terminating dot).
${ZoneName},
[Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.IDnsIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Dns.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
Get = 'Az.Dns.private\Get-AzDnsDnssecConfig_Get';
GetViaIdentity = 'Az.Dns.private\Get-AzDnsDnssecConfig_GetViaIdentity';
List = 'Az.Dns.private\Get-AzDnsDnssecConfig_List';
}
if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Dns.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Creates or updates the DNSSEC configuration on a DNS zone.
.Description
Creates or updates the DNSSEC configuration on a DNS zone.
.Example
New-AzDnsDnssecConfig -ResourceGroupName dnssecrg -ZoneName contoso.com
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.IDnsIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.Api20230701Preview.IDnssecConfig
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IDnsIdentity>: Identity Parameter
[Id <String>]: Resource identity path
[RecordType <RecordType?>]: The type of DNS record in this record set.
[RelativeRecordSetName <String>]: The name of the record set, relative to the name of the zone.
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[SubscriptionId <String>]: The ID of the target subscription.
[ZoneName <String>]: The name of the DNS zone (without a terminating dot).
.Link
https://learn.microsoft.com/powershell/module/az.dns/new-azdnsdnssecconfig
#>
function New-AzDnsDnssecConfig {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.Api20230701Preview.IDnssecConfig])]
[CmdletBinding(DefaultParameterSetName='Create', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='Create', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Create')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='Create', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[System.String]
# The name of the DNS zone (without a terminating dot).
${ZoneName},
[Parameter(ParameterSetName='CreateViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.IDnsIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Header')]
[System.String]
# The etag of the DNSSEC configuration.
# Omit this value to always overwrite the DNSSEC configuration.
# Specify the last-seen etag value to prevent accidentally overwriting any concurrent changes.
${IfMatch},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Header')]
[System.String]
# Set to '*' to allow this DNSSEC configuration to be created, but to prevent updating existing DNSSEC configuration.
# Other values will be ignored.
${IfNoneMatch},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Dns.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
Create = 'Az.Dns.private\New-AzDnsDnssecConfig_Create';
CreateViaIdentity = 'Az.Dns.private\New-AzDnsDnssecConfig_CreateViaIdentity';
}
if (('Create') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Dns.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Deletes the DNSSEC configuration on a DNS zone.
This operation cannot be undone.
.Description
Deletes the DNSSEC configuration on a DNS zone.
This operation cannot be undone.
.Example
Remove-AzDnsDnssecConfig -ResourceGroupName dnssecrg -ZoneName contoso.com
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.IDnsIdentity
.Outputs
System.Boolean
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IDnsIdentity>: Identity Parameter
[Id <String>]: Resource identity path
[RecordType <RecordType?>]: The type of DNS record in this record set.
[RelativeRecordSetName <String>]: The name of the record set, relative to the name of the zone.
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[SubscriptionId <String>]: The ID of the target subscription.
[ZoneName <String>]: The name of the DNS zone (without a terminating dot).
.Link
https://learn.microsoft.com/powershell/module/az.dns/remove-azdnsdnssecconfig
#>
function Remove-AzDnsDnssecConfig {
[OutputType([System.Boolean])]
[CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='Delete', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Delete')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='Delete', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[System.String]
# The name of the DNS zone (without a terminating dot).
${ZoneName},
[Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Models.IDnsIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Header')]
[System.String]
# The etag of this DNSSEC configuration.
# Omit this value to always delete the DNSSEC configuration.
# Specify the last-seen etag value to prevent accidentally deleting any concurrent changes.
${IfMatch},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Returns true when the command succeeds
${PassThru},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Dns.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
Delete = 'Az.Dns.private\Remove-AzDnsDnssecConfig_Delete';
DeleteViaIdentity = 'Az.Dns.private\Remove-AzDnsDnssecConfig_DeleteViaIdentity';
}
if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Dns.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Dns.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDGZf8pmx4kuH4r
# LQ+EJVb2FVeJYgimbRbkFLhd6Szbd6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIcqXunZVx8egraeOouDx+ze
# EawuZP7743ygetLQapqoMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHPyRN7n3ZVLbIKrDeJ1zB8rrqTrv2mPwu3SHZgKZGMznCMHC0PFJS7v1
# Vh0X2lGj7S9rxS0DY5JbQGj/rXRbf6yWIwfy0VWAzz7iV6NEF7Wuv1WBCi5bTVNs
# n9xyaAedYmSaIHPUbXo1v2bjR7Tvw+Wb9K4h69vasGlsLQ88VBoTKwXFstNUgOwF
# VOEG5Nqf22tOXufy21q+GLqLuvvVX7IlKybt0p6HhHSFs3ZlZN4FvHlue4Yxj9Ar
# 0UvDZJtmgThKjkpPErYsnmeBqBvJ7ewm4e6DO4d9Rwt1TgXB/qC/LAUwIBTfNaxO
# 5W3Xdx+bnh8W1jo/xk1y+lCt4Tets6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDs9AvXJk7uKKW8JT9zsCB+SRtnz5GRtdO95Yq1t8QyRgIGZiAsyETD
# GBMyMDI0MDQyMzEzMTYxMy4zODhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA
# 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031
# XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP
# CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa
# SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQghixlFpVf3VNqhh+VRErrnubcUvilhb/psYt3DsON/rYwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z
# MA0GCSqGSIb3DQEBCwUABIICAE6LTlK7HoBodaaK99F1NRsZ96Al4U2zplNkn8xt
# D92xvwspvSgC6Tju9aDkBD50gphaTucqMTdHuFXGmjMb9FgAhprFmZ3aJPH0elx8
# AoCMDFzQ8Hg/BJE6hRfCvpVywaXMXPjn/HXQHwX4v1/v8dbhc7009ulemOZxBrBk
# TX9xMWo8QlKVVJXP+PX6QKHkswnsvNVewgfoEpfAle+2zUZyhhuAJ+xPqxrMdoge
# O4V+thpon5D1QId3gPhLnxwoGUnsLAL80vOmrpKuR4B6GTnT6pO3WVPvpsfGwHNJ
# aF82hKU7PgFRLfN6zsmhV6JtbSbIhnOtEOVrAZDLwHP+SlmnFV2OSEuG9kpyh6dj
# IE05jjy2jZmw+9iFeI1AyhIraY4YcNlpY2xPF4ryELK+RqzsiSZCE7KGAQAZ9EMd
# HQmigwRijF4qhLw9OGVsaTeIysK4D2m9X8eDk/VH9L2a5ESA2+BamDqKTMpnzUgT
# sMfg8OnjREZ58lHmxBQZr9Jxa/17dSQf2fWWoI8IxSupgC8Hag1jm7UGrzcbhoJY
# LWFbRcgCiN0+295eCbwGyHZKMRNBJng2m5njuJHWUhGQ0iZ0PmLjyJyFDlOTMoPJ
# BG6c3kzaJ0VOjxJotfrQAtJmSfNHx9gmBX4BVrgAzMXGlf1iivrNx4gUolFALHiT
# Z0Be
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_26_8.ps1
|
sample_26_8.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dataflow'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataflow.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '60441277-1663-4d77-af11-39ab99c7ac41'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataflow Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList',
'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList',
'Get-OCIDataflowPrivateEndpoint',
'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun',
'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList',
'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint',
'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement',
'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest',
'Get-OCIDataflowWorkRequestErrorsList',
'Get-OCIDataflowWorkRequestLogsList',
'Get-OCIDataflowWorkRequestsList',
'Move-OCIDataflowApplicationCompartment',
'Move-OCIDataflowPoolCompartment',
'Move-OCIDataflowPrivateEndpointCompartment',
'Move-OCIDataflowRunCompartment',
'Move-OCIDataflowSqlEndpointCompartment',
'New-OCIDataflowApplication', 'New-OCIDataflowPool',
'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun',
'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement',
'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool',
'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun',
'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement',
'Start-OCIDataflowPool', 'Stop-OCIDataflowPool',
'Update-OCIDataflowApplication', 'Update-OCIDataflowPool',
'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun',
'Update-OCIDataflowSqlEndpoint'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-Credential++.ps1
|
Get-Credential++.ps1
|
## Get-Credential
## An improvement over the default cmdlet which has no options ...
###################################################################################################
## History
## v 2.0 Rewrite for v2 to replace the default Get-Credential
## v 1.2 Refactor ShellIds key out to a variable, and wrap lines a bit
## v 1.1 Add -Console switch and set registry values accordingly (ouch)
## v 1.0 Add Title, Message, Domain, and UserName options to the Get-Credential cmdlet
###################################################################################################
function Get-Credential {
## .Synopsis
## Gets a credential object based on a user name and password.
## .Description
## The Get-Credential function creates a credential object for a specified username and password, with an optional domain. You can use the credential object in security operations.
##
## The function accepts more parameters to customize the security prompt than the default Get-Credential cmdlet (including forcing the call through the console if you're in the native PowerShell.exe CMD console), but otherwise functions identically.
##
## .Parameter Credential
## For compatability reasons only, we accept a credential (and pass it right back out) the way the built-in Get-Credential does.
## .Parameter UserName
## A default user name for the credential prompt
## .Parameter Title
## Allows you to override the default window title of the credential dialog/prompt
##
## You should use this to allow users to differentiate one credential prompt from another. In particular, if you're prompting for, say, Twitter credentials, you should put "Twitter" in the title somewhere. If you're prompting for domain credentials. Being specific not only helps users differentiate and know what credentials to provide, but also allows tools like KeePass to automatically determine it.
## .Parameter Message
## Allows you to override the text displayed inside the credential dialog/prompt.
##
## You can use this for things like presenting an explanation of what you need the credentials for.
## .Parameter Domain
## Specifies the default domain to use if the user doesn't provide one (by default, this is null)
## .Parameter GenericCredentials
## The Get-Credential cmdlet forces you to always return DOMAIN credentials (so even if the user provides just a plain user name, it prepends "\\" to the user name). This switch allows you to override that behavior and allow generic credentials without any domain name or the leading "\\".
## .Parameter Inline
## Forces the credential prompt to occur inline in the console/host using Read-Host -AsSecureString (not implemented properly in PowerShell ISE)
##
[CmdletBinding(DefaultParameterSetName="Better")]
PARAM(
[Parameter(Position=1,Mandatory=$false)]
[Alias("Credential")]
[PSObject]$UserName=$null,
[Parameter(Position=2,Mandatory=$false)]
[string]$Title=$null,
[Parameter(Position=3,Mandatory=$false)]
[string]$Message=$null,
[Parameter(Position=4,Mandatory=$false)]
[string]$Domain=$null,
[Parameter(Mandatory=$false)]
[switch]$GenericCredentials,
[Parameter(Mandatory=$false)]
[switch]$Console
)
PROCESS {
if( $UserName -is [System.Management.Automation.PSCredential]) {
return $UserName
} else {
$UserName = $UserName.ToString()
}
if($Console) {
if($Title) { Write-Host $Title }
if($Message) { Write-Host $Message }
if($Domain) {
if($UserName -and $UserName -notmatch "[@\\\\]") {
$UserName = "${Domain}\\${UserName}"
}
}
if(!$UserName) {
$UserName = Read-Host "User"
if(($Domain -OR !$GenericCredentials) -and $UserName -notmatch "[@\\\\]") {
$UserName = "${Domain}\\${UserName}"
}
}
return New-Object System.Management.Automation.PSCredential $UserName,$(Read-Host "Password for user $UserName" -AsSecureString)
}
if($GenericCredentials) { $Credential = "Generic" } else { $Credential = "Domain" }
## Now call the Host.UI method ... if they don't have one, we'll die, yay.
## BugBug? PowerShell.exe disregards the last parameter
$Host.UI.PromptForCredential($Title, $Message, $UserName, $Domain, $Credential,"Default")
}
}
|
combined_dataset/train/non-malicious/sample_11_32.ps1
|
sample_11_32.ps1
|
ConvertFrom-StringData @'
id_ex_exbpacmdact=Exchange Support Tool - ExBPA
id_ex_exbpacmdstat=Running Exchange Best Practices Analyzer (ExBPA), please wait...
id_ex_exbpacmdfiledescription=ExBPA Health Check
id_ex_exbpacmdreportsection=Exchange Toolbox
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVmUIaS3EhrrD1
# r+UIU1gu/s+U4Vj5YiUZ92+59UkLqaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPuj
# jGmy1nPpwZFKnf0iPayYaPy8suCedLpN/lU86ItVMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAmPnKVmAwk6KNQ8grRoA7/DRQw1ETg33ElZId
# wAV8yRu3vQcqwwqkiGD0xbf3LUR9KBjr25gxkOYOMaHeZJ5OsjM12ffX6qpWxjXy
# QBuFCfZ6v6XqrgYekyyjaF9TXfEXAL3ySAmjflorrmyb/bRj6+D3MjcZ3ocXrbtO
# IJwZ24E7Zg73t5qMGJg1KGMIOyOZKE9Zoj7zSp7uU+IAw+SrX897XTDSZMre4ZTS
# FIfX7XS0cSnOJ4mLxI09j4mkVhTK0r5X93NmqiGgEN8P1XiSTwUMz3cP4J9aVoDF
# aWTxGv1zsVeefX6qd6bhnWfQHwmC28LLR672xO+7+ZurCUN+BqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDzqtXUyQ2MQ0EhXyavSwG1DjAt3JpI1ijd
# E2qc5NxBdgIGZutgsUnmGBMyMDI0MTAyODExNDA0MS43NDNaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdG
# hcDLPznlAAEAAAH0MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU5MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# pwhOE6bQgC9qq4jJGX2A1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEV
# zZ2y2ygGgNZ3/xdZQN7f9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwm
# XeCj81EzJEIZquVdV8STlQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IE
# xqKYojGreCopnIKxOvkr5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnu
# o+kDEyZwpkphsR8Zvdi+s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tu
# e+LcuOcHAPgbwZvQLksKaK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEW
# OEvibig7wsrTa6ZbzuMsyTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIp
# MGfA3BT850nqamzSiD5L5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T2
# 6FjR9/I85i5ExxmhHpxM2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+
# Fy+ZywHAp9c9oWTrtjfIKqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcX
# Wy16ANy73v0ipCxAwUEC9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBQrdGWhCtEsPid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEA3cHSDxJKUDsgacIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3
# gOeCt/ObDO45vfpnYG5OS5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQi
# Jh9upsE4TVZeKYXmbyx7WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA1
# 3vS3euqUl6zwe7GAhjfjNXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDC
# egq8adlGH85I1EWKmfERb1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8
# jcYVDH4A2C/MbLBIwikjwiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh
# 95UVOrQL2rbWHrHDSE3dgdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5
# A4uITgyJcVdWVaN0qjs0eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIld
# yfzZqln6FsnLQ3bl+ZvVJWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6
# XfYvrZQN4XKbnvSqBNAwIPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvF
# HlSG6uMIWjwH0GQIIwrC2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17X
# ek4iG9R9c/7+AI6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0
# MTAyOTExMTExMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEA
# AgIRQTAHAgEAAgITcjAKAgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQAhvpi0fcwW36VjkxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe
# 97LNopMBBaWBVq2RlfPasIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvs
# FxcDLB5CurWs+Z+iXqcdrGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB
# 9T76pHsFqwSZHJ4+hXZB9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S
# 6Qpt3I6sMkaFL+Dn9fLJwn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn
# +yis2mNx8vI42scFI8SUP7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgcRumEfWZSdIP/cmBJ5OlNA1kqERrybUyY8jcr9PceO0wgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60
# RBjWazCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9BdGhcDLPznlAAEAAAH0MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaN
# J5IJMA0GCSqGSIb3DQEBCwUABIICAGo/aF3XiyKO1ZHtYN9cmgeXYQ1daSfDTitj
# I8OgCx6vk/fsc05BachfzohN32dt6jrYNf/xQ429bl9Scz2aesZQMW9cobcSCKZO
# k7QledYqtVeK6NjPExPxFBRPEcm0xJeMMGXJStLNude4aQnYHMoOyKZviurovfrf
# yQ/8BPVnt0PzeWd8hC/gKgLdjqQlLoyUe053SgUdpiOtdBx6HAoak1r9k35P4JzC
# os2gY3STfJXY/n70K8yxGitNclwWoONIjoOsh7TosOaVS0qSVGK0Pb0F3D6Fr1b8
# +s6sNbOvEUc/te9zU6afok4S50IaggHBfBD1avG8pQHgxOohq43ClezE1Us9aLs3
# 1bQ0+FSiEy+9V2w3QX9aT7ofkcgaGUBm0kxzGAKaIYZLN5fc27HDy2MTBZHL9012
# mTGOuYAPc50kSUcoUg8ePnF7kTi5YFr55M6b2stCR7L6uSMV4odj6Z+0oIJLbk+r
# ja9AoB32pOp6zYTafQx6CmJSicdooDhwVsidd1UAnk5uOuiamZ1Wm6pMKfW4wX2D
# w2f7BkPZydDwZcq2nJofpsGCtH+RapklUzI6JcbngJeYof1J7Uk537pXhRmpH9Yv
# DMK3fuIW+oZ5gkZXzvmFgWLM2WZGWCaEB+MZpCqaVZuqyocPgXMVMahEwL/t3J6S
# npjcywp9
# SIG # End signature block
|
combined_dataset/train/non-malicious/2536.ps1
|
2536.ps1
|
$vComputerName = "PSQLDLS34"
$vInstanceName = "MSSQLSERVER"
Write-Host "IP Address(es) that the SQL instance " $vComputerName "\" $vInstanceName " is listening on are listed below: "
$vListenAll = 0
$vTCPProps = get-WMIObject ServerNetworkProtocolProperty -ComputerName $vComputerName -NameSpace "root\Microsoft\SqlServer\ComputerManagement10" | Where-Object {$_.PropertyName -eq "ListenOnAllIPs" -and $_.InstanceName -eq $vInstanceName}
foreach ($vTCPProp in $vTCPProps)
{
$vListenAll = $vTCPProp.PropertyNumVal
}
if($vListenAll -eq 1)
{
Write-Host "Is instance configured to listen on All IPs (Listen All property): TRUE"
$vIPconfig = Get-WmiObject Win32_NetworkAdapterConfiguration -ComputerName $vComputerName
foreach ($vIP in $vIPconfig)
{
if ($vIP.IPaddress)
{
foreach ($vAddr in $vIP.Ipaddress)
{
$vAddr
}
}
}
}
else
{
$vIPProps = get-WMIObject ServerNetworkProtocolProperty -ComputerName $vComputerName -NameSpace "root\Microsoft\SqlServer\ComputerManagement10" | Where-Object {$_.InstanceName -eq $vInstanceName -and $_.ProtocolName -eq "Tcp"} | Sort-Object IPAddressName,PropertyName
$vActive = 0
$vEnabled = 0
Write-Host "Is instance configured to listen on All IPs (Listen All property): FALSE"
foreach ($vIPProp in $vIPProps)
{
if ($vIPProp.Name -ne "IPAll" -and ($vIPProp.PropertyName -eq "Active"))
{
$vActive = $vIPProp.PropertyNumVal
}
if ($vIPProp.Name -ne "IPAll" -and ($vIPProp.PropertyName -eq "Enabled"))
{
$vEnabled = $vIPProp.PropertyNumVal
}
if ($vIPProp.Name -ne "IPAll" -and $vIPProp.PropertyName -eq "IPAddress" -and $vEnabled -eq 1 -and $vActive -eq 1)
{
$vTCPProp.PropertyStrVal
}
}
}
|
combined_dataset/train/non-malicious/3060.ps1
|
3060.ps1
|
Set-StrictMode -Version Latest
InModuleScope Pester {
Describe "Should -FileContentMatchExactly" {
Context "when testing file contents" {
Setup -File "test.txt" "this is line 1$([System.Environment]::NewLine)Pester is awesome$([System.Environment]::NewLine)And this is Unicode: ☺"
It "returns true if the file contains the specified content exactly" {
"$TestDrive\test.txt" | Should FileContentMatchExactly Pester
"$TestDrive\test.txt" | Should -FileContentMatchExactly Pester
}
It "returns false if the file does not contain the specified content exactly" {
"$TestDrive\test.txt" | Should Not FileContentMatchExactly pESTER
"$TestDrive\test.txt" | Should -Not -FileContentMatchExactly pESTER
}
It "returns true if the file contains the specified Unicode content exactyle" {
"$TestDrive\test.txt" | Should FileContentMatchExactly "☺"
"$TestDrive\test.txt" | Should -FileContentMatchExactly "☺"
}
}
It 'returns correct assertion message when' {
$path = 'TestDrive:\file.txt'
'abc' | Set-Content -Path $path
$err = { $path | Should -FileContentMatchExactly 'g' -Because 'reason' } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal "Expected 'g' to be case sensitively found in file 'TestDrive:\file.txt', because reason, but it was not found."
}
}
Describe "Should -Not -FileContentMatchExactly" {
It 'returns correct assertion message' {
$path = 'TestDrive:\file.txt'
'abc' | Set-Content -Path $path
$err = { $path | Should -Not -FileContentMatchExactly 'a' -Because 'reason' } | Verify-AssertionFailed
$err.Exception.Message | Verify-Equal "Expected 'a' to not be case sensitively found in file 'TestDrive:\file.txt', because reason, but it was found."
}
}
}
|
combined_dataset/train/non-malicious/sample_16_7.ps1
|
sample_16_7.ps1
|
ConvertFrom-StringData @'
IPAddressDisplayNameFormat=IP-adress: {0}
NetworkNameDisplayNameFormat=Namn: {0}
NetworkNameOfflineDisplayNameFormat=IP-adress: Adress i {0}
CreateClusterProgressValidationStart=Verifierar servrars lämplighet för ett redundanskluster.
CreateClusterProgressValidationEnd=Verifieringen av servrars lämplighet för ett redundanskluster är klar.
CreateClusterProgressCreationStartFormat=Skapar redundanskluster {0}.
CreateClusterProgressCreationEndFormat=Redundansklustret {0} har skapats.
AddNodesProgressValidationStart=Verifierar nya servrars lämplighet för ett redundanskluster.
AddNodesProgressValidationEnd=Verifieringen av nya servrars lämplighet för ett redundanskluster är klar.
AddNodesProgressAdditionStartFormat=Lägger till noder i redundanskluster {0}.
AddNodesProgressAdditionEndFormat=Noderna har lagts till i redundanskluster {0}.
'@
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC+NH0c1kzuKoPX
# hM3z4DzOykGUj4CbaZGVVt5Kuuif6qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJaXHXZQK4rwuMlMkZfTuNEv
# pQ29xCncPb9xErB/wlJiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdrrzL+VryAzewe8ymRB0e/8oiBHs9hm0b5LxAr9DFWqZ8QdaTRPvkip4
# 7HnS8bF1BZk0Cr3+I8mvyZtFtmufEFJSGu3wNN8+oJ0jNJes78COTernvVNR//9z
# 2oiheNjD3s0eSq17une17j3SNgZaXVNfsTipMm0+7NcBmI3Fg+n9DRz5+qubSphe
# SV0g2ETLxEcfsQkef/0OjqQIBGEpYVWwW+DuYJeVduuMNKesQOj4zFz+L5sjbKT+
# cWl4uaOsnfG/KN4aDzb5n3oV6lz1yUz49C18qdjo+GpPatMflQTebUuhhmrZOGdL
# sgFycv97I4qBo0J6agPbW9TRx/UwZqGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCRJTYgcYuFU5kGlpZj2BQ0A+E1V8pVSpQso855YLyg1wIGZc5J03OP
# GBIyMDI0MDIyMDA3MjE0Ni43OVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# Ee0wggcgMIIFCKADAgECAhMzAAAB7gXTAjCymp2nAAEAAAHuMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU0
# NFoXDTI1MDMwNTE4NDU0NFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAL7xvKXXooSJrzEpLi9UvtEQ45HsvNgItcS1aB6rI5WW
# vO4TP4CgJri0EYRKNsdNcQJ4w7A/1M94popqV9NTldIaOkmGkbHn1/EwmhNhY/PM
# PQ7ZECXIGY4EGaIsNdENAkvVG24CO8KIu6VVB6I8jxXv4eFNHf3VNsLVt5LHBd90
# ompjWieMNrCoMkCa3CwD+CapeAfAX19lZzApK5eJkFNtTl9ybduGGVE3Dl3Tgt3X
# llbNWX9UOn+JF6sajYiz/RbCf9rd4Y50eu9/Aht+TqVWrBs1ATXU552fa69GMpYT
# B6tcvvQ64Nny8vPGvLTIR29DyTL5V+ryZ8RdL3Ttjus38dhfpwKwLayjJcbc7AK0
# sDujT/6Qolm46sPkdStLPeR+qAOWZbLrvPxlk+OSIMLV1hbWM3vu3mJKXlanUcoG
# nslTxGJEj69jaLVxvlfZESTDdas1b+Nuh9cSz23huB37JTyyAqf0y1WdDrmzpAbv
# Yz/JpRkbYcwjfW2b2aigfb288E72MMw4i7QvDNROQhZ+WB3+8RZ9M1w9YRCPt+xa
# 5KhW4ne4GrA2ZFKmZAPNJ8xojO7KzSm9XWMVaq2rDAJxpj9Zexv9rGTEH/MJN0dI
# FQnxObeLg8z2ySK6ddj5xKofnyNaSkdtssDc5+yzt74lsyMqZN1yOZKRvmg3ypTX
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUEIjNPxrZ3CCevfvF37a/X9x2pggwHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAHdnIC9rYQo5ZJWkGdiTNfx/wZmNo6znvsX2
# jXgCeH2UrLq1LfjBeg9cTJCnW/WIjusnNlUbuulTOdrLaf1yx+fenrLuRiQeq1K6
# AIaZOKIGTCEV9IHIo8jTwySWC8m8pNlvrvfIZ+kXA+NDBl4joQ+P84C2liRPshRe
# oySLUJEwkqB5jjBREJxwi6N1ZGShW/gner/zsoTSo9CYBH1+ow3GMjdkKVXEDjCI
# ze01WVFsX1KCk6eNWjc/8jmnwl3jWE1JULH/yPeoztotIq0PM4RQ2z5m2OHOeZmB
# R3v8BYcOHAEd0vntMj2HueJmR85k5edxiwrEbiCvJOyFTobqwBilup0wT/7+DW56
# vtUYgdS0urdbQCebyUB9L0+q2GyRm3ngkXbwId2wWr/tdUG0WXEv8qBxDKUk2eJr
# 5qeLFQbrTJQO3cUwZIkjfjEb00ezPcGmpJa54a0mFDlk3QryO7S81WAX4O/TmyKs
# +DR+1Ip/0VUQKn3ejyiAXjyOHwJP8HfaXPUPpOu6TgTNzDsTU6G04x/sMeA8xZ/p
# Y51id/4dpInHtlNcImxbmg6QzSwuK3EGlKkZyPZiOc3OcKmwQ9lq3SH7p3u6VFpZ
# HlEcBTIUVD2NFrspZo0Z0QtOz6cdKViNh5CkrlBJeOKB0qUtA8GVf73M6gYAmGhl
# +umOridAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw
# ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIij
# ptU29+UXFtRYINDdhgrLo76ToIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpfrcBMCIYDzIwMjQwMjIwMDUyODMz
# WhgPMjAyNDAyMjEwNTI4MzNaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl+twEC
# AQAwCgIBAAICKf8CAf8wBwIBAAICFJ4wCgIFAOmACIECAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAL/uvtj33P+6x1tXd2r/oOuw2XbiSFB1U3REjr9nhFFyS
# f2tLuU6uFtUPyUdYoowUTivQ/MhsDn7RqUIkp6KcDMYB1wRSn/VXX3+j6QLvGO8k
# OC0eHg+W+8BYQkbeBRlie1BD1TpqnlBFEpVDP364T7ozm08nHdHyY8Ri0hDUgOSE
# s/6Q36cGb3UevKoKox0mqrGQnzBkf73rWPQlVSfrZKpFdWH58WIm4//XUd1ViW3T
# lGh3h0J8Lz3iSSgmbM7U70AcyHmD3WhJEUIXtiqH0751Fot7HOfB95Xxlx33WzKL
# rUzg59tkgtPi22maq7kFNziAtgdEEOoC0+k4MWlAYTGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7gXTAjCymp2nAAEAAAHu
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIAKUm+Oapz52aPYW3MRAAq73xJxh3e0IK5j7+l5RfQW7
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgT1B3FJWF+r5V1/4M+z7kQiQH
# P2gJL85B+UeRVGF+MCEwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAiBCAMFcciD6kbSVnzfl1rBoh7o6AS
# ttwz83+qQc2mIg7eNzANBgkqhkiG9w0BAQsFAASCAgCK8GuNu3kDDtpYzkmIc3oA
# 6rN92COZ3Q9DgAX/I8zOlF/tCYuqDg7zehOd7XqJ6oJtNMDq/pgwgYztGH7mK/Vc
# x8gMLZVUmR/tL9zUkYJ08py6+PZ/tJR529iycY10KMmg3jzr8nDb0K5Vnnz9VdqU
# +pQsO6EyXNMkofZ2bkpc03jxSXbNJHt/8bWVHBJsCgYrtuA9bRzFBiu+UIbXPigP
# 08s9fg00BhWBWgDVaAJ36nTPqqrxfV1HHMw87/3OENd+yaSPCheFt5Uf294PryWO
# uxkWxEznybzrQT22Kh5vz1WDJGqclzlMFZAY/jerqVXOYEmw/ADxXFQOESmHURBb
# lIWqZLsuKVktsHpxsb+oCkosXfLzzzk78Xw0I8MLJWDz3kJ5DK8/vWuG2RHCz01n
# l8E9PD/1Zcsj5zuhqqHTMEQBsNZ6gqoQYOnzpkNNH2pQZn/QxiTDCfVRo5w8a34q
# 8fF7mlTdBFgiqbqXApGzfwqhpfUf1QRtoyZZHafpVesP+V5rkocF+U0/Ofs1k046
# mLshMuzAwOwSap1t0PoV+ZWuTG8z/bH47w4yW5d4umwQ1xK+/H7e9yZ2QFobZKi/
# 8gz6/G4LUJAmB+VV1bADqs5CsLwySBgJPDsAzSsTI2oYi3IiAQjxlf/83V6vugQN
# Gca8BoMs+CG8+rfrI6YxkQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/SetDefaultPrinter.ps1
|
SetDefaultPrinter.ps1
|
<#
.SYNOPSIS
Sets the Default Printer for any user on any machine in active directory.
.DESCRIPTION
Search AD for Computername; Select UserAccount and Printer and make that printer the default
printer for that user on that computer.
.PARAMETER Hostnme
This parameter is required and should reflect the computer name (or names) you wish to inventory.
This is basically a search criteria because the first thing the script will do is search Active
Directory for computer names matching this input.
.EXAMPLE
.NOTES
Author: Brad Blaylock
Version: 3.0
Date: October 3, 2011
Contact: brad.blaylock@gmail.com
Details: This Script accepts an AD Query (Computername) in the form of an entire computer name
or partial computername as in sbcomp* or *2471wk1 and will find any listed computers
that match the criteria in AD. This list will be presented to the user. The user will
select the computer they are needing, and click [LOAD]. Load will find all user accounts
that have ever had a profile on that computer; Load will also list all printers installed
on that computer. The user will then select the user account and printer and click
[Set Default]. SetDefault will make the selected printer default for the selected user
on the selected computer.
If the selected user is not logged into the selected computer at the time, SetDefault
will Load the selected user's NTUSER.DAT registry Hive and make the selected changes offline.
Issues: None Discovered as of Yet.
}
#>
#~~~~~~~~~~~CUSTOM FUNCTIONS~~~~~~~~~~~~#
function Test-Alive($comp) {
$ping = new-object System.Net.NetworkInformation.Ping
$stat=$ping.Send("$comp")
$reply = $stat.status
trap {
$False
continue;
}
if($reply -eq "Success") {$True}
}
function Ping-Port([string]$server, [int]$port) {
$tcpClient = New-Object System.Net.Sockets.TcpClient
trap {
$False
continue;
}
$tcpClient.Connect($server,$port)
if ($tcpClient.Connected) {$True}
}
Function ADSearch {
$Input = $Args[0]
$Search = New-Object DirectoryServices.DirectorySearcher([ADSI]“”)
$Search.filter = “(&(objectClass=Computer)(Name=$Input))”
$Results = $Search.Findall()
foreach ($i in $Results)
{
$Item = $i.properties
$lbxServers.Items.Add("$($Item.cn)")
}
}
function LoadUsers {
$hku = 2147483651
$hklm = 2147483650
$UserPath = "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList"
$UserWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv"
$Accounts = $UserWMI.EnumKey($hklm,$UserPath)
foreach ($Account in $Accounts.snames) {
$User = $UserWMI.GetStringValue($hklm,"$UserPath\\$Account","ProfileImagePath")
$UserName = ($User.svalue).split("\\")[2]
$cbxUserAccount.Items.Add($Username)
}
$currentuser = (gwmi win32_ComputerSystem -computername $Computer | select UserName).UserName
$tbxCurrentUser.Text = $currentuser
}
Function LoadPrinters {
$hklm = 2147483650
$PrinterPath = "Software\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers"
$PrinterWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv"
$Printers = $PrinterWMI.EnumKey($hklm,$PrinterPath)
foreach ($Printer in $Printers.snames) {
$Print = $PrinterWMI.GetStringValue($hklm,"$PrinterPath\\$Printer","Name")
$PrinterName = $Print.svalue
$cbxPrinter.Items.Add($PrinterName)
}
}
Function SetWithLocalRegHive {
#<#
#Test OS Version (2000, XP or Vista\\7\\8)
$ostest = (gwmi win32_operatingsystem -computername $Computer | select Version | %{$_ -replace "@{Version=", ""} | %{$_ -replace "}", ""})
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0)
Switch -wildcard ($ostest) {
"5.0*" {$tbxStatus.Text = "Windows 2000"; $profileroot = "Documents and Settings"}
"5.1*" {$tbxStatus.Text = "Windows XP"; $profileroot = "Documents and Settings"}
"6.0*" {$tbxStatus.Text = "Windows Vista"; $profileroot = "Users" }
"6.1*" {$tbxStatus.Text = "Windows 7"; $profileroot = "Users"}
}
Reg Load HKLM\\TemporaryHive \\\\$Computer\\C$\\$profileroot\\$UserName\\NTUSER.DAT
$LocalDefPrinter = (New-Object -ComObject Wscript.shell).RegRead("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Device")
$LocalDefPrinterDetails = (New-Object -ComObject Wscript.Shell).RegRead("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices\\$PrinterName")
$LocalDefaultPrinter = ($LocalDefPrinter).split(",")[0]
$Localspool = ($LocalDefPrinterDetails).split(",")[0]
$LocalPort = ($LocalDefPrinterDetails).split(",")[1]
$LocalNewDefPrinter = $PrinterName + "," + $Localspool + "," + $LocalPort
(New-Object -comobject Wscript.Shell).regWrite("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Device", "$LocalNewDefPrinter", "REG_SZ")
Reg Unload HKLM\\TemporaryHive
$tbxStatus.Text = "Default Printer Changed!"
}
Function SetDefaultPrinter {
Get-service -ComputerName $Computer -Include 'RemoteRegistry' | Start-Service
$domain = $env:USERDOMAIN
$hklm = 2147483650
$hku = 2147483651
$ntAccount = new-object System.Security.Principal.NTAccount($domain, $UserName)
$sid = $ntAccount.Translate([System.Security.Principal.SecurityIdentifier])
$ActionPath = "$sid\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows"
$DevicesPath = "$sid\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices"
$ActionWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv"
$DefPrinter = $ActionWMI.GetStringValue($hku,"$ActionPath","Device")
$DefPrinterDetails = $ActionWMI.GetStringValue($hku,"$DevicesPath","$PrinterName")
$testRegKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($hku,$Computer)
$testReg = $testRegKey.OpenSubKey("$sid")
If (!$testReg) {
SetWithLocalRegHive
}
Else {
$DefaultPrinter = ($DefPrinter.svalue).split(",")[0]
$spool = ($DefPrinterDetails.svalue).split(",")[0]
$Port = ($DefPrinterDetails.svalue).split(",")[1]
$NewDefPrinter = $PrinterName + "," + $spool + "," + $Port
$ActionWMI.SetStringValue($HKU,"$ActionPath","Device","$NewDefPrinter") #SET THE DEFAULT PRINTER#
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0)
$tbxStatus.Text = "Default Printer Changed!"
}
$cbxUserAccount.ResetText()
$cbxPrinter.ResetText()
}
#Generated Form Function
function GenerateForm {
########################################################################
# Code Generated By: SAPIEN Technologies PrimalForms (Community Edition) v1.0.8.0
# Generated On: 2/28/2011 11:35 AM
# Generated By: bwblaylock
########################################################################
#region Import the Assemblies
[reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Windows.Forms.VisualStyles") | Out-Null
[System.Windows.Forms.Application]::EnableVisualStyles()
#endregion
#region Generated Form Objects
$FrmMain = New-Object System.Windows.Forms.Form
$pgbProgress = New-Object System.Windows.Forms.ProgressBar
$lblPrinter = New-Object System.Windows.Forms.Label
$lblUserAccount = New-Object System.Windows.Forms.Label
$lblSearch = New-Object System.Windows.Forms.Label
$btnSearch = New-Object System.Windows.Forms.Button
$tbxSearch = New-Object System.Windows.Forms.TextBox
$btnClose = New-Object System.Windows.Forms.Button
$btnLoad = New-Object System.Windows.Forms.Button
$tbxServer = New-Object System.Windows.Forms.TextBox
$tbxStatus = New-Object System.Windows.Forms.TextBox
$tbxCurrentUser = New-Object System.Windows.Forms.TextBox
$lbxServers = New-Object System.Windows.Forms.ListBox
$btnSetDefault = New-Object System.Windows.Forms.Button
$cbxPrinter = New-Object System.Windows.Forms.ComboBox
$cbxUserAccount = New-Object System.Windows.Forms.ComboBox
$InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState
#endregion Generated Form Objects
#----------------------------------------------
#Generated Event Script Blocks
#----------------------------------------------
#Provide Custom Code for events specified in PrimalForms.
$btnClose_OnClick=
{
$FrmMain.Close()
}
$lbxServers.add_SelectedIndexChanged({
$tbxStatus.Text = $Null
$tbxStatus.Refresh()
$tbxServer.Text = $lbxServers.SelectedItem
$tbxServer.Refresh()
$tbxCurrentUser.Text = $null
$tbxCurrentUser.Refresh()
$cbxPrinter.Items.clear()
$cbxPrinter.Text = $null
$cbxPrinter.Refresh()
$cbxUserAccount.Items.clear()
$cbxUserAccount.Text = $null
$cbxUserAccount.Refresh()
})
$btnLoad_OnClick=
{
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,255,0)
$tbxStatus.Text = "Loading..."
$tbxStatus.Refresh()
$Computer = $tbxServer.Text
If (Test-Alive $Computer) {
if ( (ping-port $Computer 135) -and (ping-port $Computer 445) ) {
LoadUsers $Computer
LoadPrinters $Computer
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0)
$tbxStatus.Text = "Ready..."
