full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_52_84.ps1
sample_52_84.ps1
Add-AppxPackage exit cd C:\Users\sampler-win_10_x64\Desktop\ Get-AppxPackage >apps.tx cd C:\Users\sampler-win_10_x64\Desktop\ Get-AppxPackage -allusers | Select Name, PackageFullName > apps_v2.txt Get-AppxPackage | Select Name, PackageFullName > apps_v2.txt Get-AppxPackage Get-AppxPackage -Online Get-AppxPackage -h Get-AppxPackage help Get-help -Name Get-AppxPackage Get-help -Name Add-AppxPackage Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize > C:\Users\sampler-win_10_x64\Desktop\InstalledPrograms-PS.txt Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize cd .. ls /l ls cd .\sampler-win_10_x64\ ls cd .\Downloads\ ls sha1sum .\shockwave-12.3.5.205-installer.exe sha1sum shockwave-12.3.5.205-installer.exe shasum shockwave-12.3.5.205-installer.exe Get-FileHash shockwave-12.3.5.205-installer.exe sha1 Get-FileHash shockwave-12.3.5.205-installer.exe SHA1 Get-FileHash shockwave-12.3.5.205-installer.exe Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA! Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA1 Get-FileHash Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads - Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Alhorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Algorithm SHA1 clear Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SlackSetup.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ZoomInstallerFull.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\PBIDesktopSetup_x64.exe -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\atlassian-jira-software-9.13.0-x64.exe -Algorithm SHA1 cd ‪C:\Program Files\WindowsApps cd C:\Program Files\WindowsApps ls cd .. ll ls cd .. ls cd '.\Program Files\' ls dir -Force Get-ACL -Path .\WindowsApps\ ls pwd $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (5).exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeStandaloneSetup.exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (6).exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() $filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (6).exe" $hash = Get-FileHash -Path $filePath -Algorithm SHA1 Write-Output $hash.Hash.ToLower() Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ASE_Suite.winx64 (1).zip" -Algorithm SHA1 Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ASE_Suite.linuxamd64.tgz -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\CR202003P_300-70005715 (1).EXE" -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeStandaloneSetup64 (2).exe" -Algorithm SHA1 Get-FileHash -Parth "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (14).exe" -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (14).exe" -Algorithm SHA1 Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (19).exe" -Algorithm SHA1
combined_dataset/train/non-malicious/sample_37_35.ps1
sample_37_35.ps1
# # Module manifest for module 'OCI.PSModules.Integration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Integration.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Integration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation', 'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList', 'Get-OCIIntegrationWorkRequest', 'Get-OCIIntegrationWorkRequestErrorsList', 'Get-OCIIntegrationWorkRequestLogsList', 'Get-OCIIntegrationWorkRequestsList', 'Move-OCIIntegrationInstanceCompartment', 'Move-OCIIntegrationInstanceNetworkEndpoint', 'Move-OCIIntegrationPrivateEndpointOutboundConnection', 'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance', 'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance', 'Update-OCIIntegrationInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_18.ps1
sample_44_18.ps1
