full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/3691.ps1
|
3691.ps1
|
function Test-ShareCrud
{
$resourceGroup = getAssetName
try
{
$AccountName = getAssetName
$ShareName = getAssetName
$description = "Test Share"
$terms = "Test terms"
$shareKind = "CopyBased"
$createdShare = New-AzDataShare -AccountName $AccountName -ResourceGroupName $resourceGroup -Name $ShareName -Description $description -Terms $terms
Assert-NotNull $createdShare
Assert-AreEqual $ShareName $createdShare.Name
Assert-AreEqual "CopyBased" $createdShare.ShareKind
Assert-AreEqual $description $createdShare.Description
Assert-AreEqual $terms $createdShare.Terms
Assert-AreEqual "Succeeded" $createdShare.ProvisioningState
$retrievedShare = Get-AzDataShare -AccountName $AccountName -ResourceGroupName $resourceGroup -Name $ShareName
Assert-NotNull $retrievedShare
Assert-AreEqual $ShareName $retrievedShare.Name
Assert-AreEqual "Succeeded" $retrievedShare.ProvisioningState
$newDescription = "SDK Description"
$newTerms = "SDK Terms of Use"
$updateShare = Set-AzDataShare -AccountName $AccountName -ResourceGroupName $resourceGroup -Name $ShareName -Description $newDescription -Terms $newTerms
Assert-NotNull $updateShare
Assert-AreEqual $ShareName $updateShare.Name
Assert-AreEqual $newDescription $updateShare.Description
Assert-AreEqual $newTerms $updateShare.Terms
Assert-AreEqual "Succeeded" $updateShare.ProvisioningState
$removed = Remove-AzDataShare -AccountName $AccountName -ResourceGroupName $resourceGroup -Name $ShareName -PassThru
Assert-True { $removed }
Assert-ThrowsContains { Get-AzDataShare -AccountName $AccountName -ResourceGroupName $resourceGroup -Name $ShareName } "Resource 'sdktestingshare1' does not exist"
}
finally
{
Remove-AzResourceGroup -Name $resourceGroup -Force
}
}
|
combined_dataset/train/non-malicious/sample_52_89.ps1
|
sample_52_89.ps1
|
#
# Module manifest for module 'OCI.PSModules.Analytics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Analytics.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '88b806b7-e2b4-4102-95eb-65f27d654438'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Analytics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Analytics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAnalyticsInstance', 'Get-OCIAnalyticsInstancesList',
'Get-OCIAnalyticsPrivateAccessChannel',
'Get-OCIAnalyticsWorkRequest',
'Get-OCIAnalyticsWorkRequestErrorsList',
'Get-OCIAnalyticsWorkRequestLogsList',
'Get-OCIAnalyticsWorkRequestsList',
'Invoke-OCIAnalyticsScaleAnalyticsInstance',
'Invoke-OCIAnalyticsSetKmsKey',
'Move-OCIAnalyticsInstanceCompartment',
'Move-OCIAnalyticsInstanceNetworkEndpoint',
'New-OCIAnalyticsInstance', 'New-OCIAnalyticsPrivateAccessChannel',
'New-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsInstance',
'Remove-OCIAnalyticsPrivateAccessChannel',
'Remove-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsWorkRequest',
'Start-OCIAnalyticsInstance', 'Stop-OCIAnalyticsInstance',
'Update-OCIAnalyticsInstance',
'Update-OCIAnalyticsPrivateAccessChannel',
'Update-OCIAnalyticsVanityUrl'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Analytics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_26_33.ps1
|
sample_26_33.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ocvp'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ocvp.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '05a069dc-62d0-41ee-b47b-3fe73fff277d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ocvp Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocvp.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOcvpCluster', 'Get-OCIOcvpClustersList',
'Get-OCIOcvpEsxiHost', 'Get-OCIOcvpEsxiHostsList', 'Get-OCIOcvpSddc',
'Get-OCIOcvpSddcsList', 'Get-OCIOcvpSupportedCommitmentsList',
'Get-OCIOcvpSupportedHostShapesList',
'Get-OCIOcvpSupportedVmwareSoftwareVersionsList',
'Get-OCIOcvpWorkRequest', 'Get-OCIOcvpWorkRequestErrorsList',
'Get-OCIOcvpWorkRequestLogsList', 'Get-OCIOcvpWorkRequestsList',
'Invoke-OCIOcvpDowngradeHcx', 'Invoke-OCIOcvpInplaceUpgrade',
'Invoke-OCIOcvpRefreshHcxLicenseStatus',
'Invoke-OCIOcvpReplaceHost', 'Invoke-OCIOcvpRetrievePassword',
'Invoke-OCIOcvpSwapBilling', 'Invoke-OCIOcvpUpgradeHcx',
'Move-OCIOcvpSddcCompartment', 'New-OCIOcvpCluster',
'New-OCIOcvpEsxiHost', 'New-OCIOcvpSddc', 'Remove-OCIOcvpCluster',
'Remove-OCIOcvpEsxiHost', 'Remove-OCIOcvpSddc',
'Stop-OCIOcvpDowngradeHcx', 'Update-OCIOcvpCluster',
'Update-OCIOcvpEsxiHost', 'Update-OCIOcvpSddc'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocvp'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get Twitter RSS Feed.ps1
|
Get Twitter RSS Feed.ps1
|
param ([String] $ScreenName)
$client = New-Object System.Net.WebClient
$idUrl = "https://api.twitter.com/1/users/show.json?screen_name=$ScreenName"
$data = $client.DownloadString($idUrl)
$start = 0
$findStr = '"id":'
do {
$start = $data.IndexOf($findStr, $start + 1)
if ($start -gt 0) {
$start += $findStr.Length
$end = $data.IndexOf(',', $start)
$userId = $data.SubString($start, $end-$start)
}
} while ($start -le $data.Length -and $start -gt 0)
$feed = "http://twitter.com/statuses/user_timeline/$userId.rss"
$feed
|
combined_dataset/train/non-malicious/New-Zip_2.ps1
|
New-Zip_2.ps1
|
Function New-Zip
{
<#
.SYNOPSIS
Create a Zip File from any files piped in.
.DESCRIPTION
Requires that you have the SharpZipLib installed, which is available from
http://www.icsharpcode.net/OpenSource/SharpZipLib/
.NOTES
File Name : PowerZip.psm1
Author : Christophe CREMON (uxone) - http://powershell.codeplex.com
Requires : PowerShell V2
.PARAMETER Source
Set the name of the source to zip (file or directory)
.PARAMETER ZipFile
Set the name of the zip file to create
.PARAMETER Recurse
Browse the source recursively
.PARAMETER Include
Include only items you specify
.PARAMETER Exclude
Exclude items you specify
.PARAMETER AbsolutePaths
Preserve the absolute path name of each item in the zip container
.PARAMETER DeleteAfterZip
Delete source items after successful zip
.EXAMPLE
New-Zip -Source C:\\Temp -ZipFile C:\\Archive\\Scripts.zip -Include *.ps1 -DeleteAfterZip
Copies all PS1 files from the C:\\Temp directory to C:\\Archive\\Scripts.zip and delete them after successful ZIP
#>
param (
[ValidateNotNullOrEmpty()]
[Parameter(
Mandatory = $true)
]
[string] $Source,
[Parameter(
Mandatory = $true)
]
[string] $ZipFile,
[switch] $Recurse,
[array] $Include,
[array] $Exclude,
[switch] $AbsolutePaths,
[switch] $DeleteAfterZip )
[int] $ExitCode = 1
$LoadAssembly = [System.Reflection.Assembly]::LoadWithPartialName("ICSharpCode.SharpZipLib")
if ( -not $LoadAssembly ) { throw "! Assembly not found {ICSharpCode.SharpZipLib}" }
$RootPath = ( Resolve-Path -Path $Source -ErrorAction SilentlyContinue ).Path
if ( -not $RootPath ) { throw "! Source not found {$Source}" }
if ( $ZipFile -notmatch "\\.zip$" ) { $ZipFile = $ZipFile -replace "$",".zip" }
if ( $Recurse -eq $true ) { $RecurseArgument = "-Recurse" }
if ( $AbsolutePaths -eq $true ) { $AbsolutePathsArgument = "-AbsolutePaths" }
if ( $DeleteAfterZip -eq $true ) { $DeleteAfterZipArgument = "-DeleteAfterZip" }
if ( $Include )
{
$Include = $Include -join ","
$IncludeArgument = "-Include $Include"
$Source = $Source+"\\*"
}
if ( $Exclude )
{
$Exclude = $Exclude -join ","
$ExcludeArgument = "-Exclude $Exclude"
}
$GetCommand = "Get-ChildItem -Path '$Source' $RecurseArgument $IncludeArgument $ExcludeArgument -Force"
$ItemsToZip = Invoke-Expression -Command $GetCommand
$SizeBeforeZip = ( $ItemsToZip | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum
$SizeBeforeZipInMB = $SizeBeforeZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
if ( -not $SizeBeforeZip )
{
Write-Output "NOTHING TO ZIP"
break
}
$StartTime = Get-Date
Write-Output "`n===================================`n=> Start Time : $($StartTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n"
Write-Output "TOTAL SIZE BEFORE ZIP : {$SizeBeforeZipInMB MB}`n"
Write-Output "Initializing ZIP File {$ZipFile} ...`n"
$CreateZIPContainer = New-Item -ItemType File -Path $ZipFile -Force -ErrorAction SilentlyContinue
if ( -not $CreateZIPContainer ) { throw "! Unable to create ZIP container {$ZipFile}" }
$oZipOutputStream = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipOutputStream([System.IO.File]::Create($ZipFile))
[byte[]] $Buffer = New-Object Byte[] 4096
foreach ( $Item in $ItemsToZip )
{
if ( $Item.FullName -ne $ZipFile )
{
if ( Test-Path ( $Item.FullName ) -ErrorAction SilentlyContinue )
{
$ZipEntry = $Item.FullName
if ( -not $AbsolutePaths )
{
$ReplacePath = [Regex]::Escape( $RootPath+"\\" )
$ZipEntry = $Item.FullName -replace $ReplacePath,""
}
if ( $Item.psIsContainer -eq $true )
{
if ( $Recurse -eq $true )
{
Write-Output "Processing ZIP of Directory {$($Item.FullName)} ..."
$OldErrorActionPreference = $ErrorActionPreference
$ErrorActionPreference = "SilentlyContinue"
$oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry/")
$oZipOutputStream.PutNextEntry($oZipEntry)
if ( $? -ne $true )
{
$ItemsNotZipped += @($Item.FullName)
$ErrorsArray += @("! Unable to ZIP Directory {$($Item.FullName)}")
}
$ErrorActionPreference = $OldErrorActionPreference
}
}
else
{
Write-Output "Processing ZIP of File {$($Item.FullName)} ..."
$OldErrorActionPreference = $ErrorActionPreference
$ErrorActionPreference = "SilentlyContinue"
$FileStream = [IO.File]::OpenRead($Item.FullName)
$oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry")
$oZipOutputStream.PutNextEntry($oZipEntry)
[ICSharpCode.SharpZipLib.Core.StreamUtils]::Copy($FileStream,$oZipOutputStream,$Buffer)
if ( $? -ne $true )
{
$ItemsNotZipped += @($Item.FullName)
$ErrorsArray += @("! Unable to ZIP File {$($Item.FullName)}")
}
$FileStream.Close()
}
}
}
}
$oZipOutputStream.Finish()
$oZipOutputStream.Close()
if ( $? -eq $true )
{
$ErrorActionPreference = $OldErrorActionPreference
if ( $DeleteAfterZip )
{
$ItemsToZip | Where-Object { $ItemsNotZipped -notcontains $_.FullName } | ForEach-Object {
if ( $_.psIsContainer -ne $true )
{
if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue )
{
Write-Output "Processing Delete of File {$($_.FullName)} ..."
$RemoveItem = Remove-Item -Path $_.FullName -Force -ErrorAction SilentlyContinue
if ( $? -ne $true )
{
$ErrorsArray += @("! Unable to Delete File {$($_.FullName)}")
}
}
}
}
if ( $Recurse )
{
$ItemsToZip | Where-Object { $ItemsNotZipped -notcontains ( Split-Path -Parent $_.FullName ) } | ForEach-Object {
if ( $_.psIsContainer -eq $true )
{
if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue )
{
Write-Output "Processing Delete of Directory {$($_.FullName)} ..."
$RemoveItem = Remove-Item -Path $_.FullName -Force -Recurse -ErrorAction SilentlyContinue
if ( $? -ne $true )
{
$ErrorsArray += @("! Unable to Delete Directory {$($_.FullName)}")
}
}
}
}
}
}
Write-Output "`nZIP File Created {$ZipFile} ...`n"
$ExitCode = 0
}
else
{
$ErrorActionPreference = $OldErrorActionPreference
$ErrorsArray += @("! ZIP Archive {$ZipFile} Creation Failed`n")
}
if ( $ErrorsArray )
{
Write-Output "`n[ ERRORS OCCURED ]"
$ErrorsArray
$ExitCode = 1
}
else
{
$SizeAfterZip = ( Get-Item -Path $ZipFile -Force -ErrorAction SilentlyContinue | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum
$SizeAfterZipInMB = $SizeAfterZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
Write-Output "`nTOTAL SIZE AFTER ZIP : {$SizeAfterZipInMB MB}`n"
$Gain = ( $SizeBeforeZip - $SizeAfterZip )
$GainInMB = $Gain | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
if ( $Gain -gt 0 )
{
$GainInPercent = (($SizeBeforeZip - $SizeAfterZip) / $SizeBeforeZip) * 100 | ForEach-Object { "{0:N2}" -f $_ }
Write-Output "GAIN : {$GainInMB MB} ($GainInPercent %)`n"
}
}
$EndTime = Get-Date
$ExecutionTime = ($EndTime-$StartTime)
Write-Output "`nExecution Time : $ExecutionTime`n"
Write-Output "=> End Time : $($EndTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n=================================`n"
exit $ExitCode
}
Export-ModuleMember -Function New-Zip
|
combined_dataset/train/non-malicious/1341.ps1
|
1341.ps1
|
function Disable-CIisSecurityAuthentication
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$SiteName,
[Alias('Path')]
[string]
$VirtualPath = '',
[Parameter(Mandatory=$true,ParameterSetName='Anonymous')]
[Switch]
$Anonymous,
[Parameter(Mandatory=$true,ParameterSetName='Basic')]
[Switch]
$Basic,
[Parameter(Mandatory=$true,ParameterSetName='Windows')]
[Switch]
$Windows
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$authType = $pscmdlet.ParameterSetName
$getArgs = @{ $authType = $true; }
$authSettings = Get-CIisSecurityAuthentication -SiteName $SiteName -VirtualPath $VirtualPath @getArgs
if( -not $authSettings.GetAttributeValue('enabled') )
{
return
}
$authSettings.SetAttributeValue('enabled', 'False')
$fullPath = Join-CIisVirtualPath $SiteName $VirtualPath
if( $pscmdlet.ShouldProcess( $fullPath, ("disable {0} authentication" -f $authType) ) )
{
$authSettings.CommitChanges()
}
}
|
combined_dataset/train/non-malicious/sample_33_33.ps1
|
sample_33_33.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Set-AMTAlarmClock {
<#
.Synopsis
Sets a Intel Active Management Technology alarm clock timer
.Description
This CmdLet allows the user to set a wake timer on clients that have Intel Active Management Technology (AMT) firmware version 5.1 or higher.
Since Intel AMT firmware version 8.0 or higher, multiple alarm clock timers are supported.
.Notes
Supported AMT Firmware Versions: 5.1 and higher
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
AlarmTime:
The AlarmTime parameter is the date and time to wake the client. It is set as [YYYY]-[MM]-[DD]T[HH]:[MM]:[SS] Example: 2010-07-14T02:00:00 would wake the client on July 14, 2010 @ 02:00.
If the user sets the alarm date and time on a client in a different timezone, the alarm time specified will be set to the proper GMT for the client. For Example if running the Cmdlet from a client in the Pacific Time zone to configure the wake up time on a client configured with Eastern Time for 08:00, the alarm clock will wake the client at 08:00 Eastern time.
Interval:
Interval parameter is the desired reoccurrence interval for the alarm to be set. The format is: [DD]-[HH]-[MM]-[SS] Example: 07-00:00:00 would have a reoccurrence of every seven day at the same time; Example: 00-02:30:00 would have a reoccurrence of every 2 hours 30 minutes.
AlarmName:
Since Intel AMT firmware version 8.0 or higher, can supply an alarm name for future handeling.
DeleteCompletion
Since Intel AMT firmware version 8.0 or higher, can determined whether the alarm clock will be deleted after completion or not.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Set-AMTAlarmClock -ComputerName:vproclient.vprodemo.com -TLS -CertificateName "myCertificate" -AlarmTime:2010-07-14T02:00:00
Sets one time occurrence for wake up alarmclock.
ComputerName : vproclient.vprodemo.com
Port : 16993
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
Status : Successful
.Example
Set-AMTAlarmClock -ComputerName:vproclient.vprodemo.com -TLS -AlarmTime:2010-07-14T02:00:00 -AlarmName MyDefaultAlarm -DeleteCompletion
Sets one time occurrence for wake up alarmclock, the alarm name will be MyDefaultAlarm and it will be deleted automaticly once it occurrs.
ComputerName : vproclient.vprodemo.com
Port : 16993
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
Status : Successful
.Example
Set-AMTAlarmClock vproclient.vprodemo.com -TLS -AlarmTime:2010-07-14T02:00:00 -UserName vprodemo\administrator
Will prompt for Kerberos User Password then Sets one time occurrence for wake up alarmclock.
ComputerName : vproclient.vprodemo.com
Port : 16993
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
Status : Successful
.Example
Set-AMTAlarmClock vproclient -UserName:admin -AlarmTime:2010-07-14T02:00:00 -Interval:07-00:00:00
Will prompt for Digest User Password then sets reoccuring wake up alarmclock for once a week at that time.
ComputerName : vproclient
Port : 16992
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
PeriodicInterval : P0Y0M07DT00H00M
Status : Successful
.Example
Get-Content computers.txt | Set-AMTAlarmClock -credential $AMTCredential -TLS -AlarmTime:2010-07-14T02:00:00 -Interval:00-01:00:00 -credential $SomeStoredPSCredential
Will pull the list of amt clients from a text file and pipe them in the Set-AMTAlarmClock CMDLet.
Sets reoccuring wake up alarmclock for once every hour on and after that time.
ComputerName : computer1.vprodemo.com
Port : 16993
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
PeriodicInterval : P0Y0M00DT02H00M
Status : Successful
ComputerName : computer2.vprodemo.com
Port : 16993
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
PeriodicInterval : P0Y0M00DT02H00M
Status : Successful
ComputerName : computer3.vprodemo.com
Port : 16993
NextAlarmTime : Wednesday, July 14, 2010 2:00:00 AM
PeriodicInterval : P0Y0M00DT02H00M
Status : Successful
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Alarm Time in YYYY-MM-DDTHH:MM:SS format")][ValidatePattern("[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]T[0-9][0-9]:[0-9][0-9]:[0-9][0-9]")] [string] $AlarmTime,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Periodic Interval in DD-HH:MM:SS format")][ValidatePattern("[0-9][0-9]-[0-9][0-9]:[0-9][0-9]:[0-9][0-9]")] [string] $Interval,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Alarm Name, in use in Intel AMT vresion 8.0 and later.")][string] $AlarmName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Delete on Completion, in use in Intel AMT vresion 8.0 and later.")][switch] $DeleteCompletion,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential
)
PROCESS {
$Results = @()
$Obj = new-object psobject
try
{
#create a connection object
$Connection = New-Object Intel.Management.Wsman.WsmanConnection
if ($credential.username.Length -gt 0)
{
$Connection.SetCredentials($credential.Username, $credential.Password)
}
elseif ($username.length -gt 0)
{
if ($password.length -gt 0)
{
$Connection.SetCredentials($username, $password)
}
else
{
$cred = Get-Credential $username
$Connection.SetCredentials($cred.Username, $cred.Password)
}
}
if ($Port.Length -lt 1) {
if ($TLS.IsPresent) {
$Port = 16993;
}
else {
$Port = 16992;
}
}
if($CertificateName.Length -gt 0)
{
$Connection.Options.SetClientCertificateByCertificateName($CertificateName)
}
Foreach ($comp in $ComputerName)
{
$Connection.SetHost($comp, $port)
if($Port -ne "16992")
{
$GMTError = $false
}
else
{
$http = [System.Net.WebRequest]::Create("http://"+$Comp+":"+$port+"/logon.htm")
$httpResponse = $http.GetResponse()
if($httpResponse.StatusCode -eq [System.Net.HttpStatusCode]::OK)
{
$amtTime = [System.DateTime]::Parse($httpResponse.GetResponseHeader("Date"))
$systemTime = [System.DateTime]::Now
if($amtTime.Hour -ne $systemTime.Hour)
{
# AMT Time was not set to UTC
$GMTError = $true
}
}
$httpResponse.Close()
}
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$Obj | Add-Member -MemberType noteproperty -Name Port -value $port
$AlarmClockService_EPR = $Connection.NewReference("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService")
$AlarmClockService_EPR.AddSelector("SystemName","ManagedSystem")
try
{
$AlarmClockService = $AlarmClockService_EPR.Get()
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed"
$Obj | Add-Member -MemberType noteproperty -Name "NextAlarmTime" -value "[Error]"
$Obj | Add-Member -MemberType noteproperty -Name "PeriodicInterval" -value "[Error]"
$Results += $Obj
continue
}
if($AlarmTime -ne "")
{
if ($AlarmTime.EndsWith(":00") -eq $false)
{
$replace = $AlarmTime.SubString($AlarmTime.Length-3, 3)
$NewAlarmTime = $AlarmTime.TrimEnd($replace);
$NewAlarmTime+= ":00"
$AlarmTime = $NewAlarmTime
}
$SetAlarmTime = $Connection.NewInstance("Datetime")
try
{
$TimeObj = [System.DateTime]::Parse($AlarmTime)
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "NextAlarmTime" -value "[Parse Error]"
$Results += $Obj
continue
}
if($GMTError)
{
# Local Time
$SetAlarmTime.Text = $TimeObj.ToString("s")+"Z"
}
else
{
# Universal Time
$SetAlarmTime.Text = $TimeObj.ToUniversalTime().ToString("s")+"Z"
}
$Obj | Add-Member -MemberType noteproperty -Name "NextAlarmTime" -value $TimeObj.ToString("F")
}
if($Interval -ne "")
{
if($Interval.Contains("-"))
{
$temp = $Interval.Split("-")
$Day = $temp[0]
$TimeInterval = $temp[1]
}
else
{
$Day = "0"
$TimeInterval = $Interval
}
$temp = $TimeInterval.Split(":")
$hours = $temp[0]
$minutes = $temp[1]
$seconds = $temp[2]
$intervalstring = "P0Y0M" + $Day + "DT" + $hours + "H" + $minutes + "M"
$SetIntervalTime = $Connection.NewInstance("Interval")
try
{
$TimeObj = [System.DateTime]::Parse($AlarmTime)
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "PeriodicInterval" -value "[Error]"
$Results += $Obj
continue
}
$SetIntervalTime.Text = $intervalstring
$Obj | Add-Member -MemberType noteproperty -Name "PeriodicInterval" -value $intervalstring
}
$SoftwareIdentity_EPR = $Connection.NewReference("SELECT * FROM CIM_SoftwareIdentity WHERE InstanceID='AMT'")
try
{
$SoftwareIdentity = $SoftwareIdentity_EPR.Get()
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed version"
$Results += $Obj
continue
}
$temp = $SoftwareIdentity.GetProperty("VersionString").ToString().Split(".")
if($temp[0] -lt "8")
{
if($AlarmTime -ne "")
{
$AlarmClockService.SetProperty("NextAMTAlarmTime",$SetAlarmTime)
}
if($Interval -ne "")
{
$AlarmClockService.SetProperty("AMTAlarmClockInterval",$SetIntervalTime)
}
try
{
$RetVal = $AlarmClockService_EPR.Put($AlarmClockService)
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful"
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed"
}
}
else
{
$builder = "<d:AlarmTemplate"
$builder += " xmlns:d="
$builder += "`""
$builder += "http://intel.com/wbem/wscim/1/amt-schema/1/AMT_AlarmClockService"
$builder += "`""
$builder += " xmlns:s="
$builder += "`""
$builder += "http://intel.com/wbem/wscim/1/ips-schema/1/IPS_AlarmClockOccurrence"
$builder += "`""
$builder += ">"
if($AlarmName -ne "")
{
$builder += "<s:InstanceID>" + $AlarmName + "</s:InstanceID>"
}
else
{
$builder += "<s:InstanceID>" + "DefaultAlarm" + "</s:InstanceID>"
}
if($AlarmTime -ne "")
{
$builder += "<s:StartTime>" + $SetAlarmTime.Xml + "</s:StartTime>"
}
if($Interval -ne "")
{
$builder += "<s:Interval>" + $SetIntervalTime.Xml + "</s:Interval>"
}
if($DeleteCompletion.IsPresent)
{
$builder += "<s:DeleteOnCompletion>true</s:DeleteOnCompletion>"
}
else
{
$builder += "<s:DeleteOnCompletion>false</s:DeleteOnCompletion>"
}
$builder += "</d:AlarmTemplate>"
$addAlarmInput = $AlarmClockService_EPR.CreateMethodInput("AddAlarm")
$tempObj = $Connection.NewInstance($builder)
$addAlarmInput.SetProperty($tempObj)
try
{
$RetVal = $AlarmClockService_EPR.InvokeMethod($addAlarmInput)
if($RetVal.GetProperty("ReturnValue").ToString() -eq "0")
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful"
}
else
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed. ReturnValue = " + $RetVal.GetProperty("ReturnValue").ToString() - Force
}
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed" -Force
}
}
}
$Results += $Obj
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed" -Force
$Obj | Add-Member -MemberType noteproperty -Name "Reason" -value $_.Exception.Message -Force
$Results += $Obj
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBU0xryccATxduC
# dvpAjgph8EB66bSdekUDkkDB1qyn0KCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgk33vLZ/zhz6k3R7k
# DYAq/NySCc5VSLpCPs2wIemyma8wDQYJKoZIhvcNAQEBBQAEggGAzosJ2kFJYWWk
# JMPKg6YFmbP7oh9MZrYLOzm5mxHDRX6E/47Tu5ba7TY0AvqT/yr4iTbEgY89lvEc
# g4fKgpdsAQZEPinJnoQJVw6qLCb6efQI+qs24Q9JsZ7D+Snl3XEBCAVR/h2pPLdg
# aAnTOsWGzv4gGjuba8s5c1N9aTYj1tMGgW5eeeDhHphPjjzyB9mdaU7vw3g7Ft7i
# QyMJdUkFIOR6ngcMt5QNUPJ0CKZREr/pFRHaNHQFMCQEHDrlchML9GSnDFWN8nJc
# aDley5s6vJixn73qwkOiPD0VeX0sVcgk/aq73/02xeTn5BtT5rjBwxPmohGc5/pZ
# hGwMYxTVJabnVtXK292ewdbdTyFApoIEWPqcP0gQc+RtdTzTY7SnyCKWzy+6NljF
# umKOHOGnDP+RijYzTKU2WkjwnvritNnx/MegPhtUxAY9syp0nv79kAy8UY/UzITO
# DrPv8KJ2wCN/+x+E0zoyuVE1wVJMa7jYdyO7m8HthrAdB2m5JMHWoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIL3sCxl+Zzyn7ZtG51cSDuIXUaIfi1Ok2o4a
# b3Kgj5LyAhUA2XDCJS6Ik4kq0nezwEMpB6X4eTYYDzIwMjExMDI3MTIxMjUyWqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMTAyNzEyMTI1MlowPwYJKoZIhvcNAQkEMTIEMAw+kBWck4H4
# h/HIQYxdSSAiHeaRsQQvjxGCN/OUML8DzuxpUEQo5rku/WEzfw7LzjCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgAayniEHbWbk+S/byFZJn36xw8b43xdDq6z6hhk2B0SbwHpYus4
# IoFTj9wb++OdpHWNK7a53QbaDnV+HvlGj8ERmHrVzNr/PsIIfdhIlqomuHph1pGX
# GCPUib2ZkAJbDhCoXvm/HVnDgDfqbKs1I4yHNtkgIF2cb/pYcOWimbSKm4Fma7SH
# 9/e46Myxr8l2GOCy0R3EV1p20+I8CLProohaBxTjJUKr5+OEyuusJDHS0QZqX2Tl
# DZiItIie2SXYS6+njYOIx43RpV2XGeOZvr6GyEw2UYg1SGcfXRhPFmXTejZmPD6t
# A7Q+v9qrT+pK882N0Cc6wV6RMdorjxti5vYkyzrEa5hfjponGuiNQWasRM6DBYqq
# IGCaveJE4+pyXSHpEtSf4nkvv27KIPwaSTFyMFsbz6YHpiJuFZv8p7Xoo3wl+yJT
# tODFuENBmB0EOrZhiaIRVvHGKkLxtvVSo9jxkDIEHqxWUI6XSIUkd0pweDRBpp88
# R1IiBgQowyBC7DV5gJEOf8+s4+nqMd4w9Zw4tQXo2Z4J/ctUSOT180oNCWK6JFZe
# Fdb0rbF/+t9SZSHRW4/V4/9xNN7aareKBdOwW0kQ9JkFY3TgIU2EjqOcNQBHelxk
# kkVfL/T22Kp7nJEE3dt6DLFf2F3MUYK7unNR1TfEweXiJ5K9SDfZgorAxg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_67_93.ps1
|
sample_67_93.ps1
|
#
# Module manifest for module 'OCI.PSModules.Resourcemanager'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '73e0f641-602c-4457-9e79-f05b84ced282'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Resourcemanager Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider',
'Get-OCIResourcemanagerConfigurationSourceProvidersList',
'Get-OCIResourcemanagerJob',
'Get-OCIResourcemanagerJobAssociatedResourcesList',
'Get-OCIResourcemanagerJobDetailedLogContent',
'Get-OCIResourcemanagerJobLogs',
'Get-OCIResourcemanagerJobLogsContent',
'Get-OCIResourcemanagerJobOutputsList',
'Get-OCIResourcemanagerJobsList',
'Get-OCIResourcemanagerJobTfConfig',
'Get-OCIResourcemanagerJobTfPlan',
'Get-OCIResourcemanagerJobTfState',
'Get-OCIResourcemanagerPrivateEndpoint',
'Get-OCIResourcemanagerPrivateEndpointsList',
'Get-OCIResourcemanagerReachableIp',
'Get-OCIResourcemanagerResourceDiscoveryServicesList',
'Get-OCIResourcemanagerStack',
'Get-OCIResourcemanagerStackAssociatedResourcesList',
'Get-OCIResourcemanagerStackResourceDriftDetailsList',
'Get-OCIResourcemanagerStacksList',
'Get-OCIResourcemanagerStackTfConfig',
'Get-OCIResourcemanagerStackTfState',
'Get-OCIResourcemanagerTemplate',
'Get-OCIResourcemanagerTemplateCategoriesList',
'Get-OCIResourcemanagerTemplateLogo',
'Get-OCIResourcemanagerTemplatesList',
'Get-OCIResourcemanagerTemplateTfConfig',
'Get-OCIResourcemanagerTerraformVersionsList',
'Get-OCIResourcemanagerWorkRequest',
'Get-OCIResourcemanagerWorkRequestErrorsList',
'Get-OCIResourcemanagerWorkRequestLogsList',
'Get-OCIResourcemanagerWorkRequestsList',
'Invoke-OCIResourcemanagerDetectStackDrift',
'Move-OCIResourcemanagerConfigurationSourceProviderCompartment',
'Move-OCIResourcemanagerPrivateEndpointCompartment',
'Move-OCIResourcemanagerStackCompartment',
'Move-OCIResourcemanagerTemplateCompartment',
'New-OCIResourcemanagerConfigurationSourceProvider',
'New-OCIResourcemanagerJob',
'New-OCIResourcemanagerPrivateEndpoint',
'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate',
'Remove-OCIResourcemanagerConfigurationSourceProvider',
'Remove-OCIResourcemanagerPrivateEndpoint',
'Remove-OCIResourcemanagerStack',
'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob',
'Update-OCIResourcemanagerConfigurationSourceProvider',
'Update-OCIResourcemanagerJob',
'Update-OCIResourcemanagerPrivateEndpoint',
'Update-OCIResourcemanagerStack',
'Update-OCIResourcemanagerTemplate'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_40_87.ps1
|
sample_40_87.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Start-AMTIDER {
<#
.Synopsis
Starts an Intel Active Management Technology IDE redirection session
.Description
This CmdLet starts an Intel Active Management Technology(AMT) IDE redirection(IDER) session to clients that have Intel AMT firmware version 3.0 or higher.
.Notes
Supported AMT Firmware Versions: 3.0 and higher
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Start-AMTIDER -computername:192.168.1.100 -operation:Reset -iderpath:.\boot.iso -credential:$AMTCredential
ComputerName IDERSessionID IDERPath Status
------------ ------------- -------- ------
192.168.1.100 1 boot.iso Successful
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Valid Operations are PowerOn or Reset")][ValidateSet("PowerOn", "Reset")] [String] $Operation,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="Enter valid path to ISO or IMG file")] [String] $IDERPath,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential
)
PROCESS {
$Results = @()
$Obj = new-object psobject
try
{
#create a connection object
$Connection = New-Object Intel.Management.Wsman.WsmanConnection
if ($Credential.username.Length -gt 0) {
$Connection.SetCredentials($Credential.Username, $Credential.Password)
} elseif ($Username.length -gt 0) {
if ($Password.length -gt 0) {
$Connection.SetCredentials($Username, $Password)
} else {
$Cred = Get-Credential $Username
$Connection.SetCredentials($Cred.Username, $Cred.Password)
}
}
switch ($Operation) {
"PowerOn" {$PowerInt = 2}
"Reset" {$PowerInt = 10}
}
if ($TLS.IsPresent) {
$Port = 16993;
}
else {
$Port = 16992;
}
if($CertificateName.Length -gt 0)
{
$Connection.Options.SetClientCertificateByCertificateName($CertificateName)
}
$gErrorText
ForEach ($Comp in $ComputerName)
{
try
{
#Attempt Connection with Client
$Connection.SetHost($Comp, $Port)
$IDERPath = $IDERPath.ToLower()
#params for doing redirection
if ($IDERPath.EndsWith("iso"))
{
$floppyFile = "$env:TEMP\floppy.img"
$cdFile = $IDERPath
$iderBootDevice="1"
}
elseif ($IDERPath.EndsWith("img"))
{
$cdFile = "$env:TEMP\cd.iso"
$floppyFile = $IDERPath
$iderBootDevice="0"
}
else
{
write-output "You must enter a valid ISO or IMG file."
return
}
$LibSettingsFile="$env:TEMP\MC.ini"
$CertTrustFile="$env:TEMP\certs.pem"
if ((test-path variable:\imrLib) -eq 0)
{
New-Variable -scope global -name imrLib -value (New-Object Intel.Management.Redirection.MediaRedirection)
}
#Initialize the Intel Media Redirection Library (imrLib)
[Intel.Management.Redirection.IMRVersion]$libVersion = New-Object Intel.Management.Redirection.IMRVersion
$imrResult = $global:imrLib.Init([ref] $libVersion,$LibSettingsFile)
$imrResult = $global:imrLib.SetCertificateInfo($CertTrustFile,"","")
#Mutual authentication
if($TLS.IsPresent -and ($CertificateName.Length -gt 0))
{
$imrResult = $global:imrLib.SetClientCertificate($CertificateName)
}
#define a redirection client based on the WsmanConnection Address
$imrClient = $global:imrLib.GetClientInfo($Connection.Address)
#add the redirection client to the Library (Library return a value clientID)
[System.UInt32]$clientId=[System.UInt32]::MaxValue
$imrResult = $global:imrLib.AddClient($imrClient,[ref] $clientId)
if($imrResult -eq "DuplicateClient")
{
$gErrorText = "IDER Session already opened"
Throw
}
#create redirection session parameters (e.g user name and password) based on the Wsman Connection
$iderParams = $global:imrLib.CreateSessionParams($Connection.Username,$Connection.Password)
#define session timeouts
$iderTimeouts = $global:imrLib.GetDefaultIDERTout()
#Open an IDER session
$imrResult = $global:imrLib.IDEROpenTCPSession($clientId, $iderParams, $iderTimeouts, $floppyFile, $cdFile)
if($imrResult -eq "InvalidParameter")
{
$gErrorText = "Bad IDER file name"
Throw
}
#after opening the session the next thing we will do send a command to enable the IDER device for immediate use
[Intel.Management.Redirection.IDERDeviceResult]$deviceResult = New-Object Intel.Management.Redirection.IDERDeviceResult
[Intel.Management.Redirection.IDERDeviceCmd]$deviceCommand = New-Object Intel.Management.Redirection.IDERDeviceCmd
$deviceCommand.pri_op = [Intel.Management.Redirection.SetOperation]::Enable
$deviceCommand.pri_timing = [Intel.Management.Redirection.SetOption]::Immediately
#enable the ider device for immediate use by setting the device state
$imrResult = $global:imrLib.IDERSetDeviceState($clientId, $deviceCommand, [ref] $deviceResult);
$cimRef = $Connection.NewReference("SELECT * FROM AMT_RedirectionService")
$cimObj = $cimRef.Get();
if (!$cimObj.GetProperty("EnabledState").ToString().Equals("32771"))
{
$cimObj.SetProperty("EnabledState", "327711")
$cimRef.Put($cimObj)
}
if ($cimObj.GetProperty("ListenerEnabled").ToString().Equals("false"))
{
$cimObj.SetProperty("ListenerEnabled", "true")
$cimRef.Put($cimObj)
}
$SourceRef = $Connection.NewReference("CIM_BootSourceSetting")
$SourceRef.AddSelector("InstanceID", $InstanceID)
$objRef = $Connection.NewReference("CIM_BootConfigSetting")
$objRef.AddSelector("InstanceID", 'Intel(r) AMT: Boot Configuration 0')
$InputObj = $objRef.CreateMethodInput("ChangeBootOrder")
$OutObj = $objRef.InvokeMethod($InputObj)
#Set the AMT boot settings
$cimRef = $Connection.NewReference("SELECT * FROM AMT_BootSettingData")
$cimObj = $cimRef.Get()
$cimObj.SetProperty("UseSOL", "false")
$cimObj.SetProperty("UseIDER", "true")
$cimObj.SetProperty("IDERBootDevice", $iderBootDevice)
$cimObj.SetProperty("BootMediaIndex", "0");
$cimObj.SetProperty("UserPasswordBypass", "false")
$putResult=$cimRef.Put($cimObj)
$BootConfigSettingRef = $Connection.NewReference("CIM_BootConfigSetting")
$BootConfigSettingRef.AddSelector("InstanceID", 'Intel(r) AMT: Boot Configuration 0')
$objRef = $Connection.NewReference("CIM_BootService")
$InputObj = $objref.CreateMethodInput("SetBootConfigRole")
$InputObj.SetProperty("BootConfigSetting", $BootConfigSettingRef)
$InputObj.SetProperty("Role", "1")
$OutObj = $objRef.InvokeMethod($InputObj)
#Get a reference to the ManagedSystem (User of the Service)
$UserRef = $Connection.NewReference("SELECT * from CIM_ComputerSystem WHERE Name='ManagedSystem'")
#Get the Instance of CIM_AssociatedPowerManagmentService for the ManagedSystem
$ObjRef = $Connection.NewReference("CIM_AssociatedPowerManagementService");
$ObjRef.AddSelector("UserOfService",$userRef);
$AssociatedObj = $ObjRef.Get()
#Now Assoctate to the Provider of the Service (CIM_PowerManagementService)
$ServiceRef = $AssociatedObj.GetProperty("ServiceProvided").Ref
#Now invoke the RequestPowerStateChange
$InputObj = $ServiceRef.CreateMethodInput("RequestPowerStateChange")
$InputObj.SetProperty("PowerState", "$PowerInt")
$InputObj.SetProperty("ManagedElement", $UserRef)
$OutObj = $ServiceRef.InvokeMethod($InputObj);
#Note Return Status
$ReturnValue = $OutObj.GetProperty("ReturnValue").ToString()
if ((test-path variable:\AMTIDERSessions) -eq 0)
{
New-Variable -scope global -name AMTIDERSessions -value (New-Object System.Collections.ArrayList)
}
$session = new-object psobject -property @{IDERSessionID=$clientId; IDERPath=$IDERPath}
[void]$global:AMTIDERSessions.Add($session)
#Add Member to Object. Include Computer Name and Operation sucess
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$Obj | Add-Member -MemberType noteproperty -Name IDERSessionID -value $clientId
$Obj | Add-Member -MemberType noteproperty -Name IDERPath -value $IDERPath
if ($ReturnValue -eq 0) {
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful"
} else {
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Failed"
}
} catch {
#Add Member to Object noting failed attempt
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$Obj | Add-Member -MemberType noteproperty -Name IDERPath -value $IDERPath
if(-not $gErrorText)
{
$gErrorText = $_.Exception.Message
}
$status = "Failed:" + $gErrorText
$Obj | Add-Member -MemberType noteproperty -Name Status -value $status
$imrResult = $global:imrLib.IDERCloseSession($clientId)
}
$Results += $Obj
}
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Failed" -Force
$Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message
$Results += $Obj
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA7Ll6Gha4Uy8VM
# p7VOe9oQB8njKydA4slQWmRnlb9loqCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgm/VNj5PFutjZfnh4
# o99if1f2WgezX+Lv9eGZK8cZ3nEwDQYJKoZIhvcNAQEBBQAEggGAFmConadB4eH3
# wz2V6icyvXFaF7P6WsnuPhiSfKM6QPr6fIHXJGXvNvDOEgOXpzd0GWecmqQClUZS
# u7UampM9aNEyqzFzaQdw19LB2lkF04wVS3tcku3Wr0jmAnNjBzHqwkKmvwyX63Zr
# FX0JPktJ0Y5Nh3/okiWN5clivor5TuPhyO9riGnxNfu00mjqzFIi0lA4NGcTUS7z
# 1sNt1QDQHqKjgyaVwKDm4byI3VOeA56iZK+rRJdQ9CMWl2J7hWKy4eYkvcDjRxHI
# iaor8QF30BzHnMfhdd2Hdk46piR5xYf+WFJQOJi5Mif6dSpN6CbFCOJ07h2NUDzo
# I84N/233nMze7TgbZ51F6O+d05Jsw6qr5TwgwD7lM6AZMCLsTMconCITIFoHlG5a
# G0+OQUB4fnFbT/l5cyf8zPAdYc4Dk2m/+Za5zgwLIGl50okUqdPQpWOCPfOKMjq7
# cRjCGFkKbDC9YxiTEKOU5cbmN/8nJVdPKuMni8b5a+oaTibLiw5DoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIOL2iLPnviQLCjy1UdTQ5S69MLNzUtSLecdG
# DVPc4hZwAhUAjswGJWV+/Gvrr3XQb24l4JinxysYDzIwMjExMDI3MTIxMzEzWqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMTAyNzEyMTMxM1owPwYJKoZIhvcNAQkEMTIEML0/mdefFnZx
# RFiwRbZyXmkPdih3hE4TBnOyIwIcvutSMuvXfCZu7WpGiBUxSTXSlTCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgAbxbTZiNd++lQOXipfHCfZVrPAEtBg7uLahLbacSq0x1E13MYc
# AtCAiQule7JyAZe8oaCH7BmS/utu0svzv/tjI1GJuYepPD/cIY4BKKCK71vPy3l+
# cO1qf1MVfi9Fpi7YeQWJ4Jiyf7py3wI3Qwz+09oEmO2jKzmtBOYsQ6UZDcUob7Zt
# zFEJ4XjPMJeVLWgZYhKb79saWNMBEFyXqNfGpFui5ZaGf/WsnhKOPmmkyyjTE7u1
# yRcqoXAVEwABS/+X58YRMcLBJJR/sYM4Lnqx9bOSRsHOxB+PV0Tp7k0TQaQtz3yz
# lzrs2M3lA1HRtWV2T8VQ5pynMnePPvnm7mVuSPJbHOzLDo9ibKcwdffE41ZFAQtX
# DgiEvDgcC21hYfk618Yk8kdGF0HxRQZQ1LqoXC/f6u4b2Ymmlooa0eUEU5X/70zT
# 3l2iTqkz55Crg/eD3TI0yk01QlghRZ7+OxCYYBaGWmOxBhfRz+UGrTl0D4otrGS/
# etWGPlaV0lnm8sJG6IJwS3ygXP9CFHbLtF3uHZmz7AM6qHMp0YwiRYvRYStndM3i
# wW/H2iYu11R3lt4cJfX6Zy7Sj75h98NufayQnQ8BxTeljO22LlblNWFl1GKka6GT
# JovfpxteZjcfYYY+6RDbOVSQlHeAv/dCe+GcAknmvRtrgEwaJsxyf1/XHw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_6_21.ps1
|
sample_6_21.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
<#
.Synopsis
Registers or unregisters the PowerShell ETW manifest
.Parameter Path
The fully qualified path to the PowerShell.Core.Instrumentation.man manifest file.
The default value is the location of this script.
.Parameter Unregister
Specify to unregister the manifest.
.Notes
The PowerShell.Core.Instrumentation.man and PowerShell.Core.Instrumentation.dll files are
expected to be at the location specified by the Path parameter.
When registered, PowerShell.Core.Instrumentation.dll is locked to prevent deleting or changing.
To update the binary, first unregister the manifest using the -Unregister switch.
#>
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[string] $Path = $PSScriptRoot,
[switch] $Unregister
)
Set-StrictMode -Version 3.0
$ErrorActionPreference = 'Stop'
function Start-NativeExecution([scriptblock]$sb, [switch]$IgnoreExitcode)
{
$backupEAP = $script:ErrorActionPreference
$script:ErrorActionPreference = "Continue"
try
{
& $sb
# note, if $sb doesn't have a native invocation, $LASTEXITCODE will
# point to the obsolete value
if ($LASTEXITCODE -ne 0 -and -not $IgnoreExitcode)
{
throw "Execution of {$sb} failed with exit code $LASTEXITCODE"
}
}
finally
{
$script:ErrorActionPreference = $backupEAP
}
}
function Test-Elevated
{
[CmdletBinding()]
[OutputType([bool])]
Param()
# if the current Powershell session was called with administrator privileges,
# the Administrator Group's well-known SID will show up in the Groups for the current identity.
# Note that the SID won't show up unless the process is elevated.
return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544")
}
$IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows
if (-not $IsWindowsOs)
{
throw 'This script must be run on Windows.'
}
if (-not (Test-Elevated))
{
throw 'This script must be run from an elevated process.'
}
$manifest = Get-Item -Path (Join-Path -Path $Path -ChildPath 'PowerShell.Core.Instrumentation.man')
$binary = Get-Item -Path (Join-Path -Path $Path -ChildPath 'PowerShell.Core.Instrumentation.dll')
$files = @($manifest, $binary)
foreach ($file in $files)
{
if (-not (Test-Path -Path $file))
{
throw "Could not find $($file.Name) at $Path"
}
}
[string] $command = 'wevtutil um "{0}"' -f $manifest.FullName
# Unregister if present. Avoids warnings when registering the manifest
# and it is already registered.
Write-Verbose "unregister the manifest, if present: $command"
Start-NativeExecution {Invoke-Expression $command} $true
if (-not $Unregister)
{
$command = 'wevtutil.exe im "{0}" /rf:"{1}" /mf:"{1}"' -f $manifest.FullName, $binary.FullName
Write-Verbose -Message "Register the manifest: $command"
Start-NativeExecution { Invoke-Expression $command }
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1/q5FJbWVjBBd
# zdmm1gMERAVvJK3uGRSGbK2+M2jUNKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDSC4uosoXy/3fIdnGqnAMwp
# HzMziQZzA2s4AVUXNqXFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAiPGq8gC2eG0BscurOQhLwC3nKVrRv6hbMBrVyaKgPy1eNOsKRkDhHzB/
# 63683d4hwwl9tZpVA5xysiQy4RlYwOiVVnRLvYy67Tk8LrMYpc/rwr6VAtVSXhRb
# JtdXpyUvUzPu4ov9Hw3YFTX613J1N3x7huvHsajt4QitxwptEKH1H7cpXOqtypYp
# nCwK4rI6EYSaj/HYlAC6jPQaCtZbfSgfnSZmg2c8z10MAXpuNQuBO89TQuq+g0ta
# s7s7QEHbe0Y2plCfu1TBoZdHVGpN9FVnHcjncZ2SyCePvHQt9jZwjtXBw3RJbunb
# vGTuSVjPOwqldghc/nj7bOL67ayBjaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBxkFIzH6RrVmo+Wk3Z6CHtowjhTWlCHhZxItlKXB+FkgIGZwe6tVW3
# GBMyMDI0MTAxNjE4MjcxOC40NTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rohpzAiGA8yMDI0MTAxNjExMjcz
# NVoYDzIwMjQxMDE3MTEyNzM1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDquiGn
# AgEAMAcCAQACAhfuMAcCAQACAhJaMAoCBQDqu3MnAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAInFKH7e2AhRwhglvJCEFr7IVSa7tPqRCxXkEMKaCt7hZMnO
# 7BzPnsuFtRUbTPYq4Qzvys0KeiKO3d5V+WvQdNwfq6ycUJp5nbWROt/rqwFyX47Q
# NahkPYZSNtR1s1D8yVdfEX+RT3Ic8OG6J+s5m6L1wj6zkq0J09S5WRZ8GE2qJKsm
# t2ObSArekDHiv1J6QB6UpKtcEJkIcB/CBVSMD0uqGI15pCk1RHcf7dsvcR3TnFeP
# UCUbYBzDTkq46OZuQSsKYF0sbhqARTy5G2iwWP/VzSHwvHr+HtSgIvEe650v1d4m
# KKF8jYKEGVLKPA8n1Gd0desBSjKqzny4S4vMghwxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCjnc+WkYHLJoeftCvxdr1vEyPR6JvVLNOkEIeiRpLVLDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgbf2JaAuMuXZ48ugWc5p6ioupbcJC
# IK9fwqqsGhuKT3IwDQYJKoZIhvcNAQELBQAEggIAYqVLS8STVeMDHb6/y76n8Bx/
# TZpg8NMOX2YtiLqDkbuzu27Jen4+y8TPkIljXop1soxs8FFsZu2zu/zQhuNQxlOc
# EYGI/ucGnmrXiK+dkM5QdNbDq9JWGs40zlqnhkfli0uGrQu/qIyYtqcNJXo4KVCw
# wXRo79FmIq78hckcka1Yp/Epmvebhxv5uGjgHGlLADpTBjoeR9zyXydTJFbxdcH+
# JU4WAWx9gpSGhU4s4H3lrmPdn7PYyAx0F4EUlJ++afPu0IZxinqS+mhfZvSiVNL9
# 0l/gaLUL1hx1dELRHg2qt0v3H+XVbExiN/vyMW6MYMeSuZiahm+rwqHahzufl2FC
# zOKrlk4y2r9D/Y+bxr9rn6LPdXFNR3Smiwg94AJFNTSEva3oVkDXBiWNCdqXH4aF
# MVkDk0ijfSCysgreRoeMUcIxCZUwTNAsiqovpSS+WjYUHb3fEBapbXCqdwq0oSHo
# cBJbbl9xN/vgQSw7X14gZjvHcSxT6iZ02DFOtuXwwZoGl5EwgZlHVQA9mK3qbRK8
# nt8wfQWFZ9HNb8/BUWWG95s/nZY4VnlOYNG+kB3uRvwp1w1p1q49sfgVkdxEOjAU
# b++dAfnrPh1gt96eqhD/2KoEn1ve4cnJItqYt93KB8wQR/LCKJUZg5BeYN3GEuYl
# tngQ/Qox9ZcpL4NxC8A=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_32_61.ps1
|
sample_32_61.ps1
|
using namespace System.Management.Automation
using namespace System.Management.Automation.Language
# This is an example profile for PSReadLine.
#
# This is roughly what I use so there is some emphasis on emacs bindings,
# but most of these bindings make sense in Windows mode as well.
Import-Module PSReadLine
Set-PSReadLineOption -EditMode Emacs
# Searching for commands with up/down arrow is really handy. The
# option "moves to end" is useful if you want the cursor at the end
# of the line while cycling through history like it does w/o searching,
# without that option, the cursor will remain at the position it was
# when you used up arrow, which can be useful if you forget the exact
# string you started the search on.
Set-PSReadLineOption -HistorySearchCursorMovesToEnd
Set-PSReadLineKeyHandler -Key UpArrow -Function HistorySearchBackward
Set-PSReadLineKeyHandler -Key DownArrow -Function HistorySearchForward
# This key handler shows the entire or filtered history using Out-GridView. The
# typed text is used as the substring pattern for filtering. A selected command
# is inserted to the command line without invoking. Multiple command selection
# is supported, e.g. selected by Ctrl + Click.
# As another example, the module 'F7History' does something similar but uses the
# console GUI instead of Out-GridView. Details about this module can be found at
# PowerShell Gallery: https://www.powershellgallery.com/packages/F7History.
Set-PSReadLineKeyHandler -Key F7 `
-BriefDescription History `
-LongDescription 'Show command history' `
-ScriptBlock {
$pattern = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$pattern, [ref]$null)
if ($pattern)
{
$pattern = [regex]::Escape($pattern)
}
$history = [System.Collections.ArrayList]@(
$last = ''
$lines = ''
foreach ($line in [System.IO.File]::ReadLines((Get-PSReadLineOption).HistorySavePath))
{
if ($line.EndsWith('`'))
{
$line = $line.Substring(0, $line.Length - 1)
$lines = if ($lines)
{
"$lines`n$line"
}
else
{
$line
}
continue
}
if ($lines)
{
$line = "$lines`n$line"
$lines = ''
}
if (($line -cne $last) -and (!$pattern -or ($line -match $pattern)))
{
$last = $line
$line
}
}
)
$history.Reverse()
$command = $history | Out-GridView -Title History -PassThru
if ($command)
{
[Microsoft.PowerShell.PSConsoleReadLine]::RevertLine()
[Microsoft.PowerShell.PSConsoleReadLine]::Insert(($command -join "`n"))
}
}
# This is an example of a macro that you might use to execute a command.
# This will add the command to history.
Set-PSReadLineKeyHandler -Key Ctrl+b `
-BriefDescription BuildCurrentDirectory `
-LongDescription "Build the current directory" `
-ScriptBlock {
[Microsoft.PowerShell.PSConsoleReadLine]::RevertLine()
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("msbuild")
[Microsoft.PowerShell.PSConsoleReadLine]::AcceptLine()
}
# In Emacs mode - Tab acts like in bash, but the Windows style completion
# is still useful sometimes, so bind some keys so we can do both
Set-PSReadLineKeyHandler -Key Ctrl+q -Function TabCompleteNext
Set-PSReadLineKeyHandler -Key Ctrl+Q -Function TabCompletePrevious
# Clipboard interaction is bound by default in Windows mode, but not Emacs mode.
Set-PSReadLineKeyHandler -Key Ctrl+C -Function Copy
Set-PSReadLineKeyHandler -Key Ctrl+v -Function Paste
# CaptureScreen is good for blog posts or email showing a transaction
# of what you did when asking for help or demonstrating a technique.
Set-PSReadLineKeyHandler -Chord 'Ctrl+d,Ctrl+c' -Function CaptureScreen
# The built-in word movement uses character delimiters, but token based word
# movement is also very useful - these are the bindings you'd use if you
# prefer the token based movements bound to the normal emacs word movement
# key bindings.
Set-PSReadLineKeyHandler -Key Alt+d -Function ShellKillWord
Set-PSReadLineKeyHandler -Key Alt+Backspace -Function ShellBackwardKillWord
Set-PSReadLineKeyHandler -Key Alt+b -Function ShellBackwardWord
Set-PSReadLineKeyHandler -Key Alt+f -Function ShellForwardWord
Set-PSReadLineKeyHandler -Key Alt+B -Function SelectShellBackwardWord
Set-PSReadLineKeyHandler -Key Alt+F -Function SelectShellForwardWord
#region Smart Insert/Delete
# The next four key handlers are designed to make entering matched quotes
# parens, and braces a nicer experience. I'd like to include functions
# in the module that do this, but this implementation still isn't as smart
# as ReSharper, so I'm just providing it as a sample.
Set-PSReadLineKeyHandler -Key '"',"'" `
-BriefDescription SmartInsertQuote `
-LongDescription "Insert paired quotes if not already on a quote" `
-ScriptBlock {
param($key, $arg)
$quote = $key.KeyChar
$selectionStart = $null
$selectionLength = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
# If text is selected, just quote it without any smarts
if ($selectionStart -ne -1)
{
[Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $quote + $line.SubString($selectionStart, $selectionLength) + $quote)
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2)
return
}
$ast = $null
$tokens = $null
$parseErrors = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$parseErrors, [ref]$null)
function FindToken
{
param($tokens, $cursor)
foreach ($token in $tokens)
{
if ($cursor -lt $token.Extent.StartOffset) { continue }
if ($cursor -lt $token.Extent.EndOffset) {
$result = $token
$token = $token -as [StringExpandableToken]
if ($token) {
$nested = FindToken $token.NestedTokens $cursor
if ($nested) { $result = $nested }
}
return $result
}
}
return $null
}
$token = FindToken $tokens $cursor
# If we're on or inside a **quoted** string token (so not generic), we need to be smarter
if ($token -is [StringToken] -and $token.Kind -ne [TokenKind]::Generic) {
# If we're at the start of the string, assume we're inserting a new string
if ($token.Extent.StartOffset -eq $cursor) {
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote ")
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1)
return
}
# If we're at the end of the string, move over the closing quote if present.
if ($token.Extent.EndOffset -eq ($cursor + 1) -and $line[$cursor] -eq $quote) {
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1)
return
}
}
if ($null -eq $token -or
$token.Kind -eq [TokenKind]::RParen -or $token.Kind -eq [TokenKind]::RCurly -or $token.Kind -eq [TokenKind]::RBracket) {
if ($line[0..$cursor].Where{$_ -eq $quote}.Count % 2 -eq 1) {
# Odd number of quotes before the cursor, insert a single quote
[Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote)
}
else {
# Insert matching quotes, move cursor to be in between the quotes
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote")
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1)
}
return
}
# If cursor is at the start of a token, enclose it in quotes.
if ($token.Extent.StartOffset -eq $cursor) {
if ($token.Kind -eq [TokenKind]::Generic -or $token.Kind -eq [TokenKind]::Identifier -or
$token.Kind -eq [TokenKind]::Variable -or $token.TokenFlags.hasFlag([TokenFlags]::Keyword)) {
$end = $token.Extent.EndOffset
$len = $end - $cursor
[Microsoft.PowerShell.PSConsoleReadLine]::Replace($cursor, $len, $quote + $line.SubString($cursor, $len) + $quote)
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($end + 2)
return
}
}
# We failed to be smart, so just insert a single quote
[Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote)
}
Set-PSReadLineKeyHandler -Key '(','{','[' `
-BriefDescription InsertPairedBraces `
-LongDescription "Insert matching braces" `
-ScriptBlock {
param($key, $arg)
$closeChar = switch ($key.KeyChar)
{
<#case#> '(' { [char]')'; break }
<#case#> '{' { [char]'}'; break }
<#case#> '[' { [char]']'; break }
}
$selectionStart = $null
$selectionLength = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
if ($selectionStart -ne -1)
{
# Text is selected, wrap it in brackets
[Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $key.KeyChar + $line.SubString($selectionStart, $selectionLength) + $closeChar)
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2)
} else {
# No text is selected, insert a pair
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)$closeChar")
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1)
}
}
Set-PSReadLineKeyHandler -Key ')',']','}' `
-BriefDescription SmartCloseBraces `
-LongDescription "Insert closing brace or skip" `
-ScriptBlock {
param($key, $arg)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
if ($line[$cursor] -eq $key.KeyChar)
{
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1)
}
else
{
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)")
}
}
Set-PSReadLineKeyHandler -Key Backspace `
-BriefDescription SmartBackspace `
-LongDescription "Delete previous character or matching quotes/parens/braces" `
-ScriptBlock {
param($key, $arg)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
if ($cursor -gt 0)
{
$toMatch = $null
if ($cursor -lt $line.Length)
{
switch ($line[$cursor])
{
<#case#> '"' { $toMatch = '"'; break }
<#case#> "'" { $toMatch = "'"; break }
<#case#> ')' { $toMatch = '('; break }
<#case#> ']' { $toMatch = '['; break }
<#case#> '}' { $toMatch = '{'; break }
}
}
if ($toMatch -ne $null -and $line[$cursor-1] -eq $toMatch)
{
[Microsoft.PowerShell.PSConsoleReadLine]::Delete($cursor - 1, 2)
}
else
{
[Microsoft.PowerShell.PSConsoleReadLine]::BackwardDeleteChar($key, $arg)
}
}
}
#endregion Smart Insert/Delete
# Sometimes you enter a command but realize you forgot to do something else first.
# This binding will let you save that command in the history so you can recall it,
# but it doesn't actually execute. It also clears the line with RevertLine so the
# undo stack is reset - though redo will still reconstruct the command line.
Set-PSReadLineKeyHandler -Key Alt+w `
-BriefDescription SaveInHistory `
-LongDescription "Save current line in history but do not execute" `
-ScriptBlock {
param($key, $arg)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
[Microsoft.PowerShell.PSConsoleReadLine]::AddToHistory($line)
[Microsoft.PowerShell.PSConsoleReadLine]::RevertLine()
}
# Insert text from the clipboard as a here string
Set-PSReadLineKeyHandler -Key Ctrl+V `
-BriefDescription PasteAsHereString `
-LongDescription "Paste the clipboard text as a here string" `
-ScriptBlock {
param($key, $arg)
Add-Type -Assembly PresentationCore
if ([System.Windows.Clipboard]::ContainsText())
{
# Get clipboard text - remove trailing spaces, convert \r\n to \n, and remove the final \n.
$text = ([System.Windows.Clipboard]::GetText() -replace "\p{Zs}*`r?`n","`n").TrimEnd()
[Microsoft.PowerShell.PSConsoleReadLine]::Insert("@'`n$text`n'@")
}
else
{
[Microsoft.PowerShell.PSConsoleReadLine]::Ding()
}
}
# Sometimes you want to get a property of invoke a member on what you've entered so far
# but you need parens to do that. This binding will help by putting parens around the current selection,
# or if nothing is selected, the whole line.
Set-PSReadLineKeyHandler -Key 'Alt+(' `
-BriefDescription ParenthesizeSelection `
-LongDescription "Put parenthesis around the selection or entire line and move the cursor to after the closing parenthesis" `
-ScriptBlock {
param($key, $arg)
$selectionStart = $null
$selectionLength = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
if ($selectionStart -ne -1)
{
[Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, '(' + $line.SubString($selectionStart, $selectionLength) + ')')
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2)
}
else
{
[Microsoft.PowerShell.PSConsoleReadLine]::Replace(0, $line.Length, '(' + $line + ')')
[Microsoft.PowerShell.PSConsoleReadLine]::EndOfLine()
}
}
# Each time you press Alt+', this key handler will change the token
# under or before the cursor. It will cycle through single quotes, double quotes, or
# no quotes each time it is invoked.
Set-PSReadLineKeyHandler -Key "Alt+'" `
-BriefDescription ToggleQuoteArgument `
-LongDescription "Toggle quotes on the argument under the cursor" `
-ScriptBlock {
param($key, $arg)
$ast = $null
$tokens = $null
$errors = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor)
$tokenToChange = $null
foreach ($token in $tokens)
{
$extent = $token.Extent
if ($extent.StartOffset -le $cursor -and $extent.EndOffset -ge $cursor)
{
$tokenToChange = $token
# If the cursor is at the end (it's really 1 past the end) of the previous token,
# we only want to change the previous token if there is no token under the cursor
if ($extent.EndOffset -eq $cursor -and $foreach.MoveNext())
{
$nextToken = $foreach.Current
if ($nextToken.Extent.StartOffset -eq $cursor)
{
$tokenToChange = $nextToken
}
}
break
}
}
if ($tokenToChange -ne $null)
{
$extent = $tokenToChange.Extent
$tokenText = $extent.Text
if ($tokenText[0] -eq '"' -and $tokenText[-1] -eq '"')
{
# Switch to no quotes
$replacement = $tokenText.Substring(1, $tokenText.Length - 2)
}
elseif ($tokenText[0] -eq "'" -and $tokenText[-1] -eq "'")
{
# Switch to double quotes
$replacement = '"' + $tokenText.Substring(1, $tokenText.Length - 2) + '"'
}
else
{
# Add single quotes
$replacement = "'" + $tokenText + "'"
}
[Microsoft.PowerShell.PSConsoleReadLine]::Replace(
$extent.StartOffset,
$tokenText.Length,
$replacement)
}
}
# This example will replace any aliases on the command line with the resolved commands.
Set-PSReadLineKeyHandler -Key "Alt+%" `
-BriefDescription ExpandAliases `
-LongDescription "Replace all aliases with the full command" `
-ScriptBlock {
param($key, $arg)
$ast = $null
$tokens = $null
$errors = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor)
$startAdjustment = 0
foreach ($token in $tokens)
{
if ($token.TokenFlags -band [TokenFlags]::CommandName)
{
$alias = $ExecutionContext.InvokeCommand.GetCommand($token.Extent.Text, 'Alias')
if ($alias -ne $null)
{
$resolvedCommand = $alias.ResolvedCommandName
if ($resolvedCommand -ne $null)
{
$extent = $token.Extent
$length = $extent.EndOffset - $extent.StartOffset
[Microsoft.PowerShell.PSConsoleReadLine]::Replace(
$extent.StartOffset + $startAdjustment,
$length,
$resolvedCommand)
# Our copy of the tokens won't have been updated, so we need to
# adjust by the difference in length
$startAdjustment += ($resolvedCommand.Length - $length)
}
}
}
}
}
# F1 for help on the command line - naturally
Set-PSReadLineKeyHandler -Key F1 `
-BriefDescription CommandHelp `
-LongDescription "Open the help window for the current command" `
-ScriptBlock {
param($key, $arg)
$ast = $null
$tokens = $null
$errors = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor)
$commandAst = $ast.FindAll( {
$node = $args[0]
$node -is [CommandAst] -and
$node.Extent.StartOffset -le $cursor -and
$node.Extent.EndOffset -ge $cursor
}, $true) | Select-Object -Last 1
if ($commandAst -ne $null)
{
$commandName = $commandAst.GetCommandName()
if ($commandName -ne $null)
{
$command = $ExecutionContext.InvokeCommand.GetCommand($commandName, 'All')
if ($command -is [AliasInfo])
{
$commandName = $command.ResolvedCommandName
}
if ($commandName -ne $null)
{
Get-Help $commandName -ShowWindow
}
}
}
}
#
# Ctrl+Shift+j then type a key to mark the current directory.
# Ctrj+j then the same key will change back to that directory without
# needing to type cd and won't change the command line.
#
$global:PSReadLineMarks = @{}
Set-PSReadLineKeyHandler -Key Ctrl+J `
-BriefDescription MarkDirectory `
-LongDescription "Mark the current directory" `
-ScriptBlock {
param($key, $arg)
$key = [Console]::ReadKey($true)
$global:PSReadLineMarks[$key.KeyChar] = $pwd
}
Set-PSReadLineKeyHandler -Key Ctrl+j `
-BriefDescription JumpDirectory `
-LongDescription "Goto the marked directory" `
-ScriptBlock {
param($key, $arg)
$key = [Console]::ReadKey()
$dir = $global:PSReadLineMarks[$key.KeyChar]
if ($dir)
{
cd $dir
[Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt()
}
}
Set-PSReadLineKeyHandler -Key Alt+j `
-BriefDescription ShowDirectoryMarks `
-LongDescription "Show the currently marked directories" `
-ScriptBlock {
param($key, $arg)
$global:PSReadLineMarks.GetEnumerator() | % {
[PSCustomObject]@{Key = $_.Key; Dir = $_.Value} } |
Format-Table -AutoSize | Out-Host
[Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt()
}
# Auto correct 'git cmt' to 'git commit'
Set-PSReadLineOption -CommandValidationHandler {
param([CommandAst]$CommandAst)
switch ($CommandAst.GetCommandName())
{
'git' {
$gitCmd = $CommandAst.CommandElements[1].Extent
switch ($gitCmd.Text)
{
'cmt' {
[Microsoft.PowerShell.PSConsoleReadLine]::Replace(
$gitCmd.StartOffset, $gitCmd.EndOffset - $gitCmd.StartOffset, 'commit')
}
}
}
}
}
# `ForwardChar` accepts the entire suggestion text when the cursor is at the end of the line.
# This custom binding makes `RightArrow` behave similarly - accepting the next word instead of the entire suggestion text.
Set-PSReadLineKeyHandler -Key RightArrow `
-BriefDescription ForwardCharAndAcceptNextSuggestionWord `
-LongDescription "Move cursor one character to the right in the current editing line and accept the next word in suggestion when it's at the end of current editing line" `
-ScriptBlock {
param($key, $arg)
$line = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor)
if ($cursor -lt $line.Length) {
[Microsoft.PowerShell.PSConsoleReadLine]::ForwardChar($key, $arg)
} else {
[Microsoft.PowerShell.PSConsoleReadLine]::AcceptNextSuggestionWord($key, $arg)
}
}
# Cycle through arguments on current line and select the text. This makes it easier to quickly change the argument if re-running a previously run command from the history
# or if using a psreadline predictor. You can also use a digit argument to specify which argument you want to select, i.e. Alt+1, Alt+a selects the first argument
# on the command line.
Set-PSReadLineKeyHandler -Key Alt+a `
-BriefDescription SelectCommandArguments `
-LongDescription "Set current selection to next command argument in the command line. Use of digit argument selects argument by position" `
-ScriptBlock {
param($key, $arg)
$ast = $null
$cursor = $null
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$null, [ref]$null, [ref]$cursor)
$asts = $ast.FindAll( {
$args[0] -is [System.Management.Automation.Language.ExpressionAst] -and
$args[0].Parent -is [System.Management.Automation.Language.CommandAst] -and
$args[0].Extent.StartOffset -ne $args[0].Parent.Extent.StartOffset
}, $true)
if ($asts.Count -eq 0) {
[Microsoft.PowerShell.PSConsoleReadLine]::Ding()
return
}
$nextAst = $null
if ($null -ne $arg) {
$nextAst = $asts[$arg - 1]
}
else {
foreach ($ast in $asts) {
if ($ast.Extent.StartOffset -ge $cursor) {
$nextAst = $ast
break
}
}
if ($null -eq $nextAst) {
$nextAst = $asts[0]
}
}
$startOffsetAdjustment = 0
$endOffsetAdjustment = 0
if ($nextAst -is [System.Management.Automation.Language.StringConstantExpressionAst] -and
$nextAst.StringConstantType -ne [System.Management.Automation.Language.StringConstantType]::BareWord) {
$startOffsetAdjustment = 1
$endOffsetAdjustment = 2
}
[Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($nextAst.Extent.StartOffset + $startOffsetAdjustment)
[Microsoft.PowerShell.PSConsoleReadLine]::SetMark($null, $null)
[Microsoft.PowerShell.PSConsoleReadLine]::SelectForwardChar($null, ($nextAst.Extent.EndOffset - $nextAst.Extent.StartOffset) - $endOffsetAdjustment)
}
# Allow you to type a Unicode code point, then pressing `Alt+x` to transform it into a Unicode char.
Set-PSReadLineKeyHandler -Chord 'Alt+x' `
-BriefDescription ToUnicodeChar `
-LongDescription "Transform Unicode code point into a UTF-16 encoded string" `
-ScriptBlock {
$buffer = $null
$cursor = 0
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref] $buffer, [ref] $cursor)
if ($cursor -lt 4) {
return
}
$number = 0
$isNumber = [int]::TryParse(
$buffer.Substring($cursor - 4, 4),
[System.Globalization.NumberStyles]::AllowHexSpecifier,
$null,
[ref] $number)
if (-not $isNumber) {
return
}
try {
$unicode = [char]::ConvertFromUtf32($number)
} catch {
return
}
[Microsoft.PowerShell.PSConsoleReadLine]::Delete($cursor - 4, 4)
[Microsoft.PowerShell.PSConsoleReadLine]::Insert($unicode)
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/mLdabV+7XZgm
# mrYn8AAdqkXN6TLai6zJSbrzk1wHn6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICazxFrPsF4exXFcFtywFigB
# B4oxmjwvi7XZnlwWiQh8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAbWyut9b50iBjzJpjbteMpK4BOMFkU+4Q72EQqWFwtOqx5s2DjJmtQins
# Y0Hu8BK9V7qpqDBXG81P/85whNX05EKjtIInLGwVdNf7vIwKbvRtOAeSeEleso+c
# o837IdbhKPrZZe/HwZUqhcJKEe5+ISl4Rr9XH2d3o8HTvprT3Ov6uZfUembnrXxi
# DCnQG8CZFgNddiDYTZ5c/cG7kSrx350nJS3myyh78A36/sQ0ILOI5l4+nNnh/zvY
# G1H+YkoDEuQIR7X/sV8vmnnLXzGnfiyyHsEehaG1Cq03MmyJsDupvTLMwtrN21rs
# oxKIgms7wmGy/rrkt8sIX1ePZjO+YqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAgEoNWuCLEWO5JvwE4ak71pyqQc28smE8Bjx0l4cV9ZQIGZfxoMTO3
# GBMyMDI0MDQxNjIxMDgzMy41MThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnJKqQwIhgPMjAyNDA0MTcwMDQ5NDBaGA8yMDI0MDQxODAwNDk0MFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6ckqpAIBADAHAgEAAgIW/DAHAgEAAgISLTAKAgUA
# 6cp8JAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKihThMLTFhb+rNb3IYI
# 9nlZzDt1RDbJjPsK71RS5cNi4NHY6RC6YqEGUK0FHo5uT6mp552KhzemoucBFbSr
# Px714INzdkboxUPVhxxbTZncEd9X9JJqbk5JhyBfAgpaze1pXhHkITKb2SqaDxJo
# 9sGlDHW+nJTDotJg1uxyQpsxMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgyDV3d5ObnM2xW1UXGEq8bUzgHaUnQTtLU/ghdxfEMAEwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d
# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I
# npafKEQ9AAEAAAHeMCIEIOVc2GbpPD8hvoX7a60MwcQ/Qk9iM/6EMR6LyhAaXPqm
# MA0GCSqGSIb3DQEBCwUABIICAJ/vV7QbjrZdKMiX/Mx9ahMgr9RbW4pAPhChoDrc
# qxcN4/KT8w2CUslwKk4vNQ2Ji3R/PnCh4l/JMNLr8HCpdiQCWxD5F3QE0CodjHO6
# IZU1EJ+nXUTgOh8FeISsAaeIeTZzwp5UJRSpcmxEn6ijuwy48Nc8pSdwfaAs+4o/
# UiHkOeExbJZLrag8+NP9BTlyH0M0AbDl6tCD9ky46jJ1SQHZL+92rADK8F7z7Js6
# ZlLQqx8j59n1ykYHugysCosIZ1SG4WATzN2Ll7y+j2HtFPHE4xJmayhDKgsJ7NCB
# 4v+1XUQr7KR1fHPKQJ0OgeJJPNrBhwR6hJZZB0biEIJ0ws3b31RZw5cPb6O9r919
# 7jcH5DGt6mKG4Sps0le998N0qRy408Hq2/9gA6I/wiP4wqsQdRBfduLOHZYNtN1r
# WU7SPwiT6Cy1ojxelV/zHMo9iYSPAhUGujqlmu80o9e4By3qq5XUvszH21nu94Mq
# 1LVrKdzUgYaFE//SmhjQ92e+6KVQtSk0eNcFFVypmCEwwJfJ6C/9Sj7KXWLHjaao
# SQYFdjlgZ1/FPVaaBiPaoKsPvx2MhtSqfIlD95jBELpFqBGKR/qwMENZGxBdgXDZ
# WaaIIK1VnNckuRc+3URJpki5XPWa3KuucUYkCJiJSqQOlZdiWNKD60+yX0N/V8b/
# yI/J
# SIG # End signature block
|
combined_dataset/train/non-malicious/3681.ps1
|
3681.ps1
|
function Test-TriggerCrud
{
$ResourceGroupName = getAssetName
try{
$AccountName = getAssetName
$SubName = getAssetName
$TriggerName = getAssetName
$RecurrenceInterval = "hour"
$SynchronizationTime = "06/19/2019 22:53:33"
$newTrigger = New-AzDataShareTrigger -ResourceGroupName $ResourceGroupName -AccountName $AccountName -ShareSubscriptionName $SubName -RecurrenceInterval $RecurrenceInterval -SynchronizationTime $SynchronizationTime -Name $TriggerName
Assert-NotNull $newTrigger
Assert-AreEqual $newTrigger.Name $TriggerName
Assert-AreEqual $newTrigger.ProvisioningState "Succeeded"
$gottenTrigger = Get-AzDataShareTrigger -ResourceGroupName $ResourceGroupName -AccountName $AccountName -ShareSubscriptionName $SubName
Assert-NotNull $newTrigger
Assert-AreEqual $newTrigger.Name $TriggerName
Assert-AreEqual $newTrigger.ProvisioningState "Succeeded"
$gottenTrigger = Get-AzDataShareTrigger -ResourceGroupName $ResourceGroupName -AccountName $AccountName -ShareSubscriptionName $SubName -Name $TriggerName
Assert-NotNull $newTrigger
Assert-AreEqual $newTrigger.Name $TriggerName
Assert-AreEqual $newTrigger.ProvisioningState "Succeeded"
$gottenTrigger = Get-AzDataShareTrigger -ResourceId $gottenTrigger.Id
Assert-NotNull $newTrigger
Assert-AreEqual $newTrigger.Name $TriggerName
Assert-AreEqual $newTrigger.ProvisioningState "Succeeded"
$removedTrigger = Remove-AzDataShareTrigger -InputObject $gottenTrigger
}
finally
{
Remove-AzResourceGroup -Name $resourceGroup -Force
}
}
|
combined_dataset/train/non-malicious/sample_54_3.ps1
|
sample_54_3.ps1
|
#
# Module manifest for module 'OCI.PSModules.Monitoring'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Monitoring.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'bb8a391d-e2cd-45ce-b0df-4636cbbb16a4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Monitoring Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Monitoring.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIMonitoringAlarm', 'Get-OCIMonitoringAlarmHistory',
'Get-OCIMonitoringAlarmsList', 'Get-OCIMonitoringAlarmsStatusList',
'Get-OCIMonitoringAlarmSuppression',
'Get-OCIMonitoringAlarmSuppressionsList',
'Get-OCIMonitoringMetricsList',
'Invoke-OCIMonitoringRetrieveDimensionStates',
'Invoke-OCIMonitoringSummarizeAlarmSuppressionHistory',
'Invoke-OCIMonitoringSummarizeMetricsData',
'Move-OCIMonitoringAlarmCompartment', 'New-OCIMonitoringAlarm',
'New-OCIMonitoringAlarmSuppression', 'Remove-OCIMonitoringAlarm',
'Remove-OCIMonitoringAlarmSuppression',
'Submit-OCIMonitoringMetricData', 'Update-OCIMonitoringAlarm'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Monitoring'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_31_14.ps1
|
sample_31_14.ps1
|
#
# Module manifest for module 'OCI.PSModules.Recovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Recovery.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Recovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase',
'Get-OCIRecoveryProtectedDatabasesList',
'Get-OCIRecoveryProtectionPoliciesList',
'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet',
'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest',
'Get-OCIRecoveryWorkRequestErrorsList',
'Get-OCIRecoveryWorkRequestLogsList',
'Get-OCIRecoveryWorkRequestsList',
'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration',
'Move-OCIRecoveryProtectedDatabaseCompartment',
'Move-OCIRecoveryProtectionPolicyCompartment',
'Move-OCIRecoveryServiceSubnetCompartment',
'New-OCIRecoveryProtectedDatabase',
'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet',
'Remove-OCIRecoveryProtectedDatabase',
'Remove-OCIRecoveryProtectionPolicy',
'Remove-OCIRecoveryServiceSubnet',
'Update-OCIRecoveryProtectedDatabase',
'Update-OCIRecoveryProtectionPolicy',
'Update-OCIRecoveryServiceSubnet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_54_60.ps1
|
sample_54_60.ps1
|
#
# Module manifest for module 'OCI.PSModules.Clusterplacementgroups'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Clusterplacementgroups.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6f928c67-e221-4d6b-8353-9cd39e4754c1'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Clusterplacementgroups Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Clusterplacementgroups.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIClusterplacementgroupsClusterPlacementGroup',
'Get-OCIClusterplacementgroupsClusterPlacementGroup',
'Get-OCIClusterplacementgroupsList',
'Get-OCIClusterplacementgroupsWorkRequest',
'Get-OCIClusterplacementgroupsWorkRequestErrorsList',
'Get-OCIClusterplacementgroupsWorkRequestLogsList',
'Get-OCIClusterplacementgroupsWorkRequestsList',
'Invoke-OCIClusterplacementgroupsDeactivateClusterPlacementGroup',
'Move-OCIClusterplacementgroupsClusterPlacementGroupCompartment',
'New-OCIClusterplacementgroupsClusterPlacementGroup',
'Remove-OCIClusterplacementgroupsClusterPlacementGroup',
'Stop-OCIClusterplacementgroupsWorkRequest',
'Update-OCIClusterplacementgroupsClusterPlacementGroup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Clusterplacementgroups'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_31_46.ps1
|
sample_31_46.ps1
|
ConvertFrom-StringData @'
IPAddressDisplayNameFormat=IP Address: {0}
NetworkNameDisplayNameFormat=Name: {0}
NetworkNameOfflineDisplayNameFormat=IP Address: Address on "{0}"
CreateClusterProgressValidationStart=Validating servers suitability for a failover cluster.