}
Else {
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64)
$tbxStatus.Text = "RPC Server Not Available"
}
}
Else {
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64)
$tbxStatus.Text = "Server Offline"
}
$pgbProgress.Visible = $False
}
$btnSetDefault_OnClick=
{
$Script:Computer = $tbxServer.Text
$Script:UserName = $cbxUserAccount.SelectedItem
$Script:PrinterName = $cbxPrinter.SelectedItem
SetDefaultPrinter
}
$btnSearch_OnClick=
{
$lbxServers.Items.Clear()
$Criteria = $tbxSearch.Text
ADSearch $Criteria
}
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$FrmMain.WindowState = $InitialFormWindowState
}
#----------------------------------------------
#region Generated Form Code
#Main Form
$FrmMain.CancelButton = $btnClose
$FrmMain.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$FrmMain.Text = "Set Default Printer"
$FrmMain.Name = "FrmMain"
$FrmMain.KeyPreview = $True
$FrmMain.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 439
$System_Drawing_Size.Height = 272
$FrmMain.ClientSize = $System_Drawing_Size
$FrmMain.AcceptButton = $btnSearch
$FrmMain.FormBorderStyle = 2
#Search Label
$lblSearch.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 14
$lblSearch.Size = $System_Drawing_Size
$lblSearch.Text = "Search"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 9
$lblSearch.Location = $System_Drawing_Point
$lblSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$lblSearch.Name = "lblSearch"
$FrmMain.Controls.Add($lblSearch)
#Printer Label
$lblPrinter.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 12
$lblPrinter.Size = $System_Drawing_Size
$lblPrinter.Text = "Printer:"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 258
$System_Drawing_Point.Y = 185
$lblPrinter.Location = $System_Drawing_Point
$lblPrinter.DataBindings.DefaultDataSourceUpdateMode = 0
$lblPrinter.Name = "lblPrinter"
$FrmMain.Controls.Add($lblPrinter)
#UserAccount Label
$lblUserAccount.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 13
$lblUserAccount.Size = $System_Drawing_Size
$lblUserAccount.Text = "User Account:"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 145
$lblUserAccount.Location = $System_Drawing_Point
$lblUserAccount.DataBindings.DefaultDataSourceUpdateMode = 0
$lblUserAccount.Name = "lblUserAccount"
$FrmMain.Controls.Add($lblUserAccount)
#Progress Bar
$pgbProgress.DataBindings.DefaultDataSourceUpdateMode = 0
$pgbProgress.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$pgbProgress.ForeColor = [System.Drawing.Color]::FromArgb(255,0,255,0)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 191
$System_Drawing_Size.Height = 8
$pgbProgress.Size = $System_Drawing_Size
$pgbProgress.Step = 1
$pgbProgress.TabIndex = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 246
$System_Drawing_Point.Y = 105
$pgbProgress.Location = $System_Drawing_Point
$pgbProgress.Style = [System.Windows.Forms.ProgressBarStyle]::Marquee #2
$pgbProgress.MarqueeAnimationSpeed = 50
$pgbProgress.Visible = $False
$pgbProgress.Name = "pgbProgress"
$FrmMain.Controls.Add($pgbProgress)
#Status Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 17
$tbxStatus.Size = $System_Drawing_Size
$tbxStatus.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxStatus.TextAlign = 2
$tbxStatus.BorderStyle = 0
$tbxStatus.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",10,1,3,0)
$tbxStatus.Name = "tbxStatus"
$tbxStatus.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 88
$tbxStatus.Location = $System_Drawing_Point
$tbxStatus.TabIndex = 20
$FrmMain.Controls.Add($tbxStatus)
#Server Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 17
$tbxServer.Size = $System_Drawing_Size
$tbxServer.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxServer.TextAlign = 2
$tbxServer.BorderStyle = 0
$tbxServer.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",10,1,3,1)
$tbxServer.Name = "tbxServer"
$tbxServer.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 32
$tbxServer.Location = $System_Drawing_Point
$tbxServer.TabIndex = 19
$FrmMain.Controls.Add($tbxServer)
#CurrentUser Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 17
$tbxCurrentUser.Size = $System_Drawing_Size
$tbxCurrentUser.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxCurrentUser.TextAlign = 2
$tbxCurrentUser.BorderStyle = 0
$tbxCurrentUser.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",8,[Drawing.FontStyle]'Italic') #0,3,1)
$tbxCurrentUser.Name = "tbxCurrentUser"
$tbxCurrentUser.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 60
$tbxCurrentUser.Location = $System_Drawing_Point
$tbxCurrentUser.TabIndex = 20
$FrmMain.Controls.Add($tbxCurrentUser)
#Search Button
$btnSearch.TabIndex = 2
$btnSearch.Name = "btnSearch"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 60
$System_Drawing_Size.Height = 23
$btnSearch.Size = $System_Drawing_Size
$btnSearch.UseVisualStyleBackColor = $True
$btnSearch.Text = "Search"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 180
$System_Drawing_Point.Y = 26
$btnSearch.Location = $System_Drawing_Point
$btnSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$btnSearch.add_Click($btnSearch_OnClick)
$FrmMain.Controls.Add($btnSearch)
#Load Button
$btnLoad.TabIndex = 4
$btnLoad.Name = "btnLoad"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 60
$System_Drawing_Size.Height = 23
$btnLoad.Size = $System_Drawing_Size
$btnLoad.UseVisualStyleBackColor = $True
$btnLoad.Text = "Load"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 310
$System_Drawing_Point.Y = 120
$btnLoad.Location = $System_Drawing_Point
$btnLoad.DataBindings.DefaultDataSourceUpdateMode = 0
$btnLoad.add_Click($btnLoad_OnClick)
$FrmMain.Controls.Add($btnLoad)
#Close Button
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 351
$System_Drawing_Point.Y = 236
$btnClose.Location = $System_Drawing_Point
$btnClose.DataBindings.DefaultDataSourceUpdateMode = 0
$btnClose.DialogResult = 2
$btnClose.add_Click($btnClose_OnClick)
$FrmMain.Controls.Add($btnClose)
#SetDefault Button
$btnSetDefault.TabIndex = 7
$btnSetDefault.Name = "btnSetDefault"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnSetDefault.Size = $System_Drawing_Size
$btnSetDefault.UseVisualStyleBackColor = $True
$btnSetDefault.Text = "Set Default"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 236
$btnSetDefault.Location = $System_Drawing_Point
$btnSetDefault.DataBindings.DefaultDataSourceUpdateMode = 0
$btnSetDefault.add_Click($btnSetDefault_OnClick)
$FrmMain.Controls.Add($btnSetDefault)
#Search Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 161
$System_Drawing_Size.Height = 20
$tbxSearch.Size = $System_Drawing_Size
$tbxSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxSearch.Name = "tbxSearch"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 29
$tbxSearch.Location = $System_Drawing_Point
$tbxSearch.TabIndex = 1
$FrmMain.Controls.Add($tbxSearch)
$btnClose.TabIndex = 8
$btnClose.Name = "btnClose"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnClose.Size = $System_Drawing_Size
$btnClose.UseVisualStyleBackColor = $True
$btnClose.Text = "Close"
#Servers Listbox
#$lbxServers.UseCompatibleStateImageBehavior = $False
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 227
$System_Drawing_Size.Height = 205
$lbxServers.Size = $System_Drawing_Size
$lbxServers.DataBindings.DefaultDataSourceUpdateMode = 0
$lbxServers.Name = "lbxServers"
#$lbxServers.View = 3
$lbxServers.TabIndex = 3
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 55
$lbxServers.Location = $System_Drawing_Point
$FrmMain.Controls.Add($lbxServers)
#Printer Combobox
$cbxPrinter.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 21
$cbxPrinter.Size = $System_Drawing_Size
$cbxPrinter.DataBindings.DefaultDataSourceUpdateMode = 0
$cbxPrinter.Name = "cbxPrinter"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 258
$System_Drawing_Point.Y = 200
$cbxPrinter.Location = $System_Drawing_Point
$cbxPrinter.TabIndex = 6
$FrmMain.Controls.Add($cbxPrinter)
#UserAccount Combobox
$cbxUserAccount.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 21
$cbxUserAccount.Size = $System_Drawing_Size
$cbxUserAccount.DataBindings.DefaultDataSourceUpdateMode = 0
$cbxUserAccount.Name = "cbxUserAccount"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 258
$System_Drawing_Point.Y = 161
$cbxUserAccount.Location = $System_Drawing_Point
$cbxUserAccount.TabIndex = 5
$FrmMain.Controls.Add($cbxUserAccount)
#endregion Generated Form Code
#Save the initial state of the form
$InitialFormWindowState = $FrmMain.WindowState
#Init the OnLoad event to correct the initial state of the form
$FrmMain.add_Load($OnLoadForm_StateCorrection)
#Show the Form
$FrmMain.ShowDialog()| Out-Null
} #End Function
#Call the Function
GenerateForm
|
combined_dataset/train/non-malicious/sample_10_56.ps1
|
sample_10_56.ps1
|
ConvertFrom-StringData @'
id_bpastarting=Starting Best Practices Analyzer
id_bparunning=Running Best Practices Analyzer
id_bpagenerating=Generating BPA Output
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCxgCounFaQKGyt
# yYwxFjZvzFDl6rglsXWmfdWtFpiDd6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFUk2V4+CexwhMMh3dR+3ha7
# tFC4ut3C46K+xbOaJwU3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHRpPHvGAoNVXhyQ5IBGBacC2Wq87CSBYuc8Ds3ayjTwWRAxxgM91SqGh
# loeH0vVzqslMur0xmYUhiscTR4mfTpTDsHXCDlBgXxt2VKQryKAIz5mkDwh6Mbsy
# eCX6XquofMqEbaEmEmc8GQcwiROlgTjdMZncCn4LEAI/Z2K++YbZlKcZ0jhSI/eO
# vMIhl+FUjOL3Y3xAx4KoErDd9rXeXZK7gnindxHH7BA+r/6dF5OUH0gJhzolRcsk
# 7lJ/v9UeEYZOcXK9fRbWUz+R5Xtc8QE/uNIcnx1R8oFfBVp6cjENzi1oNJ3RJ5+A
# kLZ4kC70BshhSwsXmgwdZpwWabdmD6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCMNV2AEDMoD0NkqMntluTZfLVI5S5bZm+y1bsaKUmldgIGZxqPzfDc
# GBMyMDI0MTAyODExNDA0MC45NTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie
# YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt
# 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG
# 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F
# zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh
# ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK
# FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/
# zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX
# lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM
# k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH
# xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF
# tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI
# rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO
# 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy
# 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK
# CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV
# wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj
# 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb
# vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE
# yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe
# gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o
# uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy
# TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi
# WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAiGA8yMDI0MTAyODA2MTg1
# NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyatQ
# AgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhSkFloumMW1RvgFdb92+TH
# K6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT+xqJ9FN0+DhU7VbhQzFp
# lSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Cehf10MosdYIq9nQ6IhxL20
# siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa+dU71t77KkdCeO70ybxR
# 1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9NmwZTYfI/s4Qh0GVxQ1v
# Relr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB5jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCU+YS7+NhCM4Uq2uuE+aLpd36Zn97Io66JA37Qu71shzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16hIYcR
# noy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMdP6fMqtySduFITAgYbREF
# 90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAHuraIGB8xQ3CZFEtQpM9y4l2
# c316s1CLrnxbH/+cFuU1kNPiyXHbbk7prb0O0b/VeWgT+82piNIhcmnaMYxkI808
# elTRaNKsKoKXIrp0n2K89gia6C1nuTrwHbesNoRFlXS0W8wTzASoa/EeqGhqxkn7
# 5kAZpzQNeh9fDO8zPM6MZTK6yEvcOcmklkhjopqhNhtmDb4IVu4MS44lM7jxZmxQ
# Xd2+JUcaAbHqivh5eW78yFB0VZl62hhZnii5xMzMu9miSgYfmlYeXHXiPN8BP92c
# Lu84PGPZeHMCw9fwHoE/k2Mz53K5Oxx7aTt51PeYNjg559IrlBo8Nq922EB4Mo1B
# omK6ESmv5T+8mNgsB/6NCWdJvXaSu14BRkO7CroARPpBDQ6nXLlnww7dnvbtGntd
# tds61Y0VqfdWW5Nca6H7m4OoLjGqc11QPqzDqwE54Ued9fTSFoh2rbimqTMnHemH
# cq+1snwxSr7TVoXF8+BbXuEglvAvWusVMP80E3lyVcp3gaVVEJ4eRrPTHacj3p+2
# APFitRRIdSeARidygk5qA6+kAD7WZ1tC1D5whY+AOBzrTpenKT7b25DuqFbVgyzF
# i5OReNLeM2FChS2yhOqNxCvIHkMcNIsxMG2RsZWQdaxtP4pEIhKlMKjKwCEGPVi/
# DZafeNOeJ1D5fxrlvxY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-DiskUsage_3.ps1
|
Get-DiskUsage_3.ps1
|
Function Get-DiskUsage {
<#
.SYNOPSIS
A tribute to the excellent Unix command DU.
.DESCRIPTION
This command will output the full path and the size of any object
and it's subobjects. Using just the Get-DiskUsage command without
any parameters will result in an output of the directory you are
currently placed in and it's subfolders.
.PARAMETER Path
If desired a path can be specified with the Path parameter. In no path
is specified $PWD will be used.
.PARAMETER h
the -h paramater is the same as -h in Unix. It will list the folders
and subfolders in the most appropriate unit depending on the size
(i.e. Human Readable).
.PARAMETER l
The -l paramater will add the largest file to the end of the output.
.PARAMETER Sort
Allows you to sort by Folder or Size. If none i specified the default
of Folder will be used.
.PARAMETER Depth
Depth will allow you to specify a maximum recursion depth. A depth
of 1 would return the immediate subfolders under the root.
.PARAMETER Force
Works the same way as Get-ChildItem -force.
.PARAMETER Descending
Works the same way as Sort-Object -descending.
.LINK
http://www.donthaveasite.nu
.NOTES
Author: Jonas Hallqvist
Developed with Powershell v3
#>
[CmdletBinding(
SupportsShouldProcess=$True
)]
param (
[String]$Path=$PWD,
[Switch]$h,
[Switch]$l,
[String]$Sort="Folder",
[Int]$Depth,
[Switch]$Force,
[Switch]$Descending
)
$ErrorActionPreference = "silentlycontinue"
function HumanReadable {
param ($size)
switch ($size) {
{$_ -ge 1PB}{"{0:#'P'}" -f ($size / 1PB); break}
{$_ -ge 1TB}{"{0:#'T'}" -f ($size / 1TB); break}
{$_ -ge 1GB}{"{0:#'G'}" -f ($size / 1GB); break}
{$_ -ge 1MB}{"{0:#'M'}" -f ($size / 1MB); break}
{$_ -ge 1KB}{"{0:#'K'}" -f ($size / 1KB); break}
default {"{0}" -f ($size) + "B"}
}
}
function LargestFolder {
if ($h) {
$large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize -HideTableHeaders
Write-host "Largest Folder is:" -NoNewline
$large
}
else {
$large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize -HideTableHeaders
Write-host "Largest Folder is:" -NoNewline
$large
}
}
function Max-Depth {
param(
[String]$Path = '.',
[String]$Filter = '*',
[Int]$Level = 0,
[Switch]$Force,
[Switch]$Descending,
[int]$i=0
)
$results=@()
$root = (Resolve-Path $Path).Path
if ($root -notmatch '\\\\$') {$root += '\\'}
if (Test-Path $root -PathType Container) {
do {
[String[]]$_path += $root + "$Filter"
$Filter = '*\\' + $Filter
$i++
}
until ($i -eq $Level)
$dirs=Get-ChildItem -directory $_path -Force:$Force
foreach ($dir in $dirs) {
$size = 0
$size += (gci $dir.Fullname -recurse | Measure-Object -Property Length -Sum).Sum
$results += New-Object psobject -Property @{Folder=$dir.fullname;Size=$size}
}
if ($h) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize
}
if ($l) {
LargestFolder
}
if (($h -eq $false) -and ($l -eq $false)) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize
}
}
}
if ($Depth) {
Max-Depth -Path $Path -Level $Depth -Force:$Force -Descending:$Descending
}
else {
$results = @()
$dirs=Get-ChildItem -directory $Path -Force:$Force -Recurse
foreach ($dir in $dirs) {
$size = 0
$size += (gci $dir.FullName -Recurse | Measure-Object -Property Length -Sum).Sum
$results+= New-Object psobject -Property @{Folder=$dir.FullName;Size=$size}
}
if ($h) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize
}
if ($l) {
LargestFolder
}
if (($h -eq $false) -and ($l -eq $false)) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize
}
}
}
|
combined_dataset/train/non-malicious/648.ps1
|
648.ps1
|
function Get-TestUser() {
if (-not $env:RsUser) {
throw 'Environment variable RsUser is not defined!'
}
return $env:RsUser
}
Describe "Get-RsCatalogItemRole" {
$user = Get-TestUser
$reportServerUri = 'http://localhost/reportserver'
$catalogItemPath = '/'
Context "Get Catalog Item Policy"{
It "Should retrieve Browser permission access" {
$role = 'Browser'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$catalogItemPolicy = Get-RsCatalogItemRole -Path $catalogItemPath
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
It "Should retrieve Content Manager permission access" {
$role = 'Content Manager'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$catalogItemPolicy = Get-RsCatalogItemRole -Path $catalogItemPath
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
AfterEach {
Revoke-AccessOnCatalogItem -UserOrGroupName $user -Path $catalogItemPath -Confirm:$false -Verbose
}
}
Context "Get Catalog Item Policy with Identity"{
It "Should retrieve Browser permission access for test user" {
$role = 'Browser'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$catalogItemPolicy = Get-RsCatalogItemRole -Path $catalogItemPath -Identity $user
$catalogItemPolicyCount = @($catalogItemPolicy).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
It "Should retrieve Content Manager permission access for test user" {
$role = 'Content Manager'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$catalogItemPolicy = Get-RsCatalogItemRole -Path $catalogItemPath -Identity $user
$catalogItemPolicyCount = @($catalogItemPolicy).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
AfterEach {
Revoke-AccessOnCatalogItem -UserOrGroupName $user -Path $catalogItemPath -Confirm:$false -Verbose
}
}
Context "Get Catalog Item Policy with ReportServerUri parameter"{
It "Should retrieve Browser permission access" {
$role = 'Browser'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$catalogItemPolicy = Get-RsCatalogItemRole -Path $catalogItemPath -ReportServerUri $reportServerUri
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
It "Should retrieve Content Manager permission access" {
$role = 'Content Manager'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$catalogItemPolicy = Get-RsCatalogItemRole -Path $catalogItemPath -ReportServerUri $reportServerUri
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
AfterEach {
Revoke-AccessOnCatalogItem -UserOrGroupName $user -Path $catalogItemPath -Confirm:$false -Verbose
}
}
Context "Get Catalog Item Policy with proxy parameter"{
It "Should retrieve Browser permission access" {
$role = 'Browser'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$proxy = New-RsWebServiceProxy
$catalogItemPolicy = Get-RsCatalogItemRole -proxy $proxy
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
It "Should retrieve Content Manager permission access" {
$role = 'Content Manager'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$proxy = New-RsWebServiceProxy
$catalogItemPolicy = Get-RsCatalogItemRole -proxy $proxy
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
AfterEach {
Revoke-AccessOnCatalogItem -UserOrGroupName $user -Path $catalogItemPath -Confirm:$false -Verbose
}
}
Context "Get Catalog Item Policy with proxy parameter and ReportServerUri"{
It "Should retrieve Browser permission access" {
$role = 'Browser'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$proxy = New-RsWebServiceProxy
$catalogItemPolicy = Get-RsCatalogItemRole -proxy $proxy -ReportServerUri $reportServerUri
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
It "Should retrieve Content Manager permission access" {
$role = 'Content Manager'
Grant-AccessOnCatalogItem -UserOrGroupName $user -RoleName $role -Path $catalogItemPath -Confirm:$false -Verbose
$proxy = New-RsWebServiceProxy
$catalogItemPolicy = Get-RsCatalogItemRole -proxy $proxy -ReportServerUri $reportServerUri
$catalogItemPolicyCount = @($catalogItemPolicy | Where-Object {$_.Identity -eq $user -and $_.Roles.Name -eq $role}).Count
$catalogItemPolicyCount | Should BeGreaterThan 0
}
AfterEach {
Revoke-AccessOnCatalogItem -UserOrGroupName $user -Path $catalogItemPath -Confirm:$false -Verbose
}
}
}
|
combined_dataset/train/non-malicious/sample_27_20.ps1
|
sample_27_20.ps1
|
<#
.SYNOPSIS
Edge Automation Hours of Battery Life Workload Assessment
.DESCRIPTION
Automates Edge Browsing Activations.
.PARAMETER Iterations
Integer, execution iterations.
.PARAMETER ScenarioJson
Integer, scenario json file. 0 : scenario.default.json, 1 : scenario.browsing.json, 2 : scenario.office.json, 3 : scenario.skype.json
.PARAMETER SenderEmailAddress
string, sender email address.
.PARAMETER SenderEmailPassword
string, sender email password.
.PARAMETER MeetingInvitationUrl
string, meeting invitation URL.
.PARAMETER ScenarioDurationSecs
Integer, scenario json duration in seconds.
.PARAMETER EmulationEnabled
switch, enable browser device emulation.
.PARAMETER ScreenHeight
Integer, emulated screen height.
.PARAMETER ScreenWidth
Integer, emulated screen width.
.PARAMETER PixelRatio
Double, emulated screen pixel ratio.
.PARAMETER LocalDebuggingLaunch
switch, use browser local debugging port for automation control.
.PARAMETER ForceImmediateSleepingTabs
switch, disable sleeping tabs feature timeout.
.PARAMETER EnableTAEFLogging
switch, enable verbose TAEF infrastructure logs.
.PARAMETER CollectHistograms
switch, save edge:\\histograms web page to results.
.EXAMPLE
EdgeAutomation -Iterations 1 -ScenarioJson 2
-SenderEmailAddress 'youremail@outlook.com'
-SenderEmailPassword 'yourpassword'
-MeetingInvitationUrl 'https://join.skype.com/U2Nrhn5Z1goS'
-ScenarioDurationSecs 900
#>
Param(
[parameter(Mandatory = $true)]
[int32]
$Iterations,
[parameter(Mandatory = $true)]
[int32]
$ScenarioJson,
[parameter(Mandatory = $false)]
[string]
$SenderEmailAddress = '',
[parameter(Mandatory = $false)]
[string]
$SenderEmailPassword = '',
[parameter(Mandatory = $false)]
[string]
$MeetingInvitationUrl = '',
[parameter(Mandatory = $false)]
[int32]
$ScenarioDurationSecs = 1800,
[parameter(Mandatory = $false)]
[string]
$CredentialFilePath = '',
[parameter(Mandatory = $false)]
[switch]
$EmulationEnabled = $false,
[parameter(Mandatory = $false)]
[int32]
$ScreenHeight = 0,
[parameter(Mandatory = $false)]
[int32]
$ScreenWidth = 0,
[parameter(Mandatory = $false)]
[double]
$PixelRatio = 1.0,
[parameter(Mandatory = $false)]
[switch]
$LocalDebuggingLaunch,
[parameter(Mandatory = $false)]
[switch]
$ForceImmediateSleepingTabs,
[parameter(Mandatory = $false)]
[switch]
$EnableTAEFLogging,
[parameter(Mandatory = $false)]
[switch]
$CollectHistograms
)
# Exit $exitCode will not affect the real return code but it will affect return code 0 ($exitCode == 0) or 1 ($exitCode != 0) no matter run by powershell.exe -Command or -File.
$exitCode = 0
[System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
New-Variable -Name TestDll -Value "EdgeAutomation.dll" -Option Constant
try
{
#*****************************************************************
#
# Definitions and imports
#
#*****************************************************************
#set to true if you need to hang the script at the end to check console output
$Global:debugFlag = $false
# Tools and resources
$Global:AxeUniversalPath = Convert-Path((Get-Item env:\AssessmentAxeUniversalPath -ErrorAction Stop).value)
$Global:InvocationPath = Split-Path -Path $MyInvocation.MyCommand.Path -Parent
try
{
# Import the modules and functions
Import-Module "$AxeUniversalPath\UniversalAssessment.psm1" -ErrorAction Stop
}
catch
{
$exitCode = 100
throw "[Amst-<EdgeAutomation>][ExecuteWorkload]Failed to import $AxeUniversalPath\UniversalAssessment.psm1"
}
Initialize-UniversalFramework -InvocationPath $InvocationPath -AxeUniversalPath $AxeUniversalPath
$ResultsDir = Get-EnergyPersistentResultsFolder
#*********************************************************************************************************
#
# copy files in $Global:AxeRemoteTestBinPath\adk\Microsoft-Assessments-Core-EdgePower to $Global:AxeRemoteTestBinPath
# try to recover Newtonsoft.Json.dll might overwrited by SeleniumRuntime.cab other .cab
# try to recover WebDriver.dll and WebDriver.Support.dll might overwrited by WebDriver-3-8.cab or other .cab
# should not recover scenario.*.json
#
#*********************************************************************************************************
[string[]]$subFolders = @()
Get-UT_Folder_SubFolders -folder "$($Global:AxeRemoteTestBinPath)\adk\Microsoft-Assessments-Core-EdgePower" -subFolders ([ref]$subFolders)
[string[]]$pathFiles = @()
foreach ($subFolder in $subFolders)
{
Get-UT_Folder_Matched_PathFiles -folder "$($Global:AxeRemoteTestBinPath)\adk\Microsoft-Assessments-Core-EdgePower\$subFolder" -imatch "(Newtonsoft\.Json|WebDriver(.Support)?)\.dll" -pathFiles ([ref]$pathFiles)
}
Copy-UT_Files -Files $pathFiles
# check if $TestDll is present
if (-not (Test-Path "$AxeRemoteTestBinPath\$TestDll"))
{
$exitCode = 110
$errorMsg = "[Amst-<EdgeAutomation>][ExecuteWorkload]$TestDll not found in $AxeRemoteTestBinPath. Please make sure to turn on Energy efficiency settings / Package Deployment / Browser automation first."
throw [System.IO.FileNotFoundException]$errorMsg
}
#*****************************************************************
#
# Actual workload!
#
#*****************************************************************
$LoopEndFile = $null
if ($Global:boolRunningUnderAxe)
{
$LoopEndFile = "$AxeRemoteTestBinPath\adk\LoopEnd"
Delete-TestFile $LoopEndFile
}
$throwExceptionJson = "$AxeRemoteTestBinPath\adk\throwException.Json"
Delete-TestFile $throwExceptionJson
$waitLoopEnd = $null
if ($LoopEndFile)
{
$RunWaitLoopEnd = "& '$AxeUniversalPath\WaitLoopEnd.ps1'", "-LoopEndFile `"$LoopEndFile`""
$waitLoopEnd = Start-Process powershell.exe -ArgumentList "$RunWaitLoopEnd" -PassThru
}
$teLogFolder = Join-Path -Path $ResultsDir texusLogs
$spaceEncodedProperties = ""
$teCmd = "$AxeRemoteTestBinPath\te.exe $AxeRemoteTestBinPath\$TestDll /p:Iterations=$Iterations /p:`"ResultsDir=$ResultsDir`""
if ($EnableTAEFLogging)
{
$teCmd += " /outputFolder:$teLogFolder /logfile:teLog.xml /enableWttlogging /enableEtwLogging /etwLogFilename:TaefEdgeAutomation.etl /disableConsoleLogging /miniDumpOnError /miniDumpOnCrash /screenCaptureOnError /p:Debug "
}
else
{
$teCmd += " /outputFolder:$teLogFolder /logfile:teLog.xml /logOutput:Lowest /enableWttlogging"
}
$teCmd += " /p:ScenarioIndex=$scenarioJson"
if ($LocalDebuggingLaunch)
{
$teCmd += " /p:LocalDebuggingLaunch"
}
if ($ForceImmediateSleepingTabs)
{
$teCmd += " /p:ForceImmediateSleepingTabs"
}
if ($CollectHistograms)
{
$teCmd += " /p:CollectHistograms"
}
if ($LoopEndFile)
{
$teCmd += " /p:`"LoopEndFile=$LoopEndFile`""
}
if ($EmulationEnabled)
{
$teCmd += " /p:EmulationEnabled /p:ScreenHeight=$ScreenHeight /p:ScreenWidth=$ScreenWidth /p:`"PixelRatio=$PixelRatio`""
}
if ($CredentialFilePath)
{
$teCmd += " /p:`"ParameterReplaceFile=$CredentialFilePath`""
Encode-UT_PropertyString -property "ParameterReplaceFile" -srcString $CredentialFilePath -oldSubString " " -newSubString "##" `
-spaceEncodedProperties ([ref]$spaceEncodedProperties) -teCmd ([ref]$teCmd)
}
if ($edgeExe)
{
# encode " " to "##"
Encode-UT_PropertyString -property "EdgeExe" -srcString $edgeExe -oldSubString " " -newSubString "##" `
-spaceEncodedProperties ([ref]$spaceEncodedProperties) -teCmd ([ref]$teCmd)
}
if ($spaceEncodedProperties)
{
# Here are some properties encoding space to "##"
$teCmd += " /p:`"SpaceEncodedProperties=##:$spaceEncodedProperties`""
}
#
# JSON scenario parameters
#
if ($SenderEmailAddress)
{
$teCmd += " /p:`"json.SenderEmailAddress=$SenderEmailAddress`""
}
if ($SenderEmailPassword)
{
$teCmd += " /p:`"json.SenderEmailPassword=$SenderEmailPassword`""
}
if ($MeetingInvitationUrl)
{
$teCmd += " /p:`"json.MeetingInvitationUrl=$MeetingInvitationUrl`""
}
if ($ScenarioDurationSecs)
{
$teCmd += " /p:`"json.ScenarioDurationSecs=$ScenarioDurationSecs`""
}
Invoke-Expression -Command $teCmd
$exitCode = $LastExitCode
if ($waitLoopEnd)
{
Stop-Process $waitLoopEnd
}
if ((Test-Path "$throwExceptionJson"))
{
$exitCode = 120
Throw-UT_ExceptionByExceptionFile -throwExceptionJson $throwExceptionJson
}
if ($exitCode -ne 0)
{
throw ("[Amst-<EdgeAutomation>][ExecuteWorkload]te.exe exited with errors LastExitCode:{0}, please check {1}" -f $exitCode, $teLogFolder)
}
Start-Sleep 5
}
catch
{
Handle-UniversalFrameworkException -Exception $_
}
finally
{
Cleanup-UniversalFramework
Exit $exitCode
}
|
combined_dataset/train/non-malicious/LibraryLinkedServer.ps1
|
LibraryLinkedServer.ps1
|
try {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop}
catch {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo"}
try {add-type -AssemblyName "Microsoft.SqlServer.Smo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10}
catch {add-type -AssemblyName "Microsoft.SqlServer.Smo"; $smoVersion = 9}
try {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10}
catch {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum"; $smoVersion = 9}
try
{
try {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop}
catch {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended" -EA Stop}
}
catch {Write-Warning "SMOExtended not available"}
$ErrorActionPreference = 'Stop'
$scriptRoot = Split-Path (Resolve-Path $myInvocation.MyCommand.Path)
#######################
filter Remove-LinkedServerLogin
{
param([string[]]$LinkedServerLogins)
$ServerInstance = $_
$sqlserver = new-object ("Microsoft.SqlServer.Management.Smo.Server") $ServerInstance
#Get the linked server logins in the global group
$l = $sqlserver.LinkedServers| % {$_.LinkedServerLogins } | ? {$LinkedServerLogins -contains $_.name}
write-host $ServerInstance
if ($l) {
#Drop the Linked Server Logins
$l | %{$_.Drop()}
}
} #Remove-LinkedServerLogin
#######################
filter Backup-LinkedServer
{
param($LinkedServer,[string[]]$LinkedServerLogins)
$ServerInstance = $_
$ServerInstanceFileName = $ServerInstance -replace '\\\\','_'
$sqlserver = new-object ("Microsoft.SqlServer.Management.Smo.Server") $ServerInstance
#Get the linked servers
if ($LinkedServer) {
$l = $sqlserver.LinkedServers| ? {$_.Name -eq "$LinkedServer" }
}
elseif ($LinkedServerLogins) {
$l = $sqlserver.LinkedServers| % {$_.LinkedServerLogins } | ? {$LinkedServerLogins -contains $_.name} | %{$_.parent} | select-object -unique
}
else {
throw 'LinkedServer or LinkedServerLogins required.'
}
write-host $ServerInstance
$opts = New-Object Microsoft.SqlServer.Management.Smo.ScriptingOptions
$opts.ToFileOnly =$true
if ($l) {
#Backup Linked Server Before Dropping Linked Server Logins
$l | % {$opts.FileName = $("{0}\\{1}_{2}.sql" -f $scriptRoot,$ServerInstanceFileName,$($($_.Name) -replace '\\\\','_')); write-host $opts.FileName; $_.script($opts)}
}
} #Backup-LinkedServer
#######################
filter Remove-LinkedServer
{
param($LinkedServer)
$ServerInstance = $_
$ServerInstanceFileName = $ServerInstance -replace '\\\\','_'
$sqlserver = new-object ("Microsoft.SqlServer.Management.Smo.Server") $ServerInstance
write-host "$ServerInstance"
$l = $sqlserver.LinkedServers| ? {$_.Name -eq "$LinkedServer" }
#Backup Linked Server Before Dropping
if ($l) {
#Drop the Linked Server
$l | %{$_.Drop($true)}
}
} #Remove-LinkedServer
#######################
function Get-CMRegisteredServer
{
param($CMServer,$GroupName)
$query = @"
SELECT DISTINCT s.name
FROM msdb.dbo.sysmanagement_shared_registered_servers s
JOIN msdb.dbo.sysmanagement_shared_server_groups g
ON s.server_group_id = g.server_group_id
WHERE 1 = 1
"@
if ($GroupName) {
$query =+ "`nAND g.name = '$GroupName'"
}
#Write-Host $query
Invoke-SqlCmd2 -ServerInstance $CMServer -Database msdb -Query $query | foreach {$_.name}
} #Get-CMRegisteredServer
#######################
<#
.SYNOPSIS
Runs a T-SQL script.
.DESCRIPTION
Runs a T-SQL script. Invoke-Sqlcmd2 only returns message output, such as the output of PRINT statements when -verbose parameter is specified
.INPUTS
None
You cannot pipe objects to Invoke-Sqlcmd2
.OUTPUTS
System.Data.DataTable
.EXAMPLE
Invoke-Sqlcmd2 -ServerInstance "MyComputer\\MyInstance" -Query "SELECT login_time AS 'StartTime' FROM sysprocesses WHERE spid = 1"
This example connects to a named instance of the Database Engine on a computer and runs a basic T-SQL query.
StartTime
-----------
2010-08-12 21:21:03.593
.EXAMPLE
Invoke-Sqlcmd2 -ServerInstance "MyComputer\\MyInstance" -InputFile "C:\\MyFolder\\tsqlscript.sql" | Out-File -filePath "C:\\MyFolder\\tsqlscript.rpt"
This example reads a file containing T-SQL statements, runs the file, and writes the output to another file.
.EXAMPLE
Invoke-Sqlcmd2 -ServerInstance "MyComputer\\MyInstance" -Query "PRINT 'hello world'" -Verbose
This example uses the PowerShell -Verbose parameter to return the message output of the PRINT command.
VERBOSE: hello world
.NOTES
Version History
v1.0 - Chad Miller - Initial release
v1.1 - Chad Miller - Fixed Issue with connection closing
v1.2 - Chad Miller - Added inputfile, SQL auth support, connectiontimeout and output message handling. Updated help documentation
v1.3 - Chad Miller - Added As parameter to control DataSet, DataTable or array of DataRow Output type
#>
function Invoke-Sqlcmd2
{
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true)] [string]$ServerInstance,
[Parameter(Position=1, Mandatory=$false)] [string]$Database,
[Parameter(Position=2, Mandatory=$false)] [string]$Query,
[Parameter(Position=3, Mandatory=$false)] [string]$Username,
[Parameter(Position=4, Mandatory=$false)] [string]$Password,
[Parameter(Position=5, Mandatory=$false)] [Int32]$QueryTimeout=600,
[Parameter(Position=6, Mandatory=$false)] [Int32]$ConnectionTimeout=15,
[Parameter(Position=7, Mandatory=$false)] [ValidateScript({test-path $_})] [string]$InputFile,
[Parameter(Position=8, Mandatory=$false)] [ValidateSet("DataSet", "DataTable", "DataRow")] [string]$As="DataRow"
)
if ($InputFile)
{
$filePath = $(resolve-path $InputFile).path
$Query = [System.IO.File]::ReadAllText("$filePath")
}
$conn=new-object System.Data.SqlClient.SQLConnection
if ($Username)
{ $ConnectionString = "Server={0};Database={1};User ID={2};Password={3};Trusted_Connection=False;Connect Timeout={4}" -f $ServerInstance,$Database,$Username,$Password,$ConnectionTimeout }
else
{ $ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2}" -f $ServerInstance,$Database,$ConnectionTimeout }
$conn.ConnectionString=$ConnectionString
#Following EventHandler is used for PRINT and RAISERROR T-SQL statements. Executed when -Verbose parameter specified by caller
if ($PSBoundParameters.Verbose)
{
$conn.FireInfoMessageEventOnUserErrors=$true
$handler = [System.Data.SqlClient.SqlInfoMessageEventHandler] {Write-Verbose "$($_)"}
$conn.add_InfoMessage($handler)
}
$conn.Open()
$cmd=new-object system.Data.SqlClient.SqlCommand($Query,$conn)
$cmd.CommandTimeout=$QueryTimeout
$ds=New-Object system.Data.DataSet
$da=New-Object system.Data.SqlClient.SqlDataAdapter($cmd)
[void]$da.fill($ds)
$conn.Close()
switch ($As)
{
'DataSet' { Write-Output ($ds) }
'DataTable' { Write-Output ($ds.Tables) }
'DataRow' { Write-Output ($ds.Tables[0]) }
}
} #Invoke-Sqlcmd2
|
combined_dataset/train/non-malicious/sample_24_83.ps1
|
sample_24_83.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loggingingestion'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loggingingestion.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ed6ebc41-8c84-4a4f-aaec-c687cb3245b5'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loggingingestion Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingingestion.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Write-OCILoggingingestionLogs'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingingestion'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Computer Inventory.ps1
|
Computer Inventory.ps1
|
# ========================================================
#
# Script Information
#
# Title: Remote Computer Inventory
# Author: Assaf Miron
# Originally created: 21/06/2008
# Original path: Computer-Inventory.PS1
# Description: Collects Remote Computer Data Using WMI and Registry Access
# Outputs all information to a Data Grid Form and to a CSV Log File
#
# ========================================================
#region Constructor
# Import Assembly
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Drawing")
# Log File where the results are Saved
$LogFile = "C:\\Monitoring\\Test-Monitor.csv"
# Check to see if the Log File Directory exists
If((Test-Path ($LogFile.Substring(0,$logFile.LastIndexof("\\")))) -eq $False)
{
# Create The Directory
New-Item ($LogFile.Substring(0,$logFile.LastIndexof("\\"))) -Type Directory
}
#endregion
#region Form Creation
#~~< Form1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$Form1 = New-Object System.Windows.Forms.Form
$Form1.AutoSize = $TRUE
$Form1.ClientSize = New-Object System.Drawing.Size(522, 404)
$Form1.StartPosition = [System.Windows.Forms.FormStartPosition]::CenterScreen
$Form1.Text = "Computer Inventory"
#~~< Panel1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$Panel1 = new-object System.Windows.Forms.Panel
$Panel1.Dock = [System.Windows.Forms.DockStyle]::Fill
$Panel1.Location = new-object System.Drawing.Point(0, 24)
$Panel1.Size = new-object System.Drawing.Size(522, 380)
$Panel1.TabIndex = 20
$Panel1.Text = ""
#~~< btnRun >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$btnRun = New-Object System.Windows.Forms.Button
$btnRun.Enabled = $FALSE
$btnRun.Location = New-Object System.Drawing.Point(431, 30)
$btnRun.Size = New-Object System.Drawing.Size(75, 23)
$btnRun.TabIndex = 2
$btnRun.Text = "Run"
$btnRun.UseVisualStyleBackColor = $TRUE
$btnRun.add_Click({ RunScript($btnRun) })
#~~< Label1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$Label1 = New-Object System.Windows.Forms.Label
$Label1.AutoSize = $False#$TRUE
$Label1.Location = New-Object System.Drawing.Point(12, 31)
$Label1.Size = New-Object System.Drawing.Size(163, 13)
$Label1.TabIndex = 15
$Label1.Text = "File containing Computer Names"
#~~< TextBox1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$TextBox1 = New-Object System.Windows.Forms.TextBox
$TextBox1.Location = New-Object System.Drawing.Point(177, 30)
$TextBox1.Size = New-Object System.Drawing.Size(161, 20)
$TextBox1.TabIndex = 0
$TextBox1.Text = ""
#~~< btnBrowse >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$btnBrowse = New-Object System.Windows.Forms.Button
$btnBrowse.Location = New-Object System.Drawing.Point(347, 30)
$btnBrowse.Size = New-Object System.Drawing.Size(75, 23)
$btnBrowse.TabIndex = 1
$btnBrowse.Text = "Browse"
$btnBrowse.UseVisualStyleBackColor = $TRUE
$btnBrowse.add_Click({ BrowseFile($btnBrowse) })
#~~< DataGridView1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$DataGridView1 = new-object System.Windows.Forms.DataGridView
$DataGridView1.Anchor = ([System.Windows.Forms.AnchorStyles]([System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right))
$DataGridView1.ColumnHeadersHeightSizeMode = [System.Windows.Forms.DataGridViewColumnHeadersHeightSizeMode]::AutoSize
$DataGridView1.Location = New-Object System.Drawing.Point(12, 59)
$DataGridView1.Size = New-Object System.Drawing.Size(497, 280)
$DataGridView1.TabIndex = 4
$DataGridView1.ClipboardCopyMode = [System.Windows.Forms.DataGridViewClipboardCopyMode]::Disable
$DataGridView1.Text = ""
#~~< ProgressBar1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$ProgressBar1 = New-Object System.Windows.Forms.ProgressBar
$ProgressBar1.Anchor = ([System.Windows.Forms.AnchorStyles] ([System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right ))
$ProgressBar1.Location = New-Object System.Drawing.Point(12, 345)
$ProgressBar1.Size = New-Object System.Drawing.Size(410, 23)
$ProgressBar1.TabIndex = 5
$ProgressBar1.Text = ""
#~~< btnExit >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$btnExit = New-Object System.Windows.Forms.Button
$btnExit.Anchor = ([System.Windows.Forms.AnchorStyles]([System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right))
$btnExit.DialogResult = [System.Windows.Forms.DialogResult]::Cancel
$btnExit.Location = New-Object System.Drawing.Point(431, 345)
$btnExit.Size = New-Object System.Drawing.Size(78, 23)
$btnExit.TabIndex = 3
$btnExit.Text = "Exit"
$btnExit.UseVisualStyleBackColor = $TRUE
$btnExit.add_Click({ CloseForm($btnExit) })
#~~< MenuStrip1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$MenuStrip1 = new-object System.Windows.Forms.MenuStrip
$MenuStrip1.Location = new-object System.Drawing.Point(0, 0)
$MenuStrip1.Size = new-object System.Drawing.Size(292, 24)
$MenuStrip1.TabIndex = 6
$MenuStrip1.Text = "MenuStrip1"
#~~< FileToolStripMenuItem >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$FileToolStripMenuItem = new-object System.Windows.Forms.ToolStripMenuItem
$FileToolStripMenuItem.Size = new-object System.Drawing.Size(35, 20)
$FileToolStripMenuItem.Text = "File"
#~~< OpenLogFileToolStripMenuItem >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$OpenLogFileToolStripMenuItem = new-object System.Windows.Forms.ToolStripMenuItem
$OpenLogFileToolStripMenuItem.Size = new-object System.Drawing.Size(152, 22)
$OpenLogFileToolStripMenuItem.Text = "Open Log File"
$OpenLogFileToolStripMenuItem.add_Click({Open-file($OpenLogFileToolStripMenuItem)})
#~~< ExitToolStripMenuItem >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$ExitToolStripMenuItem = new-object System.Windows.Forms.ToolStripMenuItem
$ExitToolStripMenuItem.Size = new-object System.Drawing.Size(152, 22)
$ExitToolStripMenuItem.Text = "Exit"
$ExitToolStripMenuItem.add_Click({CloseForm($ExitToolStripMenuItem)})
$FileToolStripMenuItem.DropDownItems.AddRange([System.Windows.Forms.ToolStripItem[]](@($OpenLogFileToolStripMenuItem, $ExitToolStripMenuItem)))
#~~< HelpToolStripMenuItem >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$HelpToolStripMenuItem = new-object System.Windows.Forms.ToolStripMenuItem
$HelpToolStripMenuItem.Size = new-object System.Drawing.Size(40, 20)
$HelpToolStripMenuItem.Text = "Help"
#~~< AboutToolStripMenuItem >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$AboutToolStripMenuItem = new-object System.Windows.Forms.ToolStripMenuItem
$AboutToolStripMenuItem.Size = new-object System.Drawing.Size(152, 22)
$AboutToolStripMenuItem.Text = "About"
$AboutToolStripMenuItem.add_Click({Show-About($AboutToolStripMenuItem)})
#~~< HowToToolStripMenuItem >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$HowToToolStripMenuItem = new-object System.Windows.Forms.ToolStripMenuItem
$HowToToolStripMenuItem.Size = new-object System.Drawing.Size(152, 22)
$HowToToolStripMenuItem.Text = "How To?"