# # Module manifest for module 'OCI.PSModules.Email' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Email.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f1bd31ba-98e7-4163-b9d9-5016214290ab' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Email Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Email.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEmailDkim', 'Get-OCIEmailDkimsList', 'Get-OCIEmailDomain', 'Get-OCIEmailDomainsList', 'Get-OCIEmailSender', 'Get-OCIEmailSendersList', 'Get-OCIEmailSuppression', 'Get-OCIEmailSuppressionsList', 'Get-OCIEmailWorkRequest', 'Get-OCIEmailWorkRequestErrorsList', 'Get-OCIEmailWorkRequestLogsList', 'Get-OCIEmailWorkRequestsList', 'Move-OCIEmailDomainCompartment', 'Move-OCIEmailSenderCompartment', 'New-OCIEmailDkim', 'New-OCIEmailDomain', 'New-OCIEmailSender', 'New-OCIEmailSuppression', 'Remove-OCIEmailDkim', 'Remove-OCIEmailDomain', 'Remove-OCIEmailSender', 'Remove-OCIEmailSuppression', 'Update-OCIEmailDkim', 'Update-OCIEmailDomain', 'Update-OCIEmailSender' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Email' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2767.ps1
2767.ps1
$data = & $env:windir\system32\sc query | ForEach-Object { $svc = $_ if ($svc -match "SERVICE_NAME:\s(.*)") { & $env:windir\system32\sc qfailure $($matches[1]) } } $ServiceName = $RstPeriod = $RebootMsg = $CmdLine = $FailAction1 = $FailAction2 = $FailAction3 = $False $data | ForEach-Object { $line = $_ $line = $line.Trim() if ($line -match "^S.*\:\s(?<SvcName>[-_A-Za-z0-9]+)") { if ($ServiceName) { $o = "" | Select-Object ServiceName, RstPeriod, RebootMsg, CmdLine, FailAction1, FailAction2, FailAction3 $o.ServiceName, $o.RstPeriod, $o.RebootMsg, $o.CmdLine, $o.FailAction1, $o.FailAction2, $o.FailAction3 = ` (($ServiceName,$RstPeriod,$RebootMsg,$CmdLine,$FailAction1,$FailAction2,$FailAction3) -replace "False", $null) $o } $ServiceName = $matches['SvcName'] } elseif ($line -match "^RESE.*\:\s(?<RstP>[0-9]+|INFINITE)") { $RstPeriod = $matches['RstP'] } elseif ($line -match "^REB.*\:\s(?<RbtMsg>.*)") { $RebootMsg = $matches['RbtMsg'] } elseif ($line -match "^C.*\:\s(?<Cli>.*)") { $CmdLine = $matches['Cli'] } elseif ($line -match "^F.*\:\s(?<Fail1>.*)") { $FailAction1 = $matches['Fail1'] $FailAction2 = $FailAction3 = $False } elseif ($line -match "^(?<FailNext>REST.*)") { if ($FailAction2) { $FailAction3 = $matches['FailNext'] } else { $FailAction2 = $matches['FailNext'] } } } $o = "" | Select-Object ServiceName, RstPeriod, RebootMsg, CmdLine, FailAction1, FailAction2, FailAction3 $o.ServiceName, $o.RstPeriod, $o.RebootMsg, $o.CmdLine, $o.FailAction1, $o.FailAction2, $o.FailAction3 = ` (($ServiceName,$RstPeriod,$RebootMsg,$CmdLine,$FailAction1,$FailAction2,$FailAction3) -replace "False", $null) $o
combined_dataset/train/non-malicious/3448.ps1
3448.ps1
function Get-ResourceGroupName { return getAssetName } function Get-DataFactoryName { return getAssetName } function Get-ProviderLocation($provider) { "Brazil South" } function Clean-DataFactory($rgname, $dfname) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { Remove-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Force } } function Clean-Tags { Get-AzTag | Remove-AzTag -Force }
combined_dataset/train/non-malicious/sample_2_67.ps1
sample_2_67.ps1