CreateClusterProgressValidationEnd=Done validating servers suitability for a failover cluster.
CreateClusterProgressCreationStartFormat=Creating failover cluster "{0}".
CreateClusterProgressCreationEndFormat=Done creating failover cluster "{0}".
AddNodesProgressValidationStart=Validating the new servers suitability for a failover cluster.
AddNodesProgressValidationEnd=Done validating the new servers suitability for a failover cluster.
AddNodesProgressAdditionStartFormat=Adding nodes to failover cluster "{0}".
AddNodesProgressAdditionEndFormat=Done adding nodes to failover cluster "{0}".
'@
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCBVY14DINvfTYf
# kuhejp/+3PXRhR16LH5VWYBK56RVaKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKak
# jZrS56UWsV9p0zZFTGMUkg2GXzxIj49WXXynh4dUMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAxtw6KTG0U6GZigPsTlxNcPqUH9QU/GeLHQsP
# ewf+tfVrYbd+o6PM2/FvD+a2iCfj7F/K2+cHRdi6CoY/vy4r4igRRJNuyGS/47MG
# mJqlKXxGQuDN8ICOXREPA8Xxs/4BF1oTIvhIL2j3RX6ctOfWxWnExfGGz0aRRaeU
# 8Bj4RdqnxJvR5tpjmUWdZM5fAZ/EpP75NWm9PYlNUO3VwpGxf42lcffqMrkKQD91
# LpT+7sKStatO28gEc+7P+M5Ne0FqZrkIe/szcp/LL3XijBKiES+KQhvdhCWtl8Y2
# K/nQS8qIwYxHTIWCjOr19FADGngeezMAoi85pyPORGAtT4gp76GCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDW/K1UYvF03LfcMCiE5IF72l7cVpVJ16/G
# ldSZFjxOmAIGZbqiB1CMGBIyMDI0MDIyMDA3MjE1MS40MVowBIACAfSggdikgdUw
# gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd
# VGhhbGVzIFRTUyBFU046ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAd1dVx2V
# 1K2qGwABAAAB3TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDAeFw0yMzEwMTIxOTA3MDlaFw0yNTAxMTAxOTA3MDlaMIHSMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv
# ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU
# U1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T
# dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqE4D
# lETqLnecdREfiWd8oun70m+Km5O1y1qKsLExRKs9LLkJYrYO2uJA/5PnYdds3aDs
# CS1DWlBltMMYXMrp3Te9hg2sI+4kr49Gw/YU9UOMFfLmastEXMgcctqIBqhsTm8U
# m6jFnRlZ0owKzxpyOEdSZ9pj7v38JHu434Hj7GMmrC92lT+anSYCrd5qvIf4Aqa/
# qWStA3zOCtxsKAfCyq++pPqUQWpimLu4qfswBhtJ4t7Skx1q1XkRbo1Wdcxg5NEq
# 4Y9/J8Ep1KG5qUujzyQbupraZsDmXvv5fTokB6wySjJivj/0KAMWMdSlwdI4O6OU
# UEoyLXrzNF0t6t2lbRsFf0QO7HbMEwxoQrw3LFrAIS4Crv77uS0UBuXeFQq27NgL
# UVRm5SXYGrpTXtLgIqypHeK0tP2o1xvakAniOsgN2WXlOCip5/mCm/5hy8Ezzfht
# cU3DK13e6MMPbg/0N3zF9Um+6aOwFBCQrlP+rLcetAny53WcdK+0VWLlJr+5sa5g
# SlLyAXoYNY3n8pu94WR2yhNUg+jymRaGM+zRDucDn64HFAHjOWMSMrPlZbsEDjCm
# YWbbh+EGZGNXg1un6fvxyACO8NJ9OUDoNgFy/aTHUkfZ0iFpGdJ45d49PqEwXQiX
# n3wsy7SvDflWJRZwBCRQ1RPFGeoYXHPnD5m6wwMCAwEAAaOCAUkwggFFMB0GA1Ud
# DgQWBBRuovW2jI9R2kXLIdIMpaPQjiXD8TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0
# 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB
# /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC
# AgEALlTZsg0uBcgdZsxypW5/2ORRP8rzPIsG+7mHwmuphHbP95o7bKjU6hz1KHK/
# Ft70ZkO7uSRTPFLInUhmSxlnDoUOrrJk1Pc8SMASdESlEEvxL6ZteD47hUtLQtKZ
# vxchmIuxqpnR8MRy/cd4D7/L+oqcJBaReCGloQzAYxDNGSEbBwZ1evXMalDsdPG9
# +7nvEXFlfUyQqdYUQ0nq6t37i15SBePSeAg7H/+Xdcwrce3xPb7O8Yk0AX7n/moG
# TuevTv3MgJsVe/G2J003l6hd1b72sAiRL5QYPX0Bl0Gu23p1n450Cq4GIORhDmRV
# 9QwpLfXIdA4aCYXG4I7NOlYdqWuql0iWWzLwo2yPlT2w42JYB3082XIQcdtBkOaL
# 38E2U5jJO3Rh6EtsOi+ZlQ1rOTv0538D3XuaoJ1OqsTHAEZQ9sw/7+91hSpomym6
# kGdS2M5//voMCFXLx797rNH3w+SmWaWI7ZusvdDesPr5kJV2sYz1GbqFQMEGS9iH
# 5iOYZ1xDkcHpZP1F5zz6oMeZuEuFfhl1pqt3n85d4tuDHZ/svhBBCPcqCqOoM5Yi
# dWE0TWBi1NYsd7jzzZ3+Tsu6LQrWDwRmsoPuZo6uwkso8qV6Bx4n0UKpjWwNQpSF
# FrQQdRb5mQouWiEqtLsXCN2sg1aQ8GBtDOcKN0TabjtCNNswggdxMIIFWaADAgEC
# AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg
# Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa
# Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V
# gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
# RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X
# D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP
# z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+
# tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas
# AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b
# fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv
# XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg
# 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF
# a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP
# nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw
# IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
# pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB
# MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv
# Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC
# NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w
# HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg
# R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj
# Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF
# BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D
# ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs
# H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk
# wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
# btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg
# vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId
# w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2
# zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K
# jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu
# yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/
# tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm
# jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj
# U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHS
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN
# aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo
# YWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQg
# VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQA2I0cZZds1oM/GfKIN
# sQ5yJKMWEKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G
# CSqGSIb3DQEBBQUAAgUA6X4sDTAiGA8yMDI0MDIyMDAzMzU0MVoYDzIwMjQwMjIx
# MDMzNTQxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpfiwNAgEAMAcCAQACAhE+
# MAcCAQACAhFvMAoCBQDpf32NAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# o8fEYnlK7tVku/cFrmIiPZOJErUSSe6mjfpUmFQCN1CoN9ZGKz2YS+jGt2cSBuqQ
# 3yS+2HRsqxOPIdkhdTrJMu2Gsxxd5U2RPegZf3AjZvWmv1GmC+E2vlGx80IGAVOS
# 9T92c3hs9cZLIXfJfxz708vzkdNAl+PhzEcoapNy0XMxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB
# 3TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDPYQQVZ9LjUcJI0Zf8U73KyJq6guLi+jWqxQqSFIRw
# XTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTft
# QI3TaVHFj5GI43rAMWNmMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wIgQgRcqb2ls/6WmH1X6CLAKHvsLd
# ChIHkMBVR7OLigD9TUowDQYJKoZIhvcNAQELBQAEggIAOP7Mzg8HJqrI3DbIQyP9
# BYo/5hwpKSVz2i5pVA4K7R5peuN71FKFNV9bk8vrVpEWxNK5euzmIdUCcbRc5Lzh
# fd3DdggsrwQlG2wTEBHX3ZvCHcmkNQa1q1B+6XSEZrYETicWVD3YHv7RypcKM1Hb
# xcWzJmpu7fWOiE5zks2MX5D27Pk9CPSDCmS8C22qVgUiAd856uvjavaNysPEcMTL
# AO6CY4hPA2MG8uH28xNfZEf8PUb6bB97GlETpg/jOosMfLzVE9LBrBz9s4W7quQR
# rLinHWfqfoFkMrrsW812r9XGdynQ5zQQD/fc/ZBWxxNAqwtqfxgEhCSNYk41rRFl
# LArEaCX+KpfMYpkyL40aFPDUvRdvE+jt8Uy1C0ruydb0XsQH2ZoX/Mx6sqeySKCx
# SUU98ThNaB8ennwC3zsAVfoWkZjHkWY5JbyCy/QAPI3rZQ6B9FRGKmi785zwZvl0
# gDDoU28ZbuE2H/YwH/yXA9JQGM0iSpBfN5bCZnFEBSK+aw3y7oY2ARq9lA7PQWSm
# 8KkkuA83rPZUfQ69amyfbZgx7np3U6ZMad3/IB84Pi50H+tu2wSTeg/I3CDsoIUw
# 4LbztmjZ5/33bWVcdgx5j/tRr8t1+jDygEUC3eM4HocBOS7RfmytDRHaEspSdgIa
# YVA7Y6WLmkXM4b7stIgM+1w=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_41_87.ps1
|
sample_41_87.ps1
|
#
# Module manifest for module 'OCI.PSModules.Waf'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Waf.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e0acce48-3280-4a26-9a26-931bf7028140'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Waf Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waf.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWafNetworkAddressList', 'Get-OCIWafNetworkAddressListsList',
'Get-OCIWafProtectionCapabilitiesList',
'Get-OCIWafProtectionCapabilityGroupTagsList',
'Get-OCIWafWebAppFirewall', 'Get-OCIWafWebAppFirewallPoliciesList',
'Get-OCIWafWebAppFirewallPolicy', 'Get-OCIWafWebAppFirewallsList',
'Get-OCIWafWorkRequest', 'Get-OCIWafWorkRequestErrorsList',
'Get-OCIWafWorkRequestLogsList', 'Get-OCIWafWorkRequestsList',
'Move-OCIWafNetworkAddressListCompartment',
'Move-OCIWafWebAppFirewallCompartment',
'Move-OCIWafWebAppFirewallPolicyCompartment',
'New-OCIWafNetworkAddressList', 'New-OCIWafWebAppFirewall',
'New-OCIWafWebAppFirewallPolicy', 'Remove-OCIWafNetworkAddressList',
'Remove-OCIWafWebAppFirewall', 'Remove-OCIWafWebAppFirewallPolicy',
'Update-OCIWafNetworkAddressList', 'Update-OCIWafWebAppFirewall',
'Update-OCIWafWebAppFirewallPolicy'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waf'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Set-Domain.ps1
|
Set-Domain.ps1
|
function Set-Domain {
param( [switch]$help,
[string]$domain=$(read-host "Please specify the domain to join"),
[System.Management.Automation.PSCredential]$credential = $(Get-Credential)
)
$usage = "`$cred = get-credential `n"
$usage += "Set-AvaDomain -domain corp.avanade.org -credential `$cred`n"
if ($help) {Write-Host $usage;exit}
$username = $credential.GetNetworkCredential().UserName
$password = $credential.GetNetworkCredential().Password
$computer = Get-WmiObject Win32_ComputerSystem
$computer.JoinDomainOrWorkGroup($domain ,$password, $username, $null, 3)
}
|
combined_dataset/train/non-malicious/sample_40_36.ps1
|
sample_40_36.ps1
|
# --------------------------------------------------------------
# Copyright � Microsoft Corporation. All Rights Reserved.
# Microsoft Corporation (or based on where you live, one of its affiliates) licenses this sample code for your internal testing purposes only.
# Microsoft provides the following sample code AS IS without warranty of any kind. The sample code arenot supported under any Microsoft standard support program or services.
# Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose.
# The entire risk arising out of the use or performance of the sample code remains with you.
# In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the code be liable for any damages whatsoever
# (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss)
# arising out of the use of or inability to use the sample code, even if Microsoft has been advised of the possibility of such damages.
# ---------------------------------------------------------------
Function PrettyTime() {
return "[" + (Get-Date -Format o) + "]"
}
Function Log($msg) {
Write-Verbose $( $(PrettyTime) + " " + $msg) -Verbose
}
function GetSubjectName([bool] $UseManagementAddress) {
if ($UseManagementAddress -eq $true)
{
# When IP Address is specified, we are currently looking just for IPv4 corpnet ip address
# In the final design, only computer names will be used for subject names
$corpIPAddresses = get-netIpAddress -AddressFamily IPv4 -PrefixOrigin Dhcp -ErrorAction Ignore
if ($corpIPAddresses -ne $null -and $corpIPAddresses[0] -ne $null)
{
$mesg = [System.String]::Format("Using IP Address {0} for certificate subject name", $corpIPAddresses[0].IPAddress);
Log $mesg
return $corpIPAddresses[0].IPAddress
}
else
{
Log "Unable to find management IP address ";
}
}
$hostFqdn = [System.Net.Dns]::GetHostByName(($env:computerName)).HostName;
$mesg = [System.String]::Format("Using computer name {0} for certificate subject name", $hostFqdn);
Log $mesg
return $hostFqdn ;
}
function GenerateSelfSignedCertificate([string] $subjectName) {
$cryptographicProviderName = "Microsoft Base Cryptographic Provider v1.0";
[int] $privateKeyLength = 1024;
$sslServerOidString = "1.3.6.1.5.5.7.3.1";
$sslClientOidString = "1.3.6.1.5.5.7.3.2";
[int] $validityPeriodInYear = 5;
$name = new-object -com "X509Enrollment.CX500DistinguishedName.1"
$name.Encode("CN=" + $SubjectName, 0)
$mesg = [System.String]::Format("Generating certificate with subject Name {0}", $subjectName);
Log $mesg
#Generate Key
$key = new-object -com "X509Enrollment.CX509PrivateKey.1"
$key.ProviderName = $cryptographicProviderName
$key.KeySpec = 1 #X509KeySpec.XCN_AT_KEYEXCHANGE
$key.Length = $privateKeyLength
$key.MachineContext = 1
$key.ExportPolicy = 0x2 #X509PrivateKeyExportFlags.XCN_NCRYPT_ALLOW_EXPORT_FLAG
$key.Create()
#Configure Eku
$serverauthoid = new-object -com "X509Enrollment.CObjectId.1"
$serverauthoid.InitializeFromValue($sslServerOidString)
$clientauthoid = new-object -com "X509Enrollment.CObjectId.1"
$clientauthoid.InitializeFromValue($sslClientOidString)
$ekuoids = new-object -com "X509Enrollment.CObjectIds.1"
$ekuoids.add($serverauthoid)
$ekuoids.add($clientauthoid)
$ekuext = new-object -com "X509Enrollment.CX509ExtensionEnhancedKeyUsage.1"
$ekuext.InitializeEncode($ekuoids)
# Set the hash algorithm to sha512 instead of the default sha1
$hashAlgorithmObject = New-Object -ComObject X509Enrollment.CObjectId
$hashAlgorithmObject.InitializeFromAlgorithmName( $ObjectIdGroupId.XCN_CRYPT_HASH_ALG_OID_GROUP_ID, $ObjectIdPublicKeyFlags.XCN_CRYPT_OID_INFO_PUBKEY_ANY, $AlgorithmFlags.AlgorithmFlagsNone, "SHA512")
#Request Cert
$cert = new-object -com "X509Enrollment.CX509CertificateRequestCertificate.1"
$cert.InitializeFromPrivateKey(2, $key, "")
$cert.Subject = $name
$cert.Issuer = $cert.Subject
$cert.NotBefore = (get-date).ToUniversalTime()
$cert.NotAfter = $cert.NotBefore.AddYears($validityPeriodInYear);
$cert.X509Extensions.Add($ekuext)
$cert.HashAlgorithm = $hashAlgorithmObject
$cert.Encode()
$enrollment = new-object -com "X509Enrollment.CX509Enrollment.1"
$enrollment.InitializeFromRequest($cert)
$certdata = $enrollment.CreateRequest(0)
$enrollment.InstallResponse(2, $certdata, 0, "")
Log "Successfully added cert to local machine store";
}
function GivePermissionToNetworkService($targetCert) {
$targetCertPrivKey = $targetCert.PrivateKey
$privKeyCertFile = Get-Item -path "$ENV:ProgramData\Microsoft\Crypto\RSA\MachineKeys\*" | where {$_.Name -eq $targetCertPrivKey.CspKeyContainerInfo.UniqueKeyContainerName}
$privKeyAcl = Get-Acl $privKeyCertFile
$permission = "NT AUTHORITY\NETWORK SERVICE","Read","Allow"
$accessRule = new-object System.Security.AccessControl.FileSystemAccessRule $permission
$privKeyAcl.AddAccessRule($accessRule)
Set-Acl $privKeyCertFile.FullName $privKeyAcl
}
Function AddCertToLocalMachineStore($certFullPath, $storeName, $securePassword) {
$rootName = "LocalMachine"
# create a representation of the certificate file
$certificate = new-object System.Security.Cryptography.X509Certificates.X509Certificate2
if($securePassword -eq $null)
{
$certificate.import($certFullPath)
}
else
{
# https://msdn.microsoft.com/en-us/library/system.security.cryptography.x509certificates.x509keystorageflags(v=vs.110).aspx
$certificate.import($certFullPath, $securePassword, "MachineKeySet,PersistKeySet")
}
# import into the store
$store = new-object System.Security.Cryptography.X509Certificates.X509Store($storeName, $rootName)
$store.open("MaxAllowed")
$store.add($certificate)
$store.close()
}
Function GetSubjectFqdnFromCertificatePath($certFullPath) {
# create a representation of the certificate file
$certificate = new-object System.Security.Cryptography.X509Certificates.X509Certificate2
$certificate.import($certFullPath)
return GetSubjectFqdnFromCertificate $certificate ;
}
Function GetSubjectFqdnFromCertificate([System.Security.Cryptography.X509Certificates.X509Certificate2] $certificate) {
$mesg = [System.String]::Format("Parsing Subject Name {0} to get Subject Fqdn ", $certificate.Subject)
Log $mesg
$subjectFqdn = $certificate.Subject.Split('=')[1] ;
return $subjectFqdn;
}
function Get-Certs($path){
$flags = [System.Security.Cryptography.X509Certificates.OpenFlags]"ReadOnly"
$rootName = [System.Security.Cryptography.X509Certificates.StoreLocation]"LocalMachine"
$store = New-Object System.Security.Cryptography.X509Certificates.X509Store($path, $rootName)
$store.Open($flags)
$certs = $store.Certificates
$store.Close()
return $certs
}
<#
.Synopsis
Export the Azure Stack cert to the file share
#>
function Export-AzSCertificateToShare
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory = $true, HelpMessage="The CustomerConfiguration.xml")]
[ValidateNotNull()]
[CloudEngine.Configurations.EceInterfaceParameters]
$Parameters,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $CertBase64String,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ProtectedCertPwd,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $CertificateName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $CertificateRoleId
)
Import-Module Microsoft.AzureStack.Security.CngDpapi
$clusterName = Get-ManagementClusterName $Parameters
$externalCertificatesInfo = $Parameters.Roles['CertificateManagement'].PublicConfiguration.PublicInfo.ExternalCertConfigurations.Certificates | Where Type -EQ 'AzureAD' | Select -First 1
$certificateConfigXml = $externalCertificatesInfo.Certificate | Where Name -EQ $CertificateName
$domainRole = $Parameters.Roles["Domain"].PublicConfiguration
$domainName = $domainRole.PublicInfo.DomainConfiguration.DomainName
Trace-Execution "$($MyInvocation.InvocationName) : Retreiving the cert information with cert name '$CertificateName' and cert role Id '$CertificateRoleId'..."
$certificateInfo = (($externalCertificatesInfo.Certificate | Where Name -EQ $CertificateName).Consumers.Consumer | Where Name -EQ $CertificateRoleId | Select -First 1)
Trace-Execution "$($MyInvocation.InvocationName) : Retrieved the unprocessed extension host cert path: $($certificateInfo.Location)"
$certLocation = Get-SharePath $Parameters $certificateInfo.Location $clusterName
Trace-Execution "$($MyInvocation.InvocationName) : Retrieved the extension host cert path: $certLocation"
$protectToGMSA = $certificateInfo.ProtectTo
if($protectToGMSA -ne $null)
{
Trace-Execution "$($MyInvocation.InvocationName) : ProtectTo parameter specified: $protectToGMSA"
}
Trace-Execution "$($MyInvocation.InvocationName) : Retreiving the Azure Stack internal CA Certificate password..."
$securityInfo = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.SecurityInfo
$certUser = $securityInfo.CACertUsers.User | Where Role -EQ "CACertificateUser"
$certCredential = $Parameters.GetCredential($certUser.Credential)
$exportCertPassword = $certCredential.GetNetworkCredential().SecurePassword
if ($exportCertPassword.Length -eq 0)
{
throw "The Azure Stack internal cert password should not be empty"
}
Trace-Execution "$($MyInvocation.InvocationName) : Retrive the Azure Stack internal CA Certificate password."
Trace-Execution "$($MyInvocation.InvocationName) : Converting cert from base64 string to binary..."
$certBytes = [System.Convert]::FromBase64String($CertBase64String)
Trace-Execution "$($MyInvocation.InvocationName) : Converting the protected password to local secure string..."
$certPwdCipher = [System.Convert]::FromBase64String($ProtectedCertPwd)
$certPwdCipherUnprotected = [Microsoft.AzureStack.Security.CngDpapi.ProtectionDescriptor]::UnprotectSecret($certPwdCipher)
$certPwdString = [System.Text.Encoding]::UTF8.GetString($certPwdCipherUnprotected)
$certPwd = ConvertTo-SecureString $certPwdString -AsPlainText -Force
Trace-Execution "$($MyInvocation.InvocationName) : decrypting the cert with input password..."
try
{
# SyslogClient cert location may have not been been provided. If this is the first time
# processing a SyslogClient cert - by PEP cmdlet Set-SyslogClient - the path
# must be checked and created before exporting the cert to the share location.
# Also, doing the same for Container Registry certificate as it will be supplied
# by the customer via Import-AzsContainerRegistrySslCertificate after deployment.
if (($CertificateName -eq "SyslogClient") -or ($CertificateName -eq "Container Registry") -and !(Test-Path -Path $certLocation))
{
Trace-Execution "$($MyInvocation.InvocationName) : $CertificateName certificate location: $certLocation was not found"
$CertSharePath = Split-Path -Path $certLocation
Trace-Execution "$($MyInvocation.InvocationName) : Checking $CertificateName certificate share path: $CertSharePath"
if (!(Test-Path -Path $CertSharePath))
{
Trace-Execution "$($MyInvocation.InvocationName) : $CertificateName certificate share path: $CertSharePath was not found"
Trace-Execution "$($MyInvocation.InvocationName) : Creating $CertificateName certificate share path: $CertSharePath"
New-Item -Path $CertSharePath -ItemType Directory -Force -ErrorAction Stop
Trace-Execution "$($MyInvocation.InvocationName) : Verifying $CertificateName certificate share path: $CertSharePath was created"
if (!(Test-Path -Path $CertSharePath))
{
Throw "Failed to find and create $CertificateName certificate share path: $CertSharePath"
}
Trace-Execution "$($MyInvocation.InvocationName) : $CertificateName certificate share path: $CertSharePath was created successfully"
}
else
{
Trace-Execution "$($MyInvocation.InvocationName) : $CertificateName certificate share path: $CertSharePath was found"
}
}
Trace-Execution "$($MyInvocation.InvocationName) : exporting the original binary to location $certLocation ..."
Set-Content -Value $certBytes -Path $certLocation -Encoding Byte -Force
if (!(Test-Path -Path $certLocation))
{
Throw "Failed temporary creation of $CertificateName using cert bytes into $certLocation"
}
Trace-Execution "$($MyInvocation.InvocationName) : importing the original cert ..."
$cert = Import-PfxCertificateSafe -Filepath $certLocation -CertStoreLocation cert:\LocalMachine\My -Password $certPwd -Exportable
if ($null -eq $cert)
{
Throw "Failed local import of $CertificateName from share: $certLocation using provided certificate password"
}
if($protectToGMSA -ne $null)
{
Trace-Execution "$($MyInvocation.InvocationName) : exporting the cert binary to location $certLocation with Azure Stack internal password and $protectToGMSA account protection..."
Export-PfxCertificate -Cert $cert -FilePath $certLocation -Password $exportCertPassword -ProtectTo @("$domainName\$protectToGMSA")
}
else
{
Trace-Execution "$($MyInvocation.InvocationName) : exporting the cert binary to location $certLocation with Azure Stack internal password..."
Export-PfxCertificate -Cert $cert -FilePath $certLocation -Password $exportCertPassword
}
if (!(Test-Path -Path $certLocation))
{
Throw "Failed exporting $CertificateName to certificate location $certLocation"
}
}
catch
{
Remove-Item $certLocation -Force -Confirm:$false -Verbose -ErrorAction SilentlyContinue
throw
}
}
<#
.Synopsis
Imports certificates onto specific node based on role Id
#>
function Import-CertificateToNodesCertStore
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory = $true, HelpMessage="The CustomerConfiguration.xml")]
[ValidateNotNull()]
[CloudEngine.Configurations.EceInterfaceParameters]
$Parameters,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $CertificateName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $CertificateRoleId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $CertificateType
)
$clusterName = Get-ManagementClusterName $Parameters
# Get certificate role Id definition
Trace-Execution "$($MyInvocation.InvocationName) : Retrieving role definition for [$CertificateRoleId]"
$roleDefinition = $Parameters.Roles[$CertificateRoleId].PublicConfiguration
Trace-Execution "$($MyInvocation.InvocationName) : Retreiving the cert information based on type $CertificateType for role Id '$CertificateRoleId'..."
$certificateInfo = $roleDefinition.PublicInfo.Certificates.Certificate | ? Type -EQ $CertificateType
Trace-Execution "$($MyInvocation.InvocationName) : Retrieved the unprocessed cert path: $($certificateInfo.CertFile)"
$certPath = ""
try
{
$certPath = Get-SharePath $Parameters $certificateInfo.CertFile $clusterName
Trace-Execution "$($MyInvocation.InvocationName) : Retrieved the cert path: $certPath"
}
catch
{
throw "Failed retrieving certificate path: $_"
}
# check if certificate is available
if (![System.IO.File]::Exists($certPath))
{
Trace-Execution "$($MyInvocation.InvocationName) : Certificate [$CertificateName] to import to nodes cert store is not available."
return
}
Trace-Execution "$($MyInvocation.InvocationName) : Cert [$CertificateName] exists with path: $certPath"
# Retrieve Azure Stack internal CA certificate password
Trace-Execution "$($MyInvocation.InvocationName) : Retreiving the Azure Stack internal CA Certificate password..."
$securityInfo = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.SecurityInfo
$certUser = $securityInfo.CACertUsers.User | Where Role -EQ "CACertificateUser"
$certCredential = $Parameters.GetCredential($certUser.Credential)
$certSecurePassword = $certCredential.GetNetworkCredential().SecurePassword
if ($certSecurePassword.Length -eq 0)
{
throw "The Azure Stack internal cert password should not be empty"
}
Trace-Execution "$($MyInvocation.InvocationName) : Retrived Azure Stack internal CA Certificate password."
# Retrieve domain admin
$domainAdminUser = $securityInfo.DomainUsers.User | ? Role -EQ $Parameters.Configuration.Role.PrivateInfo.Accounts.DomainAdminAccountID
$domainAdmincredential = $Parameters.GetCredential($domainAdminUser.Credential)
# Retrieve FQDN
Trace-Execution "$($MyInvocation.InvocationName) : Retrieving domain role"
$domainRole = $Parameters.Roles["Domain"].PublicConfiguration
Trace-Execution "$($MyInvocation.InvocationName) : Retrieving domain name"
$domainName = $domainRole.PublicInfo.DomainConfiguration.DomainName
Trace-Execution "$($MyInvocation.InvocationName) : Retrieving domain FQDN"
$domainFqdn = $domainRole.PublicInfo.DomainConfiguration.FQDN
Trace-Execution "$($MyInvocation.InvocationName) : Domain FQDN is [$domainFqdn]"
# retrieve nodes based on certificate role Id
$roleVMNames = $roleDefinition.Nodes.Node.Name
Trace-Execution "$($MyInvocation.InvocationName) : Role VM names are [$roleVMNames]"
$roleVMNames = $roleVMNames | ForEach-Object {"$_.$domainFqdn"}
Trace-Execution "$($MyInvocation.InvocationName) : Role VM FQDN are [$roleVMNames]"
$certName = $CertificateName
$certPermissions = $certificateInfo.Permissions.Permission
$certStoreLocation = $certificateInfo.CertStore.Location
if ($certPermissions -eq $null)
{
throw "Failed to retrieve certificate permissions"
}
if ($certStoreLocation -eq $null)
{
throw "Failed to retrieve certificate location"
}
$scriptBlock =
{
# Import certificate
$cert = $null
try
{
Write-Verbose "Importing certificate [$Using:certName] from path [$Using:certPath] with private key" -Verbose
$cert = Import-PfxCertificateSafe -CertStoreLocation $Using:certStoreLocation -Exportable -Password $Using:certSecurePassword -FilePath $Using:certPath
}
catch
{
throw "Failed importing certificate into store", $_
}
# Acl certificate private key
try
{
$certPrivKey = $cert.PrivateKey
$privKeyCertFile = Get-Item -path "$ENV:ProgramData\Microsoft\Crypto\RSA\MachineKeys\*" | where {$_.Name -eq $certPrivKey.CspKeyContainerInfo.UniqueKeyContainerName}
if (!$privKeyCertFile)
{
throw "Was unable to retrieve certificate private key file"
}
$privKeyAcl = Get-Acl $privKeyCertFile
foreach($permission in $Using:certPermissions)
{
$curPermission = $permission.User, $permission.Rights, "Allow"
$accessRule = new-object System.Security.AccessControl.FileSystemAccessRule $curPermission
$privKeyAcl.AddAccessRule($accessRule)
}
# To access private key of the certificate (for example during mutual authentication) we need to
# acl the certificate private key file with the identified user(s) and permissions defined in role definition.
Set-Acl $privKeyCertFile.FullName $privKeyAcl
}
catch
{
throw "Failed ACLing certificate private key", $_
}
}
Trace-Execution "Import certificate [$CertificateName] to machine(s) [$roleVMNames]..."
$session = New-PSSession -ComputerName $roleVMNames -Credential $domainAdmincredential -Authentication Credssp
try
{
Invoke-Command -Session $session -ScriptBlock $scriptBlock
}
catch
{
throw "Failed importing certificate on nodes", $_
}
finally
{
$session | Remove-PSSession -ErrorAction Ignore | Out-Null
}
Trace-Execution "Finished importing certificate [$CertificateName] on machine(s) [$roleVMNames]"
}
<#
.Synopsis
Check whether a dev cert is present indicating this is an internal lab environment.
#>
function Test-DevCertPresent
{
[CmdletBinding()]
param
(
[Parameter(Mandatory = $true)]
[CloudEngine.Configurations.EceInterfaceParameters]
$Parameters
)
$invokeCommandParams = @{
ScriptBlock = {
Get-ChildItem "Cert:\LocalMachine\My" | where Subject -match "microsoftazurestacksupportteam"
}
}
# Depending on where this code is running, we can check for the dev certificate in a different location.
if ($env:ComputerName -eq $Parameters.Roles["DeploymentMachine"].PublicConfiguration.Nodes.Node.Name)
{
$invokeCommandParams.ComputerName = $Parameters.Roles["BareMetal"].PublicConfiguration.Nodes.Node.Name | select -First 1
Trace-Execution "Testing for presence of dev certificate on $($invokeCommandParams.ComputerName)."
}
else
{
Trace-Execution "Testing for presence of dev certificate on $env:ComputerName."
}
if (Invoke-Command @invokeCommandParams)
{
Trace-Execution "Found the dev certificate, indicating this is an internal environment."
return $true
}
Trace-Execution "Dev certificate not found."
return $false
}
Export-ModuleMember -Function AddCertToLocalMachineStore
Export-ModuleMember -Function Export-AzSCertificateToShare
Export-ModuleMember -Function GenerateSelfSignedCertificate
Export-ModuleMember -Function Get-Certs
Export-ModuleMember -Function GetSubjectFqdnFromCertificate
Export-ModuleMember -Function GetSubjectFqdnFromCertificatePath
Export-ModuleMember -Function GetSubjectName
Export-ModuleMember -Function GivePermissionToNetworkService
Export-ModuleMember -Function Import-CertificateToNodesCertStore
Export-ModuleMember -Function Log
Export-ModuleMember -Function PrettyTime
Export-ModuleMember -Function Test-DevCertPresent
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCASUbRL2iOrtico
# tjC/ZFC0z+etQEJhww7qrg2mgn0SW6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBYLCnIwE3ZtKPjT2FAeAcxV
# M54l6IjsIS6Z3aE1tf2FMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAfL8uCAaa9EbFHh/B8Ra5Q7F5HCqQjneO0Ib1gWStncyRammJuM1qz1tw
# 3ANzi9g6YYOi8Vmbgwt5QuYm8Pa0tIYFvKhe1BIrxwmnjhJ+R95dt3j3QZi0fI4J
# CnU1+XB1Jj9nh3HIDjK8Ka6VjuW3elYf7ldcikLhhOshCmuv25wep1RnJUO1FLT7
# fIJxh8gwv/7o0r0P9X8jlN0GdrR7KNFFB4/HgZGjtWpXwVljVJJlegrUGaJGaTMH
# s7Y+Uuqvn1o0eS7T1SzGm1/qoN8y4dSz/KB2Ok1j9f53Ghje2i6Y5+5YQBnuEZgg
# SLvoae8wVLKS/tdNeHPddFJs/VoVXKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDdXICZLNs2vwEUdBfQij9P28Hl7JLYSQ31iZEqv1qb4QIGZbwS6b6X
# GBMyMDI0MDIxMjE0MDkzMC43OTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRolzAiGA8yMDI0MDIxMjA5NTEx
# OVoYDzIwMjQwMjEzMDk1MTE5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiX
# AgEAMAoCAQACAiY/AgH/MAcCAQACAhOAMAoCBQDpdboXAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAIeJj1Hw+sb1l/Ps+mMe19bwjz4JymTkkcg4/ZlM8LxH
# 9fkRHefrXaZ6DCazKS3epw5b58/BWoFMgcbQ45EggsR0O80tcVQxZZu9i38A//4H
# Y6IhXO45bl8BajblrQ+4B0VEH+qxyk2qQKxeyiNaahLczgvfq86urkunZ5LaXGVW
# 6Q5NVzIhu1X5Dbx/AwhCqG6BN1PcIYVrcrBJK3ot2XMbL3kSojn7/ahLaswmAmNX
# a052rk01sRRF04kuuS1fBFnuwFqwaNQ7nQ1u9z7fl5nPnMrUG+tIJHW4sjYbsuYG
# kWVpYpukdWCg/0bLr6S5/5ISkM3NHeSXPoU3LydiMWUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB
# 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDBpQjQ7w16VRx2AMgmf8qYjknLtTWPXF/FfnyP2dqC
# VDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh
# 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgZ/tX+K4cIAQr7/jYomvwBCtf
# vDto7JlyjY5tCOO7B40wDQYJKoZIhvcNAQELBQAEggIAT32wrbH07spJ+IkWFN2n
# hUXRDdpxqSsyNdFyTpuINwi/EkkUYKXfMeH7+MzYJ5KeBOgYwRfIuvzU2MEm+qam
# XWwOzuCiQnAkLljf5bNb9v6aWYWU+0BTox+/yU6tgKc+czWV3awn9SggmuWveWWV
# fEq8u/5nSfWqYp9QZK7+WVR61QN2fKZtcH9CCH1d+O384Yf9p7LsB4qGqdCTABaH
# /FsFUpPDbB3APexuPpvQWVv+Kos4kGpiBWBxbCK5JgDb+sZEwtvIXTWxsyHkxphc
# vXGRH6eoZGD2zw/A+zML3rem4w1JLnJ8qGU/1sDPWDNfBL1bvWBedHHmbKWfMl5A
# QPqa4LuGrJ9e3hID4HkK5rSQjeLOQu8WrciqSEzGMR9VCcyplzpqmW5FADr4x3PX
# js/QH07JiQLtm6A14vlkFUX5HhTQdb9EwuxlEskm9HPNmhul3hHQlpcy30oAuc7k
# EZgw2Mzn/VnCsC5ynNkEoj/YuLE6QA/M5N5tt0Z6fDENY2UqAtfHbhRA63veNGUw
# s2NHMMCLYKg/CEC9q8zAtgDecKdCn0hhQ1ecdBYJTNl7pFmgxo45rnP1FnyVd7bv
# xCXflQ5VGPX9mR8K8bRvtb3uZ+BbNuDcQh5hth2/bpfnrHOHrzwcEyfiFUA4nRt7
# BvNuY2tZXQalw+JMePUXCIk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-SiSReport_1.ps1
|
Get-SiSReport_1.ps1
|
Function Get-SiSReport
{
<#
.SYNOPSIS
Get the overall SIS usage information.
.DESCRIPTION
This function uses the sisadmin command to get the usage
information for a SIS enabled drive.
.PARAMETER SisDisk
The drive letter of a disk that has SiS enabled
.EXAMPLE
Get-SiSReport -SisDisk o
LinkFiles : 20004
Used : 442378481664
Disk : o
InaccessibleLinkFiles : 0
CommonStoreFiles : 6678
SpaceSaved : 7708860 KB
Free : 0
Description
-----------
This example shows the basic usage of the command
.NOTES
This function will return nothing if the drive being analyzed does not have SiS enabled
This function will return a message if the sisadmin command returns any error
.LINK
#>
Param
(
$SisDisk = "c"
)
Begin
{
$SisAdmin = "& sisadmin /v $($SisDisk):"
Try
{
$SisResult = Invoke-Expression $SisAdmin
}
Catch
{
Return "Single Instance Storage is not available on this computer"
}
}
Process
{
If ($SisResult.Count)
{
$ThisDisk = Get-PSDrive $SisDisk
$SisReport = New-Object -TypeName PSObject -Property @{
Disk = $SisDisk
Used = $ThisDisk.Used
Free = $ThisDisk.Free
CommonStoreFiles = ($SisResult[($SisResult.Count)-4]).TrimStart("Common store files:")
LinkFiles = ($SisResult[($SisResult.Count)-3]).TrimStart("Link files:")
InaccessibleLinkFiles = ($SisResult[($SisResult.Count)-2]).TrimStart("Inaccessible link files:")
SpaceSaved = ($SisResult[($SisResult.Count)-1]).TrimStart("Space saved:")
}
}
}
End
{
Return $SisReport
}
}
|
combined_dataset/train/non-malicious/sample_13_29.ps1
|
sample_13_29.ps1
|
ConvertFrom-StringData @'
id_proliantdl385nmicrashdump_sd=NMICrashDump is set to 1 on this HP ProLiant DL385 G5. This setting may block machine dumps via NMI to be generated.
'@
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB8MBRQHoCVpqKE
# 9t5Hiqg+EES0CXkZ2lUfe9FwVt9CjKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIRw
# kUAc6VZEmh/2NHLBLoPBFmqKsYzuo2FewahMKD9QMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAVKq7QOaNkBcG2YuySDyO3qLsxQTxhZMz/dH4
# 1CwF6XzbENcvQUoaDSrSsyoGMeQ/+eURGxOm6HdVvw8XTRei6XW62GqH95X51lyO
# IxjfK+0eAXWdHKa1vI3oXkmeBtBZiwq+3ocV7slKT1cBI9YhgWq4da83xwXK5DtL
# /O+UBxAM1sX+DK3KgqLAeh4lQoxCB5TQLmyPuJLKvOtLd0qCllrs2eiNOYKWaq7q
# MdwopfoIJ8SPHn+y6/sYpsqgTgZOq6WuCBnTCKbwwghbGSTK2qJj+hu474DCQnaj
# lSmEcRnQxhk2LTgxolUBBAZfAnU1I8OtcgeZvCborwR1PMcUjKGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCPUC+kFgMEb/t1ru1PiqkGaE+WzV2iQK9B
# LiezRhPMYQIGZutLSAOwGBMyMDI0MTAyODExNDA0MS41ODhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4
# fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d
# U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh
# hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn
# ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM
# KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L
# 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr
# 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf
# RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi
# aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA
# 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49
# tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA
# p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf
# OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG
# Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3
# kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU
# 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T
# y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd
# gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt
# uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3
# XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS
# Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl
# cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0
# MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA
# AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH
# yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq
# WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW
# cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a
# Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4
# swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgEamBAKA2tqtAYYJsGqkZ0DKPtqHcbtI1/Y6C3glF6qQwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj
# SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk
# D9cXZckbMA0GCSqGSIb3DQEBCwUABIICAFxnSSaU6XyV8LZRN8N2WxtbaK++Rb7Z
# KyHhiL8m+Ml0XFTues3MKEfa1gsJayS/OjRkWHiRoWSZXtbVX0s9DmOzaQiHURCT
# Cj7JTGSaUuBJ7ySejs17oEhyJo9Ld+bWtsFgmgeQ1wqF59ChskrqmZJ/xeo/tYxU
# nOzBrZfPM/GFIR2AOQ5UdubeB+QnYwYFMLg6s1VVRLU6yO2WJF601FIHmahYezY9
# 64/YFy6cYF3m9ErMCF62i0fz9WAIjowtuFKchX1ojKSs4utzzFIkc+452fNlhw3j
# 0hm/XzKj74iJKKPj3WcFC/NHZUGR4e52seY63q8EJ/wl2vij0jtAUU6TOASck6Er
# zmKpSy5SuC4kr6VdNr1plqx79btk4uIQ8x+gEDU/eBWTMHyJtJyUKKshbjechHo8
# qdLf6wdX380mGy88rrJ7fFw3VhTNGT9vH7WR7T+WgrnoF0ZthM/DQv6OFnrFy+Ce
# pkv+mC4ojSFkmpwlc8aacSMlEbwdWOjY12/3AebeRzBTVW+Es+rQk7nCY0MX/g/y
# 2WEWWHHhMsDqvNIuS8dWiXDZ2odsf0KdtdBb7CodfY6JjMEbFsPubuSbkB2jdxrx
# Bjv656Pzfuw6rDMannyZQJKu82DJgR6bxvFcienuLk3IulGePwAh0si3TVUuX0lX
# LhDuRL/j4+HD
# SIG # End signature block
|
combined_dataset/train/non-malicious/1952.ps1
|
1952.ps1
|
Describe "Trace-Command" -tags "Feature" {
Context "Listener options" {
BeforeAll {
$logFile = setup -f traceCommandLog.txt -pass
$actualLogFile = setup -f actualTraceCommandLog.txt -pass
}
AfterEach {
if ( test-path $logfile ) { Remove-Item $logFile }
if ( test-path $actualLogFile ) { Remove-Item $actualLogFile }
}
It "LogicalOperationStack works" -pending:($IsCoreCLR) {
$keyword = "Trace_Command_ListenerOption_LogicalOperationStack_Foo"
$stack = [System.Diagnostics.Trace]::CorrelationManager.LogicalOperationStack
$stack.Push($keyword)
Trace-Command -Name * -Expression {write-output Foo} -ListenerOption LogicalOperationStack -FilePath $logfile
$log = Get-Content $logfile | Where-Object {$_ -like "*LogicalOperationStack=$keyword*"}
$log.Count | Should -BeGreaterThan 0
}
It "Callstack works" -pending:($IsCoreCLR) {
Trace-Command -Name * -Expression {write-output Foo} -ListenerOption Callstack -FilePath $logfile
$log = Get-Content $logfile | Where-Object {$_ -like "*Callstack= * System.Environment.GetStackTrace(Exception e, Boolean needFileInfo)*"}
$log.Count | Should -BeGreaterThan 0
}
It "Datetime works" {
$expectedDate = Trace-Command -Name * -Expression {Get-Date} -ListenerOption DateTime -FilePath $logfile
$log = Get-Content $logfile | Where-Object {$_ -like "*DateTime=*"}
$results = $log | ForEach-Object {[DateTime]::Parse($_.Split("=")[1])}
$allowedGap = [timespan](60 * 1000 * 1000)
$results | ForEach-Object {
$actualGap = $_ - $expectedDate;
if ($expectedDate -gt $_)
{
$actualGap = $expectedDate - $_;
}
$allowedGap | Should -BeGreaterThan $actualGap
}
}
It "None options has no effect" {
Trace-Command -Name * -Expression {write-output Foo} -ListenerOption None -FilePath $actualLogfile
Trace-Command -name * -Expression {write-output Foo} -FilePath $logfile
Compare-Object (Get-Content $actualLogfile) (Get-Content $logfile) | Should -BeNullOrEmpty
}
It "ThreadID works" {
Trace-Command -Name * -Expression {write-output Foo} -ListenerOption ThreadId -FilePath $logfile
$log = Get-Content $logfile | Where-Object {$_ -like "*ThreadID=*"}
$results = $log | ForEach-Object {$_.Split("=")[1]}
$results | ForEach-Object { $_ | Should -Be ([threading.thread]::CurrentThread.ManagedThreadId) }
}
It "Timestamp creates logs in ascending order" {
Trace-Command -Name * -Expression {write-output Foo} -ListenerOption Timestamp -FilePath $logfile
$log = Get-Content $logfile | Where-Object {$_ -like "*Timestamp=*"}
$results = $log | ForEach-Object {$_.Split("=")[1]}
$sortedResults = $results | Sort-Object
$sortedResults | Should -Be $results
}
It "ProcessId logs current process Id" {
Trace-Command -Name * -Expression {write-output Foo} -ListenerOption ProcessId -FilePath $logfile
$log = Get-Content $logfile | Where-Object {$_ -like "*ProcessID=*"}
$results = $log | ForEach-Object {$_.Split("=")[1]}
$results | ForEach-Object { $_ | Should -Be $pid }
}
}
}
|
combined_dataset/train/non-malicious/sample_57_9.ps1
|
sample_57_9.ps1
|
<###################################################
# #
# Copyright (c) Microsoft. All rights reserved. #
# #
##################################################>
if (Test-Path "$PSScriptRoot\bin")
{
# Loaded from WindowsPowerShell\Modules
$clientBinaryDirectory = "$PSScriptRoot\bin"
}
elseif (Test-Path "$PSScriptRoot\..\lib\net46")
{
# Loaded from NugetStore
$clientBinaryDirectory = "$PSScriptRoot\..\lib\net46"
}
elseif (Test-Path "$PSScriptRoot\..\..\lib")
{
# Loaded from NugetStore : used in Remote Support
$clientBinaryDirectory = "$PSScriptRoot\..\..\lib"
}
elseif (Test-Path "$PSScriptRoot\..\lib")
{
# Loaded from NugetStore : used in Log Collection
$clientBinaryDirectory = "$PSScriptRoot\..\lib"
}
else
{
throw "Unknown $PSScriptRoot"
}
Write-Verbose "Client Binary resolved to - [$clientBinaryDirectory], All the binaries will be loaded from here" -Verbose
Add-Type -Path "$clientBinaryDirectory\Newtonsoft.Json.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.SupportBridge.LogCollector.Client.Contract.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.SupportBridge.LogCollector.Client.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.SupportBridge.LogCollector.Client.Models.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Operations.Contract.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.SupportBridge.Management.Client.Contract.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.SupportBridge.Management.Client.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.SupportBridge.Mgmt.Client.Models.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceRegistry.ServiceTypeRegistry.dll" -ErrorAction Stop -Verbose:$false | Out-Null
function Create-SupportControllerClientWithApplicationGateway
{
[CmdletBinding()]
Param(
[Parameter(Mandatory = $false, ValueFromPipeline = $true)]
[string]
$Endpoint = 'https://ASAppGateway:4443'
)
# Create Instance of Support Controller Client Object.
[System.TimeSpan] $defaultDelay = [System.TimeSpan]::FromSeconds(5)
[System.TimeSpan] $maxRetryTime = [System.TimeSpan]::FromSeconds(30)
#Create Instance with gateway resolver.
$subrControllerClient = [Microsoft.AzureStack.SupportBridge.LogCollector.Client.LogCollectorClientFactory]::CreateGatewayInstance($Endpoint, $defaultDelay, $maxRetryTime)
return $subrControllerClient
}
# This works while reaching out to SUBR from other VM's where SF is installed and SDN is working
# as this requires VIP name resolution.
function Create-SupportControllerClientWithServiceResolver {
[CmdletBinding()]
Param([string[]]$clientConnectionEndpoints = 'ASSRSFClient:19000' )
#Bugfix: Bug 3140655: Accessing ERCS VM Fails With "Unable to load DLL 'FabricClient.dll'"
$env:Path = [System.Environment]::GetEnvironmentVariable("Path", "Machine")
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.ServiceFabric.Contract.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.ServiceFabric.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceRegistry.ServiceFabricTypeRegistry.dll" -ErrorAction Stop -Verbose:$false | Out-Null
$resolver = [Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.ServiceFabric.ServiceResolverFactory]::CreateServiceResolver(
[Microsoft.AzureStack.Common.Infrastructure.ServiceRegistry.ServiceFabricTypeRegistry.ServiceFabricTypes]::TypeMap, $clientConnectionEndpoints)
# Create Instance of Support Controller Client Object.
[System.TimeSpan] $defaultDelay = [System.TimeSpan]::FromSeconds(5)
[System.TimeSpan] $maxRetryTime = [System.TimeSpan]::FromSeconds(60)
#Create Instance with gateway resolver.
$subrControllerClient = [Microsoft.AzureStack.SupportBridge.LogCollector.Client.LogCollectorClientFactory]::CreateInstanceUsingServiceResolver($resolver, $defaultDelay, $maxRetryTime)
return $subrControllerClient
}
# This works when service is running as WinSvC locally on the node.
function Create-LogCollectorClienttWithLocalServiceResolver {
$serviceId = [System.Guid]"754dbc04-8f91-4cb6-a10f-899dac573fa0"
$serviceUri = [System.Uri]'http://localhost:7345'
$dict = New-Object "System.Collections.Generic.Dictionary``2[System.Guid,System.Uri]"
$dict.Add($serviceId, $serviceUri)
# Create Instance of Support Controller Client Object.
[System.TimeSpan] $defaultDelay = [System.TimeSpan]::FromSeconds(5)
[System.TimeSpan] $maxRetryTime = [System.TimeSpan]::FromSeconds(60)
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.WinSvc.dll" -ErrorAction Stop -Verbose:$false | Out-Null
$resolver = New-Object -TypeName 'Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.WinSvc.ServiceResolver' -ArgumentList @($dict)
#Create Instance with gateway resolver.
$subrControllerLogCollectorClient = [Microsoft.AzureStack.SupportBridge.LogCollector.Client.LogCollectorClientFactory]::CreateInstanceUsingServiceResolver($resolver, $defaultDelay, $maxRetryTime, $null, $true)
return $subrControllerLogCollectorClient
}
# This works while reaching out to SUBR from other VM's where SF is installed and SDN is working
# as this requires VIP name resolution.
function Create-SupportControllerMgmtClientWithServiceResolver {
[CmdletBinding()]
Param([string[]]$clientConnectionEndpoints = 'ASSRSFClient:19000' )
$isASZ = Is-ASZ
if ($isASZ){
return Create-SupportControllerMgmtClientWithLocalServiceResolver -skipSPNAuth $true;
}
$ProviderName = [system.environment]::GetEnvironmentVariable("AzureStackProviderName",[System.EnvironmentVariableTarget]::Machine)
if (($ProviderName -ne $null) -and ($ProviderName -ieq "Microsoft.HCI")){
return Create-SupportControllerMgmtClientWithLocalServiceResolver -skipSPNAuth $true;
}
#Bugfix: Bug 3140655: Accessing ERCS VM Fails With "Unable to load DLL 'FabricClient.dll'"
$env:Path = [System.Environment]::GetEnvironmentVariable("Path", "Machine")
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.ServiceFabric.Contract.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.ServiceFabric.dll" -ErrorAction Stop -Verbose:$false | Out-Null
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceRegistry.ServiceFabricTypeRegistry.dll" -ErrorAction Stop -Verbose:$false | Out-Null
$resolver = [Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.ServiceFabric.ServiceResolverFactory]::CreateServiceResolver(
[Microsoft.AzureStack.Common.Infrastructure.ServiceRegistry.ServiceFabricTypeRegistry.ServiceFabricTypes]::TypeMap, $clientConnectionEndpoints)
# Create Instance of Support Controller Client Object.
[System.TimeSpan] $defaultDelay = [System.TimeSpan]::FromSeconds(5)
[System.TimeSpan] $maxRetryTime = [System.TimeSpan]::FromSeconds(60)
#Create Instance with gateway resolver.
$subrControllerMgmtClient = [Microsoft.AzureStack.SupportBridge.Management.Client.ManagementClientFactory]::CreateInstanceUsingServiceResolver($resolver, $defaultDelay, $maxRetryTime)
return $subrControllerMgmtClient
}
# This works when service is running as WinSvC locally on the node.
function Create-SupportControllerMgmtClientWithLocalServiceResolver {
[CmdletBinding()]
Param([bool]$skipSPNAuth = $false )
$serviceId = [System.Guid]"ea126685-c89e-4294-959f-bba6bf75b4aa"
$serviceUri = [System.Uri]'http://localhost:80/diagnostics'
$dict = New-Object "System.Collections.Generic.Dictionary``2[System.Guid,System.Uri]"
$dict.Add($serviceId, $serviceUri)
# Create Instance of Support Controller Client Object.
[System.TimeSpan] $defaultDelay = [System.TimeSpan]::FromSeconds(5)
[System.TimeSpan] $maxRetryTime = [System.TimeSpan]::FromSeconds(60)
Add-Type -Path "$clientBinaryDirectory\Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.WinSvc.dll" -ErrorAction Stop -Verbose:$false | Out-Null
$resolver = New-Object -TypeName 'Microsoft.AzureStack.Common.Infrastructure.ServiceDiscovery.WinSvc.ServiceResolver' -ArgumentList @(,$dict)
#Create Instance with gateway resolver.
$subrControllerMgmtClient = [Microsoft.AzureStack.SupportBridge.Management.Client.ManagementClientFactory]::CreateInstanceUsingServiceResolver($resolver, $defaultDelay, $maxRetryTime, $null, $skipSPNAuth)
return $subrControllerMgmtClient
}
<#
.SYNOPSIS
Sends Azure Stack Diagnostic Logs to Microsoft.
.DESCRIPTION
Makes a request to Support Bridge Service to upload diagnostic logs for stamp.
.PARAMETER FilterByRole
Optional. Filter by Infrastructure Role type.
.PARAMETER FilterByResourceProvider
Optional. Filter by Value-add resource provider type.
.PARAMETER FromDate
Optional. Start time to use for logs to collect.
.PARAMETER ToDate
Optional. End time to use for logs to collect.
.EXAMPLE
The example below sends last 4 hour logs to Microsoft.
PS C:\> Send-AzureStackDiagnosticLog
.EXAMPLE
The example below sends last 4 hour Support Service and WAS logs to Microsoft.
PS C:\> Send-AzureStackDiagnosticLog -FilterByRole SupportBridgeController,WAS
.NOTES
#>
function Send-AzureStackDiagnosticLog
{
Param(
[Parameter(Mandatory=$false)]
[string[]]
$FilterByRole,
[Parameter(Mandatory=$false)]
[string[]]
$FilterByResourceProvider,
[Parameter(Mandatory=$false)]
[nullable[DateTime]]
$FromDate,
[Parameter(Mandatory=$false)]
[nullable[DateTime]]
$ToDate
)
if ($FromDate -eq $null)
{
$FromDate = (Get-Date).AddHours(-4)
Write-Host "FromDate parameter not specified. Setting to default value $FromDate"
}
if ($ToDate -eq $null)
{
$ToDate = Get-Date
Write-Host "ToDate parameter not specified. Setting to default value $ToDate"
}
$logCollectionModel = Create-LogCollectionModel -FilterByRole $FilterByRole -FilterByResourceProvider $FilterByResourceProvider -FromDate $FromDate -ToDate $ToDate
$subrControllerClient = Create-SupportControllerClientWithServiceResolver
$collectionTask = $subrControllerClient.SubmitOnDemandCollectionJob("default", $logCollectionModel, [System.Threading.CancellationToken]::None)
$collectionTask.Wait()
$operationId = $collectionTask.Result
Write-Host "Successfully submitted on-demand. Operation tracking Id: $operationId"
[Microsoft.AzureStack.Common.Operations.OperationState]$runningState = [Microsoft.AzureStack.Common.Operations.OperationState]::Running
[Microsoft.AzureStack.Common.Operations.OperationState]$currentState = Get-LogCollectionStatus -SubrControllerClient $subrControllerClient -OperationId $operationId
Write-Host "Current log collection status: $currentState"
while ($currentState -eq $runningState)
{
Write-Host "Waiting for log collection to complete..."
Start-Sleep -s 120
$currentState = Get-LogCollectionStatus -SubrControllerClient $subrControllerClient -OperationId $operationId
}
Write-Host "Log collection ended with status: $currentState"
}
function Send-DiagnosticData
{
[CmdletBinding(DefaultParametersetName='LogCollectionAndParsing')]
Param(
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[Parameter(Mandatory=$false, ParameterSetName='LogCollectionAndParsing')]
[string[]]
$FilterByRole,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[Parameter(Mandatory=$false, ParameterSetName='LogCollectionAndParsing')]
[nullable[DateTime]]
$FromDate,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[Parameter(Mandatory=$false, ParameterSetName='LogCollectionAndParsing')]
[nullable[DateTime]]
$ToDate,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[Parameter(Mandatory=$false, ParameterSetName='LogCollectionAndParsing')]
[bool]
$CollectSddc = $true,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[string]
$SaveToPath,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[Parameter(Mandatory=$false, ParameterSetName='NoLogCollection')]
[Parameter(Mandatory=$false, ParameterSetName='LogCollectionAndParsing')]
[ValidateNotNullOrEmpty()]
[string]
$SupplementaryLogs,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[Parameter(Mandatory=$false, ParameterSetName='NoLogCollection')]
[ValidateNotNullOrEmpty()]
[PSCredential]
$ShareCredential,
[Parameter(Mandatory=$false, ParameterSetName='NoLogCollection')]
[switch]
$NoLogCollection,
[Parameter(Mandatory=$false)]
[switch]
$BypassObsAgent,
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[switch]
$ToSMBShare,
[Parameter(Mandatory=$false, ParameterSetName='NoLogCollection')]
[switch]
$FromSMBShare,
[Parameter(Mandatory=$false, ParameterSetName='NoLogCollection')]
[Parameter(Mandatory=$false, ParameterSetName='SaveToPath')]
[string]
$SharePath,
[Parameter(Mandatory=$false)]
[switch]
$SkipTestObservability
)
if ($FromDate -eq $null)
{
$FromDate = (Get-Date).AddHours(-1)
Write-Host "FromDate parameter not specified. Setting to default value $FromDate"
}
else
{
Write-Host "FromDate is $FromDate"
}
if ($ToDate -eq $null)
{
$ToDate = Get-Date
Write-Host "ToDate parameter not specified. Setting to default value $ToDate"
}
else
{
Write-Host "ToDate is $ToDate"
}
Write-Host "The FromDate is in $($FromDate.Kind) and the ToDate is in $($ToDate.Kind)"
Write-Host "The local time zone is $(Get-Timezone)"
$FromDate = Convert-ToUtc $FromDate
$ToDate = Convert-ToUtc $ToDate
Write-Host "FromDate in UTC is now $FromDate. ToDate in UTC is now $ToDate"
$CurrentDateTime = (Get-Date).ToUniversalTime()
if ($ToDate -gt $CurrentDateTime.addMinutes(5))
{
$OldToDate = $ToDate
$ToDate = $CurrentDateTime
Write-Warning "Log Collection To Date cannot be greater than current datetime of $CurrentDateTime. Changed Log Collection ToDate from $OldToDate to $ToDate"
}
if ($FromDate -gt $CurrentDateTime)
{
Write-Host "Log Collection From Date cannot be greater than current datetime of $CurrentDateTime. Aborting log collection."
return
}
if ($ToDate -le $FromDate)
{
Write-Host "ToDate cannot be less than or equal to FromDate. Aborting log collection."
return
}
# Warning if log collection is more than 24 hours in time range
$timeDifference = New-TimeSpan -Start $fromDate -End $toDate
# set to 24 hours + 2 minutes, in case time range is slightly above 24 hours
$maxMinutes = 24 * 60 + 2
if ($timeDifference.TotalMinutes -gt $maxMinutes)
{
Write-Warning "We advise limiting log collection to no more than 24 hours."
}
# To make backwards compatible, accept parameters -ToSMBShare, -SMBShare, and SharePath
if ($SharePath)
{
if ($ToSMBShare)
{
if ($SaveToPath)
{
Write-Host "Cannot use both SharePath and SaveToPath parameters. Aborting log collection."
return
}
else
{
$SaveToPath = $SharePath
Write-Warning "Note: ToSMBShare and SharePath parameters are deprecated. Use SaveToPath parameter instead of SharePath parameter going forward."
}
}
elseif ($FromSMBShare)
{
if ($SupplementaryLogs)
{
Write-Host "Cannot use both SharePath and SupplementaryLogs parameters. Aborting log collection."
return
}
else
{
$SupplementaryLogs = $SharePath
$NoLogCollection = $true
Write-Warning "Note: FromSMBShare and SharePath parameters are deprecated. Use NoLogCollection parameter instead of FromSMBShare parameter, and SupplementaryLogs parameter instead of SharePath parameter going forward."
}
}
else
{
Write-Host "SharePath parameter must be used with either ToSMBShare or FromSMBShare. Aborting log collection."
return
}
}
# After checking if sharepath exists and reassigning as needed, need to enforce required parameters depending on parameter Set
$parameterSetName = $PSCmdlet.ParameterSetName
if ($parameterSetName -ieq "SaveToPath")
{
if ([string]::IsNullOrEmpty($SaveToPath))
{
Write-Host "SaveToPath parameter cannot be null or empty when using parameter set $parameterSetName. Aborting log collection."
return
}
}
elseif ($parameterSetName -ieq "NoLogCollection")
{
if ([string]::IsNullOrEmpty($SupplementaryLogs))
{
Write-Host "SupplementaryLogs parameter cannot be null or empty when using parameter set $parameterSetName. Aborting log collection."
return
}
}
$correlationId = [guid]::NewGuid()
Write-Host "The correlation Id is $correlationId. This is used to query for this log collection in the diagnostic pipeline."
if (!$SaveToPath)
{
# First need to check if GMA is running. If not, stop log collection.
if (!(Is-GMARunning))
{
Write-Host "GMA process for diagnostic pipeline was not found. Aborting log collection."
return
}
try
{
$pathToDiagnosticJson = "$env:SystemDrive\Gmacache\JsonDropLocation\AEODiagnostics.json"
$diagnosticsJson = Get-Content -Raw $pathToDiagnosticJson | ConvertFrom-json
$diagnosticInfo = [ordered]@{
AEORegion = $diagnosticsJson.ConstantVariables.MONITORING_AEO_REGION
AEODeviceARMResourceUri = $diagnosticsJson.ConstantVariables.MONITORING_AEO_DEVICE_ARM_RESOURCE_URI
AEOClusterNodeArcResourceUri = $diagnosticsJson.ConstantVariables.MONITORING_AEO_NODE_ARC_RESOURCE_URI
CorrelationId = $correlationId
}
Write-Host "Provide the below information to the customer support engineer working on your case." -Verbose
$diagnosticInfo.GetEnumerator() | ForEach-Object {
$message = ' {0}: {1}' -f $_.key, $_.value
Write-Host $message
}
}
catch
{
Write-Host "Could not get AEODeviceARMResourceUri, AEOClusterNodeArcResourceUri, or AEORegion. Error: $_"
}
}
# If passed in SupplementaryLogs and parameter set name is SaveToPath or LogCollectionAndParsing, add warning if it doesn't exist.
# If NoLogCollection parameter set, should be failure because there's nothing that can be collected and parsed.
if (![string]::IsNullOrEmpty($SupplementaryLogs) )
{
$validPath = Test-SupplementaryLogsPath -SupplementaryLogs $SupplementaryLogs -ShareCredential $ShareCredential -ParameterSetName $ParameterSetName
$supplPathWarning = "Cannot find path for supplementary logs $SupplementaryLogs, or path is not a folder."
if (!$validPath)
{
if ($parameterSetName -ieq "NoLogCollection")
{
Write-Host "$supplPathWarning Aborting log collection."
return
}
else
{
Write-Warning $supplPathWarning
Write-Host "Continuing with collecting role logs and sddc logs"
}
}
}
# Parameter sets SaveToPath and NoLogCollection should be a local log collection only.
if ($NoLogCollection -or $SaveToPath)
{
Write-Host "Bypassing the observability agent, as parameter set $parameterSetName is being used"
$BypassObsAgent = $true
}
if (-not $BypassObsAgent -and (Is-ObservabilityAgentRunning)) {
Write-Host "Observability Agent is running."
Write-Host "This log collection will attempt to collect logs from all hosts."
$logCollectionModel = Create-LogCollectionModel -FilterByRole $FilterByRole -FromDate $FromDate -ToDate $ToDate `
-CollectSddc $CollectSddc -SupplementaryLogs $SupplementaryLogs -CorrelationId $correlationId -SkipTestObservability $SkipTestObservability.IsPresent
$subrControllerClient = Create-LogCollectorClienttWithLocalServiceResolver
$collectionTask = $subrControllerClient.SubmitOnDemandCollectionJob("default", $logCollectionModel, [System.Threading.CancellationToken]::None)
$collectionTask.Wait()
$operationId = $collectionTask.Result
Write-Host "Successfully submitted on-demand. Log collection Job Id: $operationId. This is used to track the log collection with Get-LogCollectionHistory."
[Microsoft.AzureStack.Common.Operations.OperationState]$runningState = [Microsoft.AzureStack.Common.Operations.OperationState]::Running
[Microsoft.AzureStack.Common.Operations.OperationState]$currentState = Get-LogCollectionStatus -SubrControllerClient $subrControllerClient -OperationId $operationId
Write-Host "Current log collection status: $currentState"
while ($currentState -eq $runningState)
{
Write-Host "Waiting for log collection to complete..."
Start-Sleep -s 120
$currentState = Get-LogCollectionStatus -SubrControllerClient $subrControllerClient -OperationId $operationId
}
Write-Host "Log Collection is Complete."
# Figure out if any data parsed.
$records = Get-LogCollectionHistory
$count = ($records | Measure-Object).Count
if ($count -eq 1)
{
$filesParsed = $records.UploadNumberOfFiles
}
else
{
$record = $records | Where-Object {$_.LogCollectionId -ieq $operationId}
$filesParsed = $record.UploadNumberOfFiles
}
if ($filesParsed -gt 0)
{
Write-Host "
Thank you for sending diagnostic logs to Microsoft. In the event that further logs are deemed necessary,
Microsoft Customer Support will communicate with you accordingly.
"
}
else
{
Write-Host "Log collection failed."
}
}
else
{
Write-Host "
Bypassing the observability agent and collecting logs directly from LogOrchestrator.
There will be no record of this log collection in the log collection history.
Only collecting logs from the current host, $env:COMPUTERNAME.
"
# Call Get-DiagnosticLog with the right parameters (including filtering for local node)
# We are running in local mode, which means collect logs only for this node.
$filterByNode = @($env:COMPUTERNAME)
$getDiagLogParams = @{
TracingContext = $correlationId
BypassedObsAgent = $true
SupplementaryLogs = $SupplementaryLogs
SkipTestObservability = $SkipTestObservability.IsPresent
}
# Don't pass in parameters used in collecting logs if we are using NoLogCollection parameter set, because
# in that case, we skip log collection.
if ($parameterSetName -ne "NoLogCollection")
{
$getDiagLogParams.Add("IncludeGetSDDCLogs", $CollectSddc)
$getDiagLogParams.Add("FilterByRole", $FilterByRole)
$getDiagLogParams.Add("FilterByNode", $filterByNode)
$getDiagLogParams.Add("LogCollectionStartTimeUTC", $FromDate)
$getDiagLogParams.Add("LogCollectionEndTimeUTC", $ToDate)
$getDiagLogParams.Add("LogCollectionJobType", "OnDemand")
$getDiagLogParams.Add("LocalMode", $true)
}
if ($parameterSetName -ieq "SaveToPath")
{
$getDiagLogParams.Add("SaveToPath", $SaveToPath)
}
if ($parameterSetName -ieq "NoLogCollection")
{
$getDiagLogParams.Add("NoLogCollection", $NoLogCollection)
}
if ($ShareCredential)
{
$getDiagLogParams.Add("ShareCredential", $ShareCredential)
}
Write-Host "Calling Get-DiagnosticLog."
$diagnosticLogResults = Get-DiagnosticLog @getDiagLogParams
Write-Host "Get-DiagnosticLog is complete."
if ($parameterSetName -ne "SaveToPath")
{
$filesParsed = $diagnosticLogResults.GenevaConnector_ParsedFileCount
if ($filesParsed -gt 0)
{
Write-Host "Thank you for sending diagnostic logs to Microsoft. In the event that further logs are deemed necessary, Microsoft Customer Support will communicate with you accordingly."
}
else
{
Write-Host "Log collection failed."
}
}
}
}
<#
.SYNOPSIS
Gets the log colllection history.
.DESCRIPTION
Gets history of logs collected on the stamp.