$HowToToolStripMenuItem.add_Click({Show-HowTo($HowToToolStripMenuItem)})
$HelpToolStripMenuItem.DropDownItems.AddRange([System.Windows.Forms.ToolStripItem[]](@($AboutToolStripMenuItem, $HowToToolStripMenuItem)))
$MenuStrip1.Items.AddRange([System.Windows.Forms.ToolStripItem[]](@($FileToolStripMenuItem, $HelpToolStripMenuItem)))
$Panel1.Controls.Add($MenuStrip1)
$Panel1.Controls.Add($btnRun)
$Panel1.Controls.Add($Label1)
$Panel1.Controls.Add($TextBox1)
$Panel1.Controls.Add($btnBrowse)
$Panel1.Controls.Add($ProgressBar1)
$Panel1.Controls.Add($btnExit)
$Panel1.Controls.Add($DataGridView1)
$Panel1.Controls.Add($Menu)
$Form1.Controls.Add($Panel1)
#~~< Ping1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$Ping1 = New-Object System.Net.NetworkInformation.Ping
#~~< OpenFileDialog1 >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$OpenFileDialog1 = New-Object System.Windows.Forms.OpenFileDialog
$OpenFileDialog1.Filter = "Text Files|*.txt|CSV Files|*.csv|All Files|*.*"
$OpenFileDialog1.InitialDirectory = "C:"
$OpenFileDialog1.Title = "Open Computers File"
#~~< objNotifyIcon >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon
# Assign an Icon and Icon Type For the NotifyIcon Object
$objNotifyIcon.Icon = "D:\\Assaf\\Scripts\\Icons\\XP\\people15.ico"
$objNotifyIcon.BalloonTipIcon = "Info"
#endregion
#region Functions
function out-DataTable
# Function Creates a New Data Table that will be set as the Data Source of the Data Grid View
# Thanks to /\\/\\o\\/\\/ http:\\\\thePowerShellGuy.com
{
$dt = New-Object Data.datatable
$First = $TRUE
foreach ($item in $Input)
{
$DR = $DT.NewRow()
$Item.PsObject.get_properties() | foreach {
if ($first)
{
$Col = New-Object Data.DataColumn
$Col.ColumnName = $_.Name.ToString()
$DT.Columns.Add($Col) }
if ($_.value -eq $null)
{
$DR.Item($_.Name) = "[empty]"
}
elseif ($_.IsArray) {
$DR.Item($_.Name) = [string]::Join($_.value, ";")
}
else
{
$DR.Item($_.Name) = $_.value
}
}
$DT.Rows.Add($DR)
$First = $FALSE
}
return @(, ( $dt ))
}
function Join-Data
# Function Joins arrays and Strings to a Single Object with Members
# I Used the same principle of the Out-DataTable and converted it to Join Objects into one
# Using the Add-Member cmdlet. the Function writes to a predefiend object named $DataObject
{
param($objName="") # This parameter is used for objects that don't have member other than Length like Strings
foreach ($item in $Input)
{
$Item.PsObject.get_properties() | foreach{
if ($_.value -eq $null)
{
$DataObject | Add-Member noteproperty $_.Name "[empty]"
}
elseif ($_.IsArray) {
$DataObject | Add-Member noteproperty $_.Name [string]::Join($_.value, ";")
}
elseif ($objName -ne "") {
$DataObject | Add-Member noteproperty $objName $Item
}
else
{
$DataObject | Add-Member noteproperty $_.Name $_.value -Force
}
}
}
return @(,$DataObject)
}
function Get-Reg {
# Function Connects to a remote computer Registry using the Parameters it recievs
param(
$Hive,
$Key,
$Value,
$RemoteComputer="." # If not enterd Local Computer is Selected
)
# Connect to Remote Computer Registry
$reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($Hive, $RemoteComputer)
# Open Remote Sub Key
$regKey= $reg.OpenSubKey($Key)
if($regKey.ValueCount -gt 0) # check if there are Values
{$regKey.GetValue($Value)} # Return Value
}
function Get-WMIItem {
# Function Retreives a specific Item from a remote computer's WMI
param(
$Class,
$RemoteComputer=".", # If not enterd Local Computer is Selected
$Item,
$Query="", # If not enterd an empty WMI SQL Query is Entered
$Filter="" # If not enterd an empty Filter is Entered
)
if ($Query -eq "") # No Specific WMI SQL Query
{
# Execute WMI Query, Return only the Requsted Items
gwmi -Class $Class -ComputerName $RemoteComputer -Filter $Filter -Property $Item | Select $Item
}
else # User Entered a WMI SQL Query
{gwmi -ComputerName $RemoteComputer -Query $Query | select $Item}
}
function Show-NotifyIcon {
# Function Controls the Notification Icon
# Changes its Title and Text
param(
$Title,
$Text
)
# Change Notify Icon Title
$objNotifyIcon.BalloonTipTitle = $Title
# Change Notify Icon Text
$objNotifyIcon.BalloonTipText = $Text
# Show Notify Icon for 10 Secs
$objNotifyIcon.Visible = $TRUE
$objNotifyIcon.ShowBalloonTip(10000)
}
#endregion
#region Event Loop
function Main
# Main Function, Runs the Form
{
[System.Windows.Forms.Application]::EnableVisualStyles()
[System.Windows.Forms.Application]::Run($Form1)
}
#endregion
#region Event Handlers
function BrowseFile($object)
# Function for Running the OpenFileDialog
# Used when Clicking on the Browse Button
{
$OpenFileDialog1.showdialog()
$TextBox1.Text = $OpenFileDialog1.FileName
$btnRun.Enabled = $TRUE
}
function Open-File( $object ){
# Function Open the Log File
if(Test-Path $LogFile){
Invoke-Item $LogFile
}
}
function Show-PopUp
# Function for Showing Custom Pop up Forms
{
param(
$PopupTitle,
$PopupText
)
#~~< PopupForm >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$PopupForm = New-Object System.Windows.Forms.Form
$PopupForm.ClientSize = New-Object System.Drawing.Size(381, 356)
$PopupForm.ControlBox = $false
$PopupForm.ShowInTaskbar = $false
$PopupForm.StartPosition = [System.Windows.Forms.FormStartPosition]::CenterParent
$PopupForm.Text = $PopupTitle
#~~< PopupColse >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$PopupColse = New-Object System.Windows.Forms.Button
$PopupColse.Anchor = ([System.Windows.Forms.AnchorStyles]([System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right))
$PopupColse.DialogResult = [System.Windows.Forms.DialogResult]::Cancel
$PopupColse.Location = New-Object System.Drawing.Point(137, 321)
$PopupColse.Size = New-Object System.Drawing.Size(104, 23)
$PopupColse.TabIndex = 0
$PopupColse.Text = "Close"
$PopupColse.UseVisualStyleBackColor = $true
$PopupForm.AcceptButton = $PopupColse
$PopupForm.CancelButton = $PopupColse
#~~< PopupHeader >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$PopupHeader = New-Object System.Windows.Forms.Label
$PopupHeader.Font = New-Object System.Drawing.Font("Calibri", 15.75, ([System.Drawing.FontStyle]([System.Drawing.FontStyle]::Bold -bor [System.Drawing.FontStyle]::Italic)), [System.Drawing.GraphicsUnit]::Point, ([System.Byte](0)))
$PopupHeader.Location = New-Object System.Drawing.Point(137, 9)
$PopupHeader.Size = New-Object System.Drawing.Size(104, 23)
$PopupHeader.TabIndex = 2
$PopupHeader.Text = $PopupTitle
$PopupHeader.TextAlign = [System.Drawing.ContentAlignment]::MiddleCenter
#~~< PopUpTextArea >~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$PopUpTextArea = New-Object System.Windows.Forms.Label
$PopUpTextArea.Anchor = ([System.Windows.Forms.AnchorStyles]([System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right))
$PopUpTextArea.Location = New-Object System.Drawing.Point(12, 15)
$PopUpTextArea.Size = New-Object System.Drawing.Size(357, 265)
$PopUpTextArea.TabIndex = 1
$PopUpTextArea.Text = $PopupText
$PopUpTextArea.TextAlign = [System.Drawing.ContentAlignment]::MiddleLeft
$PopupForm.Controls.Add($PopupHeader)
$PopupForm.Controls.Add($PopUpTextArea)
$PopupForm.Controls.Add($PopupColse)
# Show Form
$PopupForm.Add_Shown({$PopupForm.Activate()})
[void]$PopupForm.showdialog()
}
function Show-About( $object ){
# Function Opens the About Page
$AboutText = @("
Script Title: Remote Computer Inventory`n
Script Author: Assaf Miron`n
Script Description: Collects Remote Computer Data Using WMI and Registry Access Outputs all information to a Data Grid Form and to a CSV Log File.`n
Log File Name: $LogFile")
Show-Popup -PopupTitle "About" -PopupText $AboutText
}
function Show-HowTo( $object ){
# Function Opens the Help Page
$HowToText = @("
1. Click on the Browse Button and select a TXT or a CSV File Containing Computer Names`n
2. After File is Selected click on the Run Button.`n
3. You will see a Notify Icon with the Coresponding Text.`n
4. The Script has begon collecting Remote Computer Inventory!`n
`nWhen The script is Done you will see a Popup Message and all data will be presented in the DataGrid.`n
** Because Poweshell works only in MTA mode there is no Option Copying the Data off the DataGrid...`n
5. All Data will be Exported to a Log File Located Here: $LogFile")
Show-Popup -PopupTitle "How To?" -PopupText $HowToText
}
function CloseForm($object)
# Function End the Program
{
$Form1.Close()
}
function RunScript($object)
# Function Runs the Program and starts collecting data
{
# Create an Array of Computers Enterd in the Input File
$arrComputers = Get-Content -path $textBox1.Text -encoding UTF8
# Create an Array to Keep all Computers Objects
$AllComputers = @()
# Init the Progress bar to it's Maximum Value
if(($arrComputers -is [array]) -eq $FALSE) { $ProgressBar1.Maximum = 1 }
else { $ProgressBar1.Maximum = $arrComputers.Count }
$ProgressBar1.Minimum = 0
$ProgressBar1.Value = 0
$ProgressBar1.Step = 1 # Define the Progress bar Step value
# Scan all Computers in the Array $arrComputers
foreach ($strComputer in $arrComputers)
{
# Uses the Ping Command to check if the Computer is Alive
if($Ping1.Send($strComputer).Status -eq "Success"){
Show-NotifyIcon -Title "Retriving Computer Information" -Text "Scanning $strComputer For Hardware Data"
# Collect Computer Details from Win32_computersystem Using WMI
$ComputerDet = Get-WMIItem -Class "Win32_computersystem" -RemoteComputer $strComputer -Item Caption,Domain,SystemType,Manufacturer,Model,NumberOfProcessors,TotalPhysicalMemory,UserName
if($ComputerDet.Caption.Length -gt 1) # Check to See if Any data was Collected at all
{
#region Total Memory Formating
# Check Total Physical Memory Size and Format it acourdingly
if($ComputerDet.TotalPhysicalMemory -ge 1GB){
$ComputerDet.TotalPhysicalMemory = ($ComputerDet.TotalPhysicalMemory/1GB).Tostring("# GB")} # Format to GB
else {$ComputerDet.TotalPhysicalMemory = ($ComputerDet.TotalPhysicalMemory/1MB).Tostring("# MB")} # Format to MB
#endregion
#region CPU Name
# Collect CPU Name Using WMI
$CPUName = Get-WMIItem -Class "Win32_Processor" -RemoteComputer $strComputer -Item Name
# CPU Names Can Contain Multiple Values, in Order to Insert Them into the DataGridView I Divde them to String with ";" Seperators
$arrCPUNames = @()
foreach($CPU in $CPUName){
$arrCPUNames = $CPU.Name.Trim()+";"+$arrCPUNames # the Sting of the CPU Name has White Space in The Begining - Trim It
}
#endregion
#region Operating System Data
# Collect Operating System and Service Pack Information Usin WMI
$OS = Get-WMIItem -Class "win32_operatingsystem" -RemoteComputer $strComputer -Item Caption,csdversion
#endregion
#region Chassis Type
# Collect Machine Chassis Using WMI
$ChassisType = Get-WMIItem -Class Win32_SystemEnclosure -RemoteComputer $strComputer -Item ChassisTypes
# Select Machine Chassis
switch ($ChassisType.ChassisTypes) {
1 {$ChassisType = "Other"}
2 {$ChassisType = "Unknown"}
3 {$ChassisType = "Desktop"}
4 {$ChassisType = "Low Profile Desktop"}
5 {$ChassisType = "Pizza Box"}
6 {$ChassisType = "Mini Tower"}
7 {$ChassisType = "Tower"}
8 {$ChassisType = "Portable"}
9 {$ChassisType = "Laptop"}
10 {$ChassisType = "Notebook"}
11 {$ChassisType = "Handheld"}
12 {$ChassisType = "Docking Station"}
13 {$ChassisType = "All-in-One"}
14 {$ChassisType = "Sub-Notebook"}
15 {$ChassisType = "Space Saving"}
16 {$ChassisType = "Lunch Box"}
17 {$ChassisType = "Main System Chassis"}
18 {$ChassisType = "Expansion Chassis"}
19 {$ChassisType = "Sub-Chassis"}
20 {$ChassisType = "Bus Expansion Chassis"}
21 {$ChassisType = "Peripheral Chassis"}
22 {$ChassisType = "Storage Chassis"}
23 {$ChassisType = "Rack Mount Chassis"}
24 {$ChassisType = "Sealed- PC"}
default {$ChassisType = "Unknown"}
}
#endregion
#region Automatic Updates
# Collect the Automatic Updates Options Using Registry Access
$AUOptions = Get-Reg -Hive LocalMachine -Key "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WindowsUpdate\\Auto Update" -Value "AUOptions"
# Collect the Automatic Updates Install Day Using Registry Access
$AUDay = Get-Reg -Hive LocalMachine -Key "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WindowsUpdate\\Auto Update" -Value "ScheduledInstallDay"
# Collect the Automatic Updates Install Time Using Registry Access
$AUTime = Get-Reg -Hive LocalMachine -Key "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WindowsUpdate\\Auto Update" -Value "ScheduledInstallTime"
if($AUOptions -eq $null){ # Automatic Updates is defined in Group Policy
$AUOptions = Get-Reg -Hive LocalMachine -Key "SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU" -Value "AUOptions"
$AUDay = Get-Reg -Hive LocalMachine -Key "SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU" -Value "ScheduledInstallDay"
$AUTime = Get-Reg -Hive LocalMachine -Key "SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU" -Value "ScheduledInstallTime"
}
switch ($AUOptions){ # Check Wich Automatic Update Option is Selected
1 {$AUClient = "Automatic Updates is Turnd off."}
2 {$AUClient = "Notify for download and notify for install "}
3 {$AUClient = "Auto download and notify for install "}
4 {
switch ($AUDay) # Check on What day the Automatic Update Installs
{
0 {$InstDay = "Every Day"}
1 {$InstDay = "Sunday"}
2 {$InstDay = "Monday"}
3 {$InstDay = "Tuesday"}
4 {$InstDay = "Wensday"}
5 {$InstDay = "Thursday"}
6 {$InstDay = "Friday"}
7 {$InstDay = "Saturday"}
}
# Check on What time the Automatic Update Installs
if ($AUTime -le 12) { $AUTime = $AUTime.ToString() + " AM" } else { $AUTime = ($AUTime -12) + " PM" }
$AUClient = "Auto download and schedule the install - "+$InstDay+" "+$AUTime}
Defualt {"Automatic Updates is not Set."} # No setting Collected
}
#endregion
#region Computer Total Health
# Collect Avialable Memory with WMI
$AvialableMem = Get-WMIItem -Class "Win32_PerfFormattedData_PerfOS_Memory" -RemoteComputer $strComputer -Item "AvailableMBytes"
# Collect Disk Queue,Queue Length, Processor time Data Using WMI
$DiskQueue = Get-WMIItem -Class "Win32_PerfFormattedData_PerfDisk_LogicalDisk" -RemoteComputer $strComputer -Item CurrentDiskQueueLength
$QueueLength = Get-WMIItem -Class "Win32_PerfFormattedData_PerfNet_ServerWorkQueues" -RemoteComputer $strComputer -Item QueueLength
$Processor = Get-WMIItem -Class "Win32_PerfFormattedData_PerfOS_Processor" -RemoteComputer $strComputer -Item PercentProcessorTime
$intHealth = 0 # integer for Collecting Computer Total Health
# Using the Avialable Memory to Check Computer Totla Health
if($AvialableMem.AvailableMBytes -lt 4) { $intHealth += 1; $strHealth += "Low Free Memory;" }
# Using Current Disk Queue Length to Check Computer Total Health
if($DiskQueue.CurrentDiskQueueLength -gt 2) { $intHealth += 1; $strHealth += "High Disk Queue;" }
# Using Queue Length to Check Computer Total Health
if($QueueLength.QueueLength -gt 4) { $intHealth += 1; $strHealth += "Long Disk Queue;" }
# Using Processor Time(%) to Check Computer Total Health
if($Processor.PercentProcessorTime -gt 90) { $intHealth += 1; $strHealth += "Processor Usage Over 90%;" }
# If the integer is Bigger than 1 so the computer is Unhealthy, Describe Computer Problems
# Else The Computer is Healthy
if($intHealth -gt 1) { $ComputerTotalHealth = "UnHealthy, " + $strHealth } else { $ComputerTotalHealth = "Healthy" }
#endregion
#region Avialable Memory Formating
# Format Avialable Memory MB
$AvialableMem.AvailableMBytes = $AvialableMem.AvailableMBytes.ToString("# MB")
#endregion
#region Disk Drive Info
# Collect Disk Drive Information Using WMI
$DriveInfo = Get-WMIItem -Class "Win32_LogicalDisk" -RemoteComputer $strComputer -Item Caption,Size,FreeSpace
# Format Every Drive Size and Free Space
foreach($DRSize in $DriveInfo)
{ # Check Object Size and Format Acourdingly
if($DRSize.Size -ge 1GB){
$DRSize.Size = ($DRSize.Size/1GB).ToString("# GB") } # Format to GB
else { $DRSize.Size = ($DRSize.Size/1MB).ToString("# MB") } # Format to MB
if($DRSize.FreeSpace -ge 1GB){
$DRSize.FreeSpace = ($DRSize.FreeSpace/1GB).ToString("# GB") } # Format to GB
else { $DRSize.FreeSpace = ($DRSize.FreeSpace/1MB).ToString("# MB") } # Format to MB
}
# Disk Drives Can Contain Multiple Values, in Order to Insert Them into the DataGridView I divide them to Strings with ";" Seperators
$arrDiskDrives = @()
$arrDiskSize = @()
$arrDiskFreeSpace = @()
foreach($Drive in $DriveInfo){
$arrDiskDrives = $Drive.Caption+";"+$arrDiskDrives
$arrDiskSize = $Drive.Size+";"+$arrDiskSize
$arrDiskFreeSpace = $Drive.FreeSpace+";"+$arrDiskFreeSpace
}
#endregion
#region IP Addresses
# Collect IPAddresses Using WMI, Filter only Enabled IPs
$IPAddress = Get-WmiItem -Class "Win32_NetworkAdapterConfiguration" -Filter "IPEnabled = True" -RemoteComputer $strComputer -Item IPAddress
# IPAddress Can Contain Multiple Values, in Order to Insert Them into the DataGridView I divide them to Strings with ";" Seperators
$arrIPAddress = @()
foreach($IP in $IPAddress){
$arrIPAddress = $IP.IPAddress[0]+";"+$arrIPAddress
}
#endregion
#region Time Zone
# Collect Time Zone Information Using WMI
$TimeZone = Get-WMIItem -Class "Win32_TimeZone" -RemoteComputer $strComputer -Item Bias,StandardName
$TimeZone.Bias = $TimeZone.Bias/60
#endregion
#region System Restore Status
# Collect System Restore Information Using Remote Registry
$SysRestoreStatus = Get-Reg -Hive LocalMachine -RemoteComputer $strComputer -Key "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SystemRestore" -Value "DisableSR"
if ($SysRestoreStatus -eq 0) { $SysRestoreStatus = "Enabled" } else { $SysRestoreStatus = "Disabled" }
#endregion
#region Offline Files Status
# Collect Offline Files Information Using Remote Registry
$OfflineFolStatus = Get-Reg -Hive LocalMachine -RemoteComputer $strComputer -Key "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\NetCache" -Value "Enabled"
if ($OfflineFolStatus -eq 1) { $OfflineFolStatus = "Enabled" } else { $OfflineFolStatus = "Disabled" }
#endregion
#region Printers
# Collect Printers Information Using WMI
$Printers = Get-WMIItem -Class "Win32_Printer" -RemoteComputer $strComputer -Item Name,PortName,Caption
# Printers Contain Multiple Values, in Order to Insert Them into the DataGridView I divide them to Strings with ";" Seperators
$arrPrinters = @()
foreach($Printer in $Printers){
$arrPrinters = $Printer.Name+"("+$Printer.PortName+");"+$arrPrinters
}
#endregion
#region BIOS Serial Number
# Collect BIOS Serial Number Using WMI
$BIOSSN = Get-WMIItem -Class "Win32_Bios" -RemoteComputer $strComputer -Item SerialNumber
#endregion
#region Network Drives
# Collect Network Drives Using WMI
$NetDrives = Get-WMIItem -Query "Select * From Win32_LogicalDisk Where DriveType = 4" -RemoteComputer $strComputer -Item DeviceID,ProviderName
# Network Drives Contain Multiple Values, in Order to Insert Them into the DataGridView I divide them to Strings with ";" Seperators
$arrNetDrives = @()
foreach($NetDrive in $NetDrives){
$arrNetDrives = $NetDrive.DeviceID+"("+$NetDrive.ProviderName+");"+$arrNetDrives
}
#endregion
#region Anti-Virus Client Data
# Collect Anti-Virus Info Using Remote Registry
$AVParentServer = Get-Reg -Hive LocalMachine -RemoteComputer $strComputer -Key "SOFTWARE\\Intel\\LANDesk\\VirusProtect6\\CurrentVersion" -Value "Parent"
# Read the Anti-Virus Virus Definition File and Format it to an actual Date
$VirusDefFile = "C:\\Program Files\\Common Files\\Symantec Shared\\VirusDefs\\definfo.dat"
If(Test-Path $VirusDefFile){
$AVDefs = Get-Content $VirusDefFile | where { $_ -match "CurDefs" }
$AVDefs = $AVDefs.Substring(8)
$AVDefs = [datetime]($AVDefs.Substring(5,1) + "/" + $AVDefs.Substring(6,2) + "/" + $AVDefs.substring(0,4))
}
Else { $AVDefs = "" }
#endregion
#region Operating Systems Hotfixes
# Collect all Hotfix Information Using WMI
$HotFixes = Get-WMIItem -Class "Win32_QuickFixEngineering" -RemoteComputer $strComputer -Item Description,HotFixID,ServicePackInEffect
# HotFixes Contain Multiple Values, in Order to Insert Them into the DataGridView I divide them to Strings with ";" Seperators
$arrHotFixes = @()
foreach($Fix in $HotFixes){
if($Fix.Description -eq ""){
if($Fix.HotFixID -eq "File 1"){ $arrHotFixes = $Fix.ServicePackInEffect+";"+$arrHotFixes }
else { $arrHotFixes =$Fix.HotFixID+";"+$arrHotFixes }
}
else { $arrHotFixes = $Fix.Description+";"+$arrHotFixes }
}
#endRegion
#region Remote Desktop Status
# Collect Remote Desktop Protocol Status Using Remote Registry
$RDPStatus = Get-Reg -Hive LocalMachine -remoteComputer $strComputer -Key "SYSTEM\\CurrentControlSet\\Control\\Terminal Server" -Value "fAllowToGetHelp"
if($RDPStatus -eq 0) {$RDPStatus = "Enabled" } else {$RDPStatus = "Disabled" }
#endregion
#region Remote Assistance Status
# Collect Remote Assistance Status Using Remote Registry
$RAStatus = Get-Reg -Hive LocalMachine -remoteComputer $strComputer -Key "SYSTEM\\CurrentControlSet\\Control\\Terminal Server" -Value "fDenyTSConnections"
if($RAStatus -eq 1) {$RAStatus = "Enabled" } else {$RAStatus = "Disabled" }
#endregion
# Change the Notify Icon to Show Exporting Text
Show-NotifyIcon -Text "Exporting $strComputer Information" -Title "Exporting..."
#region Check the Null Valued Paramters
# If one of the Parameters are Null, Enter Space (looks better in the Table)
if($ComputerDet -eq $Null){ $ComputerDet = " " }
if($ChassisType -eq $Null){ $ChassisType = " " }
if($BIOSSN -eq $Null){ $BIOSSN = " " }
if($CPUName -eq $Null){ $CPUName = " " }
if($AvialableMem -eq $Null){ $AvialableMem = " " }
if($OS -eq $Null){ $OS = " " }
if($SP -eq $Null){ $SP = " " }
if($IPAddress -eq $Null){ $IPAddress = " " }
if($HotFixes -eq $Null){ $HotFixes = " " }
if($arrDiskDrives -eq $Null){ $arrDiskDrives=" " }
if($arrDiskFreeSpace -eq $Null){ $arrDiskFreeSpace=" " }
if($arrDiskSize -eq $Null){ $arrDiskSize=" " }
if($RDPStatus -eq $Null){ $RDPStatus = " " }
if($RAStatus -eq $Null){ $RAStatus = " " }
if($AUClient -eq $Null){ $AUClient = " " }
if($AVParentServer -eq $Null){ $AVParentServer = " " }
if($AVDefs -eq $Null){ $AVDefs = " " }
if($Printers -eq $Null){ $Printers = " " }
if($ComputerTotalHealth -eq $Null){ $ComputerTotalHealth = " " }
#endregion
#region Creating the Data Object - $DataObject
# Create an Empty psObject, $DataObjcet - Used by this Name in the Join-Data Function
$DataObject = New-Object psobject
# Join all the Data to the DataObject
$ComputerDet | Join-Data # Contians Multiple Values, No need to Define a Name
$ChassisType | Join-Data -objName "Chassis Type" # String with no Values - Define a Name
$BIOSSN | Join-Data # Contians Multiple Values, No need to Define a Name
$CPUName | Join-Data # Contians Multiple Values, No need to Define a Name
$AvialableMem | Join-Data # Contians Multiple Values, No need to Define a Name
$OS.Caption | Join-Data -objName "Operating System" # Contians Multiple Values, Caption Value canot be overwritten - Define a Name to a certian Value
$OS.CsdVersion | Join-Data -objName "Service Pack" # String with no Values - Define a Name
$arrIPAddress | Join-Data -objName "IP Addresses" # String with no Values - Define a Name
$arrHotFixes| Join-Data -objName "HotFixes" # String with no Values - Define a Name
$arrDiskDrives| Join-Data -objName "Disk Drives" # String with no Values - Define a Name
$RDPStatus.ToString() | Join-Data -objName "Remote Desktop" # String with no Values - Define a Name
$RAStatus.ToString() | Join-Data -objName "Remote Assistance" # String with no Values - Define a Name
$AUClient | Join-Data -objName "Automatic Updates" # String with no Values - Define a Name
$AVParentServer | Join-Data -objName "Anti-Virus Server" # String with no Values - Define a Name
$AVDefs | Join-Data -objName "Anti-Virus Defs" # String with no Values - Define a Name
$arrPrinters | Join-Data -objName "Printers" # String with no Values - Define a Name
$ComputerTotalHealth | Join-Data -objName "Computer Totla Health" # String with no Values - Define a Name
#endregion
$AllComputers += $DataObject
#region Exporting data
# Export the DataObject to the DataGridView Using the out-DataTable
$DataTable = $AllComputers | out-dataTable
# Define Data Grid's Data Source to the DataTable we Created
$DataGridView1.DataSource = $DataTable.psObject.baseobject
$DataGridView1.Refresh() # Refresh the Table View in order to View the new lines
# Export all the Data to the Log File
$DataObject | Export-Csv -Encoding OEM -Path $LogFile
#endregion
}
}
else { # No Ping to Computer
$objNotifyIcon.BalloonTipIcon = "Error"
Show-NotifyIcon -Title "$strComputer is not avialable" -Text "No Ping to $strComputer.`nNo Data was Collected"
$objNotifyIcon.BalloonTipIcon = "Info"
}
$ProgressBar1.PerformStep()
}
#region Finishing - Script is Done
# Assign an Icon and Icon Type For the NotifyIcon Object
$objNotifyIcon.Icon = "D:\\Assaf\\Scripts\\Icons\\XP\\people5.ico"
$objNotifyIcon.BalloonTipIcon = "Info"
# Pop Up a Message box
$MSGObject = new-object -comobject wscript.shell
$MSGResult = $MSGObject.popup("Script Has Finished Running!",0,"I'm Done",0)
# Show Notify Icon with Finishing Text
$objNotifyIcon.BalloonTipText = "Done!`nFile Saved in "+$LogFile
$objNotifyIcon.Visible = $TRUE
$objNotifyIcon.ShowBalloonTip(10000)
$objNotifyIcon.Visible = $FALSE # Set to False so that the Notify Icon will Disapear after the Script is Done
#endregion
}
Main # This call must remain below all other event functions
#endregion
|
combined_dataset/train/non-malicious/sample_21_35.ps1
|
sample_21_35.ps1
|
# virtualenv activation module
# Activate with `overlay use activate.nu`
# Deactivate with `deactivate`, as usual
#
# To customize the overlay name, you can call `overlay use activate.nu as foo`,
# but then simply `deactivate` won't work because it is just an alias to hide
# the "activate" overlay. You'd need to call `overlay hide foo` manually.
export-env {
def is-string [x] {
($x | describe) == 'string'
}
def has-env [...names] {
$names | each {|n|
$n in $env
} | all {|i| $i == true}
}
# Emulates a `test -z`, but btter as it handles e.g 'false'
def is-env-true [name: string] {
if (has-env $name) {
# Try to parse 'true', '0', '1', and fail if not convertible
let parsed = (do -i { $env | get $name | into bool })
if ($parsed | describe) == 'bool' {
$parsed
} else {
not ($env | get -i $name | is-empty)
}
} else {
false
}
}
let virtual_env = '/home/babakks/workspace/vscode-juju-charms-ide/.tox/py'
let bin = 'bin'
let is_windows = ($nu.os-info.family) == 'windows'
let path_name = (if (has-env 'Path') {
'Path'
} else {
'PATH'
}
)
let venv_path = ([$virtual_env $bin] | path join)
let new_path = ($env | get $path_name | prepend $venv_path)
# If there is no default prompt, then use the env name instead
let virtual_env_prompt = (if ('' | is-empty) {
($virtual_env | path basename)
} else {
''
})
let new_env = {
$path_name : $new_path
VIRTUAL_ENV : $virtual_env
VIRTUAL_ENV_PROMPT : $virtual_env_prompt
}
let new_env = (if (is-env-true 'VIRTUAL_ENV_DISABLE_PROMPT') {
$new_env
} else {
# Creating the new prompt for the session
let virtual_prefix = $'(char lparen)($virtual_env_prompt)(char rparen) '
# Back up the old prompt builder
let old_prompt_command = (if (has-env 'PROMPT_COMMAND') {
$env.PROMPT_COMMAND
} else {
''
})
let new_prompt = (if (has-env 'PROMPT_COMMAND') {
if 'closure' in ($old_prompt_command | describe) {
{|| $'($virtual_prefix)(do $old_prompt_command)' }
} else {
{|| $'($virtual_prefix)($old_prompt_command)' }
}
} else {
{|| $'($virtual_prefix)' }
})
$new_env | merge {
PROMPT_COMMAND : $new_prompt
VIRTUAL_PREFIX : $virtual_prefix
}
})
# Environment variables that will be loaded as the virtual env
load-env $new_env
}
export alias pydoc = python -m pydoc
export alias deactivate = overlay hide activate
|
combined_dataset/train/non-malicious/Get VMs on a LUN.ps1
|
Get VMs on a LUN.ps1
|
function Get-LunVM {
param($Lun)
Get-VM | Where {
$_ | Get-Stat -stat disk.write.average -realtime -maxsamples 1 `
-erroraction SilentlyContinue |
Where { $_.Instance -eq $Lun } }
}
|
combined_dataset/train/non-malicious/sample_3_71.ps1
|
sample_3_71.ps1
|
#$debug = $false
# Load Common Library:
. ./utils_cts.ps1
# Load DSD Common Function Library
. ./utils_DSD.ps1
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
$FirstTimeExecution = FirstTimeExecution
if ($FirstTimeExecution) {
# Auto Added Commands [AutoAdded]
.\TS_AutoAddCommands_SQLsetup.ps1
EndDataCollection
} else {
#2nd execution. Delete the temporary flag file then exit
EndDataCollection -DeleteFlagFile $True
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBCSCP6D/UvddkN
# U+rJp18S47vwzHYW6TOLG7NKRLK3zaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGDi
# NiC84fE1g403LEm7IXuQ13vx435CcDWuRtFrXvGlMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEALWg6xCwzN3TYzNq5vgUoSCHjH5eXdxV+ZYKx
# 6R/wY/kKtEPcNTz5EGANBbahPymsXPG7rkX4eJgkE5SsyGt40MxxwVltHOZ5fu3r
# yuy6BGWjtWp7wDUJHZurkdPIL5NtqWEM+UsMnNJSG+SelCQKAYSLDJKQgJDHon5l
# VuYiCmHTZ9Muqf2J9EvjVeWkiXUgW3/pwXqurnpvLaIWHpVgi1sw+SHxWjMbHsbD
# qJtvvMDJzKZaA1akOvtYukrBsCLLPO+JyrZvsbBmkhcUaXtUVYK0h4Y6cTv20rBq
# V9bn/aHQe0U7Tdil4AQjpCdkZo005jwEiCnhQTJWt/GM5q3+I6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB4zwHg1okCN3RBEPp8O3+qLUqVHLMi/rkh
# axrgGVCxAgIGZut+oGE/GBMyMDI0MTAyODExNDAzOS41NjNaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big
# r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF
# RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts
# urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF
# 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83
# 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ
# t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l
# RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT
# shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+
# vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7
# 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A
# SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt
# weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc
# D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL
# 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO
# RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H
# WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn
# jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va
# iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC
# 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K
# tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW
# wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w
# fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0
# MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA
# AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l
# eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L
# fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M
# Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a
# tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao
# 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgBmIqSvibfB1MYDY5O3b8Cdbm6eFRFDLwsdy4IJsdtHAwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3
# d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU
# R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAHovv3T2KxndlhP58K501PMeJQFhKLUF
# dGR9ziJwnI50zgt35R8YWMOXcHJyUYAV/U9Se89/rHlYYPDY3e60Z95ps/0tbbQv
# juz1ZmuPF3PK35eXJ39pLDAOocB1OzaEbvJvE+7FnqhP1aY98RUJR64k3b4UkXsg
# uYdL79SR5JH7fYDGwqZshnrhuzNGw74PO/T0aqrM/Hy9ReU0qdr/v3ekDpuI8Jii
# r5kT6QjGv/+Bdm41AbZmppnQFoWC7xz+CXHcdnc6hR88RMkFHKlAsq3hNYEVxKZV
# Dr6hz+Vxs5oloy1YjyBWOdCaH9y15ynYDnMNYgkdG5DBwoQZasxpNdFUDZMVwQLB
# vpI+kHenwBXR+VwFU778HAN5eHpTuHgoWjatnZ27sICeS9Zd8lUFmyk2SNeLDenw
# URpoHaCnjODcRqVidjPv/J7IBcdn9vMRDXJnxkSRyNFVzqJKfPuxNqtnlFEGbsMs
# 99l7SVkB87mRzTzp7XdoTC0/1EAuRyU6THuYnJ0KjO2MWXROSHT6ftJtE2S1A22y
# lS+J/U52nubrPj0yyVgQVaZum9GRSGAThqWnOIs+YWupjVqrSyJoyKYiSwza1l64
# 7ZefM9J7ohIuITz3DSuZQ2RNjEUgZrmeRXAIhldgikAXRyMmzWse9FTB1ZTpYx5V
# 53sEptnUlEsa
# SIG # End signature block
|
combined_dataset/train/non-malicious/3300.ps1
|
3300.ps1
|
function New-PoshBotCardResponse {
[Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseShouldProcessForStateChangingFunctions', '', Scope='Function', Target='*')]
[cmdletbinding()]
param(
[ValidateSet('Normal', 'Warning', 'Error')]
[string]$Type = 'Normal',
[switch]$DM,
[string]$Text = [string]::empty,
[string]$Title,
[ValidateScript({
$uri = $null
if ([system.uri]::TryCreate($_, [System.UriKind]::Absolute, [ref]$uri)) {
return $true
} else {
$msg = 'ThumbnailUrl must be a valid URL'
throw [System.Management.Automation.ValidationMetadataException]$msg
}
})]
[string]$ThumbnailUrl,
[ValidateScript({
$uri = $null
if ([system.uri]::TryCreate($_, [System.UriKind]::Absolute, [ref]$uri)) {
return $true
} else {
$msg = 'ImageUrl must be a valid URL'
throw [System.Management.Automation.ValidationMetadataException]$msg
}
})]
[string]$ImageUrl,
[ValidateScript({
$uri = $null
if ([system.uri]::TryCreate($_, [System.UriKind]::Absolute, [ref]$uri)) {
return $true
} else {
$msg = 'LinkUrl must be a valid URL'
throw [System.Management.Automation.ValidationMetadataException]$msg
}
})]
[string]$LinkUrl,
[System.Collections.IDictionary]$Fields,
[ValidateScript({
if ($_ -match '^
return $true
} else {
$msg = 'Color but be a valid hexidecimal color code e.g.
throw [System.Management.Automation.ValidationMetadataException]$msg
}
})]
[string]$Color = '
[object]$CustomData
)
$response = [ordered]@{
PSTypeName = 'PoshBot.Card.Response'
Type = $Type
Text = $Text.Trim()
Private = $PSBoundParameters.ContainsKey('Private')
DM = $PSBoundParameters['DM']
}
if ($PSBoundParameters.ContainsKey('Title')) {
$response.Title = $Title
}
if ($PSBoundParameters.ContainsKey('ThumbnailUrl')) {
$response.ThumbnailUrl = $ThumbnailUrl
}
if ($PSBoundParameters.ContainsKey('ImageUrl')) {
$response.ImageUrl = $ImageUrl
}
if ($PSBoundParameters.ContainsKey('LinkUrl')) {
$response.LinkUrl = $LinkUrl
}
if ($PSBoundParameters.ContainsKey('Fields')) {
$response.Fields = $Fields
}
if ($PSBoundParameters.ContainsKey('CustomData')) {
$response.CustomData = $CustomData
}
if ($PSBoundParameters.ContainsKey('Color')) {
$response.Color = $Color
} else {
switch ($Type) {
'Normal' {
$response.Color = '
}
'Warning' {
$response.Color = '
}
'Error' {
$response.Color = '
}
}
}
[pscustomobject]$response
}
Export-ModuleMember -Function 'New-PoshBotCardResponse'
|
combined_dataset/train/non-malicious/sample_64_35.ps1
|
sample_64_35.ps1
|
# Copyright (C) Microsoft Corporation. All rights reserved.
#
# Module manifest for module 'ProvisioningTestModule'
#
@{
# Version number of this module.
ModuleVersion = '1.0'
# ID used to uniquely identify this module
GUID = '05218365-87aa-4f63-80d3-2f5af78231a0'
# Author of this module
Author = 'Microsoft'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Copyright (C) Microsoft Corporation. All rights reserved.'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('ProvisioningTestHelper.dll')
# Functions to export from this module
FunctionsToExport = @('Install-TestEVCert', 'ConvertTo-SignedXml', 'Test-SignedXml', 'Install-RootCertFromFile')
}
# SIG # Begin signature block
# MIIl1wYJKoZIhvcNAQcCoIIlyDCCJcQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBdRENz7HwBWl79
# TY9Bi7C9LuskbStNom+zvJCohxQKEKCCC3YwggT+MIID5qADAgECAhMzAAAFVskg
# Kx90Ml0tAAAAAAVWMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTExWhcNMjQxMDE2MTk1MTExWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCW2kg89zWnssiDG9AFq/sxqkPT43V4MZ6vwu7C4+sly46QJA4UNxSRnGDz9u8f
# 18OR1/Ar9guQDqRthrOOktLaol49HZfv8l1DEeB/uguWS0qFIJe+cK6b7grVfl0S
# Z7U8yOXu67n52z+QJN+iUxcIk0KWcu/sJZ8KfewKxnNDMDIHHhUHvIjQWhvKxOLC
# /TwL0i4wTykXuQwbwIZuuGi7TYA82Q2LkYOLlwOTPOb0eowhcUI7CaXlU30IgoG4
# frY+mtZMZnTx0ga/a36GVNdq6NeBKzlGbLB02/WIP+c5ADDCXsheWpkizJt9aPhz
# Yuont+Nx0OhIH04lJFvCqjljAgMBAAGjggF9MIIBeTAfBgNVHSUEGDAWBgorBgEE
# AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUJt8FhQFwX7g5A/0elDxkjww82dow
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwODY1KzUwMTY1NTAfBgNVHSMEGDAW
# gBTm/F97uyIAWORyTrX0IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v
# Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0Ff
# MjAxMC0wNy0wNi5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEw
# LTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBCnZlo
# MxjHBVHJEP6d+0t7EDJfNB0h7j9iOX6LQiPMdQAV1xqA6Jgb/VEPSEVs076CAJn3
# KP5Jpr4DOuo12BE2CoCusZDHn+7aP2yxngMGGQcJKz4UfOzDMS9Yr2sl3R6fMP18
# T4Ce5t7IYFK36PI/HfvHO8AzB3T0KhVIifqsSwZ8mEukw/wi4duJYulYxV2lY2kM
# Hwv/OKvKAsrTd338HlnuR+z9NZvStNUi1a8sTwcEMrEP8lgtoxaZe0Ypu/Ohn4Pq
# TefEVWKQJLU2KFyLDkoamDde0ydAzzHYEqdBQMW0gxWyvJ9fjgF/C2PKQVu/0SMB
# hcwo04eFzf/w7pZ/MIIGcDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0B
# AQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAG
# A1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAw
# HhcNMTAwNzA2MjA0MDE3WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
# aWduaW5nIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
# 6Q5kUHlntcTj/QkATJ6UrPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9
# RJwI6GWTzixVhL99COMuK6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjW
# axeUOpPOJj/s5v40mFfVHV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkc
# vR3EVWJXcvhnuSUgNN5dpqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YAS
# NUwSpr5SW/Wm2uCLC0h31oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZ
# M4BqiU2jamZjeJPVMM+VHwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAw
# HQYDVR0OBBYEFOb8X3u7IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoA
# UwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY
# MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6
# Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1
# dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0
# dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3J0MIGdBgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9Bggr
# BgEFBQcCARYxaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k
# ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABp
# AGMAeQBfAFMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
# GnTvV08pe8QWhXi4UNMi/AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1
# b6/lf3mVd+UC1PHr2M1OHhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMh
# KeWloWmMIpPMdJjnoUdD8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJ
# N2FtB91TGcun1mHCv+KDqw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCq
# tq27ckdjF/qm1qKmhuyoEESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW
# 77Gcf/wiS0mKbhXjpn92W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14y
# jPs3hdHcdYWch8ZaV4XCv90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaX
# evfpUk30dwVPhcbYC/GO7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19x
# HkCvmGXJIuhCISWKHC1g2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQ
# HTiVmx5mMxMnORd4hzbOTsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlac
# vyRdUQKdannSF9PawZSOB3slcUSrBmrm1MbfI5qWdcUxghm3MIIZswIBATCBlTB+
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9N
# aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEwAhMzAAAFVskgKx90Ml0tAAAA
# AAVWMA0GCWCGSAFlAwQCAQUAoIHGMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAY
# kZwHMjGYOXzdZHkBbuJt3CUvY3Ijs11q7Z6s2TQm5TBaBgorBgEEAYI3AgEMMUww
# SqAkgCIATQBpAGMAcgBvAHMAbwBmAHQAIABXAGkAbgBkAG8AdwBzoSKAIGh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS93aW5kb3dzMA0GCSqGSIb3DQEBAQUABIIBAIuW
# P+XIEsKn3eSR4Jb7rp3l/X5W0sfwtex1AkJLWaw04A6ujGxU05601WwtQGu+7swa
# ATDTv2leUolN2O/BJbU7/+8/cPk5dZwqZUxWMjKLhUDTgjLPCGUgWUNUav4Pl/iD
# PvCUVEQjre+SS4QKmRU/gXpO9pdjYw7ECkozX7VkPd3D93EHnoZVCd6mFZFAtvKu
# 0yp/X/L8raOr3fWGzTYWBmSjSkdkt8auTeCCEdFJoXz1ggQfDpPnhJvXEb60Fnhb
# 7CK7z+t2aoxBET2cP6TPLtzigDumcZUcFdUooNVbyLxH8mypdkX5dpomWgxoZnoT
# 3H6aR9zq6npgxeEIzY6hghcpMIIXJQYKKwYBBAGCNwMDATGCFxUwghcRBgkqhkiG
# 9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcNAQkQ
# AQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
# qTz2Y02NQW3ApPOcJE04V8cPkHHlpvj9yYqz1EEc+JcCBmX8p+UpAhgTMjAyNDA0
# MDEwMDEzMzAuNTgxWjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EXgwggcnMIIFD6ADAgECAhMzAAAB3MHgjMJfWF6OAAEAAAHcMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5MDcw
# NloXDTI1MDExMDE5MDcwNlowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMg
# TGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZELUVFQkEx
# JTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqG
# SIb3DQEBAQUAA4ICDwAwggIKAoICAQCLyLMgNbI4PZEiic3pa1FheUoamFi/N2pp
# 90hOSciFT1Auxeqk3C6YYR2fYnX9tX9EWhq1PBB8nRfDcTzEdilTYgLQhjyWvJFd
# Qhr5923hgdptpbZqiWpxu9ZgMsK5CgE2J4sCiz0CydNBJF8OU0sH5iV23YECxZR8
# nwOSoPqVLCV86rppCLxK9A1z76bQBqpHRSysKOAU5RIJ783k317pM1/L0LUwC31S
# bk1IEVO86D/0RVrd1moGoWelJaCNBQvF5QUA1Q1+SXjBLMe44CQ3RJyuOGPIB7hF
# kQ6vkhvV6NBiDo4rk1g+br975RJiAMkf+60hb3C58AKjHanMv4qkDzJQznHdAG54
# j/ImtQUBFJ32U91Mcivaywf0kYij8hw5YPKFsF8or9/mxgenZnTOtbq+p1LXw3+d
# ZT3CoSuFaPN6ThNf54lpVZxB0FfTSefw21Eqltkak1Gtjtirr7MkRjBIIxiQNdv0
# qq0apbxNn4jeWZmVbakj1miGrMe2tBgfn3U8PoHkZ+jKNkuvv22RMEv9CCeYHCho
# pzW38kNca71lz7V8yjn45Ie+Ykbl6LqxlT0apJs+VGM/kecmzCVo/pn3Bqs9oV1f
# ImZwmQwa652Yr5xKwjIeRZX4POPeqU9KYY1Ex9hgoRyLxOEg0pNocFj/7hwfYBLP
# Kf/T3v5rfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOhz0gXdDnxF97jVrHZEq2lB
# nt3bMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYw
# VKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jv
# c29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcB
# AQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lv
# cHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSku
# Y3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P
# AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDZ62/BMK/Hl/x9bCrd658Ew8eA
# KoB25DDUKPpFBsAiDV0t8tRlHHarCv0dYOk3+7TcdatDaSpNSU7qVCXx3RMSrZLo
# RwPvNpU+8iEqf2O+HaidN0Qk+EPvKKEF0zM8YnsHxK1S7fFnn3m53Ek9IusqSr/O
# 6QmJMTNuG26mzP1fjOVQaaQlLO0fnBE4s/8xANQG2S/74l7R5q8gNAhnfj7fXPmn
# bGH5u6nuVDJ0tH/2CZhBDJBKhlws8iyvnYflLBYtHeJZHXBPmauSTYyB3rF9cM7R
# lQLb19A2A2XTdlmdZJPoTjG5VFfy/J9WFs4T/+V0J2JdNwH1xK5/tRGrcpYn83dw
# oSdcbhhu+mG1oIkV5w7wosA6r1CXr1UWNasuMuL5VSmkobW3X4D8hnnif2HEgTjT
# nNAzU1m4zGy+dKniBAtJR0qS9q0WDVbt4bB8xvJ+buQkGoz8MfT86bGSHhUzR8lR
# epLoyOFaPTbzv8xfDreOCDI+DO1F/WWuEMBn+Qe9ceezo2l+d4MU+L86B7xAVxfa
# gph0YFwS20aJiXw5+tGpc7+3aQlUCLkNOtp8iGSp7F8c7ihW9E411sOjhaRtW7I1
# 6TqOQzB5MrK4m8R6K+GM+XWY1chwDciqNG0qwJVXooXGhuRe+EmU/BbchwFuiIC3
# OcP9w/kdaGw4SmdtVjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw
# DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
# cml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg
# 4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aO
# RmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41
# JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5
# LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL
# 64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9
# QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj
# 0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqE
# UUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0
# kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435
# UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB
# 3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTE
# mr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwG
# A1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV
# HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNV
# HQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo
# 0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29m
# dC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5j
# cmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDAN
# BgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4
# sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th54
# 2DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRX
# ud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew
# VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0
# DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+Cljd
# QDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFr
# DZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFh
# bHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7n
# tdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+
# oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6Fw
# ZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZE
# LUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVABw5/3M/t8kZCFAiX0my93Y50BKmoIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDptFSyMCIY
# DzIwMjQwNDAxMDUzMTMwWhgPMjAyNDA0MDIwNTMxMzBaMHQwOgYKKwYBBAGEWQoE
# ATEsMCowCgIFAOm0VLICAQAwBwIBAAICCq4wBwIBAAICEtswCgIFAOm1pjICAQAw
# NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC
# AQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAzzWST753JKSrZ+p+k20rjOQhup92X
# alEXhLlnUobTEBV5QiNy/gNRtWrD4GHgM1tGMeILvWcRML46JgWB44ipZOa6CbRv
# 5Qyz3C9P3gcq25gO09OcGqSpCsaWknrI724fEupqULrvFzb3zjjltumZ5llLpEUN
# zDK0q380jZrsijGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMA0GCWCGSAFlAwQCAQUAoIIBSjAa
# BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEICW6NYle
# gS+gZen9ELquoEyknYhFS7sYKLzUkvFVsVs4MIH6BgsqhkiG9w0BCRACLzGB6jCB
# 5zCB5DCBvQQgU6cXimrZRD+MvKmc47li9DrtCKsRCw4V9ky8pcSCDTcwgZgwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzCX1hejgAB
# AAAB3DAiBCDjmMgWYarcmUlcZlkpmC9Ss3sUQojMJkKDmFv4ivDjoTANBgkqhkiG
# 9w0BAQsFAASCAgBbloar/aABVumo2hYIOUvBJSMSpIm3HXn6yVtZQdRdtJfmlBm6
# aZDr8ci9VYxBZ3MQa0ZlcN1Xst34/+r/nVVOctl4GnN9qFogryvrH9VM8OT/K6er
# AEH/YGse5vcE0leHsgXWqSrh7UT3V6ggvQDkSW5wKWXZ503EhRyKxMQDyAJelheq
# ME9pT19m0NHIWzbKTfZxe9vDfKWCckcvUVPO2aRyJo4rcTDh+aucnX2lOC6uebnD
# AXxlgSBHoFxP3eQxeyLoyMaiFKZslbbPkr/AFIvCC567FUn5YObLJ1NUxX9yjFS9
# PcM0kJusrejEOL66wmdi1/NLvoeQkJK0UZm2JeDBqiez7fXvwQ+QTsMNlQne2fP/
# I58cYlUUUEqpsAbAb/QxJ8jZx10gSbMj2f95d1mb59UqwGK8bRs1/yai1d3E6KbL
# RO75wM0qytLqWmbo0f9vvl6R3FxFwPWGUR2r5wQS+bnGYAmQXl/Picaa6bDaJIMe
# CYhu899ZvU1ogcVzrG6lfvqdz6rl9iyBOUgWRKY1bPX7vQpJFvU91FvAe/Npjrq2
# plsE5RZmV0dXQ2Kpjwzh0ayZIyt3+89oyeTK1bpId524twXxluJrus1xBnAdH0Zu
# /aDNdsys9TDgxnjf4Eh0dwM16DsJ5dnVa4EbMpgO4xkBZ4lg8ZYhjuTzyw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/33.ps1
|
33.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-DeviceConfigurationPolicy(){
[cmdletbinding()]
$graphApiVersion = "Beta"
$DCP_resource = "deviceManagement/deviceConfigurations"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Export-JSONData(){
param (
$JSON,
$ExportPath
)
try {
if($JSON -eq "" -or $JSON -eq $null){
write-host "No JSON specified, please specify valid JSON..." -f Red
}
elseif(!$ExportPath){
write-host "No export path parameter set, please provide a path to export the file" -f Red
}
elseif(!(Test-Path $ExportPath)){
write-host "$ExportPath doesn't exist, can't export JSON Data" -f Red
}
else {
$JSON1 = ConvertTo-Json $JSON -Depth 5
$JSON_Convert = $JSON1 | ConvertFrom-Json
$displayName = $JSON_Convert.displayName
$DisplayName = $DisplayName -replace '\<|\>|:|"|/|\\|\||\?|\*', "_"
$Properties = ($JSON_Convert | Get-Member | ? { $_.MemberType -eq "NoteProperty" }).Name
$FileName_CSV = "$DisplayName" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".csv"
$FileName_JSON = "$DisplayName" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".json"
$Object = New-Object System.Object
foreach($Property in $Properties){
$Object | Add-Member -MemberType NoteProperty -Name $Property -Value $JSON_Convert.$Property
}
write-host "Export Path:" "$ExportPath"
$Object | Export-Csv -LiteralPath "$ExportPath\$FileName_CSV" -Delimiter "," -NoTypeInformation -Append
$JSON1 | Set-Content -LiteralPath "$ExportPath\$FileName_JSON"
write-host "CSV created in $ExportPath\$FileName_CSV..." -f cyan
write-host "JSON created in $ExportPath\$FileName_JSON..." -f cyan
}
}
catch {
$_.Exception
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$ExportPath = Read-Host -Prompt "Please specify a path to export the policy data to e.g. C:\IntuneOutput"
$ExportPath = $ExportPath.replace('"','')
if(!(Test-Path "$ExportPath")){
Write-Host
Write-Host "Path '$ExportPath' doesn't exist, do you want to create this directory? Y or N?" -ForegroundColor Yellow
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
new-item -ItemType Directory -Path "$ExportPath" | Out-Null
Write-Host
}
else {
Write-Host "Creation of directory path was cancelled..." -ForegroundColor Red
Write-Host
break
}
}
Write-Host
$DCPs = Get-DeviceConfigurationPolicy
foreach($DCP in $DCPs){
write-host "Device Configuration Policy:"$DCP.displayName -f Yellow
Export-JSONData -JSON $DCP -ExportPath "$ExportPath"
Write-Host
}
Write-Host
|
combined_dataset/train/non-malicious/sample_43_3.ps1
|
sample_43_3.ps1
|
function Initialize-AzDataProtectionRestoreRequest
{
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.IAzureBackupRestoreRequest')]
[CmdletBinding(PositionalBinding=$false, DefaultParameterSetName='AlternateLocationFullRecovery')]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Description('Initializes Restore Request object for triggering restore on a protected backup instance.')]
param(
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory, HelpMessage='Datasource Type')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory, HelpMessage='Datasource Type')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory, HelpMessage='Datasource Type')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory, HelpMessage='Datasource Type')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory, HelpMessage='Datasource Type')]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Support.DatasourceTypes]
${DatasourceType},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory, HelpMessage='DataStore Type of the Recovery point')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory, HelpMessage='DataStore Type of the Recovery point')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory, HelpMessage='DataStore Type of the Recovery point')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory, HelpMessage='DataStore Type of the Recovery point')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory, HelpMessage='DataStore Type of the Recovery point')]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Support.DataStoreType]
${SourceDataStore},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Id of the recovery point to be restored.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Id of the recovery point to be restored.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Id of the recovery point to be restored.')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='Id of the recovery point to be restored.')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Id of the recovery point to be restored.')]