#************************************************ # TS_HPPrinterDriverVersionCheck.ps1 # Version 1.0.1 # Date: 07/23/2013 # Author: v-alyao # Description: [KSE Rule] [ Windows V3] HKCU\Software\Hewlett-Packard registry hive increases in size on Citrix servers # Rule number: ca320e17-1fa3-4740-9f81-c97f299741b0 # Rule URL: https://kse.microsoft.com/Contribute/Idea/953fdd18-e9ca-4e44-81d4-fe5e613ed747 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber ca320e17-1fa3-4740-9f81-c97f299741b0 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_HPPrinterDriverVersionCheck" $InformationCollected = new-object PSObject $Script:HPPrinterDriverRegKey = "" # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Add your logic here to specify on which environments this rule will apply if((($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2)) -or #Windows Server 2003 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or #Vista, 2008 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win7, 2008 R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2))) #Win8, 2012 { $RDSEnabled = isRDSEnabled if($RDSEnabled) { $Script:HPPrinterDriverRegKey = GetHPPrinterDriverRegKey if($Script:HPPrinterDriverRegKey -ne "") { "[AppliesToSystem] HP Universal Printing Driver information was found from " + $HPPrinterDriver | WriteTo-StdOut -shortformat return $true } } } return $false } Function isRDSEnabled { trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("[isRDSEnabled] Checking if RDS is Enabled") continue } "Checking if RDS is Enabled" | WriteTo-StdOut $RDSEnabled = $false if ((Get-CimInstance -Class Win32_OperatingSystem -Property ProductType).ProductType -ne 1) #Server { $TSSetting = (Get-CimInstance -Class Win32_TerminalServiceSetting -Namespace "root\CIMV2\TerminalServices").TerminalServerMode if (($null -ne $TSSetting) -and ($TSSetting -eq 1)) { $RDSEnabled = $true } } "RDS is Enabled: $RDSEnabled" | WriteTo-StdOut return $RDSEnabled } Function GetEnvironment([switch]$RegKey) { if($RegKey.IsPresent) { if($OSArchitecture -eq "AMD64") { $environment = "Windows x64" } elseif($OSArchitecture -eq "IA64") { $environment = "Windows IA64" } else { $environment = "Windows NT x86" } } else { if($OSArchitecture -eq "AMD64") { $environment = "x64" } elseif($OSArchitecture -eq "IA64") { $environment = "IA64" } else { $environment = "W32X86" } } return $environment } Function GetHPPrinterDriverRegKey() { $HPPrinterDriverRegKey = "" $PrintRegKey = "HKLM:\SYSTEM\CurrentControlSet\Control\Print\Environments" $environment = GetEnvironment -RegKey $DriverRegKey = Join-Path (Join-Path $PrintRegKey $environment) "Drivers" # Version-2 - Windows NT 4.0 - ignore this # Version-3 - Windows 2000 or newer $DriverWithVersionRegKey = Join-Path $DriverRegKey "Version-3" if(Test-Path $DriverWithVersionRegKey) { $DriverWithVersion = Get-Item $DriverWithVersionRegKey $SubKeys = $DriverWithVersion.GetSubKeyNames() foreach($subKey in $SubKeys) { if($subKey.StartsWith("HP Universal Printing")) { $HPPrinterDriverRegKey = Join-Path $DriverWithVersionRegKey $subKey } } } return $HPPrinterDriverRegKey } Function CheckHPVersionAndRegKeyNumber() { $IsRuleFired = $false $HPPrinterDriverInfo = Get-ItemProperty $Script:HPPrinterDriverRegKey if(($null -ne $HPPrinterDriverInfo) -and ($null -ne $HPPrinterDriverInfo.'Configuration File')) { $environment = GetEnvironment # 2 - Windows NT 4.0 - ignore this # 3 - Windows 2000 or newer $configFilePath = Join-Path (Join-Path (Join-Path "$Env:windir\system32\spool\drivers" $environment) "3") ($HPPrinterDriverInfo.'Configuration File') if(Test-Path $configFilePath) { $fileInfo = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($configFilePath) $versions = $fileInfo.FileVersion.Split(".") if(([int]$versions[0] -lt 61) -or (([int]$versions[0] -eq 61) -and ([int]$versions[1] -le 71))) { $InformationCollected | add-member -membertype noteproperty -name "HP Universal Printing Driver Version" -value ($fileInfo.FileVersion) $IsRuleFired = $true } } } #If the number of registry keys is more than $RedNumberOfRegKey, fire