.PARAMETER MaxRecords
Optional. Limit the number of records to display. By default is set to 10. If lower or equal to 0, return the default
.PARAMETER AllRecords
Optional. Defaults to false. Indicates whether to display all records. Ignores the value of MaxRecords
.EXAMPLE
PS C:\> Get-LogCollectionHistory
.NOTES
#>
function Get-LogCollectionHistory
{
Param(
[Parameter(Mandatory=$false)]
[nullable[DateTime]]
$FromDate = (Get-Date).AddDays(-7),
[Parameter(Mandatory=$false)]
[int]
$MaxRecords = 10,
[Parameter(Mandatory=$false)]
[switch]
$AllRecords
)
if ($MaxRecords -le 0){
$MaxRecords = 10
}
$logCollectionTable = $null
$isASZ = Is-ASZ
$subrControllerClient = $null
if ($isASZ)
{
$subrControllerClient = Create-LogCollectorClienttWithLocalServiceResolver
}
else
{
$subrControllerClient = Create-SupportControllerClientWithServiceResolver
}
$fromDateString = $FromDate.ToString("MMddyyyyHHmmss")
$getLogHistoryTask = $subrControllerClient.GetLogCollectionHistory([System.Threading.CancellationToken]::None, $fromDateString)
$getLogHistoryTask.Wait()
$logCollectionRecords = $getLogHistoryTask.Result
$logCollectionData = [object[]]::new($logcollectionRecords.Count)
$index = 0
foreach ($logcollectionRecord in $logCollectionRecords)
{
$newRecord = [ordered]@{
TimeCollected = $logcollectionRecord.CollectionTime
Status = $logcollectionRecord.State
LogCollectionId = $logCollectionRecord.OperationId
CollectionFromDate = $logcollectionRecord.FromDate
CollectionToDate = $logcollectionRecord.ToDate
Type = $logcollectionRecord.JobType
LogUploadSizeMb = $logcollectionRecord.UploadDetails.UploadSizeInMb
UploadNumberOfFiles = $logcollectionRecord.UploadDetails.UploadNumberOfFiles
Directory = $logcollectionRecord.UploadDetails.UploadDirectory
Location = $logcollectionRecord.LogLocation
Error = $logcollectionRecord.Error.Message -replace "`r`n",'; '
"----------" = "---------------------------------------------------------"
}
$logCollectionData[$index++] = $newRecord
}
$logCollectionTable = $logCollectionData | Sort-Object { [DateTime]$_.TimeCollected.DateTime } -Descending
if (-not $AllRecords)
{
$logCollectionTable = $logCollectionTable | Select-Object -First $MaxRecords
}
if ($logCollectionTable.count -eq 0)
{
Write-Host "No records in time range."
}
return $logCollectionTable
}
<#
.SYNOPSIS
Enables proactive log collection.
.DESCRIPTION
Enables proactive log collection.
.EXAMPLE
The example below enables proactive log collection.
PS C:\> Enable-ProactiveLogCollection
.NOTES
#>
function Enable-ProactiveLogCollection
{
$isASZ = Is-ASZ
$subrControllerClient = $null
if ($isASZ)
{
$subrControllerClient = Create-LogCollectorClienttWithLocalServiceResolver
$enableProactiveTask = $subrControllerClient.EnableASZProactiveLogCollection([System.Threading.CancellationToken]::None)
}
else
{
$subrControllerClient = Create-SupportControllerClientWithServiceResolver
$enableProactiveTask = $subrControllerClient.EnableLogCollection([System.Threading.CancellationToken]::None)
}
$enableProactiveTask.Wait()
# check if enabled
$enabled = Check-ProactiveEnabled -SubrControllerClient $subrControllerClient -IsASZ $isASZ
if ($enabled)
{
return "enabled"
}
else
{
throw "Proactive log collection could not be enabled."
}
}
<#
.SYNOPSIS
Disables proactive log collection.
.DESCRIPTION
Disables proactive log collection.
.EXAMPLE
The example below enables disables log collection.
PS C:\> Disable-ProactiveLogCollection
.NOTES
#>
function Disable-ProactiveLogCollection
{
$isASZ = Is-ASZ
$subrControllerClient = $null
if ($isASZ)
{
$subrControllerClient = Create-LogCollectorClienttWithLocalServiceResolver
$disableProactiveTask = $subrControllerClient.DisableASZProactiveLogCollection([System.Threading.CancellationToken]::None)
}
else
{
$subrControllerClient = Create-SupportControllerClientWithServiceResolver
$disableProactiveTask = $subrControllerClient.DisableLogCollection([System.Threading.CancellationToken]::None)
}
$disableProactiveTask.Wait()
# check if enabled
$enabled = Check-ProactiveEnabled -SubrControllerClient $subrControllerClient -IsASZ $IsASZ
if ($enabled)
{
throw "Proactive log collection could not be disabled."
}
else
{
return "disabled"
}
}
function Check-ProactiveEnabled
{
Param(
[Parameter(Mandatory=$true)]
[Microsoft.AzureStack.SupportBridge.LogCollector.Client.Contract.ILogCollectorClient]
$SubrControllerClient,
[Parameter(Mandatory=$true)]
[bool]
$IsASZ
)
if ($IsASZ)
{
$logCollectionConfigTask = $SubrControllerClient.GetASZProactiveLogCollectionState([System.Threading.CancellationToken]::None)
$logCollectionConfigTask.Wait()
$proactiveStatus = $logCollectionConfigTask.Result
return ($proactiveStatus -eq "enabled")
}
else
{
$logCollectionConfigTask = $SubrControllerClient.GetScheduledLogCollectionConfiguration([System.Threading.CancellationToken]::None)
$logCollectionConfigTask.Wait()
$logCollectionConfig = $logCollectionConfigTask.Result
return $logCollectionConfig.Enabled
}
}
<#
.SYNOPSIS
Gets the proactive log collection state.
.DESCRIPTION
Gets the proactive log collection state.
.EXAMPLE
The example below gets the proactive log collection state..
PS C:\> Get-ProactiveLogCollectionState
.NOTES
#>
function Get-ProactiveLogCollectionState
{
$isASZ = Is-ASZ
$subrControllerClient = $null
if ($isASZ)
{
$subrControllerClient = Create-LogCollectorClienttWithLocalServiceResolver
}
else
{
$subrControllerClient = Create-SupportControllerClientWithServiceResolver
}
$enabled = Check-ProactiveEnabled -SubrControllerClient $subrControllerClient -IsASZ $IsASZ
if ($enabled)
{
return "enabled"
}
else
{
return "disabled"
}
}
<#
.SYNOPSIS
Gets Support Service configuration settings.
.DESCRIPTION
Support Service configuration settings.
.PARAMETER IncludeRegistrationObjectId
Optional. Requires internet connectivity. Retrieves registration identity object id.
.EXAMPLE
The example below gets registration details if stamp was registered or else null.
PS C:\> Get-AzureStackSupportConfiguration
.NOTES
Requires Support VM to have internet connectivity.
#>
function Get-AzureStackSupportConfiguration
{
Param(
[Parameter(Mandatory=$false)]
[Switch]
$IncludeRegistrationObjectId
)
try
{
Write-Host "Fetching registration details from Support Service."
$includePropertyName = $null
if ($IncludeRegistrationObjectId)
{
$includePropertyName = "objectId"
}
$subrControllerClient = Create-SupportControllerClientWithServiceResolver
$getRegistrationDetailsTask = $subrControllerClient.GetLogCollectionRegistrationDetails([System.Threading.CancellationToken]::None, $includePropertyName)
$getRegistrationDetailsTask.Wait()
[Microsoft.AzureStack.SupportBridge.LogCollector.Client.Models.LogCollectionRegistrationDetailsClientModelExt]$registrationDetails = $getRegistrationDetailsTask.Result
if ($registrationDetails.RegistrationResourceId -eq $null)
{
Write-Error "Registration Details not found. This can happen either if Azure Stack is not registered or Disconnected."
}
else
{
Write-Host "Successfully fetched registration details."
return ($registrationDetails | ConvertTo-Json -Depth 2)
}
}
catch {
echo $_.Exception|format-list -force
Write-Error "Get-AzureStackSupportConfiguration failed with $_"
}
}
<#
.SYNOPSIS
Enables Cloud connection.
.DESCRIPTION
Enables Cloud connection.
.EXAMPLE
The example below enables cloud connection.
PS C:\> Enable-AzsCloudConnection
.NOTES
Requires Support VM to have internet connectivity.
#>
function Enable-AzsCloudConnection
{
try
{
Write-Host "Enabling cloud connection..."
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$enableMgmtTask = $subrControllerMgmtClient.EnableRemoteManagement([System.Threading.CancellationToken]::None)
$enableMgmtTask.Wait()
Write-Host "Successfully enabled Cloud connection."
}
catch {
echo $_.Exception|format-list -force
Write-Error "Enable-AzsCloudConnection failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Disables Cloud connection.
.DESCRIPTION
Disables Cloud connection.
.EXAMPLE
The example below disables Cloud connection.
PS C:\> Disable-AzsCloudConnection
.NOTES
Requires Support VM to have internet connectivity.
#>
function Disable-AzsCloudConnection
{
try
{
Write-Host "Disabling Cloud connection..."
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$enableMgmtTask = $subrControllerMgmtClient.DisableRemoteManagement([System.Threading.CancellationToken]::None)
$enableMgmtTask.Wait()
Write-Host "Successfully disabled cloud connection."
}
catch {
echo $_.Exception|format-list -force
Write-Error "Disable-AzsCloudConnection failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Adds cloud action.
.DESCRIPTION
Adds cloud action.
.EXAMPLE
The example below to add cloud action.
PS C:\> Add-AzsCloudAction -SubsystemName $name -Expiration $date -Comments "sample access"
.NOTES
Requires Support VM to have internet connectivity.
#>
function Add-AzsCloudAction
{
Param(
[Parameter(Mandatory=$true)]
[string]
$SubsystemName,
[Parameter(Mandatory=$false)]
[nullable[DateTime]]
$Expiration,
[Parameter(Mandatory=$false)]
[string]
$Comments
)
try
{
if ($Expiration -eq $null)
{
$Expiration = (Get-Date).AddDays(8)
Write-Host "Expiration parameter not specified. Setting to default value $Expiration"
}
Write-Host "Adding Cloud Action..."
Write-Host "Parameters - SubsystemName: $SubsystemName Expiration: $Expiration Comments: $Comments"
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$mgmtAccessModel = Create-ManagementAccessModel -SubsystemName $SubsystemName -Expiration $Expiration -Comments $Comments
$addMgmtAccessTask = $subrControllerMgmtClient.AddorUpdateActionConsent($mgmtAccessModel, [System.Threading.CancellationToken]::None)
$addMgmtAccessTask.Wait()
[Microsoft.AzureStack.SupportBridge.Management.Client.Models.SubsystemAccessClientModel]$mgmtAccessDetails = $addMgmtAccessTask.Result
if ($mgmtAccessDetails -eq $null -or $mgmtAccessDetails.SubsystemName -eq $null)
{
Write-Error "Cloud action could not be added. This can happen if Cloud connection is not enabled. Try Enabling Cloud connection and then run this again."
}
else
{
Write-Host "Successfully added Cloud action."
Write-Output $mgmtAccessDetails
}
}
catch {
echo $_.Exception|format-list -force
Write-Error "Add-AzsCloudAction failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Removes Cloud action.
.DESCRIPTION
Removes Cloud action.
.EXAMPLE
The example below removes cloud action.
PS C:\> Remove-AzsCloudAction SubsystemName $name
.NOTES
Requires Support VM to have internet connectivity.
#>
function Remove-AzsCloudAction
{
Param(
[Parameter(Mandatory=$true)]
[string]
$SubsystemName
)
try
{
Write-Host "Removing Cloud action..."
Write-Host "Parameters - SubsystemName: $SubsystemName"
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$deleteMgmtAccessTask = $subrControllerMgmtClient.RemoveActionConsent($SubsystemName, [System.Threading.CancellationToken]::None)
$deleteMgmtAccessTask.Wait()
Write-Host "Successfully removed Cloud action."
}
catch {
echo $_.Exception|format-list -force
Write-Error "Remove-AzsCloudAction failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Gets Cloud actions.
.DESCRIPTION
Gets Cloud actions.
.EXAMPLE
The example below Gets Cloud actions.
PS C:\> Get-AzsCloudAction
.NOTES
Requires Support VM to have internet connectivity.
#>
function Get-AzsCloudAction
{
Param(
[Parameter(Mandatory=$false)]
[switch]
$IncludeExpired
)
try
{
Write-Host "Getting list of Cloud actions..."
Write-Host "Parameters - IncludeExpired: $IncludeExpired"
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$getMgmtAccessTask = $subrControllerMgmtClient.GetActionConsent($IncludeExpired, [System.Threading.CancellationToken]::None)
$getMgmtAccessTask.Wait()
[Microsoft.AzureStack.SupportBridge.Management.Client.Models.SubsystemAccessClientModel[]]$mgmtAccessDetails = $getMgmtAccessTask.Result
if ($mgmtAccessDetails -eq $null -or $mgmtAccessDetails.SubsystemName -eq $null)
{
Write-Host "Cloud actions list is empty. "
}
else
{
Write-Host "Successfully retrieved Cloud actions list."
Write-Output $mgmtAccessDetails
}
}
catch {
echo $_.Exception|format-list -force
Write-Error "Get-AzsCloudAction failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Enables Remote Support.
.DESCRIPTION
Enables Remote Support allows authorized Microsoft Support users to remotely access the device for diagnostics or repair depending on the access level granted.
.PARAMETER AccessLevel
Controls the remote operations that can be performed. This can be either Diagnostics or DiagnosticsAndRepair.
.PARAMETER ExpireInMinutes
Optional. Defaults to 8 hours.
.PARAMETER SasCredential
Optional. If provided by Microsoft Support, uses it to open remote support connection.
.PARAMETER AgreeToRemoteSupportConsent
Optional. If set to true then records user consent as provided and proceeds without prompt.
.EXAMPLE
The example below enables remote support for diagnostics only for 1 day. After expiration no more remote access is allowed.
PS C:\> Enable-RemoteSupport -AccessLevel Diagnostics -ExpireInMinutes 1440
.NOTES
Requires Support VM to have stable internet connectivity.
#>
function Enable-RemoteSupport
{
Param(
[Parameter(Mandatory=$true)]
[ValidateSet("Diagnostics","DiagnosticsRepair")]
[string]
$AccessLevel,
[Parameter(Mandatory=$false)]
[int]
$ExpireInMinutes = 480,
[Parameter(Mandatory=$false)]
[string]
$SasCredential,
[Parameter(Mandatory=$false)]
[switch]
$AgreeToRemoteSupportConsent
)
try
{
if ($ExpireInMinutes -lt 60)
{
Write-Error "ExpireInMinutes cannot be less than 1 hour(60 minutes)."
return;
}
if ($ExpireInMinutes -gt 20160)
{
Write-Error "ExpireInMinutes cannot exceed beyond 14 days(20160 minutes)."
return;
}
if ($AgreeToRemoteSupportConsent -ne $true)
{
Write-Host "`r`n`r`nBy approving this request, the Microsoft support organization or the Azure engineering team supporting this feature ('Microsoft Support Engineer') will be given direct access to your device for troubleshooting purposes and/or resolving the technical issue described in the Microsoft support case. `r`n`r`nDuring a remote support session, a Microsoft Support Engineer may need to collect logs. By enabling remote support, you have agreed to a diagnostic logs collection by Microsoft Support Engineer to address a support case You also acknowledge and consent to the upload and retention of those logs in an Azure storage account managed and controlled by Microsoft. These logs may be accessed by Microsoft in the context of a support case and to improve the health of Azure Stack Hub. `r`n`r`nThe data will be used only to troubleshoot failures that are subject to a support ticket, and will not be used for marketing, advertising, or any other commercial purposes without your consent. The data may be retained for up to ninety (90) days and will be handled following our standard privacy practices (https://privacy.microsoft.com/en-US/). Any data previously collected with your consent will not be affected by the revocation of your permission."
while(1)
{
Write-Host "`r`nProceed with enabling remote support?"
Write-Host "[Y] Yes [N] No: " -ForegroundColor Yellow -NoNewline
$confirmation = Read-Host
if ($confirmation -ieq 'Y' -or $confirmation -ieq 'YES')
{
break;
}
elseif ($confirmation -ieq 'N' -or $confirmation -ieq 'NO')
{
return;
}
}
}
# Arc Extension registry key check
$agentInstalltype = (Get-ItemProperty -Path 'HKLM:\SYSTEM\Software\Microsoft\AzureStack\Observability\RemoteSupport' -ErrorAction SilentlyContinue).InstallType
$arcExtensionRootPath = (Get-ItemProperty -Path 'HKLM:\SYSTEM\Software\Microsoft\AzureStack\Observability\RemoteSupport' -ErrorAction SilentlyContinue).ExtensionRootPath
$JeaConfigSource = "RegistrationModule"
if($agentInstalltype -eq "ArcExtension"){
if($(Get-Service "Observability Remote Support Agent" -ErrorAction SilentlyContinue).Status -eq "Running"){
$scriptPath = Join-Path -Path $arcExtensionRootPath -ChildPath 'Common\ConfigureJeaEndpoints.ps1'
$scriptArguments = " -Constants RemoteSupportConstants -JeaConfigSource $JeaConfigSource"
Write-Host "JEA configuration script path and arguments are : $scriptPath $scriptArguments"
Write-Host "Configuring JEA Endpoints from '$JeaConfigSource'"
# Configure JEA, will overwrite if JEA is already installed by startup task
if(Test-Path -Path $scriptPath){
Invoke-Expression -Command "& '$scriptPath' $scriptArguments"
}
}
}
$targetService = "PowerShell"
Write-Host "`r`n`r`Enabling Remote Support for '$AccessLevel' expiring in '$ExpireInMinutes' minutes."
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
if(![string]::IsNullOrEmpty($SasCredential)){
$mgmtAccessModel = Create-RemoteSupportAccessRequestModel -TargetService $targetService -AccessLevel $AccessLevel -ExpireInMinutes $ExpireInMinutes -SasCredential $SasCredential
}
else {
$mgmtAccessModel = Create-RemoteSupportAccessRequestModel -TargetService $targetService -AccessLevel $AccessLevel -ExpireInMinutes $ExpireInMinutes
}
$addMgmtAccessTask = $subrControllerMgmtClient.AddorUpdateRemoteSupportAccess($mgmtAccessModel, [System.Threading.CancellationToken]::None)
$addMgmtAccessTask.Wait()
[Microsoft.AzureStack.SupportBridge.Management.Client.Models.RemoteSupportAccessResponseClientModel]$mgmtAccessDetails = $addMgmtAccessTask.Result
if ($mgmtAccessDetails -eq $null)
{
Write-Error "Remote Support could not be Enabled."
}
else
{
Write-Host "Remote Support successfully Enabled."
Write-Output $mgmtAccessDetails
}
}
catch {
echo $_.Exception|format-list -force
Write-Error "Enable-RemoteSupport failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Disables Remote Support.
.DESCRIPTION
Disable Remote Support revokes all access levels previously granted. Any existing support sessions will be terminated, and new sessions can no longer be established.
.EXAMPLE
The example below disables remote support.
PS C:\> Disable-RemoteSupport
.NOTES
#>
function Disable-RemoteSupport
{
try
{
Write-Host "Disabling Remote Support."
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$disableRemoteSupportMgmtTask = $subrControllerMgmtClient.RevokeRemoteSupportAccess([System.Threading.CancellationToken]::None)
$disableRemoteSupportMgmtTask.Wait()
Write-Host "Remote Support successfully Disabled."
}
catch {
echo $_.Exception|format-list -force
Write-Error "Disable-RemoteSupport failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Gets Remote Support Access.
.DESCRIPTION
Gets remote support access.
.PARAMETER IncludeExpired
Optional. Defaults to false. Indicates whether to include past expired entries.
.EXAMPLE
The example below retrieves access level granted for remote support. The result will also include expired consents in the last 30 days.
PS C:\> List-RemoteSupportAccess -IncludeExpired $true
.NOTES
#>
function Get-RemoteSupportAccess
{
Param(
[Parameter(Mandatory=$false)]
[switch]
$IncludeExpired
)
try
{
Write-Host "Retrieving Remote Support access. IncludeExpired is set to '$IncludeExpired'"
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
$listRemoteSupportAccessMgmtTask = $subrControllerMgmtClient.ListRemoteSupportAccess($IncludeExpired, [System.Threading.CancellationToken]::None)
$listRemoteSupportAccessMgmtTask.Wait()
[Microsoft.AzureStack.SupportBridge.Management.Client.Models.RemoteSupportAccessResponseClientModel[]]$mgmtAccessDetails = $listRemoteSupportAccessMgmtTask.Result
if ($mgmtAccessDetails -eq $null -or $mgmtAccessDetails.Length -eq 0)
{
Write-Host "No remote support access exists. "
}
else
{
Write-Output $mgmtAccessDetails
}
}
catch {
echo $_.Exception|format-list -force
Write-Error "Get-RemoteSupportAccess failed with $_"
}
finally {
}
}
<#
.SYNOPSIS
Gets Remote Support Session History Details.
.DESCRIPTION
Session history represents all remote accesses made by Microsoft Support for either Diagnostics or DiagnosticsRepair based on the Access Level granted.
.PARAMETER SessionId
Optional. Session Id to get details for a specific session. If omitted then lists all sessions starting from date 'FromDate'.
.PARAMETER IncludeSessionTranscript
Optional. Defaults to false. Indicates whether to include complete session transcript. Transcript provides details on all operations performed during the session.
.PARAMETER FromDate
Optional. Defaults to last 7 days. Indicates date from where to start listing sessions from until now.
.PARAMETER MaxRecords
Optional. Limit the number of records to display. By default is set to 10. If lower or equal to 0, return the default. Including a sessionId will always just return 1 record
.PARAMETER AllRecords
Optional. Defaults to false. Indicates whether to display all records. Ignores the value of MaxRecords
.EXAMPLE
The example below retrieves session history with transcript details for the specified session.
PS C:\> Get-RemoteSupportSessionHistory -SessionId 467e3234-13f4-42f2-9422-81db248930fa -IncludeSessionTranscript $true
.EXAMPLE
The example below lists session history starting from last 7 days (default) to now.
PS C:\> Get-RemoteSupportSessionHistory
.NOTES
#>
function Get-RemoteSupportSessionHistory
{
Param(
[Parameter(Mandatory=$false)]
[string]
$SessionId,
[Parameter(Mandatory=$false)]
[switch]
$IncludeSessionTranscript,
[Parameter(Mandatory=$false)]
[DateTime]
$FromDate = (Get-Date).AddDays(-7),
[Parameter(Mandatory=$false)]
[int]
$MaxRecords = 10,
[Parameter(Mandatory=$false)]
[switch]
$AllRecords
)
try
{
if ($MaxRecords -le 0){
$MaxRecords = 10
}
$subrControllerMgmtClient = Create-SupportControllerMgmtClientWithServiceResolver
if($SessionId.Length -eq 0)
{
$currentTime = Get-Date;
if ($FromDate -gt $currentTime)
{
Write-Error "From date cannot be a date in future."
return;
}
[TimeSpan]$daysDifference = $currentTime - $FromDate;
$totalDays = [math]::Round($daysDifference.TotalDays)
if ($totalDays -gt 45)
{
Write-Error "From date cannot be past 45 days."
return;
}
Write-Host "Listing Session History for last '$totalDays' days."
$listRemoteSupportSessionMgmtTask = $subrControllerMgmtClient.ListRemoteSupportSession($FromDate, $false, [System.Threading.CancellationToken]::None)
$listRemoteSupportSessionMgmtTask.Wait()
[Microsoft.AzureStack.SupportBridge.Management.Client.Models.RemoteSupportSessionResponseClientModel[]]$listMgmtSessionDetails = $listRemoteSupportSessionMgmtTask.Result
if (-not $AllRecords) {
$listMgmtSessionDetails = $listMgmtSessionDetails | Sort-Object { [DateTime]$_.EndTime.DateTime } -Descending | Select-Object -First $MaxRecords
}
if ($listMgmtSessionDetails -eq $null -or $listMgmtSessionDetails.Length -eq 0)
{
Write-Host "No remote support session exists. "
}
else
{
Write-Output $listMgmtSessionDetails
}
}
else
{
Write-Host "Retrieving Session History for Id '$SessionId'. Include session transcript was set to '$IncludeSessionTranscript'"
$getRemoteSupportSessionMgmtTask = $subrControllerMgmtClient.GetRemoteSupportSession($SessionId, $IncludeSessionTranscript, [System.Threading.CancellationToken]::None)
$getRemoteSupportSessionMgmtTask.Wait()
[Microsoft.AzureStack.SupportBridge.Management.Client.Models.RemoteSupportSessionResponseClientModel]$getMgmtSessionDetails = $getRemoteSupportSessionMgmtTask.Result
if ($getMgmtSessionDetails -eq $null)
{
Write-Host "No remote support session with id '$SessionId' exists."
}
else
{
Write-Output $getMgmtSessionDetails
}
}
}
catch {
echo $_.Exception|format-list -force
Write-Error "Get-RemoteSupportSessionHistory failed with $_"
}
finally {
}
}
#Helper functions for creating remote management access objects.
function Create-ManagementAccessModel
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[string]
$SubsystemName,
[Parameter(Mandatory=$false)]
[DateTime]
$Expiration,
[Parameter(Mandatory=$false)]
[string]
$Comments
)
$mgmtAccessModel = New-Object -TypeName 'Microsoft.AzureStack.SupportBridge.Management.Client.Models.SubsystemAccessClientModel'
$mgmtAccessModel.SubsystemName = $SubsystemName
$mgmtAccessModel.ExpiresAt = $Expiration
$mgmtAccessModel.Comments = $Comments
Write-Output $mgmtAccessModel
}
#Helper functions for creating client model objects.
function Create-LogCollectionModel
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false)]
[string[]]
$FilterByRole,
[Parameter(Mandatory=$false)]
[string[]]
$FilterByResourceProvider,
[Parameter(Mandatory=$true)]
[DateTime]
$FromDate,
[Parameter(Mandatory=$true)]
[DateTime]
$ToDate,
[Parameter(Mandatory=$false)]
[bool]
$CollectSddc = $false,
[Parameter(Mandatory=$false)]
[string]
$SupplementaryLogs,
[Parameter(Mandatory=$false)]
[Guid]
$CorrelationId = [System.Guid]::Empty,
[Parameter(Mandatory=$false)]
[bool]
$SkipTestObservability = $false
)
$logCollectionModel = New-Object -TypeName 'Microsoft.AzureStack.SupportBridge.LogCollector.Client.Models.LogCollectionJobClientModel'
$logCollectionModel.FilterRoles = $FilterByRole
$logCollectionModel.FilterResourceProviders = $FilterByResourceProvider
$logCollectionModel.FromDate = $FromDate
$logCollectionModel.ToDate = $ToDate
$logCollectionModel.CollectSddc = $CollectSddc
$logCollectionModel.SupplementaryLogs = $SupplementaryLogs
$logCollectionModel.CorrelationId = $CorrelationId
$logCollectionModel.SkipTestObservability = $SkipTestObservability
Write-Output $logCollectionModel
}
function Get-LogCollectionStatus
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[Microsoft.AzureStack.SupportBridge.LogCollector.Client.Contract.ILogCollectorClient]
$SubrControllerClient,
[Parameter(Mandatory=$true)]
[string]
$OperationId
)
$collectionStatusTask = $SubrControllerClient.GetLogCollectionJobOperationStatus($OperationId, [System.Threading.CancellationToken]::None)
$collectionStatusTask.Wait()
$collectionStatus = $collectionStatusTask.Result
$collectionStatusRecord = $collectionStatus.StatusRecord
[Microsoft.AzureStack.Common.Operations.OperationState]$collectionState = $collectionStatusRecord.State
Write-Output $collectionState
}
#Helper functions for creating remote support access request object.
function Create-RemoteSupportAccessRequestModel
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[string]
$TargetService,
[Parameter(Mandatory=$true)]
[string]
$AccessLevel,
[Parameter(Mandatory=$true)]
[int]
$ExpireInMinutes,
[Parameter(Mandatory=$false)]
[string]
$SasCredential
)
$ExpiresAt=[system.datetimeoffset]::now.AddMinutes($ExpireInMinutes)
$mgmtRemoteSupportReqAccessModel = New-Object -TypeName 'Microsoft.AzureStack.SupportBridge.Management.Client.Models.RemoteSupportAccessRequestClientModel'
$mgmtRemoteSupportReqAccessModel.TargetService = $TargetService
$mgmtRemoteSupportReqAccessModel.AccessLevel = $AccessLevel
$mgmtRemoteSupportReqAccessModel.ExpiresAt = $ExpiresAt
if(![String]::IsNullOrWhiteSpace($SasCredential))
{
Write-Host "Using provided SAS credential to make remote support connection."
$mgmtRemoteSupportReqAccessModel.SasCredential = $SasCredential
}
Write-Output $mgmtRemoteSupportReqAccessModel
}
function Is-ASZ
{
$path = "HKLM:\SOFTWARE\Microsoft\AzureStack"
$name = "DeviceType"
$keyNotFound = $false
if (Test-Path $path)
{
$Key = Get-Item -LiteralPath $Path
if ($null -ne $Key.GetValue($Name))
{
$value = $Key.GetValue($Name)
if ($value -eq "AzureEdge" -or $value -eq "HCI")
{
return $true
}
else
{
return $false
}
}
else
{
$keyNotFound = $true
}
}
else
{
$keyNotFound = $true
}
if ($keyNotFound)
{
# could be that key doesn't exist because Hub environment or because ASZ deployment failed before the key was created.
# If failed in ASZ before key created, then cmdlets (get-logcollectionhistory, enable/disable proactive,
#get-proactivelogcollectionstate) will fail anyway, because observability agent isn't up.
Write-Host "DeviceType not found. Assuming DeviceType is not AzureEdge"
return $false
}
}
##### Send-DiagnosticData Helper Functions #######
function Is-ObservabilityAgentRunning
{
try
{
$service = get-service -name "AzureStack Observability Agent"
return ($service.Status -eq "Running")
}
catch
{
Write-Error "Could not get AzureStack Observability Agent service: $_"
return $false
}
}
function Is-GMARunning
{
# Note: If GMA is not present, the log collection will not fail. It will just delete
# logs without parsing them. Thus, we should throw failure without trying to collect logs
# if GMA is not running.
$processes = (gwmi win32_process|?{$_.name -like "*MonAgentHost*"}).CommandLine
$diagRunning = $false
$pattern = '-serviceIdentity "DiagnosticsPROD#AzureEdgeObs.*Diag#\w+"'
foreach ($process in $processes)
{
if ($process -match $pattern)
{
$diagRunning = $true
}
}
return $diagRunning
}
function Connect-ToSharePath
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$SharePath,
[Parameter(Mandatory=$true)]
[PSCredential]
$Credential
)
$bstr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($Credential.Password)
$password = [System.Runtime.InteropServices.Marshal]::PtrToStringAuto($bstr)
$drives = @('H', 'K', 'O', 'R', 'W')
foreach ($driveLetter in $drives)
{
$drive = $driveLetter + ":"
$null = net use $drive $SharePath /user:$($Credential.UserName) $password
if($LASTEXITCODE -ne 0)
{
Continue
}
if (Test-Path $SharePath)
{
return $drive
}
}
return $null
}
function Test-SupplementaryLogsPath
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$SupplementaryLogs,
[Parameter(Mandatory=$false)]
[PSCredential]
$ShareCredential,
[Parameter(Mandatory=$true)]
[string]
$ParameterSetName
)
# If parameter set is NoLogCollection, ShareCredential is for SupplementaryLogs.
# If parameter set is SaveToPath, the ShareCredential is for SaveToPath.
# If parameter set is LogCollectionAndParsing, ShareCredential is not allowed.
# Thus, only test mapping to SupplementaryLogs path using ShareCredential if parameter set is NoLogCollection.
if ($ParameterSetName -ieq "NoLogCollection" -and $ShareCredential)
{
$drive = Connect-ToSharePath -SharePath $SupplementaryLogs -Credential $ShareCredential
}
# Split Test-Path <path> -PathType Container into two statements, because -ErrorAction SilentlyContinue
# shows errors when it is all in one statement.
if ((Test-Path $SupplementaryLogs -ErrorAction SilentlyContinue) -and (Test-Path $SupplementaryLogs -PathType Container))
{
$validPath = $true
}
else
{
$validPath = $false
}
if ($null -ne $drive)
{
net use $drive /delete /yes
}
return $validPath
}
function Convert-ToUTC($date) {
if ($date.Kind -eq [System.DateTimeKind]::Utc) {
# Date is already in UTC, no need to convert
return $date
} else {
# Convert to UTC
return $date.ToUniversalTime()
}
}
Set-Alias -Name Send-AzureStackDiagnosticLogs -Value Send-AzureStackDiagnosticLog
$isASZ = Is-ASZ
if ($isASZ)
{
Export-ModuleMember -Function Send-DiagnosticData
Export-ModuleMember -function Get-LogCollectionHistory
Export-ModuleMember -Function Enable-ProactiveLogCollection
Export-ModuleMember -Function Disable-ProactiveLogCollection
Export-ModuleMember -Function Get-ProactiveLogCollectionState
Export-ModuleMember -Function Enable-RemoteSupport
Export-ModuleMember -Function Disable-RemoteSupport
Export-ModuleMember -Function Get-RemoteSupportAccess
Export-ModuleMember -Function Get-RemoteSupportSessionHistory
}
else
{
# if returns false, could be because Hub or because ASZ failed early in deployment.
# To Be safe, export everything.
Export-ModuleMember -Function Send-AzureStackDiagnosticLog
Export-ModuleMember -Function Send-DiagnosticData
Export-ModuleMember -function Get-LogCollectionHistory
Export-ModuleMember -Function Enable-ProactiveLogCollection
Export-ModuleMember -Function Disable-ProactiveLogCollection
Export-ModuleMember -Function Get-ProactiveLogCollectionState
Export-ModuleMember -Function Get-AzureStackSupportConfiguration
Export-ModuleMember -Function Enable-AzsCloudConnection
Export-ModuleMember -Function Disable-AzsCloudConnection
Export-ModuleMember -Function Add-AzsCloudAction
Export-ModuleMember -Function Remove-AzsCloudAction
Export-ModuleMember -Function Get-AzsCloudAction
Export-ModuleMember -Function Enable-RemoteSupport
Export-ModuleMember -Function Disable-RemoteSupport
Export-ModuleMember -Function Get-RemoteSupportAccess
Export-ModuleMember -Function Get-RemoteSupportSessionHistory
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAeVNCzuoJCz2Ij
# mMZHRWPFmgVJhIoNyHCpo8SkFt6Q4aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMUC8Wl6gcJMRPVzftp/sDwC
# YcYarF7upmA1Ip00c1CLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAqAKl6PmHfiRh6SIobgr6e8H+9cfA7Na2+FDuvF0vxaD5cyZEMZFphEYe
# iDp/TRrxO+E5IbtmgsIoW2UDUYLx5jc0xg/QJ3JnDcC36ixlGpwZTWPUC5K6nLA6
# 1NSdaDCfxajgWKb4iRKXCr6ptd0lC460GsKCezURHofCMyT7OZnvYfZ2s/PbKVPz
# cx6JWUcPmFo98b12aVx21leelnBEu67Dr1UxycUcwDjxLd8rKTB/gXIG2X/zyI8j
# qdmI2tdPki6N4otCEIRHuQxa1gHxrG69yYpXn8fDSPEWjUYSwDEPFiGhUTrPa0b0
# dPXSj/0rnl91TN2HL9OE0mJw+uVFJaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBlgXAL4gsxxqZO9C/SbdLkXayq64N8o5UcjBKMqhYT7AIGZjOi9qBA
# GBMyMDI0MDUxNjE4NDUzMC41MjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwlOQwIhgPMjAyNDA1MTYyMjIxMjRaGA8yMDI0MDUxNzIyMjEyNFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCU5AIBADAHAgEAAgIDNDAHAgEAAgIR4DAKAgUA
# 6fHmZAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAG+VAMqDDBPNfpk8NqBQ
# 9EfI3QALVxilTVzm2f8sZGczUwH16ZlVV7MgS6ax56QxSSn8P2CLOF1fIq+HJ6ln
# sp21yzaDX04sjp1GRCCiaFT6x1wYLzZhwfDN47udp8WvtbXg8kwtOKmgUnwnuKwd
# lfr05fu36lbj8eim3tEuiEP5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgMxFks0acDUd6SR/lhte6EtpxTuVJP+0ECbtnRBFe3fMwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d
# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I
# npafKEQ9AAEAAAHeMCIEICnl9ETHJ9vWnunVXqvOSncPhlKc69DXEXPDyFN2UUX2
# MA0GCSqGSIb3DQEBCwUABIICABl+PmscV4nDInn+ylHdB/WkhFnL+2GBkhLX/una
# L9vYRQjjuG/L3HqKxDNVbTZxsGJXQFXpi3ZCqDaZp/9P9FKmAzRpr6tzKvWlVr1d
# kcRsDxy+du7Rrs0pKUo/yF9+dZkWOssCvwS1QMUim2N5UD4qpMFFXP0xV3hpmaRn
# 8ztJZ6HEcclqrfzWLg1kyjZ7MofRNl90DPmGXdg0pvn8s0S3AHVD0JHxjaPQECUR
# TuvPXHhHNtrkakJRyjZPzHRtx/s/S5N45bKfDI/tRwZOV2lyDtiIQI2sNaYpmM4a
# MFBsyuE8Rkw7qDmo6Aryc7A5liCAwkBkmdmAm7OtOsxxvkL8MANDhFVJjDT9A2JV
# mZA+rLScpWuQJn1aE/KcdSL1BVMK+Dp/GqkmIzQjX6wltLVSijdRPtEHxvd3AQVN
# C5yAMCGW6lrXvWhTP95cYqGZoF7zk2YQ6rjTrsW7t1PfAdcFkqIZDh4zAKbC0N7d
# Ff4xNQQbRaQHfO/GG3qHefjcWY7CXImrVZ67j6QZZ5OYHPkLx3MmLf+pIJGineVo
# I7cjCPqPPq8xd66rEaaG8vrzvaMLEahLPjPPw/e/CbZPDEZ7snpeYqrI2U/5ABun
# GR/n7Ge53XrG0GkAYKh15F8eywHRDWQ9G8hAr8fJ2ZpAwuqYFwEgmKRIAouKik+A
# mhnd
# SIG # End signature block
|
combined_dataset/train/non-malicious/Set-Wallpaper (CTP3)_1.ps1
|
Set-Wallpaper (CTP3)_1.ps1
|
#requires -version 2.0
## Set-Wallpaper - set your windows desktop wallpaper
###################################################################################################
## Usage:
## Set-Wallpaper "C:\\Users\\Joel\\Pictures\\Wallpaper\\Dual Monitor\\mandolux-tiger.jpg" "Tile"
## ls *.jpg | get-random | Set-Wallpaper
## ls *.jpg | get-random | Set-Wallpaper -Style "Stretch"
###################################################################################################
## History:
## v0.5 First release (on #PowerShell@irc.freenode.net)
## v1.0 Public release (http://www.poshcode.org/488)
## - Added Style: Tile|Center|Stretch
## v1.1 (http://poshcode.org/491)
## - Added "NoChange" style to just use the style setting already set
## - Made the Style parameter to the cmdlet optional
## v2.0 This Release
## - Updated for CTP3, and made it run as a script instead of a function.
###################################################################################################
[CmdletBinding()]
Param(
[Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("FullName")]
[string]
$Path
,
[Parameter(Position=1, Mandatory=$false)]
$Style = "NoChange"
)
BEGIN {
try {
$WP = [Wallpaper.Setter]
} catch {
$WP = add-type @"
using System;
using System.Runtime.InteropServices;
using Microsoft.Win32;
namespace Wallpaper
{
public enum Style : int
{
Tile, Center, Stretch, NoChange
}
public class Setter {
public const int SetDesktopWallpaper = 20;
public const int UpdateIniFile = 0x01;
public const int SendWinIniChange = 0x02;
[DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)]
private static extern int SystemParametersInfo (int uAction, int uParam, string lpvParam, int fuWinIni);
public static void SetWallpaper ( string path, Wallpaper.Style style ) {
SystemParametersInfo( SetDesktopWallpaper, 0, path, UpdateIniFile | SendWinIniChange );
RegistryKey key = Registry.CurrentUser.OpenSubKey("Control Panel\\\\Desktop", true);
switch( style )
{
case Style.Stretch :
key.SetValue(@"WallpaperStyle", "2") ;
key.SetValue(@"TileWallpaper", "0") ;
break;
case Style.Center :
key.SetValue(@"WallpaperStyle", "1") ;
key.SetValue(@"TileWallpaper", "0") ;
break;
case Style.Tile :
key.SetValue(@"WallpaperStyle", "1") ;
key.SetValue(@"TileWallpaper", "1") ;
break;
case Style.NoChange :
break;
}
key.Close();
}
}
}
"@ -Passthru
}
}
PROCESS {
Write-Verbose "Setting Wallpaper ($Style) to $(Convert-Path $Path)"
$WP::SetWallpaper( (Convert-Path $Path), $Style )
}
|
combined_dataset/train/non-malicious/406.ps1
|
406.ps1
|
$license = New-PSFLicense -Product 'PSFramework' -Manufacturer 'Friedrich Weinmann' -ProductVersion $ModuleVersion -ProductType Module -Name MIT -Version "1.0.0.0" -Date (Get-Date -Year 2017 -Month 04 -Day 27 -Hour 0 -Minute 0 -Second 0) -Text @"
Copyright (c) Friedrich Weinmann
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
"@
$null = New-PSFLicense -Product 'Import-PSCmdlet' -Manufacturer 'Chris Dent' -ProductVersion '1.0.0.0' -ProductType Script -Name MIT -Version '1.0.0.0' -Date (Get-Date -Year 2018 -Month 05 -Day 16).Date -Text @"
Copyright (c) Chris Dent
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
"@ -Description @"
The PSFramework is happy to publish the Import-PSFCmdlet command, based on the
original work of Chris Dent's, 'Import-PSCmdlet'
Thank you for allowing its use :)
- Original Source: https://www.indented.co.uk/cmdlets-without-a-dll/
- Author blog: https://www.indented.co.uk/
"@ -Parent $license
$null = New-PSFLicense -Product 'Configuration-ExportPaths' -Manufacturer 'Joel Bennet' -ProductVersion '1.3.0' -ProductType Script -Name MIT -Version '1.0.0.0' -Date (Get-Date -Year 2018 -Month 05 -Day 16).Date -Text @"
Copyright (c) 2015 Joel Bennett
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
"@ -Description @"
The PSFramework is happy to base its internal path selection for configuration
exports on the original work of Joel Bennet's, 'Configuration' module.
Its implementation can be found in the internal script file:
internal/scripts/loadConfigurationPersisted.ps1
Thank you for allowing its use :)
- Original Source: https://github.com/PoshCode/Configuration
- Author blog: http://huddledmasses.org/blog/
- Author Twitter: https://twitter.com/jaykul?lang=en
"@ -Parent $license
|
combined_dataset/train/non-malicious/896.ps1
|
896.ps1
|
$Random=(New-Guid).ToString().Substring(0,8)
$ResourceGroupName="myResourceGroup$Random"
$AppName="AppServiceMonitor$Random"
$Location="WestUS"
New-AzResourceGroup -Name $ResourceGroupName -Location $Location
New-AzAppservicePlan -Name AppServiceMonitorPlan -ResourceGroupName $ResourceGroupName -Location $Location -Tier Basic
New-AzWebApp -Name $AppName -ResourceGroupName $ResourceGroupName -Location $Location -AppServicePlan AppServiceMonitorPlan
Set-AzWebApp -RequestTracingEnabled $True -HttpLoggingEnabled $True -DetailedErrorLoggingEnabled $True -ResourceGroupName $ResourceGroupName -Name $AppName
Invoke-WebRequest -Method "Get" -Uri https://$AppName.azurewebsites.net/404 -ErrorAction SilentlyContinue
Write-Host "In your browser, download the logs for your app at https://$AppName.scm.azurewebsites.net/api/dump"
|
combined_dataset/train/non-malicious/sample_9_99.ps1
|
sample_9_99.ps1
|
#************************************************
# TS_DetectLowPathMTU.ps1
# Version 1.0
# Date: 02/06/2014
# Author: BBenson
# Description:
# Rule number: 262755
# Rule ID: d2aaab92-c906-4b3e-a4e5-67244c49c422
# Rule URL: https://kse.microsoft.com/Contribute/Idea/de6654f5-8b05-4f97-b67b-f9ad51bc78ab
# Purpose:
# 1. Determine which network adapters are of type Ethernet with "netsh int ipv4 show int"
# 2. RootCause detected if any Ethernet adapter has a PMTU less than 1500 in the output of "netsh int ipv4 show destinationcache"
#************************************************
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_DetectLowPathMTU_Activity -Status $ScriptStrings.ID_DetectLowPathMTU_Status
#WV/WS2008+
if ($OSVersion.Build -gt 6000)
{
$RootCauseDetected = $false
$RootCauseName = "RC_DetectLowPathMTU"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
#-----ipv4
$OutputFileIPv4 = "DetectLowPathMTU_netsh-int-ipv4-show-int.TXT"
$NetSHCommandToExecute = "int ipv4 show int"
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFileIPv4 "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
$netshIPv4MTUSettings = Get-Content $OutputFileIPv4
[int]$netshIPv4MTUSettingsLen = $netshIPv4MTUSettings.length
#==========
# New section for detecting Ethernet adapters
#==========
$NetworkAdapterWMIQuery = "select * from win32_networkadapter"
$NetworkAdapterWMI = Get-CimInstance -query $NetworkAdapterWMIQuery
$NetworkAdapterWMILen = $NetworkAdapterWMI.length
# Creating NetAdapter psobject
$NetAdapterObj = New-Object psobject
$EtherAdapterNum = 0
#==========
# Read entire output file with contents from "netsh int ipv4 show int" into a PSObject.
#==========
# Creating IPv4MtuObj psobject
$ipObj = New-Object psobject
# find the line after the line of dashes
for ($i=0;$i -le $netshIPv4MTUSettingsLen;$i++){
#lines of interest after line that starts with dashes
$line = $null
$line = $netshIPv4MTUSettings[$i]
# Handling the first few lines by finding the line that starts with dashes
if ($line -match "---"){
$dashline = $i
$i++ #increment past the line of dashes
# all lines interesting after dash line
for ($j=1;$j -le $netshIPv4MTUSettingsLen;$j++){
#first line of interest
$line = $null
$line = $netshIPv4MTUSettings[$i]
if ($line -eq ""){
break
}
$delimiter = " "
$arrLine = [Regex]::Split($line, $delimiter)
$arrLineLen = $arrLine.length
$Idx = ""
$Met = ""
$MTU = ""
$State = ""
$Name = ""
$headerCounter = 0
for ($k=0;$k -le $arrLineLen;$k++){
#if non zero value, increment counter and proceed
if ($arrLine[$k] -ne ""){
#if headerCounter has been incremented, assign it to a variable.
if ($headerCounter -eq 0) { $Idx = $arrLine[$k] }
if ($headerCounter -eq 1) { $Met = $arrLine[$k] }
if ($headerCounter -eq 2) { $MTU = $arrLine[$k] }
if ($headerCounter -eq 3) { $State = $arrLine[$k] }
if ($headerCounter -eq 4){
$Name = $arrLine[$k]
do{
$k++
$Name = $Name + " " + $arrLine[$k]
} while($k -le $arrLineLen)
}
$headerCounter++
}
}
# define object
$psobj = New-Object psobject @{
"Idx" = $Idx
"Met" = $Met
"MTU" = $MTU
"State" = $State
"Name" = $Name
}
#create object
New-Variable -Name ('Int' + $Idx) -Value $psobj -Force
#add member
Add-Member -InputObject $ipObj -MemberType NoteProperty -Name "Int$Idx" -Value (get-variable -name Int$Idx).value -Force
#increment counter
$i++
}
}
#-----finding each interface in ipObj
$ipObjFile = "ipObj.TXT"
$ipObj | Format-List | Out-File $ipObjFile
$ipObjTxt = Get-Content $ipObjFile
[int]$ipObjTxtLen = $ipObjTxt.length
# "number of interfaces: " + $ipObjTxtLen
# loop through the lines of output, finding each interface number
for ($i=1;$i -le $ipObjTxtLen-1;$i++){
#==========
# Find Ethernet adapters with a LinkMTU of 1514
#==========
$netshIPv4PMTU = $null
if ($ipObjTxt[$i] -ne ""){
$line = $ipObjTxt[$i]
$delimiter = ":"
$arrLine = [Regex]::Split($line, $delimiter)
[string]$intID = ([string]$arrLine[0]).TrimEnd()
[string]$intName = ($ipObj.$intID.name).TrimEnd()
}
}
}
#-----finding each interface in ipObj
$ipObjFile = "ipObj.TXT"
$ipObj | Format-List | Out-File $ipObjFile
$ipObjTxt = Get-Content $ipObjFile
[int]$ipObjTxtLen = $ipObjTxt.length
# "number of interfaces: " + $ipObjTxtLen
# loop through the lines of output, finding each interface number
for ($i=1;$i -le $ipObjTxtLen-1;$i++){
#==========
# Find adapters from "netsh int ipv4 show int"
#==========
$netshIPv4PMTU = $null
if ($ipObjTxt[$i] -ne ""){
$line = $ipObjTxt[$i]
$delimiter = ":"
$arrLine = [Regex]::Split($line, $delimiter)
#"arrLine0: " + [string]$arrLine[0]
[string]$intID = ([string]$arrLine[0]).TrimEnd()
[string]$intName = ($ipObj.$intID.name).TrimEnd()
#==========
# Find Ethernet adapters that have less than 1500 bytes
#==========
#==========
# Create output file with contents from "netsh int ipv4 show destinationcache IdxNumber".
#==========
[int]$IdxNumber = $ipObj.$intID.Idx
$OutputFileIPv4PMTU = "TCPIP_netsh-int-ipv4-show-destinationcache-$IdxNumber.TXT"
#"filename: " + $OutputFileIPv4PMTU
$NetSHCommandToExecute = "int ipv4 show destinationcache " + $IdxNumber
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFileIPv4PMTU "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
# "[info] Created the output for Interface$IdxNumber" | WriteTo-Stdout
#==========
# Read entire output file with contents from "netsh int ipv4 show destinationcache IdxNumber" into a PSObject.
#==========
$netshIPv4PMTU = Get-Content $OutputFileIPv4PMTU
[int]$netshIPv4PMTULen = $netshIPv4PMTU.length
#==========
# Create output file with contents from "netsh int ipv4 show destinationcache IdxNumber".
# MTU reference: $ipObj.$intID.idx
# WMI reference: $NetworkAdapterWMI[$i].InterfaceIndex
# For each Ethernet adapter, detect any PMTU values below 1500.
#==========
for ($wmiAdapterCount=0;$wmiAdapterCount -le $NetworkAdapterWMILen;$wmiAdapterCount++){
if ( ($NetworkAdapterWMI[$wmiAdapterCount].AdapterType -eq "Ethernet 802.3") -and (($ipObj.$intID.idx -eq $NetworkAdapterWMI[$wmiAdapterCount].InterfaceIndex)) ){
#"==========WMI output=========="
#$NetworkAdapterWMI[$wmiAdapterCount]
$NetAdapterWMIID = $NetworkAdapterWMI[$wmiAdapterCount].DeviceID #Index
# "AdapterType= Ethernet 802.3 with InterfaceIndex of :" + $NetworkAdapterWMI[$wmiAdapterCount].InterfaceIndex
# " with Index of :" + $NetworkAdapterWMI[$wmiAdapterCount].Index
# " with DeviceID of :" + $NetAdapterWMIID
#create array here that contains the Ethernet adapters.
$EtherAdapterNum = $EtherAdapterNum + 1
#"Number of Ethernet Adapters: " + $EtherAdapterNum
Add-Member -InputObject $NetAdapterObj -MemberType NoteProperty -Name "$NetAdapterWMIID" -Value ($NetAdapterWMIID)
#==========
# Parse the output file to determine if there are any PMTU values below 1500.
#==========
# Creating IPv4MtuObj psobject
$pmtuObj = New-Object psobject
#"==========Check IPv4 DestinationCache for PMTU < 1500=========="
#"lines in destinationcache file: " + $netshIPv4PMTULen
# find the line after the line of dashes
for ($j=0;$j -le $netshIPv4PMTULen;$j++){
#lines of interest after line that starts with dashes
$line = $null
$line = $netshIPv4PMTU[$j]
# Handling the first few lines by finding the line that starts with dashes
if ($line -match "---"){
$dashline = $j
$j++ #increment past the line of dashes
# all lines interesting after dash line
for ($l=1;$l -le $netshIPv4PMTULen;$l++){
#first line of interest
$line = $null
$line = $netshIPv4PMTU[$j]
if ($line -eq ""){
break
}
$delimiter = " "
$arrLine = [Regex]::Split($line, $delimiter)
$PMTU = ""
$DestAddress = ""
$NextHop = ""
$headerCounter = 0
for ($k=0;$k -le $arrLineLen;$k++){
#if non zero value, increment counter and proceed
if ($arrLine[$k] -ne ""){
#if headerCounter has been incremented, assign it to a variable.
if ($headerCounter -eq 0) { $PMTU = $arrLine[$k] }
if ($headerCounter -eq 1) { $DestAddress = $arrLine[$k] }
if ($headerCounter -eq 2) { $NextHop = $arrLine[$k] }
if ($headerCounter -eq 3) { $What = $arrLine[$k] }
$headerCounter++
}
}
# define object
$psobj = New-Object psobject @{
"PMTU" = $PMTU
"DestAddress" = $DestAddress
"NextHop" = $NextHop
}
#create variable
New-Variable -Name ('PMTU' + $PMTU) -Value $psobj -Force
#add member
Add-Member -InputObject $pmtuObj -MemberType NoteProperty -Name "Int$Idx" -Value (get-variable -name PMTU$PMTU).value -Force
if ($PMTU -lt 1500){
# Problem detected.
$RootCauseDetected = $true
[int]$currentInterface = $ipObj.$intID.idx
add-member -inputobject $InformationCollected -membertype noteproperty -name "Interface $currentInterface" -value "Low Path MTU detected for connections on this adapter" -force #we# -force
"[info] Root Cause Detected: Low PMTU" | WriteTo-Stdout
<#
" Interface : " + $NetworkAdapterWMI[$wmiAdapterCount].InterfaceIndex
" PMTU <1500 : " + $PMTU
" DestAddress: " + $DestAddress
# " NextHop : " + $NextHop
#>
}
#increment counter
$j++
}
}
}
}
}
}
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if ($RootCauseDetected -eq $true){
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/314496" -InformationCollected $InformationCollected -Verbosity "Error" -Visibility 4 -SupportTopicsID 8041 -Component "Networking"
}
# *********************
# Root Cause processing
# *********************
if ($RootCauseDetected){
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
}else{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDB2zDlCMJP9m5G
# v0GSbPR1Un4hzsWH3lKZvITKmj1Z86CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMpYk56M5yZHZYAjmTRrjaJn
# Kb/pVXgd+/b6mXiePQ9dMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlrPlMgEr+3dFZT5o7neeVEqaz2ix3ATAvSkOG8A+M5vc6Wt3dwQpQQlL
# LPZygvb3j+8ryNtjVBU4EgQBkgx2kyhyIgI/Ze+mY6HnjvOgZR2u33E3Uq8AdYIO
# JGsyrm7Eq13+3ge4PxWvswXLxg7oTVxagvseIl2UCPHg1bJig7cASQ1myyIHAJNm
# ennMvAb98KW5evbNxEW3hZU+qVrb/LAjbK0wctg3QXbTCWV2unv2ii4m9Es5Is+7
# GF3scNx2CYLPW+SPKnHkZw7gk2gAzS6VQdW7e0vjbUzj6FHiOt86nqabBpesnjYk
# W2tjOHNBUaTJuaTU1dRTZYlItmSLpKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBZr7knvkdVv98gL6kzOUIcBFe3015Uo2YsS1hp+0KSzQIGZxp39n9k
# GBMyMDI0MTAyODExNDA0Mi4yOTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smTdjAiGA8yMDI0MTAyODA0Mzcx
# MFoYDzIwMjQxMDI5MDQzNzEwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZN2
# AgEAMAoCAQACAgsfAgH/MAcCAQACAhSeMAoCBQDqyuT2AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAACu8K1erSG3WA+KFwBfZzinNGLPeJwLYnFLBSgW0x8b
# Vs9wv8pBHL2TK6Pe23xtA/0uCwDBh6P5fC2xQb1j36fFn4yH74aFvokpslhV4n1k
# KIE8LqhplPRpGriSZ+s07DcVOeLDZ8jRV5RkN3/8myyj76R5HSgyZastSefkWLKh
# dgv1pa1yD8l6NbtcI69W0Viwz4WdjgqLTwtASbKYSOWtSz0xycvyKPGMldl/P7yr
# DnTw5N916Uubpcaa2OOV/GP1RGATQZoGg3+zPuKYYn2CEPlS/wpUPG/n2c5x80jT
# 3Rlh8SXd7wZxaZ9KVgMTavWz6I0tYfwtNUTabE9ovWkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAWUkj5PuXMQvSF8g+PP3rSsO3JgshJT/ARgxfUMX9X
# XTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgfk7yL/Fg+qwMxB83yRNFNNOG
# Ba29IheaFT2QvafHnF0wDQYJKoZIhvcNAQELBQAEggIASuvHq/e8kmIlxXD6zWRW
# ubVBMPgqxCPcDbVWpAp3oHEcWS96xfklBaNrVixOcMlvxqziPFzXP8lfliHNBMfX
# /JrbhMXh13yVa7UaD0eOpwOZ2T2SVSEnlViJZzzwKppGJFZs08bBiK6mUCPtVLXD
# qdVAXQxALOMM4kmoPnendDp1hufrNeTzJcDPaS5f9zztDuZdPYkJSSu6P9SYiLyg
# Qb6sLtvCYqaTyrZDrhwgJ6aU7rDPdQGITu3CNKnGRYgQnYa63hF6T5Hg23ybmaOZ
# lAdTb4MI+kK//u+9dmedisYEUgUVEQhJY+EJKBo1m2ijLMcbPZmapHNiP7N1hGce
# niucO9rCG+tdvx+bkLjS9n3LlKesWdPMRRmjvbfufmsfFk6iKcYmKztm1cbof7XH
# P/lWgBywpF1Tib1Es38n9ssz0ljo4dBxNf0I83slVvxnQFPMfYo/hoZg5oEpwq77
# C3GHbkLFUYulCkDfcXjcOnD7tYokvmDae4t7SaJbjJEBL5bcqOcRxhVun11vjwNm
# d+Pq3my77MYKDYCnuzARz7qeO8qLJWGX3THQBfbOJqU+y6CX+4uxxgxeIa3DCsP/
# FdtQuHZlZd4L4DW0Y9WPqQC7AVOknmJKdBJZT31z61t5sAwEmQESopbSHV67bG5b
# GOK+UdMjJXqA/QYUzZb5+EI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1424.ps1
|
1424.ps1
|
function Enable-CNtfsCompression
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[Alias('FullName')]
[string[]]$Path,
[Switch]$Recurse,
[Switch]$Force
)
begin
{
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$compactPath = Join-Path $env:SystemRoot 'system32\compact.exe'
if( -not (Test-Path -Path $compactPath -PathType Leaf) )
{
if( (Get-Command -Name 'compact.exe' -ErrorAction SilentlyContinue) )
{
$compactPath = 'compact.exe'
}
else
{
Write-Error ("Compact command '{0}' not found." -f $compactPath)
return
}
}
}
process
{
foreach( $item in $Path )
{
if( -not (Test-Path -Path $item) )
{
Write-Error -Message ('Path {0} not found.' -f $item) -Category ObjectNotFound
return
}
$recurseArg = ''
$pathArg = $item
if( (Test-Path -Path $item -PathType Container) )
{
if( $Recurse )
{
$recurseArg = ('/S:{0}' -f $item)
$pathArg = ''
}
}
if( -not $Force -and (Test-CNtfsCompression -Path $item) )
{
continue
}
Invoke-ConsoleCommand -Target $item -Action 'enable NTFS compression' -ScriptBlock {
& $compactPath /C $recurseArg $pathArg
}
}
}
}
|
combined_dataset/train/non-malicious/sample_36_7.ps1
|
sample_36_7.ps1
|
# Localized 06/28/2023 07:56 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1
ConvertFrom-StringData @'
###PSLOC
Troubleshoot_Title=Αντιμετώπιση προβλημάτων
Troubleshoot_DetectNetworkCache=Έλεγχος της cache δικτύου του Windows Media Player...
Resolution_Title=Ανάλυση
Resolution_ResetConfiguration=Επαναφορά όλων των ρυθμίσεων παραμέτρων...
Resolution_ResetNetworkCache=Επαναφορά παραμέτρων της cache δικτύου...
BinaryPath=Δυαδική διαδρομή
Version=Έκδοση
Report_Name_WMPInformation=Έγινε ανάλυση έκδοσης
Report_Description_WMPInformation=Πληροφορίες για το Windows Media Player
Report_Name_NetWorkCachedFile=Παράμετροι της cache
Report_Description_NetWorkCachedFile=Πληροφορίες για τις παραμέτρους της cache δικτύου του Windows Media Player
###PSLOC
'@
|
combined_dataset/train/non-malicious/sample_58_53.ps1
|
sample_58_53.ps1
|
#
# Module manifest for module 'OCI.PSModules.Operatoraccesscontrol'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll'
# Version number of this module.
ModuleVersion = '84.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment',
'Get-OCIOperatoraccesscontrolAccessRequest',
'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList',
'Get-OCIOperatoraccesscontrolAccessRequestsList',
'Get-OCIOperatoraccesscontrolAssignmentValidationStatus',
'Get-OCIOperatoraccesscontrolAuditLogReport',
'Get-OCIOperatoraccesscontrolInteractionsList',
'Get-OCIOperatoraccesscontrolOperatorAction',
'Get-OCIOperatoraccesscontrolOperatorActionsList',
'Get-OCIOperatoraccesscontrolOperatorControl',
'Get-OCIOperatoraccesscontrolOperatorControlAssignment',
'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList',
'Get-OCIOperatoraccesscontrolOperatorControlsList',
'Invoke-OCIOperatoraccesscontrolApproveAccessRequest',
'Invoke-OCIOperatoraccesscontrolInteractionRequest',
'Invoke-OCIOperatoraccesscontrolRejectAccessRequest',
'Invoke-OCIOperatoraccesscontrolReviewAccessRequest',
'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest',
'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment',
'Move-OCIOperatoraccesscontrolOperatorControlCompartment',
'New-OCIOperatoraccesscontrolOperatorControl',
'New-OCIOperatoraccesscontrolOperatorControlAssignment',
'Remove-OCIOperatoraccesscontrolOperatorControl',
'Remove-OCIOperatoraccesscontrolOperatorControlAssignment',
'Update-OCIOperatoraccesscontrolOperatorControl',
'Update-OCIOperatoraccesscontrolOperatorControlAssignment'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Split.ps1
|
Split.ps1
|
function Split {
<#
.Synopsis
Splits up a file into smaller files.
.Description
This function takes a file as input and splits it into files by a set number of
lines.
.Parameter filename
The name of the file to be used as an input.
This value can be piped to the function (see examples)
.Parameter lines
The number of lines per file.
.Parameter prefix
A prefix for the output filenames. Defaults to 'split.'
.Parameter extension
The file extension to use for output files.
.Example
# Simple split of a file.
Split -filename mybigfile.txt -lines 100
.Example
# Pass a number of files by pipeline, filtering out directories
ls | ?{-not $_.PSIsContainer} | %{$_.FullName} | Split -lines 100
#>
param([Parameter(Mandatory=$true,
ValueFromPipeLine=$true)]
[string]$filename,
[Parameter(Mandatory=$true)]
[int]$lines,
[Parameter(Mandatory=$false)]
[string]$prefix = 'split.',
[Parameter(Mandatory=$false)]
[string]$extension = 'txt')
if (-not (Test-Path $file)) {
Write-Host "$file not found!"
break
}
$increment = 0
$line = 0
Get-Content $file |
%{
$line += 1
if (-not ($lines % $line)) {
$increment += 1
}
$_ >> "$file.$increment.$extension"
}
}
|
combined_dataset/train/non-malicious/Highlight-Syntax _3.0.ps1
|
Highlight-Syntax _3.0.ps1
|
#requires -version 2.0
# Highlight-Syntax.ps1
# version 2.0
# by Jeff Hillman
#
# this script uses the System.Management.Automation.PsParser class
# to highlight PowerShell syntax with HTML.
param( [string] $code, [switch] $LineNumbers )
if ( Test-Path $code -ErrorAction SilentlyContinue )
{
$code = Get-Content $code | Out-String
}
$backgroundColor = "#DDDDDD"
$foregroundColor = "#000000"
$lineNumberColor = "#404040"
$PSTokenType = [System.Management.Automation.PSTokenType]
$colorHash = @{
# $PSTokenType::Unknown = $foregroundColor;
$PSTokenType::Command = "#C86400";
# $PSTokenType::CommandParameter = $foregroundColor;
# $PSTokenType::CommandArgument = $foregroundColor;
$PSTokenType::Number = "#800000";
$PSTokenType::String = "#800000";
$PSTokenType::Variable = "#000080";
# $PSTokenType::Member = $foregroundColor;
# $PSTokenType::LoopLabel = $foregroundColor;
# $PSTokenType::Attribute = $foregroundColor;
$PSTokenType::Type = "#404040";
$PSTokenType::Operator = "#C86400";
# $PSTokenType::GroupStart = $foregroundColor;
# $PSTokenType::GroupEnd = $foregroundColor;
$PSTokenType::Keyword = "#C86400";
$PSTokenType::Comment = "#008000";
$PSTokenType::StatementSeparator = "#C86400";
# $PSTokenType::NewLine = $foregroundColor;
$PSTokenType::LineContinuation = "#C86400";
# $PSTokenType::Position = $foregroundColor;
}
filter Html-Encode
{
$_ = $_ -replace "&", "&"
$_ = $_ -replace " ", " "
$_ = $_ -replace "<", "<"
$_ = $_ -replace ">", ">"
$_
}
# replace the tabs with spaces
$code = $code -replace "\\t", ( " " * 4 )
if ( $LineNumbers )
{
$highlightedCode = "<li style='color: $lineNumberColor; padding-left: 5px'>"
}
else
{
$highlightedCode = ""
}
$parser = [System.Management.Automation.PsParser]
$lastColumn = 1
$lineCount = 1
foreach ( $token in $parser::Tokenize( $code, [ref] $null ) | Sort-Object StartLine, StartColumn )
{
# get the color based on the type of the token
$color = $colorHash[ $token.Type ]
if ( $color -eq $null )
{
$color = $foregroundColor
}
# add whitespace
if ( $lastColumn -lt $token.StartColumn )
{
$highlightedCode += ( " " * ( $token.StartColumn - $lastColumn ) )
}
@@ $lastColumn = $token.EndColumn
switch ( $token.Type )
{
$PSTokenType::String {
$string = "<span style='color: {0}'>{1}</span>" -f $color,
( $code.SubString( $token.Start, $token.Length ) | Html-Encode )
# we have to highlight each piece of multi-line strings
if ( $string -match "\\r\\n" )
{
# highlight any line continuation characters as operators
$string = $string -replace "(``)(?=\\r\\n)",
( "<span style='color: {0}'>``</span>" -f $colorHash[ $PSTokenType::Operator ] )
$stringHtml = "</span><br />`r`n"
if ( $LineNumbers )
{
$stringHtml += "<li style='color: $lineNumberColor; padding-left: 5px'>"
}
$stringHtml += "<span style='color: $color'>"
$string = $string -replace "\\r\\n", $stringHtml
}
$highlightedCode += $string
break
}
$PSTokenType::NewLine {
$highlightedCode += "<br />`r`n"
if ( $LineNumbers )
{
$highlightedCode += "<li style='color: $lineNumberColor; padding-left: 5px'>"
}
$lastColumn = 1
++$lineCount
break
}
default {
if ( $token.Type -eq $PSTokenType::LineContinuation )
{
$lastColumn = 1
++$lineCount
}
$highlightedCode += "<span style='color: {0}'>{1}</span>" -f $color,
( $code.SubString( $token.Start, $token.Length ) | Html-Encode )
}
}
@@ #$lastColumn = $token.EndColumn
}
# put the highlighted code in the pipeline
"<div style='width: 100%; " +
"/*height: 100%;*/ " +
"overflow: auto; " +
"font-family: Consolas, `"Courier New`", Courier, mono; " +
"font-size: 12px; " +
"background-color: $backgroundColor; " +
"color: $foregroundColor; " +
"padding: 2px 2px 2px 2px; white-space: nowrap'>"
if ( $LineNumbers )
{
$digitCount = $lineCount.ToString().Length
"<ol start='1' style='border-left: " +
"solid 1px $lineNumberColor; " +
"margin-left: $( ( $digitCount * 10 ) + 15 )px; " +
"padding: 0px;'>"
}
$highlightedCode
if ( $LineNumbers )
{
"</ol>"
}
"</div>"
|
combined_dataset/train/non-malicious/Add-PrinterDriver.ps1
|
Add-PrinterDriver.ps1
|
#requires -version 2
function Add-PrinterDriver {
<#
.SYNOPSIS
Adds printer drivers to the local computer from a specified print server.
.DESCRIPTION
Adds printer drivers to the local computer from a specified print server. The function collects all shared printer objects from the specified print server and installs them on the local computer if not already installed. One mandatory parameter: PrintServer
.PARAMETER PrintServer
The name of the print server to add printer drivers from
.PARAMETER Clean
Switch parameter which deletes all network printer connections for the current user.
.EXAMPLE
Add-PrinterDriver -PrintServer srv01.domain.local
Add printer drivers from the specified print server
.EXAMPLE
Add-PrinterDriver -PrintServer srv01.domain.local -Clean
Add printer drivers from the specified print server, then removes all network printer connections for the current user.
.EXAMPLE
Add-PrinterDriver -PrintServer srv01.domain.local -Verbose
Add printer drivers from the specified print server with the -Verbose switch parameter
.NOTES
AUTHOR: Jan Egil Ring
BLOG: http://blog.powershell.no
LASTEDIT: 03.07.2011
You have a royalty-free right to use, modify, reproduce, and
distribute this script file in any way you find useful, provided that
you agree that the creator, owner above has no warranty, obligations,
or liability for such use.
#>
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true)]
[string] $PrintServer,
[switch] $Clean
)
#Collecting all shared printer objects from the specified print server
$allprinters = @(Get-WmiObject win32_printer -ComputerName $PrintServer -Filter 'shared=true')
#Defining all unique printer drivers from the specified print server
$drivers = @($allprinters | Select-Object drivername -Unique)
#Defining a collection containing the first printer object using a unique printer driver
$printers = @()
foreach ($item in $drivers){
$printers += @($allprinters | Where-Object {$_.drivername -eq $item.drivername})[0]
}
#Collecting locally installed drivers
$localdrivers = @()
foreach ($driver in (Get-WmiObject Win32_PrinterDriver)){
$localdrivers += @(($driver.name -split ",")[0])
}
#Initializing the CurrentPrinter variable for use with Write-Progress
$CurrentPrinter = 1
#Looping through the printer objects collection, installing those who are not already installed on the local computer
foreach ($printer in $printers) {
Write-Progress -Activity "Installing printers..." -Status "Current printer: $($printer.name)" -Id 1 -PercentComplete (($CurrentPrinter/$printers.count) * 100)
#Create hash-table for output object
$outputobject = @{}
$outputobject.drivername = $printer.drivername
$locallyinstalled = $localdrivers | Where-Object {$_ -eq $printer.drivername}
if (-not $locallyinstalled) {
Write-Verbose "$($printer.drivername) is not installed locally"
$AddPrinterConnection = Invoke-WmiMethod -Path Win32_Printer -Name AddPrinterConnection -ArgumentList ([string]::Concat('\\\\', $printer.__SERVER, '\\', $printer.ShareName)) -EnableAllPrivileges
$outputobject.returncode = $AddPrinterConnection.ReturnValue
}
else
{
Write-Verbose "$($printer.drivername) is already installed locally"
$outputobject.returncode = "Already installed"
}
#Create a new object for each driver, based on the outputobject hash-table
New-Object -TypeName PSObject -Property $outputobject
$CurrentPrinter ++
}
#Deletes all printer connections for the current user
if ($clean) {
$printers = Get-WmiObject Win32_Printer -EnableAllPrivileges -Filter network=true
if ($printers) {
foreach ($printer in $printers) {
$printer.Delete()
}
}
}
}
|
combined_dataset/train/non-malicious/sample_25_57.ps1
|
sample_25_57.ps1
|
#
# Module manifest for module 'OCI.PSModules.Containerengine'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Containerengine.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a2abf0e1-9176-4de5-88c9-38563bb69eee'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Containerengine Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Containerengine.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Complete-OCIContainerengineCredentialRotation',
'Disable-OCIContainerengineAddon', 'Get-OCIContainerengineAddon',
'Get-OCIContainerengineAddonOptionsList',
'Get-OCIContainerengineAddonsList', 'Get-OCIContainerengineCluster',
'Get-OCIContainerengineClusterMigrateToNativeVcnStatus',
'Get-OCIContainerengineClusterOptions',
'Get-OCIContainerengineClustersList',
'Get-OCIContainerengineCredentialRotationStatus',
'Get-OCIContainerengineNodePool',
'Get-OCIContainerengineNodePoolOptions',
'Get-OCIContainerengineNodePoolsList',
'Get-OCIContainerenginePodShapesList',
'Get-OCIContainerengineVirtualNode',
'Get-OCIContainerengineVirtualNodePool',
'Get-OCIContainerengineVirtualNodePoolsList',
'Get-OCIContainerengineVirtualNodesList',
'Get-OCIContainerengineWorkloadMapping',
'Get-OCIContainerengineWorkloadMappingsList',
'Get-OCIContainerengineWorkRequest',
'Get-OCIContainerengineWorkRequestErrorsList',
'Get-OCIContainerengineWorkRequestLogsList',
'Get-OCIContainerengineWorkRequestsList',
'Invoke-OCIContainerengineClusterMigrateToNativeVcn',
'Invoke-OCIContainerengineInstallAddon',
'New-OCIContainerengineCluster', 'New-OCIContainerengineKubeconfig',
'New-OCIContainerengineNodePool',
'New-OCIContainerengineVirtualNodePool',
'New-OCIContainerengineWorkloadMapping',
'Remove-OCIContainerengineCluster', 'Remove-OCIContainerengineNode',
'Remove-OCIContainerengineNodePool',
'Remove-OCIContainerengineVirtualNodePool',
'Remove-OCIContainerengineWorkloadMapping',
'Remove-OCIContainerengineWorkRequest',
'Start-OCIContainerengineCredentialRotation',
'Update-OCIContainerengineAddon',
'Update-OCIContainerengineCluster',
'Update-OCIContainerengineClusterEndpointConfig',
'Update-OCIContainerengineNodePool',
'Update-OCIContainerengineVirtualNodePool',
'Update-OCIContainerengineWorkloadMapping'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Containerengine'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_60_13.ps1
|
sample_60_13.ps1
|
#
# Module manifest for module 'OCI.PSModules.Psql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Psql.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Psql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList',
'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList',
'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem',
'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration',
'Get-OCIPsqlDefaultConfigurationsList',
'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList',
'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList',
'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList',
'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem',
'Move-OCIPsqlBackupCompartment',
'Move-OCIPsqlConfigurationCompartment',
'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup',
'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem',
'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration',
'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword',
'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem',
'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration',
'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Find sharable storage_1.ps1
|
Find sharable storage_1.ps1
|
# This function returns all datastores that can be shared amongst ESX hosts.
function Get-ShareableDatastore {
# Get all datastores.
$datastores = Get-Datastore
# Load the HostStorageSystems of all hosts.
$hosts = Get-VMHost | Get-View -property ConfigManager
$storageSystems = @()
foreach ($h in $hosts) {
$sdi = Get-View $h.ConfigManager.StorageSystem -Property StorageDeviceInfo
Write-Debug ("GSD: SDI for host $h is " + $sdi)
$storageSystems += $sdi
}
foreach ($dso in $datastores) {
$ds = $dso | Get-View -Property Info
# Check if this datastore is NFS.
$dsInfo = $ds.Info
Write-Debug ("GSD: Is it NFS? " + $dsInfo.getType())
if ($dsInfo -is [VMware.Vim.NasDatastoreInfo]) {
Write-Output $dso
continue
}
# Get the first extent of the datastore.
$firstExtent = $dsInfo.Vmfs.Extent[0]
Write-Debug ("GSD: first extent: " + $firstExtent.DiskName)
# Find a host that maps this LUN.
foreach ($hss in $storageSystems) {
$lun = $hss.StorageDeviceInfo.ScsiLun | Where { $_.CanonicalName -eq $firstExtent.DiskName }
if ($lun) {
Write-Debug ("GSD: found " + $lun.DeviceName + " on " + $hss.MoRef.Value)
Write-Debug ("GSD: LUN details: Name:" + $lun.DisplayName + ", Type:" + $lun.DeviceType + ", Vendor:" + $lun.Vendor + ", Model:" + $lun.Model)
# Search the adapter topology of this host, looking for the LUN.
$adapterTopology = $hss.StorageDeviceInfo.ScsiTopology.Adapter |
Where { $_.Target |
Where { $_.Lun |
Where { $_.ScsiLun -eq $lun.key }
}
} | Select -First 1
# We've found a host that has this LUN. Find how it maps to an adapter.
$adapter = $hss.StorageDeviceInfo.HostBusAdapter | Where { $_.Key -eq $adapterTopology.Adapter }
Write-Debug ("GSD: HBA type is: " + $adapter.getType())
# It's shared if it's Fibre Channel or iSCSI (we checked for NFS earlier)
if ($adapter -is [VMware.Vim.HostFibreChannelHba] -or $adapter -is [VMware.Vim.HostInternetScsiHba]) {
Write-Debug "GSO: $dso is sharable"
Write-Output $dso
}
# Otherwise it's not shared and we quit walking through hosts.
break
}
}
}
}
|
combined_dataset/train/non-malicious/sample_26_58.ps1
|
sample_26_58.ps1
|
<#
.SYNOPSIS
Deploys a Service Fabric application type to a cluster.