[System.String]
${RecoveryPoint},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Point In Time for restore.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Point In Time for restore.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Point In Time for restore.')]
# [Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Point In Time for restore.')]
[System.DateTime]
${PointInTime},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Rehydration duration for the archived recovery point to stay rehydrated, default value for rehydration duration is 15.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Rehydration duration for the archived recovery point to stay rehydrated, default value for rehydration duration is 15.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Rehydration duration for the archived recovery point to stay rehydrated, default value for rehydration duration is 15.')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='Rehydration duration for the archived recovery point to stay rehydrated, default value for rehydration duration is 15.')]
# [Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Rehydration duration for the archived recovery point to stay rehydrated, default value for rehydration duration is 15.')]
[System.String]
${RehydrationDuration},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Rehydration priority for archived recovery point. This parameter is mandatory for rehydrate restore of archived points.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Rehydration priority for archived recovery point. This parameter is mandatory for rehydrate restore of archived points.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Rehydration priority for archived recovery point. This parameter is mandatory for rehydrate restore of archived points.')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='Rehydration priority for archived recovery point. This parameter is mandatory for rehydrate restore of archived points.')]
# [Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Rehydration priority for archived recovery point. This parameter is mandatory for rehydrate restore of archived points.')]
[ValidateSet("Standard")]
[System.String]
${RehydrationPriority},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory, HelpMessage='Target Restore Location')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory, HelpMessage='Target Restore Location')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory, HelpMessage='Target Restore Location')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory, HelpMessage='Target Restore Location')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory, HelpMessage='Target Restore Location')]
[System.String]
${RestoreLocation},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory, HelpMessage='Restore Target Type')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory, HelpMessage='Restore Target Type')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory, HelpMessage='Restore Target Type')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory, HelpMessage='Restore Target Type')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory, HelpMessage='Restore Target Type')]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Support.RestoreTargetType]
${RestoreType},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory, HelpMessage='Backup Instance object to trigger original localtion restore.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory, HelpMessage='Backup Instance object to trigger original localtion restore.')]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.BackupInstanceResource]
${BackupInstance},
# this is applicable to all workloads wherever ALR supported.
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory, HelpMessage='Specify the target resource ID for restoring backup data in an alternate location. For instance, provide the target database ARM ID that you want to restore to, for workloadType AzureDatabaseForPostgreSQL.')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory, HelpMessage='Specify the target resource ID for restoring backup data in an alternate location. For instance, provide the target database ARM ID that you want to restore to, for workloadType AzureDatabaseForPostgreSQL.')]
[System.String]
${TargetResourceId},
# this parameter is being used in OSS cross subscription restore as files
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='Target storage account container ARM Id to which backup data will be restored as files. This parameter is required for restoring as files when cross subscription restore is disabled on the backup vault.')]
[System.String]
${TargetResourceIdForRestoreAsFile},
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory, HelpMessage='Target storage account container Id to which backup data will be restored as files.')]
[System.String]
${TargetContainerURI},
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='File name to be prefixed to the restored backup data.')]
[System.String]
${FileNamePrefix},
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory, HelpMessage='Switch parameter to enable item level recovery.')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory, HelpMessage='Switch parameter to enable item level recovery.')]
[Switch]
${ItemLevelRecovery},
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Container names for Item Level Recovery.')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Container names for Item Level Recovery.')]
[System.String[]]
${ContainersList},
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Use this parameter to filter block blobs by prefix in a container for alternate location ILR. When you specify a prefix, only blobs matching that prefix in the container will be restored. Input for this parameter is a hashtable where each key is a container name and each value is an array of string prefixes for that container.')]
[Hashtable]
${PrefixMatch},
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Specify the blob restore start range for PITR. You can use this option to specify the starting range for a subset of blobs in each container to restore. use a forward slash (/) to separate the container name from the blob prefix pattern.')]
# [Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Minimum matching value for Item Level Recovery.')]
[System.String[]]
${FromPrefixPattern},
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Specify the blob restore end range for PITR. You can use this option to specify the ending range for a subset of blobs in each container to restore. use a forward slash (/) to separate the container name from the blob prefix pattern.')]
# [Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Maximum matching value for Item Level Recovery.')]
[System.String[]]
${ToPrefixPattern},
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Restore configuration for restore. Use this parameter to restore with AzureKubernetesService.')]
[Parameter(ParameterSetName="AlternateLocationILR", Mandatory=$false, HelpMessage='Restore configuration for restore. Use this parameter to restore with AzureKubernetesService.')]
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Restore configuration for restore. Use this parameter to restore with AzureKubernetesService.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Restore configuration for restore. Use this parameter to restore with AzureKubernetesService.')]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.KubernetesClusterRestoreCriteria]
${RestoreConfiguration},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Secret uri for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Secret uri for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Secret uri for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='Secret uri for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[System.String]
${SecretStoreURI},
[Parameter(ParameterSetName="OriginalLocationFullRecovery", Mandatory=$false, HelpMessage='Secret store type for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[Parameter(ParameterSetName="AlternateLocationFullRecovery", Mandatory=$false, HelpMessage='Secret store type for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[Parameter(ParameterSetName="OriginalLocationILR", Mandatory=$false, HelpMessage='Secret store type for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[Parameter(ParameterSetName="RestoreAsFiles", Mandatory=$false, HelpMessage='Secret store type for secret store authentication of data source. This parameter is only supported for AzureDatabaseForPostgreSQL currently.')]
[ValidateSet("AzureKeyVault")]
[Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Support.SecretStoreTypes]
${SecretStoreType}
)
process
{
# Validations
$parameterSetName = $PsCmdlet.ParameterSetName
$restoreRequest = $null
$restoreMode = $null
$manifest = LoadManifest -DatasourceType $DatasourceType.ToString()
# Choose Restore Request Type Based on Recovery Point ID/ Time
if(($RecoveryPoint -ne $null) -and ($RecoveryPoint -ne ""))
{
Write-Debug -Message $RecoveryPoint
if($PSBoundParameters.ContainsKey("RehydrationPriority")){
$restoreRequest = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.AzureBackupRestoreWithRehydrationRequest]::new()
$restoreRequest.ObjectType = "AzureBackupRestoreWithRehydrationRequest"
$restoreRequest.RehydrationPriority = $RehydrationPriority
if($PSBoundParameters.ContainsKey("RehydrationDuration")){
$restoreRequest.RehydrationRetentionDuration = "P" + $RehydrationDuration + "D"
}
else{
$restoreRequest.RehydrationRetentionDuration = "P15D"
}
}
else{
$restoreRequest = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.AzureBackupRecoveryPointBasedRestoreRequest]::new()
$restoreRequest.ObjectType = "AzureBackupRecoveryPointBasedRestoreRequest"
}
$restoreRequest.RecoveryPointId = $RecoveryPoint
$restoreMode = "RecoveryPointBased"
}
elseif(($PointInTime -ne $null) -and ($PointInTime -ne "")) # RecoveryPointInTimeBasedRestore
{
$utcTime = $PointInTime.ToUniversalTime().ToString("yyyy-MM-ddTHH:mm:ss.0000000Z")
Write-Debug -Message $utcTime
$restoreRequest = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.AzureBackupRecoveryTimeBasedRestoreRequest]::new()
$restoreRequest.ObjectType = "AzureBackupRecoveryTimeBasedRestoreRequest"
$restoreRequest.RecoveryPointTime = $utcTime
$restoreMode = "PointInTimeBased"
}
else{
$errormsg = "Please input either RecoveryPoint or PointInTime parameter"
throw $errormsg
}
#Validate Restore Options = recoverypoint, ALR, OLR, ILR
ValidateRestoreOptions -DatasourceType $DatasourceType -RestoreMode $restoreMode -RestoreTargetType $RestoreType -ItemLevelRecovery $ItemLevelRecovery -SecretStoreURI $SecretStoreURI
# Initialize Restore Target Info based on Type provided
if($RestoreType -eq "RestoreAsFiles")
{
$restoreRequest.RestoreTargetInfo = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.RestoreFilesTargetInfo]::new()
$restoreRequest.RestoreTargetInfo.ObjectType = "RestoreFilesTargetInfo"
if($manifest.fileNamePrefixDisabled -and $PSBoundParameters.ContainsKey("FileNamePrefix")){
$errormsg = "FileNamePrefix can't be set for given DatasourceType. Please try again after removing FileNamePrefix parameter"
throw $errormsg
}
elseif($manifest.fileNamePrefixDisabled -and !($PSBoundParameters.ContainsKey("TargetContainerURI"))){
$errormsg = "TargetContainerURI parameter is required for RestoreAsFiles for given DatasourceType"
throw $errormsg
}
elseif( !$manifest.fileNamePrefixDisabled -and (!($PSBoundParameters.ContainsKey("FileNamePrefix")) -or !($PSBoundParameters.ContainsKey("TargetContainerURI"))) ){
$errormsg = "FileNamePrefix and TargetContainerURI parameters are required for RestoreAsFiles for given DatasourceType"
throw $errormsg
}
if($manifest.fileNamePrefixDisabled){
$restoreRequest.RestoreTargetInfo.TargetDetail.FilePrefix = "dummyprefix"
}
else{
$restoreRequest.RestoreTargetInfo.TargetDetail.FilePrefix = $FileNamePrefix
}
$restoreRequest.RestoreTargetInfo.TargetDetail.RestoreTargetLocationType = "AzureBlobs"
$restoreRequest.RestoreTargetInfo.TargetDetail.Url = $TargetContainerURI
# mandatory for Cross Subscription restore scenario for OSS
if(($PSBoundParameters.ContainsKey("TargetResourceIdForRestoreAsFile"))){
$restoreRequest.RestoreTargetInfo.TargetDetail.TargetResourceArmId = $TargetResourceIdForRestoreAsFile
}
}
elseif(!($ItemLevelRecovery))
{
# RestoreTargetInfo for OLR ALR Full recovery
if($DatasourceType -ne "AzureKubernetesService"){
$restoreRequest.RestoreTargetInfo = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.RestoreTargetInfo]::new()
$restoreRequest.RestoreTargetInfo.ObjectType = "restoreTargetInfo"
}
else{
$restoreRequest.RestoreTargetInfo = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.ItemLevelRestoreTargetInfo]::new()
$restoreRequest.RestoreTargetInfo.ObjectType = "itemLevelRestoreTargetInfo"
$restoreCriteriaList = @()
# ItemLevelRecovery for AzureKubernetesService
if($RestoreConfiguration -ne $null){
$restoreCriteria = $RestoreConfiguration
}
else{
$errormsg = "Please input parameter RestoreConfiguration for AKS cluster restore. Use command New-AzDataProtectionRestoreConfigurationClientObject for creating the RestoreConfiguration"
throw $errormsg
}
$restoreCriteriaList += ($restoreCriteria)
$restoreRequest.RestoreTargetInfo.RestoreCriterion = $restoreCriteriaList
}
}
else
{
# ILR: ItemLevelRestoreTargetInfo
$restoreRequest.RestoreTargetInfo = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.ItemLevelRestoreTargetInfo]::new()
$restoreRequest.RestoreTargetInfo.ObjectType = "itemLevelRestoreTargetInfo"
$restoreCriteriaList = @()
# can generalise this condition to manifest level if needed
if($DatasourceType -ne "AzureKubernetesService"){ # TODO: remove Datasource dependency
if(($RecoveryPoint -ne $null) -and ($RecoveryPoint -ne "") -and $ContainersList.length -gt 0){
$hasPrefixMatch = $PSBoundParameters.Remove("PrefixMatch")
for($i = 0; $i -lt $ContainersList.length; $i++){
$restoreCriteria = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.ItemPathBasedRestoreCriteria]::new()
$restoreCriteria.ObjectType = "ItemPathBasedRestoreCriteria"
$restoreCriteria.ItemPath = $ContainersList[$i]
$restoreCriteria.IsPathRelativeToBackupItem = $true
if($hasPrefixMatch){
$pathPrefix = $PrefixMatch[$ContainersList[$i]]
if($pathPrefix -ne $null -and !($pathPrefix -is [Array])){
throw "values for PrefixMatch must be string array for each container"
}
$restoreCriteria.SubItemPathPrefix = $pathPrefix
}
# adding a criteria for each container given
$restoreCriteriaList += ($restoreCriteria)
}
}
elseif($ContainersList.length -gt 0){
for($i = 0; $i -lt $ContainersList.length; $i++){
$restoreCriteria = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.RangeBasedItemLevelRestoreCriteria]::new()
$restoreCriteria.ObjectType = "RangeBasedItemLevelRestoreCriteria"
$restoreCriteria.MinMatchingValue = $ContainersList[$i]
$restoreCriteria.MaxMatchingValue = $ContainersList[$i] + "-0"
# adding a criteria for each container given
$restoreCriteriaList += ($restoreCriteria)
}
}
elseif($FromPrefixPattern.length -gt 0){
if(($FromPrefixPattern.length -ne $ToPrefixPattern.length) -or ($FromPrefixPattern.length -gt 10) -or ($ToPrefixPattern.length -gt 10)){
$errormsg = "FromPrefixPattern and ToPrefixPattern parameters maximum length can be 10 and must be equal "
throw $errormsg
}
for($i = 0; $i -lt $FromPrefixPattern.length; $i++){
$restoreCriteria = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.RangeBasedItemLevelRestoreCriteria]::new()
$restoreCriteria.ObjectType = "RangeBasedItemLevelRestoreCriteria"
$restoreCriteria.MinMatchingValue = $FromPrefixPattern[$i]
$restoreCriteria.MaxMatchingValue = $ToPrefixPattern[$i]
# adding a criteria for each container given
$restoreCriteriaList += ($restoreCriteria)
}
}
else{
$errormsg = "Provide ContainersList or Prefixes for Item Level Recovery"
throw $errormsg
}
}
else{
# ItemLevelRecovery for AzureKubernetesService
if($RestoreConfiguration -ne $null){
$restoreCriteria = $RestoreConfiguration
}
else{
$errormsg = "Please input parameter RestoreConfiguration for AKS cluster restore. Use command New-AzDataProtectionRestoreConfigurationClientObject for creating the RestoreConfiguration"
throw $errormsg
}
$restoreCriteriaList += ($restoreCriteria)
}
$restoreRequest.RestoreTargetInfo.RestoreCriterion = $restoreCriteriaList
}
# Fill other fields of Restore Object based on inputs given
$restoreRequest.SourceDataStoreType = $SourceDataStore
$restoreRequest.RestoreTargetInfo.RestoreLocation = $RestoreLocation
if($RestoreType -eq "AlternateLocation"){
if(($TargetResourceId -eq $null) -or ($TargetResourceId -eq ""))
{
$errormsg = "Please input TargetResourceId for alternate location recovery"
throw $errormsg
}
$resourceId = $TargetResourceId
}
elseif($RestoreType -eq "OriginalLocation"){
if(($BackupInstance -eq $null) -or ($BackupInstance -eq ""))
{
$errormsg = "Please input BackupInstance for original location recovery"
throw $errormsg
}
$resourceId = $BackupInstance.Property.DataSourceInfo.ResourceId
}
if( ($resourceId -ne $null) -and ($resourceId -ne "") )
{
# set DatasourceInfo for OLR, ALR, OriginalLocationILR
$restoreRequest.RestoreTargetInfo.DatasourceInfo = GetDatasourceInfo -ResourceId $resourceId -ResourceLocation $RestoreLocation -DatasourceType $DatasourceType
if($manifest.isProxyResource -eq $true)
{
$restoreRequest.RestoreTargetInfo.DatasourceSetInfo = GetDatasourceSetInfo -DatasourceInfo $restoreRequest.RestoreTargetInfo.DatasourceInfo -DatasourceType $DatasourceType
}
}
# secret store authentication
if($PSBoundParameters.ContainsKey("SecretStoreURI"))
{
if($manifest.supportSecretStoreAuthentication -eq $true){
if(!($PSBoundParameters.ContainsKey("SecretStoreType")))
{
$errormsg = "Please input SecretStoreType"
throw $errormsg
}
$restoreRequest.RestoreTargetInfo.DatasourceAuthCredentials = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.SecretStoreBasedAuthCredentials]::new()
$restoreRequest.RestoreTargetInfo.DatasourceAuthCredentials.ObjectType = "SecretStoreBasedAuthCredentials"
$restoreRequest.RestoreTargetInfo.DatasourceAuthCredentials.SecretStoreResource = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.SecretStoreResource]::new()
$restoreRequest.RestoreTargetInfo.DatasourceAuthCredentials.SecretStoreResource.SecretStoreType = $SecretStoreType
$restoreRequest.RestoreTargetInfo.DatasourceAuthCredentials.SecretStoreResource.Uri = $SecretStoreURI
}
else{
$errormsg = "Please ensure that secret store based authentication is supported for given data source"
throw $errormsg
}
}
return $restoreRequest
}
}
# SIG # Begin signature block
# MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCGO9YAL8ayswwE
# h1T6urRZtqrAgYgPn01Qr7+IkqDd7aCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEPV
# i+gKO9X94A6QdoQPw1+2p5Eqs6i6+aYw7pncJAU/MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAyT8V3RK8NXWt4UIIumaFNTRbiYiSYBl2OG5O
# Dw0PT1cdnz1iTkjGOCWx1k342uMF1HMsS77ncP5mveoFTy9Vxjiy2PkbdiVZPK5s
# V/RTNu7kP8ONEmpks/fo+l/uHN2m3eP9hETqhm3cZ6dvpYWjA5ksUdelNqgDwtM2
# 6xgNG1pseEk4A/D7ryjWOW1d7BciIcmmTO0QDSNWf3c67VV/TowSZgIPLfao/JJG
# AQXh7mEKwBQHB534HwwVjP1gYna5gIPTg1jkt8JzJK1hozphAMGo3GInhwWAySxI
# +OaUzaPIqLNEeHL48yETO1S/DH0+3kE6MULJIOcDb4tsYcBtJ6GCFywwghcoBgor
# BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDEBuK32vXe71hT72gVvaBO06A3xh+ptuD4
# RfI5pw4uygIGZh/GsphRGBMyMDI0MDQyMzEzMTUxNC4xNzlaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHj372b
# mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k
# DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N
# EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35
# fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/
# jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB
# P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q
# Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs
# bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c
# Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo
# jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ
# 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb
# udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1
# 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0
# sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX
# JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL
# iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ
# 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms
# CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es
# DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq
# zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub
# 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy
# 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE
# 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnSLW4wIhgPMjAyNDA0MjMyMDUxNThaGA8yMDI0MDQy
# NDIwNTE1OFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dItbgIBADAKAgEAAgIC
# 3QIB/zAHAgEAAgIklzAKAgUA6dN+7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA
# A4GBAL5g/H2OsBvN7sRsWQpifcZ3xYuCaQCapfehI/sIyCMsEeFt/2Io5kSBiNhw
# ofo99Xxk/KCzCACcFbyA216UwvxZQbZWgBcarXLP7Rn9Q+U10U19mENvKVuFTzZt
# 3+19K/W7+QQ4Y0MOWaYZuM2O+a3lHbrYuq3jAheJ+WJ8OBwrMYIEDTCCBAkCAQEw
# gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIA
# AQAAAeMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B
# CRABBDAvBgkqhkiG9w0BCQQxIgQg67xuOqgc182305aNbabdC/qI9FryIm8ZODMP
# Qv18iYgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjW
# vcIWuDJcQbdgq8Ndj0xyMuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMCIEIAjbaHNr0MEVS4sdIKFz
# DEisoKgKMPqA12+DiwHa14RcMA0GCSqGSIb3DQEBCwUABIICABL3xzDbG7k+ymf5
# 1JUzac8mDHZGJnTPQWNwzuY3xwoTrYtDgDljntz5aguUoRIRchMAeufIyONHjwrR
# VFifHmeh5ciDrQEPQUKzOw2BkeQlMd4BgKdUCwP3Kbgl9CDIkoSWqCydl8nCTMGV
# ki9QhIGuv3Jnr5wQDrjVMpLEx9vWOWQ1RJeaTlpcd7IIQ+0c5ws5wPqAicivqDiq
# QM1mARjt3LmatrTyscdX6ipzD+up3ROVUAsg7nosOLs93VRFKnGm+Oqjte2z03XC
# nXz7ANpcMb40JQyeEBv/bcBeYLbYdYpzOxL3MB/TIlm6hxjOLdSc5Br0GNXljCeO
# nhxHEDwp4ptirEdR+NdfRjfNNPEA0de4b7cJn7ySDIPvIjoVcnHkBPo2LST9TN8V
# gdUwRqHmkLOG0W99pDorI7UKD/+OYjC7eSZ8NxHW9YhTMczuP+9IGAMIWxBZ3hGy
# 4WMPrmUZJr93XPuyXA9SVJiDytsf+tAlGAZldyfcvinJqrkFqFO6lQ98Xh42KaEw
# rA++kCq86gWrWHO4ek2depVocdUtRU9f3GepwUDXBT+VdaU9YyqkYyTdNlmYaGdv
# +HemKj2ET0q3jyxEb2Sr4lxZFjMl4Xxc/ls20w6wHMzrWh14xLVY2V0IX1+pBgxT
# 4pbUoXFiutN0x7+0S59RkpUpf/IR
# SIG # End signature block
|
combined_dataset/train/non-malicious/1478.ps1
|
1478.ps1
|
function Set-ModuleManifestMetadata
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
$ManifestPath,
[string[]]
$Tag,
[string]
$ReleaseNotesPath
)
Set-StrictMode -Version 'Latest'
$releaseNotes = Get-ModuleReleaseNotes -ManifestPath $ManifestPath -ReleaseNotesPath $ReleaseNotesPath
$manifest = Test-ModuleManifest -Path $ManifestPath
if( -not $manifest )
{
return
}
$module = Import-Module -Force -Name $manifestPath -PassThru
$foundTags = $false
$foundReleaseNotes = $false
$inReleaseNotes = $false
$releaseNotesWhitespacePrefix = ''
$moduleManifestLines = Get-Content -Path $manifestPath |
ForEach-Object {
$line = $_
if( $inReleaseNotes )
{
if( $line -match '^(''|")@$' )
{
$inReleaseNotes = $false
$foundReleaseNotes = $true
return '{0}ReleaseNotes = @{1}{2}{3}{2}{1}@' -f $releaseNotesWhitespacePrefix,$Matches[1],[Environment]::NewLine,$releaseNotes.Trim()
}
return
}
if( $line -match '^(\s+)ReleaseNotes\ =\ @(''|")$' )
{
$inReleaseNotes = $true
$releaseNotesWhitespacePrefix = $Matches[1]
return
}
if( $line -match '^(\s+)Tags\ =\ @\(' )
{
$foundTags = $true
return '{0}Tags = @(''{1}'')' -f $Matches[1],($Tag -join ''',''')
}
return $_
}
if( -not $foundTags )
{
Write-Error -Message ('PrivateData PSData hashtable missing Tags metadata. Please add `Tags = @()` to the PSData section of {0} and re-run.' -f $ManifestPath)
return
}
if( -not $foundReleaseNotes )
{
Write-Error -Message (@"
PrivateData PSData hasthable missing ReleaseNotes metadata. Please add a `ReleaseNotes` key to the PSData hashtable whose value is an empty here string, e.g.
PrivateData = @{
PSData = @{
ReleaseNotes = @'
'@
}
}
"@)
return
}
$moduleManifestLines | Set-Content -Path $ManifestPath
}
|
combined_dataset/train/non-malicious/The Letter Diamond Oneli.ps1
|
The Letter Diamond Oneli.ps1
|
&{Param([char]$l)$s=66;$z=[int]$l;$o=$z-$s+ 5;$p=-1;$n=&{"$(" "*$o)A";([string[]][char[]]($s..$z))|%{$p+=2;$o--;"$(" "*$o)$_$(" "*$p)$_"}};$n;$n[$($n.Length-2)..0]}L
|
combined_dataset/train/non-malicious/LoadModuleConfig_1.ps1
|
LoadModuleConfig_1.ps1
|
################################################################################
## Script Name: LoadModuleConfig
## Created On: 01/21/2010
## Author: Thell Fowler
## File: LoadModuleConfig.ps1
## Usage: Called from the NestedModules value from a module manifest.
## Version: 1.0.1.0
## Purpose: Provides automated loading of local configuration data.
##
## Requirements: PowerShell Version 2
## Last Updated: 01/23/2010
## History:
## 1.0.1.0 01/21/2010 - TBF - Made Add-Member calls forceful.
## 1.0.0.0 01/21/2010 - TBF - Initial implementation.
##
##
################################################################################
<#
To make use of this script use new-modulemanifest to create a manifest named
the with the same name as the manifest you are loading data for but with an
extension of 'config.psd1'
Enter LoadModuleConfig.ps1 in the NestedModules field.
After creating the manifest open it in your editor and edit the PrivateData
field to include hashes for LocalUser and Settings. After the Settings key
add values as you see fit.
Here is an example, as used in the FuncGuard module.
# Private data to pass to the module specified in ModuleToProcess
PrivateData = @{
"LocalUser" = @{
"Settings"=@{
"ActiveConfiguration" = "PSUnit"
"Configurations"=@{
"PSUnit" =@{
"Name"="PSUnit";
"Path"=$(join-path -Path $Env:Temp -ChildPath "FuncGuard.PSUnit");
"Prefix"="PSUNIT"
}
}
}
}
}
After loading the module a global variable will be available with a name
convention of $($ModuleName)Settings and the values can be accessed using
normal hash retrieval.
$config = $FuncGuardSettings["Configurations"].$($FuncGuardSettings["ActiveConfiguration"])
$Path = $config.Path
#>
#requires -version 2.0
Set-StrictMode -Version 2
$Module = $ExecutionContext.SessionState.Module
if (! $Module) {
throw ( New-Object System.Management.Automation.SessionStateException `
"An active module was not found! LoadModuleConfig must be run from a module manifest's NestedModules field.")
}
$ModuleName = $Module.Name.Replace(".config",$null)
$AppData = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::LocalApplicationData)
$ModuleConfigPath = join-path -Path $AppData `
-ChildPath "WindowsPowerShell\\Modules\\$ModuleName\\$ModuleName.config.xml"
$configurations = $null
if ( Test-Path $ModuleConfigPath -PathType Leaf ) {
$configurations = Import-Clixml -Path $ModuleConfigPath
} else {
# Generate new default config file.
$configurations = $Module.PrivateData.LocalUser.Settings
Export-Clixml -InputObject $configurations -Path $ModuleConfigPath
}
if ($configurations) {
Add-Member -InputObject $configurations -Name ModuleName -MemberType NoteProperty -force `
-Value $ModuleName
Add-Member -InputObject $configurations -Name Export -MemberType ScriptMethod -force `
-Value {
$AppData = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::LocalApplicationData)
$ModuleConfigPath = join-path -Path $AppData `
-ChildPath "WindowsPowerShell\\Modules\\$ModuleName\\$($this.ModuleName).config.xml"
Export-Clixml -InputObject $this -Path $ModuleConfigPath
}
Set-Variable -Name "$($ModuleName)Settings" -Value $($configurations) -Scope Global `
-Description "$($ModuleName) module configuration settings."
}
|
combined_dataset/train/non-malicious/scriptable telnet client_2.ps1
|
scriptable telnet client_2.ps1
|
function read-stream ([Parameter(Position=0,Mandatory=$true)][validatenotnull()]
[System.Net.Sockets.NetworkStream]$stream,
[String]$expect = "")
{
$buffer = new-object system.byte[] 1024
$enc = new-object system.text.asciiEncoding
## Read all the data available from the stream, writing it to the
## screen when done.
## Allow data to buffer
start-sleep -m 100
$output = ""
while($stream.DataAvailable -or $output -notmatch $expect)
{
$read = $stream.Read($buffer, 0, 1024)
$output = "$output$($enc.GetString($buffer, 0, $read))"
## Allow data to buffer for a bit
start-sleep -m 100
}
$output.split("`n")
}
function send-command ([parameter(position=0,Mandatory=$true)][validatenotnull()]
[String]$hostname,
[parameter(position=1,Mandatory=$true)][validatenotnull()]
[String]$User,
[parameter(position=2,Mandatory=$true)][validatenotnull()]
[String]$Password,
[parameter(position=3,Mandatory=$true,valuefrompipeline=$true)][validatenotnull()]
[String]$InputObject,
[string]$Expect = "")
{
begin
{
$sock = new-object system.net.sockets.tcpclient($hostname,23)
$str = $sock.GetStream()
$wrt = new-object system.io.streamwriter($str)
read-stream($str)
$wrt.writeline($user)
$wrt.flush()
read-stream($str)
$wrt.writeline($password)
$wrt.flush()
read-stream($str, $expect)
}
process
{
$wrt.writeline($InputObject)
$wrt.flush()
read-stream($str, $expect)
}
end
{
$wrt.writeline("exit")
$wrt.flush()
read-stream($str)
## Close the streams
$wrt.Close()
$str.Close()
$sock.close()
}
}
|
combined_dataset/train/non-malicious/sample_40_6.ps1
|
sample_40_6.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmsynthetics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmsynthetics.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b2901c22-2813-4f21-ae94-09094aa70e0e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmsynthetics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmsynthetics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmsyntheticsDedicatedVantagePoint',
'Get-OCIApmsyntheticsDedicatedVantagePointsList',
'Get-OCIApmsyntheticsMonitor', 'Get-OCIApmsyntheticsMonitorResult',
'Get-OCIApmsyntheticsMonitorsList',
'Get-OCIApmsyntheticsOnPremiseVantagePoint',
'Get-OCIApmsyntheticsOnPremiseVantagePointsList',
'Get-OCIApmsyntheticsPublicVantagePointsList',
'Get-OCIApmsyntheticsScript', 'Get-OCIApmsyntheticsScriptsList',
'Get-OCIApmsyntheticsWorker', 'Get-OCIApmsyntheticsWorkersList',
'Invoke-OCIApmsyntheticsAggregateNetworkData',
'New-OCIApmsyntheticsDedicatedVantagePoint',
'New-OCIApmsyntheticsMonitor',
'New-OCIApmsyntheticsOnPremiseVantagePoint',
'New-OCIApmsyntheticsScript', 'New-OCIApmsyntheticsWorker',
'Remove-OCIApmsyntheticsDedicatedVantagePoint',
'Remove-OCIApmsyntheticsMonitor',
'Remove-OCIApmsyntheticsOnPremiseVantagePoint',
'Remove-OCIApmsyntheticsScript', 'Remove-OCIApmsyntheticsWorker',
'Update-OCIApmsyntheticsDedicatedVantagePoint',
'Update-OCIApmsyntheticsMonitor',
'Update-OCIApmsyntheticsOnPremiseVantagePoint',
'Update-OCIApmsyntheticsScript', 'Update-OCIApmsyntheticsWorker'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmsynthetics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_24_7.ps1
|
sample_24_7.ps1
|
#
# Module manifest for module 'OCI.PSModules.Aispeech'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aispeech.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '101b9a53-66d0-4458-870f-5f2f3debb208'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aispeech Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aispeech.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAispeechTranscriptionJob',
'Get-OCIAispeechTranscriptionJobsList',
'Get-OCIAispeechTranscriptionTask',
'Get-OCIAispeechTranscriptionTasksList',
'Move-OCIAispeechTranscriptionJobCompartment',
'New-OCIAispeechTranscriptionJob',
'Remove-OCIAispeechTranscriptionJob',
'Stop-OCIAispeechTranscriptionJob',
'Stop-OCIAispeechTranscriptionTask',
'Update-OCIAispeechTranscriptionJob'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aispeech'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/384.ps1
|
384.ps1
|
Describe "Remove-PSFNull Unit Tests" -Tag "CI", "Pipeline", "Unit" {
It "Should have the designed for parameters & sets" {
(Get-Command Remove-PSFNull).ParameterSets.Name | Should -Be '__AllParameterSets'
foreach ($key in (Get-Command Remove-PSFNull).Parameters.Keys)
{
$key | Should -BeIn 'InputObject', 'AllowEmptyStrings', 'AllowEmptyCollections', 'Enumerate', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable'
}
}
It "Should allow only non-null values through" {
1, 2, 3, $null, 4 | Remove-PSFNull | Should -Be 1, 2, 3, 4
1, 2, 3, "", 4 | Remove-PSFNull | Should -Be 1, 2, 3, 4
1, 2, 3, @(), 4 | Remove-PSFNull | Should -Be 1, 2, 3, 4
}
It "Should properly implement exceptions" {
1, $null, 2, "", 3, @(), 4 | Remove-PSFNull | Should -Be 1, 2, 3, 4
1, $null, 2, "", 3, @(), 4 | Remove-PSFNull -AllowEmptyStrings | Should -Be 1, 2, "", 3, 4
1, $null, 2, "", 3, @(), 4 | Remove-PSFNull -AllowEmptyCollections | Should -Be 1, 2, 3, @(), 4
1, $null, 2, "", 3, @(), 4 | Remove-PSFNull -AllowEmptyStrings -AllowEmptyCollections | Should -Be 1, 2, "", 3, @(), 4
}
It "Should not enumerate objects unless asked to" {
( ,@(1, 2, 3) | Remove-PSFNull | Measure-Object).Count | Should -Be 1
( ,@(1, 2, 3) | Remove-PSFNull -Enumerate | Measure-Object).Count | Should -Be 3
}
}
|
combined_dataset/train/non-malicious/sample_16_75.ps1
|
sample_16_75.ps1
|
#
# Module manifest for module 'Microsoft.SME.SdnManagement'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Microsoft.SME.SdnManagement.psm1'