the rule $RedNumberOfRegKey = 50 $HPHKCURegKey = "HKCU:\Software\Hewlett-Packard" if(Test-Path $HPHKCURegKey) { $HPHKCU = Get-ChildItem $HPHKCURegKey -Recurse if(($null -ne $HPHKCU) -and ($HPHKCU.Count -gt $RedNumberOfRegKey)) { $InformationCollected | add-member -membertype noteproperty -name "Number Of HP Registry Keys" -value ($HPHKCU.Count) $IsRuleFired = $true } } return $IsRuleFired } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true $RootCauseDetected = CheckHPVersionAndRegKeyNumber #Add information to InformationCollected #$InformationCollected | add-member -membertype noteproperty -name "Information Collected Name" -value $Value } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBZmenKdq00Ivon # oyqzPdCzAe0iR0wBcAmfcBn1BMORGaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDiZ # OhEzAQR6x66u1romJMJkVB2sfM7OLi5H0NaoM1ULMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAOPskLrwR/Ron99IQX7bvXz+WbjWrS8ctbOdZ # ANYPPw1YId5Im4W1ME7H+OjQ01i/NYldJf6M2mk6DAXspSWfcfMnVMp4stLtpbxe # ERq4k4e9VsKn1jzPh5Nf6RgkK40oT84S+dmmLujTpeCyAHqW9jR5HfXDsiuTx0BA # JZn0vuO+gz9DHFCzfkHISU7PfTiXXmEn5F0vdFOIhklW2X2XYdqWEPIyfr4feYNP # Ak3+9CF/2HkIeiuF2ABoIZWyr0luBYxwmo7FmNb/zTS7QMK/1dEjwFM6rJNHePJo # MDOsOELZcPOOlMDjyEmNLAJ9W3z/E3GnP4aApTmW4cBhxuaH/aGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAZ7wyy7hZnfZs5hMxLp6H0WcjH9pIcorv5 # XFArucmpHgIGZxqItyNBGBMyMDI0MTAyODExNDA0My4xNDRaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAi # GA8yMDI0MTAyODA1NDg0MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyaQ5AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEg # Ea636VH1IhLDsW3Fa0ADcc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeq # PPb9X5bmbVFXObHp67WigFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/n # qvDz8msZXcAtE96/FvXd43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6 # hMlUIcog3CD8TCcit1MWEuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/ # jpNVEuQ5uey+mvVyZ/KaPkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCEtauQi+iwepk1lWZys73+a2zf # 5t8gcdE3+Ssktoq7EjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlH # i0Od4rfyi3FO/mCmLpu/ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIApPZo # RG0sbKw9+x2z2puB5/sPLPti+MxLWhhNWiLa0etat5CwOuf5B4lNh0h108im51Jd # ib1w//iRygZG+xlrijIeW1Kz1T1ZjGtKiff2e+ni1TttAKa9r/NUPdoFIbmOo6qL # jgPw1j8zZKHyPls3MVP7SQzIcU3foiBXlEqq5tXiwnznTcXipMOMGtKW8MYj8IEm # 77g5P47Ykt2fusVVLAZQCehssSc7+J3IA8irTTckm/AJxWdjI+Zeatv92tysazG0 # 9/gC6OEiyMERltc2SYwof81LI6ilDGl579K9q2sy2+lufVFu+szsfuHcZm9wxwhC # gVHKqflE5skdU4CZtKqnw3IHPUQHz5hNgRpEdlhPpeKVhVQA/Ojco1NmfDtkrKhC # 4Mu5KzJ9b1FKNEIeFa3bPoafahO9ePtFMRM0a+bkF8Ntssc9sC7g5B0qja2ltTav # XR8idHMD2K4TjH2xyvIts7KHhA/ser/HdImu0TLsn4vN/Bp+4PNklqKkLJz67Wzy # aVBT/emSeCs/5Ux5XSaKnykTkBgOh2gQzhyITWJG0wI89a/WYBSM4w/VDhPS0FUv # MPFO8Y1Z56iN72v7zcpBFiox6UrddykK/fCoplS/pqDYw4bm53S9cF613VKf6BYi # KWbFb2xB/xi2ReNMNQt+FD4D+c2bjKpn+N/Zjk4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_39_86.ps1
sample_39_86.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIIllgYJKoZIhvcNAQcCoIIlhzCCJYMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mTCCGZUCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji # Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2 # 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s # NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9 # kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61 # /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC # FygwghckBgorBgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x # 6jeF/KW0L7vYOjGQhAzBRAIGZbqlHGxwGBIyMDI0MDIxNzIxMTMwMC4yN1owBIAC # AfSggdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # LTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm # MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZELUVFQkExJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgIT # MwAAAdzB4IzCX1hejgABAAAB3DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEwMTIxOTA3MDZaFw0yNTAxMTAxOTA3MDZa # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAi8izIDWyOD2RIonN6WtRYXlKGphYvzdqafdITknIhU9QLsXqpNwumGEd # n2J1/bV/RFoatTwQfJ0Xw3E8xHYpU2IC0IY8lryRXUIa+fdt4YHabaW2aolqcbvW # YDLCuQoBNieLAos9AsnTQSRfDlNLB+Yldt2BAsWUfJ8DkqD6lSwlfOq6aQi8SvQN # c++m0AaqR0UsrCjgFOUSCe/N5N9e6TNfy9C1MAt9Um5NSBFTvOg/9EVa3dZqBqFn # pSWgjQULxeUFANUNfkl4wSzHuOAkN0ScrjhjyAe4RZEOr5Ib1ejQYg6OK5NYPm6/ # e+USYgDJH/utIW9wufACox2pzL+KpA8yUM5x3QBueI/yJrUFARSd9lPdTHIr2ssH # 9JGIo/IcOWDyhbBfKK/f5sYHp2Z0zrW6vqdS18N/nWU9wqErhWjzek4TX+eJaVWc # QdBX00nn8NtRKpbZGpNRrY7Yq6+zJEYwSCMYkDXb9KqtGqW8TZ+I3lmZlW2pI9Zo # hqzHtrQYH591PD6B5GfoyjZLr79tkTBL/QgnmBwoaKc1t/JDXGu9Zc+1fMo5+OSH # vmJG5ei6sZU9GqSbPlRjP5HnJswlaP6Z9warPaFdXyJmcJkMGuudmK+cSsIyHkWV # +Dzj3qlPSmGNRMfYYKEci8ThINKTaHBY/+4cH2ASzyn/097+a30CAwEAAaOCAUkw # ggFFMB0GA1UdDgQWBBToc9IF3Q58Rfe41ax2RKtpQZ7d2zAfBgNVHSMEGDAWgBSf # pxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w # JTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAC # hlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29m # dCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAA # MBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG # 9w0BAQsFAAOCAgEA2etvwTCvx5f8fWwq3eufBMPHgCqAduQw1Cj6RQbAIg1dLfLU # ZRx2qwr9HWDpN/u03HWrQ2kqTUlO6lQl8d0TEq2S6EcD7zaVPvIhKn9jvh2onTdE # JPhD7yihBdMzPGJ7B8StUu3xZ595udxJPSLrKkq/zukJiTEzbhtupsz9X4zlUGmk # JSztH5wROLP/MQDUBtkv++Je0eavIDQIZ34+31z5p2xh+bup7lQydLR/9gmYQQyQ # SoZcLPIsr52H5SwWLR3iWR1wT5mrkk2Mgd6xfXDO0ZUC29fQNgNl03ZZnWST6E4x # uVRX8vyfVhbOE//ldCdiXTcB9cSuf7URq3KWJ/N3cKEnXG4YbvphtaCJFecO8KLA # Oq9Ql69VFjWrLjLi+VUppKG1t1+A/IZ54n9hxIE405zQM1NZuMxsvnSp4gQLSUdK # kvatFg1W7eGwfMbyfm7kJBqM/DH0/Omxkh4VM0fJUXqS6MjhWj0287/MXw63jggy # PgztRf1lrhDAZ/kHvXHns6NpfneDFPi/Oge8QFcX2oKYdGBcEttGiYl8OfrRqXO/ # t2kJVAi5DTrafIhkqexfHO4oVvRONdbDo4WkbVuyNek6jkMweTKyuJvEeivhjPl1 # mNXIcA3IqjRtKsCVV6KFxobkXvhJlPwW3IcBboiAtznD/cP5HWhsOEpnbVYwggdx # MIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGI # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN # aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5 # MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciEL # eaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa # 4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxR # MTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEByd # Uv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi9 # 47SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi # ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+ # /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY # 7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtco # dgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH # 29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94 # q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcV # AQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0G # A1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQB # gjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v # cGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgw # GQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB # /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f # BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJv # ZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4w # TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIB # AJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRs # fNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6 # Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveV # tihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKB # GUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoy # GtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE # cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU # a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+ # k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0 # +CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cir # Ooo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEA # oYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w # KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk # BgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxN # aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAcOf9z # P7fJGQhQIl9Jsvd2OdASpqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA6XuLrzAiGA8yMDI0MDIxODAzNDY1NVoY # DzIwMjQwMjE5MDM0NjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpe4uvAgEA # MAcCAQACAhb1MAcCAQACAjIlMAoCBQDpfN0vAgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQEFBQADgYEAFA7hbwsahrjJYQPcGehP3fEi6B5Izd27at9pzpY1AZV7tFHHfW1/ # fBcL6cNuG0hcEnvku6RS5pJGi5oR72Q6j9E2OIRZz9u9anhoIyblag+wF+DsYGV3 # tPFCCnz1tRjCB95cBY6W2t2l3qMlEfRMFktFACRkPguQ8IEOtFh+5HoxggQNMIIE # CQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw # JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzC # X1hejgABAAAB3DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqG # SIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDI+ID3uiUnMPYqIkxblWOOl65sK1tf # QY/VkqaP1tluVDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFOnF4pq2UQ/ # jLypnOO5YvQ67QirEQsOFfZMvKXEgg03MIGYMIGApH4wfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwIgQghS5/MPpsDNeC # UVruOSOpGIQgGctDddv45jBMIDL/XFYwDQYJKoZIhvcNAQELBQAEggIATyBF9Bbt # tcmtA0NfURMIFk8IUg7Oc3WsHJlp2ZtjBfM+IRWchmC8Gzf6zYVlSK/i43hqekIe # 1IEq1HxhN0qFMdsgGIucb2jms5A7lKitqxW6JteV7K8Rjyj9PeRzFqfHr779hb1W # EBZrBfrxU3f0DSk7/VpqJx893xl6jYx+cXx6fRCPLSUGlD/d16lhevM2+YgEWAj6 # WXcwjX+CXFN5MARc8wEFA36+d3CtizdsaeDcbiqEj08xaxl542cibi1d+UfQKYM8 # Gf3sqVigbj90G7XHFpG/cd4h/2/EHZbuERqYot0qK7UM3R39mE5XYwV3vCLA7gff # nPdmfVD4q0Qp60ySId1jHxHXR+/7GZTneWcRNZgqOw58leShy6xDc1zym0FQWLY2 # UuJu/Vr0Esfq46Ei8PPCjtClQdjhPUGn7liR5kjFHfDRRINdPZ21d3+66rqvjqIw # D/TtZ9uwdz5jPwbwq346Pkxet/Fqi+zZ+bJVk8iVlMSEY6n5lETu5+i/NHqyWAoH # lkFsK9J1VsziaXfxNHzwgMobJsS9Q5gHBC9pU29WcopsGeWelWtxntE1/zB61szx # rAHWU2I+loORPN4I1lgIMDABA3jF3fuHIfjw/E7Kts2QW362ADsqaGDff1A6xzI6 # lz4BickEWsP/CzTwvIJsDdOkHhaaETdxg50= # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_0.ps1
sample_23_0.ps1
# # Module manifest for module 'OCI.PSModules.Analytics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Analytics.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '88b806b7-e2b4-4102-95eb-65f27d654438' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Analytics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Analytics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAnalyticsInstance', 'Get-OCIAnalyticsInstancesList', 'Get-OCIAnalyticsPrivateAccessChannel', 'Get-OCIAnalyticsWorkRequest', 'Get-OCIAnalyticsWorkRequestErrorsList', 'Get-OCIAnalyticsWorkRequestLogsList', 'Get-OCIAnalyticsWorkRequestsList', 'Invoke-OCIAnalyticsScaleAnalyticsInstance', 'Invoke-OCIAnalyticsSetKmsKey', 'Move-OCIAnalyticsInstanceCompartment', 'Move-OCIAnalyticsInstanceNetworkEndpoint', 'New-OCIAnalyticsInstance', 'New-OCIAnalyticsPrivateAccessChannel', 'New-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsInstance', 'Remove-OCIAnalyticsPrivateAccessChannel', 'Remove-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsWorkRequest', 'Start-OCIAnalyticsInstance', 'Stop-OCIAnalyticsInstance', 'Update-OCIAnalyticsInstance', 'Update-OCIAnalyticsPrivateAccessChannel', 'Update-OCIAnalyticsVanityUrl' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Analytics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_1_81.ps1
sample_1_81.ps1