.DESCRIPTION
This script deploys a Service Fabric application type to a cluster. It is invoked by Visual Studio when deploying a Service Fabric Application project.
.NOTES
WARNING: This script file is invoked by Visual Studio. Its parameters must not be altered but its logic can be customized as necessary.
.PARAMETER PublishProfileFile
Path to the file containing the publish profile.
.PARAMETER ApplicationPackagePath
Path to the folder of the packaged Service Fabric application.
.PARAMETER DeloyOnly
Indicates that the Service Fabric application should not be created or upgraded after registering the application type.
.PARAMETER ApplicationParameter
Hashtable of the Service Fabric application parameters to be used for the application.
.PARAMETER UnregisterUnusedApplicationVersionsAfterUpgrade
Indicates whether to unregister any unused application versions that exist after an upgrade is finished.
.PARAMETER OverrideUpgradeBehavior
Indicates the behavior used to override the upgrade settings specified by the publish profile.
'None' indicates that the upgrade settings will not be overridden.
'ForceUpgrade' indicates that an upgrade will occur with default settings, regardless of what is specified in the publish profile.
'VetoUpgrade' indicates that an upgrade will not occur, regardless of what is specified in the publish profile.
.PARAMETER UseExistingClusterConnection
Indicates that the script should make use of an existing cluster connection that has already been established in the PowerShell session. The cluster connection parameters configured in the publish profile are ignored.
.PARAMETER OverwriteBehavior
Overwrite Behavior if an application exists in the cluster with the same name. Available Options are Never, Always, SameAppTypeAndVersion. This setting is not applicable when upgrading an application.
'Never' will not remove the existing application. This is the default behavior.
'Always' will remove the existing application even if its Application type and Version is different from the application being created.
'SameAppTypeAndVersion' will remove the existing application only if its Application type and Version is same as the application being created.
.PARAMETER SkipPackageValidation
Switch signaling whether the package should be validated or not before deployment.
.PARAMETER SecurityToken
A security token for authentication to cluster management endpoints. Used for silent authentication to clusters that are protected by Microsoft Entra ID (formerly known as Azure Active Directory).
.PARAMETER CopyPackageTimeoutSec
Timeout in seconds for copying application package to image store.
.EXAMPLE
. Scripts\Deploy-FabricApplication.ps1 -ApplicationPackagePath 'pkg\Debug'
Deploy the application using the default package location for a Debug build.
.EXAMPLE
. Scripts\Deploy-FabricApplication.ps1 -ApplicationPackagePath 'pkg\Debug' -DoNotCreateApplication
Deploy the application but do not create the application instance.
.EXAMPLE
. Scripts\Deploy-FabricApplication.ps1 -ApplicationPackagePath 'pkg\Debug' -ApplicationParameter @{CustomParameter1='MyValue'; CustomParameter2='MyValue'}
Deploy the application by providing values for parameters that are defined in the application manifest.
#>
Param
(
[String]
$PublishProfileFile,
[String]
$ApplicationPackagePath,
[Switch]
$DeployOnly,
[Hashtable]
$ApplicationParameter,
[Boolean]
$UnregisterUnusedApplicationVersionsAfterUpgrade,
[String]
[ValidateSet('None', 'ForceUpgrade', 'VetoUpgrade')]
$OverrideUpgradeBehavior = 'None',
[Switch]
$UseExistingClusterConnection,
[String]
[ValidateSet('Never','Always','SameAppTypeAndVersion')]
$OverwriteBehavior = 'Never',
[Switch]
$SkipPackageValidation,
[String]
$SecurityToken,
[int]
$CopyPackageTimeoutSec
)
function Read-XmlElementAsHashtable
{
Param (
[System.Xml.XmlElement]
$Element
)
$hashtable = @{}
if ($Element.Attributes)
{
$Element.Attributes |
ForEach-Object {
$boolVal = $null
if ([bool]::TryParse($_.Value, [ref]$boolVal)) {
$hashtable[$_.Name] = $boolVal
}
else {
$hashtable[$_.Name] = $_.Value
}
}
}
return $hashtable
}
function Read-PublishProfile
{
Param (
[ValidateScript({Test-Path $_ -PathType Leaf})]
[String]
$PublishProfileFile
)
$publishProfileXml = [Xml] (Get-Content $PublishProfileFile)
$publishProfile = @{}
$publishProfile.ClusterConnectionParameters = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("ClusterConnectionParameters")
$publishProfile.UpgradeDeployment = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("UpgradeDeployment")
if ($publishProfileXml.PublishProfile.Item("UpgradeDeployment"))
{
$publishProfile.UpgradeDeployment.Parameters = Read-XmlElementAsHashtable $publishProfileXml.PublishProfile.Item("UpgradeDeployment").Item("Parameters")
if ($publishProfile.UpgradeDeployment["Mode"])
{
$publishProfile.UpgradeDeployment.Parameters[$publishProfile.UpgradeDeployment["Mode"]] = $true
}
}
$publishProfileFolder = (Split-Path $PublishProfileFile)
$publishProfile.ApplicationParameterFile = [System.IO.Path]::Combine($PublishProfileFolder, $publishProfileXml.PublishProfile.ApplicationParameterFile.Path)
return $publishProfile
}
$LocalFolder = (Split-Path $MyInvocation.MyCommand.Path)
if (!$PublishProfileFile)
{
$PublishProfileFile = "$LocalFolder\..\PublishProfiles\Local.xml"
}
if (!$ApplicationPackagePath)
{
$ApplicationPackagePath = "$LocalFolder\..\pkg\Release"
}
$ApplicationPackagePath = Resolve-Path $ApplicationPackagePath
$publishProfile = Read-PublishProfile $PublishProfileFile
if (-not $UseExistingClusterConnection)
{
$ClusterConnectionParameters = $publishProfile.ClusterConnectionParameters
if ($SecurityToken)
{
$ClusterConnectionParameters["SecurityToken"] = $SecurityToken
}
try
{
[void](Connect-ServiceFabricCluster @ClusterConnectionParameters)
}
catch [System.Fabric.FabricObjectClosedException]
{
Write-Warning "Service Fabric cluster may not be connected."
throw
}
}
$RegKey = "HKLM:\SOFTWARE\Microsoft\Service Fabric SDK"
$ModuleFolderPath = (Get-ItemProperty -Path $RegKey -Name FabricSDKPSModulePath).FabricSDKPSModulePath
Import-Module "$ModuleFolderPath\ServiceFabricSDK.psm1"
$IsUpgrade = ($publishProfile.UpgradeDeployment -and $publishProfile.UpgradeDeployment.Enabled -and $OverrideUpgradeBehavior -ne 'VetoUpgrade') -or $OverrideUpgradeBehavior -eq 'ForceUpgrade'
if ($IsUpgrade)
{
$Action = "RegisterAndUpgrade"
if ($DeployOnly)
{
$Action = "Register"
}
$UpgradeParameters = $publishProfile.UpgradeDeployment.Parameters
if ($OverrideUpgradeBehavior -eq 'ForceUpgrade')
{
# Warning: Do not alter these upgrade parameters. It will create an inconsistency with Visual Studio's behavior.
$UpgradeParameters = @{ UnmonitoredAuto = $true; Force = $true }
}
if ($CopyPackageTimeoutSec)
{
Publish-UpgradedServiceFabricApplication -ApplicationPackagePath $ApplicationPackagePath -ApplicationParameterFilePath $publishProfile.ApplicationParameterFile -Action $Action -UpgradeParameters $UpgradeParameters -ApplicationParameter $ApplicationParameter -UnregisterUnusedVersions:$UnregisterUnusedApplicationVersionsAfterUpgrade -CopyPackageTimeoutSec $CopyPackageTimeoutSec -ErrorAction Stop
}
else
{
Publish-UpgradedServiceFabricApplication -ApplicationPackagePath $ApplicationPackagePath -ApplicationParameterFilePath $publishProfile.ApplicationParameterFile -Action $Action -UpgradeParameters $UpgradeParameters -ApplicationParameter $ApplicationParameter -UnregisterUnusedVersions:$UnregisterUnusedApplicationVersionsAfterUpgrade -ErrorAction Stop
}
}
else
{
$Action = "RegisterAndCreate"
if ($DeployOnly)
{
$Action = "Register"
}
if ($CopyPackageTimeoutSec)
{
Publish-NewServiceFabricApplication -ApplicationPackagePath $ApplicationPackagePath -ApplicationParameterFilePath $publishProfile.ApplicationParameterFile -Action $Action -ApplicationParameter $ApplicationParameter -OverwriteBehavior $OverwriteBehavior -SkipPackageValidation:$SkipPackageValidation -CopyPackageTimeoutSec $CopyPackageTimeoutSec -ErrorAction Stop
}
else
{
Publish-NewServiceFabricApplication -ApplicationPackagePath $ApplicationPackagePath -ApplicationParameterFilePath $publishProfile.ApplicationParameterFile -Action $Action -ApplicationParameter $ApplicationParameter -OverwriteBehavior $OverwriteBehavior -SkipPackageValidation:$SkipPackageValidation -ErrorAction Stop
}
}
|
combined_dataset/train/non-malicious/sample_35_71.ps1
|
sample_35_71.ps1
|
<#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
Import-Module $PSScriptRoot\AzStackHCI.StandaloneObservability.Helpers.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lvsTxt -FileName AzStackHCI.StandaloneObservability.Strings.psd1
<#
.SYNOPSIS
Sends daignostics data using standalone observability pipeline.
.DESCRIPTION
Sends diagnostics data using standalone observability pipeline.
PS C:\> Enter-PsSession -ComputerName <NodeName> -Credential $cred
PS C:\> Send-AzStackHciDiagnosticData
.PARAMETER ResourceGroupName
Azure Resource group name where temporary Arc resource will be created. This can be same parameter as used in AzS Deployment.
.PARAMETER SubscriptionId
Azure SubscriptionID where temporary Arc resource will be created. This can be same parameter as used in AzS Deployment.
.PARAMETER RegistrationRegion
Optional. Azure registration region where Arc resource will be created. This can be same parameter as used in AzS Deployment.
.PARAMETER DiagnosticLogPath
Diagnostic Log path which will be parsed and sent to Microsoft.
.PARAMETER Cloud
Optional. Azure Cloud name default: AzureCloud.
.PARAMETER CacheFlushWaitTimeInSec
Optional wait time to Flush the cache folder. default:600
.PARAMETER RegistrationCredential
Azure credentials used for authentication to register ArcAgent. Needed only for DefaultSet
.PARAMETER RegistrationWithDeviceCode
This is RegistrationWithDeviceCode switch to use device code for authentication.
.PARAMETER RegistrationWithExistingContext
This is RegistrationWithExistingContext switch to use existing Azure context on the local machine.
.PARAMETER RegistrationSPCredential
This is SPN crednetials used for authentication to register ArcAgent. Needed only for ServicePrincipal set
.EXAMPLE
The example below .
During Remote Support JEA configuration, WinRM will be restarted twice and that can break the PsSession to node if you are installing Remote Support remotely. In that case, connect to remote node again and execute Enable cmdlet again after 4-5 minutes.
PS C:\> Enter-PsSession -ComputerName <NodeName> -Credential $cred
PS C:\> Send-AzStackHciDiagnosticData
Processing data from remote server v-host1 failed with the following error message: The I/O operation has been aborted because of either a thread exit or an application request. For more information, see the about_Remote_Troubleshooting Help topic.
PS C:\> Enter-PsSession -ComputerName <NodeName> -Credential $cred
PS C:\> Send-AzStackHciDiagnosticData
.NOTES
Requires Support VM to have stable internet connectivity.
#>
function Send-AzStackHciDiagnosticData
{
[CmdletBinding(PositionalBinding = $false, DefaultParameterSetName = "Interactive")]
param(
[Parameter(Mandatory = $true)]
[System.String] $ResourceGroupName,
[Parameter(Mandatory = $true)]
[System.String] $SubscriptionId,
[Parameter(Mandatory = $true, ParameterSetName = "DefaultSet")]
[PSCredential] $RegistrationCredential,
[Parameter(Mandatory = $true, ParameterSetName = "Interactive")]
[Switch] $RegistrationWithDeviceCode,
[Parameter(Mandatory = $true, ParameterSetName = "PassThrough")]
[Switch] $RegistrationWithExistingContext,
[Parameter(Mandatory = $true, ParameterSetName = "ServicePrincipal")]
[PSCredential] $RegistrationSPCredential,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path -Path $_ -PathType Container })]
[System.String] $DiagnosticLogPath,
[Parameter(Mandatory=$false)]
[System.String] $RegistrationRegion = "eastus",
[Parameter(Mandatory=$false)]
[System.String] $ObsRootFolderPath = "C:\StdObservability",
[Parameter(Mandatory=$false)]
[System.String] $Cloud = "AzureCloud",
[Parameter(Mandatory=$false)]
[Int] $CacheFlushWaitTimeInSec = 600
)
# Fail if Arc Agent is already connected
$OperationType = $MyInvocation.MyCommand
$script:ErrorActionPreference = 'Stop'
$standaloneScriptsPath = "..\Obs\scripts"
Import-Module "$PSScriptRoot\$standaloneScriptsPath\StandaloneObservabilityHelper.psm1"
$TenantId = Get-TenantId -AzureEnvironment $Cloud -SubscriptionId $SubscriptionId
$skipArcForServer = $false
if(Test-IsArcAgentConnected)
{
$skipArcForServer = $true
}
$service = Get-Service "WatchdogAgent" -ErrorAction SilentlyContinue
if ($null -ne $service)
{
throw "Watchdog is present. Use the extension instead of this Cmdlet"
}
try
{
$LogSource = "AzStackHciEnvironmentChecker/StandaloneObservability"
$EventID = "19101"
Set-AzStackHciOutputPath -Path $ObsRootFolderPath -Source $LogSource
# Ensure we are elevated
if (Test-Elevation)
{
Log-Info -Message ($lvsTxt.ElevationModeInfo) -Type Info
}
else
{
Log-Info -Message ($lvsTxt.ElevationModeMsg) -Type Error -ConsoleOut
throw $($lvsTxt.ElevationModeErrMsg)
}
Test-ModuleUpdate -PassThru:$PassThru
# Call/Initialise reporting
$envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport
$envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport
Push-Location -Path "$PSScriptRoot\$standaloneScriptsPath"
if ($PSCmdlet.ParameterSetName -eq "ServicePrincipal") {
& .\Install-StandaloneObservability.ps1 -ResourceGroupName $ResourceGroupName `
-SubscriptionId $SubscriptionId `
-TenantId $TenantId `
-RegistrationSPCredential $RegistrationSPCredential `
-FactoryLogShare $DiagnosticLogPath `
-ObsRootFolderPath $ObsRootFolderPath `
-Cloud $Cloud `
-RegistrationRegion $RegistrationRegion `
-GcsRegion $RegistrationRegion `
-SkipArcForServer $skipArcForServer -ParseOnce | Out-Null
}
elseif ($PSCmdlet.ParameterSetName -eq "Interactive") {
& .\Install-StandaloneObservability.ps1 -ResourceGroupName $ResourceGroupName `
-SubscriptionId $SubscriptionId `
-TenantId $TenantId `
-Interactive `
-FactoryLogShare $DiagnosticLogPath `
-ObsRootFolderPath $ObsRootFolderPath `
-Cloud $Cloud `
-RegistrationRegion $RegistrationRegion `
-GcsRegion $RegistrationRegion `
-SkipArcForServer $skipArcForServer -ParseOnce | Out-Null
}
elseif ($PSCmdlet.ParameterSetName -eq "PassThrough") {
& .\Install-StandaloneObservability.ps1 -ResourceGroupName $ResourceGroupName `
-SubscriptionId $SubscriptionId `
-TenantId $TenantId `
-PassThrough `
-FactoryLogShare $DiagnosticLogPath `
-ObsRootFolderPath $ObsRootFolderPath `
-Cloud $Cloud `
-RegistrationRegion $RegistrationRegion `
-GcsRegion $RegistrationRegion `
-SkipArcForServer $skipArcForServer -ParseOnce | Out-Null
}
else {
& .\Install-StandaloneObservability.ps1 -ResourceGroupName $ResourceGroupName `
-SubscriptionId $SubscriptionId `
-TenantId $TenantId `
-RegistrationCredential $RegistrationCredential `
-FactoryLogShare $DiagnosticLogPath `
-ObsRootFolderPath $ObsRootFolderPath `
-Cloud $Cloud `
-RegistrationRegion $RegistrationRegion `
-GcsRegion $RegistrationRegion `
-SkipArcForServer $skipArcForServer -ParseOnce | Out-Null
}
Write-Host "Going to Wait for MA to flush the Cahce folder: $CacheFlushWaitTimeInSec"
Start-Sleep -Seconds $CacheFlushWaitTimeInSec
}
catch
{
$exception = $_
Log-Info -Message "" -ConsoleOut
Trace-Execution "$OperationType failed. $exception"
Trace-Execution "$($exception.ScriptStackTrace)"
$cmdletFailed = $true
throw $exception
}
finally
{
$Script:ErrorActionPreference = 'SilentlyContinue'
# Write result to StandaloneObs channel
Write-ETWLog -Source $LogSource -Message "Standalone Observability Status: $cmdletFailed" -EventId $EventID
# Write validation result to report object and close out report
$envcheckerReport | Add-Member -MemberType NoteProperty -Name 'StandaloneObservability' -Value $cmdletFailed -Force
$envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport
Write-AzStackHciEnvReport -report $envcheckerReport
if ($PSCmdlet.ParameterSetName -eq "ServicePrincipal") {
& .\Uninstall-StandaloneObservability.ps1 -RegistrationSPCredential $RegistrationSPCredential `
-Cloud $Cloud -SkipArcForServer $skipArcForServer | Out-Null
}
else {
$token = Get-AzAccessToken
if ($null -eq $token)
{
Write-Host "Token was null. Going to try to use Connect-AzAccount to get the token."
Connect-AzAccount -Credential $RegistrationCredential -Environment $Cloud -Tenant $TenantId -Subscription $SubscriptionId | Out-Null
$token = Get-AzAccessToken
}
& .\Uninstall-StandaloneObservability.ps1 -AccessToken $token.Token -SkipArcForServer $skipArcForServer | Out-Null
}
Pop-Location
}
}
function Get-TenantId
{
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[ValidateSet("AzureCloud", "AzureChinaCloud", "AzureGermanCloud", "AzureUSGovernment")]
[string] $AzureEnvironment = "AzureCloud",
[Parameter(Mandatory=$true)]
[string] $SubscriptionId
)
$commandName = $MyInvocation.MyCommand
$endpoints = Get-AzureURIs -AzureEnvironment $AzureEnvironment
$params = @{
UseBasicParsing = $true
ErrorAction = 'Stop'
Uri = $endpoints.ARMUri.TrimEnd('/') + "/subscriptions/${SubscriptionId}?api-version=1.0"
}
$response = try { Invoke-WebRequest @params } catch { $_.Exception.Response }
if ($response.StatusCode -eq [System.Net.HttpStatusCode]::NotFound) {
throw "[$commandName] SubscriptionId $SubscriptionId not found"
}
$header = $response.GetResponseHeader('WWW-Authenticate')
Write-Verbose "[$commandName] $header"
$guidPattern = "[0-9a-fA-F]{8}\-[0-9a-fA-F]{4}\-[0-9a-fA-F]{4}\-[0-9a-fA-F]{4}\-[0-9a-fA-F]{12}"
$tenantId = $header.Split(' ') | Where-Object { $_ -like '*authorization_uri*' } | Select-Object -First 1 | ForEach-Object { [Regex]::Matches($_, $guidPattern).Value }
if ([string]::IsNullOrEmpty($tenantId)) {
Write-Verbose "[$commandName] Response $($response | ConvertTo-Json -depth 5)"
throw "[$commandName] Unable to get tenantId for SubscriptionId $SubscriptionId"
}
Write-Verbose "[$commandName] Retrieved tenantId $tenantId"
return ,$tenantId
}
<#
.Synopsis
Builds graph and login endpoints for a given AzureEnvironment
#>
function Get-AzureURIs {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[ValidateSet("AzureCloud", "AzureChinaCloud", "AzureGermanCloud", "AzureUSGovernment")]
[string] $AzureEnvironment = "AzureCloud"
)
$commandName = $MyInvocation.MyCommand
$fullUri = "https://management.azure.com/metadata/endpoints?api-version=2023-01-01"
try {
$response = Invoke-RestMethod -Uri $fullUri -ErrorAction Stop -UseBasicParsing -TimeoutSec 30 -Verbose
} catch {
$message = "[$commandName] Error $($_.Exception)"
Write-Verbose $message
throw $message
}
$data = $response | Where name -EQ $AzureEnvironment
if (-not $data) {
throw New-Object NotImplementedException("Unknown environment type $AzureEnvironment")
}
# sample @{ GraphUri = "https://graph.windows.net/"; LoginUri = "https://login.microsoftonline.com/"; ManagementServiceUri = "https://management.core.windows.net/"; ARMUri = "https://management.azure.com/" }
$endpointProperties = @{
GraphUri = $data.graph
LoginUri = $data.authentication.loginEndpoint
ManagementServiceUri = $data.authentication.audiences[0]
ARMUri = $data.resourceManager
MsGraphUri = $data.microsoftGraphResourceId
}
Write-Verbose "[$commandName] AzureEnvironment $AzureEnvironment, EndpointProperties $($endpointProperties | ConvertTo-Json -Depth 2)"
return $endpointProperties
}
Export-ModuleMember -Function Send-AzStackHciDiagnosticData
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVCRpu7YutMYh/
# TcOaM8RE2Qm+crFsYdWKm7K5XcFXKqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINxa6G34sumx6ol9GC79uiSD
# 8QT5CmpG9f/R3+60nGyqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAaWQeViYHMJ6fiCiOsiLf3cgETZsR8Q49OkQqUydKnunHYyqiK4BJ8Go/
# Le+cUIp3b+HOX8lnj7PhcXTyntmy6026a+wDE4WPVaHiI5X1L6iUEZZtImB3LicO
# vTiRY08FvF8ppzXV90xTK1knjgoO0A9FEqb3HqWf+/9xQgzq09Q4BzI3Mv7QDNif
# +Op9whPAW8QAeiSIubFAJ6I+S8GD2pTtjpHjRIy9R74OdlhFPQbp+QC9NjERzlV/
# 3n7cVZCOpZyWErBVeaMyHnXCh8yGNBTfrfGxfRVeLBhYxrYLaUWvgSMr6F4BImLH
# ghOCTiueXAsWe6KAV3tFQ/GZCWZH/aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDMKFJYuXvz4Uv8KJGYomjLgJLFRdKMf+Q+atDfYV65RQIGZbqk0RXo
# GBMyMDI0MDIxMjE0MDUzMC4yNjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgU4CQddLgT87dEkVB1jysBXeWax0ei6YBYnEHNs+of4wwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICAKCmdpo8Y5Y4X/ykLe2gSXNGH+oLhasCVsGMIs5k
# tlvIJVr9rOb9q2cVb8LDFBD45FTaGDbkjm4eETiKJk4n98YFetE+c/33CLiRchK3
# V3GDdEqt59ZsjJOOVAhbhTj5UQ3w4q7Nx21wIz/l05QMLAEwkrNrPbbbGJ0jZH6L
# Crl+u+Qg/F4Qgfv1rBzTMzGvA7iIEoKuO7Slu79vJYpZ3ByQWE+u4U4aCgSoXZpR
# 5Ja5DctAsIrQQbvTj5NWx4FtTroddHuGg8parC/tTF9cnR77dOe6zySqLKnJxahY
# G5vqffQLGMdLRGbV1u9A7DFyrQBsh7H7OAoWq4YjYyPQ+o3V5jGopGRyH4qvEGpe
# xgmGGETxcB4fv7UZcfJeBjwk4WbtAuvz15spCUjGYdZnUrwEil+eZEDSowBOqnUs
# nYZcC9ldTwUmESW+yVuGv4YALsfRg8pJgBX9bVwJL6RUpyw27njD1QihqsnXBRls
# wbH4xo4kZ80XaEWd4z2qQ6e7nAGJRsmG+2G6Q5AzOOaH0PYdXytBHWK1ViCYxoE5
# gwu8UIvugxpAOE+qw1U7euJEcR1fEu7VMRrh6KPwQguvbGoudOXMDT50g9rrVwSJ
# vsb/oQCisuNyPfDnWjp4XVPoilElc+ui/Dp4mu14SBCx91BJtpVsi89zrAL0HsZW
# FoNK
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_61_90.ps1
|
sample_61_90.ps1
|
#
# Module manifest for module 'OCI.PSModules.Certificates'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Certificates.dll'
# Version number of this module.
ModuleVersion = '88.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2be0ad0a-0889-41e0-b5ab-448d9fc6f7c4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Certificates Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificates.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCICertificatesCaBundle',
'Get-OCICertificatesCertificateAuthorityBundle',
'Get-OCICertificatesCertificateAuthorityBundleVersionsList',
'Get-OCICertificatesCertificateBundle',
'Get-OCICertificatesCertificateBundleVersionsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificates'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4239.ps1
|
4239.ps1
|
function New-IPv4Range
{
param(
[Parameter(Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
Position=0)]
$StartIP,
[Parameter(Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
Position=2)]
$EndIP
)
$ip1 = ([System.Net.IPAddress]$StartIP).GetAddressBytes()
[Array]::Reverse($ip1)
$ip1 = ([System.Net.IPAddress]($ip1 -join '.')).Address
$ip2 = ([System.Net.IPAddress]$EndIP).GetAddressBytes()
[Array]::Reverse($ip2)
$ip2 = ([System.Net.IPAddress]($ip2 -join '.')).Address
for ($x=$ip1; $x -le $ip2; $x++) {
$ip = ([System.Net.IPAddress]$x).GetAddressBytes()
[Array]::Reverse($ip)
$ip -join '.'
}
}
function New-IPRange
{
[CmdletBinding(DefaultParameterSetName='CIDR')]
Param(
[parameter(Mandatory=$true,
ParameterSetName = 'CIDR',
Position=0)]
[string]$CIDR,
[parameter(Mandatory=$true,
ParameterSetName = 'Range',
Position=0)]
[string]$Range
)
if($CIDR)
{
$IPPart,$MaskPart = $CIDR.Split('/')
$AddressFamily = ([System.Net.IPAddress]::Parse($IPPart)).AddressFamily
$subnetMaskObj = [IPHelper.IP.Subnetmask]::Parse($MaskPart, $AddressFamily)
$StartIP = [IPHelper.IP.IPAddressAnalysis]::GetClasslessNetworkAddress($IPPart, $subnetMaskObj)
$EndIP = [IPHelper.IP.IPAddressAnalysis]::GetClasslessBroadcastAddress($IPPart,$subnetMaskObj)
$StartIP = [IPHelper.IP.IPAddressAnalysis]::Increase($StartIP)
$EndIP = [IPHelper.IP.IPAddressAnalysis]::Decrease($EndIP)
[IPHelper.IP.IPAddressAnalysis]::GetIPRange($StartIP, $EndIP)
}
elseif ($Range)
{
$StartIP, $EndIP = $range.split('-')
[IPHelper.IP.IPAddressAnalysis]::GetIPRange($StartIP, $EndIP)
}
}
function New-IPv4RangeFromCIDR
{
param(
[Parameter(Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
Position=0)]
$Network
)
$StrNetworkAddress = ($Network.split('/'))[0]
[int]$NetworkLength = ($Network.split('/'))[1]
$NetworkIP = ([System.Net.IPAddress]$StrNetworkAddress).GetAddressBytes()
$IPLength = 32-$NetworkLength
[Array]::Reverse($NetworkIP)
$NumberOfIPs = ([System.Math]::Pow(2, $IPLength)) -1
$NetworkIP = ([System.Net.IPAddress]($NetworkIP -join '.')).Address
$StartIP = $NetworkIP +1
$EndIP = $NetworkIP + $NumberOfIPs
If ($EndIP -isnot [double])
{
$EndIP = $EndIP -as [double]
}
If ($StartIP -isnot [double])
{
$StartIP = $StartIP -as [double]
}
$StartIP = ([System.Net.IPAddress]$StartIP).IPAddressToString
$EndIP = ([System.Net.IPAddress]$EndIP).IPAddressToString
New-IPv4Range $StartIP $EndIP
}
$runme =
{
param
(
[Object]
$IPAddress,
[Object]
$Creds,
[Bool]
$Allshares,
[Object]
$Command
)
$getcreds = $Creds
$Port = 135
$Socket = New-Object Net.Sockets.TcpClient
$Socket.client.ReceiveTimeout = 2000
$ErrorActionPreference = 'SilentlyContinue'
$Socket.Connect($IPAddress, $Port)
$ErrorActionPreference = 'Continue'
if ($Socket.Connected) {
$endpointResult = New-Object PSObject | Select-Object Host, PortOpen, LoggedOnUsers, LocalAdministrators, Members, SharesTested, FilesFound
$endpointResult.PortOpen = 'Open'
$endpointResult.Host = $IPAddress
$Socket.Close()
} else {
$portclosed = 'True'
}
$Socket = $null
if ($endpointResult.PortOpen -eq 'Open')
{
if ($command) {
Invoke-WmiMethod -Path Win32_process -Name create -ComputerName $IPAddress -Credential $getcreds -ArgumentList $Command
}
$proc = Get-WmiObject -ComputerName $IPAddress -Credential $getcreds -query "SELECT * from win32_process WHERE Name = 'explorer.exe'"
ForEach ($p in $proc) {
$temp = '' | Select-Object Computer, Domain, User
$user = ($p.GetOwner()).User
$domain = ($p.GetOwner()).Domain
if($user){
$username = "$domain\$user"
$endpointResult.LoggedOnUsers += "'$username' "
}
$arr = @()
$ComputerName = (Get-WmiObject -ComputerName $IPAddress -Credential $getcreds -Class Win32_ComputerSystem).Name
$wmi = Get-WmiObject -ComputerName $ComputerName -Credential $getcreds -Query "SELECT * FROM Win32_GroupUser WHERE GroupComponent=`"Win32_Group.Domain='$ComputerName',Name='Administrators'`""
if ($wmi -ne $null)
{
foreach ($item in $wmi)
{
$data = $item.PartComponent -split '\,'
$domain = ($data[0] -split '=')[1]
$name = ($data[1] -split '=')[1]
$arr += ("$domain\$name").Replace('"','')
$currentuser = ("$domain\$name").Replace('"','')
[Array]::Sort($arr)
if ($currentuser)
{
$endpointResult.Members += "'$currentuser' "
}
if ($currentuser -contains $username)
{
$endpointResult.LocalAdministrators += "'$currentuser' "
}
}
}
}
if (!$Allshares) {
$wmiquery = 'Select * from Win32_Share'
$availableShares = Get-WmiObject -Query $wmiquery -ComputerName $IPAddress -Credential($getcreds)
foreach ($share in $availableShares){
if ($share.Name -eq 'ADMIN$'){
$sharename = $share.Name
$endpointResult.SharesTested += "'$sharename' "
$drive = ($share.Path).Substring(0,1)
$path = (($share.Path).Substring(2)).Replace('\','\\')
$path = $path+'\\'
$path = $path.Replace('\\\\\\\\','\\')
$path = $path.Replace('\\\\\\','\\')
$path = $path.Replace('\\\\','\\')
$datesearch = (Get-Date).AddMonths(-1).ToString('MM/dd/yyyy')
$wmiquery = "SELECT * FROM CIM_DataFile WHERE Drive='"+$drive+":' AND Path='"+$path+"' AND Extension='exe' AND CreationDate > '"+$datesearch+"' "
Get-WmiObject -Query $wmiquery -ComputerName $IPAddress -Credential($getcreds) | foreach{ $filename = $_.Name; $endpointResult.FilesFound += "'$filename' "}
}
}
} else {
$wmiquery = 'Select * from Win32_Share'
$availableShares = Get-WmiObject -Query $wmiquery -ComputerName $IPAddress -Credential($getcreds)
foreach ($share in $availableShares){
if ($share.Name -ne 'IPC$'){
$sharename = $share.Name
$endpointResult.SharesTested += "'$sharename' "
$drive = ($share.Path).Substring(0,1)
$path = (($share.Path).Substring(2)).Replace('\','\\')
$path = $path+'\\'
$path = $path.Replace('\\\\\\\\','\\')
$path = $path.Replace('\\\\\\','\\')
$path = $path.Replace('\\\\','\\')
$datesearch = (Get-Date).AddMonths(-1).ToString('MM/dd/yyyy')
$wmiquery = "SELECT * FROM CIM_DataFile WHERE Drive='"+$drive+":' AND Path='"+$path+"' AND Extension='exe' AND CreationDate > '"+$datesearch+"' "
Get-WmiObject -Query $wmiquery -ComputerName $IPAddress -Credential($getcreds) | foreach{ $filename = $_.Name; $endpointResult.FilesFound += "'$filename' "}
}
}
}
}
return $endpointResult
}
function Invoke-WMIChecker
{
param
(
[Object]
$IPAddress,
[Object]
$IPRangeCIDR,
[Object]
$IPList,
[Object]
$Threads,
[Bool]
$Allshares,
[Object]
$Command,
[Object]
$username,
[Object]
$password
)
if ($username) {
$PSS = ConvertTo-SecureString $password -AsPlainText -Force
$getcreds = new-object system.management.automation.PSCredential $username,$PSS
} else {
$getcreds = Get-Credential
}
if ($IPList) {$iprangefull = Get-Content $IPList}
if ($IPRangeCIDR) {$iprangefull = New-IPv4RangeFromCIDR $IPRangeCIDR}
if ($IPAddress) {$iprangefull = $IPAddress}
Write-Output ''
Write-Output $iprangefull.count Total hosts read from file
$jobs = @()
$start = get-date
Write-Output `n"Begin Scanning at $start" -ForegroundColor Red
if (!$Threads){$Threads = 64}
$pool = [runspacefactory]::CreateRunspacePool(1, $Threads)
$pool.Open()
$endpointResults = @()
$jobs = @()
$ps = @()
$wait = @()
$i = 0
foreach ($endpoint in $iprangefull)
{
while ($($pool.GetAvailableRunspaces()) -le 0) {
Start-Sleep -milliseconds 500
}
$ps += [powershell]::create()
$ps[$i].runspacepool = $pool
[void]$ps[$i].AddScript($runme)
[void]$ps[$i].AddParameter('IPAddress', $endpoint)
[void]$ps[$i].AddParameter('Creds', $getcreds)
[void]$ps[$i].AddParameter('Allshares', $Allshares)
[void]$ps[$i].AddParameter('Command', $Command)
$jobs += $ps[$i].BeginInvoke();
$wait += $jobs[$i].AsyncWaitHandle
$i++
}
Write-Output 'Waiting for scanning threads to finish...' -ForegroundColor Cyan
$waitTimeout = get-date
while ($($jobs | Where-Object {$_.IsCompleted -eq $false}).count -gt 0 -or $($($(get-date) - $waitTimeout).totalSeconds) -gt 60) {
Start-Sleep -milliseconds 500
}
for ($y = 0; $y -lt $i; $y++) {
try {
$endpointResults += $ps[$y].EndInvoke($jobs[$y])
} catch {
write-warning "error: $_"
}
finally {
$ps[$y].Dispose()
}
}
$pool.Dispose()
$end = get-date
$totaltime = $end - $start
Write-Output "We scanned $($iprangefull.count) endpoints in $($totaltime.totalseconds) seconds" -ForegroundColor green
$endpointResults
}
|
combined_dataset/train/non-malicious/sample_67_94.ps1
|
sample_67_94.ps1
|
#
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
#Helper functions for PackageManagement DSC Resouces
Import-LocalizedData -BindingVariable LocalizedData -filename PackageManagementDscUtilities.strings.psd1
Function ExtractArguments
{
<#
.SYNOPSIS
This is a helper function that extract the parameters from a given table.
.PARAMETER FunctionBoundParameters
Specifies the hashtable containing a set of parameters to be extracted
.PARAMETER ArgumentNames
Specifies A list of arguments you want to extract
#>
Param
(
[parameter(Mandatory = $true)]
[System.Collections.Hashtable]
$FunctionBoundParameters,
#A list of arguments you want to extract
[parameter(Mandatory = $true)]
[System.String[]]$ArgumentNames
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$returnValue=@{}
foreach ($arg in $ArgumentNames)
{
if($FunctionBoundParameters.ContainsKey($arg))
{
#Found an argument we are looking for, so we add it to return collection
$returnValue.Add($arg,$FunctionBoundParameters[$arg])
}
}
return $returnValue
}
function ThrowError
{
<#
.SYNOPSIS
This is a helper function that throws an error.
.PARAMETER ExceptionName
Specifies the type of errors, e.g. System.ArgumentException
.PARAMETER ExceptionMessage
Specifies the exception message
.PARAMETER ErrorId
Specifies an identifier of the error
.PARAMETER ErrorCategory
Specifies the error category, e.g., InvalidArgument defined in System.Management.Automation.
#>
param
(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ExceptionName,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ExceptionMessage,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ErrorId,
[parameter(Mandatory = $true)]
[ValidateNotNull()]
[System.Management.Automation.ErrorCategory]
$ErrorCategory
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$exception = New-Object -TypeName $ExceptionName -ArgumentList $ExceptionMessage;
$errorRecord = New-Object -TypeName System.Management.Automation.ErrorRecord -ArgumentList ($exception, $ErrorId, $ErrorCategory, $null)
throw $errorRecord
}
Function ValidateArgument
{
<#
.SYNOPSIS
This is a helper function that validates the arguments.
.PARAMETER Argument
Specifies the argument to be validated.
.PARAMETER Type
Specifies the type of argument.
#>
[CmdletBinding()]
param
(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[string]$Argument,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[String]$Type,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[String]$ProviderName
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
switch ($Type)
{
"SourceUri"
{
# Checks whether given URI represents specific scheme
# Most common schemes: file, http, https, ftp
$scheme =@('http', 'https', 'file', 'ftp')
$newUri = $Argument -as [System.URI]
$returnValue = ($newUri -and $newUri.AbsoluteURI -and ($scheme -icontains $newuri.Scheme))
if ($returnValue -eq $false)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.InValidUri -f $Argument)`
-ErrorId "InValidUri" `
-ErrorCategory InvalidArgument
}
#Check whether it's a valid uri. Wait for the response within 2mins.
<#$result = Invoke-WebRequest $newUri -TimeoutSec 120 -UseBasicParsing -ErrorAction SilentlyContinue
if ($null -eq (([xml]$result.Content).service ))
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.InValidUri -f $Argument)`
-ErrorId "InValidUri" `
-ErrorCategory InvalidArgument
}#>
}
"DestinationPath"
{
$returnValue = Test-Path -Path $Argument
if ($returnValue -eq $false)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.PathDoesNotExist -f $Argument)`
-ErrorId "PathDoesNotExist" `
-ErrorCategory InvalidArgument
}
}
"PackageSource"
{
#Argument can be either the package source Name or source Uri.
#Check if the source is a uri
$uri = $Argument -as [System.URI]
if($uri -and $uri.AbsoluteURI)
{
# Check if it's a valid Uri
ValidateArgument -Argument $Argument -Type "SourceUri" -ProviderName $ProviderName
}
else
{
#Check if it's a registered package source name
$source = PackageManagement\Get-PackageSource -Name $Argument -ProviderName $ProviderName -verbose -ErrorVariable ev
if ((-not $source) -or $ev)
{
#We do not need to throw error here as Get-PackageSource does already
Write-Verbose -Message ($LocalizedData.SourceNotFound -f $source)
}
}
}
default
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.UnexpectedArgument -f $Type)`
-ErrorId "UnexpectedArgument" `
-ErrorCategory InvalidArgument
}
}
}
Function ValidateVersionArgument
{
<#
.SYNOPSIS
This is a helper function that does the version validation.
.PARAMETER RequiredVersion
Provides the required version.
.PARAMETER MaximumVersion
Provides the maximum version.
.PARAMETER MinimumVersion
Provides the minimum version.
#>
[CmdletBinding()]
param
(
[string]$RequiredVersion,
[string]$MinimumVersion,
[string]$MaximumVersion
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$isValid = $false
#Case 1: No further check required if a user provides either none or one of these: minimumVersion, maximumVersion, and requiredVersion
if ($PSBoundParameters.Count -le 1)
{
return $true
}
#Case 2: #If no RequiredVersion is provided
if (-not $PSBoundParameters.ContainsKey('RequiredVersion'))
{
#If no RequiredVersion, both MinimumVersion and MaximumVersion are provided. Otherwise fall into the Case #1
$isValid = $PSBoundParameters['MinimumVersion'] -le $PSBoundParameters['MaximumVersion']
}
#Case 3: RequiredVersion is provided.
# In this case MinimumVersion and/or MaximumVersion also are provided. Otherwise fall in to Case #1.
# This is an invalid case. When RequiredVersion is provided, others are not allowed. so $isValid is false, which is already set in the init
if ($isValid -eq $false)
{
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage ($LocalizedData.VersionError)`
-ErrorId "VersionError" `
-ErrorCategory InvalidArgument
}
}
Function Get-InstallationPolicy
{
<#
.SYNOPSIS
This is a helper function that retrives the InstallationPolicy from the given repository.
.PARAMETER RepositoryName
Provides the repository Name.
#>
Param
(
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]$RepositoryName
)
Write-Verbose -Message ($LocalizedData.CallingFunction -f $($MyInvocation.mycommand))
$repositoryobj = PackageManagement\Get-PackageSource -Name $RepositoryName -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
if ($repositoryobj)
{
return $repositoryobj.IsTrusted
}
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+xe8u4YoS6UEO
# jtW70wceL89huvuluOvdcbeefpOXLqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAmd
# iucWytu7com6rTFeQB6cjTe5Tct5wjRGfoLIQj7QMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAEqqgeiG9LC1qHX83qHDvT87R7GDDFD9RJKK2
# /qedcpDZ9Z1cNK7sE/9hMTxyT5j1OkEuCyV7T1N5HGdRoZ4HgYgH6wnzt4xBG/OW
# XDyX8zteNWLw++raXZj2GRag3PpTsTX/OX9/1Tspt8r9BWXaPYCOT3ffdIkq5aLv
# FF8NmMX5Gxqo88n7AXbV4oZZjmL2GQxzjMBvoTqnRhTJfgbbvnHupuDfC9yD1m/l
# GgsL4hVTMpU31OTjYounTwjWj0CAd6A4yTZ0sVPxvibf3UpXBoUW6AVh+aNMKGRi
# QJ06CBdEtC1X84S1DX0tukaWi3PmkqQjIuoWpQxs8IJdlhLzVqGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBhdQAZJ4GjUCSyy3ajl4eoRcxMZbriJbjq
# NeWRz+TAKgIGZk4HtMjcGBMyMDI0MDUyMzE2NDM1MS44NjJaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM
# wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI
# syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra
# GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn
# iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF
# LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl
# BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7
# rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg
# 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db
# USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f
# dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV
# PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph
# jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g
# 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT
# MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz
# /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d
# h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW
# zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1
# qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h
# sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q
# wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06
# 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0
# bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf
# SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOn515cwIhgPMjAyNDA1MjMyMjU2MjNaGA8yMDI0MDUy
# NDIyNTYyM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fnXlwIBADAHAgEAAgIF
# rTAHAgEAAgIRbDAKAgUA6fspFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AKLbQP2o2oYY1JaYkMBFHiXZsY2dNr0/C09TcOY4okFr9EZPWBhZV6P4pxnyiT+J
# FBgNnCf0rV64BS/LAdL48OdF6LLw39eOQ+18pq+ruk244YALqUlezhsROCUuwWIo
# pCP+4iHJ7w8/yqUgEXj6UhTVXf80wr/97vE9Q0CeAeQuMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA
# AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgwoZZru+Nc5ecB7fbWebCS19azMKOouBzPP9nuiXo
# +bQwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0
# Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIKYxqWzLp6lAlWWdYPqylv8U
# YBtFQXVckK407fyIPsfdMA0GCSqGSIb3DQEBCwUABIICAFLstsho2s8H61eGF0TE
# 2hHFH/EpoxmvjeWqHz97hZIzN87cmiMPE6BJqVugHLvQLd36SZfQ7UT2UcmhbBRM
# mBQLekDDocESoXux5DlNTSF1xpM4XByo1Y90/qgu2SQjb2KOBBlKQwHCjKL4NGOm
# cnaOIK4M5FZCYhzxYPtuHVFPJCyncv68KtMt9FDGO/3Qxj8P/jJ2ZKzpJiCs/r0U
# hagKACOwybD3fRdeW0J8Zbzz71keXznc3nrsnIMFYmtfDTGZy1fEr1SofSsHZMqi
# 5aYHQLJWZrJz7E95P1d/jYGwjzucUfEgixFbA4gjteL6SxYy9rzG+LiJTzNH93nI
# jkRHJ1mgvSDn+GcalESh/p8CumSiG4la48/XxsU9npwsP2H7tM4Q/80Hs4HIhRET
# FhLPKNEQXJYmwkCToEqxilMHN6h7nYf3NH4eefD61b5TyPoxhL+b9xwKQwJYwnQs
# ODRaWy8M0b1kz9mw8PFdIhpboqnXq0lblxDS4LbG0/dHQpq+9p7F9aVn3SHAny+5
# lRmrlnSEPRYiL4YqIX40wtniMNkzO+D5l/gLkw+BvTi/I2PDK8e0zAvv2R+acGKt
# ZQBsaMb32lPbXQKG0z63fBsf+/bDcb96NB5SexDviLyLvXDvQoK9w6G/r2vJ9306
# CsSDxaLZM+XLEQcUJJ8BCsXW
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_44.ps1
|
sample_48_44.ps1
|
@{
GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59"
Author = "PowerShell"
CompanyName = "Microsoft Corporation"
Copyright = "Copyright (c) Microsoft Corporation."
ModuleVersion = "7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion = "3.0"
CmdletsToExport = @(
'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml', 'Import-Clixml',
'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv', 'Import-Csv', 'Get-Culture',
'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger', 'Register-EngineEvent', 'Write-Error',
'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event', 'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression',
'Out-File', 'Unblock-File', 'Get-FileHash', 'Export-FormatData', 'Get-FormatData', 'Update-FormatData', 'New-Guid',
'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host', 'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json',
'ConvertTo-Json', 'Test-Json', 'Format-List', 'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown',
'Show-Markdown', 'Get-MarkdownOption', 'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object',
'Measure-Object', 'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output',
'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint', 'Get-PSBreakpoint',
'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession', 'Import-PSSession', 'Get-Random', 'Get-SecureRandom'
'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace', 'Disable-RunspaceDebug', 'Enable-RunspaceDebug',
'Get-RunspaceDebug', 'ConvertFrom-SddlString', 'Start-Sleep', 'Join-String', 'Out-String', 'Select-String',
'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan', 'Get-TraceSource', 'Set-TraceSource',
'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData', 'Get-UICulture', 'Get-Unique', 'Get-Uptime',
'Clear-Variable', 'Get-Variable', 'New-Variable', 'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose',
'Write-Warning', 'Invoke-WebRequest', 'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List',
'Out-GridView', 'Show-Command', 'Out-Printer'
)
FunctionsToExport = @()
AliasesToExport = @('fhx')
NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll")
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAbc+SIDDBnW2hE
# FvPuHa2APy0waA2/W/QuwFk+jse7fqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJwszrskmMGhggxOrqCLQp0w
# 85S/JQo0JJpUB2eyWICFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAmb7s60YdNYH1fwg2rcJ4GEChSvG/rBhGbqi+h8ak0+fIJ8PHAbe3o+DM
# eCk6BUw7MQHMhr+QlX48xMigZGwslE29LAKsFoXmGCe1eRaBaU+sCZ2NPW6gYnEX
# FCy5FiFzwT5R5QtMdbtpTDGDK+e7xN1NeYB3Jxg0lzXDaZf/Q1XpxyrMtfCdXHHY
# pc/oj2UT3NM3l/dkxNuisKporpevM/5JWjhpPKkdt2dpAO4kWs7rqM9I7GjnQ/9s
# +GWIuzwZzXBJiUXlIXesc6sYIhCGMAifDo6fZaXjowc75DYMnQY6systCBSVEakN
# nIFLUkitHaQTYdVb1V0Q91SZNtPGraGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBB0s2GmZv8YZXXWGJL5HqLGYU8afLNUdILrK0LiDfYHAIGZfLiXpKi
# GBMyMDI0MDQwOTIzMzY0Mi41NzdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cBM/jAiGA8yMDI0MDQwOTIzMjU1
# MFoYDzIwMjQwNDEwMjMyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpwEz+
# AgEAMAcCAQACAgUFMAcCAQACAhLlMAoCBQDpwZ5+AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAFSDY14N3Mh+ee3rMt8yNKIob7etD06huplZvq9MQcEm9sd2
# IwCVb2OAM0npW+vDqfe2iRy5dUq/4ubbql82Rsb48/DunMxczqLklNH7RzTv+itS
# E787LO58JXJmQ55onV/q6qlk3cmoxwvJM9weNSwzT0JA30FMjuz2fwPPTcAowDEK
# Y+ndrxZ5tIA8d75m4Mqr2P1GL6A+U33dPs/iYGT/SjWZelVM+RlKDVxnIle4Y+bT
# az5p8+5LbYuAhe6XZg0bxAaSzq21Q027WKSRELU52LJl0ooypH0xvCSMMiMoz/YG
# S3VRrb/UZX9Eo5N00QfzwfFDuXKnofC7gDRCZ3gxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCATi2+cTb8re5nYDezaFpaXgDru7KMyFEO49XsGUfLspzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgaFrF5LHEGY4yi4AlSQ/fTO1cM36c
# /ejauRhx8H1amdswDQYJKoZIhvcNAQELBQAEggIAAfx10pzRUuzEK5C60ANEogQn
# iuT1ouznVu+Jqf3bOgFjCA8dJRrubA8r6iUbhAarXoc7JKIeuWJKkuxry03bE4eg
# rt9ZW6y3jzJrDb988E4qcWuuhQ3N6DdIjyocoaSV2z2y0o1+RRtcVeST2upb7ExJ
# nsFS9awJYtfbN7px8GEdSXTReJWQrLXFtEF4aSXtLYFD40Bv5UfcZheSljL2Tg7P
# dzWS4jozP40YHGEKmJSN+aA8HQAT52Lvlt+/hudQn6f4PjLdL6xB6nBZhxMPws/c
# EFOA2qhix9Wlod/YZkAsmsXl9mxuD6B4c+MQWcL3p1ky/Tr3D7Rc75hBAfMWakyU
# 1myoWpbT9rkIIHW7z8rwvz735hEoURaubpIWHyEZa+esHtLWL82Llf6bHrQCM4da
# mxeu1MNIVJZ0lshADvZXAdl5OX5ntKxsofkiwFw6sLxmC1aUccFCPSSsqXT7GAz/
# 8MsuACeIW/dmLXFPErCraTiQH4F9DaOqcjNSScUthuJWZfRYQd9TPHTqKX79V664
# 0lzjsF/vbF6/8XceJ71AGRHBh5+Qirxbsvr0z/mOnS6kZZbR5uAnxPWrnAZz4Atq
# t8jeuifdHb6MVjoEYLlM5REM+/wyanbRzgeRtMoJdn++fAepZfeOfKyP0D8Ie0zx
# Z3vr5RBKHDXUZ4sd0G8=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3988.ps1
|
3988.ps1
|
function WaitforStatetoBeSucceded {
param([string]$resourceGroupName, [string]$namespaceName, [string]$drConfigName)
$createdMigrationConfig = Get-AzServiceBusMigration -ResourceGroup $resourceGroupName -Name $namespaceName
while ($createdMigrationConfig.MigrationState -ne "Active" -and $createdMigrationConfig.ProvisioningState -ne "Succeeded") {
Wait-Seconds 10
$createdMigrationConfig = Get-AzServiceBusMigration -ResourceGroup $resourceGroupName -Name $namespaceName
}
while ($createdMigrationConfig.PendingReplicationOperationsCount -ne $null -and $createdMigrationConfig.PendingReplicationOperationsCount -gt 0) {
Wait-Seconds 10
$createdMigrationConfig = Get-AzServiceBusMigration -ResourceGroup $resourceGroupName -Name $namespaceName
}
return $createdMigrationConfig
}
function WaitforStatetoBeSucceded_namespace {
param([string]$resourceGroupName, [string]$namespaceName)
$Getnamespace = Get-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName
while ($Getnamespace.ProvisioningState -ne "Succeeded") {
Wait-Seconds 10
$Getnamespace = Get-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName
}
}
function ServiceBusMigrationConfigurationTests {
$location_south = "South Central US"
$location_north = "North Central US"
$resourceGroupName = getAssetName
$namespaceName1 = getAssetName "ServiceBus-STDNamespace-"
$namespaceName2 = getAssetName "ServiceBus-PRENamespace-"
$authRuleName = getAssetName "ServiceBus-Namespace-AuthorizationRule"
$postmigrationName = getAssetName "PostMigration-Name-"
$nameQueue = getAssetName "Queue-"
$nameTopic = getAssetName "Topic-"
Write-Debug "Create resource group"
Write-Debug " Resource Group Name : $resourceGroupName"
New-AzResourceGroup -Name $resourceGroupName -Location $location_south -Force
Write-Debug " Create new ServiceBus namespace 1"
Write-Debug " Namespace 1 name : $namespaceName1"
$result1 = New-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName1 -Location $location_south -SkuName Standard
Assert-AreEqual $result1.Name $namespaceName1
Write-Debug " Create new ServiceBus namespace 2"
Write-Debug " Namespace 2 name : $namespaceName2"
$result2 = New-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName2 -Location $location_north -SkuName Premium
Assert-AreEqual $result2.Name $namespaceName2
Try {
Write-Debug " Get the created namespace within the resource group"
$createdNamespace1 = Get-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName1
Assert-AreEqual $createdNamespace1.Name $namespaceName1 "Namespace created earlier is not found."
Write-Debug " Get the created namespace within the resource group"
$createdNamespace2 = Get-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName2
Assert-AreEqual $createdNamespace2.Name $namespaceName2 "Namespace created earlier is not found."
Write-Debug "Create a Namespace Authorization Rule"
Write-Debug "Auth Rule name : $authRuleName"
$result = New-AzServiceBusAuthorizationRule -ResourceGroup $resourceGroupName -Namespace $namespaceName1 -Name $authRuleName -Rights @("Listen", "Send")
Assert-AreEqual $authRuleName $result.Name
Assert-AreEqual 2 $result.Rights.Count
Assert-True { $result.Rights -Contains "Listen" }
Assert-True { $result.Rights -Contains "Send" }
for ($count = 0; $count -lt 20 ; $count++) {
$queueName = getAssetName "Queue-"
$resultQueue = New-AzServiceBusQueue -ResourceGroupName $resourceGroupName -Namespace $namespaceName1 -Name $queueName
}
for ($count = 0; $count -lt 20 ; $count++) {
$topicName = getAssetName "Topic-"
$resultTopic = New-AzServiceBusTopic -ResourceGroupName $resourceGroupName -Namespace $namespaceName1 -Name $topicName -EnablePartitioning $TRUE
}
Write-Debug " Create and Start MigrationConfiguration"
$result = Start-AzServiceBusMigration -ResourceGroupName $resourceGroupName -Name $namespaceName1 -TargetNameSpace $result2.Id -PostMigrationName $postmigrationName
WaitforStatetoBeSucceded $resourceGroupName $namespaceName1
$completMigration = Complete-AzServiceBusMigration -ResourceGroupName $resourceGroupName -Name $namespaceName1
WaitforStatetoBeSucceded $resourceGroupName $namespaceName1
$GetPremiumNamespace = Get-AzServiceBusNamespace -ResourceGroup $resourceGroupName -NamespaceName $namespaceName2
$getQueueList = Get-AzServiceBusQueue -ResourceGroupName $resourceGroupName -Namespace $namespaceName2
Assert-AreEqual $getQueueList.Count 20 "Total Queue count not 20"
$getTopicList = Get-AzServiceBusTopic -ResourceGroupName $resourceGroupName -Namespace $namespaceName2
Assert-AreEqual $getTopicList.Count 20 "Total Topic count not 20"
WaitforStatetoBeSucceded_namespace $resourceGroupName $namespaceName2
WaitforStatetoBeSucceded $resourceGroupName $namespaceName1
}
Finally {
Write-Debug " Delete namespaces"
Remove-AzServiceBusNamespace -ResourceGroupName $resourceGroupName -Name $namespaceName1
Write-Debug " Delete namespaces"
Remove-AzServiceBusNamespace -ResourceGroupName $resourceGroupName -Name $namespaceName2
Write-Debug " Delete resourcegroup"
Remove-AzResourceGroup -Name $resourceGroupName -Force
}
}
|
combined_dataset/train/non-malicious/69.ps1
|
69.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-IntuneApplication(){
[cmdletbinding()]
param
(
$Name
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileApps"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") -and (!($_.'@odata.type').Contains("managed")) -and (!($_.'@odata.type').Contains("
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { (!($_.'@odata.type').Contains("managed")) -and (!($_.'@odata.type').Contains("
}
}
catch {
$ex = $_.Exception
Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-InstallStatusForApp {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
[string]$AppId
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileApps/$AppId/installSummary"
try
{
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
catch
{
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$Application = Get-IntuneApplication -Name "Microsoft Teams"
if($Application){
Get-InstallStatusForApp -AppId $Application.ID
}
|
combined_dataset/train/non-malicious/sample_10_48.ps1
|
sample_10_48.ps1
|
ConvertFrom-StringData @'
id_templateregkeycheck=Check for Registry Key
id_templateregkeycheckdesc=Checking if HKLM\\SOFTWARE\\Microsoft\\Test\\DetectRootCause exists
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA7h/3J0ap4oJZA
# EchgPVa0mWHY+0LdzC0ai3AveMWO96CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFNXS0thLIUy22tpt+HfKiKC
# zsu/jSNKPj1HUpuOFKyqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkIiilhHpA1XfLksge+RuYOEQEAxwaASTqxd6uoeAIAU9Csgwng110mEh
# rXAdRSFucTNvaAnOr5fFAPo/EZbRYQUxIRx5+rwD2s6AF0noieu4yIGvaBqMoHPY
# dbFNSVY4mNYHqLQmVoTXht3um/ibbyW0XlUMRCH05gDGjsFSNjudQ/6+26p0aCyX
# Pq0WEmliw5iNybwXKaki+Ywf3hzu06DezTjqP4HZJmOLpJr6p7pER1BH/gpP/lZe
# MtH/yys8zDfv002z0FnKymBgFpWpWlOQClB/UJO7ZeAmB1CUManaKLEsa4r6Mmgk
# R4f+oQ0aMCGpPkkWvBFnUkwaanRhWKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDK+wIeDXmml0V7sTeRsd6TJKBIuCdySwMnifgnXt6EDwIGZut4BYyI
# GBMyMDI0MTAyODExNDA0MS41MDVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJlLzxxlCMAAEAAAH1MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjY1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzO90cFQTWd/WP84IT7JM
# IW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot387LjE0TCiG93e6I0HzIFQ
# BnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxICfw5t/pTyIOHjKvo1lQOT
# WZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1DcmXjym2wFWv10sBH40aj
# Jfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMAao0SNR/R1J1Y6sLkiCJO
# 3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpTM4vc0xDLCmc6PGv03CtW
# u2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbBY5j+HvS0l3dXkjP3Hon8
# b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wou+T6Se6oa5LDiQgPTfWR
# /j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0PiaXsmgudNwVqn51zr+B
# i3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ884Yb9DFNcigmeVTYkyUXZ
# 6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvveU6p0+frthbF7MXv+i5q
# cD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRV4Hxb9Uo0
# oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAcwxmVPaA9xHf
# fuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/8/G6fGIQMr0zlpau8jy8
# 3I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4Lut4bbPfT0FEp77G76hh
# ysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6I0EnneotMqFs0Q3zHgVV
# r4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGaQnLzq+No8VEgq0UG7W1E
# LZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV5JtISBklTuVAlEkzXi9L
# IjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zSs+ul9WmzI0F8zImbhnZh
# UziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5WqXbS5s9OdMdUlW1gTI1
# r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q0Cycpa9QUH/Dy01k6tQo
# mNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSKCRoFE1Lkma31SyIaynbd
# YEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUiTWSKvv1DJadR1SUCO/Od
# 21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5YRg3WSBQCyjzdkvaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0MTAyOTAwNTA0NFowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEAAgIUjDAHAgEAAgIUCjAK
# AgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCjXPh2fTsMuBQC
# 04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3UQpZXoPQDP+vfvum15Jd
# ooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gSTwUk7hZ060ozBQBEDelh
# GRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3FyMaE9PqRohkoHLhl8vm
# IdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KORL3KvFgrx7XzEQvr2WlE
# waAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIBNChydfZETThcPXRdrz53
# AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgQmikBGm4oDbW
# 98SUKiP4dqhLRSdKw0OT587U5RN/D+4wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GThqaPNTCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9ZkJlLzxxlCMAAEAAAH1
# MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1KYILMA0GCSqGSIb3DQEB
# CwUABIICAAHbZyoeM2e/QynqG0kX7vrd7hnqqsQ0TMqQh0PxP03aWpJ/VEkH/5ha
# Ils1SNVu6aK9akwdEePkK+ZqgV97VKmAROIUjm7By7DtO17kWT3pxEs5uSkGjKHP
# xONeRbWeQ9q5jeEedzt7CHSuffSR13OfXH47lVDDVkMjnNPDYh96041N67DLKnJ1
# NYqJINNhUOAA9OpwBqZU37yNbWhbpVQIt6kv0Cvu+jQaLzI+1oQGuIaZJUPkEcYU
# 4UzX98JK83AcdU+A6N8XfV68eKL68Wh72R3Xg7DHiFlpEIdgSQIt7rsQ05SzVrL6
# eKmlMmZ7fFf4n9x7UK+tm/8O13vsMaedKiUnv7gambHb0cDAgOcOWQROs2xBgX3a
# 2rINePQMqOBddB4zTynpTXkkcDa3ruWqnRb5Hh3Wwx4a+rgKkwrGTdWNRDdovzkW
# uF/sZRatxEYobpl9SSMAVvj6FoimAp0IY7ZYGzRvogL5uZ3AsOdqJy30XT3K3QMf
# tRxRQodpV8vuFx8LJfmYrhjUiA+0u/JqALHf3LEIQqOtGx8R2FfjTdSMfumkMt7O
# j9VnF6EH/XhOyCNZdvHf2B+iSu98L4px6chAD5bgnA6RSoDkV/zQWLP3Ubfon1au
# raUum2ud7TGjFpoM/6qapUk/3w3+YO0ltbISDpXceltc2UcfaRjU
# SIG # End signature block
|
combined_dataset/train/non-malicious/where-in.ps1
|
where-in.ps1
|
function where-in {
[cmdletbinding()]
param (
[parameter(mandatory = $true,position = 1)]
[system.Collections.IEnumerable]$collection,
[parameter(position = 2)]
[scriptblock]$predicate ,
[parameter(valuefrompipeline = $true)]
$pipelineobject
)
process {
if ($predicate) {
foreach ($__ in $collection) {
if(&$predicate) {
write-Output $pipelineobject
break;
}
}
}
else {
if ($collection -contains $pipelineobject) {
write-Output $pipelineobject }
}
}
}
set-alias ?in where-in
$a = (1..10) , (1..10) | % { $_ }
$a | Where-in (3,4,8)
gps | where-in ("power","s") { $_.processname.startswith($__) }
function where-propertyin {
[cmdletbinding()]
param (
[parameter(mandatory = $true,position = 1)]
[system.Collections.IEnumerable]$collection,
[parameter(mandatory = $true,position = 2)]
[string] $propertyname,
[parameter(position = 3)]
[scriptblock]$predicate ,
[parameter(valuefrompipeline = $true)]
$pipelineobject
)
process {
if ($predicate) {
foreach ($__ in $collection) {
$_ = $pipelineobject.$propertyname
if(&$predicate) {
write-Output $pipelineobject
break;
}
}
}
else {
if ($collection -contains $pipelineobject.$propertyname) {
write-Output $pipelineobject }
}
}
}
set-alias ?.in where-propertyin
gps | where-propertyin ("powershell","svchost") processname
gps | where-propertyin ("power","s") processname { $_.startswith($__) }
|
combined_dataset/train/non-malicious/934.ps1
|
934.ps1
|
$apiVersion = "2015-04-08"
$resourceGroupName = "myResourceGroup"
$accountName = "mycosmosaccount"
$tableName = "table1"
$tableThroughputResourceName = $accountName + "/table/" + $tableName + "/throughput"
$tableThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/tables/settings"
$throughput = 500
$tableProperties = @{
"resource"=@{"throughput"=$throughput}
}
Set-AzResource -ResourceType $tableThroughputResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName `
-Name $tableThroughputResourceName -PropertyObject $tableProperties
|
combined_dataset/train/non-malicious/Get-MailboxesOverSizeLim.ps1
|
Get-MailboxesOverSizeLim.ps1
|
# -------------------------------------------------------------------------------
# Script: Get-MailboxesOverSizeLimit.ps1
# Author: Chris Brown
# Date: 04/04/2011 10:41:00
# Keywords:
# comments:
#
# Versioning
# 04/04/2011 CJB Initial Script
#
# -------------------------------------------------------------------------------
# ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠
# ~ ~ ~ Variables ~ ~ ~
# ~~ Mail Server Details ~~
$SmtpServer = "mailserver.yourdomain.local"
$FromAddress = "alerts@yourdomain.com"
$ToAddress = "HelpDesk@yourdomain.com"
$Subject = "[Exchange] Mailboxes over size limits"
#
#
# ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠ ♥ ♦ ♣ ♠
if ( (Get-PSSnapin -Name Microsoft.Exchange.Management.PowerShell.E2010 -ErrorAction SilentlyContinue) -eq $null) {
Write-Verbose "Exchange 2010 snapin is not loaded. Loading it now."
try { Add-PSSnapin Microsoft.Exchange.Management.PowerShell.E2010; Write-Verbose "Loaded Exchange 2010 snapin" }
catch { Write-Error "Could not load Exchange 2010 snapins!"; }
}
$overLimit = Get-Mailbox | Get-MailboxStatistics -WarningAction SilentlyContinue | Where {"ProhibitSend","MailboxDisabled" -contains $_.StorageLimitStatus}
if ($overLimit.Count -gt 0) {
$mailBody = $overLimit | ft DisplayName,TotalItemSize,StorageLimitStatus | Out-String
Send-MailMessage -Body $mailBody.ToString() -From $FromAddress -SmtpServer $SmtpServer -Subject $Subject -To $toAddress
} else {
"No results"
}
|
combined_dataset/train/non-malicious/Connect-LabManager.ps1
|
Connect-LabManager.ps1
|
function Ignore-SslErrors {
# Create a compilation environment
$Provider=New-Object Microsoft.CSharp.CSharpCodeProvider
$Compiler=$Provider.CreateCompiler()
$Params=New-Object System.CodeDom.Compiler.CompilerParameters
$Params.GenerateExecutable=$False
$Params.GenerateInMemory=$True
$Params.IncludeDebugInformation=$False
$Params.ReferencedAssemblies.Add("System.DLL") > $null
$TASource=@'
namespace Local.ToolkitExtensions.Net.CertificatePolicy {
public class TrustAll : System.Net.ICertificatePolicy {
public TrustAll() {
}
public bool CheckValidationResult(System.Net.ServicePoint sp,
System.Security.Cryptography.X509Certificates.X509Certificate cert,
System.Net.WebRequest req, int problem) {
return true;
}
}
}
'@
$TAResults=$Provider.CompileAssemblyFromSource($Params,$TASource)
$TAAssembly=$TAResults.CompiledAssembly
## We now create an instance of the TrustAll and attach it to the ServicePointManager
$TrustAll=$TAAssembly.CreateInstance("Local.ToolkitExtensions.Net.CertificatePolicy.TrustAll")
[System.Net.ServicePointManager]::CertificatePolicy=$TrustAll
}
function New-ObjectFromProxy {
param($proxy, $proxyAttributeName, $typeName)
# Locate the assembly for $proxy
$attribute = $proxy | gm | where { $_.Name -eq $proxyAttributeName }
$str = "`$assembly = [" + $attribute.TypeName + "].assembly"
invoke-expression $str
# Instantiate an AuthenticationHeaderValue object.
$type = $assembly.getTypes() | where { $_.Name -eq $typeName }
return $assembly.CreateInstance($type)
}
function Connect-LabManager {
param($server, $credential)
# Log in to Lab Manager's web service.
$server = "https://" + $server + "/"
$endpoint = $server + "LabManager/SOAP/LabManager.asmx"
$proxy = new-webserviceproxy -uri $endpoint -cred $credential
# Before continuing we need to add an Authentication Header to $proxy.
$authHeader = New-ObjectFromProxy -proxy $proxy -proxyAttributeName "AuthenticationHeaderValue" -typeName "AuthenticationHeader"
$authHeader.username = $credential.GetNetworkCredential().UserName
$authHeader.password = $credential.GetNetworkCredential().Password
$proxy.AuthenticationHeaderValue = $authHeader
return $proxy
}
# Examples:
# Run this command if your Lab Manager's certificate is untrusted but you want to connect.
# Ignore-SslErrors
# Connect to Lab Manager.
# $labManager = Connect-LabManager -server "demo.eng.vmware.com" -credential (get-credential)
# Find out what operations there are.
# $labManager | gm | where { $_.MemberType -eq "Method" }
# See http://www.vmware.com/pdf/lm30_soap_api_guide.pdf for help on arguments.
# List all library configurations.
# $labManager.ListConfigurations(1)
# Find all machines deployed from any library configuration.
# $labManager.ListConfigurations(1) | foreach { write-host ("For Configuration " + $_.id + ":"); $labManager.ListMachines($_.id) }
|
combined_dataset/train/non-malicious/Edit-File in Notepad++.ps1
|
Edit-File in Notepad++.ps1
|
<#
.Synopsis
Open a file for editing in notepad++
.Description
Opens one or more files in Notepad++, passing all the switches each time. Accepts filenames on the pipeline
.Notes
I took the "no" off the parameters, because in PowerShell you only need to enter just enough of the parameter name to differentiate ... this way each one is differentiatable by the first letter.
.Link
http://notepad-plus.sourceforge.net/uk/cmdLine-HOWTO.php
.Link
http://notepad-plus.sourceforge.net/
.Link
http://poshcode.org/notepad++lexer/
.Example
Edit-File $Profile -MultiInstance -SessionOff -TabBarOff -PluginsOff
Open your Profile in a new Notepad++ window in a "notepad" like mode: multi-session, no tab bars, no previous files, no plugins.
.Example
ls *.ps1 | Edit-File -SessionOff
Open all the ps1 scripts in Notepad++ without restoring previous files.
.Example
Edit-File -language xml ~\\Projects\\Project1\\Project1.csproj
Open the file Project1.csproj as a xml file, even though its extension is not recognized as xml...
.Parameter File
The absolute or relative path of file(s) you want to open, accepts wildcards
.Parameter MultiInstance
Notepad++ is unique instance by default. This option allows you to launch several instances of Notepad++.
.Parameter PluginsOff
Use this parameter to launch Notepad++ without loading the plugins. This parameter is useful when you want to determinate where the bad behaviour or crash come from (from the plugins or from Notepad++ itself).
.Parameter Language
This option applies the specified Language to the filesToOpen to open, allowing you to specify XML for csproj files, for example.
Valid Languages are : c, cpp, java, cs, objc, rc, html, javascript, php, vb, sql, xml, asp, perl, pascal, python, css, lua, batch, ini, nfo, tex, fortran, bash, actionscript and nsis.
.Parameter Number
Cause Notepad++ to go to the LineNumber you want after opening the file
.Parameter SessionOff
Launch Notepad++ without loading the previous session (the files opened in Notepad++ last time).
.Parameter ReadOnly
Open files in read only mode. (Alias: RO)
.Parameter TabBarOff
Turn off the tab interface. Useful if you want a minimalist session ...