# Version number of this module.
ModuleVersion = '3.0.45'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'eff0ccfc-c7bd-490f-bac9-7b1d56e312b3'
# Author of this module
Author = 'SME'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = ''
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @(
'Find-PacketMonCounters',
'Find-VMwithVMGuid',
'Get-BgpInfoFromMuxs',
'Get-BuildNumber',
'Get-BuildValue',
'Get-Capture',
'Get-ClusterNodeVMs',
'Get-ClusterNodesSdn',
'Get-Components',
'Get-FrontEndIPConfigurationIPAddress',
'Get-FrontEndPrivateIPAddress',
'Get-FrontEndPublicIPAddress',
'Get-GWCPUHistoryTimeSeries',
'Get-GWThroughputHistoryTimeSeries',
'Get-GatewayCPULive',
'Get-GatewayConnections',
'Get-GatewayManagerServerName',
'Get-GatewayPools',
'Get-GatewayPools2',
'Get-GatewayPoolsHealthInfo',
'Get-GatewayPoolsInfo',
'Get-GatewayThroughputLive',
'Get-HostName',
'Get-IPAddressesofServer',
'Get-IPSecGatewayRemoteExternalipAddress',
'Get-IPSecGatewaySourceIpAddress',
'Get-IPV4AddressesofVM',
'Get-IPV4AddresswithDefaultGateway',
'Get-IPV4andIPV6AddressesofVM',
'Get-InboundFrontEndIPConfigurationIPAddress',
'Get-InboundNetworkInterfaceServerName',
'Get-InternalLoadbalancingRuleFrontIPAddress',
'Get-L3ScenarioGateway',
'Get-L3TenantVLanSubnet',
'Get-LoadBalancer',
'Get-LoadBalancerHealthInfo',
'Get-LoadBalancerMuxes',
'Get-LoadBalancingRuleFrontendIPConfiguations',
'Get-LogicalNetworks',
'Get-LogicalSubnets',
'Get-MUXThroughputHistoryTimeSeries',
'Get-MUXThroughputLive',
'Get-MultiSiteNetworkControllerSiteInformation',
'Get-MuxsVMInfo',
'Get-NCEssentialInfo',
'Get-NCNodeInfo',
'Get-NCNodeNames',
'Get-NCReplicaStatus',
'Get-NCRsatStatus',
'Get-NCUri',
'Get-NCVMMStatus',
'Get-NetworkAdapters',
'Get-NetworkControllerCertificate',
'Get-NetworkControllerCluster',
'Get-NetworkControllerGatewayExternalIPAddress',
'Get-NetworkControllerGatewayNames',
'Get-NetworkControllerGatewayResources',
'Get-NetworkControllerLoadBalancerMux',
'Get-NetworkControllerNcUriServers',
'Get-NetworkControllerServerCertificates',
'Get-NetworkControllerServerName',
'Get-NetworkControllerServers',
'Get-NetworkInterfaceHostName',
'Get-NetworkInterfacePrivateIPAddress',
'Get-NetworkInterfaceVMName',
'Get-Networkcontroller',
'Get-NetworkcontrollerHealthInfo',
'Get-PacketDetails',
'Get-PublicIpAddress',
'Get-PublicIpAddresses',
'Get-SDNConfigData',
'Get-SDNConfigurationEvents',
'Get-SLBEssentialInfo',
'Get-SLBHostAgentState',
'Get-SLBMultiplexer',
'Get-SLBPublicPrivateNetworks',
'Get-ServerInfo',
'Get-SourceVMServerName',
'Get-VMGuid',
'Get-VMNames',
'Get-VMSwitches',
'Get-VirtualIPPoolHealthInfo',
'Import-NetworkControllerCertificate',
'Import-NetworkControllerRestCertificate',
'Install-RsatNetworkController',
'New-PublicIpAddress',
'New-SDNExpressLite',
'Ping-VMwithRouterIP',
'Remove-MultisiteConfiguration',
'Remove-PublicIpAddress',
'Set-MultisiteConfiguration',
'Set-MultisiteConfigurationNames',
'Set-MultisiteConfigurationPrimary',
'Set-NCNodeNames',
'Start-Capture',
'Start-IPSecGatewayScenarioDIPHostCapture',
'Start-IPSecGatewayScenarioGatewayHostCapture',
'Start-IPSecGatewayScenarioMUXHostCapture',
'Start-InboundNatScenarioMuxHostCapture',
'Start-InboundNatScenarioServerCapture',
'Start-InternalLoadBalancingDIPCapture',
'Start-InternalLoadBalancingDIPServerCapture',
'Start-InternalLoadBalancingMUXCapture',
'Start-InternalLoadBalancingMUXDIPServerCapture',
'Start-InternalLoadBalancingServerCapture',
'Start-L3GatewayScenarioDIPCapture',
'Start-L3GatewayScnearioCapture',
'Start-LoadBalancingMuxHostCapture',
'Start-LoadBalancingServerCapture',
'Start-NetworkControllerGatewayandHostCapture',
'Start-NetworkControllerHostCapture',
'Start-NetworkControllerMuxandHostCapture',
'Start-NetworkControllerNodeGatewayCommunicationCapture',
'Start-NetworkControllerNodeMuxCommunicationCapture',
'Start-NetworkControllerServerCapture',
'Start-OutboundNatCapture',
'Start-OutboundNatMuxHostCapture',
'Start-PktmonCounter',
'Start-PktmonUnloadandFilter',
'Start-PublicIPScnearioMuxHostCaputure',
'Start-PublicIPScnearioVMandHostCaputure',
'Start-VMtoVMConnectionCapture',
'Start-VMtoVMConnectionVM1HostCapture',
'Start-VMtoVMConnectionVM2HostCapture',
'Stop-Capture',
'Test-MultisiteConfiguration',
'Test-RSATOnGateway',
'Update-PublicIpAddress',
'Add-FolderShare',
'Add-FolderShareNameUser',
'Add-FolderShareUser',
'Compress-ArchiveFileSystemEntity',
'Disable-KdcProxy',
'Disable-SmbOverQuic',
'Edit-FolderShareInheritanceFlag',
'Edit-FolderShareUser',
'Edit-SmbFileShare',
'Edit-SmbServerCertificateMapping',
'Enable-SmbOverQuic',
'Expand-ArchiveFileSystemEntity',
'Get-BestHostNode',
'Get-Certificates',
'Get-CimWin32LogicalDisk',
'Get-CimWin32NetworkAdapter',
'Get-CimWin32PhysicalMemory',
'Get-CimWin32Processor',
'Get-ClusterInventory',
'Get-ClusterNodes',
'Get-ComputerName',
'Get-DecryptedDataFromNode',
'Get-EncryptionJWKOnNode',
'Get-FileNamesInPath',
'Get-FileSystemEntities',
'Get-FileSystemRoot',
'Get-FolderItemCount',
'Get-FolderOwner',
'Get-FolderShareNames',
'Get-FolderSharePath',
'Get-FolderShareStatus',
'Get-FolderShareUsers',
'Get-IsAzureTurbineServer',
'Get-ItemProperties',
'Get-ItemType',
'Get-LocalGroups',
'Get-LocalUsers',
'Get-OSVersion',
'Get-ServerInventory',
'Get-ShareEntities',
'Get-Smb1InstallationStatus',
'Get-SmbFileShareDetails',
'Get-SmbOverQuicSettings',
'Get-SmbServerCertificateHealth',
'Get-SmbServerCertificateMapping',
'Get-SmbServerCertificateValues',
'Get-SmbServerSettings',
'Get-SmbShareAccess',
'Get-StorageFileShare',
'Get-TempFolderPath',
'Move-File',
'New-Folder',
'New-SmbFileShare',
'Remove-AllShareNames',
'Remove-FileSystemEntity',
'Remove-FolderShareUser',
'Remove-SmbServerCertificateMapping',
'Remove-SmbShare',
'Rename-FileSystemEntity',
'Restore-ConfigureSmbServerCertificateMapping',
'Set-SmbOverQuicServerSettings',
'Set-SmbServerCertificateMapping',
'Set-SmbServerSettings',
'Test-FileSystemEntity',
'Uninstall-Smb1'
)
# Function attributes: {"localScripts":["Find-PacketMonCounters","Find-VMwithVMGuid","Get-BgpInfoFromMuxs","Get-BuildNumber","Get-BuildValue","Get-Capture","Get-ClusterNodeVMs","Get-ClusterNodesSdn","Get-Components","Get-FrontEndIPConfigurationIPAddress","Get-FrontEndPrivateIPAddress","Get-FrontEndPublicIPAddress","Get-GWCPUHistoryTimeSeries","Get-GWThroughputHistoryTimeSeries","Get-GatewayCPULive","Get-GatewayConnections","Get-GatewayManagerServerName","Get-GatewayPools","Get-GatewayPools2","Get-GatewayPoolsHealthInfo","Get-GatewayPoolsInfo","Get-GatewayThroughputLive","Get-HostName","Get-IPAddressesofServer","Get-IPSecGatewayRemoteExternalipAddress","Get-IPSecGatewaySourceIpAddress","Get-IPV4AddressesofVM","Get-IPV4AddresswithDefaultGateway","Get-IPV4andIPV6AddressesofVM","Get-InboundFrontEndIPConfigurationIPAddress","Get-InboundNetworkInterfaceServerName","Get-InternalLoadbalancingRuleFrontIPAddress","Get-L3ScenarioGateway","Get-L3TenantVLanSubnet","Get-LoadBalancer","Get-LoadBalancerHealthInfo","Get-LoadBalancerMuxes","Get-LoadBalancingRuleFrontendIPConfiguations","Get-LogicalNetworks","Get-LogicalSubnets","Get-MUXThroughputHistoryTimeSeries","Get-MUXThroughputLive","Get-MultiSiteNetworkControllerSiteInformation","Get-MuxsVMInfo","Get-NCEssentialInfo","Get-NCNodeInfo","Get-NCNodeNames","Get-NCReplicaStatus","Get-NCRsatStatus","Get-NCUri","Get-NCVMMStatus","Get-NetworkAdapters","Get-NetworkControllerCertificate","Get-NetworkControllerCluster","Get-NetworkControllerGatewayExternalIPAddress","Get-NetworkControllerGatewayNames","Get-NetworkControllerGatewayResources","Get-NetworkControllerLoadBalancerMux","Get-NetworkControllerNcUriServers","Get-NetworkControllerServerCertificates","Get-NetworkControllerServerName","Get-NetworkControllerServers","Get-NetworkInterfaceHostName","Get-NetworkInterfacePrivateIPAddress","Get-NetworkInterfaceVMName","Get-Networkcontroller","Get-NetworkcontrollerHealthInfo","Get-PacketDetails","Get-PublicIpAddress","Get-PublicIpAddresses","Get-SDNConfigData","Get-SDNConfigurationEvents","Get-SLBEssentialInfo","Get-SLBHostAgentState","Get-SLBMultiplexer","Get-SLBPublicPrivateNetworks","Get-ServerInfo","Get-SourceVMServerName","Get-VMGuid","Get-VMNames","Get-VMSwitches","Get-VirtualIPPoolHealthInfo","Import-NetworkControllerCertificate","Import-NetworkControllerRestCertificate","Install-RsatNetworkController","New-PublicIpAddress","New-SDNExpressLite","Ping-VMwithRouterIP","Remove-MultisiteConfiguration","Remove-PublicIpAddress","Set-MultisiteConfiguration","Set-MultisiteConfigurationNames","Set-MultisiteConfigurationPrimary","Set-NCNodeNames","Start-Capture","Start-IPSecGatewayScenarioDIPHostCapture","Start-IPSecGatewayScenarioGatewayHostCapture","Start-IPSecGatewayScenarioMUXHostCapture","Start-InboundNatScenarioMuxHostCapture","Start-InboundNatScenarioServerCapture","Start-InternalLoadBalancingDIPCapture","Start-InternalLoadBalancingDIPServerCapture","Start-InternalLoadBalancingMUXCapture","Start-InternalLoadBalancingMUXDIPServerCapture","Start-InternalLoadBalancingServerCapture","Start-L3GatewayScenarioDIPCapture","Start-L3GatewayScnearioCapture","Start-LoadBalancingMuxHostCapture","Start-LoadBalancingServerCapture","Start-NetworkControllerGatewayandHostCapture","Start-NetworkControllerHostCapture","Start-NetworkControllerMuxandHostCapture","Start-NetworkControllerNodeGatewayCommunicationCapture","Start-NetworkControllerNodeMuxCommunicationCapture","Start-NetworkControllerServerCapture","Start-OutboundNatCapture","Start-OutboundNatMuxHostCapture","Start-PktmonCounter","Start-PktmonUnloadandFilter","Start-PublicIPScnearioMuxHostCaputure","Start-PublicIPScnearioVMandHostCaputure","Start-VMtoVMConnectionCapture","Start-VMtoVMConnectionVM1HostCapture","Start-VMtoVMConnectionVM2HostCapture","Stop-Capture","Test-MultisiteConfiguration","Test-RSATOnGateway","Update-PublicIpAddress"],"externalScripts":["Add-FolderShare","Add-FolderShareNameUser","Add-FolderShareUser","Compress-ArchiveFileSystemEntity","Disable-KdcProxy","Disable-SmbOverQuic","Edit-FolderShareInheritanceFlag","Edit-FolderShareUser","Edit-SmbFileShare","Edit-SmbServerCertificateMapping","Enable-SmbOverQuic","Expand-ArchiveFileSystemEntity","Get-BestHostNode","Get-Certificates","Get-CimWin32LogicalDisk","Get-CimWin32NetworkAdapter","Get-CimWin32PhysicalMemory","Get-CimWin32Processor","Get-ClusterInventory","Get-ClusterNodes","Get-ComputerName","Get-DecryptedDataFromNode","Get-EncryptionJWKOnNode","Get-FileNamesInPath","Get-FileSystemEntities","Get-FileSystemRoot","Get-FolderItemCount","Get-FolderOwner","Get-FolderShareNames","Get-FolderSharePath","Get-FolderShareStatus","Get-FolderShareUsers","Get-IsAzureTurbineServer","Get-ItemProperties","Get-ItemType","Get-LocalGroups","Get-LocalUsers","Get-OSVersion","Get-ServerInventory","Get-ShareEntities","Get-Smb1InstallationStatus","Get-SmbFileShareDetails","Get-SmbOverQuicSettings","Get-SmbServerCertificateHealth","Get-SmbServerCertificateMapping","Get-SmbServerCertificateValues","Get-SmbServerSettings","Get-SmbShareAccess","Get-StorageFileShare","Get-TempFolderPath","Move-File","New-Folder","New-SmbFileShare","Remove-AllShareNames","Remove-FileSystemEntity","Remove-FolderShareUser","Remove-SmbServerCertificateMapping","Remove-SmbShare","Rename-FileSystemEntity","Restore-ConfigureSmbServerCertificateMapping","Set-SmbOverQuicServerSettings","Set-SmbServerCertificateMapping","Set-SmbServerSettings","Test-FileSystemEntity","Uninstall-Smb1"]}
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCSqRcZm+FSrWJk
# lY+PI5r/kvujQYjfDfbO+8ewyB3aJaCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILOx+Mvyj02VdUM7oBayX4zY
# yATbfHEd9QLBLLu5YbLvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAYlJnuMT/VRHutr0CvhohxdjfvZJF9yy5TBL1qjXAvYzcZfegda7NbBMj
# 52RSq24p0qFR8IucoFqLw/8hWY5Lw6HAGzge5OxudSCMQtFXEodu+j+jzGHC4HUY
# ChtEB5Yf/oEgPIHZw3+Jfl8XCeI1osO3tI79F8zr6Wxt+OCnwsQHgAIUKWZp1Np/
# NPTpgV5odluae9HKd8LPZ9M5bzVBID83E/QKYOTsNkS7tC06aT4qpGL12M+Je5yH
# TLM395It82h/D9kp25okylc2l/QzgiNmYKGeIDaeYWrKWFMB1qaGAw/kzsvGPW42
# JY/JxpEoTS1Sng+wz17VZUf3I28QTqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB5z3husgToSwJFaW9hTH3qO4YUtLXxcCQKWB3gmHnZ7gIGZVbGzDie
# GBMyMDIzMTIwMTAxMzc0Ni45MThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAc9SNr5xS81IygABAAABzzANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MTFaFw0yNDAyMDExOTEyMTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC4Pct+15TYyrUje553lzBQodgmd5Bz7WuH8SdHpAoW
# z+01TrHExBSuaMKnxvVMsyYtas5h6aopUGAS5WKVLZAvUtH62TKmAE0JK+i1hafi
# CSXLZPcRexxeRkOqeZefLBzXp0nudMOXUUab333Ss8LkoK4l3LYxm1Ebsr3b2OTo
# 2ebsAoNJ4kSxmVuPM7C+RDhGtVKR/EmHsQ9GcwGmluu54bqiVFd0oAFBbw4txTU1
# mruIGWP/i+sgiNqvdV/wah/QcrKiGlpWiOr9a5aGrJaPSQD2xgEDdPbrSflYxsRM
# dZCJI8vzvOv6BluPcPPGGVLEaU7OszdYjK5f4Z5Su/lPK1eST5PC4RFsVcOiS4L0
# sI4IFZywIdDJHoKgdqWRp6Q5vEDk8kvZz6HWFnYLOlHuqMEYvQLr6OgooYU9z0A5
# cMLHEIHYV1xiaBzx2ERiRY9MUPWohh+TpZWEUZlUm/q9anXVRN0ujejm6OsUVFDs
# sIMszRNCqEotJGwtHHm5xrCKuJkFr8GfwNelFl+XDoHXrQYL9zY7Np+frsTXQpKR
# NnmI1ashcn5EC+wxUt/EZIskWzewEft0/+/0g3+8YtMkUdaQE5+8e7C8UMiXOHkM
# K25jNNQqLCedlJwFIf9ir9SpMc72NR+1j6Uebiz/ZPV74do3jdVvq7DiPFlTb92U
# KwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDaeKPtp0eTSVdG+gZc5BDkabTg4MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBQgm4pnA0xkd/9uKXJMzdMYyxUfUm/ZusU
# Ba32MEZXQuMGp20pSuX2VW9/tpTMo5bkaJdBVoUyd2DbDsNb1kjr/36ntT0jvL3A
# oWStAFhZBypmpPbx+BPK49ZlejlM4d5epX668tRRGfFip9Til9yKRfXBrXnM/q64
# IinN7zXEQ3FFQhdJMzt8ibXClO7eFA+1HiwZPWysYWPb/ZOFobPEMvXie+GmEbTK
# bhE5tze6RrA9aejjP+v1ouFoD5bMj5Qg+wfZXqe+hfYKpMd8QOnQyez+Nlj1ityn
# OZWfwHVR7dVwV0yLSlPT+yHIO8g+3fWiAwpoO17bDcntSZ7YOBljXrIgad4W4gX+
# 4tp1eBsc6XWIITPBNzxQDZZRxD4rXzOB6XRlEVJdYZQ8gbXOirg/dNvS2GxcR50Q
# dOXDAumdEHaGNHb6y2InJadCPp2iT5QLC4MnzR+YZno1b8mWpCdOdRs9g21QbbrI
# 06iLk9KD61nx7K5ReSucuS5Z9nbkIBaLUxDesFhr1wmd1ynf0HQ51Swryh7YI7TX
# T0jr81mbvvI9xtoqjFvIhNBsICdCfTR91ylJTH8WtUlpDhEgSqWt3gzNLPTSvXAx
# XTpIM583sZdd+/2YGADMeWmt8PuMce6GsIcLCOF2NiYZ10SXHZS5HRrLrChuzedD
# RisWpIu5uTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDq
# 8xzVXwLguauAQj1rrJ4/TyEMm6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6RMRCTAiGA8yMDIzMTEzMDEzNDc1
# M1oYDzIwMjMxMjAxMTM0NzUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpExEJ
# AgEAMAcCAQACAkPcMAcCAQACAhPBMAoCBQDpFGKJAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHbhp/mUbyoTSjyL9o9m75N4Ul2EB6jQvMCBDFoUoXhMtQMc
# u6zcU43/AahuMaLE6l7YQRqPcbRpPsJ1bEgLU9sRhwr0J72/cyYAvFqY6WhJ7rE8
# k1RUc2owqf6uU5jISUw+r4wDEBdMxl5cpqIz8E6dgAZ0MR0MhNUqF9RnCwCXRl6z
# 6GUuOqM9Lur9NMnvkRsTpABPzAvvmdET93BS/c1P8Iy18sQUhxUxSTP1T9sEVVhv
# G7Az3+3PD7+VofeQ4EPDaH/k8pTJwhCyXkV4gOWUuG7qjRN+KhbHR7fxS49Hz7S/
# JfcI8/k8sJqPDzN+YQdV5iM3dyRBeYAhJmRi254xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc9SNr5xS81IygABAAABzzAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCBQqcO1nbaaMOSy1J9UHL6wu5Gmhg2V7IB3Mmz6znZAjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EILPpsLqeNS4NuYXE2VJlMuvQeWVA
# 80ZDFhpOPjSzhPa/MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHPUja+cUvNSMoAAQAAAc8wIgQgCIYE6gA3bYn+f6KSrsTZ8iA/uoB2
# JzMG2npHztL6skgwDQYJKoZIhvcNAQELBQAEggIAE8tuVaFSRmPBeyjmUfetZeOS
# leRaSjKG6Qem+senUj3Wo74UjsV9xclIBEmBdT4TYxoI50YCIjwln59wGFX3KRFe
# glL3YbRt0HxQ4zCYnCYQvVWRJnHrUb23xaHhHi4dBzYNL6eIwcgsorrkZK3wC9dx
# fRkO0UK9fyJw2+U2f6/9Uxlmw2WGZOGTE0piajh8Gvdp70cah7ARkuQgi85njyfV
# BhiqFoCKL9H/Fh5vMPChAejUOvIUHyyJRikQ2m3yBYVZaT13nDsgkztYNY+3TG76
# 9Da6Rt+fCHwXjCFLIS4d06FAws4F5PIO/VhzsvLNKYFwENhMQxZXP5R0+fOQsVuV
# AwOtfjhfGoFjX07Xb5qEobqYD9M5p/+FGJrBdZTzDvQ4VXNURqknEIMb5yjrxwQ9
# bRm6K7puC9YmUNRs5b7IWtTRPwwziUYASOjNPgkhKEY/W3rSUiZGUACj3HdpiYLn
# YGdd9sRAjf4hJ/Jx7fcm6kt2ji4W/bkjg2+oUvMCFNJqCMfSM1tbN2OuWeKQHU0l
# Os3le/WKM9ev13Tz/jnC3XPF0QSObUTnC9SgkgKoHsNejD8hCd6KZmzXDlsEJCcS
# p/2vw1DxNiZ4mLTM9Wiq0SGjVZIUurMJ67l0xESP9wBBozwvNhOVJqNIOmVLrI+Y
# KOMDkNYuYOHNpRS5nsA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2862.ps1
|
2862.ps1
|
function TaskTearDown {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[scriptblock]$teardown
)
$psake.context.Peek().taskTearDownScriptBlock = $teardown
}
|
combined_dataset/train/non-malicious/sample_43_11.ps1
|
sample_43_11.ps1
|
@{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIImEQYJKoZIhvcNAQcCoIImAjCCJf4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl
# RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT
# Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5
# eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW
# AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1
# PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD
# s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX
# ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w
# S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
# aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO
# 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j
# cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV
# HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf
# E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L
# fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t
# ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH
# g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1
# et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG
# azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz
# WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw
# DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+
# DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS
# cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/
# OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU
# pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA
# vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA
# AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY
# mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g
# BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH
# AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl
# AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC
# lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz
# /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b
# jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9
# TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b
# 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9
# pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj
# ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol
# Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ
# 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN
# Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w
# 3gI/h+5WoezrtUyFMYIaBTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB
# IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ
# KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB
# gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq
# aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa
# gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy
# QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs
# 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6
# 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf
# L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4
# XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V
# pyexP/sw9u51ejlEtaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3
# DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRAB
# BKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8
# TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZjK/NULQGBMyMDI0MDUw
# OTAwNDQ0NS4yNjNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy
# YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcx
# JTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCC
# BQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0BAQsFADB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAz
# MDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL
# Ex5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB/DBboUow8WPO
# TPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn
# 9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWVATL7p8bbfnws
# c1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5hnd3VaGTepNq
# yakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e
# 1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4fPhHETnDC78T1
# yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEX
# PttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5hH2XMibzakbp
# 2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRbK5ldRYNAqddr
# /ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm
# 3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/JOQIDAQABo4IB
# STCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaA
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3Rh
# bXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUH
# MAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9z
# b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC
# MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG
# SIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh
# +WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4NrertI6FI9rhjhe
# aKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55ESTWIBNaQS9C
# po2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL
# +ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJbKxLX8wHhsiwr
# iXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jPmaojZgXQO33X
# jxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJYyQQpETSflN36
# jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADl
# m5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitAsSLaVeMqoPi+
# NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4vY5zPmtNiVIc
# QnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWhxtmnN5HYCDCC
# B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw
# gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
# KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIx
# MDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57Ry
# IQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VT
# cVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx
# XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ
# HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1
# KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s
# 4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUg
# fX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3
# Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je
# 1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUY
# hEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUY
# P3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGC
# NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4w
# HQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB
# BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD
# CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0T
# AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNV
# HR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9w
# cm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEE
# TjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOC
# AgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/a
# ZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp
# 4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq
# 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB
# woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG
# +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3B
# FARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77
# IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJ
# fn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K
# 6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDx
# yKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB
# +aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEl
# MCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCABol1u1wwwYgU
# tUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6eZ3pzAiGA8yMDI0MDUwODIyMTM1OVoYDzIwMjQw
# NTA5MjIxMzU5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp5nenAgEAMAcCAQAC
# AgFYMAcCAQACAhOXMAoCBQDp58knAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD
# ggEBAFVdQjPYuOX6Bfp22xfWO+t4Rt2DKxJtaV8k+SdTUlYks16zwkhVj82iuw/4
# zoJqeWfbLvuanzjtGcZHlvH5x9ceUe+QuGQmJXN0bUMdmVxvrLoDLVz2mN5+mt05
# efDl2y3SM4YCHfHqd2wwkLhOSAX+2YKu/a3wSJ/H9BC2YZG/OZLA1Z1pxtwHxIly
# meEG52wvXtbpIYB7tZtoiWYQiLkcupZvgaS+FkHzhtoFSpu/ADV2/iv+T0ub76c+
# b42Y8/rDBKqE11hF/91kv6Qi/GniibvRmkA2tHJPT4SOMJXnhmkRBU8cdbHGP5SY
# SIiafXwbGi3+eKVH+tmt19RdcYoxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCCwAbWcJ8mBcv/Tla6q0vmNHSAfMRNunvfzcCH1wzhIUDCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSUgIbdizXsz76h1Jdh
# LCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr
# 4BhstbbvOO0AAQAAAeswIgQgtTU2aiTj8WRQswU1e7foK+41OyI2Gkhjhlru+KoI
# qF4wDQYJKoZIhvcNAQELBQAEggIAPsLaLEzyM+txt49Pr+RCZyRgW9g1B349fQDv
# 43iZ7H35yorNfyWVNIwcWmOwqJlxgUrhl1P6Cy3WbWPckknmKVZ2oJpQT/0ddKwt
# hweFKpU6QbLwcnVPlNpESVm1buoF0F1FLBsF2rtYMz1tLOGA8v5z913s9V/wXuuK
# P000C8hQ44GzE4pQqO/ZLPfcXrldcTzARog/i6tJ7WiI9AruFuFfiOwOx1zDf/qC
# kB8olf73Ks6JnPwEC5Ec4z5d7D0VFW8o07r/FQf6ViFnTMCJj0VJ5cVfckdvpF2L
# oVtCTjxKAxSvkaVWg73T0TGDd6xjSIrMol5c7wO6RcLJBatYH6wR0f0kpWyrxZvU
# oAr8fcsa7n6/c1Av9v3RPR0jp1D/FkP66owBQVbCYKA4lbGeo0L4q4rlcmL8qRd3
# 8uN+BRDGyLGgZxXjOJ7D+RrTjZNftb2bKn3Pd3GpEF5zA9XUOLIcpQcKIgTqDiCE
# 3044zDPK4U0eHHJWdZwiGAdXpoL0h08ifO3jp7BnLyhWKEB90/zBcy7v8F0qRKA3
# sYJ/Plv1sQzNKjMmUZiU1T+bmYCWgze3E0NoDwxGivctwSXg/GjBVI2iDT6+/E0S
# vTGKYHqhbXJ5JXDciaYwf98MpN2SVPTAndAnFZYAc1EuxilCwvqhSSiWxVhfUMJJ
# JwXeb6U=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2324.ps1
|
2324.ps1
|
Write-Log -Message 'Clearing CleanMgr.exe automation settings.'
$getItemParams = @{
Path = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\*'
Name = 'StateFlags0001'
ErrorAction = 'SilentlyContinue'
}
Get-ItemProperty @getItemParams | Remove-ItemProperty -Name StateFlags0001 -ErrorAction SilentlyContinue
$enabledSections = @(
'Active Setup Temp Folders'
'BranchCache'
'Content Indexer Cleaner'
'Device Driver Packages'
'Downloaded Program Files'
'GameNewsFiles'
'GameStatisticsFiles'
'GameUpdateFiles'
'Internet Cache Files'
'Memory Dump Files'
'Offline Pages Files'
'Old ChkDsk Files'
'Previous Installations'
'Recycle Bin'
'Service Pack Cleanup'
'Setup Log Files'
'System error memory dump files'
'System error minidump files'
'Temporary Files'
'Temporary Setup Files'
'Temporary Sync Files'
'Thumbnail Cache'
'Update Cleanup'
'Upgrade Discarded Files'
'User file versions'
'Windows Defender'
'Windows Error Reporting Archive Files'
'Windows Error Reporting Queue Files'
'Windows Error Reporting System Archive Files'
'Windows Error Reporting System Queue Files'
'Windows ESD installation files'
'Windows Upgrade Log Files'
)
Write-Verbose -Message 'Adding enabled disk cleanup sections...'
foreach ($keyName in $enabledSections) {
$newItemParams = @{
Path = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\$keyName"
Name = 'StateFlags0001'
Value = 1
PropertyType = 'DWord'
ErrorAction = 'SilentlyContinue'
}
$null = New-ItemProperty @newItemParams
}
Write-Verbose -Message 'Starting CleanMgr.exe...'
Start-Process -FilePath CleanMgr.exe -ArgumentList '/sagerun:1' -NoNewWindow -Wait
Write-Verbose -Message 'Waiting for CleanMgr and DismHost processes...'
Get-Process -Name cleanmgr,dismhost -ErrorAction SilentlyContinue | Wait-Process
|
combined_dataset/train/non-malicious/sample_1_1.ps1
|
sample_1_1.ps1
|
Import-LocalizedData -BindingVariable WMIStrings -FileName DC_WMISecurityCenter -UICulture en-us
Write-DiagProgress -Activity $WMIStrings.ID_SecurityCenter -Status $WMIStrings.ID_SecurityCenterDesc
$OutputFile = $ComputerName + "_SecurityCenter.txt"
$file = new-item -type file $OutputFile | Out-Null #_#
# Computer name
$strComputer = "."
# Antivirus Product
"========================================================" >> $OutputFile
"Antivirus Product" >> $OutputFile
"========================================================" >> $OutputFile
#$colItems = Get-CimInstance -class "AntivirusProduct" -Recurse -namespace "root\securitycenter2" -computername $strComputer | Select-Object * -ExcludeProperty "__*","Site","Container","Qualifiers","SystemProperties","instanceGuid","Options"
Get-CimInstance -class "AntivirusProduct" -Recurse -namespace "root\securitycenter2" -computername $strComputer | Select-Object * -ExcludeProperty "__*","Site","Container","Qualifiers","SystemProperties","instanceGuid","Options" | Out-File -append $outputfile | Format-wide
#$colItems >> $OutputFile
"" >> $OutputFile
# AntiSpyware Product
"========================================================" >> $OutputFile
"AntiSpyware Product" >> $OutputFile
"========================================================" >> $OutputFile
#$colItems = Get-CimInstance -class "AntiSpywareProduct" -Recurse -namespace "root\securitycenter2" -computername $strComputer | Select-Object * -ExcludeProperty "__*","Site","Container","Qualifiers","SystemProperties","instanceGuid","Options"
Get-CimInstance -class "AntiSpywareProduct" -Recurse -namespace "root\securitycenter2" -computername $strComputer | Select-Object * -ExcludeProperty "__*","Site","Container","Qualifiers","SystemProperties","instanceGuid","Options" | Out-File -Append $OutputFile | Format-Wide
#$colItems >> $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription "Security Center.log" -sectionDescription "System Information"
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCApjOUZSbWGocW9
# H6dEKk9ejSZbq9kZcrFE6C6IIPezNqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILG7
# hBy7uZ/wCv0+RVNPvFGS95Qvhx3esPRKTh9sPuadMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAK/9BRfF7sbm32eRJYMTpKCg97XgMDNmZ1Z58
# VNT3lAsZ9se/lnYCTDgIU/Wd3kNrmd+qFp+0Kk+YoY3KFCwkQTM3C5oL8Bo6nhID
# UpuZd03cJOKgK+UGNRNJ07511Jue553J4VC69gUIfrtcemN6te9uzBDJ327ojhmE
# 3Yid8WMf6GhRXdZwAgxz0rFpC4VEFCPcL3BpAsy3og2IAHtkcTTFFlBxzuVIITlO
# 9x+zGhOP0WJU3fQmdvGkp69amQohH6LRt3hBQfO361oHfZmtWfuGV+cto8Wm06MI
# XDlrWmuQCia4PyHiB+gX44IOJrPhC0upAkrAd8xNU4oWDpC/MqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC306CyjQOcoZDWQ1aVR8IFRdOErc4qnPLJ
# RRSBZ9fkiwIGZxp+Oc3cGBMyMDI0MTAyODExNDA0My40MTZaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB
# AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4
# Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J
# b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi
# fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl
# VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd
# WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys
# CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw
# gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc
# wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU
# olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x
# wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g
# MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0
# SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl
# 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY
# BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6
# RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv
# bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes
# bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs
# DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT
# GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P
# Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud
# AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh
# 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF
# fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZujAi
# GA8yMDI0MTAyODA1MDM1NFoYDzIwMjQxMDI5MDUwMzU0WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyZm6AgEAMAcCAQACAgaxMAcCAQACAhPGMAoCBQDqyus6AgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAA0BaKsAtdDQTH1mQ1AYUo/KxlS4
# RtFuuuP4gPyvI62JGK76KDo1S6HM+ctaAw8utdUJxDxdBIT7YVtf3EsB6ahF9dyV
# II0TJFjSP8cCJOTC5jRGlCifOuJzCDhxwQQAhSXeWAkO4VhE7gDZPP8iKAQ1S6eX
# o0xnFmuVzKYGWRGUrO7HxP5nS8g4cZRiZaQEiMHRdB8GJDJLV2TUfd6Hut03mT2z
# +RLogrNkAFxK/6rNsuyXu+FFy81XbveHgyGjD6chYE3AuUByswKrW/SRVmzMrGVD
# /QhwaIDDpkpr3XNM9N/LMrmVoP4y9JQ4hhbVj5wZ6XL5rCe5OY1v86QJAdwxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz
# RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCA+sIvRP9L6gBzxV42iwV8ynwEW
# t9DFLkRpDTGlQaSv9TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h
# S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg8PuciiVY
# Q85s2ehb7/+SpISkahbpSB/VJgG8R7IGdAkwDQYJKoZIhvcNAQELBQAEggIACGWP
# nD3cV4mwHAJay5VyAc0Owdf+IaG3h0G9qhGCZ+kU0RfwnXu3CF7KO3SXcxXpAzJi
# XmdsZ42Gj0JEC3H7Sur4WZejFjtpmYmEIcfe+W9wtyNDUy+mIeamoBf4U7rdZ9Sc
# 5Fac1Sn/WU6LVtmHcdJBKj12Gm630EUVu7slI5vCHUBelj9Ht3EGdFJqr/KPR3Wp
# nR0kG9jy3pV2B8FvibXzQA4aN+9LAqA6iIdAFfDvPNCf5OjJbmV/Llpos/nsV8Jw
# pkbIMY5U4RGwB3aJkaYsghvurLTbKdVqTQs4JEku3gEZRnWW++1+SvQa3hXSP8VG
# gEyCkLL3Sc9ppRbChmpCS7lvxPOVHtUfyH2qMZrOiTToDEXt6UTWWButOSUPQWJ2
# bdjP3tBDGqiXvhygVWX/A2cagyFB+7KfBs7DLYd6F82T5p5by/RPUcnCqUrqdSN3
# UHzRa3iKk2u901fvf+L51Pk0C7cjVHaoecBi+i24eiXUmkggPbLmS1SL7CRk0Zo6
# yj30Fv/aXuMaeqiN1mNWcY/qzC1LHLM05lTEJf+rrRvFoiR7uxZBsZqNG8PMZTPp
# iaD3OJLkEFFNkgheLFpTlWyQKJtg0pUy4j4RtqEcP4Pyunap7QMbX2lwOUP6xHmC
# MjKiO9ubiTfcUiPiP5FvdVwMHw0L7VwvNaYxvHo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_49_94.ps1
|
sample_49_94.ps1
|
#
# Module manifest for module 'Microsoft.AzureStack.1p-Monitoring'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Microsoft.AzureStack.1p-Monitoring.psm1'
# Version number of this module.
ModuleVersion = '1.62.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '40dd16c2-4840-14b3-c05f-38d5f1c7cf8b'
# Author of this module
Author = 'SME'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = ''
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @(
'Get-WAC1PClusterDetails',
'Get-WAC1PClusterNode',
'Get-WAC1PFirstPartyPro2',
'Get-WAC1PServerDetails',
'Invoke-WAC1PMaeAlert',
'Invoke-WAC1PMaeHardwareMetadata',
'Invoke-WAC1PPackageUpload',
'Reset-WAC1PAsNode',
'Get-CimWin32LogicalDisk',
'Get-CimWin32NetworkAdapter',
'Get-CimWin32PhysicalMemory',
'Get-CimWin32Processor',
'Get-ClusterInventory',
'Get-ClusterNodes',
'Get-DecryptedDataFromNode',
'Get-EncryptionJWKOnNode',
'Get-ServerInventory'
)
# Function attributes: {"localScripts":["Get-WAC1PClusterDetails","Get-WAC1PClusterNode","Get-WAC1PFirstPartyPro2","Get-WAC1PServerDetails","Invoke-WAC1PMaeAlert","Invoke-WAC1PMaeHardwareMetadata","Invoke-WAC1PPackageUpload","Reset-WAC1PAsNode"],"externalScripts":["Get-CimWin32LogicalDisk","Get-CimWin32NetworkAdapter","Get-CimWin32PhysicalMemory","Get-CimWin32Processor","Get-ClusterInventory","Get-ClusterNodes","Get-DecryptedDataFromNode","Get-EncryptionJWKOnNode","Get-ServerInventory"]}
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInlgYJKoZIhvcNAQcCoIInhzCCJ4MCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAiCsqLpuV8UlrE
# GGzsEISa7TN4Sw866wwtSkc4JP9tv6CCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGXYwghlyAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILHWR+soKUolcxVSuHusz2+p
# mLSlaBvBA9xSacDdpT8yMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAp8vqJ82w+GFbJHkTels4nnHCGAhSg5DLg98mRYDVFpBkRlcu7N8fQEqb
# xc9suqQzYwItyqL+a7cgU/R+bjMksacEWdsVa55a4EU7AhJfCQGiXLKU59l2h7zl
# eKm1Uukqx2ky+va2jPr1CRmVe6aeGuqIZk417h80dGkQf79CsrCChFTqWCwcQWxr
# W3RPaQPGqNV1sk/9wN9rukzo7hL2gfxurogb4xD6+tqf2Q0d+K3TbOvHBNVQq2F/
# IRGAzyXFPxwaQQEbiHnJm36XRm0MIFo+TDeg90tK99yd52LqhZ8LxJYUrBcGIsXa
# mr9ms8cYMye/ehiSTrBGKmIbCRp0d6GCFwAwghb8BgorBgEEAYI3AwMBMYIW7DCC
# FugGCSqGSIb3DQEHAqCCFtkwghbVAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBpA8q6zctYrV+x4La6iEOTaFbXsEkFTXzg4sqZYfFg7gIGZItjVLLi
# GBMyMDIzMDYyOTIxNTYzMS4xOTZaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0OUJDLUUz
# N0EtMjMzQzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EVcwggcMMIIE9KADAgECAhMzAAABwFWkjcNkFcVLAAEAAAHAMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMTEwNDE5MDEy
# NVoXDTI0MDIwMjE5MDEyNVowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjQ5QkMtRTM3QS0yMzNDMSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEAvO1g+2NhhmBQvlGlCTOMaFw3jbIhUdDTqkaQhRpdHVb+
# huU/0HNhLmoRYvrp7z5vIoL1MPAkVBFWJIkrcG7sSrednyZwreY207C9n8XivL9Z
# BOQeiUeL/TMlJ6VinrcafbhdnkNO5JDlPozC9dGySiubryds5GKtu69D1wNat9DI
# Ql6alFO6pncZK4RIzfv+KzkM7RkY3vHphV0C8EFUpF+lysaGJXFf9QsUUHwj9XKW
# Hfc9BfhLoCReXUzvgrspdFmVnA9ATYXmidSjrshf8A+E0/FpTdhXPI9XXqsZDHBq
# r7DlYoSCU3lvrVDRu1p5pHHf7s3kM16HpK6arDtY3ai1soASmEpv3C2N/y5MDBAp
# Dd4SpSkLMa7+6es/daeS7zdH1qdCa2RoJPM6Eh/6YmBfofhfLQofKPJl34ALlZWK
# 5AzVtFRNOXacoj6MAG2dT8Rc5fpKCH1E3n7Zje0dK24QVfSv/YOxw52ECaMLlW5P
# hHT3ZINNaCmRgcHCTClOKzC2FOr03YBc2zPOW6bIVdXloPmBMVaE+thXqPmANBw0
# YsncaOkVggjDb5O5VqOp98MklHpJoJI6pk5zAlx8/OtC7FutrdtYNUC6ykXzMAPF
# uYkWGgx/W7A0itKW8WzYzwO3bAhprwznouGZmRiw2k8pen80BzqzdyPvbzTxQsMC
# AwEAAaOCATYwggEyMB0GA1UdDgQWBBQARMZ480jwpK3P6quVWUEJ0c30hTAfBgNV
# HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
# aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
# CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz
# L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV
# HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC
# AQCtTh0EQn16kKQyCeVk9Vc10m6L0EwLRo3ATRouP7Yd2hWeEB2Y4ZF4CJKe9qfX
# WGJKzV7tMUm6DAsBKYH/nT+8ybI8uJiHGnfnVi6Sh7gFjnTpfh1j1T90H/uLeoFj
# pOn/+eoCoJmorW5Gb2ezlTlo5I0kNAubxtCxqbLizuPNPob8kRAKQgv+4/CC1Jmi
# UFG0uKINlKj9SsHcrWeBBQHX62nNgziIwT44JqHrA02I6cmQAi9BZcsf57OOLpRY
# lzoPH3x/+ldSySXAmyLq2uSbWtQuD84I/0ZgS/B5L3ewqTdiE1KbKX89MW5JqCK/
# yI/mAIQammAlHPqU9eZZTMPOHQs0XrpCijlk+qyo2JaHiySww6nuPqXzU3sEj3VW
# 00YiVSayKEu1IrRzzX3La8qe6OqLTvK/6gu5XdKq7TT852nB6IP0QM+Budtr4Fbx
# 4/svpKHGpK9/zBuaHHDXX5AoSksh/kSDYKfefQIhIfQJJzoE3X+MimMJrgrwZXlt
# b6j1IL0HY3qCpa03Ghgi0ITzqfkw3Man3G8kB1Ql+SeNciPUj73Kn2veJenGLtT8
# JkUM9RUi0woO0iuY4tJnYuS+SeqavXUOWqUYVY19FIr1PLqpmWkbrO5xKjkyOHoA
# mLxjNbKjOnkAwft+1G00kulKqzqPbm+Sn+47JsGQFhNGbTCCB3EwggVZoAMCAQIC
# EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS
# b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX
# DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
# 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG
# Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP
# 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P
# XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361
# VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB
# Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9
# X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e
# wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw
# wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr
# 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
# FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
# BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n
# FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw
# PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j
# cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH
# hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF
# BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl
# ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
# ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
# j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu
# 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/
# GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D
# YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO
# xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO
# Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I
# 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0
# zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM
# mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT
# TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLOMIICNwIBATCB+KGB0KSBzTCByjEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj
# cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF
# U046NDlCQy1FMzdBLTIzM0MxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVABAQ7ExF19KkwVL1E3Ad8k0Peb6doIGD
# MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF
# BQACBQDoSFUvMCIYDzIwMjMwNjMwMDMwODMxWhgPMjAyMzA3MDEwMzA4MzFaMHcw
# PQYKKwYBBAGEWQoEATEvMC0wCgIFAOhIVS8CAQAwCgIBAAICNcsCAf8wBwIBAAIC
# EWUwCgIFAOhJpq8CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAK
# MAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAXZMN0PONR
# SqxjQKGG1topmQmeb7y9z6/3JM4ZtC1etqOOyrSClk3j7DzVnP0wkwFplZVEygDd
# WBksImdNF0ItR40tILFp2w4nqjyMJtqbM/r1KG+uXFAVLGib1imZsdRblQGsx8pV
# vzrzQMgOhptGpWbJYN0VUZBBhWVkLsE6gTGCBA0wggQJAgEBMIGTMHwxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABwFWkjcNkFcVLAAEAAAHAMA0GCWCG
# SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZI
# hvcNAQkEMSIEIBipmQiLeRo8HVC7FNqKh+O8KJvTTvw2SdbRkevv5/vyMIH6Bgsq
# hkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgWvFYolIIXME0zK/W6XsCkkYX7lYNb9yA
# 8JxwY04Pk08wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT
# MwAAAcBVpI3DZBXFSwABAAABwDAiBCAJVhNEAQTaGdsntWyrYbkVPTVemUsMgY5Y
# 6CCKrDzdqDANBgkqhkiG9w0BAQsFAASCAgCl/rPgNTQK3eI0qAAtgtBu59DfkQW7
# 2SlCKICLmgWzQrNPbHcb97JvfCCQGvXNvLwwsjGwve6XLmyMiYgI/Vn9ZxSBTL56
# s4cJBDI5x+I65t6kYIvoJgw0PBD50xkjDm3Fx27zzuPzGzlBVxmIBm3kDrOtl5M+
# 29CweQM7lLBfX/rL5+/kXjwN9QeM3jDFl6xg7yZaotypszaeoxN6d15/dYM1SeKk
# 7tyYuwuGrxXqfl8KRlO/GhOdABfs8MVh079/MYdDhzZB6YibFfmZL83SBbEe71MC
# amh2+WGNVBC0LX7uIm5VHzmn+n/isKz7E9GrrALVovaLyhQ/FZjbocFAfc4znTbu
# 7fVFF/QSDf2rmotENW8vrkJOwHt+RXdAc312OZy0q9wNWRZ/MB/iVHXYY42B303F
# vWlAgNc7HWVyfEW4o6B451qLc3IQC5O0koj/RW1kOoN6wyH9iYWQthzWSswvV7E8
# 0mQgkLbKsUXCptJ5JUfB8dezVPeImiQqydwhP8IUfPHptRY7YufRZwGUsAUVnDry
# iRiydAX0/iIUtylufx/UuuJYKU0GH07xKxZ/MGLMdqTyjBbMX1Vp6j72qP5/XtAf
# ooAzC3MoSHlvne17Sri0Jlzmdp2xoW5IEdWEamOqXQP2SEC68xe31CCBdt4cxpIk
# WKXflGgQ/F4DBQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_13_0.ps1
|
sample_13_0.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmcontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2656b809-7098-428e-b605-696525730fec'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain',
'Get-OCIApmcontrolplaneApmDomainsList',
'Get-OCIApmcontrolplaneApmDomainWorkRequestsList',
'Get-OCIApmcontrolplaneDataKeysList',
'Get-OCIApmcontrolplaneWorkRequest',
'Get-OCIApmcontrolplaneWorkRequestErrorsList',
'Get-OCIApmcontrolplaneWorkRequestLogsList',
'Get-OCIApmcontrolplaneWorkRequestsList',
'Move-OCIApmcontrolplaneApmDomainCompartment',
'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys',
'Remove-OCIApmcontrolplaneApmDomain',
'Remove-OCIApmcontrolplaneDataKeys',
'Update-OCIApmcontrolplaneApmDomain'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-MemberBody.ps1
|
Get-MemberBody.ps1
|
#Requires ILSpy.
#Tested with version 2.1.0.1603
#http://ilspy.net/
Add-Type -Path "Mono.Cecil.dll"
Add-Type -Path "ICSharpCode.Decompiler.dll"
[void][System.Reflection.Assembly]::LoadFrom("ILSpy.exe")
function Get-MemberBody
{
[CmdletBinding()]
param(
[Parameter(ParameterSetName="MI")]
[System.Reflection.MemberInfo]$memberInfo,
[Parameter(ParameterSetName="MD",ValueFromPipeline=$true)]
[Microsoft.PowerShell.Commands.MemberDefinition]$memberDefinition)
Process
{
if ($memberDefinition -ne $null)
{
$type = [AppDomain]::CurrentDomain.GetAssemblies().GetTypes() | ? FullName -eq $memberDefinition.TypeName
$declaringTypeName = $type.FullName
$assembly = $type.Assembly.CodeBase.Replace("file:///", "").Replace("/", "\\")
$memberName = $memberDefinition.Name
$memberType = $memberDefinition.MemberType
}
else
{
$assembly = $memberInfo.DeclaringType.Assembly.CodeBase.Replace("file:///", "").Replace("/", "\\")
$memberName = $memberInfo.Name
$declaringTypeName = $memberInfo.DeclaringType.FullName
}
$AssemblyDefinition = [Mono.Cecil.AssemblyDefinition]::ReadAssembly($assembly)
$Context = New-Object ICSharpCode.Decompiler.DecompilerContext -ArgumentList $AssemblyDefinition.MainModule
$TextOutput = New-Object ICSharpCode.Decompiler.PlainTextOutput
$Opts = New-Object ICSharpCode.ILSpy.DecompilationOptions
$Lang = New-Object ICSharpCode.ILSpy.CSharpLanguage
try
{
if ($memberType -eq "Method")
{
$CecilMethod = $AssemblyDefinition.MainModule.Types | ? FullName -eq $declaringTypeName | Select -ExpandProperty Methods | ? Name -eq $memberName
$Lang.DecompileMethod($CecilMethod,$TextOutput,$Opts)
}
if ($memberType -eq "Property")
{
$CecilMember = $AssemblyDefinition.MainModule.Types | ? FullName -eq $declaringTypeName | Select -ExpandProperty Properties | ? Name -eq $memberName
$Lang.DecompileProperty($CecilMember,$TextOutput,$Opts)
}
if ($memberType -eq "Event")
{
$CecilMember = $AssemblyDefinition.MainModule.Types | ? FullName -eq $declaringTypeName | Select -ExpandProperty Events | ? Name -eq $memberName
$Lang.DecompileEvent($CecilMember,$TextOutput,$Opts)
}
if ($memberType -eq "Field")
{
$CecilMember = $AssemblyDefinition.MainModule.Types | ? FullName -eq $declaringTypeName | Select -ExpandProperty Fields | ? Name -eq $memberName
$Lang.DecompileField($CecilMember,$TextOutput,$Opts)
}
}
catch
{
Write-Error (New-Object -TypeName System.Exception -ArgumentList "Failed to decompile $declaringTypeName.$memberName", $Error[0].Exception)
}
$TextOutput.ToString()
}
}
|
combined_dataset/train/non-malicious/sample_51_29.ps1
|
sample_51_29.ps1
|
<#
.DESCRIPTION
Support Enter-SmePSSession to specified computer as specified username. Password will be promoted.
- Enabled by adding "%ProgramFiles%\Windows Admin Center\PowerShell\Modules" to $env:PSModulePath
#>
Function Enter-SmePSSession {
<#
.SYNOPSIS
Remote logon to PowerShell session to a computer with user name and password.
.DESCRIPTION
Remote logon to PowerShell session to a computer with user name and password.
It overrides Get-Credential cmdlet to supress native credential UI.