#>
[CmdletBinding()]
Param(
[Parameter(ValueFromPipelineByPropertyName=$true,Position=1)]
[Alias("FullName","LiteralPath","Path")]
[string[]]
$File
,
[Parameter()]
[switch]$MultiInstance
,
[Parameter()]
[switch]$PluginsOff
,
[Parameter()]
[string]$Language
,
[Parameter(Position=2)]
[int]$Number
,
[Parameter()]
[switch]$SessionOff
,
[Parameter()]
[Alias("RO")]
[Switch]$ReadOnly
,
[Parameter()]
[Switch]$TabBarOff
)
BEGIN {
$npp = "C:\\Programs\\DevTools\\Notepad++\\notepad++.exe"
$param = @(
if($MultiInstance) { "-multiInst" }
if($PluginsOff) { "-noPlugin" }
if($Language) { "-l$Language" }
if($Number) { "-n$Number" }
if($SessionOff) { "-nosession" }
if($ReadOnly) { "-ro" }
if($TabBarOff) { "-notabbar" }
" "
) -join " "
}
PROCESS {
foreach($path in $File) {
foreach($f in Convert-Path (Resolve-Path $path)) {
$parameters = $param + """" + + """"
write-verbose "$npp $parameters"
[Diagnostics.Process]::Start($npp,$parameters).WaitForInputIdle(500)
}
}
}
|
combined_dataset/train/non-malicious/LoadModuleConfig_2.ps1
|
LoadModuleConfig_2.ps1
|
################################################################################
## Script Name: LoadModuleConfig
## Created On: 01/21/2010
## Author: Thell Fowler
## File: LoadModuleConfig.ps1
## Usage: Called from the NestedModules value from a module manifest.
## Version: 1.0.1.0
## Purpose: Provides automated loading of local configuration data.
##
## Requirements: PowerShell Version 2
## Last Updated: 01/23/2010
## History:
## 1.0.1.0 01/21/2010 - TBF - Made Add-Member calls forceful.
## 1.0.0.0 01/21/2010 - TBF - Initial implementation.
##
##
################################################################################
<#
To make use of this script use new-modulemanifest to create a manifest named
the with the same name as the manifest you are loading data for but with an
extension of 'config.psd1'
Enter LoadModuleConfig.ps1 in the NestedModules field.
After creating the manifest open it in your editor and edit the PrivateData
field to include hashes for LocalUser and Settings. After the Settings key
add values as you see fit.
Here is an example, as used in the FuncGuard module.
# Private data to pass to the module specified in ModuleToProcess
PrivateData = @{
"LocalUser" = @{
"Settings"=@{
"ActiveConfiguration" = "PSUnit"
"Configurations"=@{
"PSUnit" =@{
"Name"="PSUnit";
"Path"=$(join-path -Path $Env:Temp -ChildPath "FuncGuard.PSUnit");
"Prefix"="PSUNIT"
}
}
}
}
}
After loading the module a global variable will be available with a name
convention of $($ModuleName)Settings and the values can be accessed using
normal hash retrieval.
$config = $FuncGuardSettings["Configurations"].$($FuncGuardSettings["ActiveConfiguration"])
$Path = $config.Path
#>
#requires -version 2.0
Set-StrictMode -Version 2
$Module = $ExecutionContext.SessionState.Module
if (! $Module) {
throw ( New-Object System.Management.Automation.SessionStateException `
"An active module was not found! LoadModuleConfig must be run from a module manifest's NestedModules field.")
}
$ModuleName = $Module.Name.Replace(".config",$null)
$AppData = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::LocalApplicationData)
$ModuleConfigPath = join-path -Path $AppData `
-ChildPath "WindowsPowerShell\\Modules\\$ModuleName\\$ModuleName.config.xml"
$configurations = $null
if ( Test-Path $ModuleConfigPath -PathType Leaf ) {
$configurations = Import-Clixml -Path $ModuleConfigPath
} else {
# Generate new default config file.
$configurations = $Module.PrivateData.LocalUser.Settings
$configurations.add("InitializeConfigurations", $true)
Export-Clixml -InputObject $configurations -Path $ModuleConfigPath
}
if ($configurations) {
Add-Member -InputObject $configurations -Name ModuleName -MemberType NoteProperty -force `
-Value $ModuleName
Add-Member -InputObject $configurations -Name Export -MemberType ScriptMethod -force `
-Value {
$AppData = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::LocalApplicationData)
$ModuleConfigPath = join-path -Path $AppData `
-ChildPath "WindowsPowerShell\\Modules\\$ModuleName\\$($this.ModuleName).config.xml"
Export-Clixml -InputObject $this -Path $ModuleConfigPath
}
Set-Variable -Name "$($ModuleName)Settings" -Value $($configurations) -Scope Global `
-Description "$($ModuleName) module configuration settings."
}
|
combined_dataset/train/non-malicious/sample_31_68.ps1
|
sample_31_68.ps1
|
/* eslint-disable no-undef */
var plugin = require("plugin-vs-v2");
if (typeof plugin != "undefined") {
plugin.Messaging.addEventListener("pluginready", function () {
setHtmlText();
});
}
function setHtmlText() {
// resource strings used by docker.web.default.html
setTextContent("#dockerWebCoreOverviewHeader", "DockerWebCoreOverviewHeader");
setTextContent("#dockerWebCoreSubTitle", "DockerWebCoreSubTitle");
setTextContent("#containersHeader", "ContainersHeader");
setTextContent("#containerToolsOverview", "ContainerToolsOverview");
setTextContent("#browseDocsText", "BrowseDocsText");
setTextContent("#publishToAppServicesText", "PublishToAppServicesText");
setAltText("#containersAltText", "ContainersHeader");
}
// SIG // Begin signature block
// SIG // MIIoOgYJKoZIhvcNAQcCoIIoKzCCKCcCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // GAQuvgtekkZEIZtqYXCbSXOEVvMNrmRZYGfFdJLjfMeg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghoNMIIaCQIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDC6BSCCobI6RTo
// SIG // TIpZcyrnQyg6Uk/RoaZIJZZyg5KuUzBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBADQsj8KVLEh7cAA4CPiDuHgReAa4ZdMU
// SIG // 580nMCyq6zjDNTYbPGPU+DfGDJIGsKpQHIzq0SPBE7Li
// SIG // hqsAuYUWtjHMaUiOmi9HSWl9k2xojKT3xkvEu5oMhZhv
// SIG // qbrqEio8OYKy8PL5NnEo41tkTmgWCM5Spmg4FeEg552l
// SIG // BoLqt8C6ULXtlP7smZvr0sxzPHQbRNh5Q2mVSSHnfRWq
// SIG // +pJhTAdsKc0pjN4hScU4kfRjQJGmJ5tcNhD4pAAY/jFo
// SIG // LVWA+m87SfFqiKy/JBQIo4g2WnetOoTonuQ6u9xzpzp5
// SIG // kW5LBIpv+9fNpqiCXcbAMZcjkFdDYMV72dTniGsUf+Gm
// SIG // ZCKhgheXMIIXkwYKKwYBBAGCNwMDATGCF4Mwghd/Bgkq
// SIG // hkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkC
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // yO7S9XjO3XTw3x3L3mEcHY+7GkGyc++59JlNvv9Se/sC
// SIG // BmYX3xtCrRgTMjAyNDA0MjkyMTI2MDIuODA4WjAEgAIB
// SIG // 9KCB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMG
// SIG // A1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u
// SIG // czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAt
// SIG // MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBTZXJ2aWNloIIR7TCCByAwggUIoAMCAQIC
// SIG // EzMAAAHr4BhstbbvOO0AAQAAAeswDQYJKoZIhvcNAQEL
// SIG // BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN
// SIG // MjMxMjA2MTg0NTM0WhcNMjUwMzA1MTg0NTM0WjCByzEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z
// SIG // b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
// SIG // blNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUw
// SIG // IwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
// SIG // aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC
// SIG // AgEAwRVoIdpW4Fd3iadNaKomhQbmGzXO4UippLbydeTa
// SIG // wfwwW6FKMPFjzkz8W5+4HJiDhpsCZHfk8hceyjp868Z6
// SIG // Ad4br7/dX2blLoCLCk5wL4NgVP53ze2c5/SpNZqbidu0
// SIG // usVAx+KHRYl+dSAnCpehBuHMSoHAwIp4oU/Ma6CVlQEy
// SIG // +6fG2358LHNaYoWZnLyLmBp29U2PbZ6XQoVq/RAEbgqN
// SIG // 04kRozNi6eKYk9pQ+YZ3d1Whk3qTasmpKZAhldPnCvFb
// SIG // vx5CGXb8vs+RC96I03RSy+byfSAKIFn91wLt3e0qRWmq
// SIG // HosdHtaueQA/eGcAz/os6i2nbAUd7c46tkX6wjS/k5ov
// SIG // 42pUbaPyem4eHz4RxE5wwu/E9cn11EHRrZif7rSPwDcY
// SIG // ux1fIAD84nfU2IzD22KhvMucc/oCP0hco/mirRx1pisx
// SIG // Fz7bV8wHHsSdRB+8G7olZN7BKzyvTC4NV2+oTORyFgNI
// SIG // xAGYShMneYR9lzIm82pG6drNhCUFmrEHOAzGhdRLENQs
// SIG // 4ApQ2CGBuq1IbnXyO5PC/SighLn0WyuZXUWDQKnXa/8k
// SIG // iX7mb9z0t/r7Q+l+qtR+FDpowynY6Ft6rOyUTGZh/X5B
// SIG // ZDM2+mEs6+nl9S6GJtz6ztSXmuN0mM5Qd08/ODr7lUle
// SIG // zXInVbTaomXllqVY32r0fiY/yTkCAwEAAaOCAUkwggFF
// SIG // MB0GA1UdDgQWBBR0ngWs1lXMbuKk/TuY09gfqgHq4TAf
// SIG // BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
// SIG // BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
// SIG // c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
// SIG // aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
// SIG // KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v
// SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01p
// SIG // Y3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw
// SIG // KDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQM
// SIG // MAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAg3TfL6D3fAvlVmT9/lvO3P0G
// SIG // 3W1itLDrfWeJBDlp4Oypoflg9i5zyUySiBGsZ4jnLfcD
// SIG // ICfMkMsEfFh4Azr28KnarC1GjODa3q7SOhSPa4Y4Xmis
// SIG // TTZwWcx2Sw8JZC/bwhA3vUXNHRklXeQYNwlpJ1d7r1Wr
// SIG // teBeeREk1iATWkEvQqaNjqc93EYAGFX2ixRmwKzXEb0l
// SIG // r0lG3iNiA6kcQuMQW0YjUPtah1wwj59IRrF3y/spw2Z3
// SIG // An7Mza5YGU9uF4Ib082DB3F4qC1WKP9h5MqMOnSO7lCy
// SIG // WysS1/MB4bIsK4lyAwp4y1bBtBOW0fNkIHLHhIcW1Nnd
// SIG // UVR3ELZFBO1vc8Wamev4z5mqI2YF0Dt9148Th2GFWvwV
// SIG // 3CLrvEjMz44wAG7o8E2sKWsywb/fey0QdGTmzXJCWMkE
// SIG // KRE0n5Td+o1vs+0f5xsiakWdx7WdZV1tX+sxAgHj/vXc
// SIG // up5nAq1XDqm0B1+2a/Fj3IIRyQAA5ZuRMT4ecYtbTUZP
// SIG // ouhdmvUqU3kJ2Vz+dMPiaE8SEkKu7wYo9p4rQLEi2lXj
// SIG // KqD4vjV5U1DWdjXbWxa+iIq/WSvbn2s9xcX7w2aN+uby
// SIG // zqM5kDnv2fqbuL2Ocz5rTYlSHEJxcuyWTomVQyOWyHcE
// SIG // EWotqrhyiepbVHbItx4zZ4nrhO9n0+HlocbZpzeR2Agw
// SIG // ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAV
// SIG // MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzET
// SIG // MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
// SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
// SIG // aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0
// SIG // aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx
// SIG // ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
// SIG // LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
// SIG // AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V
// SIG // gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/H
// SIG // ZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD
// SIG // RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gm
// SIG // U3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M
// SIG // EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+y
// SIG // OSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoF
// SIG // VZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi
// SIG // ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGa
// SIG // RnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+Autuqfjbs
// SIG // Nkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo
// SIG // mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9
// SIG // ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
// SIG // i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
// SIG // 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV
// SIG // 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
// SIG // AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw
// SIG // IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/
// SIG // LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp
// SIG // cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8G
// SIG // CCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYD
// SIG // VR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9
// SIG // lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG
// SIG // CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
// SIG // b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN
// SIG // AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
// SIG // FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk
// SIG // wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AF
// SIG // vonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4
// SIG // U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2
// SIG // EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq
// SIG // gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mj
// SIG // dAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZM
// SIG // cm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE
// SIG // cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2f
// SIG // pCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBM
// SIG // drVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L
// SIG // +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ
// SIG // C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
// SIG // 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
// SIG // 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC
// SIG // AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9w
// SIG // ZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
// SIG // TjpBMDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
// SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO
// SIG // AwIaAxUAgAaJdbtcMMGIFLVKMDJ6mL27pd6ggYMwgYCk
// SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
// SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkq
// SIG // hkiG9w0BAQsFAAIFAOnaFcIwIhgPMjAyNDA0MjkxMjQ5
// SIG // MDZaGA8yMDI0MDQzMDEyNDkwNlowdzA9BgorBgEEAYRZ
// SIG // CgQBMS8wLTAKAgUA6doVwgIBADAKAgEAAgIKoAIB/zAH
// SIG // AgEAAgITnjAKAgUA6dtnQgIBADA2BgorBgEEAYRZCgQC
// SIG // MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow
// SIG // CAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzIg1e
// SIG // +z2Y258pYSssYzfaSsIN9PvYY+MdOvAbhQrhB+2R+HAJ
// SIG // 9MLxINnaFAYhKVEKfHEViSoBRIIegIdVIQl/q1KL5CvY
// SIG // 1t5clHYy5htDQ5BDiUSHPaESbntozEZdiC+8/aYQTb/t
// SIG // TJQeF5TrT1qyxrtVRyH2n6T+Xp0B4vXW9mAeMZveTp/E
// SIG // zsCBDaR/5Q41/KV1ICn79VG6SSL6yvidVeXUcsLNygf7
// SIG // dZnXsAoFaXVSsimwJfxVGwzLUC6F9xkw05Gw82AbOsCz
// SIG // 2iQYiMb4LW9ISGqAZNeK3gxzbguj6ufNqbdS8AtOf3wU
// SIG // v9311/YF3I4v3Va9HxNJ/UTXjgLSMYIEDTCCBAkCAQEw
// SIG // gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
// SIG // AAHr4BhstbbvOO0AAQAAAeswDQYJYIZIAWUDBAIBBQCg
// SIG // ggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv
// SIG // BgkqhkiG9w0BCQQxIgQgobjgwVMUvVtTv5p0VZ6fVrel
// SIG // 6BgpKRSNvVs1MVYuIgswgfoGCyqGSIb3DQEJEAIvMYHq
// SIG // MIHnMIHkMIG9BCDOt2u+X2kD4X/EgQ07ZNg0lICG3Ys1
// SIG // 7M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT
// SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
// SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
// SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHr
// SIG // MCIEIH9/wjFMnASxoE9AjZjzYQRoSP+YubbPx9IRIA82
// SIG // VyMtMA0GCSqGSIb3DQEBCwUABIICACnXWDgfamN8ON7K
// SIG // DQ0Vk6cyM+RXc6IGO/cxLPdEB386gSuivBwj9ru6tVjh
// SIG // lTEIZi44aG/2zCtso7LYXa8tKNuGu4HbpNxyg+obJWlZ
// SIG // VvzFs69ibMz2Adgz8ARx+zZfWPWbuDTvr/lb6MZlVq5O
// SIG // S26RFsO9b+Fl/tb/xvhe+uNTK6M/DcLLgTgZS3lg3fxy
// SIG // PQtL6v6ftGjb8yjC+eneORmIa9V/icwfNfBC2wH/qvhX
// SIG // bKCE5ExRmpzNCG41CISLaHsC1iRDbcGWb8sTA6yycjVF
// SIG // GwaWwkFLCAfnsZ2ke3hx11AjF46lWAXprySPIVwKjrny
// SIG // LJFC/YQTVTLVsdbaMLv1dpLB5/zECzt7JCghrTX48gTK
// SIG // 1k0bF7ASY6IwssHUFfXQzA3hySIBAks4RzlrHFVTPbXA
// SIG // aRPqgaz+O8Lw9o58VTFHarSovEYfTGMQWXekue9GQbJy
// SIG // VjTTtakEe5Qa+gvX2gZwrcSyU9AeJse+YP5hXk8CO+PB
// SIG // JPaEyhh9A9PlFQNB95bB9lsAyp/XtXR3UyPEmIbiEqhU
// SIG // U1QpPuZSgKdvsAhRvBBGjzDvyOUBiYnJmLUhEAzD6gNj
// SIG // gy+oqsO00oJjdQ3TVosruWwYiLHgbqVzed8LmlOdRez1
// SIG // eYYqNVFS0ScXywy7+ioZMf24Cpnip+uzXWTvbcX+QlVC
// SIG // byNa5O+8
// SIG // End signature block
|
combined_dataset/train/non-malicious/Move-Template_1.ps1
|
Move-Template_1.ps1
|
Function Move-Template{
<#
.Synopsis
Move a VM template
.Description
Move a VM template either to a new host via vmotion or to a new datastore via svmotion
.Parameter Name
Name of the VM to be migrated
.Parameter VIObject
Template to be migrated
.Parameter VMHost
VMHost to vmotion the template to
.Parameter Datastore
Datastore to svmotion template to
.Example
Move-Template -Name W2k8R201 -VMHost (Get-VMHost ESX1)
VMotion W2k8R201 template to the ESX1 host.
.Example
Move-Template -Name W2k8R201 -Datastore (Get-Datastore NFS2)
sVMotion W2k8R201 template to the NFS2 Datastore.
.Example
Get-Template | Move-Template -Datastore (Get-Datastore NFS2)
sVMotion all templates onto the NFS2 Datastore
.Example
Get-Template CentOS_5_2_x64 | Move-Template -Datastore (Get-Datastore NFS2) -VMHost (Get-VMHost ESX03)
sVMotion the CentOS_5_2_x64 templates onto the NFS2 Datastore, and then vmotion said template onto ESX03
.link
Get-Template
New-Template
Remove-Template
Set-Template
#>
[CmdletBinding(SupportsShouldProcess=$true,SupportsTransactions=$False,ConfirmImpact="low",DefaultParameterSetName="")]
param(
[Parameter(Mandatory=$true,Position=0,HelpMessage="Name of template to move", ParameterSetName="ByName")]
[STRING]
$Name,
[Parameter(Mandatory=$true,ValueFromPipeline=$true, HelpMessage="Managed object of the template to be migrated", ParameterSetName="ByObject")]
[VMware.VimAutomation.Client20.TemplateImpl[]]
$Template,
[Parameter(Mandatory=$false,ValueFromPipeline=$true, HelpMessage="VMHost to vmotion the template to", ParameterSetName="ByObject")]
[Parameter(Mandatory=$false,ValueFromPipeline=$true, HelpMessage="VMHost to vmotion the template to", ParameterSetName="ByName")]
[VMware.VimAutomation.Client20.VMHostImpl]
$VMHost,
[Parameter(Mandatory=$false,ValueFromPipeline=$true, HelpMessage="Datastore to svmotion the template to", ParameterSetName="ByObject")]
[Parameter(Mandatory=$false,ValueFromPipeline=$true, HelpMessage="Datastore to svmotion the template to", ParameterSetName="ByName")]
[VMware.VimAutomation.Client20.DatastoreImpl]
$Datastore
)
Process{
switch ($pscmdlet.parametersetname) {
"ByName"
{
if ($pscmdlet.ShouldProcess($Name,"vmotion Template to $($VMHost.name) and svmotion to $($Datastore.name)")){
$template = Get-Template -Name $Name -verbose:$False
$vm = Set-Template -Template $template -ToVM -verbose:$False -confirm:$False
switch ($VM) {
{$Datastore} {Move-VM -VM $VM -Datastore $Datastore -verbose:$False -Confirm:$false}
{$VMHost} {Move-VM -VM $VM -Destination $VMHost -verbose:$False -Confirm:$false}
}
(Get-View -VIObject $VM -verbose:$False).MarkAsTemplate()
}
}
"ByObject"
{
Foreach ($tmp in $Template) {
if ($pscmdlet.ShouldProcess($tmp.Name,"vmotion Template to $($VMHost.name) and svmotion to $($Datastore.name)")){
$vm = Set-Template -Template $tmp -ToVM -verbose:$False -confirm:$False
switch ($VM) {
{$Datastore} {Move-VM -VM $VM -Datastore $Datastore -verbose:$False -Confirm:$false}
{$VMHost} {Move-VM -VM $VM -Destination $VMHost -verbose:$False -Confirm:$false}
}
(Get-View -VIObject $VM -verbose:$False).MarkAsTemplate()
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_58_21.ps1
|
sample_58_21.ps1
|
# diag_sha.psm1
# Created by tdimli
# March 2020
#
# Diagnostic functions for SHA area
# version
$SHA_version = "1.0.200425.0"
# Area and Area/Component arrays
# Example: $AREA = @("Component1", "Component2")
$SHA = @()
#Component/Diagnostic Function arrays
# Example: $Component1 = @("Diag_Func1", "Diag_Func1")
# For information on how to create a diagnostic function, please see developers.md
# begin: diagnostic functions
# <your diagnostic functions here>
# end: diagnostic functions
Export-ModuleMember -Function * -Variable *
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBJdAoNfNcSiw5p
# S7kGe6gSJaSv+iMBt9hOpDz8pZHrdKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJSMKFtHamlOUT3ctE+J84iS
# mJjtq/H4XYPnCfHFxOnyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAcU2yTtRNaiBkZ3tBbeknhLoeHHRuVCG83Udxx9XXE7xjow86A+JnDso5
# 8Dk+7hMHCm6EHnHGGD1N1ovxcy7bJyVlNIjzgG2wLmKz6LwF5VDiocMgbucyasyI
# +nO/XPxE4p8IZGhBStMnilogcuZ/ElfqS/7N1p8EVnojeRGOZ3BWua5pVjvBW2o6
# trCu2p+OfEAThbdEn9BBiL+UejHtSB4CjthKa1NjSxbVl3FIW20dbkl/776mLlCB
# kcjoKfvIhhQZ7C2J3tf2ULMaj+ocdGN3CKyE7jUKOPzrZB5B1ox6rG+aLjVubq5D
# QmzDJbJ8hf0a2VMijPcWtbzrcgGyJKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCRcj6caZ2Iz54O2ZOOmJut05t2PemPxf4B0ZoARNNFOQIGZkZX1ivt
# GBMyMDI0MDYxMjE0NTg1NC4xNjdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie
# YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt
# 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG
# 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F
# zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh
# ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK
# FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/
# zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX
# lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM
# k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH
# xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF
# tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI
# rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO
# 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy
# 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK
# CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV
# wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj
# 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb
# vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE
# yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe
# gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o
# uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy
# TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi
# WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hPEJTAiGA8yMDI0MDYxMjA2NTIy
# MVoYDzIwMjQwNjEzMDY1MjIxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqE8Ql
# AgEAMAcCAQACAgzLMAcCAQACAhN9MAoCBQDqFRWlAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAIAlF48QzlI0/nUHE309In7Re3wMMsGVjJvH8QyDFSgdoxa7
# iAmmbjxSHDj6ROWkpC+pwCh+5mnmtyOY+qgPJEZEcevGQOsMAgxSDwgFkjGjLOH1
# 0ANMGpv4Lgoff15oV0kg8+vW2w/iCzmazenro/KU2s6jZ27cpZ1OxWwThafsEoZa
# HcAVrR5ltkJExcEgSxfLnFTE9citlY/FGfJPAoPLArf9as9MesxZrnhwS1Rdd46z
# fa2R/Wt/seKge8aJHEJfs3QRx4M+hhQUVBnsyUrMImxMvXTW9w442Q6+6RTSZb8e
# tmYaQLmFut1dPrTkvFtMH2B/ScfASx1jnJLzzY4xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB5jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCC7EMMFQecbgrWgBdYdWCC543+GOA1XrUPfzgtxTKfNGzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16hIYcR
# noy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgy6KmSaERUFw5zM8ixrWjedEWrCkX
# YG0+8JQBRQ+GJXIwDQYJKoZIhvcNAQELBQAEggIAT01knHdbcAZcqpBYX57xNmZW
# xR8KrfoMuUMri7QbfjfIRKqAfcshEX6+qi5nrlRLDhp3vjM1Om6TrkCcT9uYT685
# jfeo/aO3kVHwCtFb1OsUHHtAI2H88Dxn96WbHaiJwkUQqN/TP7hUpZ46/nf8yqHh
# 9GCnKwBzg4z11YgXgy8mMN/z9uNa2aU0/w5e/L2XricbiGbAQP5Yuv7oWRMdIh40
# w4HjqS0AqeC/dOaxKr48LXcC150baqEbI0gIv+E/ebrGE3HiW6Oo49yX5rniCdoA
# 7vWbrkuz8OMLxyKOz0aMp64CNdFj4B7kxO2MisvaT6mhDEQI8pwHNpP0Fu2ENp4q
# bLfAMgaFGZz2H4PyBQVYo86rKVCmhg2NO0BcmtQFWF9d+AECgDWc/XpN7sqlcroX
# BZOwrHrcwci5XDIgetrS1Ge2dRiHwMGDCcXr58b85gbeitDvF1sBAWIT5OaRH44+
# rewZtDoH471n+W/h18/qon/PTeqIZCsYMn7YsrBN1XFsuJo+92eJzLiRKhnxKptD
# aR7OBaC91YG/bbdB7nPTgzyCg/ialZKQ8aEqsTn/ELf2FGS85zTRU35YgjdJJdMB
# uFKYsJVcZG22exm/kFqTW+B3v54k1rG6yHtIEAnTi1cz+ZsoImQSDaEi6VMndNXi
# v7uFIfhueFe3eDqkius=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Test-TCPPort.ps1
|
Test-TCPPort.ps1
|
# http://powershell.codeplex.com
Function Test-TCPPort
{
param ( [ValidateNotNullOrEmpty()]
[string] $EndPoint = $(throw "Please specify an EndPoint (Host or IP Address)"),
[string] $Port = $(throw "Please specify a Port") )
$TimeOut = 1000
$IP = [System.Net.Dns]::GetHostAddresses($EndPoint)
$Address = [System.Net.IPAddress]::Parse($IP)
$Socket = New-Object System.Net.Sockets.TCPClient
$Connect = $Socket.BeginConnect($Address,$Port,$null,$null)
if ( $Connect.IsCompleted )
{
$Wait = $Connect.AsyncWaitHandle.WaitOne($TimeOut,$false)
if(!$Wait)
{
$Socket.Close()
return $false
}
else
{
$Socket.EndConnect($Connect)
$Socket.Close()
return $true
}
}
else
{
return $false
}
}
|
combined_dataset/train/non-malicious/Get-DiskUsage_2.ps1
|
Get-DiskUsage_2.ps1
|
Function Get-DiskUsage {
<#
.SYNOPSIS
A tribute to the excellent Unix command DU.
.DESCRIPTION
This command will output the full path and the size of any object
and it's subobjects. Using just the Get-DiskUsage command without
any parameters will result in an output of the directory you are
currently placed in and it's subfolders.
.PARAMETER Path
If desired a path can be specified with the Path parameter. In no path
is specified $PWD will be used.
.PARAMETER h
the -h paramater is the same as -h in Unix. It will list the folders
and subfolders in the most appropriate unit depending on the size
(i.e. Human Readable).
.PARAMETER l
The -l paramater will add the largest file to the end of the output.
.PARAMETER Sort
Allows you to sort by Folder or Size. If none i specified the default
of Folder will be used.
.PARAMETER Depth
Depth will allow you to specify a maximum recursion depth. A depth
of 1 would return the immediate subfolders under the root.
.PARAMETER Force
Works the same way as Get-ChildItem -force.
.PARAMETER Descending
Works the same way as Sort-Object -descending.
.LINK
http://www.donthaveasite.nu
.NOTES
Author: Jonas Hallqvist
Developed with Powershell v3
#>
[CmdletBinding(
SupportsShouldProcess=$True
)]
param (
[String]$Path=$PWD,
[Switch]$h,
[Switch]$l,
[String]$Sort="Folder",
[Int]$Depth,
[Switch]$Force,
[Switch]$Descending
)
$ErrorActionPreference = "silentlycontinue"
function HumanReadable {
param ($size)
switch ($size) {
{$_ -ge 1PB}{"{0:#'P'}" -f ($size / 1PB); break}
{$_ -ge 1TB}{"{0:#'T'}" -f ($size / 1TB); break}
{$_ -ge 1GB}{"{0:#'G'}" -f ($size / 1GB); break}
{$_ -ge 1MB}{"{0:#'M'}" -f ($size / 1MB); break}
{$_ -ge 1KB}{"{0:#'K'}" -f ($size / 1KB); break}
#{$_ -eq $null}{"0B"}
default {"{0}" -f ($size) + "B"}
}
}
function LargestFolder {
if ($h) {
$large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize -HideTableHeaders
Write-host "Largest Folder is:" -NoNewline
$large
}
else {
$large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize -HideTableHeaders
Write-host "Largest Folder is:" -NoNewline
$large
}
}
function Max-Depth {
param(
[String]$Path = '.',
[String]$Filter = '*',
[Int]$Level = 0,
[Switch]$Force,
[Switch]$Descending,
[int]$i=0
)
$results=@()
$root = (Resolve-Path $Path).Path
if ($root -notmatch '\\\\$') {$root += '\\'}
if (Test-Path $root -PathType Container) {
do {
[String[]]$_path += $root + "$Filter"
$Filter = '*\\' + $Filter
$i++
}
until ($i -eq $Level)
$dirs=Get-ChildItem -directory $_path -Force:$Force
foreach ($dir in $dirs) {
$size = 0
$size += (gci $dir.Fullname -recurse | Measure-Object -Property Length -Sum).Sum
$results += New-Object psobject -Property @{Folder=$dir.fullname;Size=$size}
}
if ($h) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize
}
if ($l) {
LargestFolder
}
if (($h -eq $false) -and ($l -eq $false)) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize
}
}
}
if ($Depth) {
Max-Depth -Path $Path -Level $Depth -Force:$Force -Descending:$Descending
}
else {
$results = @()
$dirs=Get-ChildItem -directory $Path -Force:$Force -Recurse
foreach ($dir in $dirs) {
$size = 0
$size += (gci $dir.FullName -Recurse | Measure-Object -Property Length -Sum).Sum
$results+= New-Object psobject -Property @{Folder=$dir.FullName;Size=$size}
}
if ($h) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize
}
if ($l) {
LargestFolder
}
if (($h -eq $false) -and ($l -eq $false)) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize
}
}
}
|
combined_dataset/train/non-malicious/2647.ps1
|
2647.ps1
|
Add-Type -AssemblyName System.Web
function New-Header{
param([string]$action = "get"
,[string]$resType
,[string]$resourceId
,[string]$connectionKey)
$apiDate = (Get-Date).ToUniversalTime().ToString('R')
$keyBytes = [System.Convert]::FromBase64String($connectionKey)
$text = @($action.ToLowerInvariant() + `
"`n" + $resType.ToLowerInvariant() + `
"`n" + $resourceId + `
"`n" + $apiDate.ToLowerInvariant() + "`n" + "`n")
$body =[Text.Encoding]::UTF8.GetBytes($text)
$hmacsha = new-object -TypeName System.Security.Cryptography.HMACSHA256 -ArgumentList (,$keyBytes)
$hash = $hmacsha.ComputeHash($body)
$signature = [System.Convert]::ToBase64String($hash)
$authz = [System.Web.HttpUtility]::UrlEncode($('type=master&ver=1.0&sig=' + $signature))
$headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]"
$headers.Add("Authorization", $authz)
$headers.Add("x-ms-version", '2015-12-16')
$headers.Add("x-ms-date", $apiDate)
return $headers
}
function Get-DocDBDatabase {
param([string] $rooturi
,[string] $key
,[string ]$dbname
)
if($dbname){
$resourceid = "dbs/$dbname"
$uri = $rootUri + '/' + $resourceid
$headers = New-Header -resType dbs -resourceId $resourceid -action Get -connectionKey $key
} else {
$resourceid = "dbs"
$uri = $rootUri + '/' + $resourceid
$headers = New-Header -resType dbs -action Get -connectionKey $key
}
$response = Invoke-RestMethod -Uri $uri -Method Get -Headers $headers
return $response
}
function New-DocDBDatabase{
param([string] $rooturi
,[string] $key
,[string ]$dbname)
$uri = $rootUri + '/dbs'
$headers = New-Header -resType dbs -action Post -connectionKey $key
$body = "{
`"id`": `"$dbname`"
}"
$response = Invoke-RestMethod -Uri $uri -Method Post -Headers $headers -Body $body
return $response
}
function Remove-DocDBDatabase {
param([string] $rooturi
,[string] $key
,[string]$dbname
)
$resourceid = "dbs/$dbname"
$uri = $rootUri + '/' + $resourceid
$headers = New-Header -resType dbs -resourceId $resourceid -action Delete -connectionKey $key
$response = Invoke-RestMethod -Uri $uri -Method Delete -Headers $headers
return $response
}
function Get-DocDBCollection{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
)
if($collection){
$resourceid = "dbs/$dbname/colls/$collection"
$uri = $rootUri + '/' + $resourceid
} else {
$resourceid = "dbs/$dbname"
$uri = $rootUri + '/' + $resourceid + '/colls'
}
$headers = New-Header -resType colls -resourceId $resourceid -action Get -connectionKey $key
$response = Invoke-RestMethod -Uri $uri -Method Get -Headers $headers -Body $body
return $response
}
function New-DocDBCollection{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
)
$uri = $rootUri + "/dbs/$dbname/colls"
$headers = New-Header -resType colls -resourceId "dbs/$dbname" -action Post -connectionKey $key
$body = "{
`"id`": `"$collection`"
}"
$response = Invoke-RestMethod -Uri $uri -Method Post -Headers $headers -Body $body
return $response
}
function Remove-DocDBCollection{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
)
$resourceid = "dbs/$dbname/colls/$collection"
$uri = $rootUri + '/' + $resourceid
$headers = New-Header -resType colls -resourceId $resourceid -action Delete -connectionKey $key
$response = Invoke-RestMethod -Uri $uri -Method Delete -Headers $headers -Body $body
return $response
}
function Get-DocDBDocument{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
,[string] $id)
$resourceid = "dbs/$dbname/colls/$collection"
if($id){
$headers = New-Header -action Get -resType docs -resourceId "$resourceid/docs/$id" -connectionKey $key
$uri = $rootUri + "/$resourceid/docs/$id"
} else {
$headers = New-Header -action Get -resType docs -resourceId $resourceid -connectionKey $key
$uri = $rootUri + "/$resourceid/docs"
}
$response = Invoke-RestMethod $uri -Method Get -ContentType 'application/json' -Headers $headers
return $response
}
function New-DocDBDocument{
param([string]$document
,[string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection)
$collName = "dbs/"+$dbname+"/colls/" + $collection
$headers = New-Header -action Post -resType docs -resourceId $collName -connectionKey $key
$headers.Add("x-ms-documentdb-is-upsert", "true")
$uri = $rootUri + "/" + $collName + "/docs"
$response = Invoke-RestMethod $uri -Method Post -Body $document -ContentType 'application/json' -Headers $headers
return $response
}
function Remove-DocDBDocuments{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
,[string] $id )
if($id){
$docs = Get-DocDBDocument -rooturi $rooturi -key $key -dbname $dbname -collection $collection -id $id
} else {
$docs = Get-DocDBDocument -rooturi $rooturi -key $key -dbname $dbname -collection $collection
}
$response = @()
foreach($doc in $docs.documents){
$resourceid = "dbs/$dbname/colls/$collection/docs/$($doc.id)"
$headers = New-Header -action Delete -resType docs -resourceId $resourceid -connectionKey $key
$uri = $rootUri + "/$resourceid"
$response += Invoke-RestMethod $uri -Method Delete -Headers $headers
}
return $response
}
function Add-DocDBStoredProcedure{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
,[string] $storedprocedure
)
$collName = "dbs/"+$dbname+"/colls/" + $collection
$headers = New-Header -action Post -resType sprocs -resourceId $collName -connectionKey $key
$uri = $rootUri + "/" + $collName + "/sprocs"
$response = Invoke-RestMethod $uri -Method Post -Body $storedprocedure -ContentType 'application/json' -Headers $headers
return $response
}
function Invoke-DocDbQuery{
param([string]$query
,[string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection)
$collName = "dbs/"+$dbname+"/colls/" + $collection
$headers = New-Header -action Post -resType docs -resourceId $collName -connectionKey $key
$headers.Add("x-ms-documentdb-isquery", "true")
$headers.Add("Content-Type", "application/query+json")
$queryjson = "{
`"query`": `"$query`"
}"
$uri = $rootUri + "/" + $collName + "/docs"
$response = Invoke-RestMethod $uri -Method Post -Body $queryjson -Headers $headers
return $response
}
function Invoke-DocDbStoredProcedure{
param([string] $rooturi
,[string] $key
,[string ]$dbname
,[string] $collection
,[string]$sproc
,[string]$params)
$resourceid = "dbs/$dbname/colls/$collection/sprocs/$sproc"
$headers = New-Header -action Post -resType sprocs -resourceId $resourceid -connectionKey $key
$uri = $rooturi + "/$resourceid"
if($params){
$response = Invoke-RestMethod $uri -Method Post -Body $params -Headers $headers
} else {
$response = Invoke-RestMethod $uri -Method Post -Headers $headers
}
return $response
}
|
combined_dataset/train/non-malicious/sample_51_65.ps1
|
sample_51_65.ps1
|
## Copyright (c) Microsoft Corporation. All rights reserved.
<#
.SYNOPSIS
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans.
.DESCRIPTION
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans. These performance recordings contain Microsoft-Antimalware-Engine
and NT kernel process events and can be analyzed after collection using the
Get-MpPerformanceReport cmdlet.
This cmdlet requires elevated administrator privileges.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl
#>
function New-MpPerformanceRecording {
[CmdletBinding(DefaultParameterSetName='Interactive')]
param(
# Specifies the location where to save the Microsoft Defender Antivirus
# performance recording.
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
# Specifies the duration of the performance recording in seconds.
[Parameter(Mandatory=$true, ParameterSetName='Timed')]
[ValidateRange(0,2147483)]
[int]$Seconds,
# Specifies the PSSession object in which to create and save the Microsoft
# Defender Antivirus performance recording. When you use this parameter,
# the RecordTo parameter refers to the local path on the remote machine.
[Parameter(Mandatory=$false)]
[System.Management.Automation.Runspaces.PSSession[]]$Session,
# Optional argument to specifiy a different tool for recording traces. Default is wpr.exe
# When $Session parameter is used this path represents a location on the remote machine.
[Parameter(Mandatory=$false)]
[string]$WPRPath = $null
)
[bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive')
[bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed')
# Hosts
[string]$powerShellHostConsole = 'ConsoleHost'
[string]$powerShellHostISE = 'Windows PowerShell ISE Host'
[string]$powerShellHostRemote = 'ServerRemoteHost'
if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) {
$ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.'
$category = [System.Management.Automation.ErrorCategory]::NotImplemented
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name
$psCmdlet.WriteError($errRecord)
return
}
if ($null -ne $Session) {
[int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 }
Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
[Parameter(Mandatory=$true)]
[ValidateRange(-1,2147483)]
[int]$RemotedSeconds
)
if ($RemotedSeconds -eq -1) {
New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath
} else {
New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath
}
}
return
}
if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo
$psCmdlet.WriteError($errRecord)
return
}
# Resolve any relative paths
$RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo)
# Dependencies: WPR Profile
[string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp"
if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies: WPR Version
try
{
# If user provides a valid string as $WPRPath we go with that.
[string]$wprCommand = $WPRPath
if (!$wprCommand) {
$wprCommand = "wpr.exe"
$wprs = @(Get-Command -All "wpr" 2> $null)
if ($wprs -and ($wprs.Length -ne 0)) {
$latestVersion = [System.Version]"0.0.0.0"
$wprs | ForEach-Object {
$currentVersion = $_.Version
$currentFullPath = $_.Source
$currentVersionString = $currentVersion.ToString()
Write-Host "Found $currentVersionString at $currentFullPath"
if ($currentVersion -gt $latestVersion) {
$latestVersion = $currentVersion
$wprCommand = $currentFullPath
}
}
}
}
}
catch
{
# Fallback to the old ways in case we encounter an error (ex: version string format change).
[string]$wprCommand = "wpr.exe"
}
finally
{
Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n"
}
#
# Test dependency presence
#
if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
# Exclude versions that have known bugs or are not supported any more.
[int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int]
if ($wprFileVersion -le 6) {
$ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again."
$category = [System.Management.Automation.ErrorCategory]::NotInstalled
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
function CancelPerformanceRecording {
Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline
& $wprCommand -cancel -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583000 {
Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording."
return
}
default {
Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been cancelled."
}
#
# Ensure Ctrl-C doesn't abort the app without cleanup
#
# - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved
# - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved
# - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated
[bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole)
$savedControlCAsInput = $null
$shouldCancelRecordingOnTerminatingError = $false
try
{
if ($canTreatControlCAsInput) {
$savedControlCAsInput = [Console]::TreatControlCAsInput
[Console]::TreatControlCAsInput = $true
}
#
# Start recording
#
Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline
$shouldCancelRecordingOnTerminatingError = $true
& $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583001 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording."
return
}
default {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has started." -NoNewline
if ($timedMode) {
Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline
Start-Sleep -Seconds:$Seconds
Write-Host "ok." -NoNewline
} elseif ($interactiveMode) {
$stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording"
if ($canTreatControlCAsInput) {
Write-Host "${stopPrompt}: "
do {
$key = [Console]::ReadKey($true)
if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) {
CancelPerformanceRecording
$shouldCancelRecordingOnTerminatingError = $false
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
return
}
} while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter))
} else {
Read-Host -Prompt:$stopPrompt
}
}
#
# Stop recording
#
Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... "
& $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {
$shouldCancelRecordingOnTerminatingError = $false
}
0xc5583000 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace."
return
}
default {
Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been saved to '$RecordTo'."
Write-Host `
'
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
'
Write-Host `
'
The trace you have just captured may contain personally identifiable information,
including but not necessarily limited to paths to files accessed, paths to
registry accessed and process names. Exact information depends on the events that
were logged. Please be aware of this when sharing this trace with other people.
'
} catch {
throw
} finally {
if ($shouldCancelRecordingOnTerminatingError) {
CancelPerformanceRecording
}
if ($null -ne $savedControlCAsInput) {
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
}
}
}
function PadUserDateTime
{
[OutputType([DateTime])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[DateTime]$UserDateTime
)
# Padding user input to include all events up to the start of the next second.
if (($UserDateTime.Ticks % 10000000) -eq 0)
{
return $UserDateTime.AddTicks(9999999)
}
else
{
return $UserDateTime
}
}
function ValidateTimeInterval
{
[OutputType([PSCustomObject])]
param(
[DateTime]$MinStartTime = [DateTime]::MinValue,
[DateTime]$MinEndTime = [DateTime]::MinValue,
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
[DateTime]$MaxEndTime = [DateTime]::MaxValue
)
$ret = [PSCustomObject]@{
arguments = [string[]]@()
status = $false
}
if ($MinStartTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt $MaxStartTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinEndTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt [DateTime]::MinValue)
{
try
{
$MinStartFileTime = $MinStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinStartTime', $MinStartFileTime)
}
if ($MaxEndTime -lt [DateTime]::MaxValue)
{
try
{
$MaxEndFileTime = $MaxEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxEndTime', $MaxEndFileTime)
}
if ($MaxStartTime -lt [DateTime]::MaxValue)
{
try
{
$MaxStartFileTime = $MaxStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxStartTime', $MaxStartFileTime)
}
if ($MinEndTime -gt [DateTime]::MinValue)
{
try
{
$MinEndFileTime = $MinEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinEndTime', $MinEndFileTime)
}
$ret.status = $true
return $ret
}
function ParseFriendlyDuration
{
[OutputType([TimeSpan])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[string]
$FriendlyDuration
)
if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$')
{
[string]$seconds = $Matches[1]
[string]$decimals = $Matches[2]
[string]$unit = $Matches[3]
[uint32]$magnitude =
switch ($unit)
{
'sec' {7}
'ms' {4}
'us' {1}
}
if ($decimals.Length -gt $magnitude)
{
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.")
}
return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0')))
}
[timespan]$result = [timespan]::FromTicks(0)
if ([timespan]::TryParse($FriendlyDuration, [ref]$result))
{
return $result
}
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.")
}
[scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) }
function New-FriendlyTimeSpan
{
param(
[Parameter(Mandatory = $true)]
[uint64]$Ticks,
[bool]$Raw = $false
)
if ($Raw) {
return $Ticks
}
$result = [TimeSpan]::FromTicks($Ticks)
$result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan')
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString
$result
}
function New-FriendlyDateTime
{
param(
[Parameter(Mandatory = $true)]
[uint64]$FileTime,
[bool]$Raw = $false
)
if ($Raw) {
return $FileTime
}
[DateTime]::FromFileTime($FileTime)
}
function Add-DefenderCollectionType
{
param(
[Parameter(Mandatory = $true)]
[ref]$CollectionRef
)
if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder'))
{
$CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection')
}
}
[scriptblock]$FriendlyScanInfoToString = {
[PSCustomObject]@{
ScanType = $this.ScanType
StartTime = $this.StartTime
EndTime = $this.EndTime
Duration = $this.Duration
Reason = $this.Reason
Path = $this.Path
ProcessPath = $this.ProcessPath
ProcessId = $this.ProcessId
Image = $this.Image
}
}
function Get-ScanComments
{
param(
[PSCustomObject[]]$SecondaryEvents,
[bool]$Raw = $false
)
$Comments = @()
foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) {
if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) {
if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw
$Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString())
if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) {
$item.Debug | ForEach-Object {
if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) {
$Comments += "$_"
}
}
}
}
else {
if ($item.Message.Contains("subtype=Lowfi")) {
$Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection")
}
else {
$Comments += $item.Message
}
}
}
elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$OpId = "Internal opertion"
if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.Path
}
elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.ProcessPath
}
$Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString())
}
}
$Comments
}
filter ConvertTo-DefenderScanInfo
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
ScanType = [string]$_.ScanType
StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw
EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw
Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw
Reason = [string]$_.Reason
SkipReason = [string]$_.SkipReason
}
if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path)
}
if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath)
}
if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image)
}
elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) {
try {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name)
} catch {
# Silently ignore.
}
}
$ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null }
if ($ProcessId) {
$result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId)
}
if ($result.Image -and $result.ProcessId) {
$ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId
$result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName)
}
if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) {
$Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw)
$result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo')
}
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString
$result
}
filter ConvertTo-DefenderScanOverview
{
param(
[bool]$Raw = $false
)
$vals = [ordered]@{}
foreach ($entry in $_.PSObject.Properties) {
if ($entry.Value) {
$Key = $entry.Name.Replace("_", " ")
if ($Key.EndsWith("Time")) {
$vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw
}
elseif ($Key.EndsWith("Duration")) {
$vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw
}
else {
$vals[$Key] = $entry.Value
}
}
}
# Remove duplicates
if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) {
$hints = [ordered]@{}
foreach ($hint in $_.PerfHints) {
$hints[$hint] = $true
}
$vals["PerfHints"] = @($hints.Keys)
}
$result = New-Object PSCustomObject -Property:$vals
$result
}
filter ConvertTo-DefenderScanStats
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
Count = $_.Count
TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw
MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw
AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw
MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw
MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats')
}
$result
}
[scriptblock]$FriendlyScannedFilePathStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
}
}
filter ConvertTo-DefenderScannedFilePathStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedPathsStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
Folder = $this.Folder
}
}
filter ConvertTo-DefenderScannedPathsStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedFileExtensionStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Extension = $this.Extension
}
}
filter ConvertTo-DefenderScannedFileExtensionStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats')
}
$result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
[scriptblock]$FriendlyScannedProcessStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
ProcessPath = $this.ProcessPath
}
}
filter ConvertTo-DefenderScannedProcessStats
{
param(
[bool]$Raw
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats')
}
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Extensions)
{
$result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@(
$_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
<#
.SYNOPSIS
This cmdlet reports the file paths, file extensions, and processes that cause
the highest impact to Microsoft Defender Antivirus scans.
.DESCRIPTION
This cmdlet analyzes a previously collected Microsoft Defender Antivirus
performance recording and reports the file paths, file extensions and processes
that cause the highest impact to Microsoft Defender Antivirus scans.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start at MinStartTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start before or at MaxStartTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end at MinEndTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end before or at MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview
#>
function Get-MpPerformanceReport {
[CmdletBinding()]
param(
# Specifies the location of Microsoft Defender Antivirus performance recording to analyze.
[Parameter(Mandatory=$true,
Position=0,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Location of Microsoft Defender Antivirus performance recording.")]
[ValidateNotNullOrEmpty()]
[string]$Path,
# Requests a top files report and specifies how many top files to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFiles = 0,
# Specifies how many top scans to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFile = 0,
# Specifies how many top processes to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerFile = 0,
# Specifies how many top scans to output for each top process for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerFile = 0,
# Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPaths = 0,
# Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used.
[ValidateRange(1,1024)]
[int]$TopPathsDepth = 0,
# Specifies how many top scans to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPath = 0,
# Specifies how many top files to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerPath = 0,
# Specifies how many top scans to output for each top file for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerPath = 0,
# Specifies how many top extensions to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerPath = 0,
# Specifies how many top scans to output for each top extension for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerPath = 0,
# Specifies how many top processes to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerPath = 0,
# Specifies how many top scans to output for each top process for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerPath = 0,
# Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensions = 0,
# Specifies how many top scans to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtension = 0,
# Specifies how many top paths to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerExtension = 0,
# Specifies how many top scans to output for each top path for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerExtension = 0,
# Specifies how many top files to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerExtension = 0,
# Specifies how many top scans to output for each top file for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerExtension = 0,
# Specifies how many top processes to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerExtension = 0,
# Specifies how many top scans to output for each top process for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerExtension = 0,
# Requests a top processes report and specifies how many top processes to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcesses = 0,
# Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcess = 0,
# Specifies how many top files to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerProcess = 0,
# Specifies how many top scans to output for each top file for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerProcess = 0,
# Specifies how many top extensions to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerProcess = 0,
# Specifies how many top scans to output for each top extension for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerProcess = 0,
# Specifies how many top paths to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerProcess = 0,
# Specifies how many top scans to output for each top path for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerProcess = 0,
# Requests a top scans report and specifies how many top scans to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScans = 0,
## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f)
# Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report.
# Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.
[ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')]
[string]$MinDuration = '0us',
# Specifies the minimum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinStartTime = [DateTime]::MinValue,
# Specifies the minimum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinEndTime = [DateTime]::MinValue,
# Specifies the maximum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
# Specifies the maximum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxEndTime = [DateTime]::MaxValue,
# Adds an overview or summary of the scans captured in the trace to the regular output.
[switch]$Overview,
# Specifies that the output should be machine readable and readily convertible to serialization formats like JSON.
# - Collections and elements are not be formatted.
# - TimeSpan values are represented as number of 100-nanosecond intervals.
# - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC).
[switch]$Raw
)
#
# Validate performance recording presence
#
if (-not (Test-Path -Path:$Path -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path
$psCmdlet.WriteError($errRecord)
return
}
function ParameterValidationError {
[CmdletBinding()]
param (
[Parameter(Mandatory)]
[string]
$ParameterName,
[Parameter(Mandatory)]
[string]
$ParentParameterName
)
$ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'."
$category = [System.Management.Automation.ErrorCategory]::MetadataError
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName
$psCmdlet.WriteError($errRecord)
}
#
# Additional parameter validation
#
if ($TopFiles -eq 0)
{
if ($TopScansPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles'
}
if ($TopProcessesPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles'
}
}
if ($TopProcessesPerFile -eq 0)
{
if ($TopScansPerProcessPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile'
}
}
if ($TopPathsDepth -gt 0)
{
if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0))
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension'
}
}
if ($TopPaths -eq 0)
{
if ($TopScansPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths'
}
if ($TopFilesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths'
}
if ($TopExtensionsPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths'
}
if ($TopProcessesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths'
}
}
if ($TopFilesPerPath -eq 0)
{
if ($TopScansPerFilePerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath'
}
}
if ($TopExtensionsPerPath -eq 0)
{
if ($TopScansPerExtensionPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath'
}
}
if ($TopProcessesPerPath -eq 0)
{
if ($TopScansPerProcessPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath'
}
}
if ($TopExtensions -eq 0)
{
if ($TopScansPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopFilesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopProcessesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopPathsPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions'
}
}
if ($TopFilesPerExtension -eq 0)
{
if ($TopScansPerFilePerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension'
}
}
if ($TopProcessesPerExtension -eq 0)
{
if ($TopScansPerProcessPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension'
}
}
if ($TopPathsPerExtension -eq 0)
{
if ($TopScansPerPathPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension'
}
}
if ($TopProcesses -eq 0)
{
if ($TopScansPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopFilesPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopExtensionsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopPathsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses'
}
}
if ($TopFilesPerProcess -eq 0)
{
if ($TopScansPerFilePerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess'
}
}
if ($TopExtensionsPerProcess -eq 0)
{
if ($TopScansPerExtensionPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess'
}
}
if ($TopPathsPerProcess -eq 0)
{
if ($TopScansPerPathPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess'
}
}
if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies
[string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation
#
# Test dependency presence
#
[string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe"
if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand
$psCmdlet.WriteError($errRecord)
return
}
# assemble report arguments
[string[]]$reportArguments = @(
$PSBoundParameters.GetEnumerator() |
Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } |
ForEach-Object { "-$($_.Key)"; "$($_.Value)"; }
)
[timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration
if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0))
{
$reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks))
}
$MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime
$MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime
$ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime
if ($false -eq $ret.status)
{
return
}
[string[]]$intervalArguments = $ret.arguments
if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0))
{
$reportArguments += $intervalArguments
}
if ($Overview)
{
$reportArguments += "-Overview"
}
$report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json
$result = [PSCustomObject]@{}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result')
}
if ($TopFiles -gt 0)
{
$reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles)
}
}
if ($TopPaths -gt 0)
{
$reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths)
}
}
if ($TopExtensions -gt 0)
{
$reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions)
}
}
if ($TopProcesses -gt 0)
{
$reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses)
}
}
if ($TopScans -gt 0)
{
$reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans)
}
}
if ($Overview)
{
if ($null -ne $report.Overview) {
$reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw
$result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview
if (-not $Raw) {
$result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview')
}
}
}
$result
}
$exportModuleMemberParam = @{
Function = @(
'New-MpPerformanceRecording'
'Get-MpPerformanceReport'
)
}
Export-ModuleMember @exportModuleMemberParam
# SIG # Begin signature block
# MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH
# 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ
# mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3
# RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq
# tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7
# EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/
# 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt
# SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC
# FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL
# JZwfEO4YeUvzRyzBGzb6/QIGZbqjqcc+GBMyMDI0MDIwMjAyNTYwNS42MDNaMASA
# AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
# JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC
# EzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1
# WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE
# CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL
# Ex1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC
# AgoCggIBALVjtZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM
# 8KbQrMDol7DC7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl
# 7brPQx7H99UJbsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8
# zwWr4r9xkMmUXs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1L
# Fd96FNxAzwnetSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9gh
# orp9qUKcBUfFcS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCq
# QFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleO
# UsOQbgvlRdthFCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQf
# qKpivpyd7KCWACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+3
# 4IcFEhPogaKvNNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMK
# qphEtpSm1z3ufASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJ
# MIIBRTAdBgNVHQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt
# cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw
# AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv
# ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw
# ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI
# hvcNAQELBQADggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVg
# vSviCylr5ap3ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck3
# 7fggYK3+wEwLhP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OM
# uADS5lg7okrXa2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOM
# eJVmkk/O0ganhFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EG
# eXxfF8bofLVlUE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3
# vu/a+BFf2uIoycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev
# +iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAe
# S/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc
# 3saPmXhe6MhSgCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzOb
# Zmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIH
# cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB
# iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp
# TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw
# OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh
# C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx
# WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc
# UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc
# nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo
# veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi
# YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9
# fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH
# GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X
# KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE
# R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/
# eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3
# FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd
# BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE
# AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI
# MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB
# Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud
# HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By
# b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO
# MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy
# dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC
# AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk
# bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng
# ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3
# lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC
# gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6
# MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU
# BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh
# VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+
# fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp
# NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI
# qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB
# AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt
# MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw
# JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMc
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZ
# afp0bnpJdIhfiB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOlmc5cwIhgPMjAyNDAyMDIwMzQ2MzFa
# GA8yMDI0MDIwMzAzNDYzMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6WZzlwIB
# ADAHAgEAAgIA6DAHAgEAAgISQzAKAgUA6WfFFwIBADA2BgorBgEEAYRZCgQCMSgw
# JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
# DQEBBQUAA4GBALdwvE6EcuUvqINPrjSOKss3/vHysVv5Y2W31qgan7XrE2mJOu9v
# zeHNFH+DCNycfvuV/gWxOfQeyTOABv0xFtZ5tVr2ERzBy8++15fa2T3wYl8Rsi5z
# C8wW0pQ1htIENibsNQFcxPHedSHnA3HM49Ckr5+j5eyaxWe/lBohNOHYMYIEDTCC
# BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV
# 8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq
# hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgc+Ao5D8HJWYyGKt0bFMwhjf3wppM
# /++EYS0lWftW8LkwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0m
# uMbBUETODoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEILGEL4tzeCap
# q5d/nrUwZ0x0apPCvndnz9DSiT/soE6xMA0GCSqGSIb3DQEBCwUABIICAEH1Ar8J
# mymatXNcZ/lwdwtNOuKd8IIzlNFbEhFVFRv3pPWgxeoj70GmJ2F4+3lEuJZlryVI
# XIddKfpy8zMtmYburbDQnD23oWT46tnjEOFePrtjxoWRfk3zRy8dmxpThh8VZ8nk
# LGJ04d8PVYfMi4k2fMb8vxmBWJqr2XS6Isiv+eg/9n88SZo3R34YXRwLXrIsmbOW
# B5PBG2BAi6CSCFE9AgMEh9okl0UujCjukOi4E63QWuVEsGTWTwAbP1SHvh2fIUju
# QDBoo/xGqfaS2YPJ9+R0eY44jLkMkyf1Xq1UdBNM9CSKkRzY7C0KKiTXsY8nTVmq
# Y7yduyFRzfuJfQQvIIAUZrOMiDTK67FstkaT8idhAgXaIiNbKzQZP7rflfdZrxLG
# eteLYkwbxtfFx0xYBwA9Hbe9DclI8p/bLOLV5FiR1iKy+jcieYaTrmATQIW+1PoB
# UhXnjME3ummW4mRUpk1GTx2cQKTaGnZcj3Ss2tPLnHFoa3oBAM8n09VYv4+2y+o0
# aQTqgYub03TpKxqEIS1WMKUIaJZWShTOZ0eUDtUvLsye8+I/dQJ8m0UIKOe3pT9Q
# 3TytaR20VKsWndv1wMZOgGxt8JsitR/blFam2YMrQbyQPA64g2ToGkcEYjqmqTyx
# +EUAlOXmoU3hjKmtCBK2btmQ7IxlfIaS9XnO
# SIG # End signature block
|
combined_dataset/train/non-malicious/763.ps1
|
763.ps1
|
function New-File {
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true,
Position=0,
ParameterSetName="Path",
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Path to one or more locations.")]
[Alias("PSPath")]
[ValidateNotNullOrEmpty()]
[string[]]
$Path
)
begin {
}
process {
$paths = @()
foreach ($aPath in $Path) {
$paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath)
}
foreach ($aPath in $paths) {
if ($pscmdlet.ShouldProcess($aPath, 'Operation')) {
$aPath
}
}
}
end {
}
}
|
combined_dataset/train/non-malicious/2078.ps1
|
2078.ps1
|
Add-Type -WarningAction Ignore @'
public class Base
{
private int data;
protected Base()
{
data = 10;
}
protected Base(int i)
{
data = i;
}
protected int Field;
protected int Property { get; set; }
public int Property1 { get; protected set; }
public int Property2 { protected get; set; }
protected int Method()
{
return 32 + data;
}
protected int OverloadedMethod1(int i)
{
return 32 + i + data;
}
protected int OverloadedMethod1(string i)
{
return 1 + data;
}
public int OverloadedMethod2(int i)
{
return 32 + i + data;
}
protected int OverloadedMethod2(string i)
{
return 1 + data;
}
protected int OverloadedMethod3(int i)
{
return 32 + i + data;
}
public int OverloadedMethod3(string i)
{
return 1 + data;
}
}
'@
$derived1,$derived2,$derived3 = Invoke-Expression @'
class Derived : Base
{
Derived() : Base() {}
Derived([int] $i) : Base($i) {}
[int] TestPropertyAccess()
{
$this.Property = 1111
return $this.Property
}
[int] TestPropertyAccess1()
{
$this.Property1 = 2111
return $this.Property1
}
[int] TestPropertyAccess2()
{
$this.Property2 = 3111
return $this.Property2
}
[int] TestDynamicPropertyAccess()
{
$p = 'Property'
$this.$p = 1112
return $this.$p
}
[int] TestFieldAccess()
{
$this.Field = 11
return $this.Field
}
[int] TestDynamicFieldAccess()
{
$f = 'Field'
$this.$f = 12
return $this.$f
}
[int] TestMethodAccess()
{
return $this.Method()
}
[int] TestDynamicMethodAccess()
{
$m = 'Method'
return $this.$m()
}
[int] TestOverloadedMethodAccess1a()
{
return $this.OverloadedMethod1(42)
}
[int] TestOverloadedMethodAccess1b()
{
return $this.OverloadedMethod1("abc")
}
[int] TestOverloadedMethodAccess2a()
{
return $this.OverloadedMethod2(42)
}
[int] TestOverloadedMethodAccess2b()
{
return $this.OverloadedMethod2("abc")
}
[int] TestOverloadedMethodAccess3a()
{
return $this.OverloadedMethod3(42)
}
[int] TestOverloadedMethodAccess3b()
{
return $this.OverloadedMethod3("abc")
}
}
class Derived2 : Base {}
[Derived]::new()
[Derived]::new(20)
[Derived2]::new()
'@
Describe "Protected Member Access - w/ default ctor" -Tags "CI" {
It "Method Access" { $derived1.TestMethodAccess() | Should -Be 42 }
It "Dynamic Method Access" { $derived1.TestDynamicMethodAccess() | Should -Be 42 }
It "Field Access" { $derived1.TestFieldAccess() | Should -Be 11 }
It "Dynamic Field Access" { $derived1.TestDynamicFieldAccess() | Should -Be 12 }
It "Property Access - protected get/protected set" { $derived1.TestPropertyAccess() | Should -Be 1111 }
It "Property Access - public get/protected set " { $derived1.TestPropertyAccess1() | Should -Be 2111 }
It "Property Access - protected get/public set" { $derived1.TestPropertyAccess2() | Should -Be 3111 }
It "Dynamic Property Access" { $derived1.TestDynamicPropertyAccess() | Should -Be 1112 }
It "Method Access - overloaded 1a" { $derived1.TestOverloadedMethodAccess1a() | Should -Be 84 }
It "Method Access - overloaded 1b" { $derived1.TestOverloadedMethodAccess1b() | Should -Be 11 }
It "Method Access - overloaded 2a" { $derived1.TestOverloadedMethodAccess2a() | Should -Be 84 }
It "Method Access - overloaded 2b" { $derived1.TestOverloadedMethodAccess2b() | Should -Be 11 }
It "Method Access - overloaded 3a" { $derived1.TestOverloadedMethodAccess3a() | Should -Be 84 }
It "Method Access - overloaded 3b" { $derived1.TestOverloadedMethodAccess3b() | Should -Be 11 }
It "Implicit ctor calls protected ctor" { $derived3.OverloadedMethod2(42) | Should -Be 84 }
}
Describe "Protected Member Access - w/ non-default ctor" -Tags "CI" {
It "Method Access" { $derived2.TestMethodAccess() | Should -Be 52 }
It "Dynamic Method Access" { $derived2.TestDynamicMethodAccess() | Should -Be 52 }
It "Field Access" { $derived2.TestFieldAccess() | Should -Be 11 }
It "Dynamic Field Access" { $derived2.TestDynamicFieldAccess() | Should -Be 12 }
It "Property Access - protected get/protected set" { $derived1.TestPropertyAccess() | Should -Be 1111 }
It "Property Access - public get/protected set " { $derived1.TestPropertyAccess1() | Should -Be 2111 }
It "Property Access - protected get/public set" { $derived1.TestPropertyAccess2() | Should -Be 3111 }
It "Dynamic Property Access" { $derived2.TestDynamicPropertyAccess() | Should -Be 1112 }
It "Method Access - overloaded 1a" { $derived2.TestOverloadedMethodAccess1a() | Should -Be 94 }
It "Method Access - overloaded 1b" { $derived2.TestOverloadedMethodAccess1b() | Should -Be 21 }
It "Method Access - overloaded 2a" { $derived2.TestOverloadedMethodAccess2a() | Should -Be 94 }
It "Method Access - overloaded 2b" { $derived2.TestOverloadedMethodAccess2b() | Should -Be 21 }
It "Method Access - overloaded 3a" { $derived2.TestOverloadedMethodAccess3a() | Should -Be 94 }
It "Method Access - overloaded 3b" { $derived2.TestOverloadedMethodAccess3b() | Should -Be 21 }
}
Describe "Protected Member Access - members not visible outside class" -Tags "CI" {
Set-StrictMode -v 3
It "Invalid protected field Get Access" { { $derived1.Field } | Should -Throw -ErrorId "PropertyNotFoundStrict" }
It "Invalid protected property Get Access" { { $derived1.Property } | Should -Throw -ErrorId "PropertyNotFoundStrict" }
It "Invalid protected field Set Access" { { $derived1.Field = 1 } | Should -Throw -ErrorId "PropertyAssignmentException"}
It "Invalid protected property Set Access" { { $derived1.Property = 1 } | Should -Throw -ErrorId "PropertyAssignmentException" }
It "Invalid protected constructor Access" { { [Base]::new() } | Should -Throw -ErrorId "MethodCountCouldNotFindBest" }
It "Invalid protected method Access" { { $derived1.Method() } | Should -Throw -ErrorId "MethodNotFound" }
}
|
combined_dataset/train/non-malicious/2493.ps1
|
2493.ps1
|
$ips = '192.168.1.5','192.1..4444'
$t = $ips | foreach {
(New-Object Net.NetworkInformation.Ping).SendPingAsync($_, 250)
}
[Threading.Tasks.Task]::WaitAll($t)
$t.Result
|
combined_dataset/train/non-malicious/sample_2_58.ps1
|
sample_2_58.ps1
|
#************************************************
# TS_DFSRRootCausesCheck.ps1
# Version 1.0.5
# Date: 08-21-2014
# Author: David Fisher
# Description: DFSR Root causes troubleshooter
#************************************************
Import-LocalizedData -BindingVariable DFSRCheck
Write-DiagProgress -Activity $DFSRCheck.ID_DFSRCheckRC -Status $DFSRCheck.ID_DFSRCheckPaused
$RootCauseDetected = $false
$RootCauseName = "RC_DFSRRootCausesCheck"
#Rule 1
#
#Description
#-----------
# Checks a DFSR Event ID 2213 has been logged without the 2214 anti-event
#
#
#Related KB/Bemis
#----------
#http://support.microsoft.com/kb/2846759
#
#********************
#Data gathering
#********************
$InformationCollected = new-object PSObject
$HasIssue = $false
Function isDirtyShutdown
{
#Get Volume Hosting SysVol
$SysvolRG = get-itemproperty -path Registry::"HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters" -name SysVol -ErrorAction SilentlyContinue #_#
if ($SysvolRG) { #_#
$SysvolDrive = $SysvolRG.Sysvol.Substring(0,2)
#Get First 2213 Event for the SysVol volume
[XML]$results = c:\windows\system32\wevtutil.exe qe "DFS Replication" /rd:true /q:"*[System[EventID=2213]] and *[EventData[Data='$SysvolDrive']]" /c:1
} #_#
If($results.ChildNodes.Count -gt '0')
{
#Event ID: 2213 found
$EventTime = $results.event.System.TimeCreated.SystemTime
$readabledate = get-date $EventTime -format F
add-member -inputobject $InformationCollected -membertype noteproperty -name "Event ID 2213" -value ($DFSRCheck.ID_DFSRCheckPausedInfo + " " + $readabledate.ToString())
$Volume = $results.event.EventData.Data
$EventTimeStr = $EventTime.ToString()
$VolumeStr = $Volume[0].ToString()
[XML]$results2 = c:\windows\system32\wevtutil.exe qe "DFS Replication" /rd:true /q:"*[System[(EventID=2214) and TimeCreated[@SystemTime >= '$EventTimeStr']]] and *[EventData[Data='$VolumeStr']]" /c:1
#2214's found
If($results2.ChildNodes.Count -eq '0')
{
#Dirty Shutdown detected
return $true
}
Else
{
return $false
}
}
Else
{
#No Dirty Shutdown detected
return $false
}
}
#********************
#Detection Logic
#********************
if (isDirtyShutdown)
{
$HasIssue = $true
}
#********************
#Alert Evaluation
#********************
if($HasIssue)
{
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/2846759" -Verbosity "Warning" -InformationCollected $InformationCollected -Visibility 4 -SolutionTitle $DFSRCheck.ID_DFSRCheckPausedSD -SupportTopicsID 18464 -Component "Windows DFSR"
}
else
{
Update-DiagRootCause -id $RootCauseName -Detected $false
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDW6HTW9R8gQ1oz
# GFGtyJ2C0gcYfJ2Vn/z8myF0FFsCc6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICcQ
# /Ui5aZormeaR6uv9Wsx4MShaemghMEFTsXx3M9cJMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAkzK/2TWv7Rtf6DVS7K/vvl8eaVrmv+nvyiZc
# 0fxXLhTvM3YlkYk7NzOpHHq5uIR6NZhiVThYiXxAn6Q5ODP012zsrWNfzNl/YrFL
# FP2OqOCM9mWowVZhUyL6dHlv2W1ucCwge4r9H35JxJjnwDKAesYtQppNVn7AHnoT
# Eistbr3I28WxIxH8dSBvuQA5zfVWaHHj0NpcrC8tU/Uneu37Ix0EwB/3oNyTVkZD
# BL4ZYDIrqZ/DAi9Fb7pm2PfofjoxZdqCmiCjenuE+MoGb8tU7p/y0aOqS8d4ESFc
# Zi3kQKbYSDIMyqzyYMTACiaHbyQJ2I+JtY27/7HvZmWJkZUzf6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCA7fwYERFJ3XYNcygRbNI6swHewpYIVy4it
# DuBF94OcgwIGZutZ6YHTGBMyMDI0MTAyODExNDAzOC45ODZaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX
# qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF
# IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN
# XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6
# cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN
# h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69
# l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC
# qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt
# xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V
# 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH
# 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+
# nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL
# ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i
# O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q
# +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF
# RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d
# 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di
# rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+
# yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M
# k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb
# YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l
# T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip
# L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0
# MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA
# AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr
# /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3
# qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3
# 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk
# wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP
# 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgaOHcOpHbkCrSyMlXCF6I1JsQc3XnNlfQKIl/AggUirIwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI
# k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad
# RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAFy41zwDn+EP0Ho6po3FeXtlP9k3WibK
# JOtbkparEEENfVXWTJyP2B9qrviQJijiLtY/GGu0V5LjDALHqUcJZIgxvry4O0R3
# gJ3f6DXs7pe9plFf354FWd88VxBaQ439Z45AHxtPem/neD3nBezPUzfZbQTilfv+
# 9/GGKNAaZT+1iM8zTyuGA/dciQ3Stn88gJIVxWKZILnop6yCAGKSGY+5mLdQJ6Y9
# 7PgzVmJ9WTn0tS+S40YJODSh8k0g7sBUPGnk1X/gU9OWriV/0g/5jGkShNyuhpFh
# VIdMzLJGOJlJJwI7KOr+bZni/vHjTlw58uULLwLxC0jgNNQ4HYUsZRZrDH3vw22Z
# lg00fS/IGlwZTjxWgiJB0tQO81H/cW2qKchWAL5dUIpZq1P951hzJpvMg8Qj5AKM
# 173w9eEc/D2UcEuxAwgJq18wvogit0jAiOWtRtBB/7JmnSvYWyxzFvo08iha4k21
# MXV3qO4I5xKeMwoUSfxJ84yqUHnqwK6KC4eMgT5/vAP4SP9tFino1fvK228vSaA9
# j+EW3Q0wy7Yf2aKaBfFew19ZUYjP7mgfnywCvOkXPyYuT/f1e46h0r0C18hI66Bm
# BMi7f+ZidQjeqrKdSYqqaMMF8NQnMV0/hAeEAXeYt1eY3w3BOVVnmzVntqUkzVrd
# yXq096FwN14l
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_11_54.ps1
|
sample_11_54.ps1
|
<#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
Import-Module $PSScriptRoot\AzStackHci.SBEHealth.Helpers.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lhwTxt -FileName AzStackHci.SBEHealth.Strings.psd1
function Invoke-AzStackHciSBEHealthValidation
{
<#
.SYNOPSIS
Perform AzStackHci SBE Health validation
.DESCRIPTION
Perform AzStackHci SBE Health validation
.EXAMPLE
PS C:\> Invoke-AzStackHciSBEHealthValidation -SBESourcePath "C:\SBE"
Perform SBE Health validations on localhost
.EXAMPLE
PS C:\> $Credential = Get-Credential -Message "Credential for RemoteSystem"
PS C:\> $RemoteSystemSession = New-PSSession -Computer 10.0.0.4,10.0.0.5 -Credential $Credential
PS C:\> Invoke-AzStackHciSBEHealthValidation -SBESourcePath "C:\SBE" -PsSession $RemoteSystemSession
Perform SBE Health validations on the localhost and all specified remote PS sessions
.PARAMETER PsSession
Specify the PsSession(s) used to validation from
.PARAMETER Tag
Specify the Tag value to be passed to the SolutionExtension module when called
.PARAMETER SBESourcePath
Specify the full local path to the folder containing the extracted SBE Package
.PARAMETER SBEMetadataPath
Specify the full local path to the folder containing the SBE Metadata files
.PARAMETER PassThru
Return PSObject result
.PARAMETER OutputPath
Directory path for log and report output
.PARAMETER CleanReport
Remove all previous progress and create a clean report
.INPUTS
Inputs (if any)
.OUTPUTS
Output (if any)
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $false, HelpMessage = "Specify the PsSession(s) used to validation from. If null the local machine will be used.")]
[System.Management.Automation.Runspaces.PSSession[]]
$PsSession,
[Parameter(Mandatory = $false, HelpMessage = "Tag to pass to SolutionExtension module functions.")]
[string]
$Tag = "Deployment",
[Parameter(Mandatory = $true, HelpMessage = "Local path to the folder containing the extracted SBE Package.")]
[string]
$SBESourcePath,
[Parameter(Mandatory = $true, HelpMessage = "Local path to the folder containing the SBE metadata file.")]
[string]
$SBEMetadataPath,
[Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")]
[switch]
$PassThru,
[Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")]
[string]$OutputPath,
[Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")]
[switch]$CleanReport = $false,
[Parameter(Mandatory = $false, HelpMessage = "Show only failed results on screen.")]
[switch]$ShowFailedOnly,
[Parameter(Mandatory = $false, HelpMessage = "Skip the SBE file integrity test.")]
[switch]$SkipIntegrityTest
)
try
{
$script:ErrorActionPreference = 'Stop'
Set-AzStackHciOutputPath -Path $OutputPath
$allResult = @()
$sbeWorkingDir = Join-Path -Path $env:SystemDrive -ChildPath "SBE\Extracted"
Write-AzStackHciHeader -Invocation $MyInvocation -Params $PSBoundParameters -PassThru:$PassThru
Test-ModuleUpdate -PassThru:$PassThru
# Call/Initialise reporting
$envcheckerReport = Get-AzStackHciEnvProgress -Clean:$CleanReport
$envcheckerReport = Add-AzStackHciEnvJob -Report $envcheckerReport
# Pre-validation checks and preparation
Log-Info -Message ("Validate the SolutionExtension module is present and meets the requirements for health testing.") -Type Info
try
{
$result = Test-SolutionExtensionModule -PackagePath $SBESourcePath
if ($false -eq $result)
{
$detailedMessage = "Skipping as the provided SolutionExtension module has not implemented any tests or does not support the HealthServiceIntegration tag."
Log-Info -Message $detailedMessage -Type Info
$instanceResult = New-SBEHealthResultObject -TestName 'Test-SolutionExtensionModule' -TargetName $env:ComputerName -Status 'SUCCESS' -Description "Validate SolutionExtension module exists and supports health tests"
$instanceResult.AdditionalData[0].Detail = $detailedMessage
$allResult += $instanceResult
return $allResult
}
}
catch
{
Log-Info -Message "The SolutionExtension module could not be validated" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Test-SolutionExtensionModule' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Validate SolutionExtension module exists and supports health tests"
$exceptionResult.Severity = 'CRITICAL'
$detailedMessage = "The SolutionExtension module could not be validated. $($PSItem.Exception.Message)"
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Copy SBE package to local working dir
try
{
$result = Copy-SBEContentLocalToNode -PackagePath $SBESourcePath -TargetNodeName $env:ComputerName -ExcludeDirs @("IntegratedContent")
if ($false -eq $result)
{
throw "An error occurred during the SBE package copy operation. See logs for details."
}
}
catch
{
Log-Info -Message "An error occurred during the SBE package copy operation" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$detailedMessage = $PSItem.Exception.Message
$exceptionResult = New-SBEHealthResultObject -TestName 'Copy-SBEContentLocalToNode' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Copy the SBE Package to working folder on '$($env:ComputerName)'"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Validate SBE content integrity of working dir
try
{
if (-not $SkipIntegrityTest)
{
$result = Invoke-TestSBEContentIntegrity -SBEMetadataPath $SBEMetadataPath -SBEContentPath $sbeWorkingDir
if ($false -eq $result)
{
throw "SBE content integrity check found irregularities in the files at '$($sbeWorkingDir)'. Check the ECE logs for more information."
}
}
}
catch
{
$detailedMessage = "SBE content failed integrity check at '$($sbeWorkingDir)'"
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Test-SBEContentIntegrity' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Validate SBE content integrity"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Import the SolutionExtension module
try
{
$result = Import-SolutionExtensionModule -PackagePath $sbeWorkingDir
}
catch
{
$detailedMessage = "Import SolutionExtension module from '$($sbeWorkingDir)' failed. The exception was: $($PSItem.Exception.Message)"
Log-Info -Message "Import SolutionExtension module from '$($sbeWorkingDir)' failed." -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName 'Import-SolutionExtensionModule' -TargetName $env:ComputerName -Status 'FAILURE' -Description "Import SolutionExtension module"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
$allResult += $exceptionResult
throw $detailedMessage
}
# Run validation
try
{
$functionName = 'Get-SBEHealthCheckResult'
$exceptionResult = $null
$instanceResult = @()
$functionFound = Get-Command -Module SolutionExtension -Name $functionName -ErrorAction SilentlyContinue
if ($null -eq $functionFound)
{
$detailedMessage = "A function named '$($functionName)' was not found in the SolutionExtension module."
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
$thisResult = New-SBEHealthResultObject -TestName $functionName -TargetName $env:ComputerName -Status 'FAILURE' -Description "Invoke $functionName"
$thisResult.Severity = 'CRITICAL'
$thisResult.AdditionalData[0].Detail = $detailedMessage
$instanceResult += $thisResult
}
else
{
$solExtVersion = $functionFound.Version.ToString()
Log-Info -Message "SolutionExtension version being used: $solExtVersion" -Type Info
# TODO : Update this Get-SBEHealthCheckParams helper function to use the SBESolutionExtensionHelper (SBE Role) functions once they are ready
$params = Get-SBEHealthCheckParams
Log-Info -Message "Invoke $functionName on $($env:ComputerName)" -Type Info
[array]$thisResult = & $functionName @params
if ($thisResult.Count -eq 0)
{
Log-Info -Message "'$($functionName)' did not return any test results or no tests have been implemented." -Type Warning
}
else
{
[array]$assertResult = Assert-ResponseSchemaValid -ResultObject $thisResult
$instanceResult += $assertResult
}
}
}
catch
{
# Unexpected exception occurred during partner tests
Log-Info -Message "An error occurred during '$($functionName)'" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $env:ComputerName -Status 'FAILURE' -Description "$functionName on $($env:ComputerName)"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.Remediation = "https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-troubleshoot#rerun-deployment"
$exceptionResult.AdditionalData[0].Detail = "An unhandled error occurred: " + ($PSItem | Format-List * | Out-String).Trim()
throw $PSItem
}
finally
{
$allResult += $instanceResult
$allResult += $exceptionResult
}
try
{
$jobRun = @()
$exceptionResult = ""
$instanceResult = @()
$functionName = 'Get-SBEHealthCheckResultOnNode'
$functionFound = Get-Command -Module SolutionExtension -Name $functionName -ErrorAction SilentlyContinue
if ($null -eq $functionFound)
{
$detailedMessage = "A function named '$($functionName)' was not found in the SolutionExtension module."
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $env:ComputerName -Status 'FAILURE' -Description "Invoke $functionName"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
}
else
{
if ($null -eq $params)
{
$params = Get-SBEHealthCheckParams
}
foreach ($session in $PsSession)
{
try
{
$thisCred = $session.Runspace.ConnectionInfo.Credential
$result = Copy-SBEContentLocalToNode -PackagePath $SBESourcePath -TargetNodeName ($session.ComputerName) -ExcludeDirs @("IntegratedContent") -Credential $thisCred
if ($false -eq $result)
{
throw "An error occurred during the SBE package copy operation to '$($session.ComputerName)'. See logs for details."
}
}
catch
{
Log-Info -Message "An unhandled error occurred during 'Copy-SBEContentLocalToNode' to '$($session.ComputerName)'" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$detailedMessage = $PSItem.Exception.Message
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $session.ComputerName -Status 'FAILURE' -Description "Copy-SBEContentLocalToNode to '$($session.ComputerName)'"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
throw $detailedMessage
}
}
try
{
foreach ($session in $PsSession)
{
# Verify SBE content integrity
if (-not $SkipIntegrityTest)
{
$result = Invoke-TestSBEContentIntegrity -SBEMetadataPath $SBEMetadataPath -SBEContentPath $sbeWorkingDir -PsSession $session
if ($false -eq $result)
{
throw "SBE content integrity check found irregularities in the files at '$($sbeWorkingDir)' on '$($session.ComputerName)'"
}
}
# Import the SolutionExtension module
$result = Import-SolutionExtensionModule -PackagePath $sbeWorkingDir -PsSession $session
Log-Info -Message "Invoke $functionName on '$($session.ComputerName)'" -Type Info
$sbJob = {
if ($null -eq $functionName)
{
$functionName = $using:functionName
}
if ($null -eq $params)
{
$params = $using:params
}
& $functionName @params
}
$jobRun += Invoke-Command -Session $session -ScriptBlock $sbJob -AsJob
}
}
catch
{
Log-Info -Message "An unhandled error occurred on '$($session.ComputerName)' during '$($functionName)'" -Type Error -ConsoleOut
Log-Info -Message ("The exception message was: $($PSItem.Exception.Message)") -Type Error -ConsoleOut
$detailedMessage = $PSItem.Exception.Message
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $session.ComputerName -Status 'FAILURE' -Description "Invoke '$($functionName)' on '$($session.ComputerName)'"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
throw $detailedMessage
}
# Wait for all jobs to complete with a timeout after 30 minutes
Log-Info -Message "Waiting for all '$($functionName)' jobs to complete" -Type Info
$waitJob = $true
$stopwatch = [System.Diagnostics.Stopwatch]::StartNew()
$timeoutMinutes = 30
while ($true -eq $waitJob)
{
if ($stopwatch.Elapsed.TotalMinutes -ge $timeoutMinutes)
{
Log-Info -Message "All jobs have not completed in the specified timeout period." -Type Error
$stopwatch.Stop()
$waitJob = $false
}
else
{
$keepWaiting = $false
foreach ($job in $jobRun.ChildJobs)
{
if ($job.State -eq 'Running')
{
$keepWaiting = $true
}
}
if ($false -eq $keepWaiting)
{
$stopwatch.Stop()
$waitJob = $false
}
else
{
Start-Sleep -Seconds 30
}
}
}
foreach ($job in $jobRun.ChildJobs)
{
$thisComputerName = $job.Location
if ($job.State -eq 'Failed')
{
[string]$detailedMessage = "Error while running '$($functionName)' on '$($thisComputerName)'. Exception message: " + $job.JobStateInfo.Reason.Message
Log-Info -Message $detailedMessage -Type Error -ConsoleOut
$exceptionResult = New-SBEHealthResultObject -TestName $functionName -TargetName $job.Location -Status 'FAILURE' -Description "An exception occurred during $functionName"
$exceptionResult.Severity = 'CRITICAL'
$exceptionResult.AdditionalData[0].Detail = $detailedMessage
$allResult += $exceptionResult
}
elseif ($job.State -eq 'Running')
{
Log-Info -Message "'$($functionName)' was still running on '$($thisComputerName)' when the timeout period was hit." -Type Warning
$job | Stop-Job
}
else
{
Log-Info -Message "Log results for '$($thisComputerName)'" -Type Info
[array]$thisOutput = $job.Output
if ($thisOutput.Count -gt 0)
{
$instanceResult += $thisOutput
}
}
}
if ($instanceResult.Count -gt 0)
{
[array]$assertResult = Assert-ResponseSchemaValid -ResultObject $instanceResult
[array]$instanceResult = $assertResult
}
else
{
Log-Info -Message "'$($functionName)' did not return any test results or no tests have been implemented." -Type Warning
}
}
}
catch
{
foreach ($job in $jobRun.ChildJobs)
{
if ($job.State -eq 'Running')
{
Log-Info -Message "'$($functionName)' was still running on '$($thisComputerName)' when an exception occurred." -Type Warning
$job | Stop-Job
}
}
throw $PSItem
}
finally
{
$allResult += $instanceResult
$allResult += $exceptionResult
}
return $allResult
}
catch
{
Log-Info -Message "" -ConsoleOut
Log-Info -Message "$($PSItem.Exception.Message)" -ConsoleOut -Type Error
Log-Info -Message "$($PSItem.ScriptStackTrace)" -ConsoleOut -Type Error
$cmdletFailed = $true
throw $PSItem
}
finally
{
Log-Info -Message "Performing clean up"
$cleanupScriptBlock = {
Get-Module -Name SolutionExtension -ErrorAction SilentlyContinue | Remove-Module -Force -Verbose:$false
if ($null -eq $sbeWorkingDir)
{
$sbeWorkingDir = $using:sbeWorkingDir
}
if (Test-Path -Path $sbeWorkingDir)
{
Write-Output "Remove SBE temporary working folder '$($sbeWorkingDir)' on '$($env:ComputerName)'"
Remove-Item -Path $sbeWorkingDir -Recurse -Force
}
}
if ($PsSession.Count -gt 0)
{
$jobClean = Invoke-Command -Session $PsSession -ScriptBlock $cleanupScriptBlock -AsJob
$jobClean | Wait-Job | Out-Null
foreach ($job in $jobClean.ChildJobs)
{
if ($job.State -eq 'Failed')
{
[string]$detailedMessage = "An exception occurred during clean-up on '$($job.Location)'. Exception message: " + $job.JobStateInfo.Reason.Message
Log-Info -Message $detailedMessage -Type Warning
}
else
{
[string]$output = $job.Output
Log-Info -Message $output -Type Info
}
}
}
else
{
Invoke-Command -ScriptBlock $cleanupScriptBlock
}
$script:ErrorActionPreference = 'SilentlyContinue'
# Write result to telemetry channel
foreach ($res in $allResult)
{
Write-ETWResult -Result $res
}
# Write validation result to report object and close out report
$envcheckerReport | Add-Member -MemberType NoteProperty -Name 'SBEHealth' -Value $allResult -Force
$envcheckerReport = Close-AzStackHciEnvJob -Report $envcheckerReport
Write-AzStackHciEnvReport -Report $envcheckerReport
Write-AzStackHciFooter -Invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBTREabfjr1qvnP
# ytKUSXEHBTKyTZxh5N6/CLiKAOFjnaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEfm8vqX695OfTPw7Vt7s89b
# 6LdghodePdvs7MSqBGrCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAUAnypO0DEIwsbgNddnBaoHe6kXbvnwBXUIPz96LfI6ReY3n5i6z0/sT0
# zah12sDxmmKbZ3bwfavuQRRqHjaot7mUKym58iLM/6mZraK4Ug+gx8c2Q6mn+dAt
# +D7EB3dgB1Qw6Y5V626O9VpS1q6MIsAEvG/1ZlMiswW+r0P4FhM1uuFj2ejPLAym
# w+MdRsmjmZGEyK/3Hz7KsI5s4MKQCu/wyqWzZRkHoe8ZeKGechoTmwR52lQ0QwH7
# fZq5+JA+vgLbglKaFs/KX1oFu+LAElp3s6SUepvOJ5+8KLdltYpqoWffBDdOEpSx
# 8ZRrTGnDSbwTvHoRtzAZmvW/0esqtKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAwmvy4H8FRO25BKaPFmmWPMYACxexYye/utqIX2q1b/AIGZbwTqNk/
# GBMyMDI0MDIxMjE0MDcyMC43OTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB
# /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv
# g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV
# ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5
# hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d
# 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f
# PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj
# +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5
# hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb
# K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6
# YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J
# OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9
# Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre
# rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55
# ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH
# XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb
# KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP
# maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY
# yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr
# 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA
# sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4
# vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh
# xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA
# Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomDAiGA8yMDI0MDIxMjA5NTEy
# MFoYDzIwMjQwMjEzMDk1MTIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiY
# AgEAMAoCAQACAgsyAgH/MAcCAQACAhMwMAoCBQDpdboYAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAI/UbL5fs6bEybEwXAuJcBkJhh+8iZ2jSmRxHWdnWCKP
# QexjvYjasY7O3LwI6wddB438CEK45jKRVUcISWGy4Ywh14ZM6yQ60OtJ1eBTDtQd
# A2zWVtgNqwCSAXCAzWYx+Vb6ulRVMG6eOo28MPfYKN4ecm07GElNizdGsUEbrYhW
# 6J+zM0CJM+uOPAazp36Duhn+sFWnN9J2/CjuNm2CnlZlYyZ2blr5bm6Bkrjogbjx
# HV/G9l4b/YbZZ5vutRIEcZzC+RVVkYfGKZ95cAa2vWVgFz/wOzVu1zNnzWzWSN+f
# +s/ZtAQrii6mQycgKCHv+p6R8+b7UpsKUanGmqeghScxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB
# 6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCB020OtsV2y5PeKkAcXCYadMRTWYNMnhNX9VkA0ia0c
# YjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSU
# gIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgSZ+doyWD+RmpVksUHUQMZ+kz
# pobpuBsBXOyPSrKzQLswDQYJKoZIhvcNAQELBQAEggIAqFb1q8hIFa/9H3+tNoPO
# KdTmsGWCGUVHEFd/BCjsj7RWT7SITlHb79LH4qDzi4H7smuKYdtZuheMp+MwYL4A
# x6BcNSp3m/3dBDTL/JQD5pzJivFIdmCgICs4XYOUlY3yH6MGJAMu8qunUTj98tlJ
# 7fFmCp98D2i2qKaU6yekR77959uBONvmK2wO3GSUYrOT2GPhHrIEb1JpslHg24bp
# /6SjNRWTLz4sEmyEBg8LJPD72eNn8sl4yFmEKgpJHT0u/1JMd+SSOj9c5c+oQdxa
# l4PYDOHpsHXfYxVmFWRVxlx/UxXXJwSmZvRmL3z+wKumTO9i33HOMzYgjQzRAjsQ
# 4jqyI8D773RLXZWBHDPirRK1R49M3Tnf/N10ttyItHFzAIMNCI2MkbbpD+n6pD0l
# Y9h8tiOSXvynWH5hySA3d6OhUV+cO9HDQsNqHbEy/OLzqK+VlqC7fhRgEFRBW/Jh
# 3wChv61Y9UDzlugdi9iMcrVTXBOn84Lbjv1O1wXBHjvC1oB2ms6WcLMq7rMfxwNA
# 3eAXgPVvmMI67GDRtCEeFEdiWDqsVruIWyCP6Aduu4d4XQCsNoPOWju49kjHh5Uz
# nCiWdFM7rNlekw3WcliYbNOWKWwN8KDhVjuzlMrO0Yy1ufyemAzYFi6h5z8/2ZYf
# OPLCgtlbpXCXcQbwYr1W86o=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2370.ps1
|
2370.ps1
|
[OutputType([void])]
[CmdletBinding()]
param(
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory)]
[ValidateScript({
if (-not (Test-Path -Path $_ -PathType Container)) {
throw "The destination folder '$_' could not be found."
} else {
$true
}
})]
[ValidateNotNullOrEmpty()]
[string]$LocalFolderPath,
[Parameter(Mandatory)]
[ValidateScript({
if ($_ -match '^\w:') {
throw "DestinationPath is not valid. Use a relative path to the SFTP session. Do not start the path with 'C:\', for example."
} else {
$true
}
})]
[ValidateNotNullOrEmpty()]
[string]$RemoteFilePath,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[pscredential]$Credential,
[Parameter()]
[ValidateNotNullOrEmpty()]
[switch]$Force
)
try {
Write-Verbose -Message 'Checking for required modules...'
$requiredModules = 'Posh-SSH'
if (-not (Get-Module -Name $requiredModules -ListAvailable)) {
Write-Verbose -Message "Installing required modules [$($requiredModules)]..."
Install-module $requiredModules -Force -Confirm:$false
}
Write-Verbose -Message "Creating SFTP session to [$($Server)] using username [$($Credential.username)]..."
$session = New-SFTPSession -ComputerName $Server -Credential $Credential -AcceptKey
$getParams = @{
SessionId = $session.SessionId
LocalPath = $LocalFolderPath
RemoteFile = $RemoteFilePath
}
if ($Force.IsPresent) {
$getParams.Overwrite = $true
}
Get-SFTPFile @getParams
}
catch {
Write-Host $_.Exception.Message -ForegroundColor Red
} finally {
if (Test-Path -Path variable:\session) {
Write-Verbose -Message 'Disconnecting SFTP session...'
if ($session = Get-SFTPSession -SessionId $session.SessionId) {
$session.Disconnect()
}
Write-Verbose -Message 'Removing SFTP session...'
$null = Remove-SftpSession -SftpSession $session
}
}
|
combined_dataset/train/non-malicious/3380.ps1
|
3380.ps1
|
[CmdletBinding(DefaultParameterSetName="CurrentDirectory")]
Param
(
[Parameter(ParameterSetName="AzurePowerShell", Mandatory=$true)]
[switch]$AzurePowerShell,
[Parameter(ParameterSetName="MsiInstall", Mandatory=$true)]
[switch]$MsiInstall,
[Parameter(ParameterSetName="GalleryInstall", Mandatory=$true)]
[switch]$GalleryInstall,
[Parameter(ParameterSetName="CustomPath", Mandatory=$true)]
[string]$CustomPath
)
function Check-StrongName {
[CmdletBinding()]
param([Parameter(ValueFromPipeline=$true)][string]$path)
$output = & "sn.exe" -vf $path
$length = $output.Length - 1
if (-not $output[$length].Contains("is valid")) {
Write-Output "$path has an invalid strong name."
}
}
function Check-AuthenticodeSignature {
[CmdletBinding()]
param([Parameter(ValueFromPipeline=$true)][string]$path)
$output = Get-AuthenticodeSignature $path
if (-not ($output.Status -like "Valid")) {
Write-Output "$path has an invalid authenticode signature. Status is $($output.Status)"
}
}
function Check-All {
[CmdletBinding()]
param([Parameter()][string]$path)
if (!(Get-Command "sn.exe" -ErrorAction SilentlyContinue))
{
Write-Error "Unable to find sn.exe; please ensure that the Windows SDK is installed and found in the PATH environment variable."
return
}
$invalidList = @()
$files = Get-ChildItem $path\* -Include *.dll -Recurse | Where-Object { $_.FullName -like "*Azure*" }
$files = $files | Where-Object { ($_.FullName -notlike "*System.Management.Automation*") }
Write-Host "Checking the strong name signature of $($files.Count) files (.dll)" -ForegroundColor Yellow
$invalidStrongNameList = @()
for ($idx = 0; $idx -lt $files.Length; $idx++) {
$percent = (100 * $idx) / $files.Length
Write-Progress -Activity "Validating strong name signature of $($files[$idx])" -Status "$percent% Complete" -PercentComplete $percent
$invalidStrongNameList += Check-StrongName -path $files[$idx]
}
if ($invalidStrongNameList.Length -gt 0) {
$invalidList += $invalidStrongNameList
Write-Host "Found $($invalidStrongNameList.Count) files with an invalid strong name signature." -ForegroundColor Red
}
else {
Write-Host "All files (.dll) have a strong name signature." -ForegroundColor Green
}
$files = Get-ChildItem $path\* -Include *.dll, *.ps1, *.psm1 -Recurse | Where-Object { $_.FullName -like "*Azure*" }
$files = $files | Where-Object { ($_.FullName -notlike "*Newtonsoft.Json*") -and `
($_.FullName -notlike "*AutoMapper*") -and `
($_.FullName -notlike "*Security.Cryptography*") -and `
($_.FullName -notlike "*NLog*") -and `
($_.FullName -notlike "*YamlDotNet*") -and `
($_.FullName -notlike "*BouncyCastle.Crypto*") -and `
($_.FullName -notlike "*System.Management.Automation*")}
Write-Host "Checking the authenticode signature of $($files.Count) files (.dll, .ps1, .psm1)" -ForegroundColor Yellow
$invalidAuthenticodeList = @()
for ($idx = 0; $idx -lt $files.Length; $idx++) {
$percent = (100 * $idx) / $files.Length
Write-Progress -Activity "Validating authenticode signature of $($files[$idx])" -Status "$percent% Complete" -PercentComplete $percent
$invalidAuthenticodeList += Check-AuthenticodeSignature -path $files[$idx]
}
if ($invalidAuthenticodeList.Length -gt 0) {
$invalidList += $invalidAuthenticodeList
Write-Host "Found $($invalidAuthenticodeList.Count) files with an invalid authenticode signature." -ForegroundColor Red
}
else {
Write-Host "All files (.dll, .ps1, .psd1) have a valid authenticode signature." -ForegroundColor Green
}
if ($invalidList.Length -gt 0) {
Write-Output($invalidList)
throw "Strong name signature check and/or authenticode signature check failed. Please see the above errors."
}
}
$path = ".\"
if ($PSCmdlet.ParameterSetName -eq "AzurePowerShell")
{
$ProfileModule = Get-Module -Name AzureRM.Profile -ListAvailable
if (!($ProfileModule))
{
Write-Error "Unable to find the AzureRM.Profile module. Please ensure that Azure PowerShell has been installed and the appropriate path is found in the PSModulePath environment variable."
return
}
if ($ProfileModule.Count -gt 1)
{
Write-Error "Mulitple versions of Azure PowerShell were found. Please use the -MsiInstall and -GalleryInstall switches to select the installed version you want to check."
return
}
$ModulePath = $ProfileModule.Path
if ($ModulePath -like "*Microsoft SDKs\Azure\PowerShell*")
{
$EndIdx = $ModulePath.IndexOf("PowerShell\ResourceManager", [System.StringComparison]::OrdinalIgnoreCase) + "PowerShell".Length
}
elseif ($ModulePath -like "*Modules\AzureRM.Profile*")
{
$EndIdx = $ModulePath.IndexOf("Modules\AzureRM.Profile", [System.StringComparison]::OrdinalIgnoreCase) + "Modules".Length
}
$path = $ModulePath.Substring(0, $EndIdx)
Write-Host "Found AzureRM module - checking all (Azure) files in $path" -ForegroundColor Yellow
}
elseif ($PSCmdlet.ParameterSetName -eq "MsiInstall")
{
$ProfileModule = Get-Module -Name AzureRM.Profile -ListAvailable
if (!($ProfileModule))
{
Write-Error "Unable to find the AzureRM.Profile module. Please ensure that Azure PowerShell has been installed and the appropriate path is found in the PSModulePath environment variable."
return
}
$SearchString = "Microsoft SDKs\Azure\PowerShell"
$ModulePath = $ProfileModule.Path
if ($ProfileModule.Count -gt 1)
{
$ModulePath = $ProfileModule | Where-Object { $_.Path -like "*$($SearchString)*" }
if (!($ModulePath))
{
Write-Error "Unable to find path of MSI-installed modules from multiple locations found in PSModulePath."
return
}
}
else
{
if ($ModulePath -notlike "*$($SearchString)*")
{
Write-Error "Modules installed on the current machine were not from MSI. Consider using the -GalleryInstall switch."
return
}
}
$EndIdx = $ModulePath.IndexOf("PowerShell\ResourceManager", [System.StringComparison]::OrdinalIgnoreCase) + "PowerShell".Length
$path = $ModulePath.Substring(0, $EndIdx)
Write-Host "Installed Azure PowerShell from MSI - checking all (Azure) files in $path" -ForegroundColor Yellow
}
elseif ($PSCmdlet.ParameterSetName -eq "GalleryInstall")
{
$ProfileModule = Get-Module -Name AzureRM.Profile -ListAvailable
if (!($ProfileModule))
{
Write-Error "Unable to find the AzureRM.Profile module. Please ensure that Azure PowerShell has been installed and the appropriate path is found in the PSModulePath environment variable."
return
}
$SearchString = "WindowsPowerShell\Modules"
$ModulePath = $ProfileModule.Path
if ($ProfileModule.Count -gt 1)
{
$ModulePath = $ProfileModule | Where-Object { $_.Path -like "*$($SearchString)*" }
if (!($ModulePath))
{
Write-Error "Unable to find path of gallery-installed modules from multiple locations found in PSModulePath."
return
}
}
else
{
if ($ModulePath -notlike "*$($SearchString)*")
{
Write-Error "Modules installed on the current machine were not from the gallery. Consider using the -MsiInstall switch."
return
}
}
$EndIdx = $ModulePath.IndexOf("Modules\AzureRM.Profile", [System.StringComparison]::OrdinalIgnoreCase) + "Modules".Length
$path = $ModulePath.Substring(0, $EndIdx)
Write-Host "Installed Azure PowerShell from the gallery - checking all (Azure) files in $path" -ForegroundColor Yellow
}
elseif ($PSCmdlet.ParameterSetName -eq "CustomPath")
{
$path = $CustomPath
Write-Host "Custom path provided - checking all (Azure) files in $path" -ForegroundColor Yellow
}
else
{
Write-Host "No switch parameter set - checking all files in current directory" -ForegroundColor Yellow
}
Check-All $path
|
combined_dataset/train/non-malicious/sample_50_19.ps1
|
sample_50_19.ps1
|
#
# Module manifest for module 'OCI.PSModules.Healthchecks'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Healthchecks.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ec09c1dc-6260-4794-9b17-b24077d3c55a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Healthchecks Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Healthchecks.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIHealthchecksHttpMonitor',
'Get-OCIHealthchecksHttpMonitorsList',
'Get-OCIHealthchecksHttpProbeResultsList',
'Get-OCIHealthchecksPingMonitor',
'Get-OCIHealthchecksPingMonitorsList',
'Get-OCIHealthchecksPingProbeResultsList',
'Get-OCIHealthchecksVantagePointsList',
'Move-OCIHealthchecksHttpMonitorCompartment',
'Move-OCIHealthchecksPingMonitorCompartment',
'New-OCIHealthchecksHttpMonitor',
'New-OCIHealthchecksOnDemandHttpProbe',
'New-OCIHealthchecksOnDemandPingProbe',
'New-OCIHealthchecksPingMonitor',
'Remove-OCIHealthchecksHttpMonitor',
'Remove-OCIHealthchecksPingMonitor',
'Update-OCIHealthchecksHttpMonitor',
'Update-OCIHealthchecksPingMonitor'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Healthchecks'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3966.ps1
|
3966.ps1
|
function Test-LBWithMultiIpConfigNICCRUD
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName1 = Get-ResourceName
$inboundNatRuleName2 = Get-ResourceName
$lbruleName = Get-ResourceName
$nicname1 = Get-ResourceName
$nicname2 = Get-ResourceName
$nicname3 = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
$ipconfig1Name = Get-ResourceName
$ipconfig2Name = Get-ResourceName
$ipconfig3Name = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule1 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName1 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$inboundNatRule2 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3391 -BackendPort 3392
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule1,$inboundNatRule2 -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count
Assert-Null $lb.InboundNatRules[0].BackendIPConfiguration
Assert-Null $lb.InboundNatRules[1].BackendIPConfiguration
Assert-AreEqual 0 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count
$nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0]
$nic1 = Get-AzNetworkInterface -Name $nicName1 -ResourceGroupName $rgname | Add-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -PrivateIpAddressVersion ipv4 -Subnet $vnet.Subnets[0] | Set-AzNetworkInterface
$nic2 = New-AzNetworkInterface -Name $nicname2 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0]
$nic2 = Get-AzNetworkInterface -Name $nicName2 -ResourceGroupName $rgname | Add-AzNetworkInterfaceIpConfig -Name $ipconfig2Name -PrivateIpAddressVersion ipv4 -Subnet $vnet.Subnets[0] | Set-AzNetworkInterface
$nic3 = New-AzNetworkInterface -Name $nicname3 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0]
$nic3 = Get-AzNetworkInterface -Name $nicName3 -ResourceGroupName $rgname | Add-AzNetworkInterfaceIpConfig -Name $ipconfig3Name -PrivateIpAddressVersion ipv4 -Subnet $vnet.Subnets[0] | Set-AzNetworkInterface
$nic1.IpConfigurations[0].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]);
$nic1.IpConfigurations[1].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]);
$nic1.IpConfigurations[0].LoadBalancerInboundNatRules.Add($lb.InboundNatRules[0]);
$nic2.IpConfigurations[0].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]);
$nic3.IpConfigurations[0].LoadBalancerInboundNatRules.Add($lb.InboundNatRules[1]);
$nic3.IpConfigurations[1].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]);
$nic1 = $nic1 | Set-AzNetworkInterface
$nic2 = $nic2 | Set-AzNetworkInterface
$nic3 = $nic3 | Set-AzNetworkInterface
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $nic1.IpConfigurations[0].Id $lb.InboundNatRules[0].BackendIPConfiguration.Id
Assert-AreEqual $nic3.IpConfigurations[0].Id $lb.InboundNatRules[1].BackendIPConfiguration.Id
Assert-AreEqual 4 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
$delete = Remove-AzNetworkInterface -ResourceGroupName $rgname -name $nicName1 -PassThru -Force
Assert-AreEqual true $delete
$delete = Remove-AzNetworkInterface -ResourceGroupName $rgname -name $nicName2 -PassThru -Force
Assert-AreEqual true $delete
$delete = Remove-AzNetworkInterface -ResourceGroupName $rgname -name $nicName3 -PassThru -Force
Assert-AreEqual true $delete
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-AddNICToLBWithMultiIpConfig
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName1 = Get-ResourceName
$inboundNatRuleName2 = Get-ResourceName
$lbruleName = Get-ResourceName
$nicname1 = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
$ipconfig1Name = Get-ResourceName
$ipconfig2Name = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule1 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName1 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$inboundNatRule2 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3391 -BackendPort 3392
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule1,$inboundNatRule2 -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count
$nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] -LoadBalancerBackendAddressPool $lb.BackendAddressPools[0] -LoadBalancerInboundNatRule $lb.InboundNatRules[0] | Add-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -PrivateIpAddressVersion ipv4 -Subnet $vnet.Subnets[0] | Add-AzNetworkInterfaceIpConfig -Name $ipconfig2Name -PrivateIpAddressVersion ipv4 -Subnet $vnet.Subnets[0] | Set-AzNetworkInterface
Assert-AreEqual 3 @($nic1.IpConfigurations).Count
Assert-AreEqual true $nic1.IpConfigurations[0].Primary
$delete = Remove-AzNetworkInterface -ResourceGroupName $rgname -name $nicname1 -PassThru -Force
Assert-AreEqual true $delete
$list = Get-AzNetworkInterface -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LBWithMultiIpConfigMultiNIC
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIp1Name = Get-ResourceName
$publicIp2Name = Get-ResourceName
$nicName = Get-ResourceName
$ipconfig1Name = Get-ResourceName
$ipconfig2Name = Get-ResourceName
$domainNameLabel1 = Get-ResourceName
$domainNameLabel2 = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/networkInterfaces"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip1 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$publicip2 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$ipconfig1 = New-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -Subnet $vnet.Subnets[0] -PublicIpAddress $publicip1 -Primary
$ipconfig2 = New-AzNetworkInterfaceIpConfig -Name $ipconfig2Name -PublicIpAddress $publicip2 -Subnet $vnet.Subnets[0]
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname -Location $location -IpConfiguration $ipconfig1,$ipconfig2 -Tag @{ testtag = "testval" }
Assert-AreEqual $rgname $nic.ResourceGroupName
Assert-AreEqual $nicName $nic.Name
Assert-NotNull $nic.ResourceGuid
Assert-AreEqual "Succeeded" $nic.ProvisioningState
Assert-AreEqual $nic.IpConfigurations[0].Name $nic.IpConfigurations[0].Name
Assert-AreEqual $nic.IpConfigurations[0].PublicIpAddress.Id $nic.IpConfigurations[0].PublicIpAddress.Id
Assert-AreEqual $nic.IpConfigurations[0].Subnet.Id $nic.IpConfigurations[0].Subnet.Id
Assert-NotNull $nic.IpConfigurations[0].PrivateIpAddress
Assert-AreEqual "Dynamic" $nic.IpConfigurations[0].PrivateIpAllocationMethod
$publicip1 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name
$publicip2 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name
Assert-AreEqual $nic.IpConfigurations[0].PublicIpAddress.Id $publicip1.Id
Assert-AreEqual $nic.IpConfigurations[1].PublicIpAddress.Id $publicip2.Id
Assert-AreEqual $nic.IpConfigurations[0].Id $publicip1.IpConfiguration.Id
Assert-AreEqual $nic.IpConfigurations[1].Id $publicip2.IpConfiguration.Id
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
Assert-AreEqual $nic.IpConfigurations[0].Subnet.Id $vnet.Subnets[0].Id
Assert-AreEqual $nic.IpConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id
Assert-AreEqual $nic.IpConfigurations[1].Subnet.Id $vnet.Subnets[0].Id
Assert-AreEqual $nic.IpConfigurations[1].Id $vnet.Subnets[0].IpConfigurations[1].Id
Assert-AreEqual 2 @($nic.IpConfigurations).Count
Assert-AreEqual $ipconfig1Name $nic.IpConfigurations[0].Name
Assert-AreEqual $publicip1.Id $nic.IpConfigurations[0].PublicIpAddress.Id
Assert-AreEqual $vnet.Subnets[0].Id $nic.IpConfigurations[0].Subnet.Id
Assert-NotNull $nic.IpConfigurations[0].PrivateIpAddress
Assert-AreEqual "Dynamic" $nic.IpConfigurations[0].PrivateIpAllocationMethod
Assert-AreEqual $nic.IpConfigurations[0].PrivateIpAddressVersion IPv4
Assert-AreEqual $nic.IpConfigurations[1].PrivateIpAddressVersion IPv4
Assert-AreEqual $ipconfig2Name $nic.IpConfigurations[1].Name
$delete = Remove-AzNetworkInterface -ResourceGroupName $rgname -name $nicName -PassThru -Force
Assert-AreEqual true $delete
$list = Get-AzNetworkInterface -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-MultiIpConfigCRUD
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$nicName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/networkInterfaces"
$location = Get-ProviderLocation $resourceTypeParent
$ipconfig1Name = Get-ResourceName
$ipconfig2Name = Get-ResourceName
$ipconfig3Name = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$ipconfig1 = New-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -Subnet $vnet.Subnets[0] -PublicIpAddress $publicip -Primary
$ipconfig2 = New-AzNetworkInterfaceIpConfig -Name $ipconfig2Name -PrivateIpAddressVersion IPv4 -Subnet $vnet.Subnets[0]
$actualNic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname -Location $location -IpConfiguration $ipconfig1,$ipconfig2 -Tag @{ testtag = "testval" }
$expectedNic = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname
Assert-AreEqual 2 @($expectedNic.IpConfigurations).Count
Assert-AreEqual $expectedNic.ResourceGroupName $actualNic.ResourceGroupName
Assert-AreEqual $expectedNic.Name $actualNic.Name
Assert-AreEqual $expectedNic.Location $actualNic.Location
Assert-NotNull $expectedNic.ResourceGuid
Assert-AreEqual "Succeeded" $expectedNic.ProvisioningState
Assert-AreEqual $expectedNic.IpConfigurations[0].Name $actualNic.IpConfigurations[0].Name
Assert-AreEqual $expectedNic.IpConfigurations[0].PublicIpAddress.Id $actualNic.IpConfigurations[0].PublicIpAddress.Id
Assert-AreEqual $expectedNic.IpConfigurations[0].Subnet.Id $actualNic.IpConfigurations[0].Subnet.Id
Assert-AreEqual $expectedNic.IpConfigurations[0].Primary $True
Assert-NotNull $expectedNic.IpConfigurations[0].PrivateIpAddress
Assert-AreEqual "Dynamic" $expectedNic.IpConfigurations[0].PrivateIpAllocationMethod
Assert-AreEqual $expectedNic.IpConfigurations[1].Name $actualNic.IpConfigurations[1].Name
Assert-AreEqual $expectedNic.IpConfigurations[1].PublicIpAddress.Id $actualNic.IpConfigurations[1].PublicIpAddress.Id
Assert-AreEqual $expectedNic.IpConfigurations[1].Subnet.Id $actualNic.IpConfigurations[1].Subnet.Id
Assert-AreEqual $expectedNic.IpConfigurations[1].Primary $False
Assert-NotNull $expectedNic.IpConfigurations[1].PrivateIpAddress
Assert-AreEqual "Dynamic" $expectedNic.IpConfigurations[1].PrivateIpAllocationMethod
$publicip = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName
Assert-AreEqual $expectedNic.IpConfigurations[0].PublicIpAddress.Id $publicip.Id
Assert-AreEqual $expectedNic.IpConfigurations[0].Id $publicip.IpConfiguration.Id
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
Assert-AreEqual $expectedNic.IpConfigurations[0].Subnet.Id $vnet.Subnets[0].Id
Assert-AreEqual $expectedNic.IpConfigurations[1].Subnet.Id $vnet.Subnets[0].Id
Assert-AreEqual $expectedNic.IpConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id
$list = Get-AzNetworkInterface -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $list[0].ResourceGroupName $actualNic.ResourceGroupName
Assert-AreEqual $list[0].Name $actualNic.Name
Assert-AreEqual $list[0].Location $actualNic.Location
Assert-AreEqual "Succeeded" $list[0].ProvisioningState
Assert-AreEqual $actualNic.Etag $list[0].Etag
$nicAfterAdd = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname | Add-AzNetworkInterfaceIpConfig -Name $ipconfig3Name -PrivateIpAddressVersion IPv4 -Subnet $vnet.Subnets[0]| Set-AzNetworkInterface
Assert-AreEqual 3 @($nicAfterAdd.IpConfigurations).Count
$nicAfterAdd = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname | Remove-AzNetworkInterfaceIpConfig -Name $ipconfig2Name | Set-AzNetworkInterface
Assert-AreEqual 2 @($nicAfterAdd.IpConfigurations).Count
$nicLatest = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname | Set-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -PrivateIpAddressVersion IPv4 -Subnet $vnet.Subnets[0] -PrivateIpAddress 10.0.1.43 -Primary | Set-AzNetworkInterface
Assert-AreEqual $nicLatest.IpConfigurations[0].Id $expectedNic.IpConfigurations[0].Id
Assert-AreEqual $nicLatest.IpConfigurations[0].PrivateIpAddress "10.0.1.43"
Assert-AreEqual 2 @($nicAfterAdd.IpConfigurations).Count
$nicLatest = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgname | Set-AzNetworkInterfaceIpConfig -Name $ipconfig1Name -PrivateIpAddressVersion IPv4 -Subnet $vnet.Subnets[0] -PrivateIpAddress 10.0.1.43 -Primary | Set-AzNetworkInterface
$delete = Remove-AzNetworkInterface -ResourceGroupName $rgname -name $nicName -PassThru -Force
Assert-AreEqual true $delete
$list = Get-AzNetworkInterface -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/1114.ps1
|
1114.ps1
|
$Port = 9879
$SiteName = 'TestEnableIisDirectoryBrowsing'
$VDirName = 'VDir'
$WebConfig = Join-Path $TestDir web.config
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve)
Install-IisAppPool -Name $SiteName
}
function Stop-TestFixture
{
Uninstall-IisAppPool -Name $SiteName
}
function Start-Test
{
Stop-Test
Install-IisWebsite -Name $SiteName -Path $TestDir -Bindings "http://*:$Port" -AppPoolName $SiteName
if( Test-Path $WebConfig )
{
Remove-Item $WebConfig
}
}
function Stop-Test
{
Uninstall-IisWebsite -Name $SiteName
}
function Test-ShouldEnableDirectoryBrowsing
{
Enable-IisDirectoryBrowsing -SiteName $SiteName
Assert-DirectoryBrowsingEnabled
}
function Test-ShouldTurnOnDirectoryBrowsingUnderVirtualDirectory
{
Install-IisVirtualDirectory -SiteName $SiteName -Name $VDirName -Path $PSScriptRoot
Enable-IisDirectoryBrowsing -SiteName $SiteName -Path $VDirName
Assert-FileDoesNotExist $WebConfig 'Changes not committed to apphost config level.'
Assert-DirectoryBrowsingEnabled -VirtualPath $VDirName
}
function Assert-DirectoryBrowsingEnabled
{
param(
$VirtualPath
)
Set-StrictMode -Version 'Latest'
$url = "http://localhost:$Port/"
if( $VirtualPath )
{
$url = '{0}{1}' -f $url,$VirtualPath
}
$section = Get-IisConfigurationSection -SiteName $SiteName -SectionPath 'system.webServer/directoryBrowse' @PSBoundParameters
Assert-Equal 'true' $section['enabled']
$numTries = 0
$maxTries = 10
$foundDirectoryListing = $false
do
{
$output = Read-Url $Url
if( $output -like '*NewWebsite.html*' )
{
$foundDirectoryListing = $true
break
}
$numTries += 1
Start-Sleep -Milliseconds 100
}
while( $numTries -lt $maxTries )
Assert-True $foundDirectoryListing "Didn't get directory list."
}
function Read-Url($Url)
{
$browser = New-Object Net.WebClient
$numTries = 0
$maxTries = 10
do
{
try
{
return $browser.downloadString( $Url )
}
catch
{
Write-Verbose "Error downloading '$Url': $_"
$numTries++
Start-Sleep -Milliseconds 100
}
}
while( $numTries -lt $maxTries )
}
|
combined_dataset/train/non-malicious/Run-Query (SharePoint).ps1
|
Run-Query (SharePoint).ps1
|
function Run-Query($siteUrl, $queryText)
{
[reflection.assembly]::loadwithpartialname("microsoft.sharePOint") | out-null
[reflection.assembly]::loadwithpartialname("microsoft.office.server") | out-null
[reflection.assembly]::loadwithpartialname("microsoft.office.server.search") | out-null
$s = [microsoft.sharepoint.spsite]$siteUrl
$q = new-object microsoft.office.server.search.query.fulltextsqlquery -arg $s
$q.querytext = $queryText
$q.RowLimit = 100
$q.ResultTypes = "RelevantResults"
$dt = $q.Execute()
$r = $dt["RelevantResults"]
$output = @()
while ($r.Read()) {
$o = new-object PSObject
0..($r.FieldCount-1) | foreach {
add-member -inputObject $o -memberType "NoteProperty" -name $r.GetName($_) -value $r[$_].ToString()
}
$output += $o
}
return $output
}
#Sample usage:
#Run-Query -siteUrl "http://dev/" -queryText "SELECT PreferredName, WorkPhone FROM S"
|
combined_dataset/train/non-malicious/Script-Object_3.ps1
|
Script-Object_3.ps1
|
#Copyright (c) 2011 Justin Dearing
#
#Permission is hereby granted, free of charge, to any person obtaining a copy
#of this software and associated documentation files (the "Software"), to deal
#in the Software without restriction, including without limitation the rights
#to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
#copies of the Software, and to permit persons to whom the Software is
#furnished to do so, subject to the following conditions:
#
#The above copyright notice and this permission notice shall be included in
#all copies or substantial portions of the Software.
#
#THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
#IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
#FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
#AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
#LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
#OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
#THE SOFTWARE.
# The authoritative version is https://github.com/justaprogrammer/PowerShellScripts/blob/master/Script-Object.ps1.
# If you have a change I'd love to know about it to consider merging it into github.
param(
[Parameter(Mandatory=$true, HelpMessage='The name of the database object we wish to script')]
[string] $ObjectName,
[string] $Path = "$($ObjectName).sql",
[string] $ConnectionString = 'Data Source=.\\sqlexpress2k8R2;Initial Catalog=master;Integrated Security=SSPI;',
[string] $AtlantisSchemaEngineBaseDir = 'F:\\src\\Atlantis.SchemaEngine\\' # Adjust for your environment
);
Add-Type -Path "$($AtlantisSchemaEngineBaseDir)\\Atlantis.SchemaEngine\\bin\\Debug\\Atlantis.SchemaEngine.dll"
$schemaReader = [Atlantis.SchemaEngine.Container.SQLServer.SQLServerSchemaReaderFactory]::GetSpecificSQLServerSchemaReader($ConnectionString, [Atlantis.SchemaEngine.Enumerations.ContainerMode]::Navigation)
$dbObjects = $schemaReader.ReadObjects() | Where-Object { $_.ObjectName,$_.ObjectDesriptiveName,$_.ObjectQualifiedName -contains $ObjectName };
if ($dbObjects -eq $null) {
Throw New-Object System.ArgumentException "Object `"$($ObjectName)`" not found.",'-ObjectName';
}
$dbObjects.Script([Atlantis.SchemaEngine.Enumerations.ScriptGenerationType]::Create, (New-Object Atlantis.SchemaEngine.Configuration.GenerationOptions)).Scripts
|
combined_dataset/train/non-malicious/4032.ps1
|
4032.ps1
|
function Test-ResourceLockCRUD
{
$rgname = Get-ResourceGroupName
$rname = Get-ResourceName
$rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$apiversion = "2014-04-01"
$rg = New-AzResourceGroup -Name $rgname -Location $rglocation
$actual = New-AzResourceLock -LockName $rname -LockLevel CanNotDelete -Force -Scope $rg.ResourceId
$expected = Get-AzResourceLock -LockName $rname -Scope $rg.ResourceId
Assert-AreEqual $expected.Name $actual.Name
Assert-AreEqual $expected.ResourceId $actual.ResourceId
Assert-AreEqual $expected.ResourceName $actual.ResourceName
Assert-AreEqual $expected.ResourceType $actual.ResourceType
Assert-AreEqual $expected.LockId $actual.LockId
$expectedSet = Set-AzResourceLock -LockId $expected.LockId -LockLevel CanNotDelete -LockNotes test -Force
Assert-AreEqual $expectedSet.Properties.Notes "test"
$removed = Remove-AzResourceLock -LockId $expectedSet.LockId -Force
Assert-AreEqual True $removed
$actual = New-AzResourceLock -LockName $rname -LockLevel CanNotDelete -Force -Scope $rg.ResourceId
$removed = Remove-AzResourceLock -ResourceId $actual.ResourceId -Force
Assert-AreEqual True $removed
$actual = New-AzResourceLock -LockName $rname -LockLevel ReadOnly -Force -Scope $rg.ResourceId
Assert-AreEqual $expected.Name $actual.Name
$expected = Get-AzResourceLock -LockName $rname -Scope $rg.ResourceId
Assert-AreEqual $expected.Properties.Level "ReadOnly"
$removed = Remove-AzResourceLock -ResourceId $actual.ResourceId -Force
Assert-AreEqual True $removed
}
function Test-ResourceLockNonExisting
{
$rgname = Get-ResourceGroupName
$rglocation = Get-Location "Microsoft.Resources" "resourceGroups" "West US"
$rg = New-AzResourceGroup -Name $rgname -Location $rglocation
Assert-AreEqual $rgname $rg.ResourceGroupName
$lock = Get-AzResourceLock -LockName "NonExisting" -Scope $rg.ResourceId -ErrorAction SilentlyContinue
Assert-True { $Error[0] -like "*LockNotFound : The lock 'NonExisting' could not be found." }
Assert-Null $lock
$Error.Clear()
}
|
combined_dataset/train/non-malicious/sample_28_19.ps1
|
sample_28_19.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Creates a Redis Enterprise cache.
.Description
Creates or updates an existing (overwrite/recreate, with potential downtime) cache cluster with an associated database.
.Example
PS C:\> New-AzRedisEnterpriseCache -Name "MyCache" -ResourceGroupName "MyGroup" -Location "West US" -Sku "Enterprise_E10"
Location Name Type Zone Database
-------- ---- ---- ---- --------
West US MyCache Microsoft.Cache/redisEnterprise {default}
.Example
PS C:\> New-AzRedisEnterpriseCache -Name "MyCache" -ResourceGroupName "MyGroup" -Location "East US" -Sku "Enterprise_E20" -Capacity 4 -MinimumTlsVersion "1.2" -Zone "1","2","3" -Tag @{"tag1" = "value1"} -Module "{name:RedisBloom, args:`"ERROR_RATE 0.00 INITIAL_SIZE 400`"}","{name:RedisTimeSeries, args:`"RETENTION_POLICY 20`"}","{name:RediSearch}" -ClientProtocol "Plaintext" -EvictionPolicy "NoEviction" -ClusteringPolicy "EnterpriseCluster" -AofPersistenceEnabled -AofPersistenceFrequency "1s"
Location Name Type Zone Database
-------- ---- ---- ---- --------
East US MyCache Microsoft.Cache/redisEnterprise {1, 2, 3} {default}
.Example
PS C:\> New-AzRedisEnterpriseCache -Name "MyCache" -ResourceGroupName "MyGroup" -Location "East US" -Sku "EnterpriseFlash_F300" -NoDatabase
Location Name Type Zone Database
-------- ---- ---- ---- --------
East US MyCache Microsoft.Cache/redisEnterprise {}
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.ICluster
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
MODULE <IModule[]>: Optional set of redis modules to enable in this database - modules can only be added at creation time.
Name <String>: The name of the module, e.g. 'RedisBloom', 'RediSearch', 'RedisTimeSeries'
[Arg <String>]: Configuration options for the module, e.g. 'ERROR_RATE 0.00 INITIAL_SIZE 400'.
.Link
https://learn.microsoft.com/powershell/module/az.redisenterprisecache/new-azredisenterprisecache
#>
function New-AzRedisEnterpriseCache {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.ICluster])]
[CmdletBinding(DefaultParameterSetName='CreateClusterWithDatabase', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Alias('Name')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the Redis Enterprise cluster.
${ClusterName},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.String]
# The geo-location where the resource lives.
${Location},
[Parameter(Mandatory)]
[Alias('SkuName')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.SkuName])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.SkuName]
# The type of Redis Enterprise cluster to deploy.
# Allowed values: Enterprise_E10, Enterprise_E20, Enterprise_E50, Enterprise_E100, EnterpriseFlash_F300, EnterpriseFlash_F700, EnterpriseFlash_F1500
${Sku},
[Parameter()]
[Alias('SkuCapacity')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.Int32]
# The size of the Redis Enterprise cluster - defaults to 2 or 3 depending on SKU.
# Allowed values are (2, 4, 6, ...) for Enterprise SKUs and (3, 9, 15, ...) for Flash SKUs.
${Capacity},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.TlsVersion])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.TlsVersion]
# The minimum TLS version for the cluster to support - default is 1.2
# Allowed values: 1.0, 1.1, 1.2
${MinimumTlsVersion},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.String[]]
# The Availability Zones where this cluster will be deployed.
${Zone},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api30.ITrackedResourceTags]))]
[System.Collections.Hashtable]
# Cluster resource tags.
${Tag},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IModule[]]
# Optional set of redis modules to enable in this database - modules can only be added at create time.
# To construct, see NOTES section for MODULE properties and create a hash table.
${Module},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.Protocol])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.Protocol]
# Specifies whether redis clients can connect using TLS-encrypted or plaintext redis protocols - default is Encrypted
# Allowed values: Encrypted, Plaintext
${ClientProtocol},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.Int32]
# TCP port of the database endpoint - defaults to an available port
# Specified at create time.
${Port},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.EvictionPolicy])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.EvictionPolicy]
# Redis eviction policy - default is VolatileLRU
# Allowed values: AllKeysLFU, AllKeysLRU, AllKeysRandom, VolatileLRU, VolatileLFU, VolatileTTL, VolatileRandom, NoEviction
${EvictionPolicy},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.String]
# Name for the group of linked database resources
${GroupNickname},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.ILinkedDatabase[]]
# List of database resources to link with this database
# To construct, see NOTES section for GEOREPLICATIONLINKEDDATABASE properties and create a hash table.
${LinkedDatabase},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.ClusteringPolicy])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.ClusteringPolicy]
# Clustering policy - default is OSSCluster
# Specified at create time.
# Allowed values: EnterpriseCluster, OSSCluster
${ClusteringPolicy},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.String]
# Key encryption key Url versioned only. Ex: https://contosovault.vault.azure.net/keys/contosokek/562a4bb76b524a1493a6afe8e536ee78"
${CustomerManagedKeyEncryptionKeyUrl},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.ManagedServiceIdentityType])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.ManagedServiceIdentityType]
# Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
${IdentityType},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api40.IUserAssignedIdentities]))]
[System.Collections.Hashtable]
# The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
${IdentityUserAssignedIdentity},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.CmkIdentityType])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.CmkIdentityType]
# Only userAssignedIdentity is supported in this API version; other types may be supported in the future
${KeyEncryptionKeyIdentityType},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.String]
# User assigned identity to use for accessing key encryption key Url. Ex: /subscriptions/<sub uuid>/resourceGroups/<resource group>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myId.
${KeyEncryptionKeyIdentityUserAssignedIdentityResourceId},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.Management.Automation.SwitchParameter]
# [Preview] Sets whether AOF persistence is enabled.
# After enabling AOF persistence, you will be unable to disable it.
# Support for disabling AOF persistence after enabling will be added at a later date.
${AofPersistenceEnabled},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.AofFrequency])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.AofFrequency]
# [Preview] Sets the frequency at which data is written to disk if AOF persistence is enabled.
# Allowed values: 1s, always
${AofPersistenceFrequency},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.Management.Automation.SwitchParameter]
# [Preview] Sets whether RDB persistence is enabled.
# After enabling RDB persistence, you will be unable to disable it.
# Support for disabling RDB persistence after enabling will be added at a later date.
${RdbPersistenceEnabled},
[Parameter(ParameterSetName='CreateClusterWithDatabase')]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.RdbFrequency])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.RdbFrequency]
# [Preview] Sets the frequency at which a snapshot of the database is created if RDB persistence is enabled.
# Allowed values: 1h, 6h, 12h
${RdbPersistenceFrequency},
[Parameter(ParameterSetName='CreateClusterOnly', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Advanced - Do not automatically create a default database.
# Warning: The cache will not be usable until you create a database.
${NoDatabase},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$GetPSBoundParameters = @{} + $PSBoundParameters
$null = $GetPSBoundParameters.Remove("NoDatabase")
$null = $GetPSBoundParameters.Remove("Module")
$null = $GetPSBoundParameters.Remove("ClientProtocol")
$null = $GetPSBoundParameters.Remove("Port")
$null = $GetPSBoundParameters.Remove("EvictionPolicy")
$null = $GetPSBoundParameters.Remove("ClusteringPolicy")
$null = $GetPSBoundParameters.Remove("AofPersistenceEnabled")
$null = $GetPSBoundParameters.Remove("AofPersistenceFrequency")
$null = $GetPSBoundParameters.Remove("RdbPersistenceEnabled")
$null = $GetPSBoundParameters.Remove("RdbPersistenceFrequency")
$null = $GetPSBoundParameters.Remove("GroupNickname")
$null = $GetPSBoundParameters.Remove("LinkedDatabase")
$cluster = Az.RedisEnterpriseCache.internal\New-AzRedisEnterpriseCache @GetPSBoundParameters
if (('CreateClusterOnly') -contains $PSCmdlet.ParameterSetName)
{
$cluster.Database = @{}
return $cluster
}
$null = $PSBoundParameters.Remove("NoDatabase")
$null = $PSBoundParameters.Remove("Location")
$null = $PSBoundParameters.Remove("Sku")
$null = $PSBoundParameters.Remove("Capacity")
$null = $PSBoundParameters.Remove("MinimumTlsVersion")
$null = $PSBoundParameters.Remove("Zone")
$null = $PSBoundParameters.Remove("Tag")
$null = $PSBoundParameters.Remove("IdentityType")
$null = $PSBoundParameters.Remove("IdentityUserAssignedIdentity")
$null = $PSBoundParameters.Remove("CustomerManagedKeyEncryptionKeyUrl")
$null = $PSBoundParameters.Remove("KeyEncryptionKeyIdentityType")
$null = $PSBoundParameters.Remove("KeyEncryptionKeyIdentityUserAssignedIdentityResourceId")
$null = $PSBoundParameters.Add("DatabaseName", "default")
$database = Az.RedisEnterpriseCache.internal\New-AzRedisEnterpriseCacheDatabase @PSBoundParameters
$cluster.Database = @{$database.Name = $database}
return $cluster
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD0rj/Ys59Pqbjp
# n/50XheYjnoR5poqF84TjyzKHegNIKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEBXO/psFHF4H+pwpJ9Qs2tm
# PJRklbAwArz17aCDQZKGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkWGgtqmMXDZ5pku13lRaVzQC2oTPwSny4iXyCVN7gcstTAIPNfu2nUpY
# 6AyKmT1QzZGrGF152kXTaRPF9CITMzU5Aap21LjSmvmLBxUuMboCIh6DWisGKqYe
# YBhGstczkz7JOHjyDe4ro1Yo+3L6mjU7l5Ou1SozdDrq/YCogsIH51amApBuPNRS
# qFjZJJVHBuaXss+QWJOrWnEvGFEYtt1gD90Y4JODx4oSvx9q5fNxzRcswcLRs26/
# 8cFk3voFmraPxxi/UzpZJ7awDhB2uhXPVo1xThy2XPiB3cE2mb/7807pvNIMsPQr
# rB3GcqpwFiKkcZyeTUDjxmbfuZAYg6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCARRpXVuH5b8izgVBQ+pOtq4ZCmM1hpdVfGEn55XZz2QwIGZhfd8erJ
# GBMyMDI0MDQyMzEzMTUxMC40MDVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB
# /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv
# g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV
# ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5
# hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d
# 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f
# PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj
# +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5
# hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb
# K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6
# YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J
# OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9
# Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre
# rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55
# ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH
# XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb
# KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP
# maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY
# yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr
# 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA
# sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4
# vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh
# xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA
# Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIswjAiGA8yMDI0MDQyMzEyNDkw
# NloYDzIwMjQwNDI0MTI0OTA2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0izC
# AgEAMAoCAQACAiCOAgH/MAcCAQACAhLpMAoCBQDp035CAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBALwnR++F4evTR8/9iUVFiChCAH5sK+PsG42zTlXA7fnD
# dk+M7uELqLlaJX7RU6PfrxAKkyMCN++/y79mfMJvwiDMYd9VPJ6iAeHPc8wbqUuA
# nam1sufj3B/pY+arL0rGSaGTBQ4Kvl8jTQppUReErW5KRBFcOfELDEwsFLaYTD/K
# W4Afhqy488DKDUUbkOt4adfYXhC1BQnHqQzV+sk2raZj/cg80vuyrkIR29PlcJKV
# doH2xZ84DMA/e2gJJBn3UnPQANyaw4b6ojaAdIMt8671J/Nm1z04dcOX7q6o7HKM
# HEcsC2EOe9A3mxBC30+YiwYN1miUC2E+RKVfickz3mQxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB
# 6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCpbNvA1xqOyrp35rG/buWNAx+ujtv1rIDULe7hPnnZ
# oTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSU
# gIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgdp8Jl1s8iM14llKg2SCG18dq
# UIGTHEUl2ZdAhVhNPYMwDQYJKoZIhvcNAQELBQAEggIADucV/1Xq3EIEm+qp4x3i
# Z9ZZO/+w5GyVEaRCFoKnqf4gsdA4ytKiQbBzOqTgaQ1AqYeyuh/4L30Q0xxuVzn8
# qea8yzoRAU+TtM2QQqCRvrO2/8WTrqqcUF7LJgLqkEA9zUFVV/H7seNOC5CIe472
# rOZuIPjDalhEuVT1xatKt07BPNu4dvTy2NI7rCJL20B4udZ0assOQEYDvQ7Jf6FV
# FSr5D4C8jxYK4x8B+0qYQOXzqdlr8dbyile3PNwenqqebPrMEhZ7/4HQvf0xub+u
# uEXKQ8OSOaeMj32t1nv0uTWNnopRm4qMn3kdF6/KHpK0kOQvmEYb8Dw9Tx2efEqF
# 4pTB2OqUeUVJeWWXKJJGa/trkyjgwWiyTDEukRkww9LBxX0YuX0xv39ZXQBiPbGv
# DT5kY5XzAcz0dM8LAOuc93vnaGUFmvcDXAGiy499EnUZGzP43dyUdA+E54oHGs6F
# 08A8sa2h3Bwhcla/EhKkPYJDKSs7ngT11guqFkD/0kFd1T9fv4uOTj84GRhYRC8O
# bPXg4mCZWeXi/ti2DQpAkyFmOtlF08T7fBfVvgJ9cOhvRs1a5mkUbnLhP787cKmx
# U7/WZmcgFkPjXvAFAXSCcY26UQfmQ3NqCFWqRcMGnxnVaL9QeGJqC3QgCf5jwB51
# NeAJkbzKao+OhezE8LsX4Rc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_29_47.ps1
|
sample_29_47.ps1
|
<#
.SYNOPSIS
Finds the repositories registered with PowerShellGet and registers them for PSResourceGet.
#>
function Import-PSGetRepository {
[CmdletBinding(SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
# Use the -Force switch to overwrite existing repositories.
[switch]$Force
)
$Runtime = [System.Runtime.InteropServices.RuntimeInformation]
$OSPlatform = [System.Runtime.InteropServices.OSPlatform]
# this checks for WindowsPwsh and Core
$IsOSWindows = $Runtime::IsOSPlatform($OSPlatform::Windows)
if ($IsOSWindows) {
$PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path $env:LOCALAPPDATA -ChildPath 'Microsoft\Windows\PowerShell\PowerShellGet\'
}
else {
$PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('CACHE')) -ChildPath 'PowerShellGet'
}
$PSRepositoriesFilePath = Microsoft.PowerShell.Management\Join-Path -Path $PSGetAppLocalPath -ChildPath "PSRepositories.xml"
$PSGetRepositories = Microsoft.PowerShell.Utility\Import-Clixml $PSRepositoriesFilePath -ea SilentlyContinue
Microsoft.PowerShell.Utility\Write-Verbose ('Found {0} registered PowerShellGet repositories.' -f $PSGetRepositories.Count)
if ($PSGetRepositories.Count) {
$repos = @(
$PSGetRepositories.Values |
Microsoft.PowerShell.Core\Where-Object {$_.PackageManagementProvider -eq 'NuGet'-and $_.Name -ne 'PSGallery'} |
Microsoft.PowerShell.Utility\Select-Object Name, Trusted, SourceLocation
)
Microsoft.PowerShell.Utility\Write-Verbose ('Selected {0} NuGet repositories.' -f $repos.Count)
if ($repos.Count) {
$repos | Microsoft.PowerShell.Core\ForEach-Object {
try {
$message = 'Registering {0} at {1} -Trusted:${2} -Force:${3}.' -f $_.Name,
$_.SourceLocation, $_.Trusted, $Force
if ($PSCmdlet.ShouldProcess($message, $_.Name, 'Register-PSResourceRepository')) {
$registerPSResourceRepositorySplat = @{
Name = $_.Name
Uri = $_.SourceLocation
Trusted = $_.Trusted
PassThru = $true
Force = $Force
ApiVersion = if ([Uri]::new($_.SourceLocation).Scheme -eq 'file') {'local'} else {'v2'}
}
Register-PSResourceRepository @registerPSResourceRepositorySplat
}
}
catch [System.Management.Automation.PSInvalidOperationException] {
if ($_.Exception.Message -match 'already exists') {
Microsoft.PowerShell.Utility\Write-Warning $_.Exception.Message
Microsoft.PowerShell.Utility\Write-Warning 'Use the -Force switch to overwrite existing repositories.'
}
else {
throw $_.Exception
}
}
}
}
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCGbRVCjkuAuO6c
# hfY4EYA5iYXKrjQAEex9jeBBac8pz6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHpu2F8FvGRfddxbJIc4bRwU
# 5gIfFkL+YIcE13z6dtA0MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkxIofBAkoBNAvLWc1C4d07uoFJ27HYQ6h/LSwAW68Iqm6/p2FaoIJVco
# GfwkiM5fbpV/PIWHSlWGRshRrPPmqBAhRO22HaSdfXNfB6fY7Y9BKuJU/SG+z0QS
# kV75d5BN5MwY1CcPEYU3hG9DWFyP1v8tmfLJsX1zte7vXc+jP6L1cqGeG3XlrpfW
# 1B6J2mpvbqPHK722By8vUPB0BGQLFaaHN5GMB9/T+F9+KMihX+ciew/u3X6ev0G9
# Ar/omt+ZIv8guUIobsNIa9Pqw/nD+bm28aLsrRNgJOBZWXrh4tHx5KYBausupsFB
# p2k3MA2rreo3Ecz4CeQ7jZj8KR5X1KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDP9W5z6QA8ONHiseOtFAr7GekLJ7c/1iah4oEq8i/bbgIGZjOaP6Ua
# GBMyMDI0MDUxMzIwMjY0Ni40OTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6eyYtzAiGA8yMDI0MDUxMzEzNDgz
# OVoYDzIwMjQwNTE0MTM0ODM5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7Ji3
# AgEAMAcCAQACAhArMAcCAQACAhOfMAoCBQDp7eo3AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAIROBtHxslv4xVzImZxUNSDwTOXIrlceAmucbz8q93L199sx
# tSmYL6BIDsKdMNLIILnITlGjq0jG8uEYzSJfGIh2B+3RKjKDeRnHhwurK0KE4gHF
# iz598aT9quz8CyQnOadFQ3IUzpUvNvhavkMqraRvW0mWYZ0sTggdN1lDaeirqus+
# iZUye9S1sSQkRpKuT6hEIZbZt9GcYAhcCVa00sLhHlaNnxpkFwgqrAQYkxgLxaJL
# DWl3PA8jULFRGFIAjspLPvcHhLGwxQWA6lLXIqWZL94KXLc74sxRirAlsxnnEDt4
# z46UfkttrRcUaqIzrmoFhCkGkjmJgCAW3zKSoB4xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDn23vTvIoi+6otTmjijNMFegEw7zJoR8hqvUTptcwVmzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s
# uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgPH6+Y4xjd62fW1tDIhElAHnQ3en/
# TI7JrSzEH3Q8RuQwDQYJKoZIhvcNAQELBQAEggIAoyZBPA46LjKsO8qmMBNAmyzc
# 2B+ekihXGc7Bvreir17e/XDZ3HsNpp/KU/jPckyBDsf9pA5TI/NrFr6Fnx1+7PVh
# CZ4qqFLm/rpoCHzJnpcH+PtwCXfOvp147nts39jm3tz5EI4NxusVug3dUoWK/Lmi
# A8G8idEPuRLFgRzUxkpgwaw+v6zFCAUqkf064nhmrh0bGpM1xIJQm35AUHkMnOba
# Ljz0fuil5QvRGx+Tw9LGtrQ5y7+ApKtOpxttn00vOs+0DRm53fD4CVxrwdD0Jiou
# Kg6jZSSfU5aboPOVMkNauF/DNQrq4ijMujEwh+3w9HRG6P+BQtJPHaTgNjzpQvg6
# Hc+1OhA1TaHZ5apbFESGKKYlBjuOP8/90Os10B6TZy9iQDSzfYA6BKhaWJ67TBz2
# bzKh8Q1hbnCD9d1pNMwaJiWPj5kCOWrXIVx5q29ZNc7fltPYyLTIbD6vnmSXedCP
# kArCvRUxswfVAgkiXh8XN4IB9lnSPZ3KsGuQuzLI5ba20lWugi14Wid/z10SGYrJ
# bLhNASinauHeQJONloGNXyMnXxXvtQMqawzjajDKWpmMuvEJUQLEQSUTHctS2bQh
# BeaVkoqrpNXUuqa8Y8NmkQYQbsdRjvBd3kypx8tbaX3nRaMuJCIRy4XieY97ec5D
# ruO8JcA5rZuWOjGd5mI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-InstalledProgram_v_3.ps1
|
Get-InstalledProgram_v_3.ps1
|
function Get-InstalledProgram() {
param (
[String[]]$Computer,
$User
)
#############################################################################################
if ($User) {$Connection = Get-Credential -Credential $User}
#############################################################################################
if (!$Connection){
foreach ($Comp in $Computer){
$Install_soft = gwmi win32_product -ComputerName $Comp | where {$_.vendor -notlike "*Microsoft*" -and $_.vendor -notlike "*PGP*" -and $_.vendor -notlike "*Intel*" -and $_.vendor -notlike "*Corel*" -and $_.vendor -notlike "*Adobe*" -and $_.vendor -notlike "*ABBYY*" -and $_.vendor -notlike "*Sun*" -and $_.vendor -ne "SAP" -and $_.vendor -ne "Marvell" -and $_.vendor -ne "Hewlett-Packard"} | Format-List __SERVER,Name,Version,InstallDate
$Install_soft
}
}
else {
foreach ($Comp in $Computer){
$Install_soft = gwmi win32_product -ComputerName $Comp -Credential $Connection | where {$_.vendor -notlike "*Microsoft*" -and $_.vendor -notlike "*PGP*" -and $_.vendor -notlike "*Intel*" -and $_.vendor -notlike "*Corel*" -and $_.vendor -notlike "*Adobe*" -and $_.vendor -notlike "*ABBYY*" -and $_.vendor -notlike "*Sun*" -and $_.vendor -ne "SAP" -and $_.vendor -ne "Marvell" -and $_.vendor -ne "Hewlett-Packard"} | Format-List __SERVER,Name,Version,InstallDate
$Install_soft
}
}
}
|
combined_dataset/train/non-malicious/sample_43_18.ps1
|
sample_43_18.ps1
|
#
# Module manifest for module 'OCI.PSModules.Computeinstanceagent'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Computeinstanceagent.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '29321a90-4dd4-4c81-80f1-cc9ba6c1fdd3'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Computeinstanceagent Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Computeinstanceagent.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIComputeinstanceagentInstanceagentAvailablePluginsList',
'Get-OCIComputeinstanceagentInstanceAgentCommand',
'Get-OCIComputeinstanceagentInstanceAgentCommandExecution',
'Get-OCIComputeinstanceagentInstanceAgentCommandExecutionsList',
'Get-OCIComputeinstanceagentInstanceAgentCommandsList',
'Get-OCIComputeinstanceagentInstanceAgentPlugin',
'Get-OCIComputeinstanceagentInstanceAgentPluginsList',
'New-OCIComputeinstanceagentInstanceAgentCommand',
'Stop-OCIComputeinstanceagentInstanceAgentCommand'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Computeinstanceagent'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Set Active Sync DevideID.ps1
|
Set Active Sync DevideID.ps1
|
# Requires a connection to Exchange Server, or Exchange Management Shell
$s = New-PSSession -ConfigurationName Microsoft.Exchange -Name ExchMgmt -ConnectionUri http://ex14.domain.local/PowerShell/ -Authentication Kerberos
Import-PSSession $s
# Get all Client Access Server properties for all mailboxes with an ActiveSync Device Partnership
$Mailboxes = Get-CASMailbox -Filter {HasActivesyncDevicePartnership -eq $true} -ResultSize Unlimited
# Get DeviceID for all mailboxes
$EASMailboxes = $Mailboxes | Select-Object PrimarySmtpAddress,@{N='DeviceID';E={Get-ActiveSyncDeviceStatistics -Mailbox $_.Identity | Select-Object –ExpandProperty DeviceID}}
# Set the ActiveSyncAllowedDeviceIDs attribute of all Mailboxes
$EASMailboxes | foreach {Set-CASMailbox $_.PrimarySmtpAddress -ActiveSyncAllowedDeviceIDs $_.DeviceID}
|
combined_dataset/train/non-malicious/Ping Alert Script_1.ps1
|
Ping Alert Script_1.ps1
|
#Email Alert Parameters
$to = "user@mydomain.com"
$from = "unreachable@mydomain.com"
$smtpserver = "my_exchange_server"
#Array of computers to test
$Computers = ("comp1" , "comp2" , "comp3" , "comp4")
#Variable to hold INT value 0
$zero = 0
Foreach ($Computer in $Computers)
{
if
(
#Checks for a file with the host computers name in the Reports folder and if it doesn't exist creates it with content 0
Test-Path $("C:\\Reports\\" + $Computer + ".txt")
)
{
}
else
{
$zero > $("C:\\Reports\\" + $Computer + ".txt")
}
#Reads the content of the file and saves to variable as text
$FailedPings = Get-Content $("C:\\Reports\\" + $Computer + ".txt")
#Converts the value to INT
$INT_FailedPings = [INT]$FailedPings
#Actually runs the ping test
$PingTest = Test-Connection -ComputerName $Computer -count 1
if
(
#If ping is unsuccessful
$PingTest.StatusCode -ne "0"
)
{
if
(
#If previous failed pings value is less or equal to 3
$INT_FailedPings -le 3
)
{
#Increment the value by 1
$INT_FailedPings++
#Write the value out to the reports folder file for this host
$INT_FailedPings > $("C:\\Reports\\" + $Computer + ".txt")
#Send an alert of failed ping
Send-MailMessage -to $to -subject "Warning, Host $Computer is down. You will only receive 4 of these messages!" -from $from -body "Ping to $Computer failed, you will only receive 3 of these messages!" -smtpserver $smtpserver
}
}
elseif
(
#If previous checks have failed the value will be non zero, as checks are now working sets the value back to zero and alerts that host is back up
$INT_FailedPings -ne 0
)
{
$zero > $("C:\\Reports\\" + $Computer + ".txt")
Send-MailMessage -to $to -subject "Host $Computer is back up" -from $from -body "Panic over" -smtpserver $smtpserver
}
else
#If ping is successful and past pings were successful do nothing
{
}
}
|
combined_dataset/train/non-malicious/sample_32_84.ps1
|
sample_32_84.ps1
|
ConvertFrom-StringData @'
FailoverClustersModuleRequired=Le module PowerShell obligatoire (FailoverClusters) est introuvable. Utilisez l'outil Rôles et fonctionnalités pour installer : Outils d'administration de serveur distant | Outils d’administration de fonctionnalités | Outils Clustering de basculement | Module Cluster de basculement pour Windows PowerShell.