#>
Param(
[Parameter(Mandatory = $True, Position = 0)]
[string]$Computer,
[Parameter(Mandatory = $True, Position = 1)]
[string]$UserName,
[Parameter(Mandatory = $True, Position = 2)]
[string]$AssemblyPath,
[Parameter(Mandatory = $False, Position = 3)]
[bool]$ManageAs,
[Parameter(Mandatory = $False, Position = 4)]
[bool]$UseHttps = $False,
[Parameter(Mandatory = $False, Position = 5)]
[string]$UserNameLabel = "Username",
[Parameter(Mandatory = $False, Position = 6)]
[string]$PromptLabel = "Password",
[Parameter(Mandatory = $False, Position = 7)]
[string]$Message = "Connecting ...",
[Parameter(Mandatory = $False, Position = 8)]
[string]$EncryptedPassword = $null
)
$GetCredentialScript = {
# passing and remember labels.
$Global:__MsftSmeUserNameLabel = $args[0]
$Global:__MsftSmePromptLabel = $args[1]
<#
.SYNOPSIS
Gets a credential object based on a user name and password.
.DESCRIPTION
Gets a credential object based on a user name and password.
(Use Microsoft.PowerShell.Security\Get-Credential to use native Get-Credential CmdLet)
#>
Function Get-Credential {
[CmdletBinding(DefaultParametersetName = 'Prompt')]
Param(
[Parameter(Mandatory = $True, ParameterSetName = 'Creds')]
[PSCredential]$Credential,
[Parameter(Mandatory = $False, ParameterSetName = 'Prompt')]
[string]$UserName = $null,
[Parameter(Mandatory = $False, ParameterSetName = 'Prompt')]
[string]$Message = $null
)
if ($Credential) {
return Microsoft.PowerShell.Security\Get-Credential -Credential $Credential
}
if ($Message) {
Write-Host $Message
}
if ($UserName) {
Write-Host $UserName
}
else {
$UserName = Read-Host -Prompt $Global:__MsftSmeUserNameLabel
}
$password = Read-Host -AsSecureString -Prompt $Global:__MsftSmePromptLabel
$Credential = New-Object System.Management.Automation.PSCredential $UserName, $password
return $Credential
}
}
function DecryptPassword($password) {
$assemblyPath = $AssemblyPath + "\Microsoft.ManagementExperience.Common.dll"
Add-Type -Path $assemblyPath
try {
$passwordString = [Microsoft.ManagementExperience.PtyInterop.PtyStreamHandler]::Unprotect($password)
$passwordSecureString = ConvertTo-SecureString $passwordString -AsPlainText -Force
} catch {
return $null
}
return $passwordSecureString
}
function CreateSession($userName, $password) {
if ([System.string]::IsNullOrEmpty($userName))
{
throw "Missing username!"
}
if ($password) {
$Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $userName, $password
$Session = New-PSSession -ComputerName $Computer -UseSSL:$UseHttps -Credential $Credential -ErrorAction Stop
} else {
$Session = New-PSSession -ComputerName $Computer -UseSSL:$UseHttps -ErrorAction Stop
}
Enter-PSSession -Session $session -ErrorAction Stop
Invoke-Command -Session $session -ScriptBlock $GetCredentialScript -ArgumentList $UserNameLabel, $PromptLabel
}
function EnterSessionAskPassword($askUserName) {
if ($ManageAs -and $EncryptedPassword) {
$password = DecryptPassword $EncryptedPassword
}
try {
CreateSession $UserName $password
}
catch {
foreach ($i in 0, 1, 2) {
$enterSession = $false
try {
if ($askUserName)
{
$UserName = Read-Host -Prompt $UserNameLabel
if (($UserName.IndexOf("\") -lt 0) -and ($UserName.IndexOf("@") -lt 0)) {
$UserName = ".\$UserName";
}
}
$password = Read-Host -AsSecureString -Prompt $PromptLabel
}
finally {
if (($null -ne $UserName) -and ($null -ne $password)) {
$enterSession = $true
}
}
if ($enterSession) {
try {
CreateSession $UserName $password
break
}
catch {
Write-Host -ForegroundColor Yellow $_.Exception.Message
}
}
}
}
}
Clear-Host
function Global:Prompt {
$LocalName = [System.Environment]::MachineName
Write-Host -ForegroundColor Yellow -NoNewline "[GW $LocalName] $pwd>"; return " "
}
$askUserName = $false
if ($UserName -eq "<NA>") {
$UserName = $null
$askUserName = $true
}
Write-Host -ForegroundColor Cyan $Message
EnterSessionAskPassword $askUserName
}
Function Enter-SmeSshSession
{
<#
.SYNOPSIS
Remote logon as an SSH session to a computer.
.DESCRIPTION
Remote logon as an SSH session to a computer with given user name, host name and, optional private key and SSH arguments.
.PARAMETER Computer
Remote host
.PARAMETER UserName
SSH user name
.PARAMETER SshKeyPath
Path to SSH private key
.PARAMETER SshOptions
SSH Options excluding the option for the private key
#>
Param(
[Parameter(Mandatory = $True)]
[string]$Computer,
[Parameter(Mandatory = $True)]
[string]$UserName,
[Parameter(Mandatory = $False)]
[string]$SshKeyPath,
[Parameter(Mandatory = $False)]
[string]$SshOptions
)
try {
$ssh = Get-Command 'ssh.exe' -ErrorAction Stop
$command = $ssh.Name
if (-not [string]::IsNullOrEmpty($SshOptions)) {
$command += " " + $SshOptions
}
if (-not [string]::IsNullOrEmpty($SshKeyPath)) {
$command += " -i" + $SshKeyPath
}
$command += " " + $UserName + "@" + $Computer
Invoke-Expression $command -ErrorAction Stop
}
catch {
Write-Host -ForegroundColor Yellow $_.Exception.Message
}
finally {
# triggered when user types exit
if (Test-Path $SshKeyPath) {
Remove-Item -Force $SshKeyPath
}
Exit
}
}
Export-ModuleMember Enter-SmePSSession
Export-ModuleMember Enter-SmeSshSession
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAlJNCB2F/yR4f6
# 80E0WFoyleU2O9OpMHuiSz9la5cY7aCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOpa
# 4xFKcjcNX9KsKYvX42FszbGx1e90TFcIoKcWoaBFMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAtn0N8XN+xtQJu0U30J1LLYo98KcmyHqoy0E2
# wF5cF4lT9rZLEMJ0drhwN/dsTqCTMjVi9T3hnz6N0+ADHxiSO/IZFlcCd07O8fmn
# Ucf2QttoHBI1pFo7nicTYH5T8m7sPWNmjQYH/sxxuFIM8+RWdi8InP7sT06l0k7t
# qHg/zDqz2mtuqfFJaENyHAzKdxKCp2ARuQ5dcnz3rLy9+MHJJUePWQEyD/3XKdpI
# qNK32azGPAM/TkNbwbGt2fczHEgM9kxtI3jUEStELO6ud+rlKw1lT075/JTew2fH
# K7E200R5siA2lS4IXHbj9LfphL/2m8Sfgzz+k5wOEnnZDy+MBqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDeet306F5qDmGY0Y8rhctUZlKIj3KWvoPk
# HgFu3B+eVwIGZeenufGAGBMyMDI0MDMwODEwMDMxOC4zMDRaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB
# AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4
# Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J
# b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi
# fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl
# VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd
# WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys
# CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw
# gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc
# wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU
# olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x
# wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g
# MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0
# SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl
# 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY
# BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6
# RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv
# bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes
# bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs
# DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT
# GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P
# Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud
# AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh
# 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF
# fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZTJEjAi
# GA8yMDI0MDMwNzIzMTUzMFoYDzIwMjQwMzA4MjMxNTMwWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDplMkSAgEAMAcCAQACAjHWMAcCAQACAhT4MAoCBQDplhqSAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAC0ru40rR3a/QSJIbWybh7QkkCbq
# rMdBjLhV6ZUvcmFCeKanu9lUSqySiLfJHNb6SwoeTeQ7cOyljWmSJk7JErHJBntk
# hVyVLrzEYhTgrbxbZcA7fr1j1h+zTtqleuML5cRfYkPRpkuGHKhdWuK+ujXkaW5X
# 29ygdc/sQtM1u0w0pZ00zT3dik9FMAzQSIWziiSdx6k+19akB/f8lSV+sit9xqzJ
# JEci+aPkYC9XFjD5EOAJgnwkTZIUZC5P4zMw/igaz0e2cHQuD+V/yp4RkcpBELoH
# LPm0mxKN6gaSGu4i4gxpF1VE9u9QdNJYDo0tnU5VFa/0fNFpHaFrghv4dT8xggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz
# RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC5eeqKQqHnkwUu7KN+fmYhJJqS
# r+UUHbm6JdUyB2QtwzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h
# S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg/qV99uFx
# 5GMQ/ueh9WSJGgRoGiT3WxsTg1oobkB1kJ8wDQYJKoZIhvcNAQELBQAEggIALj8B
# PzNOk2D8GEEViusA1xxRgpYERYmk31/QTJk7bcZUSUZfKIa/NhzWvaGP9laJmcKk
# L62R/nUA3utX0N5d3VYDz0Mfirb7FUjTHO3geYGSHGzACKPyRtn6PyQYoRxVyDGM
# Nrr+WpUmcOOjGhKgLnK9Jno/ocAFXWGQS1NVEDN5EF9XmM6JNWuzzt/0UFcF5p2l
# mGu/XjH+eEkJ6ThImZrY4n8LG7Yw2AK0ThE21ixNKvyW7IiixLJmJCeSEZ3xB7n7
# 2AGTY5yKh1Y5B/zYArOvjUDOmies9G/S9ofTfb8qSRSrm0Bm/ZyyAXT5Je48yR7C
# c+E8RKL+rW/2lcGYOxN5CDggLb7HKlmlUdAaeuC60L1MkI5Q0ktR9B3sI4sursX3
# UDUj622kioHGa5EtWXUZygHG0FmxPUAPz/cWp8x6byBwSL2oFgSzE7GyD1mniKIw
# Jfri5lvUHUNxf3KG0suRhLJdFFV4mXG0DOoB74TVIQ/jUkuxFyU1lxRoBDPZcTLz
# pssBnFBeN0WaZ03Rjx9Z3IQ5l5vgKBPFQ+kAtxqutWw6XjVn+OPRfwThp/jUK48n
# vSGt15GqJxV23g1x1Srp2aaRXCdDqR0ZqPTwsp2AzTfqt7kUWTr0ruFagBQQbOpd
# 8dQkXQhahKEbbFPHnu8hUtIt1d+v0Y65IcjYgoM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_56_23.ps1
|
sample_56_23.ps1
|
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl();
let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/docker.webCore.eventHandlers.js"];
let currentScriptElement = document.querySelector("script[src='Scripts/docker.webCore.plugin.js']");
if (currentScriptElement !== null) {
scripts.forEach(element => {
let newScriptElement = document.createElement("script");
newScriptElement.setAttribute("src", element);
newScriptElement.setAttribute("type", "text/javascript");
newScriptElement.async = false;
currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling);
currentScriptElement = newScriptElement;
});
}
// SIG // Begin signature block
// SIG // MIIoKwYJKoZIhvcNAQcCoIIoHDCCKBgCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // X+ah+KdvfCBnE3Z3QtRiyytn7w3QlVsJD1vFr4g2au+g
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghoNMIIaCQIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCDoMSRY8Wr3Xn4aGohXIO2uZtb3EMgJTzDF
// SIG // mXIg3CyFAzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAMZrvOsy
// SIG // YBAT2hwt/P3Ugi0wFywDKsRrw2iWollGzF9Z9e2j239E
// SIG // oM3vNqVZ91pk2KSIOrAZo9nqaiLf9x1njILbKi3iYaaU
// SIG // Jue9U69lVav6KMIEtgm7WzeSpKj+7fpSNUpY6nCDrHDE
// SIG // H6sKltSX999YOQkAB9CodnuGnTFPwkvOD93DGHM7xcLv
// SIG // kXMBBklBOcTAtyRLeNgAIqhRm7b5Q2pFImph2fXhMB/D
// SIG // hYVP2lNmURgT7vpN1hvB/sOgq2ChJfehu2Q5Iz2Rjhdf
// SIG // 5Swvj+5oKw7TbfPJdKWFmXbdkh61bzj+X1DAsF/EVZFk
// SIG // 2kxfTV1YlsqljQShhIPT0d/hwnKhgheXMIIXkwYKKwYB
// SIG // BAGCNwMDATGCF4Mwghd/BgkqhkiG9w0BBwKgghdwMIIX
// SIG // bAIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN
// SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQg3/wbauzXcTTGpFpQerX/
// SIG // kGHR+OYfsNu9s5gn9PiIazECBmYYFPJh5xgTMjAyNDA0
// SIG // MjkyMTI2MDEuNzk4WjAEgAIB9KCB0aSBzjCByzELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0
// SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo
// SIG // aWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYD
// SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
// SIG // oIIR7TCCByAwggUIoAMCAQICEzMAAAHviT9WoVjMqNoA
// SIG // AQAAAe8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTQ4WhcN
// SIG // MjUwMzA1MTg0NTQ4WjCByzELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl
// SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
// SIG // Ojk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG
// SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAowtY4p8M4B8ITmpG
// SIG // aste6BOASASrJuZF+A1JggViNJRVaRIiuZmdioefbKC+
// SIG // J7OdqYRTEGBhuZMqQoqbp4MD/TaG+FRlROmqDKOYWfTc
// SIG // rV0eWUYG/WfDUehJiyiAkYQ+LKIzzIP0ZxkU3HX+/02L
// SIG // 8jNdIy45i8ihHoDB37yMD5jPgD+4c0C3xMQ3agidruuB
// SIG // neV5Z6xTpLuVPYyzipNcu9HPk8LdOP0S6q7r9Xxj/C5m
// SIG // JrR76weE3AbAA10pnBY4dFYEJF+M1xcKpyBvK4GPsw6i
// SIG // WEDWT/DtWKOJEnJB0+N1wtKDONMntvvZf602IgxTN55W
// SIG // Xto4bTpBgjuhqok6edMSPSE6SV4tLxHpPAHo0+DyjBDt
// SIG // mz8VOt6et7mW43TeS/pYCHAjTAjSNEiKKUuIGlUeEsvy
// SIG // KA79bw1qXviNvPysvI1k3nndDtx8TyTGal+EAdyOg58G
// SIG // ax4ip+qBN/LYAUwggCrxKGDk4O69pRdCLm7f9/lT7yrU
// SIG // wlG2TxThvI2bfaugBaHZb0J7YqJWCGLakqy8lwECJVxo
// SIG // WeIDXL+Hb9WAIpZ21gPQrJ2IfjihBa/+MODOvZSPsmqG
// SIG // dy/7f1H16U//snO4UvxaJXJqxhSUwWJUuJxNXLim5cGf
// SIG // 1Dhtuki4QzjVlxmQyjCSjed6Di0kpOJXUdB5bG0+IXi5
// SIG // VpThJSUCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTtTFqi
// SIG // hcKwm7a8PT/AOt2wFUicyzAfBgNVHSMEGDAWgBSfpxVd
// SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ
// SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
// SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
// SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
// SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
// SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB
// SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G
// SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // GBmWt2gg7nW5PRFXZD/MXEBmbiACD0cfStQgO7kcwbfN
// SIG // HwtGlpLmGIUDLxxyUR1KG0jOFMN8ze3xxDfIYWgQ2/TU
// SIG // WhpxVnbR8ZifXjM+iaZ+ioiMovVOToO0Ak2TJde59sOH
// SIG // nXaub7ZOK0Vjlb6YgwRiQESol1gfbtosdFh9hDBRh6oy
// SIG // IY1lF4T4EeAujShTVx71r13nCdll6yZ770BlwHzSRhEy
// SIG // WRqUeNZ1Dd4o34gkoxQ8Wphj7MuYmLvdOB7/brkl2HeZ
// SIG // tCcX9ljSUl5DxpTYaztu6T8YE9ddZsgEetUt0toXOe9s
// SIG // zfcqCRDmxPfFcuShDN2V+d3C3nzfNRdQvaf3ACpBOrvV
// SIG // eq8spf6koMbtVKnjmQrRv4mh0ijKMTOzKuEjBbD0//In
// SIG // jncApWKXMNAo2XuSgcdsS2uAdZ3hYm/CfP4EqLIzHRd5
// SIG // x4sh8dWHnWQ7cUkoHoHibItH21IHc7FTCWL6lcOdlqkD
// SIG // btBkQu/Wbla3lFSnQiZlDARwaU6elRaKS9CX+Eq4IPs0
// SIG // Q/YsG3Pbma5/vPaHaSJ2852K5zyh4jtuqntXpDcJf3e6
// SIG // 6NiLT/5YIc9A6A+5BBnopCiVh3baO3lSaCYZK1HGp07l
// SIG // B9PIPjWMBukvj4wUgfzcjRemx2v8UfnHgGIXI8dIgYr/
// SIG // dDJ9CYhn5wNv4S4+Xr4U3AIwggdxMIIFWaADAgECAhMz
// SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA
// SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
// SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp
// SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx
// SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
// SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
// SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
// SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc
// SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus
// SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130
// SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI
// SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes
// SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp
// SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
// SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz
// SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO
// SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi
// SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5
// SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
// SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
// SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
// SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
// SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
// SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG
// SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw
// SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv
// SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH
// SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
// SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK
// SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
// SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
// SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
// SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
// SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
// SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l
// SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ
// SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz
// SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7
// SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY
// SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX
// SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
// SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz
// SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/
// SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1
// SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328
// SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
// SIG // ahC0HVUzWLOhcGbyoYIDUDCCAjgCAQEwgfmhgdGkgc4w
// SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
// SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV
// SIG // BAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1RTAtRDk0
// SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAS3CPNYMW3mtR
// SIG // MdphW18e3JPtIP+ggYMwgYCkfjB8MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOna
// SIG // TZ4wIhgPMjAyNDA0MjkxNjQ3MjZaGA8yMDI0MDQzMDE2
// SIG // NDcyNlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dpN
// SIG // ngIBADAKAgEAAgINmAIB/zAHAgEAAgISWjAKAgUA6duf
// SIG // HgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ
// SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
// SIG // SIb3DQEBCwUAA4IBAQCbDBhZItg3h6gCCYPKfMJ3jJ4F
// SIG // +LO/IKNPN3oOlJKrFhlShYHD+NfjF9simIo+hS+cvEwm
// SIG // A8wRm0f7fAEg12ywlO1PuLZqRuyTNadpJUv28k4HUW/X
// SIG // 1HLmhTZnKDMAbDGxk7pCr6jkx2VDZKEGqMh3PSgvDkcq
// SIG // DFwLsa9Mh+04WbVwcqXXewL872dHrWvAhnmbWMzuipQY
// SIG // OxEq5C6xAp6SY0JKDzgw/8zaT0BmLbMwXAnURLs2SQ01
// SIG // EiFzWka/V0V1gYWKTZpPa5oUaq8zkv2ulWpyy6TLkSuk
// SIG // h+eFFQG+jsf561r710PmZIMS9W2PrqbDSARfALJUvRYb
// SIG // OR59bdFpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTACEzMAAAHviT9WoVjMqNoAAQAA
// SIG // Ae8wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ
// SIG // AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg
// SIG // In2SssrnB+7VY5iwPAwRtbjMdjGxXj62v98Sjcciav4w
// SIG // gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDwYShF
// SIG // uBaN8FM9PTUMdmtA23HbF/I6LzOS4sx5p8l/ozCBmDCB
// SIG // gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
// SIG // HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
// SIG // AAAB74k/VqFYzKjaAAEAAAHvMCIEIFS8D7pQrnbUW9t2
// SIG // eGxwEXDv+OElW+KRZZLe/u5arHYhMA0GCSqGSIb3DQEB
// SIG // CwUABIICABxy65UAoTqH4y11GVlFUPMMqDwAFL5U7U0p
// SIG // Sl0g/qEv8qKCzY5HECI9pDfYBqy82Ik5Z+t4r3Ms6lvT
// SIG // d2swaSnHBPkkYekYRnK5NJmAuQndzivstk5bliH479J2
// SIG // JECzV8vfvDWInvZSt7cLeWLbXhUepDH2FyVocS9jP0t6
// SIG // kW4moinpK/GshkF9MDVFmUuSRN0goAjN938Rh1LaJFQy
// SIG // VcmXfPTE+tZoWGI/8wRUrW5MKvtWc54OsECABvbWIB+r
// SIG // 1kRkLctb3F/VfRT4EqZWEcwN1XS9WNPN0L1McZXzYjiR
// SIG // 7V4nMaIqonRTxgOF6K0PUo0gw+Sntc2eVm/XukttvnKh
// SIG // NjuDk5+NSvJAaa5DQk9oXq0MHUahxiaRBGfpRoBRup40
// SIG // 2fIRoOTsutajf0x9+EACkBnpbSMJ38JaLPUCatBMj2pS
// SIG // 61XCsHM970MnwbuTKfJ1BoFv0hRKEVmcx5Bnw5OzOUtw
// SIG // T8BGuUKu96TRnv6ZLw5DE1Pb72QAU3oJxxBE3IaJobEf
// SIG // vFZZYPt+zs5nqRF+sXmOJYJ+eHJ+E+ZiazMhDjVEiVme
// SIG // YPfHYdKCsuPvESXcmib8fjf6EIApy89ZY5uF/XwtXNWZ
// SIG // RDOgrtQWWJ5g/TykxQQnejWy1Z+rppwgLzGQUNRLPoHG
// SIG // FApqQ3EIrPZwO8hf/KZTWD3RHGQ132PN
// SIG // End signature block
|
combined_dataset/train/non-malicious/d62dc55e-3050-4347-8836-eb27971623ff.ps1
|
d62dc55e-3050-4347-8836-eb27971623ff.ps1
|
####### Log deletions in all sites in a web application ######
############# http://iLoveSharePoint.com ##################
############## by Christian Glessner ######################
################ begin config #################
# Url of the web application to audit. Don't forget to activate the delete audit log on sites you want to log.
$targetWebAppUrl = "http://localhost:100"
# Url of the web that contains the list to log (list must contains the following columns: "Title" (text), "Event Url" (Url), "Item Type" (text), "Event" (text), "Occurred" (DateTime), "User" (text)"
$logWebUrl = "http://localhost:100"
# Title of the log list
$logListTitle ="Audit"
################# end config ##################
$lastRunPropName = "_iLSP_lastAuditTimestamp"
[void][System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SharePoint')
$logSite = New-Object Microsoft.SharePoint.SPSite($logWebUrl)
$logWeb = $logSite.OpenWeb()
$logList = $logWeb.Lists[$logListTitle]
$targetWebApp = [Microsoft.SharePoint.Administration.SPWebApplication]::Lookup($(New-Object Uri($targetWebAppUrl)))
if($targetWebApp.Properties.ContainsKey($lastRunPropName) -eq $false)
{
$targetWebApp.Properties[$lastRunPropName] = [DateTime]::MinValue
$targetWebApp.Update()
}
$lastRun = [DateTime]::Parse($targetWebApp.Properties[$lastRunPropName].ToString())
$newRun = [DateTime]::Now.ToUniversalTime()
foreach($site in $targetWebApp.Sites)
{
$query = New-Object Microsoft.SharePoint.SPAuditQuery($site)
$query.AddEventRestriction([Microsoft.SharePoint.SPAuditEventType]::Delete)
$query.SetRangeStart($lastRun)
$query.SetRangeEnd($newRun.AddDays(1))
$result = $site.Audit.GetEntries($query)
if($result.Count -gt 0)
{
foreach($entry in $result)
{
$eventUrl = $site.Url + "/" + $entry.DocLocation
$item = $logList.Items.Add()
$item[[Microsoft.SharePoint.SPBuiltInFieldId]::Title] = $entry.DocLocation
$item["Event Url"] = $eventUrl
$item["Item Type"] = $entry.ItemType
$item["Event"] = $entry.Event
$item["Occurred"] = $entry.Occurred.ToLocalTime()
$item["User"] = $logWeb.SiteUsers.GetByID($entry.UserId).LoginName
$item.Update()
}
}
$site.Dispose()
}
$targetWebApp.Properties[$lastRunPropName] = $newRun
$targetWebApp.Update()
$logWeb.Dispose()
$logSite.Dispose()
|
combined_dataset/train/non-malicious/196.ps1
|
196.ps1
|
function Test-IsLocalAdministrator
{
([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")
}
|
combined_dataset/train/non-malicious/sample_11_40.ps1
|
sample_11_40.ps1
|
##----------------------------------------------------------------------------
## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved.
##---------------------------------------------------------------------------
# Import shared functions and vars
. .\Commonalities.ps1
. .\StringConstants.ps1
Write-Log "start"
# Check file path from ACS.
$ResultFilePath = $env:ACS_CONFIGURATION_SHEET_CONTENT_FILE_PATH
if ($null -eq $ResultFilePath) {
Write-Log "Failed: ACS_CONFIGURATION_SHEET_CONTENT_FILE_PATH not set"
exit 1
}
Write-Log "ResultFilePath from ACS: $ResultFilePath"
<#
.SYNOPSIS
Creates a new temporary directory.
.EXAMPLE
C:\WINDOWS\TEMP\tink0w3r.dcn
#>
function New-TemporaryDirectory {
$parent = [System.IO.Path]::GetTempPath()
$name = [System.IO.Path]::GetRandomFileName()
New-Item -ItemType Directory -Path (Join-Path $parent $name)
}
# Add html file to temp path.
$tempGenDir = New-TemporaryDirectory
$tempGenDirFullPath = $tempGenDir.FullName
$tempGenFileFullPath = $tempGenDirFullPath + "\file.html"
$tempGenFileFullPath2 = $tempGenFileFullPath.Replace('\', '\\')
try {
# Create path to component exe.
$installationPath = Get-InstallationPath
$path = Join-Path $installationPath $SolutionConstants.binaryFile
Write-Log "Component execution path: $path"
Start-Process -FilePath $path -ArgumentList "generateConfigurationSheetContent", $tempGenFileFullPath2 -Wait
Move-Item -Path $tempGenFileFullPath2 -Destination $ResultFilePath
Write-Log "Moved file from $tempGenFileFullPath2 to $ResultFilePath"
Remove-Item -Path $tempGenFileFullPath -Recurse
Write-Log "Removed temp file path"
Write-Log "Done"
exit 0
}
catch {
Write-Log "Failed: "
Write-Log $_.Exception
exit 1
}
# SIG # Begin signature block
# MIIoIgYJKoZIhvcNAQcCoIIoEzCCKA8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIQ7VDVllSLo92
# GggrGKd0wHsiCNqToj7zmdE2lzBei6CCDY4wggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx
# MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW
# QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0
# aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH
# zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9
# hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB
# UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t
# 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g
# fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu
# j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP
# cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc
# aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI
# KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E
# BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp
# Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5
# NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH
# fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY
# SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs
# X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G
# Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j
# +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB
# Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl
# EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet
# ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF
# xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM
# aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGeowghnm
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF
# AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAq
# mmYSTABNz01YQp4tGg69jGw9IDkUvjxyNqKHEj3N7jANBgkqhkiG9w0BAQEFAASC
# AYAbReHIp5q1u9lfVXkIdzTryApmsfLF7IleFhXbrDjODbL6MCCtKGcgtRX0R9qK
# NOFsNthwLfgagqSR3RP5HfziWBNzmpJ/VgrfDTp00xMWucr4Ggj8zcWH+HQIhzGL
# D3GtnYO2e1kod8GsLROTpFldcx0v1OwVJ+ORSOKJt5efJLRwUp3t3JlcDAiHaCM+
# SkJQJ7F3Qb+/k5rrTGvNgCfFKMYvipJAPrmlsKZPJUZBc8wDWrsxcv/qsf3FKcdF
# XcWeHEoTaLMl3uWANsnOebLZWYVuUl0v4cp+yua/9y+qy9REFa2oUrA0kH81cX8w
# AiLaf1rnU/fhzO7+jX2wbzYSz/LOLwEoCjJNK+bY+eS81eMjH9hBgh3/nhL+gMkd
# bPn1UlMfXYEtjA6lXqYTjg9EVd4rC1+fcuTaf66n40qN5eW7xe3tZpQIzejwNMWN
# H7OvxsgUdIuqVUfTyko+7F8vTzXHEeYq+jp5jnuDiTgaEEJWr3cYIPb4PKBeKr8X
# /CmhghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG9w0BBwKgghcZMIIX
# FQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEEoGkEZzBlAgEBBglg
# hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgCOODhB8TIwcmo1P749S04XpR4Wsu
# hhxmdNo/BNAgaX8CEQDTky2Kv9Bi4cGK57AJYc69GA8yMDI0MDkyMDA5NTMyNlqg
# ghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjANBgkqhkiG9w0BAQsF
# ADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNV
# BAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1w
# aW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1OVowSDELMAkGA1UE
# BhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2Vy
# dCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfcYhVYwamTEafNqrJq
# 3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD1isgHMGXlLSlUIHy
# z8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkP
# G2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH13gpOWvgeFmX40Qr
# StWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52
# fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495uZBkHNwGRDxy1Uc2q
# TGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPTaR58ZE2dD9/O0V6M
# qqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZW
# pST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM
# /vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRwo+wK8REuZODLIivK
# 8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMBAAGjggGLMIIBhzAO
# BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEF
# BQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgw
# FoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW27xPn783QZKHVVqll
# MaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5j
# cmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k
# aWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0
# LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdD
# QS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xwjU+KPGic2CX/yyzk
# zepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt7T1IjrhrunxdvcJh
# N2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703
# DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJpddNQ5EQSviANnqlE
# 0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqXTzON1I13fXVFoaVY
# JmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3701S88lgIcRWR+3a
# EUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhf
# ysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7B145WPR8czFVoIAR
# yxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6r
# r3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBcYLso/zjlUlrWrBci
# I0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZ
# rZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0oZipeWzANBgkqhkiG
# 9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw
# FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVz
# dGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIyMjM1OTU5WjBjMQsw
# CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRp
# Z2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENB
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1BkmzwT1ySVFVxyUD
# xPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3znIkLf50fng8zH1AT
# CyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW
# 1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald68Dd5n12sy+iEZLRS
# 8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zkpsUdzTYNXNXmG6jB
# ZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCY
# Jn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucf
# WmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLc
# GEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJTYsg0ixXNXkrqPNF
# YLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJRk8mMDDtbiiKowSYI
# +RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEoAA6EVO7O6V3IXjAS
# vUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1UdEwEB/wQIMAYBAf8C
# AQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX
# 44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggr
# BgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3Nw
# LmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNl
# cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDag
# NIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RH
# NC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3
# DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJL
# Kftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYSlm/EUExiHQwIgqgW
# valWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2M
# vGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl2szwcqMj+sAngkSu
# mScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJ
# xLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05et3/JWOZJyw9P2un
# 8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SV
# e+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSweJywm228Vex4Ziza4
# k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJ
# Dwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr
# 5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzgaoSv27dZ8/DCCBY0w
# ggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcNAQEMBQAwZTELMAkG
# A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRp
# Z2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENB
# MB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjELMAkGA1UEBhMCVVMx
# FTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNv
# bTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0MIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBpM+zCpyUuySE98orY
# WcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR0uRf1gU8Ug9SH8ae
# FaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckg
# HWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53yEioZldXn1RYjgwr
# t0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4x7axxLVqGDgDEI3Y
# 1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjX
# WkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIb
# Zpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJhbesz2cXfSwQAzH0c
# lcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz0YkH4b235kOkGLim
# dwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIW
# IgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+CiaZ9eRpL5gdLfXZ
# qbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX
# 44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3z
# bcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDBF
# BgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
# cnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG
# 9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviH
# GmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPITtAq3votVs/59Pes
# MHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3
# A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/voVA9/HYJaISfb8rb
# II01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+cWojayL/ErhULSd+
# 2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNyAgEBMHcwYzELMAkG
# A1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdp
# Q2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQ
# BUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMx
# DQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDkyMDA5NTMyNlowKwYL
# KoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZI
# hvcNAQkEMSIEIO6g1eCCkEptFSdakmDouhcCVM53CumGKJnODJnpg/r3MDcGCyqG
# SIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+CitpVmq4zFq9NGprU
# DHgoMA0GCSqGSIb3DQEBAQUABIICADjj/wcxH7XsSBylGfurmv94lMjxDwxeA7f1
# UFJjEAyZWIRQqm5LC699OmgLeM1OmRf0CMHgCXFBv0CKpv+fBlKOGGk9omVCB4ZN
# vRDbgSvsoNjLcdd2iFFQTrBo16738amT8IaV00MdlxDqmbig8q94bQVdqD6Enlsf
# gHkoOWWJz3cIcca2QZq4HSlSqWf8fUfjOPLsxtTatAM9/gCkl0FVS0p0HfRmjHi9
# TBYvEBVsUJqmTWVUPGpSmpNQybdrbKSjyN9BYquvGHQZe9ANMOE6keJsbPkqr+vi
# nLWvgjWVtyZl7mrHG55wya2qvVqM2cuhNwIInqwEPeXolfK6M5BvGEEtcJ7B3bQZ
# pDpTHGzz1JLZ7HyzRCPRamoK2YqnyQMDdrLEbme62zZypP8OsaKFV7vsy00k/l3V
# Nro6ByJ+aT/8H60eL57MMfYzjald0wSTgEuZNUHLLKO9aZ9rJ2hn5AFeUDWTHWhW
# UPH1a8CG3VC6z2CJPSdBwuBOO2j1FFt6rCRmDcGWSaz8ISgLo3VUYJekRvzW0vRr
# Mn1HfqaGZv2NYbtZFJtvfa4uULc4yWjDfa7rCq5GD3RZWUL30VCpuHDqI0v62HCl
# 3nE9OI6x5I9d1Z3SQ/A7WgDA2V6ZZKVb+re8h92PoN8bQjuxA3zr3++E8Ahh67HW
# BUJ+ICJT
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_20_39.ps1
|
sample_20_39.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmconfig'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmconfig.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd19490f5-96d8-4306-a356-ed99eb79c826'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmconfig Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmconfig.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIApmconfigSpanFilterPattern', 'Get-OCIApmconfigConfig',
'Get-OCIApmconfigConfigsList',
'Invoke-OCIApmconfigRetrieveNamespaceMetrics',
'Invoke-OCIApmconfigRetrieveNamespaces', 'New-OCIApmconfigConfig',
'Remove-OCIApmconfigConfig', 'Update-OCIApmconfigConfig'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmconfig'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_55_81.ps1
|
sample_55_81.ps1
|
# WMI-Report (20240513)
# by Gianni Bragante gbrag@microsoft.com
param( [string]$DataPath, [switch]$AcceptEula )
Function Get-WMINamespace($ns) {
Write-Host $ns
Get-WMIProviders $ns
Get-Classes $ns
Get-WmiNamespaceSecurity $ns
Get-WmiObject -namespace $ns -class "__Namespace" | sort-object Name |
foreach {
if ((($_.name.Length -le 2) -or ($_.name.Substring(0,3).ToLower() -ne "ms_")) -and (-not($_.name -match "LDAP"))) {
Get-WMINamespace ($ns + "\" + $_.name)
}
}
}
Function Get-WMIProviders ($ns) {
Get-WmiObject -NameSpace $ns -Class __Win32Provider | sort-object Name |
foreach {
Get-ProvDetails $ns $_.name $_.CLSID $_.HostingModel $_.UnloadTimeout
}
}
Function Get-Classes ($ns) {
Get-WmiObject -Namespace $ns -Query "select * from meta_class" | sort-object Name |
foreach {
$dynamic = $_.Qualifiers["dynamic"].Value
$static = $_.Qualifiers["static"].Value
if( $abstract -eq $true -or $dynamic -eq $true ) {
if ($dynamic -eq $true) { # Dynamic class
$row = $tbDyn.NewRow()
$row.NameSpace = $ns
$row.Name = $_.name
$row.Provider = $_.qualifiers["Provider"].value
$tbDyn.Rows.Add($row)
}
} else {
if (-not $_.name.Startswith("__")) {
if ($static -eq $true) { # Static class = Repository
$row = $tbStatic.NewRow()
$row.NameSpace = $ns
$row.Name = $_.name
$row.Inst = $_.GetInstances().Count
$row.Size = GetClassSize -className $_.name -ns $ns
$tbStatic.Rows.Add($row)
} else {
$row = $tbStatic.NewRow()
$row.NameSpace = $ns
$row.Name = $_.name
$inst = $_.GetInstances().Count # Class with instances, repository as well
if ($inst -gt 0) {
$row.Inst = $Inst
$row.Size = GetClassSize -className $_.name -ns $ns
} else {
$row.Inst = 0
$row.Size = 0
}
$tbStatic.Rows.Add($row)
}
}
}
}
}
Function GetClassSize ($ns, $className) {
$cSize = 0
$classObj = Get-CimInstance -ClassName $className -Namespace $ns -ErrorAction SilentlyContinue
if ($classObj) {
ForEach ($inst in $classObj){
ForEach($prop in $inst.CimInstanceProperties) {
switch ($prop.CimType) {
"SInt8" {$cSize += 1}
"UInt8" {$cSize += 1}
"SInt16" {$cSize += 2}
"UInt16" {$cSize += 2}
"SInt32" {$cSize += 4}
"UInt32" {$cSize += 4}
"SInt64" {$cSize += 8}
"UInt64" {$cSize += 8}
"Real32" {$cSize += 4}
"Real64" {$cSize += 8}
"Char16" {$cSize += 2}
"Boolean" {$cSize += 1}
"Datetime" {$cSize += 8}
"String" {
if ($prop.value) {
$cSize += [Text.Encoding]::Unicode.GetByteCount($prop.value.ToString())
}
}
}
}
}
}
return $cSize
}
Function Get-ProvDetails($ns, $name, $clsid, $HostingModel, $UnloadTimeout) {
$row = $tbProv.NewRow()
$row.NameSpace = $ns
$row.Name = $name
$row.HostingModel = $HostingModel
$row.CLSID= $clsid
$row.UnloadTimeout = $UnloadTimeout
$dll = " "
if ($clsid -ne $null) {
if ($HostingModel -match "decoupled") {
$Keys = Get-ChildItem HKLM:\SOFTWARE\Microsoft\Wbem\Transports\Decoupled\Client
$Items = $Keys | Foreach-Object {Get-ItemProperty $_.PsPath }
ForEach ($key in $Items) {
if ($key.Provider -eq $name) {
$key.ProcessIdentifier
$proc = Get-WmiObject -Query ("select ExecutablePath from Win32_Process where ProcessId = " + $key.ProcessIdentifier)
$exe = get-item ($proc.ExecutablePath)
$row.DLL = $proc.ExecutablePath
$row.dtDLL = $exe.CreationTime
$row.verDLL = $exe.VersionInfo.FileVersion
$svc = Get-WmiObject -Query ("select Name from Win32_Service where ProcessId = " + $key.ProcessIdentifier)
if ($svc) {
$row.ThreadingModel = ("Service: " + $svc.Name)
}
}
}
} elseif ($HostingModel -ne "SelfHost") {
$name = (get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKCR:\CLSID\" + $clsid)).'(default)'
$dll = (get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKCR:\CLSID\" + $clsid + "\InprocServer32")).'(default)'
$row.DLL= $dll
if ($dll) {
$dll = $dll.Replace("""","")
$file = Get-Item ($dll)
$row.dtDLL = $file.CreationTime
$row.verDLL = $file.VersionInfo.FileVersion
}
$row.ThreadingModel = (get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKCR:\CLSID\" + $clsid + "\InprocServer32")).'ThreadingModel'
}
}
$tbProv.Rows.Add($row)
}
Function Get-WmiNamespaceSecurity {
# This function comes from https://github.com/KurtDeGreeff/PlayPowershell/blob/master/Get-WmiNamespaceSecurity.ps1
Param ( [parameter(Mandatory=$true,Position=0)][string] $namespace,
[string] $computer = ".",
[System.Management.Automation.PSCredential] $credential = $null)
Process {
$ErrorActionPreference = "Stop"
Function Get-PermissionFromAccessMask($accessMask) {
$WBEM_ENABLE = 1
$WBEM_METHOD_EXECUTE = 2
$WBEM_FULL_WRITE_REP = 4
$WBEM_PARTIAL_WRITE_REP = 8
$WBEM_WRITE_PROVIDER = 0x10
$WBEM_REMOTE_ACCESS = 0x20
$READ_CONTROL = 0x20000
$WRITE_DAC = 0x40000
$WBEM_RIGHTS_FLAGS = $WBEM_ENABLE,$WBEM_METHOD_EXECUTE,$WBEM_FULL_WRITE_REP,`
$WBEM_PARTIAL_WRITE_REP,$WBEM_WRITE_PROVIDER,$WBEM_REMOTE_ACCESS,`
$WBEM_RIGHT_SUBSCRIBE,$WBEM_RIGHT_PUBLISH,$READ_CONTROL,$WRITE_DAC
$WBEM_RIGHTS_STRINGS = "EnableAccount","ExecuteMethod","FullWrite","PartialWrite",`
"ProviderWrite","RemoteEnable","Subscribe","Publish","ReadSecurity","WriteSecurity"
$permission = @()
for ($i = 0; $i -lt $WBEM_RIGHTS_FLAGS.Length; $i++) {
if (($accessMask -band $WBEM_RIGHTS_FLAGS[$i]) -gt 0) {
$permission += $WBEM_RIGHTS_STRINGS[$i]
}
}
$permission
}
$res = ""
$INHERITED_ACE_FLAG = 0x10
$invokeparams = @{Namespace=$namespace;Path="__systemsecurity=@";Name="GetSecurityDescriptor";ComputerName=$computer}
if ($credential -eq $null) {
$credparams = @{}
} else {
$credparams = @{Credential=$credential}
}
$output = Invoke-WmiMethod @invokeparams @credparams -ErrorAction SilentlyContinue
if ($output.ReturnValue -ne 0) {
$res = "GetSecurityDescriptor failed:" + $output.ReturnValue + " "
}
$acl = $output.Descriptor
foreach ($ace in $acl.DACL) {
$user = New-Object System.Management.Automation.PSObject
$user | Add-Member -MemberType NoteProperty -Name "Name" -Value "$($ace.Trustee.Domain)\$($ace.Trustee.Name)"