HyperVModuleRequired=Le module PowerShell obligatoire (Hyper-V) est introuvable. Utilisez l'outil Rôles et fonctionnalités pour installer : Outils d'administration de serveur distant | Outils d’administration de rôles | Outils d’administration Hyper-V | Module Hyper-V pour Windows PowerShell.
CimCmdletsModuleRequired=Le module PowerShell requis (CimCmdlets) est introuvable.
HypervisorSchedulerTypeNotSupported=Impossible de définir le type du planificateur de l’hyperviseur sur des serveurs Windows antérieurs à Windows Server 2016.
InvalidLoadBalancingAlgorithmType=Le paramètre de l’algorithme d’équilibrage de charge était fourni alors que le SET (Switch Embedded Teaming) n’est pas pris en charge.
DeviceIdNotFound=Appareil avec l’ID {0} introuvable dans l'ordinateur virtuel {1} (vmId = {2})
PhysicalNetworkAdapterRequired=Un nom d'adaptateur réseau physique doit être fourni pour un commutateur virtuel externe.
StartVirtualMachineStartingMessage=Démarrage de l'ordinateur virtuel {0}...
StartVirtualMachineSuccessMessage=Ordinateur virtuel {0} démarré.
StartVirtualMachineFailureMessage=Échec du démarrage de l'ordinateur virtuel {0}. Erreur : {1}
StartVirtualMachineOperationMessage=Ordinateurs virtuels {0} démarré. Impossible de démarrer les ordinateurs virtuels {1}.
ShutdownVirtualMachineStartingMessage=Arrêt de l'ordinateur virtuel {0}...
ShutdownVirtualMachineSuccessMessage=Ordinateur virtuel {0} arrêté.
ShutdownVirtualMachineFailureMessage=Échec de l'arrêt de l’ordinateur virtuel {0}. Message d’erreur : {1}
ShutdownVirtualMachineOperationMessage=Ordinateurs virtuels {0} arrêtés. Impossible d'arrêter les ordinateurs virtuels {1}.
TurnoffVirtualMachineStartingMessage=Désactivation de l'ordinateur virtuel {0}...
TurnoffVirtualMachineSuccessMessage=Ordinateur virtuel {0} désactivé.
TurnoffVirtualMachineFailureMessage=Échec de la désactivation de l’ordinateur virtuel {0}. Message d’erreur : {1}
TurnoffVirtualMachineOperationMessage=Ordinateurs virtuels {0} désactivés. Impossible de désactiver les ordinateurs virtuels {1}.
DeleteSavedStateVirtualMachineStartingMessage=Suppression de l'état enregistré de l'ordinateur virtuel {0}...
DeleteSavedStateVirtualMachineSuccessMessage=État enregistré de l'ordinateur virtuel {0} supprimé.
DeleteSavedStateVirtualMachineFailureMessage=Échec de la suppression de l'état enregistré de l'ordinateur virtuel {0}. Erreur : {1}
DeleteSavedStateVirtualMachineOperationMessage=État enregistré des ordinateurs virtuels {0} supprimé. Impossible de supprimer l'état enregistré pour les ordinateurs virtuels {1}.
SaveVirtualMachineStartingMessage=Enregistrement de l'ordinateur virtuel {0}...
SaveVirtualMachineSuccessMessage=Ordinateur virtuel {0} enregistré.
SaveVirtualMachineFailureMessage=Échec de l'enregistrement de l’ordinateur virtuel {0}. Message d’erreur : {1}
SaveVirtualMachineOperationMessage=Ordinateurs virtuels {0} enregistrés. Impossible d'enregistrer les ordinateurs virtuels {1}.
ResetVirtualMachineStartingMessage=Réinitialisation de l'ordinateur virtuel {0}...
ResetVirtualMachineSuccessMessage=Ordinateur virtuel {0} réinitialisé.
ResetVirtualMachineFailureMessage=Échec de la réinitialisation de l’ordinateur virtuel {0}. Message d’erreur : {1}
ResetVirtualMachineOperationMessage=Ordinateurs virtuels {0} réinitialisés. Impossible de réinitialiser les ordinateurs virtuels {1}.
ResumeVirtualMachineStartingMessage=Reprise de l'ordinateur virtuel {0}...
ResumeVirtualMachineSuccessMessage=Ordinateur virtuel {0} réactivé.
ResumeVirtualMachineFailureMessage=Échec de la reprise de l’ordinateur virtuel {0}. Message d’erreur : {1}
ResumeVirtualMachineOperationMessage=Ordinateurs virtuels {0} réactivés. Impossible de réactiver les ordinateurs virtuels {1}.
SuspendVirtualMachineStartingMessage=Interruption des ordinateurs virtuels {0}...
SuspendVirtualMachineSuccessMessage=Ordinateur virtuel {0} interrompu.
SuspendVirtualMachineFailureMessage=Échec de l'interruption de l’ordinateur virtuel {0}. Message d’erreur : {1}
SuspendVirtualMachineOperationMessage=Ordinateurs virtuels {0} interrompus. Impossible d'interrompre les ordinateurs virtuels {1}.
VirtualMachineDiskDeleteDiskNotFound=Impossible de supprimer le disque avec l’ID {0} de l’ordinateur virtuel {1}, car il est introuvable.
VirtualMachineDvdDeleteDiskNotFound=Impossible de supprimer le DVD/CD-ROM avec l'ID {0} de l'ordinateur virtuel {1}, car il est introuvable.
VirtualMachineDiskEditDiskNotFound=Impossible de modifier le disque avec l’ID {0} sur l'ordinateur virtuel {1}, car il est introuvable.
VirtualMachineDvdEditDiskNotFound=Impossible de modifier le DVD/CD-ROM avec l'ID {0} sur l'ordinateur virtuel {1}, car il est introuvable.
VirtualMachineDiskPathNotFound=Impossible de modifier le disque avec l’ID {0} sur l'ordinateur virtuel {1}, car il possède un paramètre de chemin d'accès vide.
VirtualMachineDvdPathNotFound=Impossible de modifier le DVD/CD-ROM avec l’ID {0} sur l'ordinateur virtuel {1}, car il possède un paramètre de chemin d'accès vide.
VirtualMachineNetworkDeleteAdapterNotFound=Impossible de supprimer l'adaptateur réseau virtuel avec l’ID {0} de l'ordinateur virtuel {1}, car il est introuvable.
VirtualMachineNetworkEditAdapterNotFound=Impossible de modifier l'adaptateur réseau virtuel avec l’ID {0} sur l'ordinateur virtuel {1}, car il est introuvable.
VirtualMachineNetworkEditAdapterVlanModeNotSupported=Impossible de modifier l'adaptateur réseau virtuel avec l'ID {0} sur l'ordinateur virtuel {1}, car le mode VLAN {2} n'est pas pris en charge.
VirtualMachineNetworkEditAdapterIsolationModeNotSupported=Impossible de modifier l'adaptateur réseau virtuel avec l'ID {0} sur l'ordinateur virtuel {1}, car le mode d'isolation {2} n'est pas pris en charge.
VirtualMachineSdnConfigurationFailed=L'ordinateur virtuel {0} a été créé, mais une erreur s’est produite lors de la configuration du réseau virtuel.
VirtualMachinesString=Machines virtuelles
VirtualMachinesSecuritySettingsNotSupported=Les paramètres de sécurité de la machine virtuelle ne sont pas pris en charge dans les versions de Windows Server antérieures à Windows Server 2012 R2.
MoveVirtualMachineStorageParametersInvalid=Les paramètres qui contrôlent le déplacement du stockage de l’ordinateur virtuel ne sont pas valides.
BritannicaNamespaceNotAvailable=L’espace de noms CIM requis pour le centre de données défini par le logiciel (SDDC\Management) est introuvable.
MoveVirtualMachineInvalidParameters=Les paramètres fournis pour déplacer la machine virtuelle ne sont pas valides.
MoveVirtualMachineVMIncompatible=Impossible de déplacer l’ordinateur virtuel {0} vers le nouveau serveur hôte, car des incompatibilités ont été détectées. Pour plus d’informations sur les incompatibilités, consultez les journaux des événements (Journaux des applications et des services\\Microsoft-ServerManagementExperience) sur {1}.
ImportVirtualMachineVMIncompatible=Impossible d’importer l’ordinateur virtuel {0} sur ce serveur hôte, car des incompatibilités ont été détectées. Pour plus d’informations sur les incompatibilités, consultez les journaux des événements (Journaux des applications et des services\\Microsoft-ServerManagementExperience) sur {1}.
NewVirtualMachineCreatedAddToClusterFailed=La machine virtuelle {0} a été créé avec succès sur le serveur {1} Il n’a pas été ajouté au cluster de basculement. Pour plus d’informations, consultez les journaux des événements (Journaux des Applications et Services\\Microsoft-ServerManagementExperience) sur {1}
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCvvYRbpQIldZF4
# dswy4zmrnfPiDiThkjHDMwiR+/np8qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICgD1zQjkImKGG/ZGzJw5fRO
# W2zmDOoh9Jgadxd6Jz0+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASLG2SmTTxHPYCB0ab3JNcZ2dKbc/lOU3L0uBgnF+MsYdsrHNwJG4TgBe
# KSxOfB/vMqzp4GcCtCgix0g4omLPzVZg8W8nonY2HrsymNNn5dZcmy0KUWQh73Wb
# 2UU/H3vkFD3G398i6Yo5ZVrFAcfh1Rgm7nH8O9sU0OfOZ/dIKUyVyEar0NK3tL7J
# RH9X+PbxC2/fC7T/xYJ/nRp6YeC3OeakQ1lHvsZ4oT17/Q8pkzWXA6ZxiCQsCMd8
# Lv5RcvAGNTaLc7JKs0ub2J1O0xk4WLSE9/vynCUlKv1xC6dx+kbTu1b7PfW7JhQd
# MqtWSLnUw/z99qm+bSyftGcxHFUq1aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCyQpeWLVkJVOKpTlSTrpYYkFtV9lLk1bx0c9YzbK4z0wIGZdX+KuoV
# GBMyMDI0MDMwNzIxMTkyNi44NDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmUQH8wIhgPMjAyNDAzMDcyMTMyNDdaGA8yMDI0MDMwODIxMzI0N1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6ZRAfwIBADAHAgEAAgIMMTAHAgEAAgIR/zAKAgUA
# 6ZWR/wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJt4Hm6F5qAoKr5nAmTR
# eBWuHwyRVuLuUKAdWffKLrzMU1TJL8jbAr64WsIcYj31J/9hKpfaTx3iMPaZHH5/
# k4e7p0xHYibhgAFJWXH8zKbpqMT35CvHIFu1ANJFlfZYyv06T5+leffz5sQUHCJx
# pNFpNVetoUJ9yBYn5ISuyTX0MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgu8B2II18Por3YwAlipzY52KUKP5I0FCSomJ+YRkRkYswgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIChU0S/z79iCH5mGtyYJ7+2wUNgU4rueFLKo94yj+t+V
# MA0GCSqGSIb3DQEBCwUABIICABq+g3uSYr2g4IU1iPGmyDIT8aLPNC61iOjy2jCm
# jz3P4jcr9F9v33OEhbc773VVN3ZYrJ9N2EKPslEwqWfJJp48d9tRln5R3QKHnVM9
# Dgw86h3P7yHY5CyPCfyLU9Pv8+Lfbh2fcZoz+ff/5cBepnWcp7stpqdJAHGdTlqV
# JzvOyDd+8ArdAejGXx/v4S7pP4bQ5ZWHxhMgbD+/BP4qrVGaEVdFOcI8T5PPLUrf
# pWldz8uE/O9UZoS4YNtW2cf7fOZF9ai65OtKagfteWTbtrRgb5B6hC43vnyW9F9q
# cxfsqpjkiB6rotFX2R4zGQ8k0zh0myj0SLcp9oQ4BtNRbMCFdTDlD3jTiZyxRCmF
# 1RRldiaUla4vfErwh+/OldcwWIucrvPQFamb5aqE+ISeV7JSxUhxC6d8mOH7Mv/T
# wNvO8ZrZAEPGBm1qTfWmN1cgOJLvbXZfM8TnFq10P+ZvFyIZiC29DH49M5wR1bic
# B4/3mSaVz8MQNmFQamKSN3Sy9mqWLrdobWThncHaPvPaC9g8yPkJdhHAI33vMhf2
# 3UKFBX+3YlPQWdHjLXdCT/j2IupO7B8UpDDZwvFdO40xCC3xUl/Ebe6+n/PPBHau
# XO15qm97B3ew9dtO5LHbsXZ+dEaMfQuEEMK91tpKiIZpNmbsDWrPtGdvxOl1of+i
# oAVd
# SIG # End signature block
|
combined_dataset/train/non-malicious/3450.ps1
|
3450.ps1
|
function Test-LinkedService
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$lsname = "foo"
$actual = New-AzDataFactoryLinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname -File .\Resources\linkedService.json -Force
$expected = Get-AzDataFactoryLinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected.DataFactoryName $actual.DataFactoryName
Assert-AreEqual $expected.LinkedServiceName $actual.LinkedServiceName
Remove-AzDataFactoryLinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname -Force
}
finally
{
Clean-DataFactory $rgname $dfname
}
}
function Test-LinkedServiceWithDataFactoryParameter
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
$df = New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$lsname = "foo"
$actual = New-AzDataFactoryLinkedService -DataFactory $df -Name $lsname -File .\Resources\linkedService.json -Force
$expected = Get-AzDataFactoryLinkedService -DataFactory $df -Name $lsname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected.DataFactoryName $actual.DataFactoryName
Assert-AreEqual $expected.LinkedServiceName $actual.LinkedServiceName
Remove-AzDataFactoryLinkedService -DataFactory $df -Name $lsname -Force
}
finally
{
Clean-DataFactory $rgname $dfname
}
}
function Test-LinkedServicePiping
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
New-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$lsname = "foo"
New-AzDataFactoryLinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname -File .\Resources\linkedService.json -Force
Get-AzDataFactoryLinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname | Remove-AzDataFactoryLinkedService -Force
Assert-ThrowsContains { Get-AzDataFactoryLinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname } "LinkedServiceNotFound"
}
finally
{
Clean-DataFactory $rgname $dfname
}
}
|
combined_dataset/train/non-malicious/2716.ps1
|
2716.ps1
|
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=0)]
[String]$File
)
function GetBase64GzippedStream {
Param(
[Parameter(Mandatory=$True,Position=0)]
[System.IO.FileInfo]$File
)
$memFile = New-Object System.IO.MemoryStream (,[System.IO.File]::ReadAllBytes($File))
$memStrm = New-Object System.IO.MemoryStream
$gzStrm = New-Object System.IO.Compression.GZipStream $memStrm, ([System.IO.Compression.CompressionMode]::Compress)
$gzStrm.Write($memFile.ToArray(), 0, $File.Length)
$gzStrm.Close()
$gzStrm.Dispose()
[System.Convert]::ToBase64String($memStrm.ToArray())
}
$obj = "" | Select-Object FullName,Length,CreationTimeUtc,LastAccessTimeUtc,LastWriteTimeUtc,Hash,Content
if (Test-Path($File)) {
$Target = ls $File
$obj.FullName = $Target.FullName
$obj.Length = $Target.Length
$obj.CreationTimeUtc = $Target.CreationTimeUtc
$obj.LastAccessTimeUtc = $Target.LastAccessTimeUtc
$obj.LastWriteTimeUtc = $Target.LastWriteTimeUtc
$EAP = $ErrorActionPreference
$ErrorActionPreference = 'Stop'
Try {
$obj.Hash = $(Get-FileHash $File -Algorithm SHA256).Hash
} Catch {
$obj.Hash = 'Error hashing file'
}
$ErrorActionPreference = $EAP
$obj.Content = GetBase64GzippedStream($Target)
}
$obj
|
combined_dataset/train/non-malicious/sample_6_75.ps1
|
sample_6_75.ps1
|
# Localized 06/28/2023 08:09 AM (GMT) 303:7.0.30723 archiveresources.psd1
# Localized ArchiveResources.psd1
ConvertFrom-StringData @'
###PSLOC
PathNotFoundError=O caminho '{0}' não existe ou não é um caminho do sistema de arquivos válido.
ExpandArchiveInValidDestinationPath=O caminho '{0}' não é um caminho de diretório do sistema de arquivos válido.
InvalidZipFileExtensionError={0} não é um formato de arquivo morto com suporte. {1} é o único formato de arquivo morto com suporte.
ArchiveFileIsReadOnly=O atributo do arquivo morto {0} está definido como 'ReadOnly'. Dessa forma, ele não pode ser atualizado. Se você pretende atualizar o arquivo morto, remova o atributo 'ReadOnly' dele e use o parâmetro -Force para substituir e e criar um novo arquivo.
ZipFileExistError=O arquivo morto {0} já existe. Use o parâmetro -Update para atualizar ou o parâmetro -Force para substituir o arquivo morto existente.
DuplicatePathFoundError=A entrada para o parâmetro {0} contém um caminho duplicado '{1}'. Fornece um conjunto único de caminhos como entrada para o parâmetro {2}.
ArchiveFileIsEmpty=O arquivo morto {0} está vazio.
CompressProgressBarText=A criação do arquivo morto '{0}' está em andamento...
ExpandProgressBarText=A expansão do arquivo morto '{0}' está em andamento...
AppendArchiveFileExtensionMessage=O caminho do arquivo morto '{0}' fornecido para o parâmetro DestinationPath não inclui a extensão .zip. Portanto, .zip é acrescentado ao caminho DestinationPath fornecido e o arquivo é criado em '{1}'.
AddItemtoArchiveFile=Adicionando '{0}'.
BadArchiveEntry=Não é possível processar a entrada de arquivo inválida '{0}'.
CreateFileAtExpandedPath='{0}' criado.
InvalidArchiveFilePathError=O caminho do arquivo morto '{0}' especificado como entrada para o parâmetro {1} está se resolvendo em vários caminhos do sistema de arquivos. Fornece um caminho exclusivo para o parâmetro {2} onde o arquivo deve ser criado.
InvalidExpandedDirPathError=O caminho do diretório '{0}' especificado como entrada para o parâmetro DestinationPath está se resolvendo em vários caminhos do sistema de arquivos. Forneça um caminho exclusivo para o parâmetro Destination onde o conteúdo do arquivo morto precisa ser expandido.
FileExistsError=Falha ao criar o arquivo '{0}' ao expandir o conteúdo do arquivo morto '{1}' porque o arquivo '{2}' já existe. Use o parâmetro -Force se você quiser substituir o conteúdo do diretório existente '{3}' ao expandir o arquivo morto.
DeleteArchiveFile=O arquivo arquivo parcialmente criado '{0}' foi excluído porque não é utilizável.
InvalidDestinationPath=O caminho de destino '{0}' não contém um nome de arquivo morto válido.
PreparingToCompressVerboseMessage=Preparando para compactar...
PreparingToExpandVerboseMessage=Preparando para expandir...
###PSLOC
'@
|
combined_dataset/train/non-malicious/sample_54_69.ps1
|
sample_54_69.ps1
|
#
# Module manifest for module 'OCI.PSModules.Desktops'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Desktops.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '53ccf4c9-4a50-4acb-9112-909d93a939bd'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Desktops Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Desktops.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDesktopsDesktop', 'Get-OCIDesktopsDesktopPool',
'Get-OCIDesktopsDesktopPoolDesktopsList',
'Get-OCIDesktopsDesktopPoolsList',
'Get-OCIDesktopsDesktopPoolVolumesList', 'Get-OCIDesktopsList',
'Get-OCIDesktopsWorkRequest',
'Get-OCIDesktopsWorkRequestErrorsList',
'Get-OCIDesktopsWorkRequestLogsList',
'Get-OCIDesktopsWorkRequestsList',
'Move-OCIDesktopsDesktopPoolCompartment',
'New-OCIDesktopsDesktopPool', 'Remove-OCIDesktopsDesktop',
'Remove-OCIDesktopsDesktopPool', 'Start-OCIDesktopsDesktop',
'Start-OCIDesktopsDesktopPool', 'Stop-OCIDesktopsDesktop',
'Stop-OCIDesktopsDesktopPool', 'Stop-OCIDesktopsWorkRequest',
'Update-OCIDesktopsDesktop', 'Update-OCIDesktopsDesktopPool'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Desktops'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Show-Fonts.ps1
|
Show-Fonts.ps1
|
ipmo PowerBoots # Require PowerBoots
## More readable:
New-BootsWindow {
ScrollViewer {
StackPanel {
ForEach($font in (New-Object Drawing.Text.InstalledFontCollection).Families | Select -Expand Name) {
TextBlock "$font -- The brown fox (quickly) jumps over the ""lazy"" dog, 123456789" -FontFamily $font -FontSize 16 -Tooltip $font
}
}
}
} -Width 800 -Height 900
return
## One-liner:
New-BootsWindow { (New-Object Drawing.Text.InstalledFontCollection).Families | %{ Label "$($_.Name) -- The brown fox (quickly) jumps over the ""lazy"" dog, 123456789" -FontFamily $_.Name -FontSize 16 -Tooltip $_.Name } | StackPanel | ScrollViewer } -Width 800 -Height 900
|
combined_dataset/train/non-malicious/New-Zip_4.ps1
|
New-Zip_4.ps1
|
Function New-Zip
{
<#
.SYNOPSIS
Create a Zip File from any files piped in.
.DESCRIPTION
Requires that you have the SharpZipLib installed, which is available from
http://www.icsharpcode.net/OpenSource/SharpZipLib/
.NOTES
File Name : PowerZip.psm1
Author : Christophe CREMON (uxone) - http://powershell.codeplex.com
Requires : PowerShell V2
.PARAMETER Source
Set the name of the source to zip (file or directory)
.PARAMETER ZipFile
Set the name of the zip file to create
.PARAMETER Recurse
Browse the source recursively
.PARAMETER Include
Include only items you specify
.PARAMETER Exclude
Exclude items you specify
.PARAMETER AbsolutePaths
Preserve the absolute path name of each item in the zip container
.PARAMETER DeleteAfterZip
Delete source items after successful zip
.EXAMPLE
New-Zip -Source C:\\Temp -ZipFile C:\\Archive\\Scripts.zip -Include *.ps1 -DeleteAfterZip
Copies all PS1 files from the C:\\Temp directory to C:\\Archive\\Scripts.zip and delete them after successful ZIP
#>
param (
[ValidateNotNullOrEmpty()]
[Parameter(
Mandatory = $true)
]
[string] $Source,
[Parameter(
Mandatory = $true)
]
[string] $ZipFile,
[switch] $Recurse,
[array] $Include,
[array] $Exclude,
[switch] $AbsolutePaths,
[switch] $DeleteAfterZip )
$LoadAssembly = [System.Reflection.Assembly]::LoadWithPartialName("ICSharpCode.SharpZipLib")
if ( -not $LoadAssembly ) { throw "! Assembly not found {ICSharpCode.SharpZipLib}" }
if ( $Source -match "\\*" )
{
throw "! Please use -Recurse with -Include instead of ""*"""
}
$Source = $Source -replace "\\\\$|\\/$",""
$CheckSource = Get-Item -Path $Source -ErrorAction SilentlyContinue
if ( -not $CheckSource ) { throw "! Source not found {$Source}" }
else
{
if ( $CheckSource.psIsContainer )
{
$RootPath = ( Resolve-Path -Path $Source -ErrorAction SilentlyContinue ).Path
}
else
{
$RootPath = ( Resolve-Path -Path $Source -ErrorAction SilentlyContinue ).Path
if ( $RootPath )
{
$RootPath = Split-Path -Path $RootPath -ErrorAction SilentlyContinue
}
}
}
if ( $ZipFile -notmatch "\\.zip$" ) { $ZipFile = $ZipFile -replace "$",".zip" }
if ( $ZipFile -match "\\*" )
{
throw "! Incorrect zip file name {$ZipFile}"
}
if ( $Recurse -eq $true ) { $RecurseArgument = "-Recurse" }
if ( $AbsolutePaths -eq $true ) { $AbsolutePathsArgument = "-AbsolutePaths" }
if ( $DeleteAfterZip -eq $true ) { $DeleteAfterZipArgument = "-DeleteAfterZip" }
if ( $Include )
{
$Include = $Include -join ","
$IncludeArgument = "-Include $Include"
$Source = $Source+"\\*"
}
if ( $Exclude )
{
$Exclude = $Exclude -join ","
$ExcludeArgument = "-Exclude $Exclude"
}
$GetCommand = "Get-ChildItem -Path '$Source' $RecurseArgument $IncludeArgument $ExcludeArgument -Force"
$ItemsToZip = Invoke-Expression -Command $GetCommand
$SizeBeforeZip = ( $ItemsToZip | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum
$SizeBeforeZipInMB = $SizeBeforeZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
if ( -not $SizeBeforeZip )
{
Write-Output "NOTHING TO ZIP"
return $true
break
}
$CreateZIPContainer = New-Item -ItemType File -Path $ZipFile -Force -ErrorAction SilentlyContinue
if ( -not $CreateZIPContainer ) { throw "! Unable to create ZIP container {$ZipFile}" }
else { $ZipFile = ( Resolve-Path -Path $ZipFile -ErrorAction SilentlyContinue ).Path }
$oZipOutputStream = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipOutputStream([System.IO.File]::Create($ZipFile))
[byte[]] $Buffer = New-Object Byte[] 4096
$StartTime = Get-Date
Write-Output "`n===================================`n=> Start Time : $($StartTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n"
Write-Output "TOTAL SIZE BEFORE ZIP : {$SizeBeforeZipInMB MB}`n"
foreach ( $Item in $ItemsToZip )
{
if ( $Item.FullName -ne $ZipFile )
{
if ( Test-Path ( $Item.FullName ) -ErrorAction SilentlyContinue )
{
$ZipEntry = $Item.FullName
if ( -not $AbsolutePaths )
{
$ReplacePath = [Regex]::Escape( $RootPath+"\\" )
$ZipEntry = $Item.FullName -replace $ReplacePath,""
}
if ( $Item.psIsContainer -eq $true )
{
if ( $Recurse -eq $true )
{
Write-Output "Processing ZIP of Directory {$($Item.FullName)} ..."
$OldErrorActionPreference = $ErrorActionPreference
$ErrorActionPreference = "SilentlyContinue"
$oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry/")
$oZipOutputStream.PutNextEntry($oZipEntry)
if ( $? -ne $true )
{
$ItemsNotZipped += @($Item.FullName)
$ErrorsArray += @("! Unable to ZIP Directory {$($Item.FullName)}")
}
$ErrorActionPreference = $OldErrorActionPreference
}
}
else
{
Write-Output "Processing ZIP of File {$($Item.FullName)} ..."
$OldErrorActionPreference = $ErrorActionPreference
$ErrorActionPreference = "SilentlyContinue"
$FileStream = [IO.File]::OpenRead($Item.FullName)
$oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry")
$oZipOutputStream.PutNextEntry($oZipEntry)
[ICSharpCode.SharpZipLib.Core.StreamUtils]::Copy($FileStream,$oZipOutputStream,$Buffer)
if ( $? -ne $true )
{
$ItemsNotZipped += @($Item.FullName)
$ErrorsArray += @("! Unable to ZIP File {$($Item.FullName)}")
}
$FileStream.Close()
}
}
}
}
$oZipOutputStream.Finish()
$oZipOutputStream.Close()
if ( $? -eq $true )
{
$ErrorActionPreference = $OldErrorActionPreference
if ( $DeleteAfterZip )
{
$ItemsToZip | Where-Object { $ItemsNotZipped -notcontains $_.FullName } | ForEach-Object {
if ( $_.psIsContainer -ne $true )
{
if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue )
{
Write-Output "Processing Delete of File {$($_.FullName)} ..."
$RemoveItem = Remove-Item -Path $_.FullName -Force -ErrorAction SilentlyContinue
if ( $? -ne $true )
{
$ErrorsArray += @("! Unable to Delete File {$($_.FullName)}")
}
}
}
}
if ( $Recurse )
{
$ItemsToZip | Where-Object { $ItemsNotZipped -notcontains ( Split-Path -Parent $_.FullName ) } | ForEach-Object {
if ( $_.psIsContainer -eq $true )
{
if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue )
{
Write-Output "Processing Delete of Directory {$($_.FullName)} ..."
$RemoveItem = Remove-Item -Path $_.FullName -Force -Recurse -ErrorAction SilentlyContinue
if ( $? -ne $true )
{
$ErrorsArray += @("! Unable to Delete Directory {$($_.FullName)}")
}
}
}
}
}
}
Write-Output "`nZIP File Created {$ZipFile} ...`n"
}
else
{
$ErrorActionPreference = $OldErrorActionPreference
$ErrorsArray += @("! ZIP Archive {$ZipFile} Creation Failed`n")
}
$EndTime = Get-Date
$ExecutionTime = ($EndTime-$StartTime)
Write-Output "`nExecution Time : $ExecutionTime`n"
Write-Output "=> End Time : $($EndTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n=================================`n"
if ( $ErrorsArray )
{
Write-Output "`n[ ERRORS OCCURED ]"
$ErrorsArray
return $false
}
else
{
$SizeAfterZip = ( Get-Item -Path $ZipFile -Force -ErrorAction SilentlyContinue | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum
$SizeAfterZipInMB = $SizeAfterZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
Write-Output "`nTOTAL SIZE AFTER ZIP : {$SizeAfterZipInMB MB}`n"
$Gain = ( $SizeBeforeZip - $SizeAfterZip )
$GainInMB = $Gain | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
if ( $Gain -gt 0 )
{
$GainInPercent = (($SizeBeforeZip - $SizeAfterZip) / $SizeBeforeZip) * 100 | ForEach-Object { "{0:N2}" -f $_ }
Write-Output "GAIN : {$GainInMB MB} ($GainInPercent %)`n"
}
return $true
}
}
Export-ModuleMember -Function New-Zip
|
combined_dataset/train/non-malicious/sample_45_2.ps1
|
sample_45_2.ps1
|
parameters:
# Which publishing infra should be used. THIS SHOULD MATCH THE VERSION ON THE BUILD MANIFEST.
# Publishing V1 is no longer supported
# Publishing V2 is no longer supported
# Publishing V3 is the default
- name: publishingInfraVersion
displayName: Which version of publishing should be used to promote the build definition?
type: number
default: 3
values:
- 3
- name: BARBuildId
displayName: BAR Build Id
type: number
default: 0
- name: PromoteToChannelIds
displayName: Channel to promote BARBuildId to
type: string
default: ''
- name: enableSourceLinkValidation
displayName: Enable SourceLink validation
type: boolean
default: false
- name: enableSigningValidation
displayName: Enable signing validation
type: boolean
default: true
- name: enableSymbolValidation
displayName: Enable symbol validation
type: boolean
default: false
- name: enableNugetValidation
displayName: Enable NuGet validation
type: boolean
default: true
- name: publishInstallersAndChecksums
displayName: Publish installers and checksums
type: boolean
default: true
- name: SDLValidationParameters
type: object
default:
enable: false
publishGdn: false
continueOnError: false
params: ''
artifactNames: ''
downloadArtifacts: true
# These parameters let the user customize the call to sdk-task.ps1 for publishing
# symbols & general artifacts as well as for signing validation
- name: symbolPublishingAdditionalParameters
displayName: Symbol publishing additional parameters
type: string
default: ''
- name: artifactsPublishingAdditionalParameters
displayName: Artifact publishing additional parameters
type: string
default: ''
- name: signingValidationAdditionalParameters
displayName: Signing validation additional parameters
type: string
default: ''
# Which stages should finish execution before post-build stages start
- name: validateDependsOn
type: object
default:
- build
- name: publishDependsOn
type: object
default:
- Validate
# Optional: Call asset publishing rather than running in a separate stage
- name: publishAssetsImmediately
type: boolean
default: false
stages:
- ${{ if or(eq( parameters.enableNugetValidation, 'true'), eq(parameters.enableSigningValidation, 'true'), eq(parameters.enableSourceLinkValidation, 'true'), eq(parameters.SDLValidationParameters.enable, 'true')) }}:
- stage: Validate
dependsOn: ${{ parameters.validateDependsOn }}
displayName: Validate Build Assets
variables:
- template: common-variables.yml
- template: /eng/common/templates/variables/pool-providers.yml
jobs:
- job:
displayName: NuGet Validation
condition: and(succeededOrFailed(), eq( ${{ parameters.enableNugetValidation }}, 'true'))
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: DownloadBuildArtifacts@0
displayName: Download Package Artifacts
inputs:
buildType: specific
buildVersionToDownload: specific
project: $(AzDOProjectName)
pipeline: $(AzDOPipelineId)
buildId: $(AzDOBuildId)
artifactName: PackageArtifacts
checkDownloadedFiles: true
- task: PowerShell@2
displayName: Validate
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/nuget-validation.ps1
arguments: -PackagesPath $(Build.ArtifactStagingDirectory)/PackageArtifacts/
-ToolDestinationPath $(Agent.BuildDirectory)/Extract/
- job:
displayName: Signing Validation
condition: and( eq( ${{ parameters.enableSigningValidation }}, 'true'), ne( variables['PostBuildSign'], 'true'))
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: DownloadBuildArtifacts@0
displayName: Download Package Artifacts
inputs:
buildType: specific
buildVersionToDownload: specific
project: $(AzDOProjectName)
pipeline: $(AzDOPipelineId)
buildId: $(AzDOBuildId)
artifactName: PackageArtifacts
checkDownloadedFiles: true
itemPattern: |
**
!**/Microsoft.SourceBuild.Intermediate.*.nupkg
# This is necessary whenever we want to publish/restore to an AzDO private feed
# Since sdk-task.ps1 tries to restore packages we need to do this authentication here
# otherwise it'll complain about accessing a private feed.
- task: NuGetAuthenticate@1
displayName: 'Authenticate to AzDO Feeds'
# Signing validation will optionally work with the buildmanifest file which is downloaded from
# Azure DevOps above.
- task: PowerShell@2
displayName: Validate
inputs:
filePath: eng\common\sdk-task.ps1
arguments: -task SigningValidation -restore -msbuildEngine vs
/p:PackageBasePath='$(Build.ArtifactStagingDirectory)/PackageArtifacts'
/p:SignCheckExclusionsFile='$(Build.SourcesDirectory)/eng/SignCheckExclusionsFile.txt'
${{ parameters.signingValidationAdditionalParameters }}
- template: ../steps/publish-logs.yml
parameters:
StageLabel: 'Validation'
JobLabel: 'Signing'
- job:
displayName: SourceLink Validation
condition: eq( ${{ parameters.enableSourceLinkValidation }}, 'true')
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: DownloadBuildArtifacts@0
displayName: Download Blob Artifacts
inputs:
buildType: specific
buildVersionToDownload: specific
project: $(AzDOProjectName)
pipeline: $(AzDOPipelineId)
buildId: $(AzDOBuildId)
artifactName: BlobArtifacts
checkDownloadedFiles: true
- task: PowerShell@2
displayName: Validate
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/sourcelink-validation.ps1
arguments: -InputPath $(Build.ArtifactStagingDirectory)/BlobArtifacts/
-ExtractPath $(Agent.BuildDirectory)/Extract/
-GHRepoName $(Build.Repository.Name)
-GHCommit $(Build.SourceVersion)
-SourcelinkCliVersion $(SourceLinkCLIVersion)
continueOnError: true
- template: /eng/common/templates/job/execute-sdl.yml
parameters:
enable: ${{ parameters.SDLValidationParameters.enable }}
publishGuardianDirectoryToPipeline: ${{ parameters.SDLValidationParameters.publishGdn }}
additionalParameters: ${{ parameters.SDLValidationParameters.params }}
continueOnError: ${{ parameters.SDLValidationParameters.continueOnError }}
artifactNames: ${{ parameters.SDLValidationParameters.artifactNames }}
downloadArtifacts: ${{ parameters.SDLValidationParameters.downloadArtifacts }}
- ${{ if ne(parameters.publishAssetsImmediately, 'true') }}:
- stage: publish_using_darc
${{ if or(eq(parameters.enableNugetValidation, 'true'), eq(parameters.enableSigningValidation, 'true'), eq(parameters.enableSourceLinkValidation, 'true'), eq(parameters.SDLValidationParameters.enable, 'true')) }}:
dependsOn: ${{ parameters.publishDependsOn }}
${{ else }}:
dependsOn: ${{ parameters.validateDependsOn }}
displayName: Publish using Darc
variables:
- template: common-variables.yml
- template: /eng/common/templates/variables/pool-providers.yml
jobs:
- job:
displayName: Publish Using Darc
timeoutInMinutes: 120
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: VSEngSS-MicroBuild2022-1ES
demands: Cmd
# If it's not devdiv, it's dnceng
${{ else }}:
name: $(DncEngInternalBuildPool)
demands: ImageOverride -equals windows.vs2019.amd64
steps:
- template: setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: NuGetAuthenticate@1
- task: PowerShell@2
displayName: Publish Using Darc
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/publish-using-darc.ps1
arguments: -BuildId $(BARBuildId)
-PublishingInfraVersion ${{ parameters.publishingInfraVersion }}
-AzdoToken '$(publishing-dnceng-devdiv-code-r-build-re)'
-MaestroToken '$(MaestroApiAccessToken)'
-WaitPublishingFinish true
-ArtifactsPublishingAdditionalParameters '${{ parameters.artifactsPublishingAdditionalParameters }}'
-SymbolPublishingAdditionalParameters '${{ parameters.symbolPublishingAdditionalParameters }}'
|
combined_dataset/train/non-malicious/sample_39_96.ps1
|
sample_39_96.ps1
|
param (
[Parameter(Mandatory = $true)]
[string] $VmName,
[Parameter(Mandatory = $true)]
[string] $VmUsername,
[Parameter(Mandatory = $true)]
[string] $VmPassword
)
# Add Trusted Hosts
try
{
Start-Service winrm -Verbose:$VerbosePreference
$currentTrustedHosts = (Get-Item WSMan:\localhost\Client\TrustedHosts).Value.Split(",")
if ($currentTrustedHosts.Contains("*"))
{
Write-Warning "WinRm TrustedHosts contains an entry for '*'. No changes to TrustedHosts made."
}
elseif ($currentTrustedHosts.Contains($VmName))
{
Write-Verbose "TrustedHosts already contains computer name $VmName."
}
else
{
Set-Item WSMan:\localhost\Client\TrustedHosts -Value $VmName -Concatenate -Force -ErrorAction Stop -Verbose:$VerbosePreference
$global:TrustedHostsAltered = $VmName #for Remove-TrustedHosts if it's needed
}
}
catch
{
$ErrorMessage = $_.Exception.Message
throw "An error occurred when adding VM to Trusted Hosts list. Error: $($ErrorMessage)"
}
# Create Session
try
{
$Credential = New-Object System.Management.Automation.PSCredential($VmUsername, (ConvertTo-SecureString $VmPassword -AsPlainText -Force))
[System.Management.Automation.Runspaces.PSSession]$session = New-PSSession -ComputerName $VmName -Credential $Credential -ErrorAction Stop
if (!$session)
{
throw "A remote PowerShell session could not be created for the VM. Your VM may require a reboot and further troubleshooting."
}
# Return Session
return $session
}
catch
{
$ErrorMessage = $_.Exception.Message
throw "An error occurred when creating new remote PowerShell session for the VM. Error: $($ErrorMessage)"
}
|
combined_dataset/train/non-malicious/444.ps1
|
444.ps1
|
Register-PSFConfigValidation -Name "stringarray" -ScriptBlock {
Param (
$Value
)
$Result = New-Object PSObject -Property @{
Success = $True
Value = $null
Message = ""
}
try
{
$data = @()
foreach ($item in $Value)
{
$data += [string]$item
}
}
catch
{
$Result.Message = "Not a string array: $Value"
$Result.Success = $False
return $Result
}
$Result.Value = $data
return $Result
}
|
combined_dataset/train/non-malicious/3788.ps1
|
3788.ps1
|
Param(
[Parameter(Mandatory = $true,
HelpMessage="Name of the resource group to which the VM belongs to")]
[ValidateNotNullOrEmpty()]
[string]$resourceGroupName,
[Parameter(Mandatory = $true,
HelpMessage="Name of the VM")]
[ValidateNotNullOrEmpty()]
[string]$vmName
)
$VerbosePreference = "Continue";
$ErrorActionPreference = "Stop";
Write-Verbose "Stopping VM resourceGroupName - $resourceGroupName , vmName - $vmName";
Stop-AzVM -Name $vmName -ResourceGroupName $resourceGroupName -Force -Verbose;
Write-Verbose "Successfully stopped VM";
$vm = Get-AzVm -ResourceGroupName $resourceGroupName -Name $vmName;
$backupEncryptionSettings = $vm.StorageProfile.OsDisk.EncryptionSettings;
Write-Verbose "ClearEncryptionSettings: resourceGroupName - $resourceGroupName , vmName - $vmName";
Write-Verbose "VM object encryption settings before clearing encryption settings: $vm.StorageProfile.OsDisk.EncryptionSettings";
$vm.StorageProfile.OsDisk.EncryptionSettings.Enabled = $false;
$vm.StorageProfile.OsDisk.EncryptionSettings.DiskEncryptionKey = $null;
$vm.StorageProfile.OsDisk.EncryptionSettings.KeyEncryptionKey = $null;
Write-Verbose "Cleared encryptionSettings: $vm.StorageProfile.OsDisk.EncryptionSettings";
Update-AzVM -VM $vm -ResourceGroupName $resourceGroupName -Verbose;
Write-Verbose "Successfully updated VM";
Start-AzVm -ResourceGroupName $resourceGroupName -Name $vmName -Verbose;
Write-Verbose "Successfully started VM";
$vm = Get-AzVm -ResourceGroupName $resourceGroupName -Name $vmName;
Write-Verbose "VM object encryption settings after clearing encryption settings: $vm.StorageProfile.OsDisk.EncryptionSettings";
|
combined_dataset/train/non-malicious/sample_62_37.ps1
|
sample_62_37.ps1
|
#
# Script Module file for Dism module.
#
# Copyright (c) Microsoft Corporation
#
#
# Cmdlet aliases
#
Set-Alias Apply-WindowsUnattend Use-WindowsUnattend
Set-Alias Add-ProvisionedAppxPackage Add-AppxProvisionedPackage
Set-Alias Remove-ProvisionedAppxPackage Remove-AppxProvisionedPackage
Set-Alias Get-ProvisionedAppxPackage Get-AppxProvisionedPackage
Set-Alias Optimize-ProvisionedAppxPackages Optimize-AppxProvisionedPackages
Set-Alias Set-ProvisionedAppXDataFile Set-AppXProvisionedDataFile
Set-Alias Add-ProvisionedAppSharedPackageContainer Add-AppProvisionedSharedPackageContainer
Set-Alias Get-ProvisionedAppSharedPackageContainer Get-AppProvisionedSharedPackageContainer
Set-Alias Remove-ProvisionedAppSharedPackageContainer Remove-AppProvisionedSharedPackageContainer
# Below are aliases for Appx related cmdlets and aliases
Set-Alias Add-AppProvisionedPackage Add-AppxProvisionedPackage
Set-Alias Remove-AppProvisionedPackage Remove-AppxProvisionedPackage
Set-Alias Get-AppProvisionedPackage Get-AppxProvisionedPackage
Set-Alias Optimize-AppProvisionedPackages Optimize-AppxProvisionedPackages
Set-Alias Set-AppPackageProvisionedDataFile Set-AppXProvisionedDataFile
Set-Alias Add-ProvisionedAppPackage Add-AppxProvisionedPackage
Set-Alias Remove-ProvisionedAppPackage Remove-AppxProvisionedPackage
Set-Alias Get-ProvisionedAppPackage Get-AppxProvisionedPackage
Set-Alias Optimize-ProvisionedAppPackages Optimize-AppxProvisionedPackages
Set-Alias Set-ProvisionedAppPackageDataFile Set-AppXProvisionedDataFile
Export-ModuleMember -Alias * -Function * -Cmdlet *
# SIG # Begin signature block
# MIImQQYJKoZIhvcNAQcCoIImMjCCJi4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD2VgPS+GIfbBqt
# L1H/9k6cfQuEjvMnZ0KROm49Ir6sb6CCC3IwggT6MIID4qADAgECAhMzAAAFQ3U4
# LBN0+b0lAAAAAAVDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTAwHhcNMjMwODA4MTgzNDI1WhcNMjQwODA3MTgzNDI1WjB/MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSkwJwYDVQQDEyBNaWNy
# b3NvZnQgV2luZG93cyBLaXRzIFB1Ymxpc2hlcjCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBALHqvOR5b0s5sJRnmCJIvrx6O4Z3E/r4vrso4QNCyDpLOmTU
# +X2Grc9JoW5mR5jaFlUFN1oPL2h3ClAiwKe06jE9EFYytgNEoLOtdLaj2LML4YGU
# LpQ3uoXS5qHJVoXt4P0roS+VOgRcNRHTjcGRGeZO4k281xEsMFbYpSJwbomOnjnI
# TDNiVf3mNIDRJmm3hYWlLs3O/O7bLH5hbE2buEWNvmxvDeBJ9bKaBv8A5fl5jgYW
# EI5RK5KPhRjIn0j3BcpU5glQOFTa1U/qFeYqiq4dEI8JbjTeo+FooPuNOflNKkSG
# rpSeuEOQIXGbBJxuyrXP32/gFJMH2P3BL8MXLmkCAwEAAaOCAW4wggFqMB8GA1Ud
# JQQYMBYGCisGAQQBgjcKAxQGCCsGAQUFBwMDMB0GA1UdDgQWBBRW4VTuasbSNG07
# Z24sgDUV1cmqVTBFBgNVHREEPjA8pDowODEeMBwGA1UECxMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMRYwFAYDVQQFEw0yMjk5MDMrNTAxNDEzMB8GA1UdIwQYMBaAFOb8
# X3u7IgBY5HJOtfQhdCMy5u+sMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY0NvZFNpZ1BDQV8yMDEw
# LTA3LTA2LmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljQ29kU2lnUENBXzIwMTAtMDct
# MDYuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggEBALACmXG6zirB
# t9gJ2/GOA3/VBc0AS53Zts52c8rnK9/lPteP9L7Tnp/vyjPDA1K0fmT9qlqNrUZj
# owKfIo/qIVtvxTIXRT7t4g9X4jm0wjDYmLWhJBn73qi4BPFbZHhimzgP/fhdpRKd
# n5BrlHnLLpnMS2ctr3nTGXl+9av9yvXr6emBNsFQRlFaYzeNHD6WZTQnPVat3gYP
# yk2sfYRuPiHbX2R/khv7jovT161P75+oVKQUjkkUPVqpcKEhV3AuHuCR5k/JXOfe
# fi6zBcrC6S2+xjZsNtjphnuuW1NwWD+To/fm2BzBvj5vDfrWet07mALM3tNpUEjN
# rEfWMBfXy10wggZwMIIEWKADAgECAgphDFJMAAAAAAADMA0GCSqGSIb3DQEBCwUA
# MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQD
# EylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0x
# MDA3MDYyMDQwMTdaFw0yNTA3MDYyMDUwMTdaMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTAwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDpDmRQ
# eWe1xOP9CQBMnpSs91Zo6kTYz8VYT6mldnxtRbrTOZK0pB75+WWC5BfSj/1EnAjo
# ZZPOLFWEv30I4y4rqEErGLeiS25JTGsVB97R0sKJHnGUzbV/S7SvCNjMiNZrF5Q6
# k84mP+zm/jSYV9UdXUn2siou1YW7WT/4kLQrg3TKK7M7RuPwRknBF2ZUyRy9HcRV
# Yldy+Ge5JSA03l2mpZVeqyiAzdWynuUDtWPTshTIwciKJgpZfwfs/w7tgBI1TBKm
# vlJb9aba4IsLSHfWhUfVELnG6Krui2otBVxgxrQqW5wjHF9F4xoUHm83yxkzgGqJ
# TaNqZmN4k9Uwz5UfAgMBAAGjggHjMIIB3zAQBgkrBgEEAYI3FQEEAwIBADAdBgNV
# HQ4EFgQU5vxfe7siAFjkck619CF0IzLm76wwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwgZ0GA1UdIASBlTCBkjCBjwYJKwYBBAGCNy4DMIGBMD0GCCsGAQUF
# BwIBFjFodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vUEtJL2RvY3MvQ1BTL2RlZmF1
# bHQuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAFAAbwBsAGkAYwB5
# AF8AUwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQAadO9X
# Tyl7xBaFeLhQ0yL8CZ2sgpf4NP8qLJeVEuXkv8+/k8jjNKnbgbjcHgC+0jVvr+V/
# eZV35QLU8evYzU4eG2GiwlojGvCMqGJRRWcI4z88HpP4MIUXyDlAptcOsyEp5aWh
# aYwik8x0mOehR0PyU6zADzBpf/7SJSBtb2HT3wfV2XIALGmGdj1R26Y5SMk3YW0H
# 3VMZy6fWYcK/4oOrD+Brm5XWfShRsIlKUaSabMi3H0oaDmmp19zBftFJcKq2rbty
# R2MX+qbWoqaG7KgQRJtjtrJpiQbHRoZ6GD/oxR0h1Xv5AiMtxUHLvx1MyBbvsZx/
# /CJLSYpuFeOmf3Zb0VN5kYWd1dLbPXM18zyuVLJSR2rAqhOV0o4R2plnXjKM+zeF
# 0dx1hZyHxlpXhcK/3Q2PjJst67TuzyfTtV5p+qQWBAGnJGdzz01Ptt4FVpd69+lS
# TfR3BU+FxtgL8Y7tQgnRDXbjI1Z4IiY2vsqxjG6qHeSF2kczYo+kyZEzX3EeQK+Y
# Zcki6EIhJYocLWDZN4lBiSoWD9dhPJRoYFLv1keZoIBA7hWBdz6c4FMYGlAdOJWb
# HmYzEyc5F3iHNs5Ow1+y9T1HU7bg5dsLYT0q15IszjdaPkBCMaQfEAjCVpy/JF1R
# Ap1qedIX09rBlI4HeyVxRKsGaubUxt8jmpZ1xTGCGiUwghohAgEBMIGVMH4xCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jv
# c29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTACEzMAAAVDdTgsE3T5vSUAAAAABUMw
# DQYJYIZIAWUDBAIBBQCggcYwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYK
# KwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKvDdzRr
# V26uKErSFf9plkwSpDWKR27m4QtlVCPMKkDYMFoGCisGAQQBgjcCAQwxTDBKoCSA
# IgBNAGkAYwByAG8AcwBvAGYAdAAgAFcAaQBuAGQAbwB3AHOhIoAgaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3dpbmRvd3MwDQYJKoZIhvcNAQEBBQAEggEAdoSK76Z7
# lc26ypgrqot136lHQJqZce9Cmr2MIQ2KYgg6FkbWOvwkr794acEv0m31EXyjz2B8
# 07hYRrMJwvrq6CZjhbtNYVQoxkAKq9Ua1VtgEWoRl3C729CRC/c51QqHwguDO68H
# g0tfVSEX9/sMK82T75P7CZJG/uLdc59A6HMPjGTOKmtagmb/JZUKkmw/6YuKZ+VD
# EkumOcqtG7d25o76b6Ws5LCEjR7OEWWfVLhTIsdKEwH9swinePFX9NulaKUgWWf8
# HSl+URI4JRbNMkJYmxWZkD+kzNhdEGxUhHG+B4Mh3vLzw5/RgGGpHnJewD14oSkq
# NNIZuRfGLaMM36GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEH
# AqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCC
# AUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCD5sBJK
# F07QEoIV+73v7fYptWVJHap9laS32+9cpx/r8AIGZfLheIMCGBMyMDI0MDQwMTAw
# NTM1MC40NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRp
# b25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAj
# BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQig
# AwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUx
# ODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUw
# IwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5u
# U2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
# AoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67
# iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD1
# 32NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rs
# E2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHa
# qNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuC
# YMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gU
# f5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx6IPqggVp
# NZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqW
# DRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0k
# A9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narD
# FrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCC
# AUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+n
# FV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAl
# MjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKG
# UGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0
# JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAw
# FgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3
# DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrix
# mnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7M
# LxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2
# Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w119b+a9WTo
# qIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvo
# Tmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnr
# eGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERB
# o5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHOiOebZGqN
# u+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99j
# v/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzV
# Jr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3Ew
# ggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1p
# Y3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkz
# MDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5
# osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVri
# fkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFEx
# N6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S
# /rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j
# tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy
# zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX78
# 2Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjt
# p+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2
# AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb
# 3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3ir
# Rbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUB
# BAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYD
# VR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGC
# N0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
# a2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ
# BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/
# BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8E
# TzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9k
# dWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBM
# MEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRz
# L01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEA
# nVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx8
# 0HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ
# 7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2
# KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZ
# QhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa
# 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx
# v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRr
# akURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6T
# vsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4
# JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6
# ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB
# 0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMG
# A1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo
# aWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQg
# VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/
# BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G
# CSqGSIb3DQEBCwUAAgUA6bRvfjAiGA8yMDI0MDMzMTIzMjU1MFoYDzIwMjQwNDAx
# MjMyNTUwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDptG9+AgEAMAoCAQACAh6Z
# AgH/MAcCAQACAhN5MAoCBQDptcD+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD
# ggEBAGvwe970IGB4xdxRu79vV1cSh2SOcvXgjUDHTp0Eo8+FBuDtrBfjrbqrxPbI
# iSAdBd2S2oogmYuuyqliCVc/1q45afk/mfhV6chkEi4NPjTPjvfVWnIkbeQCUPNo
# MlpSVPzRURWepVS1HT/Kl0AsP3NUueyoFCt7Lp1g8isKvlRWGN7a+3DshQryK17z
# bmpJVgvNPnBiAR3rIZdI6TuEaoofHs091tPN9jjiLcHl0yxy10thqzjghaKsORBY
# T73e45f6lRGVK1rQAUMOWvhvwp9+4F7CCOeQT4cHSuCl/rFeco26BPecS1xgPtBS
# K2Lu1jQUEkUK6NHPGVH7DqF3doQxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCD8fZqElYaHcnT2p9yuKl6AgdMH+eIHWXoBO1D8v1cW2DCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWULejAE
# 1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHs
# 4CukgtCRUoAAAQAAAewwIgQg1jiTQx31fzOCunrMCqoerEIKUHJRkVT+XqK8uVXT
# NFIwDQYJKoZIhvcNAQELBQAEggIAb+v886PFs5g4UigxwQP1NDx5PZRzRR3Y96q5
# HNhfw6dTmlyc6Fs1IrBxqxAZ8KcJxtk3aDvSRCDSfmP/9BotDY8wOS781B0d6A3P
# rinEEy2+tAWkSNKzal7qjqRkPC4O5SPE4sSPqbLzV+JpzZLTkq6P1IbIMngrUVUk
# Dx6gD+f3wiawunUKsyrjl0jwdeBM/yZVgAq/LhsRQWZwrJSCW1FEWMEGzcIiHfAq
# /Xw6p1kH4iIzmBFU0RUdbyx5hzu+KL0+O7nK4rUf2fOQVkMtPEGgcD3up5Lioj4V
# Hst/G0Miu6h1IJjV+HHAB/vNAzjFMsCouszA5014kKyhFEYyHTBQRhQIecreFa3R
# o+8pY1YVvoNrJ2yP/laRiJuW+JNrSPg8VioXhfiiEOmB9oa78cx68IvuBTpMkQHJ
# kQw27mGkQqB8Oh8eC+8FjLp+yHPQawmknaUvCPTBtDh2fphLrl5JJuNVzFI5JAp3
# lUHeVbIdBepqNQX7maNKgKLNwBfGlILZvVyeNULCx5XLWK2v1bAdcOahLg20wG0L
# GMgrqw3rBJB8RT3dpPKnAVh3F9Q34OjPCJ14JMQoudTW/D8hgFCing9+SxXQD/Y3
# yg6FsQknSEJ11vjFO34tJnQZjyUY5mKEGTksMsdtWr1sH3kC+uQOUMEZC0EsAyDT
# 93Pfz2g=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Wizard template.ps1
|
Wizard template.ps1
|
#######################################################################################################################
# File: wizard_template.ps1 #
# Author: Alexander Petrovskiy #
# Publisher: Alexander Petrovskiy, PowerShellDevTools.WordPress.Com #
# Copyright: © 2010-2011 Alexander Petrovskiy, PowerShellDevTools.WordPress.Com. All rights reserved. #
# Usage: To run this example no preparations needed. #
# There also are the following settings you may be intersted in: #
# 1. the wizard caption #
# 2. default size of the wizard #
# 3. default size of the wizard's buttons #
# 4. button labels #
# 5. right-to-left layout #
# All the settings mentioned are placed inside the 'adjustable settings' region #
# Please provide feedback in the PowerShellDevTools.WordPress.Com blog. #
#######################################################################################################################
cls
Set-StrictMode -Version 2
#region host preparations
if ($Host.Name -eq 'ConsoleHost')
{
Add-Type -AssemblyName System.Windows.Forms;
Add-Type -AssemblyName System.Drawing;
}
#endregion host preparations
#region the resulting wizard
#region adjustable settings
#region controls settings
# Form size and caption
[string]$script:constWizardInitialCaption = `
'This is a sample wizard';
[int]$script:constWizardWidth = `
[System.Windows.Forms.SystemInformation]::VirtualScreen.Width / 2;
[int]$script:constWizardHeight = `
[System.Windows.Forms.SystemInformation]::VirtualScreen.Height / 2;
# Buttons Next, Back, Cancel, Finish
[int]$script:constButtonHeight = 23;
[int]$script:constButtonWidth = 75;
[int]$script:constButtonAreaHeight = `
$script:constButtonHeight * 2;
[string]$script:constButtonNextName = '&Next';
[string]$script:constButtonBackName = '&Back';
[string]$script:constButtonFinishName = '&Finish';
[string]$script:constButtonCancelName = '&Cancel';
# Step display name and description
[int]$script:constLabelStepDisplayNameLeft = 5;
[int]$script:constLabelStepDisplayNameTop = 0;
[float]$script:constLabelStepDisplayNameFontSize = 16;
[int]$script:constLabelStepDescriptionLeft = 5;
[int]$script:constLabelStepDescriptionTop = 30;
# Form properties
[bool]$script:constWizardRigthToLeft = $false;
# Initial step number
[int]$script:currentStep = 0;
#endregion controls settings
#endregion adjustable settings
#region mandatory settings
#region Initialization of the SplitContainer controls
# The outer split container
[System.Windows.Forms.SplitContainer]$script:splitOuter = `
New-Object System.Windows.Forms.SplitContainer;
$script:splitOuter.Dock = [System.Windows.Forms.DockStyle]::Fill;
$script:splitOuter.IsSplitterFixed = $true;
$script:splitOuter.Orientation = `
[System.Windows.Forms.Orientation]::Horizontal;
$script:splitOuter.SplitterWidth = 5;
# The inner split container
[System.Windows.Forms.SplitContainer]$script:splitInner = `
New-Object System.Windows.Forms.SplitContainer;
$script:splitInner.Dock = [System.Windows.Forms.DockStyle]::Fill;
$script:splitInner.IsSplitterFixed = $true;
$script:splitInner.Orientation = `
[System.Windows.Forms.Orientation]::Horizontal;
$script:splitInner.SplitterWidth = 5;
$script:splitOuter.Panel1.Controls.Add($script:splitInner);
# The labels for the curent step name and description
[System.Windows.Forms.Label]$script:lblStepDisplayName = `
New-Object System.Windows.Forms.Label;
$script:lblStepDisplayName.Left = `
$script:constLabelStepDisplayNameLeft;
$script:lblStepDisplayName.Top = `
$script:constLabelStepDisplayNameTop;
[System.Drawing.Font]$private:font = `
$script:lblStepDisplayName.Font;
$private:font = `
New-Object System.Drawing.Font($private:font.Name, `
$script:constLabelStepDisplayNameFontsize, `
$private:font.Style, $private:font.Unit, `
$private:font.GdiCharSet, $private:font.GdiVerticalFont );
$script:lblStepDisplayName.Font = $private:font;
[System.Windows.Forms.Label]$script:lblStepDescription = `
New-Object System.Windows.Forms.Label;
$script:lblStepDescription.Left = `
$script:constLabelStepDescriptionLeft;
$script:lblStepDescription.Top = `
$script:constLabelStepDescriptionTop;
$script:splitInner.Panel1.Controls.AddRange(($script:lblStepDisplayName, `
$script:lblStepDescription));
#endregion Initialization of the SplitContainer controls
#region buttons functions
function Enable-FinishButton
{
$script:btnNext.Enabled = $false;
$script:btnNext.Visible = $false;
$script:btnFinish.Enabled = $true;
$script:btnFinish.Visible = $true;
}
function Enable-NextButton
{
$script:btnNext.Enabled = $true;
$script:btnNext.Visible = $true;
$script:btnFinish.Enabled = $false;
$script:btnFinish.Visible = $false;
}
function Enable-BackButton
{
$script:btnBack.Enabled = $true;
$script:btnBack.Visible = $true;
$script:btnCancel.Enabled = $false;
$script:btnCancel.Visible = $false;
}
function Enable-CancelButton
{
$script:btnBack.Enabled = $false;
$script:btnBack.Visible = $false;
$script:btnCancel.Enabled = $true;
$script:btnCancel.Visible = $true;
}
#endregion buttons functions
#region the Next and Back buttons
[System.Windows.Forms.Button]$script:btnNext = `
New-Object System.Windows.Forms.Button;
$script:btnNext.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor `
[System.Windows.Forms.AnchorStyles]::Right -bor `
[System.Windows.Forms.AnchorStyles]::Top;
$script:btnNext.Text = $script:constButtonNextName;
[System.Windows.Forms.Button]$script:btnBack = `
New-Object System.Windows.Forms.Button;
$script:btnBack.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor `
[System.Windows.Forms.AnchorStyles]::Right -bor `
[System.Windows.Forms.AnchorStyles]::Top;
$script:btnBack.Text = $script:constButtonBackName;
$script:splitOuter.Panel2.Controls.AddRange(($script:btnBack, $script:btnNext));
#endregion the Next and Back buttons
#region the Finish and the Cancel buttons
[System.Windows.Forms.Button]$script:btnFinish = `
New-Object System.Windows.Forms.Button;
$script:btnFinish.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor `
[System.Windows.Forms.AnchorStyles]::Right -bor `
[System.Windows.Forms.AnchorStyles]::Top;
$script:btnFinish.Text = $script:constButtonFinishName;
[System.Windows.Forms.Button]$script:btnCancel = `
New-Object System.Windows.Forms.Button;
$script:btnCancel.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor `
[System.Windows.Forms.AnchorStyles]::Right -bor `
[System.Windows.Forms.AnchorStyles]::Top;
$script:btnCancel.Text = $script:constButtonCancelName;
Enable-CancelButton;
Enable-NextButton;
$script:splitOuter.Panel2.Controls.AddRange(($script:btnCancel, $script:btnFinish));
#endregion the Finish and the Cancel buttons
#region Initialization of the main form
$script:frmWizard = $null;
[System.Windows.Forms.Form]$script:frmWizard = `
New-Object System.Windows.Forms.Form;
$script:frmWizard.Controls.Add($script:splitOuter);
# left-to-right and right-to-left
if ($script:constWizardRigthToLeft)
{
$script:frmWizard.RightToLeft = `
[System.Windows.Forms.RightToLeft]::Yes;
$script:frmWizard.RightToLeftLayout = $true;
}
else
{
$script:frmWizard.RightToLeft = `
[System.Windows.Forms.RightToLeft]::No;
$script:frmWizard.RightToLeftLayout = $false;
}
$script:frmWizard.Text = $script:constWizardInitialCaption;
#endregion Initialization of the main form
#endregion mandatory settings
#region the Wizard steps
[System.Collections.ArrayList]$script:wzdSteps = `
New-Object System.Collections.ArrayList;
# Here we create an 'enumeration' (PSObject)
# and begin filling ArrayList $script:wzdSteps with Panel controls
[System.EventHandler]$script:hndlRunControlsAdd = `
{try{$script:splitInner.Panel2.Controls.Add($script:wzdSteps[$script:currentStep]);}
catch{Write-Debug $Error[0]; Write-Debug $global:Error[0];}};
#region function New-WizardStep
function New-WizardStep
{
param(
[string]$StepName,
[string]$StepDisplayName,
[string]$StepDescription = ''
)
# Storing parameters in step arrays
Add-Member -InputObject $script:steps -MemberType NoteProperty `
-Name $StepName -Value $script:wzdSteps.Count;
$null = $script:stepDisplayNames.Add($StepDisplayName);
$null = $script:stepDescriptions.Add($StepDescription);
# Adding a fake scriptblock to keep counters
$null = $script:stepscriptblocks.Add({});
# Create and add the new step's panel to the array
[System.Windows.Forms.Panel]$private:panel = `
New-Object System.Windows.Forms.Panel;
$null = $script:wzdSteps.Add($private:panel);
$script:currentStep = $script:wzdSteps.Count - 1;
$script:splitInner.Panel2.Controls.Add($script:wzdSteps[$script:currentStep]);
$script:wzdSteps[$script:currentStep].Dock = `
[System.Windows.Forms.DockStyle]::Fill;
# To restore initial state for this code running before the user accesses the wizard.
$script:currentStep = 0;
}
#endregion function New-WizardStep
#region function Add-ControlToStep
function Add-ControlToStep
# Adds a control of selected type to a wizard step
{
param(
[Parameter(Mandatory=$true)]
[string]$StepNumber,
[Parameter(Mandatory=$true)]
[string]$ControlType,
[Parameter(Mandatory=$true)]
[string]$ControlName,
[int]$ControlTop,
[int]$ControlLeft,
[int]$ControlHeight,
[int]$ControlWidth,
[string]$ControlData
)
$private:ctrl = $null;
try{
$private:ctrl = New-Object $ControlType;
}catch{Write-Error "Unable to create a control of $($ControlType) type";}
try{
$private:ctrl.Name = $ControlName;
}catch{Write-Error "Unable to set the Name property with value $($ControlName) to a control of the $($ControlType) type";}
try{
$private:ctrl.Top = $ControlTop;
}catch{Write-Error "Unable to set the Top property with value $($ControlTop) to a control of the $($ControlType) type";}
try{
$private:ctrl.Left = $ControlLeft;
}catch{Write-Error "Unable to set the Left property with value $($ControlLeft) to a control of the $($ControlType) type";}
try{
$private:ctrl.Height = $ControlHeight;
}catch{Write-Error "Unable to set the Height property with value $($ControlHeight) to a control of the $($ControlType) type";}
try{
$private:ctrl.Width = $ControlWidth;
}catch{Write-Error "Unable to set the Width property with value $($ControlWidth) to a control of the $($ControlType) type";}
try{
$private:ctrl.Text = $ControlData;
}catch{Write-Error "Unable to set the Text property with value $($ControlData) to a control of the $($ControlType) type";}
try{
$wzdSteps[$StepNumber].Controls.Add($private:ctrl);
}catch{Write-Error "Unable to add a control of $($ControlType) type to the step $($StepNumber)";}
}
#endregion function Add-ControlToStep
#region function Add-CodeToStep
function Add-CodeToStep
# Adds a scriptblock to a wizard step
{
param(
[Parameter(Mandatory=$true)]
[string]$StepNumber,
[Parameter(Mandatory=$true)]
[scriptblock]$StepCode
)
$script:stepScriptblocks[$StepNumber] = $StepCode;
}
#endregion function Add-CodeToStep
#region Step data arrays
[psobject]$script:steps = New-Object psobject;
[System.Collections.ArrayList]$script:stepDisplayNames = `
New-Object System.Collections.ArrayList;
[System.Collections.ArrayList]$script:stepDescriptions = `
New-Object System.Collections.ArrayList;
[System.Collections.ArrayList]$script:stepScriptblocks = `
New-Object System.Collections.ArrayList;
#endregion Step data arrays
#endregion the Wizard steps
#region events of the wizard controls
#region resizing
#region button sizes
function Set-NextButtonLeft
{
param([int]$Left)
$script:btnNext.Left = $Left;
$script:btnFinish.Left = $Left;
}
function Set-NextButtonTop
{
param([int]$Top)
$script:btnNext.Top = $Top;
$script:btnFinish.Top = $Top;
}
function Set-BackButtonLeft
{
param([int]$Left)
$script:btnBack.Left = $Left;
$script:btnCancel.Left = $Left;
}
function Set-BackButtonTop
{
param([int]$Top)
$script:btnBack.Top = $Top;
$script:btnCancel.Top = $Top;
}
#endregion button sizes
#region function Initialize-WizardControls
function Initialize-WizardControls
<#
.SYNOPSIS
The Initialize-WizardControls function sets the wizard common controls to predefined positions.
.DESCRIPTION
The Initialize-WizardControls function does the following:
- sets Top, Left, Width and Height properties of the wizard buttons
- positions of the step labels
- sets the SplitterDistance property of both Splitcontainer controls
.EXAMPLE
PS C:\\> Initialize-WizardControls
This example shows how to step the wizard forward.
.INPUTS
No input
.OUTPUTS
No output
#>
{
# Set sizes of buttons
$script:btnNext.Height = $script:constButtonHeight;
$script:btnNext.Width = $script:constButtonWidth;
$script:btnBack.Height = $script:constButtonHeight;
$script:btnBack.Width = $script:constButtonWidth;
$script:btnFinish.Height = $script:btnNext.Height;
$script:btnFinish.Width = $script:btnNext.Width;
$script:btnCancel.Height = $script:btnBack.Height;
$script:btnCancel.Width = $script:btnBack.Width;
# SplitterDistance of the outer split container
# in other words, the area where Next and Back buttons are placed
$script:splitOuter.SplitterDistance = `
$script:splitOuter.Height - `
$script:constButtonAreaHeight;
# Placements of the buttons
if ($script:constWizardRigthToLeft)
{
Set-NextButtonLeft 10;
Set-BackButtonLeft ($script:constButtonWidth + 20);
}
else
{
Set-NextButtonLeft ($script:splitOuter.Width - `
$script:constButtonWidth - 10);
Set-BackButtonLeft ($script:splitOuter.Width - `
$script:constButtonWidth - `
$script:constButtonWidth - 20);
}
Set-NextButtonTop (($script:constButtonAreaHeight - $script:constButtonHeight) / 2);
Set-BackButtonTop (($script:constButtonAreaHeight - $script:constButtonHeight) / 2);
# SplitterDistance of the inner split container
# this is the place where step name is placed
$script:splitInner.SplitterDistance = `
$script:constButtonAreaHeight * 1.5;
# Step Display Name and Description labels
$script:lblStepDisplayName.Width = `
$script:splitInner.Panel1.Width - `
$script:constLabelStepDisplayNameLeft * 2;
$script:lblStepDescription.Width = `
$script:splitInner.Panel1.Width - `
$script:constLabelStepDescriptionLeft * 2;
# Refresh after we have changed placements of the controls
[System.Windows.Forms.Application]::DoEvents();
}
#endregion function Initialize-WizardControls
[System.EventHandler]$script:hndlFormResize = {Initialize-WizardControls;}
[System.EventHandler]$script:hndlFormLoad = {Initialize-WizardControls;}
#[System.Windows.Forms.MouseEventHandler]$script:hndlSplitMouseMove = `
# {Initialize-WizardControls;}
# Initial arrange on Load form.
$script:frmWizard.add_Load($script:hndlFormLoad);
#$script:frmWizard.add_Resize($script:hndlFormResize);
$script:splitOuter.add_Resize($script:hndlFormResize);
#endregion resizing
#region steps
#region function Invoke-WizardStep
function Invoke-WizardStep
<#
.SYNOPSIS
The Invoke-WizardStep function sets active panel on the wizard form.
.DESCRIPTION
The Invoke-WizardStep function does the following:
- changes internal variable $script:currentStep
- sets/resets .Enabled property of btnNext and btnBack
- changes .Dock and .Left properties of every panel
.PARAMETER Forward
The optional parameter Forward is used to point out the direction the wizard goes.
.EXAMPLE
PS C:\\> Invoke-WizardStep -Forward $true
This example shows how to step the wizard forward.