$user | Add-Member -MemberType NoteProperty -Name "Permission" -Value (Get-PermissionFromAccessMask($ace.AccessMask))
$user | Add-Member -MemberType NoteProperty -Name "Inherited" -Value (($ace.AceFlags -band $INHERITED_ACE_FLAG) -gt 0)
$res = $res + ($user.Name + " (" + ($user.permission -join " ") + ")") + " / "
}
$row = $tbSec.NewRow()
$row.NameSpace = $namespace
$row.Security = $res.Substring(0, $res.Length -3)
$tbSec.Rows.Add($row)
}
}
[void][System.Reflection.Assembly]::Load('System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a')
[void][System.Reflection.Assembly]::Load('System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089')
function ShowEULAPopup($mode)
{
$EULA = New-Object -TypeName System.Windows.Forms.Form
$richTextBox1 = New-Object System.Windows.Forms.RichTextBox
$btnAcknowledge = New-Object System.Windows.Forms.Button
$btnCancel = New-Object System.Windows.Forms.Button
$EULA.SuspendLayout()
$EULA.Name = "EULA"
$EULA.Text = "Microsoft Diagnostic Tools End User License Agreement"
$richTextBox1.Anchor = [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Left -bor [System.Windows.Forms.AnchorStyles]::Right
$richTextBox1.Location = New-Object System.Drawing.Point(12,12)
$richTextBox1.Name = "richTextBox1"
$richTextBox1.ScrollBars = [System.Windows.Forms.RichTextBoxScrollBars]::Vertical
$richTextBox1.Size = New-Object System.Drawing.Size(776, 397)
$richTextBox1.TabIndex = 0
$richTextBox1.ReadOnly=$True
$richTextBox1.Add_LinkClicked({Start-Process -FilePath $_.LinkText})
$richTextBox1.Rtf = @"
{\rtf1\ansi\ansicpg1252\deff0\nouicompat{\fonttbl{\f0\fswiss\fprq2\fcharset0 Segoe UI;}{\f1\fnil\fcharset0 Calibri;}{\f2\fnil\fcharset0 Microsoft Sans Serif;}}
{\colortbl ;\red0\green0\blue255;}
{\*\generator Riched20 10.0.19041}{\*\mmathPr\mdispDef1\mwrapIndent1440 }\viewkind4\uc1
\pard\widctlpar\f0\fs19\lang1033 MICROSOFT SOFTWARE LICENSE TERMS\par
Microsoft Diagnostic Scripts and Utilities\par
\par
{\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15
0100090000035000000000002700000000000400000003010800050000000b0200000000050000
000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00
010001000000000001000100000000002800000001000000010000000100010000000000000000
000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300
00000000
}These license terms are an agreement between you and Microsoft Corporation (or one of its affiliates). IF YOU COMPLY WITH THESE LICENSE TERMS, YOU HAVE THE RIGHTS BELOW. BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS.\par
{\pict{\*\picprop}\wmetafile8\picw26\pich26\picwgoal32000\pichgoal15
0100090000035000000000002700000000000400000003010800050000000b0200000000050000
000c0202000200030000001e000400000007010400040000000701040027000000410b2000cc00
010001000000000001000100000000002800000001000000010000000100010000000000000000
000000000000000000000000000000000000000000ffffff00000000ff040000002701ffff0300
00000000
}\par
\pard
{\pntext\f0 1.\tab}{\*\pn\pnlvlbody\pnf0\pnindent0\pnstart1\pndec{\pntxta.}}
\fi-360\li360 INSTALLATION AND USE RIGHTS. Subject to the terms and restrictions set forth in this license, Microsoft Corporation (\ldblquote Microsoft\rdblquote ) grants you (\ldblquote Customer\rdblquote or \ldblquote you\rdblquote ) a non-exclusive, non-assignable, fully paid-up license to use and reproduce the script or utility provided under this license (the "Software"), solely for Customer\rquote s internal business purposes, to help Microsoft troubleshoot issues with one or more Microsoft products, provided that such license to the Software does not include any rights to other Microsoft technologies (such as products or services). \ldblquote Use\rdblquote means to copy, install, execute, access, display, run or otherwise interact with the Software. \par
\pard\widctlpar\par
\pard\widctlpar\li360 You may not sublicense the Software or any use of it through distribution, network access, or otherwise. Microsoft reserves all other rights not expressly granted herein, whether by implication, estoppel or otherwise. You may not reverse engineer, decompile or disassemble the Software, or otherwise attempt to derive the source code for the Software, except and to the extent required by third party licensing terms governing use of certain open source components that may be included in the Software, or remove, minimize, block, or modify any notices of Microsoft or its suppliers in the Software. Neither you nor your representatives may use the Software provided hereunder: (i) in a way prohibited by law, regulation, governmental order or decree; (ii) to violate the rights of others; (iii) to try to gain unauthorized access to or disrupt any service, device, data, account or network; (iv) to distribute spam or malware; (v) in a way that could harm Microsoft\rquote s IT systems or impair anyone else\rquote s use of them; (vi) in any application or situation where use of the Software could lead to the death or serious bodily injury of any person, or to physical or environmental damage; or (vii) to assist, encourage or enable anyone to do any of the above.\par
\par
\pard\widctlpar\fi-360\li360 2.\tab DATA. Customer owns all rights to data that it may elect to share with Microsoft through using the Software. You can learn more about data collection and use in the help documentation and the privacy statement at {{\field{\*\fldinst{HYPERLINK https://aka.ms/privacy }}{\fldrslt{https://aka.ms/privacy\ul0\cf0}}}}\f0\fs19 . Your use of the Software operates as your consent to these practices.\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 3.\tab FEEDBACK. If you give feedback about the Software to Microsoft, you grant to Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose.\~ You will not provide any feedback that is subject to a license that would require Microsoft to license its software or documentation to third parties due to Microsoft including your feedback in such software or documentation. \par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 4.\tab EXPORT RESTRICTIONS. Customer must comply with all domestic and international export laws and regulations that apply to the Software, which include restrictions on destinations, end users, and end use. For further information on export restrictions, visit {{\field{\*\fldinst{HYPERLINK https://aka.ms/exporting }}{\fldrslt{https://aka.ms/exporting\ul0\cf0}}}}\f0\fs19 .\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360\qj 5.\tab REPRESENTATIONS AND WARRANTIES. Customer will comply with all applicable laws under this agreement, including in the delivery and use of all data. Customer or a designee agreeing to these terms on behalf of an entity represents and warrants that it (i) has the full power and authority to enter into and perform its obligations under this agreement, (ii) has full power and authority to bind its affiliates or organization to the terms of this agreement, and (iii) will secure the permission of the other party prior to providing any source code in a manner that would subject the other party\rquote s intellectual property to any other license terms or require the other party to distribute source code to any of its technologies.\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360\qj 6.\tab DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED \ldblquote AS IS,\rdblquote WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL MICROSOFT OR ITS LICENSORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THE SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\par
\pard\widctlpar\qj\par
\pard\widctlpar\fi-360\li360\qj 7.\tab LIMITATION ON AND EXCLUSION OF DAMAGES. IF YOU HAVE ANY BASIS FOR RECOVERING DAMAGES DESPITE THE PRECEDING DISCLAIMER OF WARRANTY, YOU CAN RECOVER FROM MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT, OR INCIDENTAL DAMAGES. This limitation applies to (i) anything related to the Software, services, content (including code) on third party Internet sites, or third party applications; and (ii) claims for breach of contract, warranty, guarantee, or condition; strict liability, negligence, or other tort; or any other claim; in each case to the extent permitted by applicable law. It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your state, province, or country may not allow the exclusion or limitation of incidental, consequential, or other damages.\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 8.\tab BINDING ARBITRATION AND CLASS ACTION WAIVER. This section applies if you live in (or, if a business, your principal place of business is in) the United States. If you and Microsoft have a dispute, you and Microsoft agree to try for 60 days to resolve it informally. If you and Microsoft can\rquote t, you and Microsoft agree to binding individual arbitration before the American Arbitration Association under the Federal Arbitration Act (\ldblquote FAA\rdblquote ), and not to sue in court in front of a judge or jury. Instead, a neutral arbitrator will decide. Class action lawsuits, class-wide arbitrations, private attorney-general actions, and any other proceeding where someone acts in a representative capacity are not allowed; nor is combining individual proceedings without the consent of all parties. The complete Arbitration Agreement contains more terms and is at {{\field{\*\fldinst{HYPERLINK https://aka.ms/arb-agreement-4 }}{\fldrslt{https://aka.ms/arb-agreement-4\ul0\cf0}}}}\f0\fs19 . You and Microsoft agree to these terms. \par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 9.\tab LAW AND VENUE. If U.S. federal jurisdiction exists, you and Microsoft consent to exclusive jurisdiction and venue in the federal court in King County, Washington for all disputes heard in court (excluding arbitration). If not, you and Microsoft consent to exclusive jurisdiction and venue in the Superior Court of King County, Washington for all disputes heard in court (excluding arbitration).\par
\pard\widctlpar\par
\pard\widctlpar\fi-360\li360 10.\tab ENTIRE AGREEMENT. This agreement, and any other terms Microsoft may provide for supplements, updates, or third-party applications, is the entire agreement for the software.\par
\pard\sa200\sl276\slmult1\f1\fs22\lang9\par
\pard\f2\fs17\lang2057\par
}
"@
$richTextBox1.BackColor = [System.Drawing.Color]::White
$btnAcknowledge.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right
$btnAcknowledge.Location = New-Object System.Drawing.Point(544, 415)
$btnAcknowledge.Name = "btnAcknowledge";
$btnAcknowledge.Size = New-Object System.Drawing.Size(119, 23)
$btnAcknowledge.TabIndex = 1
$btnAcknowledge.Text = "Accept"
$btnAcknowledge.UseVisualStyleBackColor = $True
$btnAcknowledge.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::Yes})
$btnCancel.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right
$btnCancel.Location = New-Object System.Drawing.Point(669, 415)
$btnCancel.Name = "btnCancel"
$btnCancel.Size = New-Object System.Drawing.Size(119, 23)
$btnCancel.TabIndex = 2
if($mode -ne 0)
{
$btnCancel.Text = "Close"
}
else
{
$btnCancel.Text = "Decline"
}
$btnCancel.UseVisualStyleBackColor = $True
$btnCancel.Add_Click({$EULA.DialogResult=[System.Windows.Forms.DialogResult]::No})
$EULA.AutoScaleDimensions = New-Object System.Drawing.SizeF(6.0, 13.0)
$EULA.AutoScaleMode = [System.Windows.Forms.AutoScaleMode]::Font
$EULA.ClientSize = New-Object System.Drawing.Size(800, 450)
$EULA.Controls.Add($btnCancel)
$EULA.Controls.Add($richTextBox1)
if($mode -ne 0)
{
$EULA.AcceptButton=$btnCancel
}
else
{
$EULA.Controls.Add($btnAcknowledge)
$EULA.AcceptButton=$btnAcknowledge
$EULA.CancelButton=$btnCancel
}
$EULA.ResumeLayout($false)
$EULA.Size = New-Object System.Drawing.Size(800, 650)
Return ($EULA.ShowDialog())
}
function ShowEULAIfNeeded($toolName, $mode)
{
$eulaRegPath = "HKCU:Software\Microsoft\CESDiagnosticTools"
$eulaAccepted = "No"
$eulaValue = $toolName + " EULA Accepted"
if(Test-Path $eulaRegPath)
{
$eulaRegKey = Get-Item $eulaRegPath
$eulaAccepted = $eulaRegKey.GetValue($eulaValue, "No")
}
else
{
$eulaRegKey = New-Item $eulaRegPath
}
if($mode -eq 2) # silent accept
{
$eulaAccepted = "Yes"
$ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force
}
else
{
if($eulaAccepted -eq "No")
{
$eulaAccepted = ShowEULAPopup($mode)
if($eulaAccepted -eq [System.Windows.Forms.DialogResult]::Yes)
{
$eulaAccepted = "Yes"
$ignore = New-ItemProperty -Path $eulaRegPath -Name $eulaValue -Value $eulaAccepted -PropertyType String -Force
}
}
}
return $eulaAccepted
}
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID)
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator
if (-not $myWindowsPrincipal.IsInRole($adminRole)) {
Write-Output "This script needs to be run as Administrator"
exit
}
$global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path
$resName = "WMI-Report-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss)
$global:resDir = $global:Root + "\" + $resName
if ($AcceptEula) {
Write-Host "AcceptEula switch specified, silently continuing"
$eulaAccepted = ShowEULAIfNeeded "WMI-Report" 2
} else {
$eulaAccepted = ShowEULAIfNeeded "WMI-Report" 0
if($eulaAccepted -ne "Yes")
{
Write-Host "EULA declined, exiting"
exit
}
}
Write-Host "EULA accepted, continuing"
if ($DataPath) {
if (-not (Test-Path $DataPath)) {
Write-Host "The folder $DataPath does not exist"
exit
}
$global:resDir = $DataPath + "\" + $resName
} else {
$global:resDir = $global:Root + "\" + $resName
}
New-Item -itemtype directory -path $global:resDir | Out-Null
New-PSDrive -PSProvider registry -Root HKEY_CLASSES_ROOT -Name HKCR | Out-Null
$tbProv = New-Object system.Data.DataTable "WmiProv"
$col = New-Object system.Data.DataColumn NameSpace,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn Name,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn HostingModel,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn ThreadingModel,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn DLL,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn dtDLL,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn verDLL,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn UnloadTimeout,([string])
$tbProv.Columns.Add($col)
$col = New-Object system.Data.DataColumn CLSID,([string])
$tbProv.Columns.Add($col)
$tbDyn = New-Object system.Data.DataTable "Classes"
$col = New-Object system.Data.DataColumn NameSpace,([string])
$tbDyn.Columns.Add($col)
$col = New-Object system.Data.DataColumn Name,([string])
$tbDyn.Columns.Add($col)
$col = New-Object system.Data.DataColumn Provider,([string])
$tbDyn.Columns.Add($col)
$tbStatic = New-Object system.Data.DataTable "Repository"
$col = New-Object system.Data.DataColumn NameSpace,([string])
$tbStatic.Columns.Add($col)
$col = New-Object system.Data.DataColumn Name,([string])
$tbStatic.Columns.Add($col)
$col = New-Object system.Data.DataColumn Inst,([Int32])
$tbStatic.Columns.Add($col)
$col = New-Object system.Data.DataColumn Size,([Int64])
$tbStatic.Columns.Add($col)
$tbSec = New-Object system.Data.DataTable "Security"
$col = New-Object system.Data.DataColumn NameSpace,([string])
$tbSec.Columns.Add($col)
$col = New-Object system.Data.DataColumn Security,([string])
$tbSec.Columns.Add($col)
Get-WMINamespace "Root"
Write-Host "Writing Providers.csv"
$tbProv | Export-Csv $global:resDir"\Providers.csv" -noType
Write-Host "Writing Classes.csv"
$tbDyn | Export-Csv $global:resDir"\Dynamic.csv" -noType
Write-Host "Writing Repository.csv"
$tbStatic | Export-Csv $global:resDir"\Static.csv" -noType
Write-Host "Writing Security.csv"
$tbSec | Export-Csv $global:resDir"\Security.csv" -noType
# SIG # Begin signature block
# MIIoOAYJKoZIhvcNAQcCoIIoKTCCKCUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBvDosdHCUJOkpL
# Y6V9rugF1i7srSeeFU6RbSEbTj21yqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAiH
# NQTNcjA6Bo7C3sZShubpH30p8Tz28F6g+3ErcHMrMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAS23f0z7TFi4bjSksHY3KXV1wfBve7AlLJU9c
# zi1qrCNTrzk6JkZ886GoU0qr+m2YjfZYmpZvx9QP2aVLZSBDPFGs2vYVj5El07sv
# +CRFEGANEw/A99WLLnwMQHm7CTiu4KPxdCSuq+l+QHMlom+g3l7sjaaNkuPOONl7
# g2XBOhPwMABUMWrVSuo9TUUxBgrj/oVnTWlODQNSv7dUH2MP39by7CT6DDZCAYRh
# kpuS6LD7c5Ndh0cNOr+qtqLR4gfI30PXNNh0+EAPm1CL1I5JRd7VPzmEGhHpyy7h
# DuBrDnN08+QE5tkpAgwoi4J2qNa6fkx/ZleoLgZJY9Gbj/Q7oKGCF5MwghePBgor
# BgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCnXKLT/4yesJ3d+S1KJSBGVVqDbyZKbjqR
# 2BjXvygO0wIGZkZX1jEqGBIyMDI0MDYxMjE1MDA0MC4xMVowBIACAfSggdGkgc4w
# gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
# HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg
# VFNTIEVTTjozMzAzLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB5tlCnuoA+H3hAAEA
# AAHmMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIzMTIwNjE4NDUxNVoXDTI1MDMwNTE4NDUxNVowgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjozMzAzLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL2+mHzi2CW4TOb/Ck0qUCNw
# SUbN+W8oANnUP7Z3+J5hgS0XYcoysoYUM4uktZYbkMTKIpuVgqsTae3njQ4a7fln
# HSBckETTNZqdkQCMKO3h4YGL65qRmyTvTMdNAcfJ8/4HebYFJI0U+GCxUg+nq+j/
# 23o5417MjBfkTn5XAQbfudmAR7FAXZ9BlhvFDUBq6oO9F1exKkrV2HVQG30RoyzO
# 65xpHmczBA3qwOMb30XN0r0C3NufhKaWygtS1ECH/vrywp3RjWEyYpUfAhfz/gm5
# RFQFFnQla7Q1hAGnySGS7XxDwIBDnTS0UHtUfekPzOgDiVwDsmTFMag8qu5+b6VF
# kADiIyBtwtnY//FJ2coXFTy8vfVGg2VkmIYvkypNe+/IEvP4xE/gSf03J7U3zH+U
# kPWy102jnAkb6aBewT/N/ODYZpWpBzMUeDQ2Xxukiqc0VRF5BGrcLWNVgwJJx6A3
# Md5i3Dk6Zn/t5WdGaNeUKwu92zE7NzVhWfqdkuRAPnLfUdisH2Ige6zCFoy/aEk0
# 2NWd2SlbL3fg8hm5ZMyTfrSSNc8XCXZa/VPOb206sKrz6XjTwogvon55+gY2RHxg
# Hcz67W1h5UM79Nw5sYfFoYUHpBnEBSmd8Hk38yYE3Ew6rMbU3xCLBbyC2OMwmIUF
# /qJhisKO1HAXsg91AsW1AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU5QQxee03nj7X
# Vkz5C7tDmuDcVz0wHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAGFu6iBNqlGy7BKR
# oUxDp3K7xkJhSlZDyIituLjS1TaErqkeC7SGPTP/3MVFHHkN+G6SO9uMD91LlVh/
# HPUQhs+W3z3swnawEY7ZgtjBh6V8mkPBsHRdL1mSuqnOrpf+WYNAOfcbm9xilhAI
# nnksu/IWUnX3kBWjhbLxRfmnuD1bcyA0dAykz4RXrj5yzOPgejlpCZ4oa0rLvDvZ
# 5Fj+9YO6m2u/Ou4U2YoIi3XZRwDkE6xenU+2SPHbJGwKPvsNKaXTNViOpb8hJaSs
# aPJ5Un6SHNy3FouSSVXALGKCiQPp+RZvLSEIQpM5M8zOG6A8gBzFwexHazHTVhFr
# 2kfbO912y4ER9IUboKPRBK8Rn8z2Yn6HiaJpBJHsARtUYNvJEqRifzRL7cCZGWHd
# k574EWonns5d14gNIdu8fMnuhOobz3qXd5SE+xmDr182DFPGW9E2ZET/7rViPtnW
# 4HRdhA/rSuwwt1OVVgTJlSXkwtMvku+oWjNmVLZeiOLgEQ/p11VPOYcnih05kxZN
# N5DQjCdYb3y9a/+ug96AKvUbrUVWt1csTcBch+3hk3hmQNOegCE/DsNk09GVJbhN
# tWP8vDRe+ctg3AxQD2i5j/DH215Nony9ORuBjJo5goXPqs1Fdnhp/p7chfAwJ98J
# qykpRcLvZgy7lbwv/PJPGw1QSAFtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj
# YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUw
# LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVAOJY0F4Un2O9oSs3rgPUbzp4vSa7oIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqE8QlMCIY
# DzIwMjQwNjEyMDY1MjIxWhgPMjAyNDA2MTMwNjUyMjFaMHQwOgYKKwYBBAGEWQoE
# ATEsMCowCgIFAOoTxCUCAQAwBwIBAAICDMswBwIBAAICE30wCgIFAOoVFaUCAQAw
# NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC
# AQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAgCUXjxDOUjT+dQcTfT0iftF7fAwy
# wZWMm8fxDIMVKB2jFruICaZuPFIcOPpE5aSkL6nAKH7maea3I5j6qA8kRkRx68ZA
# 6wwCDFIPCAWSMaMs4fXQA0wam/guCh9/XmhXSSDz69bbD+ILOZrN6euj8pTazqNn
# btylnU7FbBOFp+wShlodwBWtHmW2QkTFwSBLF8ucVMT1yK2Vj8UZ8k8Cg8sCt/1q
# z0x6zFmueHBLVF13jrN9rZH9a3+x4qB7xokcQl+zdBHHgz6GFBRUGezJSswibEy9
# dNb3DjjZDr7pFNJlvx62ZhpAuYW63V0+tOS8W0wfYH9Jx8BLHWOckvPNjjGCBA0w
# ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5tlC
# nuoA+H3hAAEAAAHmMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL
# KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIEK7Nvu4Lfrta0irsUF8N5ec6iAS
# VN6MrPXihjJA6rWfMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgz7ujhqge
# swlobyCcs7WrXqEhhxGejLoWc4JudIPSxlkwgZgwgYCkfjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB5jAiBCDLoqZJoRFQ
# XDnMzyLGtaN50RasKRdgbT7wlAFFD4YlcjANBgkqhkiG9w0BAQsFAASCAgAchMRC
# 9fbGPRXJ73xrjHYkgwW+eiv4FJp8cIxnjfikK4uzco290g1reQKrrPW93dsbDuFf
# zGQZvZjWGD41tQaO6HEmE/VYE/zl2xobeCs8k3tKO7O3La4nTe2i3KY9FsfBmjfL
# TfY3a09LXu9TqposBI+YJAJ8EMbH6a9m1s2izQ3k6QIj/2T5kVsRm8Fz7kQbjFDU
# VqQlaZw9pOqOf6T4VFRJVL9sWgAHb88IyuHrqsHCx9+PfjXakF8bqMhrEpamIJId
# u2QUxVse0TuYUsvNLiBzATVqhfUJdGo7p8UAO7oslCXHbUHAZY5jKmWKLAkrRGwL
# tv/vtZrG30mZM8Lwq8jZKx2S1S5hBG1X3sRb0QImyz5SlLc35LdSJx8GoUmycyw+
# v3qMcZyOc9kiklQKvUVpYdcxXj8SuqwKfd21ay65JbxhIdThdMURa+TvlVvNIaFG
# Cxxo0z9rQGKlLjuyC/tGIisTb1kfroRZgpokNHvJR+D7zzefooDchfzdE0YmsUqd
# fiNEOQoWYDfniNzAszyqYi4p8QVo8lsTJlFBnyddiIWr6exrduk3R1ivP7rQpRGl
# WUiBUgh9ACHc7IvQKsK822DjfCjY8PawXAIeU/Y34tYBHH1ygDFEC8K3S1JozTTz
# 0fIx0hcciZeIlVbhKFHKA8BVxGWq+/75gZHmMQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/get windows product key_2.ps1
|
get windows product key_2.ps1
|
function get-windowsproductkey([Parameter(ValueFromPipeline=$true)][string[]]$computer)
{
PROCESS{
foreach($comp in $computer) {
$Reg = [WMIClass] ("\\\\" + $comp + "\\root\\default:StdRegProv")
$values = [byte[]]($reg.getbinaryvalue(2147483650,"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion","DigitalProductId").uvalue)
$lookup = [char[]]("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9")
$keyStartIndex = [int]52;
$keyEndIndex = [int]($keyStartIndex + 15);
$decodeLength = [int]29
$decodeStringLength = [int]15
$decodedChars = new-object char[] $decodeLength
$hexPid = new-object System.Collections.ArrayList
for ($i = $keyStartIndex; $i -le $keyEndIndex; $i++){ [void]$hexPid.Add($values[$i]) }
for ( $i = $decodeLength - 1; $i -ge 0; $i--)
{
if (($i + 1) % 6 -eq 0){$decodedChars[$i] = '-'}
else
{
$digitMapIndex = [int]0
for ($j = $decodeStringLength - 1; $j -ge 0; $j--)
{
$byteValue = [int](($digitMapIndex * [int]256) -bor [byte]$hexPid[$j]);
$hexPid[$j] = [byte] ([math]::Floor($byteValue / 24));
$digitMapIndex = $byteValue % 24;
$decodedChars[$i] = $lookup[$digitMapIndex];
}
}
}
$STR = ''
$decodedChars | % { $str+=$_}
$STR
}}}
get-windowsproductkey .
|
combined_dataset/train/non-malicious/VMtoolsUpgrade-disable_1.ps1
|
VMtoolsUpgrade-disable_1.ps1
|
#####################################################################
# TIAA-CREF VMWare Standard Scripts - PowerCLI
#
# Purpose: "Check and upgrade Tools during power cycling"
# Author: David Chung
# Support: IT Infrastructure
# Docs: N/A
#
# Instruction: 1. Create CSV file with list of servers
# 2. Execute script from PowerCLI
# 3. Enter virtual server name
#
#####################################################################
$viserver = read-host "Please enter vCenter Server:"
connect-viserver $viserver
$vms = Import-Csv c:\\server.csv
foreach ($vm.name in $vms)
{
Write-Host $vm.name " - Disabling VMTools Update at Power Cycle"
$vmConfig = New-Object VMware.Vim.VirtualMachineConfigSpec
$vmConfig.Tools = New-Object VMware.Vim.ToolsConfigInfo
$vmConfig.Tools.ToolsUpgradePolicy = "Manual"
Get-VM $vm.name | where {$_.Extensiondata.ReconfigVM($vmconfig)}
}
|
combined_dataset/train/non-malicious/2892.ps1
|
2892.ps1
|
task default -depends A,B
task A {
}
task B {
"inside task B before calling task C"
invoke-task C
"inside task B after calling task C"
}
task C {
}
|
combined_dataset/train/non-malicious/Get-ChilditemsRecursive.ps1
|
Get-ChilditemsRecursive.ps1
|
function Get-ChildItem2 ($path)
{
# path can either be absolut or relative, I only tried filesystem
# perhaps to named Get-ChildItemsRecursive
$root = gi $path
$PathLength = $root.FullName.length
# it would be nice if Split-Path could do the trick, I didn't grok it
gci $path -rec | % {
Add-Member -InputObject $_ -MemberType NoteProperty -Name RelativePath -Value $_.FullName.substring($PathLength+1)
$_
}
}
# Try for example:
# Get-ChildItem2 $pshome | % {$_.RelativePath }
# Now generate demo data
cd f:
md tmp
md tmp\\gcir\\dir1
md tmp\\gcir\\dir2
"file1" > tmp\\gcir\\dir1\\file1.txt
"file2" > tmp\\gcir\\dir1\\file2.txt
copy-Item tmp\\gcir\\dir1\\file1.txt tmp\\gcir\\dir2\\file1.txt # both file1 have same length and LastWriteTime
"file2changed" > tmp\\gcir\\dir2\\file2.txt # different length forced by different contents
# now we get pathnames relative to the starting path
Get-ChildItem2 tmp | % {$_.RelativePath }
<#
gcir
gcir\\dir1
gcir\\dir2
gcir\\dir1\\file1.txt
gcir\\dir1\\file2.txt
gcir\\dir2\\file1.txt
gcir\\dir2\\file2.txt
#>
# and it is easy to compare two trees of files
Compare-Object (Get-ChildItem2 tmp\\gcir\\dir1) (Get-ChildItem2 tmp\\gcir\\dir2) -prop RelativePath, LastWriteTime, Length -includeEqual
<#
RelativePath LastWriteTime Length SideIndicator
------------ ------------- ------ -------------
file1.txt 05.04.2009 10:45:03 16 ==
file2.txt 05.04.2009 10:45:03 30 =>
file2.txt 05.04.2009 10:45:03 16 <=
#>
# well we look only for the different files
Compare-Object (Get-ChildItem2 tmp\\gcir\\dir1) (Get-ChildItem2 tmp\\gcir\\dir2) -prop RelativePath, LastWriteTime, Length
# add some fiddeling to the newest file only
$last = $null
Compare-Object (Get-ChildItem2 tmp\\gcir\\dir1) (Get-ChildItem2 tmp\\gcir\\dir2) -prop RelativePath, LastWriteTime, Length |
Sort RelativePath, LastWriteTime -desc | % {
if ($last -ne $_.RelativePath)
{ $_ }
$last = $_.RelativePath
} | sort RelativePath
<#
RelativePath LastWriteTime Length SideIndicator
------------ ------------- ------ -------------
file2.txt 05.04.2009 10:45:03 30 =>
#>
|
combined_dataset/train/non-malicious/sample_28_16.ps1
|
sample_28_16.ps1
|
@{
GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
NestedModules="Microsoft.PowerShell.Commands.Management.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
FunctionsToExport = @()
AliasesToExport = @("gcb", "gin", "gtz", "scb", "stz")
CmdletsToExport=@("Add-Content",
"Clear-Content",
"Get-Clipboard",
"Set-Clipboard",
"Clear-ItemProperty",
"Join-Path",
"Convert-Path",
"Copy-ItemProperty",
"Get-ChildItem",
"Get-Content",
"Get-ItemProperty",
"Get-ItemPropertyValue",
"Move-ItemProperty",
"Get-Location",
"Set-Location",
"Push-Location",
"Pop-Location",
"New-PSDrive",
"Remove-PSDrive",
"Get-PSDrive",
"Get-Item",
"New-Item",
"Set-Item",
"Remove-Item",
"Move-Item",
"Rename-Item",
"Copy-Item",
"Clear-Item",
"Invoke-Item",
"Get-PSProvider",
"New-ItemProperty",
"Split-Path",
"Test-Path",
"Test-Connection",
"Get-Process",
"Stop-Process",
"Wait-Process",
"Debug-Process",
"Start-Process",
"Remove-ItemProperty",
"Rename-ItemProperty",
"Resolve-Path",
"Get-Service",
"Stop-Service",
"Start-Service",
"Suspend-Service",
"Resume-Service",
"Restart-Service",
"Set-Service",
"New-Service",
"Remove-Service",
"Set-Content",
"Set-ItemProperty",
"Restart-Computer",
"Stop-Computer",
"Rename-Computer",
"Get-ComputerInfo",
"Get-TimeZone",
"Set-TimeZone",
"Get-HotFix",
"Clear-RecycleBin")
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOkUHfBYP8n8JI
# rFMR/Pi6BPlAC/b/pz0LBmd3yrLJC6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG8CgBXFFJ/2vAtXu5Tg5Csn
# XsYj0AU0agFGmPJaSF8WMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAhTwmeh7FqR3IjpVHA5jOcGI+Fuly0MIyGP2pc8iTuUdXVGzGztPC31Tv
# RrO3IzkFD8VhiMUDNi4hb6gE3IhKotFyzJtlqWdyg2xqy7jvr+hHW+crDnhOKmsB
# zVoVZegu1of4bN3IIj5CKSGZct2hTDPpKSJzneudofpq7YK97iH5qkMLAug12YGv
# /0ZoJbys1ZR74+t2ObyvywPl9azGfskZhVcFpd4c03V9RQaN3j8t+W33U7oMbfWc
# PlUlyPuy5I5T2zTqbIalHFPdiGB4yBlGrfOMVb/O7MDUOiMaMOwIWgFQIaCoMvs7
# vvQfcH56BJFqZtr0oepjT2ZumcLxAaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA+3ajIHt8H5i2S1S94bYU4WUvSvP0HLGYqasUWRAH43QIGZdX8MFHr
# GBMyMDI0MDIyNjAzMDQwNC43MjJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmGaL4wIhgPMjAyNDAyMjYwOTMyNDZaGA8yMDI0MDIyNzA5MzI0NlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6YZovgIBADAHAgEAAgIQEzAHAgEAAgIRZTAKAgUA
# 6Ye6PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGwmKek3XcI95mxvJ/ie
# o7HFtGPU3M2MszGxf0tFYuTnFViTxvNO8DtdgbxciqEp6wkRRsZMenW90IZVhLMC
# FqlMdZ74H9FixCusLU8u5X9wuV4vAikMe2QhQoXbNXleLoAyR+Ep4BSMZdLym9bg
# AfqfqZGp70rQ4zvUyFhToI2RMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQglcrqP6Xr57srjIpI0rAb54DldnwChEqYFcwaVA8/NfwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIGgmCF4LH/m3u4pOGeSXYlC78LfR16hR5SyL2BiKHdIp
# MA0GCSqGSIb3DQEBCwUABIICABBPT4lZImNw0Kq3a9CiBby5tr67YNafNfy4O0iH
# 6mVXzsVuLqeW/fIIWEnXDp451O81u27w70Cr6l0eGHt3QFGtJJ6KPLE00neU8iQj
# 1Z2NSYxjx1OmFmGCjQB/ayFEaMzH4WLYo4FwGcX8FSu4fUeSSwqZJE66uwQRgcV2
# gLGWM9Q7Hwlgu55CiDTwvER2W1KJc3kNgc9PeDtexrOd2YvZT1BIiZ5y3rxywobJ
# INnnlX9ZyHxhgs47hG+5fpoMyQo5db8S4ULh/QNk0McLgkzfWQZMNYlo3X8yp7nl
# KBdTegO+QnlpKSlTRck1ZUWgnatT/Zp85g4Ho2Q4Q5UOfV2Y0EohVUbzpvdc5CPi
# 8xYZ2gauBJ3rUXWY5ebhNc4E+38qAv2hfoQOHPcnHmwGHNcVUAcfA12jyEuwlDKP
# YAHPARNTmq+On2nmbE7Zubc6aFHx3tP+2MnLbOsc4hISbeKOZ3n2uzBMPRCrkV3M
# chHNYdXbqKgaIXSSxEWKABk/8yL9IBXIjRKJ17cP6OBvqjHDOm3GgfSGpy7HZxj/
# WpT/z6ga4CuC2bRcwx99yS5IOu14fXkzz040Y1pg58w5lViQ+3zxISceyQE1pFfl
# bHq0lt1IURbGWQZ+GRSCllaMTG6eDRO74qkpDnBBnpt1PS8OaQ1myu8X7luHGHxo
# 128N
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_35_8.ps1
|
sample_35_8.ps1
|
#
# Module manifest for module 'OCI.PSModules.Vault'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vault.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ba73e404-e836-4026-8200-8a6ebc3e6927'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vault Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vault.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVaultSecret', 'Get-OCIVaultSecretsList',
'Get-OCIVaultSecretVersion', 'Get-OCIVaultSecretVersionsList',
'Invoke-OCIVaultScheduleSecretDeletion',
'Invoke-OCIVaultScheduleSecretVersionDeletion',
'Move-OCIVaultSecretCompartment', 'New-OCIVaultSecret',
'Stop-OCIVaultSecretDeletion', 'Stop-OCIVaultSecretVersionDeletion',
'Update-OCIVaultSecret'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vault'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1852.ps1
|
1852.ps1
|
Describe "Job Cmdlet Tests" -Tag "CI" {
Context "Simple Jobs" {
BeforeEach {
$j = Start-Job -ScriptBlock { 1 + 1 } -Name "My Job"
}
AfterEach {
Get-Job | Remove-Job -Force
}
It "Start-Job produces a job object" {
$j | Should -BeOfType "System.Management.Automation.Job"
$j.Name | Should -BeExactly "My Job"
}
It "Get-Job retrieves a job object" {
(Get-Job -Id $j.Id) | Should -BeOfType "System.Management.Automation.Job"
}
It "Get-Job retrieves an array of job objects" {
Start-Job -ScriptBlock { 2 * 2 }
$jobs = Get-Job
$jobs.Count | Should -Be 2
foreach ($job in $jobs)
{
$job | Should -BeOfType "System.Management.Automation.Job"
}
}
It "Remove-Job can remove a job" {
Remove-Job $j -Force
{ Get-Job $j -ErrorAction Stop } | Should -Throw -ErrorId "JobWithSpecifiedNameNotFound,Microsoft.PowerShell.Commands.GetJobCommand"
}
It "Receive-Job can retrieve job results" {
Wait-Job -Timeout 60 -id $j.id | Should -Not -BeNullOrEmpty
receive-job -id $j.id | Should -Be 2
}
It "-RunAs32 not supported from 64-bit pwsh" -Skip:(-not [System.Environment]::Is64BitProcess) {
{ Start-Job -ScriptBlock {} -RunAs32 } | Should -Throw -ErrorId "RunAs32NotSupported,Microsoft.PowerShell.Commands.StartJobCommand"
}
It "-RunAs32 supported in 32-bit pwsh" -Skip:([System.Environment]::Is64BitProcess) {
$job = Start-Job -ScriptBlock { 1+1 } -RunAs32
Receive-Job $job -Wait | Should -Be 2
}
}
Context "Jobs with arguments" {
It "Start-Job accepts arguments" {
$sb = { Write-Output $args[1]; Write-Output $args[0] }
$j = Start-Job -ScriptBlock $sb -ArgumentList "$TestDrive", 42
Wait-job -Timeout (5 * 60) $j | Should -Be $j
$r = Receive-Job $j
$r -Join "," | Should -Be "42,$TestDrive"
}
}
Context "jobs which take time" {
BeforeEach {
$j = Start-Job -ScriptBlock { Start-Sleep -Seconds 15 }
}
AfterEach {
Get-Job | Remove-Job -Force
}
It "Wait-Job will wait for a job" {
$result = Wait-Job $j
$result | Should -Be $j
$j.State | Should -BeExactly "Completed"
}
It "Wait-Job will timeout waiting for a job" {
$result = Wait-Job -Timeout 2 $j
$result | Should -BeNullOrEmpty
}
It "Stop-Job will stop a job" {
Stop-Job -Id $j.Id
$out = Receive-Job $j -ErrorVariable err
$out | Should -BeNullOrEmpty
$err | Should -BeNullOrEmpty
$j.State | Should -BeExactly "Stopped"
}
It "Remove-Job will not remove a running job" {
$id = $j.Id
Remove-Job $j -ErrorAction SilentlyContinue
$job = Get-Job -Id $id
$job | Should -Be $j
}
It "Remove-Job -Force will remove a running job" {
$id = $j.Id
Remove-Job $j -Force
$job = Get-Job -Id $id -ErrorAction SilentlyContinue
$job | Should -BeNullOrEmpty
}
}
Context "Retrieving partial output from jobs" {
BeforeAll {
function GetResults($job, $n, $keep)
{
$results = @()
for ($count = 0; $results.Count -lt $n; $count++)
{
if ($count -eq 1000)
{
throw "Receive-Job behaves suspiciously: Cannot receive $n results in 5 minutes."
}
Start-Sleep -Milliseconds 300
if ($keep)
{
$results = Receive-Job -Keep $job
}
else
{
$results += Receive-Job $job
}
}
return $results
}
function CheckContent($array)
{
for ($i=1; $i -lt $array.Count; $i++)
{
if ($array[$i] -ne ($array[$i-1] + 1))
{
return $false
}
}
return $true
}
}
BeforeEach {
$j = Start-Job -ScriptBlock { $count = 1; while ($true) { Write-Output ($count++); Start-Sleep -Milliseconds 30 } }
}
AfterEach {
Get-Job | Remove-Job -Force
}
It "Receive-Job will retrieve partial output" {
$result1 = GetResults $j 5 $false
$result2 = GetResults $j 5 $false
CheckContent ($result1 + $result2) | Should -BeTrue
}
It "Receive-Job will retrieve partial output, including -Keep results" {
$result1 = GetResults $j 5 $true
$result2 = GetResults $j ($result1.Count + 5) $false
Compare-Object -SyncWindow 0 -PassThru $result1 $result2[0..($result1.Count-1)] | Should -BeNullOrEmpty
$result2[$result1.Count - 1] + 1 | Should -Be $result2[$result1.Count]
}
}
}
Describe "Debug-job test" -tag "Feature" {
BeforeAll {
$rs = [runspacefactory]::CreateRunspace()
$rs.Open()
$rs.Debugger.SetDebugMode([System.Management.Automation.DebugModes]::RemoteScript)
$rs.Debugger.add_DebuggerStop({$true})
$ps = [powershell]::Create()
$ps.Runspace = $rs
}
AfterAll {
$rs.Dispose()
$ps.Dispose()
}
It "Debug-Job will break into debugger" -pending {
$ps.AddScript('$job = start-job { 1..300 | ForEach-Object { Start-Sleep 1 } }').Invoke()
$ps.Commands.Clear()
$ps.Runspace.Debugger.GetCallStack() | Should -BeNullOrEmpty
Start-Sleep 3
$asyncResult = $ps.AddScript('debug-job $job').BeginInvoke()
$ps.commands.clear()
Start-Sleep 2
$result = $ps.runspace.Debugger.GetCallStack()
$result.Command | Should -BeExactly "<ScriptBlock>"
}
}
Describe "Ampersand background test" -tag "CI","Slow" {
Context "Simple background job" {
AfterEach {
Get-Job | Remove-Job -Force
}
It "Background with & produces a job object" {
$j = Write-Output Hi &
$j | Should -BeOfType System.Management.Automation.Job
}
}
Context "Variable tests" {
AfterEach {
Get-Job | Remove-Job -Force
}
It "doesn't cause error when variable is missing" {
Remove-Item variable:name -ErrorAction Ignore
$j = write-output "Hi $name" &
Receive-Job $j -Wait | Should -BeExactly "Hi "
}
It "Copies variables to the child process" {
$n1 = "Bob"
$n2 = "Mary"
${n 3} = "Bill"
$j = Write-Output "Hi $n1! Hi ${n2}! Hi ${n 3}!" &
Receive-Job $j -Wait | Should -BeExactly "Hi Bob! Hi Mary! Hi Bill!"
}
It 'Make sure that $PID from the parent process does not overwrite $PID in the child process' {
$j = Write-Output $pid &
$cpid = Receive-Job $j -Wait
$pid | Should -Not -BeExactly $cpid
}
It 'Make sure that $global:PID from the parent process does not overwrite $global:PID in the child process' {
$j = Write-Output $global:pid &
$cpid = Receive-Job -Wait $j
$pid | Should -Not -BeExactly $cpid
}
It "starts in the current directory" {
$j = Get-Location | Foreach-Object -MemberName Path &
Receive-Job -Wait $j | Should -Be ($pwd.Path)
}
It "Test that output redirection is done in the background job" {
$j = Write-Output hello > $TESTDRIVE/hello.txt &
Receive-Job -Wait $j | Should -BeNullOrEmpty
Get-Content $TESTDRIVE/hello.txt | Should -BeExactly "hello"
}
It "Test that error redirection is done in the background job" {
$j = Write-Error MyError 2> $TESTDRIVE/myerror.txt &
Receive-Job -Wait $j | Should -BeNullOrEmpty
Get-Content -Raw $TESTDRIVE/myerror.txt | Should -Match "MyError"
}
}
Context "Backgrounding expressions" {
AfterEach {
Get-Job | Remove-Job -Force
}
It "handles backgrounding expressions" {
$j = 2+3 &
Receive-Job $j -Wait | Should -Be 5
}
It "handles backgrounding mixed expressions" {
$j = 1..10 | ForEach-Object -Begin {$s=0} -Process {$s += $_} -End {$s} &
Receive-Job -Wait $j | Should -Be 55
}
}
}
|
combined_dataset/train/non-malicious/Script permissions_1.ps1
|
Script permissions_1.ps1
|
<#
.SYNOPSIS
Applies permissions and roles to vSphere vApps
.DESCRIPTION
Applies permissions and roles to vSphere vApps
-VIServer (Optional, defaults to Development) {FQDN of VCentre Server}
-AppName (Required) {VApp Label}
-ADGroup (Optional) {Domain\\Group_Object}
-Role (Optional) {vSphere Role, ReadOnly, Owner-Managed, Supplier-Managed}
.EXAMPLE
Grants the Owner-Managed vSphere role to MYDOM\\MYGroup on the "Test VApp".
Create-Permissions -AppName "Test VApp" -ADGroup "MYDOM\\MYGroup" -Role "Owner-Managed"
#>
#Author: Ant B 2012
Param(
[String]$VIServer = "<Default VC>",
[parameter(Mandatory=$true)][String]$AppName,
[parameter(Mandatory=$true)][string]$ADGroup,
[parameter(Mandatory=$true)][string]$Role
)
#Check for the VMware Snapin, load if it isn't already there.
if ( (Get-PSSnapin -Name VMware.VimAutomation.Core -ErrorAction SilentlyContinue) -eq $null )
{
Add-PsSnapin VMware.VimAutomation.Core
}
#Connect to VCentre
Connect-VIServer $VIServer
$authmgr = Get-View AuthorizationManager
$perm = New-Object Vmware.VIM.Permission
$perm.principal = $ADGroup
$perm.group = $true
$perm.propagate = $true
$perm.roleid = ($authmgr.Rolelist | where{$_.Name -eq $Role}).Roleid
$target = get-vapp | select name, Id | where{$_.Name -eq $AppName}
$authmgr.SetEntityPermissions($target.Id, $perm)
#Close our connection to VCentre
Disconnect-VIServer -Server * -Force -Confirm:$False
|
combined_dataset/train/non-malicious/disabled AD accounts.ps1
|
disabled AD accounts.ps1
|
#Get Domain List
$objForest = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$DomainList = @($objForest.Domains | Select-Object Name)
$Domains = $DomainList | foreach {$_.Name}
#get users list
$users = Get-Content U:\\EMCU15FI3_USER.txt
$total = $users.count
"SAMaccountname;DisplayName;HomeDir;Domain" | Out-File -FilePath test.txt
foreach($Domain in $Domains){
$i=0
foreach($user in $users) {
# serializevalue parameter is used to inly get the properties needed so variable doesn't use too much RAM.
$b = Get-QADUser -SamAccountName $user -SizeLimit 0 -Disabled -DontUseDefaultIncludedProperties -IncludedProperties NTAccountName, DisplayName, HomeDirectory, userprincipalname -SerializeValues
$storing = $b.sAMAccountName + ";" + $b.displayName + ";" + $b.homeDirectory + ";" +$domain
if ($storing.StartsWith(";")) {
}
else{
$storing | Out-File -FilePath test.txt -append
}
$storing=$null
$b=$null
#free up the garbage collect (empties unused variables)
[System.GC]::Collect()
$i++;
Write-Progress -Activity "Searching disabled accounts in $domain" -Status "Progress:" -PercentComplete $($i*100/$total)
}
}
|
combined_dataset/train/non-malicious/Get-ServiceAccounts_1.ps1
|
Get-ServiceAccounts_1.ps1
|
#requires -pssnapin PSCX
#Author: Glenn Sizemore glnsize@get-admin.com
#Purpose: Scan a remote system for any services running under a non standard account.
# Standard accounts would be considered, NT AUTHORITY\\NetworkService,
# NT AUTHORITY\\LocalService, LocalSystem, or .\\ASPNET
#
#Usage: PS > Get-ServiceAccounts [-Target <string>] [-Path <string>] [-verbose] [-Credential <PSCredential Object> ]
#
# -Target(optional)
# can be either a string or an array of strings.
# -Path(optional)
# Path to an item containing a list of Targets
# -Verbose(optional)
# turns on verbose logging to the console
# -Credential(optional)
# should only be used with V2, uses alternate credentials when
# querying target for services.
#
#Returns: PSCustom Object
#
#Example: Get-ServiceAccounts -Target "host1","host2","host3" -Path "C:\\temp\\otherhosts.txt" -verbose
#
# this command will combined the targets: host1, host2, and host3 with all targets located in
# the file otherhost.txt, and scan all of them for unique service accounts.
#
param($target,
[string]$Path,
[switch]$verbose,
[System.Management.Automation.PSCredential]$credential = ($null)
)
begin
{
# Create an empty object to hold all service accounts found.
$SvcAccounts = @()
#Save the current $ErrorActionPreference so we can restore it.
$ErrActionSave = $ErrorActionPreference
$Verbosesave = $VerbosePreference
$warningSave = $WarningPreference
#If a PSCredential is supplied then wmi query will be ran under that account.
if ($credential)
{
Write-Host "there is a known bug using -credential in V1..."
$gwmiquery = {Get-WmiObject -Class Win32_Service -ComputerName $computer -Credential $credential `
-property name, startname, caption, StartMode `
-filter 'NOT Startname LIKE "%NT AUTHORITY%" AND NOT Startname LIKE "LocalSystem" AND NOT Startname LIKE "ASPNET"'}
}
else
{
$gwmiquery = {Get-WmiObject -Class Win32_Service -ComputerName $computer -property name, startname, caption, StartMode `
-filter 'NOT Startname LIKE "%NT AUTHORITY%" AND NOT Startname LIKE "LocalSystem" AND NOT Startname LIKE "ASPNET"'}
}
if ($Verbose) {$VerbosePreference = "Continue"; $WarningPreference = "Continue"}
#Workhorse...
function ProcessTarget ($computer)
{
$obj = @()
#Set ErrorAction to silent... we'll handle the error's ourselves.
$ErrorActionPreference = "SilentlyContinue"
Write-Verbose "querying $computer ..."
#call the Query from above.
$services = &$gwmiquery
#set erroraction back there sould be no error's from here on out.
$ErrorActionPreference = $ErrActionSave
Write-Verbose " $($services.count) services located on $computer using "
foreach ($service in $Services)
{
# If there was an error while attempting the gwmi call, there will be only one error.
# We check that error to help annotate why we were unsuccessful.
switch -regex ($Error[0].Exception)
{
"The RPC server is unavailable"
{
Write-warning "RPC Unavailable on $computer"
$obj += "" | Select @{e={$computer};n='Target'},@{e={"RPC_Unavalable"};n='SvcName'}
continue
}
#vista
"Access denied"
{
Write-warning "Access Denied on $computer"
$obj += "" | Select @{e={$computer};n='Target'},@{e={"Access_Denied"};n='SvcName'}
continue
}
#XP/Server 2k3
"Access is denied"
{
Write-warning "Access Denied on $computer"
$obj += "" | Select @{e={$computer};n='Target'},@{e={"Access_Denied"};n='SvcName'}
continue
}
$null
{
$obj += "" | Select @{e={$computer};n='Target'},
@{e={$service.name };n='SvcName'},
@{e={$service.startname };n='SvcAcccount'},
@{e={$service.caption };n='SvcDes'},
@{e={$service.StartMode };n='StartMode'}
}
}
$Error.clear()
}
return $obj
}
}
process
{
$Targets = @()
if ($Path){$Targets = Get-Content $Path}
if ($Target){$Targets += $target}
foreach ($computer in $Targets)
{
ping-host -HostName $computer -Count 1 -Quiet -Timeout 1| Where-Object { $_.loss -ne 100} | `
ForEach-Object {$SvcAccounts += ProcessTarget $_.host}
}
}
End
{
$ErrorActionPreference = $ErrActionSave
$VerbosePreference = $Verbosesave
$WarningPreference = $warningSave
Write-Output $SvcAccounts
}
|
combined_dataset/train/non-malicious/PowerShell script config.ps1
|
PowerShell script config.ps1
|
#################################################
# Sample code showing how to save/load PowerShell script
# configuration to disk
#
# (c) Dmitry Sotnikov
# http://dmitrysotnikov.wordpress.com/2010/05/07/storing-powergui-add-on-configuration
#################################################
# Assign unique folder and config names
# This would sore data in
# C:\\Users\\username\\AppData\\Roaming\\MyPowerGUIAddOn\\MyAddOn.Config.xml
$FolderName = "MyPowerGUIAddOn"
$ConfigName = "MyAddOn.Config.xml"
# keep all add-on parameters in a map
$parameters = @{}
# read parameters
if ( Test-Path -Path "$($env:AppData)\\$FolderName\\$ConfigName") {
$parameters = Import-Clixml -Path "$($env:AppData)\\$FolderName\\$ConfigName"
# now you can use them, e.g.
$parameters['A']
$parameters['B']
} else {
# Config does not exist yet - set defaults
$parameters['A'] = 5
$parameters['B'] = "Qwerty"
}
# store parameters
if ( -not (Test-Path -Path "$($env:AppData)\\$FolderName")) {
mkdir "$($env:AppData)\\$FolderName"
}
$parameters | Export-Clixml -Path "$($env:AppData)\\$FolderName\\$ConfigName"
|
combined_dataset/train/non-malicious/sample_6_77.ps1
|
sample_6_77.ps1
|
#************************************************
# DC_MUP-Component.ps1
# Version x
# Date: 2014
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects information about the MUP components.
# (This information has been in the SMB Client output for years, but separating it into its own file now.)
# Called from: Main Networking Diag, etc.
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
$sectionDescription = "Multiple UNC Provider (MUP)"
#----------W8/WS2012 powershell cmdlets
# n/a
#----------Registry
$OutputFile= $Computername + "_MUP_reg_output.TXT"
$CurrentVersionKeys = "HKLM\SYSTEM\CurrentControlSet\services\MUP",
"HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider"
RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "MUP registry output" -SectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDvD8TYWYcJDNYr
# odrxgTyxy9j8/6tNc81Caik2RK97dqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA3/
# BFl+C7BAYUPTZ+d0C/PhRybiGoMxn2zDJP8Eix+RMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAO6k4m6ule/mJ1ofPiyqaOaDUCQWTZSkFFoYv
# MthoEz5yhsDPH15GoZIbyuFyX/TymT7ZYGBGjDLhlBPIqt6MXuRpUholmHmF8DRv
# lJd88tR2tUL/lkOkhvwds73AHrNHXsRwpGVKPGHyrgJV1hHvBDDk571pybLzRw9Z
# 43nYAiv4EDvSEUjRtUpH48GgGTWCcPfG8kgjGDgS6viryNdsv20ovFPvoi36oiZ/
# KFrbsj+IF0bk0dFcGbynpudXdLhwrepVdyGCtEkQMbCzH+I3FP3yzpANtPj+bu8Y
# PJazKfsRPcTqvCZmoZAaeJpUX0CpWKbK8CwuKhEwxvoliEDCI6GCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB1J1bgCHX8pH6Fmt70HnI0oirFcjuHSzhW
# Nn3CsQSD/wIGZusiCs7xGBMyMDI0MTAyODExNDA0NC4zMDhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg
# dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3
# k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW
# 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8
# U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH
# TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn
# 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE
# 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX
# D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI
# vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ
# QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G
# qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb
# QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL
# zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0
# G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt
# qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b
# a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB
# VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM
# H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N
# iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG
# 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V
# VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB
# jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0
# MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA
# AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd
# uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0
# GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578
# OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI
# /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN
# ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQg3qfOC4rFRsjRgiuZ+bsHbGBwSg3rI3BBALz4Qtn0iUowgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So
# IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b
# gvEVMA0GCSqGSIb3DQEBCwUABIICAJxbeSt+DZvswQi+HTFvx/i/ATjVCYdQ0s3A
# kjtuy6S0vVfBV6COA94Hd64rmb+ROacMq4KzqefQPXWRHDy0VkJiKjPiko4vmE2c
# E5iGcAAg8BhOvhJYyqHEFcnm772Z00coU7YRych4tX92OXE3arjDr5463jjf2lAa
# coW2hQUoUCdDhm/O8AhwchXdhQ6k1zeWReHqG+8vdzbSudlcbUa+YQ1rjRBTHHM3
# rVOOf4zsuEpQzMkVXPPuhkY6f6E3acy+uNWYXp/fEKnTVabowr4dmA4WKOuwctal
# rqrISJhAQlCPM7z1c2FwCyq5g2Zed2qqEZ2lTJqBzp7WAlfutKvMWrTwfC8T2XVW
# VFUVu6miwB2WCuXCyO/XykoosOzK8dDpb2KnKbgkWAcWQJsDgRy7xgkhRLD1xDFz
# fyXyktDXrEcFysOhcB6x3GmPLCV1xp6VMzQXGlmsIQVLMHwdvGlUfLnWtMLTA1yo
# P3K8CvhsSCw3wo5WsQTNELCgvb/3sCHY1ovm+8aTkP9bIg9gtsFvfl1InKFLqHzv
# s83RsE2/8C6bweyDi6VcGjrLut8hwqw3XU/5Nui8yeFawOxNY6DrtK0plfJAsD46
# x55tjGuPiN++k5S0cea6s8FHPYSDkCkXkg2h+2fHfRrRQ/gT2AABbdO1DRnBvkH6
# HhAM9C80
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_33_28.ps1
|
sample_33_28.ps1
|
#
# Module manifest for module 'OCI.PSModules.Osmanagementhub'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Osmanagementhub.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '114fe920-9645-46a9-9e65-26c95a3d3613'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Osmanagementhub Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagementhub.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIOsmanagementhubPackagesToSoftwareSource',
'Disable-OCIOsmanagementhubModuleStreamOnManagedInstance',
'Disable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup',
'DisMount-OCIOsmanagementhubManagedInstancesFromLifecycleStage',
'DisMount-OCIOsmanagementhubManagedInstancesFromManagedInstanceGroup',
'DisMount-OCIOsmanagementhubProfileFromManagedInstance',
'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstance',
'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstanceGroup',
'Enable-OCIOsmanagementhubModuleStreamOnManagedInstance',
'Enable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup',
'Get-OCIOsmanagementhubAllSoftwarePackagesList',
'Get-OCIOsmanagementhubEntitlementsList',
'Get-OCIOsmanagementhubErrataList', 'Get-OCIOsmanagementhubErratum',
'Get-OCIOsmanagementhubEvent', 'Get-OCIOsmanagementhubEventContent',
'Get-OCIOsmanagementhubEventsList',
'Get-OCIOsmanagementhubLifecycleEnvironment',
'Get-OCIOsmanagementhubLifecycleEnvironmentsList',
'Get-OCIOsmanagementhubLifecycleStage',
'Get-OCIOsmanagementhubLifecycleStageInstalledPackagesList',
'Get-OCIOsmanagementhubLifecycleStagesList',
'Get-OCIOsmanagementhubManagedInstance',
'Get-OCIOsmanagementhubManagedInstanceAnalyticContent',
'Get-OCIOsmanagementhubManagedInstanceAvailablePackagesList',
'Get-OCIOsmanagementhubManagedInstanceAvailableSoftwareSourcesList',
'Get-OCIOsmanagementhubManagedInstanceAvailableWindowsUpdatesList',
'Get-OCIOsmanagementhubManagedInstanceContent',
'Get-OCIOsmanagementhubManagedInstanceErrataList',
'Get-OCIOsmanagementhubManagedInstanceGroup',
'Get-OCIOsmanagementhubManagedInstanceGroupAvailableModulesList',
'Get-OCIOsmanagementhubManagedInstanceGroupAvailablePackagesList',
'Get-OCIOsmanagementhubManagedInstanceGroupAvailableSoftwareSourcesList',
'Get-OCIOsmanagementhubManagedInstanceGroupInstalledPackagesList',
'Get-OCIOsmanagementhubManagedInstanceGroupModulesList',
'Get-OCIOsmanagementhubManagedInstanceGroupsList',
'Get-OCIOsmanagementhubManagedInstanceInstalledPackagesList',
'Get-OCIOsmanagementhubManagedInstanceInstalledWindowsUpdatesList',
'Get-OCIOsmanagementhubManagedInstanceModulesList',
'Get-OCIOsmanagementhubManagedInstancesList',
'Get-OCIOsmanagementhubManagedInstanceUpdatablePackagesList',
'Get-OCIOsmanagementhubManagementStation',
'Get-OCIOsmanagementhubManagementStationsList',
'Get-OCIOsmanagementhubMirrorsList',
'Get-OCIOsmanagementhubModuleStream',
'Get-OCIOsmanagementhubModuleStreamProfile',
'Get-OCIOsmanagementhubModuleStreamProfilesList',
'Get-OCIOsmanagementhubModuleStreamsList',
'Get-OCIOsmanagementhubPackageGroup',
'Get-OCIOsmanagementhubPackageGroupsList',
'Get-OCIOsmanagementhubProfile',
'Get-OCIOsmanagementhubProfilesList',
'Get-OCIOsmanagementhubScheduledJob',
'Get-OCIOsmanagementhubScheduledJobsList',
'Get-OCIOsmanagementhubSoftwarePackage',
'Get-OCIOsmanagementhubSoftwarePackageByName',
'Get-OCIOsmanagementhubSoftwarePackagesList',
'Get-OCIOsmanagementhubSoftwarePackageSoftwareSourcesList',
'Get-OCIOsmanagementhubSoftwareSource',
'Get-OCIOsmanagementhubSoftwareSourcesList',
'Get-OCIOsmanagementhubSoftwareSourceVendorsList',
'Get-OCIOsmanagementhubWindowsUpdate',
'Get-OCIOsmanagementhubWindowsUpdatesList',
'Get-OCIOsmanagementhubWorkRequest',
'Get-OCIOsmanagementhubWorkRequestErrorsList',
'Get-OCIOsmanagementhubWorkRequestLogsList',
'Get-OCIOsmanagementhubWorkRequestsList',
'Import-OCIOsmanagementhubEventContent',
'Invoke-OCIOsmanagementhubInstallAllWindowsUpdatesOnManagedInstancesInCompartment',
'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstance',
'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstance',
'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubInstallWindowsUpdatesOnManagedInstance',
'Invoke-OCIOsmanagementhubInstallWindowsUpdatesOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstance',
'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubPromoteSoftwareSourceToLifecycleStage',
'Invoke-OCIOsmanagementhubRefreshManagementStationConfig',
'Invoke-OCIOsmanagementhubRefreshSoftwareOnManagedInstance',
'Invoke-OCIOsmanagementhubRunScheduledJobNow',
'Invoke-OCIOsmanagementhubSearchSoftwareSourceModules',
'Invoke-OCIOsmanagementhubSearchSoftwareSourceModuleStreams',
'Invoke-OCIOsmanagementhubSearchSoftwareSourcePackageGroups',
'Invoke-OCIOsmanagementhubSummarizeManagedInstanceAnalytics',
'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstance',
'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubSynchronizeMirrors',
'Invoke-OCIOsmanagementhubSynchronizeSingleMirrors',
'Mount-OCIOsmanagementhubManagedInstancesToLifecycleStage',
'Mount-OCIOsmanagementhubManagedInstancesToManagedInstanceGroup',
'Mount-OCIOsmanagementhubProfileToManagedInstance',
'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstance',
'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstanceGroup',
'Move-OCIOsmanagementhubAvailabilityOfSoftwareSources',
'Move-OCIOsmanagementhubEventCompartment',
'Move-OCIOsmanagementhubLifecycleEnvironmentCompartment',
'Move-OCIOsmanagementhubManagedInstanceGroupCompartment',
'Move-OCIOsmanagementhubManagementStationCompartment',
'Move-OCIOsmanagementhubProfileCompartment',
'Move-OCIOsmanagementhubScheduledJobCompartment',
'Move-OCIOsmanagementhubSoftwareSourceCompartment',
'New-OCIOsmanagementhubEntitlement',
'New-OCIOsmanagementhubLifecycleEnvironment',
'New-OCIOsmanagementhubManagedInstanceGroup',
'New-OCIOsmanagementhubManagementStation',
'New-OCIOsmanagementhubProfile',
'New-OCIOsmanagementhubScheduledJob',
'New-OCIOsmanagementhubSoftwareSource',
'Remove-OCIOsmanagementhubEvent',
'Remove-OCIOsmanagementhubEventContent',
'Remove-OCIOsmanagementhubLifecycleEnvironment',
'Remove-OCIOsmanagementhubManagedInstance',
'Remove-OCIOsmanagementhubManagedInstanceGroup',
'Remove-OCIOsmanagementhubManagementStation',
'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstance',
'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstanceGroup',
'Remove-OCIOsmanagementhubPackagesFromManagedInstance',
'Remove-OCIOsmanagementhubPackagesFromManagedInstanceGroup',
'Remove-OCIOsmanagementhubProfile',
'Remove-OCIOsmanagementhubScheduledJob',
'Remove-OCIOsmanagementhubSoftwareSource',
'Update-OCIOsmanagementhubAllPackagesOnManagedInstanceGroup',
'Update-OCIOsmanagementhubAllPackagesOnManagedInstancesInCompartment',
'Update-OCIOsmanagementhubEvent',
'Update-OCIOsmanagementhubLifecycleEnvironment',
'Update-OCIOsmanagementhubManagedInstance',
'Update-OCIOsmanagementhubManagedInstanceGroup',
'Update-OCIOsmanagementhubManagementStation',
'Update-OCIOsmanagementhubPackagesOnManagedInstance',
'Update-OCIOsmanagementhubProfile',
'Update-OCIOsmanagementhubScheduledJob',
'Update-OCIOsmanagementhubSoftwareSource'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagementhub'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/434.ps1
|
434.ps1
|
Register-PSFTeppScriptblock -Name 'PSFramework.Utility.PathName' -ScriptBlock {
(Get-PSFConfig "PSFramework.Path.*").Name -replace '^.+\.([^\.]+)$', '$1'
}
|
combined_dataset/train/non-malicious/Get-LocalGroupAllMembers.ps1
|
Get-LocalGroupAllMembers.ps1
|
# #############################################################################
# NAME: FUNCTION-Get-LocalGroupAllMembers.ps1
#
# AUTHOR: Francois-Xavier Cat
# DATE: 2012/12/27
# EMAIL: fxcat@lazywinadmin.com
# WEBSITE: LazyWinAdmin.com
# TWiTTER: @lazywinadm
#
# COMMENT: The following functions will gather all the local and domain members (direct or nested)
# By Default the function will query the Localhost and the Group Administrators.
# REQUIRE: Quest Active Directory
# USAGE: Get-LocalGroupAllMembers -ComputerName SERVER01 -GroupName "Administrators"
#
# VERSION HISTORY
# 1.0 2012.12.27 Initial Version.
#
# #############################################################################
# Function to get LOCAL Group Member(s)
# Members can be from the Local Machine or from the Domain.
# Also, this function does not look for nested membership on local group(local group member of another local group)
# since it is not supported by Microsoft (even if you can do it via net.exe, the permission won't work)
# http://technet.microsoft.com/en-us/library/ee681621(v=ws.10).aspx
Function global:Get-LocalGroupMembership {
[Cmdletbinding()]
Param (
[Parameter(ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true)]
[string]$ComputerName = $env:COMPUTERNAME,
[string]$GroupName = "Administrators"
)
# Create the array that will contains all the output of this function
$Output = @()
# Get the members for the group and computer specified
$Group = [ADSI]"WinNT://$ComputerName/$GroupName"
$Members = @($group.psbase.Invoke("Members"))
# Format the Output
$Members | foreach {
$name = $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)
$class = $_.GetType().InvokeMember("Class", 'GetProperty', $null, $_, $null)
$path = $_.GetType().InvokeMember("ADsPath", 'GetProperty', $null, $_, $null)
# Find out if this is a local or domain object
if ($path -like "*/$ComputerName/*"){
$Type = "Local"
}
else {$Type = "Domain"
}
$Details = "" | Select ComputerName,Account,Class,Group,Path,Type
$Details.ComputerName = $ComputerName
$Details.Account = $name
$Details.Class = $class
$Details.Group = $GroupName
$details.Path = $path
$details.Type = $type
# Send the current result to the $output variable
$output = $output + $Details
}
# Finally show the Output to the user.
$output
}
# Function to get DOMAIN Group Member(s)
# This function allow to dig into Active Directory to get all the members (direct or nested)
# Members can only be from the Domain.
function global:Get-DomainGroupMembership {
param ($GroupName,$ComputerName)
#$ComputerName parameter here is only used for information purpose, to show in the output
# Create the array that will contains all the output of this function
$Output = @()
# Check the current members of $GroupName
$Members = $GroupName | Get-QADGroupMember
# Check the Count of $members
$MembersCount = $Members.count
# If there is at least 1 member, do the following
if ($MembersCount -gt 0){
foreach ($member in $Members){
switch ($Member.type){
"user"{
# Return the user information
$Details = "" | Select ComputerName,Account,Class,Group,Domain,type,path
$Details.ComputerName = $ComputerName
$Details.Account = $member.name
$Details.Class = $Member.type
$Details.Group = $GroupName
$details.domain = $member.domain.name
$details.type = "Domain"
$Details.path = $Member.CanonicalName
$output = $output + $Details
}#Switch user
"group"{
# Return the group object information
$Details = "" | Select ComputerName,Account,Class,Group,Domain,type,path
$Details.ComputerName = $ComputerName
$Details.Account = $member.name
$Details.Class = $Member.type
$Details.Group = $GroupName
$details.domain = $member.domain.name
$details.type = "Domain"
$Details.path = $Member.CanonicalName
$output = $output + $Details
# Return the members of the current group
Get-DomainGroupMembership -GroupName $Member.name -ComputerName $ComputerName
}#Switch group
}#switch ($Member.type)
}#foreach ($member in $Members)
}#if ($MembersCount -gt 0)
#Finally show the output
$Output
}#end function Get-DomainGroupMembership
# Function to Get LOCAL and DOMAIN member(s) information
# LOCAL Group Membership information is handled by the function Get-LocalGroupMembership
# DOMAIN Group Membership information is handled by the function Get-DomainGroupMembership
function global:Get-LocalGroupAllMembers {
param (
[parameter(ValueFromPipeline=$true)]
[string]$ComputerName = "$env:computername",
[string]$GroupName = "Administrators"
)
# Create the array that will contains all the output of this function
$Output = @()
# Get the local administrators for the current ComputerName using the function declared
# earlier: Get-LocalGroupMembership
$LocalAdministrators = Get-LocalGroupMembership -ComputerName $ComputerName -GroupName $GroupName
# Let's now get information about each members, and members of members, etc...
foreach ($admin in $LocalAdministrators){
# L O C A L #
# Local User
if (($admin.Type -like "Local") -and ($admin.class -like "User")){
$Details = "" | Select ComputerName,Account,Class,Group,Type,Path
$Details.ComputerName = $admin.ComputerName
$Details.Account = $admin.account
$Details.Class = $admin.class
$Details.Group = $admin.group
$Details.Type = $admin.type
$Details.Path = $admin.path
$output = $output + $Details
}
# Local Group
if (($admin.type -like "Local") -and ($admin.class -like "group")){
# Return the local group information before checking its members
$Details = "" | Select ComputerName,Account,Group,Domain
$Details.ComputerName = $admin.ComputerName
$Details.Account = $admin.account
$Details.Class = $admin.class
$Details.Group = $admin.group
$Details.type = $admin.type
$Details.path = $admin.path
$output = $output + $Details
# Return the members of the current Local Group
$localgroup = Get-LocalGroupMembership -GroupName $admin.account -ComputerName $ComputerName
# If There is at least 1 member, do the following
if ($localgroup.count -gt 0) {
foreach ($localMember in $localgroup){
$Details = "" | Select ComputerName,Account,Class,Group,Type,Path
$Details.Account = $localMember.account
$Details.Group = $admin.account # Here we are taking the name of the parent group
$Details.ComputerName = $localMember.ComputerName
$Details.Class = $localMember.class
$Details.type = $localMember.type
$Details.path = $localMember.path
$output = $output + $Details
}#foreach
}#if
}#if (Get-LocalGroupMember -group $admin.account -ComputerName $ComputerName)
# D O M A I N #
if ($admin.type -like "Domain"){
# Get information about this object in the domain
# Here we just want to know if it is an User or Group.
$ADObject = Get-QADObject $admin.account
Switch ($ADObject.type) {
# Domain User
"user" {
# Return the User information
$Details = "" | Select ComputerName,Account,Class,Group,Domain,type,path
$Details.ComputerName = $ComputerName
$Details.Account = $ADObject.name
$Details.Class = $ADObject.type
$Details.Group = $admin.group
$Details.domain = $ADObject.domain.name
$Details.Type = $admin.type
$Details.path = $ADObject.CanonicalName
$output = $output + $Details
}#user (switch)
# Domain Group
"group"{
# Return the Group information
$Details = "" | Select ComputerName,Account,Class,Group,Domain,type,path
$Details.ComputerName = $ComputerName
$Details.Account = $ADObject.name
$details.Class = $ADObject.type
$Details.Group = $admin.group
$Details.domain = $ADObject.domain.name
$Details.Type = $admin.type
$Details.path = $ADObject.CanonicalName
$output = $output + $Details
# Checking if the group has members, call the function declared ealier
# Get-DomainGroupMembership
Get-DomainGroupMembership -GroupName $ADObject.name -ComputerName $ComputerName
}#group (switch)
}#switch
}#if ($admin.domain -notlike "$ComputerName"){
}#foreach ($admin in $LocalAdministrators){
$output
}#function global:Get-LocalGroupAllMembers
|
combined_dataset/train/non-malicious/sample_56_26.ps1
|
sample_56_26.ps1
|
ConvertFrom-StringData @'
###PSLOC
ArcMachineAlreadyExistsInResourceGroupError = Arc machine(s) with names: {0} already exists in the Resource Group {1}. Use a different Resource group for registration or specify a different Arc for Servers Resource Group.
ArcMachineNotFound = No Arc machine(s) were found with the same as as cluster node names in ARC resource group {0}
ArcAlreadyEnabledInADifferentResourceError = Following cluster node(s) are already Arc enabled with a different ARM Resource Id: {0}. Disconnect Arc agent on these nodes and run Register-AzStackHCI again.
ArcNotEnabledInADifferentResource = No cluster nodes are Arc enabled in a different subscription id or resource group.
ClusterAlreadyRegistered = HCI Cluster is already registered, this validation will be skipped
ArcValidationNotSupported = ARC Integration validation is only supported on HCI OS
AzureContextRequired = Azure Context is required to use this validation. Please login to Azure and try again.
RegionRequired = Azure Region is required to run Azure region validation. Skipping this validation.
SessionNotProvided = Powershell Sessions to the nodes are required to check their arc registration state. Skipping this validation.
RegionVerified = Azure Region successfully verified.
RegionNotVerified = Invalid Region: {0}. Try again with the correct Azure Region.
ResourceGroupLimitReached = Resource group limit reached in subscription id: {0}. Delete {1} resource group(s) in the subscription to continue.
ResourceGroupLimitCheckSucceeded = Resource group limit successfully verified in subscription id: {0}.
ResourceLimitReached = Azure Stack HCI cluster resource limit reached in resource group: {0} in subscription id: {1}. Try a different HCI resource group, or delete 1 Azure Stack HCI cluster resource in resource group {0}.
ResourceLimitCheckSucceeded = Azure Stack HCI cluster resource limit successfully verified in resource group: {0}.
MissingPermissions = User doesn't have the required permissions to perform the validation: {0}. Skipping the validation.
RoleAssignmentLimitReached = Role Assignment limit reached in subscription id: {0}.
RoleAssignmentLimitSuccessfullyVerified = Role Assignment limit successfully verified in subscription id: {0}.
VerifyingIfHCIResourceExistsInHCIRG = Verifying if Azure Stack HCI Resource with the name: {0} exists in Subscription ID : {1}, Resource Group: {2}.
ResourceNameEmpty = Azure Stack HCI Resource Name is empty. Skipping the validation.
HCIClusterNotFound = No Azure Stack HCI Cluster resource with the name: {0} in Resource Group: {1}. Validation succeeded.
HCIClusterResourceAlreadyExistsError = Azure Stack HCI Cluster resource with the name: {0} already exists in the Resource Group: {1}.
ArcAgentExePath = C:\\Program Files\\AzureConnectedMachineAgent\\azcmagent.exe
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDOYDbI7hXWl+0b
# TCl0XpXHi38J55FYGZZ5294q8VFaqqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDNaIKbT4JtOroXstlFHAXnc
# jzO4caSM2Mx4w+2xwuUSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAVVSA+hJfDMVhLYvjRUNaL1SqtJ2AjuWAU13IQmmUrAClx2kWse/UN3lL
# K+3bBfLuxWy99hGPhKTPQrSuwR5d47TNoLpWavD20JCwcSqCwrDxQBiWUZzKMRLT
# Rv7vbdF/2O/Bh4koZCi+Y6BA9l7L4/4dvzFaV2/eiTLyULNRLZXKPTqdrdf52GJS
# GKivMRSSxCqTs16MrZh6uoROd72IhQTsSXtfaf6R2Vi3vpsnySjopVE0Pk7ckN7F
# Eqy2f5I/0Ybt4oVblinaSN8Dt6gB9D8ymm3WxiIiVFmq1UK5UmIIcs/zDPHSB1PX
# oFZnFVBUoVqM8pdthIlP7JV1UsUFuaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBzAOV9y0egvMy+IncAv8TDmqzRx9Oeuuz+lG8vcnoS7wIGZjOrHlR8
# GBMyMDI0MDUxNjE4NDQyNS4zNzFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwnUMwIhgPMjAyNDA1MTYyMjU3MDdaGA8yMDI0MDUxNzIyNTcwN1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCdQwIBADAHAgEAAgID3zAHAgEAAgIRrTAKAgUA
# 6fHuwwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGRlJmD4Pm0a2ZXNrC7c
# hWy5hXLsafZMqicwyWFUOagBv008UJXV934PwR/AYu6JEfRQNBQKDOYskFLAOnvO
# jXU9VhvPALsmy8+mZD2thf4r2HFkYffZGvyfS7G61QPbGd/6gez0O4p8pdFeQq8o
# jY4M2biKfSLGPGc+lo2XncRfMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgtBjEZe3bWlfCQb8yffSQ+6PLAxrWispGrM+cRC6xmz0wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEIKTJslI+Gq3aHsWJ9P5eKg7d9P5UfEDHlHAwLXSd1TWf
# MA0GCSqGSIb3DQEBCwUABIICACMS+oN4eaL8IytXKh+KwWLSbkoPEFKI/jczwtEi
# 1KrdJpMD8V9oh79YD9APtHOJQWmISTv2S7s+wymSKki2yHWy7GbbTNxx9QNSomrg
# tdDBOO2DOJfa9XY5Mz0W2qzNwctCVSPTlbdoe0guKrdRoUuaOrm5lRgLsvxWHZJd
# 8KhsG01bV9bTNgEZi6VAS6bPx7aVgvWz+uXlaA9i+TBbX3BlGeWfLeV2y89IpT2q
# mxRKTaCF8ix2jTkxX8KbbNkTSZjJFmppkXSXUOfFdNGy3Ug2xGh8w/0CeRcjW0/M
# gurC9fBtJQ3vaNcf7hvv2d8Ex6tyH4BpGCkxtsJ9p2JQgtWnGNpAxkE8pxmUljAe
# 3WaWZnasNOFbijPlztKV+Y6t5H3NFJ8VuNQzYBaGEwEzxTyVX/i3spxzyeQgz8EL
# 9rmimGL7bjQ+pyMRok8P+2DtajJlUa+vnR4gTWJTkAynl+uWidi6k0CJY9DFOLLK
# OLR4LPSca9QL8KbVh6Ynr2+y8ItEW/xmaQ/M9juiy4Ctwap3hi2YedDEbUVAJDPr
# 11HP2yheSmyaMeVoRcy7YJniiyjV9lT2CwMsSQU86TNw3AeqkhkFuAG+2OU3QoCf
# tKLycfjER7zgQkCb+JaoriNFCyM1i2W475FQUM/f5QSiVk1sBpHIZC+70Xyagz0J
# x0o1
# SIG # End signature block
|
combined_dataset/train/non-malicious/998.ps1
|
998.ps1
|
Param(
[parameter(Mandatory=$true)]
$CsvFilePath
)
$ErrorActionPreference = "Stop"
$scriptsPath = $PSScriptRoot
if ($PSScriptRoot -eq "") {
$scriptsPath = "."
}
. "$scriptsPath\asr_logger.ps1"
. "$scriptsPath\asr_common.ps1"
. "$scriptsPath\asr_csv_processor.ps1"
Function ProcessItemImpl($processor, $csvItem, $reportItem) {
$reportItem | Add-Member NoteProperty "TestFailoverCleanUpJobId" $null
$reportItem | Add-Member NoteProperty "TestFailoverState" $null
$reportItem | Add-Member NoteProperty "TestFailoverStateDescription" $null
$vaultName = $csvItem.VAULT_NAME
$sourceMachineName = $csvItem.SOURCE_MACHINE_NAME
$sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER
$protectedItem = $asrCommon.GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer)
if ($protectedItem -ne $null) {
if ($protectedItem.AllowedOperations.Contains('TestFailoverCleanup')) {
$testFailoverCleanUpJob = Start-AzRecoveryServicesAsrTestFailoverCleanupJob `
-ReplicationProtectedItem $protectedItem
$reportItem.TestFailoverCleanUpJobId = $testFailoverCleanUpJob.ID
} else {
$processor.Logger.LogTrace("TestFailoverCleanup operation not allowed for item '$($sourceMachineName)'")
$reportItem.TestFailoverState = $protectedItem.TestFailoverState
$reportItem.TestFailoverStateDescription = $protectedItem.TestFailoverStateDescription
}
}
}
Function ProcessItem($processor, $csvItem, $reportItem)
{
try {
ProcessItemImpl $processor $csvItem $reportItem
}
catch {
$exceptionMessage = $_ | Out-String
$processor.Logger.LogError($exceptionMessage)
throw
}
}
$logger = New-AsrLoggerInstance -CommandPath $PSCommandPath
$asrCommon = New-AsrCommonInstance -Logger $logger
$processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem
$processor.ProcessFile($CsvFilePath)
|
combined_dataset/train/non-malicious/sample_51_24.ps1
|
sample_51_24.ps1
|
#
# Module manifest for module 'OCI.PSModules.Recovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Recovery.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Recovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase',
'Get-OCIRecoveryProtectedDatabasesList',
'Get-OCIRecoveryProtectionPoliciesList',
'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet',
'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest',
'Get-OCIRecoveryWorkRequestErrorsList',
'Get-OCIRecoveryWorkRequestLogsList',
'Get-OCIRecoveryWorkRequestsList',
'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration',
'Move-OCIRecoveryProtectedDatabaseCompartment',
'Move-OCIRecoveryProtectionPolicyCompartment',
'Move-OCIRecoveryServiceSubnetCompartment',
'New-OCIRecoveryProtectedDatabase',
'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet',
'Remove-OCIRecoveryProtectedDatabase',
'Remove-OCIRecoveryProtectionPolicy',
'Remove-OCIRecoveryServiceSubnet',
'Update-OCIRecoveryProtectedDatabase',
'Update-OCIRecoveryProtectionPolicy',
'Update-OCIRecoveryServiceSubnet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/991.ps1
|
991.ps1
|
Param(
[parameter(Mandatory=$true)]
$CsvFilePath,
$TimeOutInCommitJobInSeconds = 120
)
$ErrorActionPreference = "Stop"
$scriptsPath = $PSScriptRoot
if ($PSScriptRoot -eq "") {
$scriptsPath = "."
}
. "$scriptsPath\asr_logger.ps1"
. "$scriptsPath\asr_common.ps1"
. "$scriptsPath\asr_csv_processor.ps1"
Function ProcessItemImpl($processor, $csvItem, $reportItem) {
$reportItem | Add-Member NoteProperty "CommitJobId" $null
$reportItem | Add-Member NoteProperty "DisableReplicationJobId" $null
$vaultName = $csvItem.VAULT_NAME
$sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER
$sourceMachineName = $csvItem.SOURCE_MACHINE_NAME
$protectedItem = $asrCommon.GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer)
if ($protectedItem -ne $null) {
if ($protectedItem.AllowedOperations.Contains('Commit')) {
$processor.Logger.LogTrace("Starting Commit operation for item '$($sourceMachineName)'")
$commitFailoverJob = Start-AzRecoveryServicesAsrCommitFailoverJob `
-ReplicationProtectedItem $protectedItem
$initialStartDate = Get-Date
while (($commitFailoverJob.State -ne 'Succeeded') -and ($diffInMilliseconds -le $TimeOutInCommitJobInSeconds)) {
Write-Host "." -NoNewline
$commitFailoverJob = Get-AzRecoveryServicesAsrJob -Name $commitFailoverJob.Name
$currentDate = Get-Date
$diff = $currentDate - $initialStartDate
$diffInMilliseconds = $diff.TotalSeconds
}
$reportItem.CommitJobId = $commitFailoverJob.ID
if ($commitFailoverJob.State -ne 'Succeeded') {
$processor.Logger.LogErrorAndThrow("Commit job did not reach 'Succeeded' status in a timely manner, DisableProtection will not be executed for '$($sourceMachineName)' ")
}
} else {
$processor.Logger.LogTrace("Commit operation not allowed for item '$($sourceMachineName)'")
}
if ($protectedItem.AllowedOperations.Contains('DisableProtection')) {
$processor.Logger.LogTrace("Starting DisableProtection operation for item '$($sourceMachineName)'")
$disableReplicationJob = Remove-AzRecoveryServicesAsrReplicationProtectedItem `
-InputObject $protectedItem
$reportItem.DisableReplicationJobId = $disableReplicationJob.ID
} else {
$processor.Logger.LogTrace("DisableProtection operation not allowed for item '$($sourceMachineName)'")
}
}
}
Function ProcessItem($processor, $csvItem, $reportItem) {
try {
ProcessItemImpl $processor $csvItem $reportItem
}
catch {
$exceptionMessage = $_ | Out-String
$processor.Logger.LogError($exceptionMessage)
throw
}
}
$logger = New-AsrLoggerInstance -CommandPath $PSCommandPath
$asrCommon = New-AsrCommonInstance -Logger $logger
$processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem
$processor.ProcessFile($CsvFilePath)
|
combined_dataset/train/non-malicious/4358.ps1
|
4358.ps1
|
function Get-AuthenticodePublisher
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory=$true)]
[System.Management.Automation.Signature]
$AuthenticodeSignature
)
if($AuthenticodeSignature.SignerCertificate)
{
$chain = New-Object System.Security.Cryptography.X509Certificates.X509Chain
$null = $chain.Build($AuthenticodeSignature.SignerCertificate)
$certStoreLocations = @('cert:\LocalMachine\Root',
'cert:\LocalMachine\AuthRoot',
'cert:\CurrentUser\Root',
'cert:\CurrentUser\AuthRoot')
foreach($element in $chain.ChainElements.Certificate)
{
foreach($certStoreLocation in $certStoreLocations)
{
$rootCertificateAuthority = Microsoft.PowerShell.Management\Get-ChildItem -Path $certStoreLocation |
Microsoft.PowerShell.Core\Where-Object { ($_.Subject -eq $element.Subject) -and ($_.thumbprint -eq $element.thumbprint) }
if($rootCertificateAuthority)
{
if($rootCertificateAuthority.PSTypeNames -contains 'System.Array') {
$rootCertificateAuthority = $rootCertificateAuthority[0]
}
$publisherInfo = @{
publisher = $AuthenticodeSignature.SignerCertificate.Subject
publisherRootCA = $rootCertificateAuthority.Subject
}
Write-Output -InputObject $publisherInfo
return
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_47_70.ps1
|
sample_47_70.ps1
|
<TemplateItem>
<Name>Code - Handle errors</Name>
<IconType>.svg</IconType>
<IconData>H4sIAAAAAAAACrVV224bNxB9z1ewCxSIAYrL4Z2ylQBZp0EBpw1Qp0XzpkpraRt5V1htLKdf30Ou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</IconData>
<Created>2024-02-25T21:17:27.5162776+00:00</Created>
<Modified>2024-02-25T21:17:27.5162776+00:00</Modified>
<AiServiceId>7b785f4c-6aef-1bb3-1f41-c3454068d906</AiServiceId>
<AiModel>gpt-4</AiModel>
<TextInstructions>We have a piece of PowerShell code. The code does not currently handle any exceptions or errors. We want to improve this code to handle potential errors without using try-catch blocks if possible, and provide user-friendly error messages Reply with fully modified code. Use instant return if possible. Here's the original code:</TextInstructions>
<Text>```PowerShell
$file = 'C:\path\to\your\file.txt'
$content = Get-Content $file
$words = $content -split '\s+'
$wordCount = $words.Count
Write-Host "Number of words in the file: $wordCount"
```</Text>
<Attachments />
<Settings />
<Messages />
<AutoSend>false</AutoSend>
<MessageBoxOperation>ResetMessage</MessageBoxOperation>
<AutoOperation>None</AutoOperation>
<AutoRemove>false</AutoRemove>
<AutoFormatCode>false</AutoFormatCode>
<IsPreview>false</IsPreview>
<AttachmentsSelection />
</TemplateItem>
|
combined_dataset/train/non-malicious/sample_2_83.ps1
|
sample_2_83.ps1
|
ConvertFrom-StringData @'
id_portusage=TCP Port Usage
id_portusageobtaining=Obtaining TCP/IP port usage statistics
id_ephemeralportdesc=More than %XXX% of ephemeral ports are currently in use which may cause a possible ephemeral port (outbound port) exhaustion. Please review the information collected to identify the processeses using a large number of ports and also the referenced content for additional information on how to troubleshoot this problem.
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDLl1kIm4RQuM88
# +64qy7z/r5HCLWsyQ7xZ1SleqFgTfqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGeNa/nm5PBMxqMLzVDGEjH/
# QpcQ2iakr9sP2hpE5di0MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdkJ7QRieRc2j9PlRanaWhwvhDmzgPgFW1gOLmrs2u1R/IwrlY+Aye4x3
# YFL/fLxTv+X2gndMnObTLDkeAirWH4NAJyPBVDCZhsJ3jDhP09myzsPGxiCPVVOP
# HkMy8xtQCOzDtXfyxzP24wlormMFvj1pns/xQyBiC3Wil2BnEDZBGg2QvHZ2Y6dc
# L5tUcBHzZER96Y+SH0fneRoMBqZDqMnDDKTgGwqYBFLBRw3gpp3zr/a8HCHnEq2J
# OHuZw8r2tZd3+JevfUYoh6HFbFI8JTSuT/0zRzUS4i5GXnkz9a6/wfvYqJuXSaib
# 6xOhN5TB8UgRDW2TNamVD+CQ4nN3aqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBzqQEnee6T2QnBZuDi5uj1WPRJpsi5CAdbmeJG/vHDlQIGZutC6/S5
# GBMyMDI0MTAyODExNDA0Mi4xMTFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCowns0IQsBAAEAAAH+MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQwMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvLwhFxWlqA43olsE4PCe
# gZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62YHUieIQXw+0u4qlay4AN
# 3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv07O18i2HjDyLuywYyKA9F
# mWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9BCGVRdHW9lmPMrrUlPWi
# YV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnTdcfP6T8Mir0HrwTTtV2h
# 2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT81ZC2aHN7exEDmmbiWss
# jGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX/uDVtY9pvL4j8aEWS49h
# KUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B454eGJhL0fwUTRbgyCbp
# LgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQyahGZDL/vWAVjX5b8Jzhly
# 9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xbeOETAOn7OT9D3UGt0q+K
# iWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOnF7Dgj8a60KQT9QgfJfwX
# nr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRvznuJ9SU2
# g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAiT4NUvO2lw+0
# dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8LqxsH4GWCPTztc3tr8AgBv
# sYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPkMA3DAxVq4SSR8y+TRC2G
# cOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze+sbqSn8cekduMZdLyHJk
# 3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtTlNkq3bx1iyWg7N7jGZAB
# RWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIRVkWsMyEAdoP9dqfaZzwX
# GmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTRzZZEw82FupF3viXNR3DV
# OlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ2e+sBUh62KVTlhEsQRHZ
# RwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz9SvCjIKSxCZFCNv/zpKI
# lsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObDfU4h/O/0vmbF3BMR+45r
# AZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7FRnHEAAr06sflqZ8eeV3F
# uDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQLWVG9JuGxgLRXseggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0MTAyOTA5MDQwOFowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEAAgIIsAIB/zAHAgEAAgIS
# xjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzScy1wBbp
# cAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG0qSOBjk7VgyCvjFMirT1
# 1HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpeE+oE9viQRHMLsU/3b8hu
# zWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSjn3XQ0nllmNeGCeUkdIsN
# TpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/aN3CjM0gf25XwDETanz7K
# LbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9FVUpwZNtKUwYSNiOSsA9
# S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgoqHLOZY4
# zaa59KsH9NDzukOOgyAvjH5izOnGxcvf5EYwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0WtkCstyh0eTCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/tCowns0IQsBAAEA
# AAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH65KUaSnvoMA0GCSqGSIb3
# DQEBCwUABIICAEx5OFaX4+Qyl9jv6x7KhAmn6SA/p+QaMy4jaMjMJGbjedZFCw6Z
# 4F088zMDtpcvQVnbPEnmXirSGlEqIg2Svf0+svM0PL0hBwkIZipIXb7oFZ85C+fh
# ZgMpclNkX10WEV5mPZ0mH++bhN/u79zH6TtOmbIMTaTu/1A9xYLlWng6ARcqfcR1
# dK+HviptgLHXLry0Qs4aRfH0JgyJNAnBEsw1MvjafN2L6Yerp5kdf7Zb7/IpFLoC
# WHfqwtphy0z098SvRPW2narY+Bv/s3dT2giv/IdB7pr/QnKvZbmS2tYFPyIht0Ol
# QbTt1YaZ7Cv3silWCVNstOs2UsSl6GLIvLVmZp83IAjzhB/Mi7/6q2qG8wPeWMNY
# UcbopBrkszMUpFuUUjpvK9w+DM8Folc9WrvT97Qjhb5p0r24c42jwrJ+85aDyhTA
# MMvNhItrXnBpPbLaeuD7y3lBs+G3P/k0Pv2l0u0/+9wIeE4W5VdwK7YzwS9mRj/p
# Dk9rkWmXw3EadZeAcprBS24Tx6juZD+VUA3uH5hjGaPDHqZVmpAqInR/KidjdYo9
# xQv7GV48BfFIg4wyVDo92hveiAzOAfOIA3zuOyJM8ZhhwspLQsTzebK39CiTR3xX
# NverjhYt8H8SWlUR/KmNPOxEQ7cskG7qy4EY3HREyYC0v2Q+mowIwMOx
# SIG # End signature block
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.