.INPUTS
System.Boolean
.OUTPUTS
No output
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[bool]$Forward = $true
)
Begin{}
Process{
# run the step code
try{
$script:stepScriptblocks[$script:currentStep].Invoke();
} catch {return;} #Cancel step
if ($Forward)
{
Enable-BackButton;
if ($script:currentStep -lt ($script:wzdSteps.Count - 1))
{$script:currentStep++;}
if ($script:currentStep -lt ($script:wzdSteps.Count - 1))
{
# step forward but not the last step
Enable-NextButton;
}
else
{
# the last step
Enable-FinishButton;
}
}
else
{
# go backward
Enable-NextButton;
if ($script:currentStep -gt 0)
{$script:currentStep--;}
if ($script:currentStep -gt 0)
{
# step backward but not the first one
Enable-BackButton;
}
else
{
# the first step
Enable-CancelButton;
}
}
for($private:i = 0; $private:i -lt $script:wzdSteps.Count;
$private:i++)
{
if ($private:i -ne $script:currentStep)
{
$script:wzdSteps[$private:i].Dock = `
[System.Windows.Forms.DockStyle]::None;
$script:wzdSteps[$private:i].Left = 10000;
}
else
{
$script:wzdSteps[$private:i].Dock = `
[System.Windows.Forms.DockStyle]::Fill;
$script:wzdSteps[$private:i].Left = 0;
}
}
$script:lblStepDisplayName.Text = `
$script:stepDisplayNames[$script:currentStep];
$script:lblStepDescription.Text = `
$script:stepDescriptions[$script:currentStep];
}
End{}
}
#endregion function Invoke-WizardStep
#region function Initialize-WizardStep
function Initialize-WizardStep
# This is the selfsufficient function doing all the necessary
# calculations for controls on each panel.
# Also from the code can be seen how to address the panel you are interesting in
# using the 'enumeration' created earlier
# for example, $script:wzdSteps[$script:steps.Welcome]
{
$script:lblStepDisplayName.Text = `
$script:stepDisplayNames[$script:currentStep];
$script:lblStepDescription.Text = `
$script:stepDescriptions[$script:currentStep];
}
#endregion function Initialize-WizardStep
#region $hndlStepForward
[System.EventHandler]$hndlStepForward = {
# serve controls' data
Initialize-WizardStep;
# switch panels
Invoke-WizardStep $true;
}
#endregion $hndlStepForward
#region $hndlStepBack
[System.EventHandler]$hndlStepBack = {
# switch panels
Invoke-WizardStep $false;
}
#endregion $hndlStepBack
#region $hndlFinish
[System.EventHandler]$hndlFinish = {
# ask for exit
[System.Windows.Forms.DialogResult]$private:res = `
[System.Windows.Forms.MessageBox]::Show("Are you sure?", `
"Question on exit", `
[System.Windows.Forms.MessageBoxButtons]::YesNo);
if ($res -eq [System.Windows.Forms.DialogResult]::Yes){
# close the wizard
$frmWizard.Close();
}
}
#endregion $hndlFinish
#region $hndlCancel
[System.EventHandler]$hndlCancel = {
# close the wizard
$frmWizard.Close();
}
#endregion $hndlCancel
#region wizard buttons' clicks
$script:btnNext.add_Click($script:hndlStepForward);
$script:btnBack.add_Click($script:hndlStepBack);
$script:btnFinish.add_Click($script:hndlFinish);
$script:btnCancel.add_Click($script:hndlCancel);
#endregion wizard buttons' clicks
#endregion steps
#endregion events of the wizard controls
#region wizard initialization
#region function Initialize-Wizard
function Initialize-Wizard
# This is one more selfsufficient function written to make
# the latest preparations for the form run
{
#region control settings
$script:frmWizard.Width = $script:constWizardWidth;
$script:frmWizard.Height = $script:constWizardHeight;
#endregion control settings
Initialize-WizardStep;
}
#endregion function Initialize-Wizard
#endregion wizard initialization
#endregion the resulting wizard
# Step 1: Welcome
New-WizardStep 'Welcome' `
'This is the first step' `
'Welcome to the PowerShell Wizard, the our dear customer!';
# Add a label
# Please note that we can use the enumeration $steps which is being created runtime
# on a call of the New-WizardStep function
Add-ControlToStep $steps.Welcome `
System.Windows.Forms.Label `
'lblWelcome' 20 10 50 300 `
'This Wizard carries you through the steps you need to collect the files from a given path';
# Step 2
New-WizardStep 'Input' `
'Step Two' `
'Here you type some in controls, plz';
# Add a label
Add-ControlToStep $steps.Input `
System.Windows.Forms.Label `
'lblInput' 20 10 20 300 `
'Please type the path to a catalog';
# Add a text box
Add-ControlToStep $steps.Input `
System.Windows.Forms.TextBox `
'txtInput' 40 10 20 300
# Add the code which requires that text box was not empty
Add-CodeToStep $steps.Input `
-StepCode {
[string]$private:path = `
$wzdSteps[$steps.Input].Controls['txtInput'].Text;
if ($private:path.Length -eq 0)
{
# stop the step
throw;
}
if (-not [System.IO.Directory]::Exists($private:path))
{
# stop the step
throw;
}
}
# Step 3
New-WizardStep 'Progress' `
'The third one' `
'Wait, please. Sip a coffee' ;
# Add a progress bar
Add-ControlToStep $steps.Progress `
'System.Windows.Forms.ProgressBar' `
'pbDir' 200 50 100 400
Add-CodeToStep $steps.Progress `
-StepCode {
# set progress bar maximum
$wzdSteps[$steps.Progress].Controls['pbDir'].Minimum = 0;
$wzdSteps[$steps.Progress].Controls['pbDir'].Value = 0;
$wzdSteps[$steps.Progress].Controls['pbDir'].Maximum = `
(Get-ChildItem $wzdSteps[$steps.Input].Controls['txtInput'].Text).Length;
# clear the list box (from the next step)
$wzdSteps[$steps.Output].Controls['lbxFiles'].Items.Clear();
# add file names to the list box
Get-ChildItem $wzdSteps[$steps.Input].Controls['txtInput'].Text | %{
$wzdSteps[$steps.Progress].Controls['pbDir'].Value++;
$wzdSteps[$steps.Output].Controls['lbxFiles'].Items.Add($_.Name);
}
}
# Step 4
New-WizardStep 'Output' 'Fourth' `
'Now awake and read the output';
# Add a list box
Add-ControlToStep $steps.Output `
System.Windows.Forms.ListBox `
lbxFiles 50 50 300 400
# Step 5: Finish
New-WizardStep 'Finish' 'Finish!' 'Bye!';
Initialize-Wizard;
# Set the second step as active
Invoke-WizardStep -Forward $true;
$script:frmWizard.ShowDialog() | Out-Null;
|
combined_dataset/train/non-malicious/PS2WCF_4.ps1
|
PS2WCF_4.ps1
|
<#
.SYNOPSIS
Functions to call WCF Services With PowerShell.
.NOTES
Version 1.1 10.02.2012
Requires Powershell v2 and .NET 3.5
Original version by Christian Glessner
Blog: http://www.iLoveSharePoint.com
Twitter: http://twitter.com/cglessner
Codeplex: http://codeplex.com/iLoveSharePoint
PowerShell v2.0 modification by Justin Dearing
Blog: http://justaprogrammer.net
Twitter: http://twitter.com/zippy1981
.LINK
Blog describing original version: http://www.ilovesharepoint.com/2008/12/call-wcf-services-with-powershell.html
Posted to PoshCode.org http://poshcode.org/?lang=&q=PS2WCF
#>
# load WCF assemblies
Add-Type -AssemblyName "System.ServiceModel"
Add-Type -AssemblyName "System.Runtime.Serialization"
<#
.SYNOPSIS
Get metadata of a service
.DESCRIPTION
Parses a wsdl or mex and generates a WsdlImporter object from it.
.EXAMPLE
Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc/mex'
.EXAMPLE
Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc' -HttpGet
.EXAMPLE
Get-WsdlImporter 'http://localhost.fiddler:14232/EchoService.svc?wsdl' -HttpGet
#>
function global:Get-WsdlImporter([Parameter(Mandatory=$true, ValueFromPipeline=$true)][string]$wsdlUrl, [switch]$httpGet)
{
if($httpGet -eq $true)
{
$local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::HttpGet
}
else
{
$local:mode = [System.ServiceModel.Description.MetadataExchangeClientMode]::MetadataExchange
}
$mexClient = New-Object System.ServiceModel.Description.MetadataExchangeClient((New-Object System.Uri($wsdlUrl)),$mode)
$mexClient.MaximumResolvedReferences = [System.Int32]::MaxValue
$metadataSet = $mexClient.GetMetadata()
$wsdlImporter = New-Object System.ServiceModel.Description.WsdlImporter($metadataSet)
return $wsdlImporter
}
<#
.SYNOPSIS
Generate wcf proxy types
.DESCRIPTION
Examines a web services meta data (wsdl or mex) and generates the types for the client proxy,
as well as request and response contracts.
.EXAMPLE
$proxyType = Get-WcfProxyType $wsdlImporter
$endpoints = $wsdlImporter.ImportAllEndpoints();
$proxy = New-Object $proxyType($endpoints[0].Binding, $endpoints[0].Address);
#>
function global:Get-WcfProxyType(
[Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $wsdlImporter,
[Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $wsdlUrl,
[string] $proxyPath
) {
switch ($PsCmdlet.ParameterSetName)
{
"WsdlUrl" {
$wsdlImporter = Get-WsdlImporter -wsdlUrl $wsdlUrl
trap [Exception]
{
$script:wsdlImporter = Get-WsdlImporter -wsdlUrl $wsdlUrl -httpGet $true
continue
}
break
}
"WsdlImporter" { break }
}
$generator = new-object System.ServiceModel.Description.ServiceContractGenerator
foreach($contractDescription in $wsdlImporter.ImportAllContracts())
{
[void]$generator.GenerateServiceContractType($contractDescription)
}
$parameters = New-Object System.CodeDom.Compiler.CompilerParameters
if($proxyPath -eq $null)
{
$parameters.GenerateInMemory = $true
}
else
{
$parameters.OutputAssembly = $proxyPath
}
$providerOptions = New-Object "Collections.Generic.Dictionary[String,String]"
[void]$providerOptions.Add("CompilerVersion","v3.5")
$compiler = New-Object Microsoft.CSharp.CSharpCodeProvider($providerOptions)
$result = $compiler.CompileAssemblyFromDom($parameters, $generator.TargetCompileUnit);
if($result.Errors.Count -gt 0)
{
throw "Proxy generation failed"
}
foreach($type in $result.CompiledAssembly.GetTypes())
{
if($type.BaseType.IsGenericType)
{
if($type.BaseType.GetGenericTypeDefinition().FullName -eq "System.ServiceModel.ClientBase``1" )
{
return $type
}
}
}
}
<#
.SYNOPSIS
Generate wcf proxy
.DESCRIPTION
Generate wcf proxy in a manner similar to a Get-WebServiceProxy
.EXAMPLE
$proxy = Get-WcfProxy 'http://localhost.fiddler:14232/EchoService.svc/mex'
$proxy.Echo("Justin Dearing");
#>
function global:Get-WcfProxy(
[Parameter(ParameterSetName='WsdlImporter', Position=0, Mandatory=$true, ValueFromPipeline=$true)][ServiceModel.Description.WsdlImporter] $wsdlImporter,
[Parameter(ParameterSetName='WsdlUrl', Position=0, Mandatory=$true, ValueFromPipeline=$true)][string] $wsdlUrl,
[string] $proxyPath
) {
switch ($PsCmdlet.ParameterSetName)
{
"WsdlUrl" {
$wsdlImporter = Get-WsdlImporter -wsdlUrl $wsdlUrl
trap [Exception]
{
$script:wsdlImporter = Get-WsdlImporter -wsdlUrl $wsdlUrl -httpGet $true
continue
}
break
}
}
$proxyType = Get-WcfProxyType $wsdlImporter
$endpoints = $wsdlImporter.ImportAllEndpoints();
return New-Object $proxyType($endpoints[0].Binding, $endpoints[0].Address);
}
|
combined_dataset/train/non-malicious/sample_34_17.ps1
|
sample_34_17.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Sets an EventHub Authorization Rule
.Description
Sets an EventHub Authorization Rule
#>
function Set-AzEventHubAuthorizationRule{
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IAuthorizationRule])]
[CmdletBinding(DefaultParameterSetName = 'SetExpandedNamespace', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'SetExpandedEntity', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'SetExpandedNamespace', HelpMessage = "The name of the Authorization Rule")]
[Alias('AuthorizationRuleName')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the Authorization Rule.
${Name},
[Parameter(ParameterSetName = 'SetExpandedEntity', Mandatory, HelpMessage = "The name of the EventHub entity.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the EventHub entity.
${EventHubName},
[Parameter(ParameterSetName = 'SetExpandedNamespace', Mandatory, HelpMessage = "The name of EventHub namespace")]
[Parameter(ParameterSetName = 'SetExpandedEntity', Mandatory, HelpMessage = "The name of the EventHub namespace.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of EventHub namespace
${NamespaceName},
[Parameter(ParameterSetName = 'SetExpandedNamespace', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'SetExpandedEntity', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName = 'SetExpandedNamespace', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'SetExpandedEntity', HelpMessage = "The ID of the target subscription.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName = 'SetViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEventHubIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(Mandatory, HelpMessage = "The rights associated with the rule.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Body')]
[System.String[]]
# The rights associated with the rule.
${Rights},
[Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(HelpMessage = "Run the command as a job")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(HelpMessage = "Run the command asynchronously")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process{
try{
$hasRights = $PSBoundParameters.Remove('Rights')
$hasAsJob = $PSBoundParameters.Remove('AsJob')
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
if ($PSCmdlet.ParameterSetName -eq 'SetExpandedNamespace'){
$authRule = Az.EventHub.private\Get-AzEventHubNamespaceAuthorizationRule_Get @PSBoundParameters
}
elseif($PSCmdlet.ParameterSetName -eq 'SetExpandedEntity'){
$authRule = Az.EventHub.private\Get-AzEventHubAuthorizationRule_Get @PSBoundParameters
}
elseif ($PSCmdlet.ParameterSetName -eq 'SetViaIdentityExpanded'){
if($InputObject.Id -ne $null){
$ResourceHashTable = ParseResourceId -ResourceId $InputObject.Id
}
else{
$ResourceHashTable = ParseResourceId -ResourceId $InputObject
}
if ($ResourceHashTable['EventHubName'] -ne $null){
$authRule = Az.EventHub.private\Get-AzEventHubAuthorizationRule_GetViaIdentity @PSBoundParameters
}
elseif ($ResourceHashTable['NamespaceName'] -ne $null){
$authRule = Az.EventHub.private\Get-AzEventHubNamespaceAuthorizationRule_GetViaIdentity @PSBoundParameters
}
else{
throw 'Invalid -InputObject. Please Check ResourceId'
}
}
# 2. PUT
$null = $PSBoundParameters.Remove('InputObject')
$null = $PSBoundParameters.Remove('ResourceGroupName')
$null = $PSBoundParameters.Remove('NamespaceName')
$null = $PSBoundParameters.Remove('EventHubName')
$null = $PSBoundParameters.Remove('Name')
$null = $PSBoundParameters.Remove('SubscriptionId')
if ($hasRights) {
$authRule.Rights = $Rights
}
if ($hasAsJob) {
$PSBoundParameters.Add('AsJob', $true)
}
if ($PSCmdlet.ParameterSetName -eq 'SetExpandedNamespace'){
if ($PSCmdlet.ShouldProcess("EventHub Namespace Authorization Rule $($authRule.Name)", "Create or update")) {
Az.EventHub.private\New-AzEventHubNamespaceAuthorizationRule_CreateViaIdentity -InputObject $authRule -Parameter $authRule @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'SetExpandedEntity'){
if ($PSCmdlet.ShouldProcess("EventHub Entity Authorization Rule $($authRule.Name)", "Create or update")) {
Az.EventHub.private\New-AzEventHubAuthorizationRule_CreateViaIdentity -InputObject $authRule -Parameter $authRule @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'SetViaIdentityExpanded'){
if ($ResourceHashTable['EventHubName'] -ne $null){
if ($PSCmdlet.ShouldProcess("EventHub Entity Authorization Rule $($ResourceHashTable['AuthorizationRuleName'])", "Create or update")) {
Az.EventHub.private\New-AzEventHubAuthorizationRule_CreateViaIdentity -InputObject $authRule -Parameter $authRule @PSBoundParameters
}
}
elseif ($ResourceHashTable['NamespaceName'] -ne $null){
if ($PSCmdlet.ShouldProcess("EventHub Namespace Authorization Rule $($ResourceHashTable['AuthorizationRuleName'])", "Create or update")) {
Az.EventHub.private\New-AzEventHubNamespaceAuthorizationRule_CreateViaIdentity -InputObject $authRule -Parameter $authRule @PSBoundParameters
}
}
else{
throw 'Invalid -InputObject'
}
}
}
catch{
throw
}
}
}
# SIG # Begin signature block
# MIIoOAYJKoZIhvcNAQcCoIIoKTCCKCUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBcLB6LIOIhrOW9
# Q/kFeuA4mQ7lTgT1/OwGRnlbx4QvpKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMOj
# 1QVdGg52LfhyLuv9MUO8yGOg/13U955e4UUiuCWDMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAi7JbBbfHVblKSKuIhZQ1ez8WQ6R0n1/d7UgU
# ns6BfLbgLIMEZIkdxbLeyBEvzSzUN+ara8Ko9fjloh7fSKyzGXqabp4RW8hHo1Hs
# /RELSxhnp9YFzK5SKjnOKpr9IDVpw9hV3W5WjpVKGxjUoJQwNhhn8oBjXS36SVoi
# kxl4qqmgn1B2sBF4eLVTE9/U2elf9j3vMWN5ucO23RWtqE+Kav6uTBZXa7SerXD2
# lF2yTa2+IhZZhCy070yQamacvpcmUlwWryjZRy0qp+VagsLeIjIF7oU9auP1z4t8
# rjkviOcX/7dX0wl7EUAwb7Kew8Y56d+1Sp7+0435LCW3xgVZJqGCF5MwghePBgor
# BgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCApZ+ammFZ5lkMrIyAbmgBai7sAiEDNFub1
# zAGksfFWrgIGZjOahILOGBIyMDI0MDUxNjA2NDIxNC4zM1owBIACAfSggdGkgc4w
# gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
# HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg
# VFNTIEVTTjpFMDAyLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEeowggcgMIIFCKADAgECAhMzAAAB7gXTAjCymp2nAAEA
# AAHuMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIzMTIwNjE4NDU0NFoXDTI1MDMwNTE4NDU0NFowgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL7xvKXXooSJrzEpLi9UvtEQ
# 45HsvNgItcS1aB6rI5WWvO4TP4CgJri0EYRKNsdNcQJ4w7A/1M94popqV9NTldIa
# OkmGkbHn1/EwmhNhY/PMPQ7ZECXIGY4EGaIsNdENAkvVG24CO8KIu6VVB6I8jxXv
# 4eFNHf3VNsLVt5LHBd90ompjWieMNrCoMkCa3CwD+CapeAfAX19lZzApK5eJkFNt
# Tl9ybduGGVE3Dl3Tgt3XllbNWX9UOn+JF6sajYiz/RbCf9rd4Y50eu9/Aht+TqVW
# rBs1ATXU552fa69GMpYTB6tcvvQ64Nny8vPGvLTIR29DyTL5V+ryZ8RdL3Ttjus3
# 8dhfpwKwLayjJcbc7AK0sDujT/6Qolm46sPkdStLPeR+qAOWZbLrvPxlk+OSIMLV
# 1hbWM3vu3mJKXlanUcoGnslTxGJEj69jaLVxvlfZESTDdas1b+Nuh9cSz23huB37
# JTyyAqf0y1WdDrmzpAbvYz/JpRkbYcwjfW2b2aigfb288E72MMw4i7QvDNROQhZ+
# WB3+8RZ9M1w9YRCPt+xa5KhW4ne4GrA2ZFKmZAPNJ8xojO7KzSm9XWMVaq2rDAJx
# pj9Zexv9rGTEH/MJN0dIFQnxObeLg8z2ySK6ddj5xKofnyNaSkdtssDc5+yzt74l
# syMqZN1yOZKRvmg3ypTXAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUEIjNPxrZ3CCe
# vfvF37a/X9x2pggwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAHdnIC9rYQo5ZJWk
# GdiTNfx/wZmNo6znvsX2jXgCeH2UrLq1LfjBeg9cTJCnW/WIjusnNlUbuulTOdrL
# af1yx+fenrLuRiQeq1K6AIaZOKIGTCEV9IHIo8jTwySWC8m8pNlvrvfIZ+kXA+ND
# Bl4joQ+P84C2liRPshReoySLUJEwkqB5jjBREJxwi6N1ZGShW/gner/zsoTSo9CY
# BH1+ow3GMjdkKVXEDjCIze01WVFsX1KCk6eNWjc/8jmnwl3jWE1JULH/yPeoztot
# Iq0PM4RQ2z5m2OHOeZmBR3v8BYcOHAEd0vntMj2HueJmR85k5edxiwrEbiCvJOyF
# TobqwBilup0wT/7+DW56vtUYgdS0urdbQCebyUB9L0+q2GyRm3ngkXbwId2wWr/t
# dUG0WXEv8qBxDKUk2eJr5qeLFQbrTJQO3cUwZIkjfjEb00ezPcGmpJa54a0mFDlk
# 3QryO7S81WAX4O/TmyKs+DR+1Ip/0VUQKn3ejyiAXjyOHwJP8HfaXPUPpOu6TgTN
# zDsTU6G04x/sMeA8xZ/pY51id/4dpInHtlNcImxbmg6QzSwuK3EGlKkZyPZiOc3O
# cKmwQ9lq3SH7p3u6VFpZHlEcBTIUVD2NFrspZo0Z0QtOz6cdKViNh5CkrlBJeOKB
# 0qUtA8GVf73M6gYAmGhl+umOridAMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCA00wggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj
# YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUw
# LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVAIijptU29+UXFtRYINDdhgrLo76ToIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp7+SFMCIY
# DzIwMjQwNTE2MDE0ODUzWhgPMjAyNDA1MTcwMTQ4NTNaMHQwOgYKKwYBBAGEWQoE
# ATEsMCowCgIFAOnv5IUCAQAwBwIBAAICEjwwBwIBAAICEu0wCgIFAOnxNgUCAQAw
# NgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgC
# AQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEADESMqdKTvPRtfBwS5ZDD3sCAuqk/
# pBefARkzjUd2RDoiNZHzRZCtrl/Df+bipjzC4OYm0bu4IP+iVxqQYpQqaHC9vdwp
# hGxiKYRvenwGzSkGiybzm1vbdog/pJpg/1EPPIVzSVtNkWC97d28fkcEDTmZoq79
# IZTCPpgVsJTCR4+HGVw/CgmG34kNO6UYhHrQAIsZ0RUN9xRmzsIQ7iMCl4fIrbTT
# fNv2Q92OiC916B+Yibe3a24csS/b9SxeXye6SD9GnxeDzGyl11He1kxPrGv8q3a1
# 0LNRBpbrsn4xkG5fpwP7NxsSjwUfR8wXRZ8JK9K6uoVmIz+Hr7o/bWxxuzGCBA0w
# ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7gXT
# AjCymp2nAAEAAAHuMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL
# KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIEMrQ33X5nSNUoOI/yebKYr3M5i2
# 5y0mG57Mix22A/DoMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgT1B3FJWF
# +r5V1/4M+z7kQiQHP2gJL85B+UeRVGF+MCEwgZgwgYCkfjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAiBCCt/WHJeBX5
# MNxU40Yaps1FhZkneBF4AmXgZcWTXI6AWTANBgkqhkiG9w0BAQsFAASCAgAdzgvg
# GemMNwDduLFDODwPmsHlVzBSjAJ3Xv5M9gTelO3En5CUzzEQ5HNPhNPJTvCOUIn5
# 24llulUtVCSjKgua/D4fwk9zw85tjiCuXlsYRrLP4wNxjXPTMplQglPI0mbO3JxP
# VYiivarvjV37T2sjgkU99pw8IjgVjHgnNiHSQwaabFptrUDrqb/mHyCG5y4yvWAk
# 1jEFXZXyqBr40jqOwRF6bvMH+f1zrvO4aQPmUWUL3RnPoRtF9sYgeEDH7pRCY6tz
# dhV0eOIOMb4PbnMJa9e+MJJnjwsIHvWDY5UKzU7mQL6TogFI2pMGQFXpEpL8AA6q
# i2q3NdXvwuJz6vxAvArg/2cpv3BPDq/elEfLMQGI52K1nfZdYoC8WA3WbP/rPU+a
# hTXt1jiyqgztOMVz31j1185sotmzxj7Ypp3IEMtO/U+b8pHMMTid5tT1meVclGcv
# vvYTZ/rPx/vTZBPtyS5GDyzeGFHe8/fIbkoIA8W/8BHnZEvhsQYFM8DXGNqhJ7J8
# //ufQWKFF3wB6lTrLntSdf+JkPACxK+Dfr05h5o/jmfsIuCXt1KmVVW3xPyQ90Iz
# bTiNmA3A7CYOLTQxb9W81uDibIAvCzrf6E3oPR9IM4cdNZXGp08pxJubyzUl3BHf
# J/SakMh5/mIF6pBOf/Ojlh6EGWC6RMUoRru1vA==
# SIG # End signature block
|
combined_dataset/train/non-malicious/4390.ps1
|
4390.ps1
|
function Ping-Endpoint
{
[CmdletBinding()]
param
(
[Parameter()]
[ValidateNotNullOrEmpty()]
[string]
$Endpoint,
[Parameter()]
$Credential,
[Parameter()]
$Proxy,
[Parameter()]
$ProxyCredential,
[Parameter()]
[switch]
$AllowAutoRedirect = $true
)
$results = @{}
$WebProxy = $null
if($Proxy -and ('Microsoft.PowerShell.Commands.PowerShellGet.InternalWebProxy' -as [Type]))
{
$ProxyNetworkCredential = $null
if($ProxyCredential)
{
$ProxyNetworkCredential = $ProxyCredential.GetNetworkCredential()
}
$WebProxy = New-Object Microsoft.PowerShell.Commands.PowerShellGet.InternalWebProxy -ArgumentList $Proxy,$ProxyNetworkCredential
}
if(HttpClientApisAvailable)
{
$response = $null
try
{
$handler = New-Object System.Net.Http.HttpClientHandler
if($Credential)
{
$handler.Credentials = $Credential.GetNetworkCredential()
}
else
{
$handler.UseDefaultCredentials = $true
}
if($WebProxy)
{
$handler.Proxy = $WebProxy
}
$httpClient = New-Object System.Net.Http.HttpClient -ArgumentList $handler
$response = $httpclient.GetAsync($endpoint)
}
catch
{
}
if ($response -ne $null -and $response.result -ne $null)
{
$results.Add($Script:ResponseUri,$response.Result.RequestMessage.RequestUri.AbsoluteUri.ToString())
$results.Add($Script:StatusCode,$response.result.StatusCode.value__)
}
}
else
{
$iss = [System.Management.Automation.Runspaces.InitialSessionState]::Create()
$iss.types.clear()
$iss.formats.clear()
$iss.LanguageMode = "FullLanguage"
$WebRequestcmd = @'
param($Credential, $WebProxy)
try
{{
$request = [System.Net.WebRequest]::Create("{0}")
$request.Method = 'GET'
$request.Timeout = 30000
if($Credential)
{{
$request.Credentials = $Credential.GetNetworkCredential()
}}
else
{{
$request.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials
}}
$request.AllowAutoRedirect = ${1}
if($WebProxy)
{{
$request.Proxy = $WebProxy
}}
$response = [System.Net.HttpWebResponse]$request.GetResponse()
if($response.StatusCode.value__ -eq 302)
{{
$response.Headers["Location"].ToString()
}}
else
{{
$response
}}
$response.Close()
}}
catch [System.Net.WebException]
{{
"Error:System.Net.WebException"
}}
'@ -f $EndPoint, $AllowAutoRedirect
$ps = [powershell]::Create($iss).AddScript($WebRequestcmd)
if($WebProxy)
{
$null = $ps.AddParameter('WebProxy', $WebProxy)
}
if($Credential)
{
$null = $ps.AddParameter('Credential', $Credential)
}
$response = $ps.Invoke()
$ps.dispose()
if ($response -ne "Error:System.Net.WebException")
{
if($AllowAutoRedirect)
{
$results.Add($Script:ResponseUri,$response.ResponseUri.ToString())
$results.Add($Script:StatusCode,$response.StatusCode.value__)
}
else
{
$results.Add($Script:ResponseUri,[String]$response)
}
}
}
return $results
}
|
combined_dataset/train/non-malicious/2750.ps1
|
2750.ps1
|
& $env:windir\system32\tasklist.exe /v /fo csv | Select-Object -Skip 1 | % {
$o = "" | Select-Object ImageName,PID,SessionName,SessionNum,MemUsage,Status,UserName,CPUTime,WindowTitle
$row = $_ -replace '(,)(?=(?:[^"]|"[^"]*")*$)', "`t" -replace "`""
$o.ImageName,
$o.PID,
$o.SessionName,
$o.SessionNum,
$o.MemUsage,
$o.Status,
$o.UserName,
$o.CPUTime,
$o.WindowTitle = ( $row -split "`t" )
$o
}
|
combined_dataset/train/non-malicious/sample_34_41.ps1
|
sample_34_41.ps1
|
#
# Module manifest for module 'OCI.PSModules.Networkfirewall'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Networkfirewall.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6a784c1a-dca2-489e-beb9-d910537df35b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Networkfirewall Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkfirewall.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCINetworkfirewall', 'Get-OCINetworkfirewallAddressList',
'Get-OCINetworkfirewallAddressListsList',
'Get-OCINetworkfirewallApplication',
'Get-OCINetworkfirewallApplicationGroup',
'Get-OCINetworkfirewallApplicationGroupsList',
'Get-OCINetworkfirewallApplicationsList',
'Get-OCINetworkfirewallDecryptionProfile',
'Get-OCINetworkfirewallDecryptionProfilesList',
'Get-OCINetworkfirewallDecryptionRule',
'Get-OCINetworkfirewallDecryptionRulesList',
'Get-OCINetworkfirewallMappedSecret',
'Get-OCINetworkfirewallMappedSecretsList',
'Get-OCINetworkfirewallPoliciesList',
'Get-OCINetworkfirewallPolicy',
'Get-OCINetworkfirewallSecurityRule',
'Get-OCINetworkfirewallSecurityRulesList',
'Get-OCINetworkfirewallService',
'Get-OCINetworkfirewallServiceList',
'Get-OCINetworkfirewallServiceListsList',
'Get-OCINetworkfirewallServicesList', 'Get-OCINetworkfirewallsList',
'Get-OCINetworkfirewallUrlList',
'Get-OCINetworkfirewallUrlListsList',
'Get-OCINetworkfirewallWorkRequest',
'Get-OCINetworkfirewallWorkRequestErrorsList',
'Get-OCINetworkfirewallWorkRequestLogsList',
'Get-OCINetworkfirewallWorkRequestsList',
'Invoke-OCINetworkfirewallApplyNetworkFirewallPolicy',
'Invoke-OCINetworkfirewallBulkUploadAddressLists',
'Invoke-OCINetworkfirewallBulkUploadApplicationGroups',
'Invoke-OCINetworkfirewallBulkUploadApplications',
'Invoke-OCINetworkfirewallBulkUploadDecryptionProfiles',
'Invoke-OCINetworkfirewallBulkUploadDecryptionRules',
'Invoke-OCINetworkfirewallBulkUploadMappedSecrets',
'Invoke-OCINetworkfirewallBulkUploadSecurityRules',
'Invoke-OCINetworkfirewallBulkUploadServiceLists',
'Invoke-OCINetworkfirewallBulkUploadServices',
'Invoke-OCINetworkfirewallBulkUploadUrlLists',
'Invoke-OCINetworkfirewallCloneNetworkFirewallPolicy',
'Invoke-OCINetworkfirewallMigrateNetworkFirewallPolicy',
'Move-OCINetworkfirewallCompartment',
'Move-OCINetworkfirewallPolicyCompartment',
'New-OCINetworkfirewall', 'New-OCINetworkfirewallAddressList',
'New-OCINetworkfirewallApplication',
'New-OCINetworkfirewallApplicationGroup',
'New-OCINetworkfirewallDecryptionProfile',
'New-OCINetworkfirewallDecryptionRule',
'New-OCINetworkfirewallMappedSecret',
'New-OCINetworkfirewallPolicy',
'New-OCINetworkfirewallSecurityRule',
'New-OCINetworkfirewallService',
'New-OCINetworkfirewallServiceList',
'New-OCINetworkfirewallUrlList', 'Remove-OCINetworkfirewall',
'Remove-OCINetworkfirewallAddressList',
'Remove-OCINetworkfirewallApplication',
'Remove-OCINetworkfirewallApplicationGroup',
'Remove-OCINetworkfirewallDecryptionProfile',
'Remove-OCINetworkfirewallDecryptionRule',
'Remove-OCINetworkfirewallMappedSecret',
'Remove-OCINetworkfirewallPolicy',
'Remove-OCINetworkfirewallSecurityRule',
'Remove-OCINetworkfirewallService',
'Remove-OCINetworkfirewallServiceList',
'Remove-OCINetworkfirewallUrlList',
'Stop-OCINetworkfirewallWorkRequest', 'Update-OCINetworkfirewall',
'Update-OCINetworkfirewallAddressList',
'Update-OCINetworkfirewallApplication',
'Update-OCINetworkfirewallApplicationGroup',
'Update-OCINetworkfirewallDecryptionProfile',
'Update-OCINetworkfirewallDecryptionRule',
'Update-OCINetworkfirewallMappedSecret',
'Update-OCINetworkfirewallPolicy',
'Update-OCINetworkfirewallSecurityRule',
'Update-OCINetworkfirewallService',
'Update-OCINetworkfirewallServiceList',
'Update-OCINetworkfirewallUrlList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkfirewall'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_66_94.ps1
|
sample_66_94.ps1
|
#requires -Version 5.0
enum BcArtifactSource {
OnPrem
Sandbox
Insider
}
#Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psd1)
#Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psm1)
#. "$PSScriptRoot\ClientContext\ClientContextLibLoader.ps1" -BcLibVersion (Get-SelectedBcVersion)
Import-Module (Join-Path $PSScriptRoot EntraIdAuth\EntraIdAuth.psm1)
Import-Module (Join-Path $PSScriptRoot ALTestRunnerInternal.psm1)
Import-Module (Join-Path $PSScriptRoot ALTestRunner.psm1)
#Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psd1)
#Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psm1)
function Invoke-NPALTests {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[string]$SmbAlExtPath,
[Parameter(Mandatory=$false)]
[ValidateSet('All','Codeunit','Test')]
[string]$Tests = 'All',
[Parameter(Mandatory=$false)]
[string]$FileName = '',
[Parameter(Mandatory=$false)]
[int]$SelectionStart = 0,
[Parameter(Mandatory=$false)]
[string]$ExtensionId,
[Parameter(Mandatory=$false)]
[string]$ExtensionName,
[Parameter(Mandatory = $false)]
[switch]$GetCodeCoverage,
[Parameter(Mandatory = $false)]
$DisabledTests,
[switch]$GetPerformanceProfile,
[string]$ResultsFilePath
)
$Params = @{}
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = Get-ServiceUrl
Test-ServiceIsRunningAndHealthy
# Let's check version and already loaded modules (if any) and eventually load/import ClientContext assemblies and types.
$Version = Get-SelectedBcVersion
if ($global:ClientContextLoadedModuleVersion -ne $Version) {
Push-Location
try {
Set-Location $PSScriptRoot
. (Join-Path $PSScriptRoot -ChildPath 'ClientContext' -AdditionalChildPath 'ClientContextLibLoader.ps1') -BcLibVersion $Version
. (Join-Path $PSScriptRoot 'ClientSessionLibLoader.ps1')
$global:ClientContextLoadedModuleVersion = $Version
}
catch {
Write-Error "Can't import ClientContext module for BC version $Version. Details: $_"
}
finally {
Pop-Location
}
}
switch ($environmentType) {
OnPrem {
$serviceUrlCredCacheKey = Get-ServiceUrlCredentialCacheKey
$serviceUrlCredCacheKey = $serviceUrlCredCacheKey.ToLower();
$creds = Get-NavUserPasswordCredentials -SmbAlExtPath $SmbAlExtPath -WebClientUrl $serviceUrlCredCacheKey
if (!$creds) {
throw "Can't find credential for the key $serviceUrlCredCacheKey!"
}
[securestring]$secStringPassword = ConvertTo-SecureString $creds.Password -AsPlainText -Force
[pscredential]$creds = New-Object System.Management.Automation.PSCredential ($creds.Username, $secStringPassword)
if (!$creds) {
throw "Can't find credentials in the AL development credential cache for $serviceUrlCredCacheKey!"
}
$Params.Add('Credential', $creds)
$Params.Add('AutorizationType', 'NavUserPassword')
}
Sandbox {
# Sandbox with AAD auth.
$environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName'
if (!$bcAuthContext) {
$bcAuthContext = New-BcAuthContext -includeDeviceLogin
}
$bcAuthContext = Renew-BcAuthContext $bcAuthContext
$Global:BCAuthContext = $bcAuthContext
#$accessToken = $bcAuthContext.accessToken
#$credential = New-Object pscredential -ArgumentList $bcAuthContext.upn, (ConvertTo-SecureString -String $accessToken -AsPlainText -Force)
$response = Invoke-RestMethod -Method Get -Uri "https://businesscentral.dynamics.com/$($bcAuthContext.tenantID)/$environmentName/deployment/url"
if($response.status -ne 'Ready') {
throw "environment not ready, status is $($response.status)"
}
$useUrl = $response.data.Split('?')[0]
$tenant = ($response.data.Split('?')[1]).Split('=')[1]
$publicWebBaseUrl = $useUrl.TrimEnd('/')
$serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant"
if ($companyName) {
$serviceUrl += "&company=$([Uri]::EscapeDataString($companyName))"
}
$Params.Add('AutorizationType', 'AAD')
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
if ($FileName -ne '') {
if (Get-FileIsTestCodeunit -FileName $FileName) {
$Params.Add('TestCodeunitsRange', (Get-ObjectIdFromFile $FileName))
}
else {
throw "$FileName is not an AL test codeunit"
}
}
if ($SelectionStart -ne 0) {
$TestName = Get-TestNameFromSelectionStart -Path $FileName -SelectionStart $SelectionStart
if ($TestName -eq '') {
throw "Please place the cursor within the test method that you want to run and try again."
}
else {
$Params.Add('TestProcedureRange', $TestName)
}
}
if (-not [string]::IsNullOrEmpty($ResultsFilePath)) {
$Params.Add('ResultsFilePath', $ResultsFilePath)
$Params.Add('SaveResultFile', $true);
} else {
$Params.Add('SaveResultFile', $false);
}
Run-AlTests -ServiceUrl $serviceUrl @Params
}
function Get-OnPremServiceUrlCredentialKey {
[CmdletBinding()]
param (
[CmdletBinding(Mandatory=$true)]
[string]$ServiceUrl
)
$url = ([System.Uri]$ServiceUrl).AbsoluteUri.Replace('/','_').Replace('__','//')
return $url
}
function Get-ServiceUrl {
[CmdletBinding()]
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
# TODO: Optimize => Read once and then parse each property.
$server = Get-ValueFromLaunchJson -KeyName 'server'
$serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance'
$port = Get-ValueFromLaunchJson -KeyName 'port'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($server.TrimEnd('/'))"
if (-not ([string]::IsNullOrEmpty($port))) {
$serviceUrl = "$serviceUrl`:$port"
}
$serviceUrl = "$serviceUrl/$serverInstance"
if (-not ([string]::IsNullOrEmpty($tenant))) {
$serviceUrl = "$serviceUrl/?tenant=$tenant"
}
return $serviceUrl
}
Sandbox {
# TODO: Base URL for SaaS maybe configurable?
$serviceUrl = 'https://businesscentral.dynamics.com/'
$environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url"
$response = Invoke-RestMethod -Method Get -Uri $serviceUrl
$useUrl = $response.data.Split('?')[0]
$tenant = ($response.data.Split('?')[1]).Split('=')[1]
$publicWebBaseUrl = $useUrl.TrimEnd('/')
$serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant"
return $serviceUrl
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
}
function Get-ServiceUrlCredentialCacheKey {
[CmdletBinding()]
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
# TODO: Optimize => Read once and then parse each property.
$server = Get-ValueFromLaunchJson -KeyName 'server'
$serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance'
$port = Get-ValueFromLaunchJson -KeyName 'port'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($server.TrimEnd('/'))"
if (-not ([string]::IsNullOrEmpty($port))) {
$serviceUrl = "$serviceUrl`:$port"
}
$serviceUrl = ([System.Uri]$serviceUrl).AbsoluteUri.TrimEnd('/')
$serviceUrl = "$serviceUrl`_$serverInstance"
<# The 'UserPasswordCache.dat' file contains entries without tenant id so let's remove the next code:
if ((-not ([string]::IsNullOrEmpty($tenant))) -and ($tenant -ne 'default')) {
$serviceUrl = "$serviceUrl?tenant=$tenant"
}
#>
return $serviceUrl
}
Sandbox {
# TODO: Base URL for SaaS maybe configurable?
throw "Not implemented yet!"
$serviceUrl = 'https://businesscentral.dynamics.com/'
$environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url"
$response = Invoke-RestMethod -Method Get -Uri $serviceUrl
$useUrl = $response.data.Split('?')[0]
$tenant = ($response.data.Split('?')[1]).Split('=')[1]
$publicWebBaseUrl = $useUrl.TrimEnd('/')
$serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant"
return $serviceUrl
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
}
function Get-ServiceHealthUrl {
[CmdletBinding()]
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
$server = Get-ValueFromLaunchJson -KeyName 'server'
$serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance'
$port = Get-ValueFromLaunchJson -KeyName 'port'
$serviceUrl = "$($server.TrimEnd('/'))"
if (-not ([string]::IsNullOrEmpty($port))) {
$serviceUrl = "$serviceUrl`:$port"
}
$serviceUrl = "$serviceUrl/$serverInstance"
if (-not ([string]::IsNullOrEmpty($tenant))) {
$serviceUrl = "$serviceUrl/Health/System"
}
return $serviceUrl
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
}
function Test-ServiceIsRunningAndHealthy {
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
$healthServiceUrl = Get-ServiceHealthUrl
$serviceUrl = Get-ServiceUrl
$healthCheckResult = $null
try {
$healthCheckResult = Invoke-WebRequest -Uri $healthServiceUrl -UseBasicParsing -TimeoutSec 10
} catch {
$healthCheckResult = $null
}
if ((!$healthCheckResult) -or ($healthCheckResult.StatusCode -ne 200)) {
throw "$serviceUrl is not available. Please start the container, or check NST, eventually retry."
}
}
Default {
# For SaaS Sandboxes we don't have any method without authentication so we have to be authenticated first.
# So let's consider the environment is up and user knows about the real state before development and testing.
}
}
}
function Get-VSCodeExtensionRootPath {
[CmdletBinding()]
param (
)
$currentPath = $PSScriptRoot
while ($currentPath) {
$manifestFile = Get-ChildItem -Path $currentPath -Filter 'package.json'
if ($manifestFile) {
return $currentPath
}
$currentPath = Split-Path $currentPath -ErrorAction SilentlyContinue
}
throw "Can't find VSCode extension root path."
}
function Get-VSCodeExtensionInternalFolderPath {
[CmdletBinding()]
param (
)
$rootPath = Get-VSCodeExtensionRootPath
$internalPath = Join-Path $rootPath '.altestrunner'
if (!(Test-Path $internalPath)) {
$null = New-Item $internalPath -ItemType Directory -Force
}
return $internalPath
}
function Get-VSCodeExtensionClientContextLibsRootPath {
[CmdletBinding()]
param (
)
$path = Get-VSCodeExtensionInternalFolderPath
$path = Join-Path $path 'CSLibs'
if (!(Test-Path $path)) {
$null = New-Item $path -ItemType Directory -Force
}
return $path
}
function Get-RipUnzipExeFilePath {
[CmdletBinding()]
param (
)
$vsCodeExtRootPath = Get-VSCodeExtensionRootPath
$ripUnzipPath = Join-Path $vsCodeExtRootPath '.bin' -AdditionalChildPath 'ripunzip', 'ripunzip.exe'
if (!(Test-Path $ripUnzipPath)) {
throw "'ripunzip.exe' path $ripUnzipPath doesn't exist!"
}
return $ripUnzipPath
}
function Invoke-RipUnzip {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string]$Uri,
[Parameter(Mandatory=$true)]
[string]$DestinationPath,
[string]$ExtractionFilter
)
$ripUnzipPath = Get-RipUnzipExeFilePath
$cmd = "$ripUnzipPath unzip-uri -d $DestinationPath $Uri $ExtractionFilter"
Invoke-Expression -Command $cmd
}
function Get-ClientSessionLibrariesFromBcArtifacts {
[CmdletBinding()]
param (
[string]$BcArtifactSourceUrl,
[Parameter(Mandatory=$true)]
[string]$Version
)
$BcArtifactSourceUrl = $BcArtifactSourceUrl.TrimEnd("/")
$BcArtifactSourceUrl = "$BcArtifactSourceUrl/$Version/platform"
Set-SelectedBcVersion -BcVersion $Version
$destPath = Get-SelectedBcVersionLibPath
if (!(Test-Path $destPath)) {
$null = New-Item -Path $destPath -ItemType Directory -Force
}
Invoke-RipUnzip -Uri $BcArtifactSourceUrl -DestinationPath $destPath -ExtractionFilter "'?pplications\*\?est?unner\?nternal\*.dll'"
}
function Import-ClientContextModule {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]$Version
)
if ($global:ClientContextLoadedModuleVersion) {
if ($global:ClientContextLoadedModuleVersion -eq $Version) {
return
}
}
try {
. (Join-Path $PSScriptRoot -ChildPath 'ClientContext' -AdditionalChildPath 'ClientContextLibLoader.ps1') -BcLibVersion $Version
$global:ClientContextLoadedModuleVersion = $Version
}
catch {
Write-Error "Can't import ClientContext module for BC version $Version. Details: $_"
}
}
$code = @"
using Microsoft.AspNetCore.DataProtection;
using System.Text;
using System.IO;
namespace ALCredentialCacheLibrary
{
public static class ALCredentailCacheReader
{
public static string GetDataFromCredentialCache(string credentialFolderPath, string credentialCacheFileName)
{
var credentailFilePath = Path.Combine(credentialFolderPath, credentialCacheFileName);
if (!File.Exists(credentailFilePath))
throw new FileNotFoundException(string.Format("Credential file {0} doesn't exist!", credentailFilePath));
var bytes = File.ReadAllBytes(credentailFilePath);
var purpose = new string[] { "Microsoft.Dynamics.Nav.Deployment", credentialCacheFileName };
var dirInfo = new DirectoryInfo(credentialFolderPath);
var provider = DataProtectionProvider.Create(dirInfo);
var protector = provider.CreateProtector(purpose);
return Encoding.UTF8.GetString(protector.Unprotect(bytes));
}
}
}
"@
function Get-MsbAlExtBinariesPath {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$msDynamicsSmbAlExtPath
)
# TODO: What about macOS (OS X) or Linux?
return (Join-Path $msDynamicsSmbAlExtPath '\bin\win32\')
}
function Get-ExternalLibraries {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$msDynamicsSmbAlExtPath
)
$libs = @()
# TODO: What about macOS (OS X) or Linux?
$Global:MsDynamicsSmbAlExtPath = $msDynamicsSmbAlExtPath
$Global:MsDynamicsSmbAlExtLibPath = Get-MsbAlExtBinariesPath -msDynamicsSmbAlExtPath $msDynamicsSmbAlExtPath
$libPath = $Global:MsDynamicsSmbAlExtLibPath
$libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Abstractions.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Extensions.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.Cryptography.Internal.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.Connections.Abstractions.dll"
#$libs += Join-Path $libPath "mscorlib.dll"
$libs += Join-Path $libPath "System.dll"
$libs += Join-Path $libPath "System.Runtime.dll"
$libs += Join-Path $libPath "System.IO.FileSystem.dll"
return $libs
}
function Get-NavUserPasswordCredentials {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$SmbAlExtPath,
[Parameter(Mandatory=$true)]
[string]$WebClientUrl
)
$creds = Get-ALDevCacheFileContent -SmbAlExtPath $SmbAlExtPath -FileName UserPasswordCache.dat -ReturnPSObject
if (!$creds) {
throw "You should authenticate using standard AL dev approach. Then you can try again."
}
$record = $creds.$WebClientUrl
if (!$record) {
throw "You were not authenticated against $WebClientUrl yet or the cache has expired. Please, authenticate using the standard Microsoft AL development extension and try again."
}
return $record
}
function Get-ALDevCacheFileContent {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$SmbAlExtPath,
[Parameter(Mandatory=$true)]
[ValidateSet("UserPasswordCache.dat", "TokenKeyCache.dat", "TokenCache.dat", "TenantMapCache.dat", "ServerInfoCache.dat")]
[string]$FileName,
[switch]$ReturnPSObject
)
if (-not ('ALCredentialCacheLibrary.ALCredentailCacheReader' -as [type])) {
$assemblies = Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath
$assemblies | ForEach-Object {
[void][Reflection.Assembly]::LoadFrom($_)
}
$credentialReader = Add-Type -TypeDefinition $code -Language CSharp -ReferencedAssemblies (Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath) -WarningAction Ignore -IgnoreWarnings -PassThru
} else {
$credentialReader = [ALCredentialCacheLibrary.ALCredentailCacheReader]
}
$SmbAlExtBinPath = Join-Path $SmbAlExtPath '\bin\win32\'
$smbAlCacheFilePath = Join-Path $SmbAlExtBinPath $FileName
if (-not (Test-Path $smbAlCacheFilePath)) {
Write-Error "Requested credential cache file $FileName doesn't exist. Please, authenticate using the standard Microsoft AL development extension first and then try again."
}
try {
$fileContent = $credentialReader::GetDataFromCredentialCache($SmbAlExtBinPath,$FileName)
} catch {
Write-Error "Can not decrypt file $FileName. $($_.Exception)"
}
if (!$ReturnPSObject) {
return $fileContent
}
$fileContentObject = ConvertFrom-Json $fileContent
return $fileContentObject
}
function Get-NavUserPasswordCredentialsNotWorking {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$WebClientUrl
)
#$purpose = @("Microsoft.Dynamics.Nav.Deployment", "UserPasswordCache.dat")
$purpose = New-Object System.Collections.Generic.List[System.String]
$purpose.Add('Microsoft.Dynamics.Nav.Deployment')
$purpose.Add('UserPasswordCache.dat')
$protectedFile = Join-Path $Global:MsDynamicsSmbAlExtLibPath $purpose[1]
#$dirInfo = New-Object System.IO.DirectoryInfo -ArgumentList $Global:MsDynamicsSmbAlExtLibPath
$dirInfo = New-Object "System.IO.DirectoryInfo, Version=6.0.0.0" -ArgumentList $Global:MsDynamicsSmbAlExtLibPath
$provider = [Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create($dirInfo)
$protector = $provider.CreateProtector($purpose);
$bytes = [System.IO.File]::ReadAllBytes($protectedFile)
$unprotectedValues = $protector.Unprotect($bytes);
$unprotectedString = [System.Text.Encoding]::UTF8.GetString($unprotectedValues)
Write-Host "Creds: $unprotectedString"
#[Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create(()
}
function Get-SelectedBcVersion {
[CmdletBinding()]
param(
)
$global:SelectedBcVersion = Get-ValueFromALTestRunnerConfig -KeyName 'selectedBcVersion'
if ([string]::IsNullOrEmpty($global:SelectedBcVersion)) {
throw "You have to select BC version and eventually download missing libraries."
}
return $global:SelectedBcVersion
}
function Set-SelectedBcVersion {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]$BcVersion
)
$global:SelectedBcVersion = Set-ALTestRunnerConfigValue -KeyName 'selectedBcVersion' -KeyValue $BcVersion
return $global:SelectedBcVersion
}
function Get-SelectedBcVersionLibPath {
[CmdletBinding()]
param(
)
$path = Get-VSCodeExtensionClientContextLibsRootPath
$destPath = Join-Path $path (Get-SelectedBcVersion)
return $destPath
}
##########################
# From BcContainerHelper #
##########################
function Parse-JWTtoken([string]$token) {
if ($token.Contains(".") -and $token.StartsWith("eyJ")) {
$tokenPayload = $token.Split(".")[1].Replace('-', '+').Replace('_', '/')
while ($tokenPayload.Length % 4) { $tokenPayload += "=" }
return [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($tokenPayload)) | ConvertFrom-Json
}
throw "Invalid token"
}
function Test-BcAuthContext {
Param(
$bcAuthContext
)
if (!(($bcAuthContext -is [Hashtable]) -and
($bcAuthContext.ContainsKey('ClientID')) -and
($bcAuthContext.ContainsKey('Credential')) -and
($bcAuthContext.ContainsKey('authority')) -and
($bcAuthContext.ContainsKey('RefreshToken')) -and
($bcAuthContext.ContainsKey('UtcExpiresOn')) -and
($bcAuthContext.ContainsKey('tenantID')) -and
($bcAuthContext.ContainsKey('AccessToken')) -and
($bcAuthContext.ContainsKey('includeDeviceLogin')) -and
($bcAuthContext.ContainsKey('deviceLoginTimeout')))) {
throw 'BcAuthContext should be a HashTable created by New-BcAuthContext.'
}
}
$Global:ExtensionSystemFolderPath = Get-ALTestRunnerConfigPath -ReturnFolderPath
#$global:SelectedBcVersion = Get-SelectedBcVersion
#$Global:ClientSessionLibsPath = Get-SelectedBcVersionLibPath
Export-ModuleMember -Function *
|
combined_dataset/train/non-malicious/sample_66_48.ps1
|
sample_66_48.ps1
|
# Runs OptProf for MSBuild binaries based on an insertion build
trigger: none # Prevents this pipeline from triggering on check-ins
pr: none # don't run this on PR as well, this should only trigger off on MSBuild runs
schedules:
- cron: "0 9 * * Wed,Sat"
displayName: Weekly OptProf Run
branches:
include:
- main
always: true
resources:
pipelines:
- pipeline: ComponentBuildUnderTest
source: MSBuild\MSBuild # The name of the pipeline that produces the artifact
trigger:
branches:
- vs*
- pipeline: DartLab
project: DevDiv
source: DartLab
branch: main
- pipeline: DartLab.OptProf
source: DartLab.OptProf
branch: main
tags:
- production
repositories:
- repository: DartLabTemplates
type: git
name: DartLab.Templates
- repository: DartLabOptProfTemplates
type: git
name: DartLab.OptProf
ref: refs/tags/Production
parameters:
# Whether or not to delete the test machines after the run completes
- name: testMachineCleanUpStrategy
type: string
default: delete
values:
- delete
- stop
stages:
- template: \templates\stages\visual-studio\single-runsettings.yml@DartLabOptProfTemplates
parameters:
##### Required #####
runSettingsURI: $(Pipeline.Workspace)\ComponentBuildUnderTest\VSSetup\Insertion\OptProf\Training.runsettings
visualStudioBootstrapperURI: $(VisualStudio.InstallationUnderTest.BootstrapperURL)
##### Optional #####
name: OptProfProfilingWorkflow
displayName: OptProf Profiling Workflow
optOptimizationInputsDropName: $(OptimizationInputsDropName)
cloudBuildResourceName: ComponentBuildUnderTest
testLabPoolName: VS-Platform # The test lab pool to run your tests in
testMachineCleanUpStrategy: ${{parameters.testMachineCleanUpStrategy}}
testMachineImageName: Windows-11-Enterprise-23H2
visualStudioSigning: Test
variables:
- name: branchName # The branch in the VS repo the bootstrapper was based on
value: $[replace(variables['resources.pipeline.ComponentBuildUnderTest.sourceBranch'],'refs/heads/','')]
- name: OptimizationInputsDropName # The naming convention of the OptimizationInputsDrop
value: OptimizationData/DotNet-msbuild-Trusted/$(branchName)/$(resources.pipeline.ComponentBuildUnderTest.runName)/$(Build.BuildId)/$(System.StageAttempt)
##### Step Hooks #####
preTestMachineConfigurationStepList:
- download: ComponentBuildUnderTest
artifact: MicroBuildOutputs
patterns: '**\BootstrapperInfo.json'
displayName: Download Bootstrapper Information
- download: ComponentBuildUnderTest
artifact: VSSetup
patterns: '**\*.runsettings'
displayName: Download OptProf Information
- powershell: |
try {
$bootstrapperInfoJson = Get-Content -Raw -Path '$(Pipeline.Workspace)\ComponentBuildUnderTest\MicroBuildOutputs\BootstrapperInfo.json' | ConvertFrom-Json
$vsBranch = $bootstrapperInfoJson[0].VSBranch
Write-Host "VSBootstrapperBranch: $vsBranch"
Set-AzurePipelinesVariable 'VSBootstrapperBranch' $vsBranch
}
catch {
Write-Host $_
Write-Error "Failed to set VSBootstrapperBranch pipeline variable"
throw
}
displayName: Set 'VSBootstrapperBranch' variable
- task: PowerShell@2
displayName: Set 'VisualStudio.InstallationUnderTest.BootstrapperURL' variable
inputs:
filePath: $(DartLab.Path)\Scripts\VisualStudio\Bootstrapper\Get-BootstrapperURL.ps1
arguments: -BootstrapperInfoJsonURI '$(Pipeline.Workspace)\ComponentBuildUnderTest\MicroBuildOutputs\BootstrapperInfo.json' -VSBranch '$(VSBootstrapperBranch)' -OutVariableName 'VisualStudio.InstallationUnderTest.BootstrapperURL'
preDeployAndRunTestsStepList:
- download: ComponentBuildUnderTest
|
combined_dataset/train/non-malicious/3164.ps1
|
3164.ps1
|
if (-not (Get-Module -Name Microsoft.Lync.Model))
{
try
{
Import-Module -Name (Join-Path -Path ${env:ProgramFiles(x86)} -ChildPath "Microsoft Office 2013\LyncSDK\Assemblies\Desktop\Microsoft.Lync.Model.dll") -ErrorAction Stop
}
catch
{
Write-Warning "Microsoft.Lync.Model not available, download and install the Lync 2013 SDK http://www.microsoft.com/en-us/download/details.aspx?id=36824"
break
}
}
Function Get-SkypeStatus{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false,
HelpMessage="Email address to verify the status of.")]
[string]$email,
[Parameter(Mandatory=$false,
HelpMessage="Input file to read email addresses from.")]
[string]$inputFile,
[Parameter(Mandatory=$false,
HelpMessage="Output file to write valid emails to.")]
[string]$outputFile,
[Parameter(Mandatory=$false,
HelpMessage="The number of times to check for an email's status - Default:1")]
[string]$attempts,
[Parameter(Mandatory=$false,
HelpMessage="Delay to use - Helpful with large lists")]
[string]$delay
)
try
{
$client = [Microsoft.Lync.Model.LyncClient]::GetClient()
}
catch
{
Write-Host "`nYou need to have Skype open and signed in first"
break
}
if(($email.Length -eq 0) -and ($inputFile.Length -eq 0))
{
Get-Help Get-SkypeStatus
break
}
$TempTblUsers = New-Object System.Data.DataTable
$TempTblUsers.Columns.Add("Email") | Out-Null
$TempTblUsers.Columns.Add("Title") | Out-Null
$TempTblUsers.Columns.Add("Full Name") | Out-Null
$TempTblUsers.Columns.Add("Status") | Out-Null
$TempTblUsers.Columns.Add("Out Of Office") | Out-Null
$TempTblUsers.Columns.Add("Endpoints") | Out-Null
if ($attempts.Length -eq 0){$attempts = 1}
if($inputFile)
{
foreach($line in (Get-Content $inputFile))
{
Get-SkypeStatus -email $line -attempts $attempts
if ($delay -ne $null){sleep $delay}
}
}
for ($i=1; $i -le $attempts; $i++)
{
if ($email.Length -gt 0){
try
{
$contact = $client.ContactManager.GetContactByUri($email)
}
catch
{
Write-Verbose "Failed to find Contact $email"
break
}
}
else{break}
$convo = $client.ConversationManager.AddConversation()
if($contact)
{
$convo.AddParticipant($contact) | Out-Null
}
else{break}
if(($contact.GetContactInformation('Availability') -gt '0') -or ([string]$contact.GetContactInformation('Title')))
{
$numbers = ""
$phones = $contact.GetContactInformation('ContactEndpoints')
$phones | foreach {if ($_.Uri -like "tel:*") {if ($_.Type -eq "WorkPhone"){$numbers += "Work: "+$_.Uri+" "} elseif ($_.Type -eq "MobilePhone"){$numbers += "Mobile: "+$_.Uri+" "}}}
$TempTblUsers.Rows.Add([string]$email,[string]$contact.GetContactInformation('Title'),[string]$contact.GetContactInformation('DisplayName'),$contact.GetContactInformation('Activity'),[string]$contact.GetContactInformation('IsOutOfOffice'),$numbers) | Out-Null
}
$convo.End() | Out-Null
if($outputFile)
{
$TempTblUsers | Export-Csv -Path $outputFile -Append
}
}
return $TempTblUsers
}
Function Get-SkypeLoginURL{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true,
HelpMessage="The domain name to lookup.")]
[string]$domain
)
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
$discoDomain = 'lyncdiscover.'+$domain
$accessDomain = 'access.'+$domain
$meetDomain = 'meet.'+$domain
$dialinDomain = 'dialin.'+$domain
try{($disco = Resolve-DnsName $discoDomain -ErrorAction Stop -Verbose:$false | select Name | Select-Object -First 1)|Out-Null}catch{}
try{($access = Resolve-DnsName $accessDomain -ErrorAction Stop -Verbose:$false | select Name | Select-Object -First 1)|Out-Null}catch{}
try{($meet = Resolve-DnsName $meetDomain -ErrorAction Stop -Verbose:$false | select Name | Select-Object -First 1)|Out-Null}catch{}
try{($dialin = (Resolve-DnsName $dialinDomain -ErrorAction Stop -Verbose:$false | select Name | Select-Object -First 1))|Out-Null}catch{}
if($disco.length -eq 0){Write-Verbose -Message "Lyncdiscover record not found"}
else{
$lyncURL = "https://lyncdiscover."+$domain
$webclient = new-object System.Net.WebClient
try{
$webpage = $webclient.DownloadString($lyncURL)
$FullLyncServer = "https://"+($webpage.Split('{')[3].Split('"')[3].Split("/")[2])+"/WebTicket/WebTicketService.svc/Auth"
Write-Verbose -Message ("Lyncdiscover Authentication Endpoint Identified - "+$FullLyncServer)
return $FullLyncServer
}
catch {Write-Verbose -Message "The AutoDiscover URL doesn't appear to work"}
}
if($dialin.length -eq 0){Write-Verbose -Message "Dialin record not found"}
else{Write-Verbose -Message ("Dialin Authentication Endpoint Identified - https://dialin."+$domain+"/abs/"); return "https://dialin."+$domain+"/abs/"}
if($meet.length -eq 0){Write-Verbose -Message "Meet record not found"}
else{Write-Verbose -Message "Meet Authentication Endpoint Identified"; return "https://meet."+$domain+""}
if($access.length -eq 0){Write-Verbose -Message "Access record not found"}
else{Write-Verbose -Message "Access Authentication Endpoint Identified"; return "https://access."+$domain+""}
Write-Host "`nThe domain does not appear to support any external Skype/Lync authentication endpoints" -ForegroundColor Red; break
return $Returnurl
}
Function Invoke-SkypeLogin{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$true,
HelpMessage="Email address to login as.")]
[string]$email,
[Parameter(Mandatory=$false,
HelpMessage="Username to login as.")]
[string]$username,
[Parameter(Mandatory=$true,
HelpMessage="Password to use.")]
[string]$password,
[Parameter(Mandatory=$false,
HelpMessage="Domain name to login with.")]
[string]$domain,
[Parameter(Mandatory=$false,
HelpMessage="The url to authenticate against.")]
[string]$url
)
if ($domain.Length -eq 0){$domain = $email.Split("@")[1]}
if($url.Length -eq 0){
$emailDomain = $email.Split("@")[1]
$url = Get-SkypeLoginURL -domain $emailDomain
}
if($url -like '*lync.com*'){Write-Host 'Microsoft Managed Skype for Business instance - HTTP NTLM Auth currently not supported' -ForegroundColor Red; break}
if($username.Length -eq 0){$username = $email.Split("@")[0]}
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
$req = [system.Net.WebRequest]::Create($url)
$req.Credentials = new-object System.Net.NetworkCredential($username, $password, $domain)
try {
$res = $req.GetResponse()
} catch [System.Net.WebException] {
$res = $_.Exception.Response
}
if ([int]$res.StatusCode -eq '403'){Write-Host 'Authentication Successful: '$domain\$username' - '$password -ForegroundColor Green}
else{Write-Host 'Authentication Failure: '$domain\$username' - '$password -ForegroundColor Red}
}
Function Invoke-SendSkypeMessage{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false,
HelpMessage="Email address to send the message to.")]
[string]$email,
[Parameter(Mandatory=$true,
HelpMessage="Message to send.")]
[string]$message,
[Parameter(Mandatory=$false,
HelpMessage="File of email addresses to send the message to.")]
[string]$inputFile
)
try
{
$client = [Microsoft.Lync.Model.LyncClient]::GetClient()
}
catch
{
Write-Host "`nYou need to have Skype open and signed in first"
break
}
if(($email.Length -eq 0) -and ($inputFile.Length -eq 0))
{
Get-Help Invoke-SendSkypeMessage
break
}
if($inputFile)
{
foreach($line in (Get-Content $inputFile))
{
if ($line.Length -ne $null){Invoke-SendSkypeMessage -email $line -message $message}
}
break
}
$msg = New-Object "System.Collections.Generic.Dictionary[Microsoft.Lync.Model.Conversation.InstantMessageContentType, String]"
$msg.Add(1,$message)
try
{
$contact = $client.ContactManager.GetContactByUri($email)
}
catch
{
Write-Host "`nFailed to lookup Contact"$email
break
}
$convo = $client.ConversationManager.AddConversation()
$convo.AddParticipant($contact) | Out-Null
$imModality = $convo.Modalities[1]
$imModality.BeginSendMessage($msg, $null, $imModality) | Out-Null
$convo.End() | Out-Null
Write-Host "Sent the following message to "$email":`n"$message
}
Function Invoke-SendGroupSkypeMessage{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false,
HelpMessage="Email addresses to send the message to.")]
[string]$emails,
[Parameter(Mandatory=$false,
HelpMessage="Input file to read email addresses from.")]
[string]$inputFile,
[Parameter(Mandatory=$true,
HelpMessage="Message to send.")]
[string]$message
)
if (($emails -eq $null) -and ($inputFile -eq $null)){break}
try
{
$client = [Microsoft.Lync.Model.LyncClient]::GetClient()
}
catch
{
Write-Host "`nYou need to have Skype open and signed in first"
break
}
$msg = New-Object "System.Collections.Generic.Dictionary[Microsoft.Lync.Model.Conversation.InstantMessageContentType, String]"
$msg.Add(1,$message)
$count = 0
if($inputFile)
{
$convo = $client.ConversationManager.AddConversation()
foreach($email in (Get-Content $inputFile))
{
try
{
$contact = $client.ContactManager.GetContactByUri($email.Replace(" ",""))
$convo.AddParticipant($contact) | Out-Null
$count += 1
}
catch
{
Write-Host "`nFailed to lookup Contact"$email
}
}
}
else
{
$convo = $client.ConversationManager.AddConversation()
$emailSplit = $emails.Split(',')
foreach ($email in $emailSplit)
{
try
{
$contact = $client.ContactManager.GetContactByUri($email.Replace(" ",""))
$convo.AddParticipant($contact) | Out-Null
$count += 1
}
catch
{
Write-Host "`nFailed to lookup Contact"$email
}
}
}
$imModality = $convo.Modalities[1]
$imModality.BeginSendMessage($msg, $null, $imModality) | Out-Null
$convo.End() | Out-Null
Write-Host "Sent the following message to"$count "users:`n"$message
}
Function Get-SkypeFederation{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false,
HelpMessage="Domain to verify the status of.")]
[string]$domain
)
$TempTblDomain = New-Object System.Data.DataTable
$TempTblDomain.Columns.Add("Domain") | Out-Null
$TempTblDomain.Columns.Add("MS=MS*") | Out-Null
$TempTblDomain.Columns.Add("_sip._tcp") | Out-Null
$TempTblDomain.Columns.Add("_sip._tls") | Out-Null
$TempTblDomain.Columns.Add("_sipfederationtls._tcp") | Out-Null
$txt = try{(Resolve-DnsName -Type TXT $domain -ErrorAction Stop | select Strings)}catch{}
$sip = try{Resolve-DnsName -Type SRV "_sip._tcp.$domain" -ErrorAction Stop}catch{}
$siptls = try{Resolve-DnsName -Type SRV "_sip._tls.$domain" -ErrorAction Stop}catch{}
$sipFed = try{Resolve-DnsName -Type SRV "_sipfederationtls._tcp.$domain" -ErrorAction Stop}catch{}
$ms = "False"
$sipTrue = "False"
$siptlsTrue = "False"
$sipFedTrue = "False"
if($txt -contains "MS=" -or "ms=")
{
$ms = "True"
}
if($sip)
{
$sipTrue = "True"
}
if($siptls)
{
$siptlsTrue = "True"
}
if($sipFed)
{
$sipFedTrue = "True"
}
$TempTblDomain.Rows.Add([string]$domain,[string]$ms,[string]$sipTrue,[string]$siptlsTrue,[string]$sipFedTrue) | Out-Null
return $TempTblDomain
}
function Get-SkypeContacts{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$false,
HelpMessage="The contact group to list.")]
[string]$group
)
try
{
$client = [Microsoft.Lync.Model.LyncClient]::GetClient()
}
catch
{
Write-Host "`nYou need to have Skype open and signed in first"
break
}
if ($group.length -ne 0){
$groups = $client.ContactManager.Groups
foreach ($g in $groups){
if ($g.Name -eq $group) {
foreach ($contact in $g){
foreach ($email in $contact.GetContactInformation('email')){Get-SkypeStatus $email}
}
}
}
}
else{
$groups = $client.ContactManager.Groups
foreach ($g in $groups){
foreach ($contact in $g){
foreach ($email in $contact.GetContactInformation('email')){Get-SkypeStatus $email}
}
}
}
}
function Get-SkypeDomainUsers{
try
{
$client = [Microsoft.Lync.Model.LyncClient]::GetClient()
}
catch
{
Write-Host "`nYou need to have Skype open and signed in first"
break
}
$letters = "a","b","c","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","y","z"
$TempTblUris = New-Object System.Data.DataTable
$TempTblUris.Columns.Add("URI") | Out-Null
foreach($letter in $letters){
$searcher = $client.ContactManager.BeginSearch($letter, $null, $null)
$end = $client.ContactManager.EndSearch($searcher)
$uris += ($end | ForEach-Object {$_.Contacts | ForEach-Object {$TempTblUris.Rows.Add([string]$_.Uri)}})
}
$finalTable = $TempTblUris | sort-object -Property uri -Unique
foreach ($uri in $finalTable){Get-SkypeStatus -email ([string]$uri.URI.split(":")[1])}
}
|
combined_dataset/train/non-malicious/678.ps1
|
678.ps1
|
Function Get-ExistingDataExtension
{
$proxy = New-RsWebServiceProxy
return $proxy.ListExtensions("Data")[0].Name
}
Describe "Set-RsDataSource" {
$dataSourceName = $null
$extension = $null
$credentialRetrieval = $null
$dataSourcePath = $null
BeforeEach {
$dataSourceName = 'SutSetDataSource_MinParameter' + [guid]::NewGuid()
$extension = Get-ExistingDataExtension
$credentialRetrieval = 'None'
$dataSourcePath = '/' + $dataSourceName
New-RsDataSource -RsFolder '/' -Name $dataSourceName -Extension $extension -CredentialRetrieval $credentialRetrieval
$dataSourcePath = '/' + $dataSourceName
}
AfterEach {
Remove-RsCatalogItem -RsFolder $dataSourcePath -Confirm:$false
}
It "Should set a RsDataSource with min parameters" {
$rsDataSource = Get-RsDataSource -Path $dataSourcePath
$proxy = New-RsWebServiceProxy
$namespace = $proxy.GetType().Namespace
$datasourceDataType = "$namespace.DataSourceDefinition"
$datasource = New-Object $datasourceDataType
$datasource.Extension = Get-ExistingDataExtension
$datasource.CredentialRetrieval = 'Prompt'
$datasource.ConnectString = 'Data Source=localhost;Initial Catalog=ReportServer'
Set-RsDataSource -Path $dataSourcePath -DataSourceDefinition $datasource
$setRsDataSource = Get-RsDataSource -Path $dataSourcePath
$rsDataSource.CredentialRetrieval | Should Not Be $setRsDataSource.CredentialRetrieval
}
It "Should set a RsDataSource with proxy Parameter" {
$rsDataSource = Get-RsDataSource -Path $dataSourcePath
$proxy = New-RsWebServiceProxy
$namespace = $proxy.GetType().Namespace
$datasourceDataType = "$namespace.DataSourceDefinition"
$datasource = New-Object $datasourceDataType
$datasource.Extension = Get-ExistingDataExtension
$datasource.CredentialRetrieval = 'Prompt'
$datasource.ConnectString = 'Data Source=localhost;Initial Catalog=ReportServer'
Set-RsDataSource -Path $dataSourcePath -DataSourceDefinition $datasource -Proxy $proxy
$setRsDataSource = Get-RsDataSource -Path $dataSourcePath
$rsDataSource.CredentialRetrieval | Should Not Be $setRsDataSource.CredentialRetrieval
}
It "Should set a RsDataSource with ReportServerUri parameter" {
$rsDataSource = Get-RsDataSource -Path $dataSourcePath
$reportServerUri = 'http://localhost/reportserver'
$proxy = New-RsWebServiceProxy
$namespace = $proxy.GetType().Namespace
$datasourceDataType = "$namespace.DataSourceDefinition"
$datasource = New-Object $datasourceDataType
$datasource.Extension = Get-ExistingDataExtension
$datasource.CredentialRetrieval = 'Prompt'
$datasource.ConnectString = 'Data Source=localhost;Initial Catalog=ReportServer'
Set-RsDataSource -Path $dataSourcePath -DataSourceDefinition $datasource -ReportServerUri $reportServerUri
$setRsDataSource = Get-RsDataSource -Path $dataSourcePath
$rsDataSource.CredentialRetrieval | Should Not Be $setRsDataSource.CredentialRetrieval
}
It "Should set a RsDataSource with Proxy and ReportServerUri parameter" {
$rsDataSource = Get-RsDataSource -Path $dataSourcePath
$reportServerUri = 'http://localhost/reportserver'
$proxy = New-RsWebServiceProxy
$namespace = $proxy.GetType().Namespace
$datasourceDataType = "$namespace.DataSourceDefinition"
$datasource = New-Object $datasourceDataType
$datasource.Extension = Get-ExistingDataExtension
$datasource.CredentialRetrieval = 'Prompt'
$datasource.ConnectString = 'Data Source=localhost;Initial Catalog=ReportServer'
Set-RsDataSource -Path $dataSourcePath -DataSourceDefinition $datasource -Proxy $proxy -ReportServerUri $reportServerUri
$setRsDataSource = Get-RsDataSource -Path $dataSourcePath
$rsDataSource.CredentialRetrieval | Should Not Be $setRsDataSource.CredentialRetrieval
}
It "Should set description of data source" {
$originalDataSource = Get-RsDataSource -Path $dataSourcePath
$description = 'This is a description'
Set-RsDataSource -Path $dataSourcePath -DataSourceDefinition $originalDataSource -Description $description
$proxy = New-RsWebServiceProxy
$descriptionProperty = $proxy.GetProperties($dataSourcePath, $null) | Where { $_.Name -eq 'Description' }
$descriptionProperty | Should Not BeNullOrEmpty
$descriptionProperty.Value | Should be $description
}
}
|
combined_dataset/train/non-malicious/4139.ps1
|
4139.ps1
|
[CmdletBinding()]
param ()
Remove-Item -Path ($env:windir + '\temp\ActivityLog.xml') -ErrorAction SilentlyContinue -Force
Remove-Item -Path ($env:windir + '\temp\inventory.xml') -ErrorAction SilentlyContinue -Force
$ErrCode = (Start-Process -FilePath ((Get-ChildItem -Path $env:ProgramFiles, ${env:ProgramFiles(x86)} -Filter 'dcu-cli.exe' -Recurse).FullName) -ArgumentList ('/log ' + $env:windir + '\temp') -Wait).ExitCode
$File = (Get-Content -Path ($env:windir + '\temp\ActivityLog.xml')).Trim()
If (('<message>CLI: No application component updates found.</message>' -in $File) -and (('<message>CLI: No available updates can be installed.</message>' -in $File) -or ('<message>CLI: No updates are available.</message>' -in $File))) {
Remove-Item -Path ($env:windir + '\temp\ActivityLog.xml') -ErrorAction SilentlyContinue -Force
Remove-Item -Path ($env:windir + '\temp\inventory.xml') -ErrorAction SilentlyContinue -Force
Remove-Item -Path ($env:TEMP + '\RebootCount.log') -ErrorAction SilentlyContinue -Force
} else {
If ((Test-Path ($env:TEMP + '\RebootCount.log')) -eq $false) {
New-Item -Path ($env:TEMP + '\RebootCount.log') -ItemType File -Value 0 -Force
}
If (([int](Get-Content -Path ($env:TEMP + '\RebootCount.log'))) -lt 5) {
$TSEnv = New-Object -ComObject Microsoft.SMS.TSEnvironment
$TSEnv.Value('SMSTSRebootRequested') = $true
$TSEnv.Value('SMSTSRetryRequested') = $true
New-Item -Path ($env:TEMP + '\RebootCount.log') -ItemType File -Value ([int](Get-Content -Path ($env:TEMP + '\RebootCount.log')) + 1) -Force
} else {
Remove-Item -Path ($env:windir + '\temp\ActivityLog.xml') -ErrorAction SilentlyContinue -Force
Remove-Item -Path ($env:windir + '\temp\inventory.xml') -ErrorAction SilentlyContinue -Force
Remove-Item -Path ($env:TEMP + '\RebootCount.log') -ErrorAction SilentlyContinue -Force
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.