#************************************************ # DC_CollectSqlErrorlogs.ps1 # Version 1.0.0 # Date: 8-19-2011 # Author: Shon Hauck - Shonh@Microsoft.com # Description: Collects OS Performance Related Information # Processor Information # Operating System Performance Information # # NOTE: # #************************************************ # Copyright ?2008, Microsoft Corporation. All rights reserved. # You may use this code and information and create derivative works of it, # provided that the following conditions are met: # 1. This code and information and any derivative works may only be used for # troubleshooting a) Windows and b) products for Windows, in either case using # the Windows Troubleshooting Platform # 2. Any copies of this code and information # and any derivative works must retain the above copyright notice, this list of # conditions and the following disclaimer. # 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND, # WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES # OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND # INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION # WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER. if($debug -eq $true){[void]$shell.popup("DC_SQL_Misc_OS_Perf_Data.ps1")} Import-LocalizedData -BindingVariable SQLMiscOSPerfData #Import-LocalizedData -BindingVariable SQLMiscOSPerfData -FileName SQL_OS_Perf_Info -UICulture en-us ## CPU_PV.VBS Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Description $sectionDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info $OutputFile = $ComputerName + "_Processor_Details.txt" $CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe CPU_PL.vbs //NOLOGO > $OutputFile" $fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Description RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription ##SYSINFO.vbs Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description $OutputFile = $ComputerName + "_OS_Perf_Details.txt" $CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe SYSINFO.vbs //NOLOGO > $OutputFile" $fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription ##PerfOS_Stats.vbs Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description $OutputFile = $ComputerName + "_OS_Perf_Statistics.txt" $CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe PerfOS_Stats.vbs //NOLOGO > $OutputFile" $fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Statistic_Description RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMMEu9A8ptIJZE # HuGiUjtiK9ToFjTJ43P2mqmzWTXDQqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG+oRd3LuEb8wNAJ8F+9PTJ8 # K4H8wVUmC6z5PhNb19mXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAnmDC1pFm/kFRlhGgHKKZVKBnqx9eemD+/O8aEjDcP52Is5Uabvkk86GW # Eu2TAXuFm8QDqXD2BIPNdpbQQEU/uOEY7ejl4xMOmuOPh033Nx+DlMZzupq84hok # eYwfXpKyGLXGk+2wCyZFTk8ZD6S+Q+VFNcm3ZxxSLRepiEp00Pu40krVJ46Ds39g # U1exChtk6GeJIIIrIDQfaaw5FDO9KoGNlz3UmbegLbWj7//pLWS1dMgACO2icLoL # QJHCthCawr4IYM+2eqj1jCxrmXiDpqbg1fDCALcpm2PfWlvSWfN9e1q4FyN22X4P # 6OMS4cLbHrGLoBtkySM9tramKPPZ9aGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBpvuYSFj2VDdt0MPBVsKAfe0hOFY7fNYlyGIMjsvtm6AIGZxp+Oc3T # GBIyMDI0MTAyODExNDA0Mi45OFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EeowggcgMIIFCKADAgECAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU1 # NVoXDTI1MDMwNTE4NDU1NVowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBALG6UJm20h/xf3utb38n5DhWD0+K6AHXJrX8NHHEtbaH # DLhCC1TePl9XvlkprpdNNCFbkKWQaXqCnWd3lUGzHglv6hTg+wwDZ+h7yA/1tA09 # XEgcwm7pNhyuuff0d1163bGR2pSHPPJJdo8WoUyTZWJ8R+P4dHomF42zYsvObwUM # mb6kF108MtqD9H4A8hYfJ+2r2K3AzRY/lnR19DIjhaVV5RL6+i2w9tab5EqwfgVA # 2HNvS38PiK61x8Irf8sr7EuZLp2YCHsAwq4RSXyLaR1YENFxz4lZrbVIJ5/HlI+E # kQWBiF0Y8CincbWXxPfdyqtsu1wUmrDDhNCJiIKR3KwJycgXRmpI0Adx8j1IC/eB # +TLGpA0knexOyDkY9EX3maqBt9BuQWdTXuJhtEg8mrCBIuHIHzfdkOCbPFsqYmZ0 # NptvNLTIaGeAdrr6DBVo5Spwd/3DqTDEyj46obdBkhzB3nAcQKzmsAlno8jIUzsB # 3aFFQUdFOLfncjtXjESBga5lvqoXHo9/jiLsCNdum1SiUNxXNgR2AtBJaK4VqNLp # eDeTsLLxOIzkc9Qr0tkieWhPG5QtLEmYnudONSM6PnHBGYLvHZL+bGqXye8dII3U # 4QPb/AQI6i3owR71svefOgrA7xM2URK2rmxx3bkYDSAxA76o1dX/FMM4FMnzMFwZ # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUvLbF7n2wITRKPJyoTkStvhitLWAwHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAOFISNIEVIJsnKXdT9CYUxbZ4s8GSeeWx8gP # /uBMy8A0SeGrTwj0cdtuqLCoMQdK8BG8q0vuPTOcgJgFsytVKa+APFTyMAaozKIu # gzzTvzxKjf5PohlX/9RlEmoGXigzdsIhCAUajRVN5DpHNgv63XMJReaak+YzjFxJ # xUUBNePlPHsHLhKFZQLtWGbumJwOJTmKAaO6K9GHE+9ul+VuH9uyITm3Hly44kQl # Ib65ZyoHJHtMLhwa+5q8dKOTWJFdP9CNo4R4mg6d96xs528msl1ub6V5gtEjrs3d # x3wH+y5TbW1F2DA6dOTaE65kqz+QvBpfo2wBtTL2kqwOZPKhacabJNYE+JNvaunm # iCjxjyExTVhCzusdHmGqKUSrzyMX70fwpxxv/WKyYlMacGdEy/rxR3aXksWE5nid # G2XiUeuL43UvwQGDtoTwS897wJr2DPyyHYXgI5Nh3U8dx7W6Au+9ZbX5o5Kl3w2f # ASJ3jOAPv1lDGKwmrI7iUxYzMCAR4WFSbjQWyG3Ne50CxfkugKKXistsd/Bi0Y6n # D0NVfeNcBX3S0b2JFtyqO23e+Fb1P4vd8BmUx6tpZ+Ht5SY+W0xTyURA4x6Wj/V6 # GQgY7thk4fFSp4qmYX1BpbwtdNPT3QAdniTqD612lkV8Iyi3Ib4Theo3pla0oQFC # ITfEvbsEMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w # ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAPuf # sGTiCwza1tT+L4zcG1GcuPT3oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyZm6MCIYDzIwMjQxMDI4MDUwMzU0 # WhgPMjAyNDEwMjkwNTAzNTRaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOrJmboC # AQAwBwIBAAICBrEwBwIBAAICE8YwCgIFAOrK6zoCAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEADQFoqwC10NBMfWZDUBhSj8rGVLhG0W664/iA/K8jrYkYrvoo # OjVLocz5y1oDDy611QnEPF0EhPthW1/cSwHpqEX13JUgjRMkWNI/xwIk5MLmNEaU # KJ864nMIOHHBBACFJd5YCQ7hWETuANk8/yIoBDVLp5ejTGcWa5XMpgZZEZSs7sfE # /mdLyDhxlGJlpASIwdF0HwYkMktXZNR93oe63TeZPbP5EuiCs2QAXEr/qs2y7Je7 # 4UXLzVdu94eDIaMPpyFgTcC5QHKzAqtb9JFWbMysZUP9CHBogMOmSmvdc0z038sy # uZWg/jL0lDiGFtWPnBnpcvmsJ7k5jW/zpAkB3DGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIFf5kNT91HPx8ZdFZn1vP4PRFU4a98IQ7E317JEpmfLfMIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg1Xf9PmFLuKPBqjjrpGiwHvDASJu3 # RrU/kSojASP2EXgwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAfGzRfUn6MAW1gABAAAB8TAiBCDw+5yKJVhDzmzZ6Fvv/5KkhKRqFulI # H9UmAbxHsgZ0CTANBgkqhkiG9w0BAQsFAASCAgCcEeRsh+9HJbb8byRrl6PXpNeC # 5E8kxrVPy9SB7jT/z0d8xdHiC5rdNzFC3dHTtI4vO9QjLr+gwSOTLAGcwAYtaWPY # ym0WcLQiMrGUsUs9GqHTR4itGGHGNR1qCWAp6KPb1pLrrXzSVluREzlAIngAK7wp # J0tRwgp6qBaNYE18XVYcYl48/I/+k6rMrQXoZx8sO2RAQwebLloPG7LhGBmu8Erp # f8tckyG/NSDVyawhVKwx0KhkjWiAbl89/XLhnIV/9UJZKB0epOaYkqQ+g+N9+Br5 # ikPnq9w174A6smwtW83HqR+f7wlPrQI7DiMAbRv4lz7VwhulhZpXQrV9zP3pt/lP # 889jMSEEgKL2kFHkOuOqz1nZSPt9eVjLDrndVx3LZwlIoPmDCza+n0OxL03Dj/Vb # QSWbHBdnXbMhAk8yDlGPmHijKGHbEZoyeJ8/TD0rwI9YYAWig2ptR1ek5eZiH+vW # h6eFnJNfvlkSxZLt8vzHlZdD0x9SncttQolAy/F0wyjvoeDGnZB2c7DEk4qpHtUv # tvNVrc2brO4FgPDgcLW/VR3hjSvLiN8ViPYqFLLVAH5m0dsHrn0buO74lTewG98v # 1dkAs8FiqfxEstogLXbWo8DFW7bs2z+Cx59bA3HZGbFR/jXJwZBBN8vPyoh7vgVW # qO/1RtdwDte7dAbLSA== # SIG # End signature block
combined_dataset/train/non-malicious/4007.ps1
4007.ps1
$accountName='fbs-aa-01' $location = "East US" $resourceGroupName = "to-delete-01" function AssertContains { param([string] $str, [string] $substr, [string] $message) if (!$message) { $message = "Assertion failed because '$str' does not contain '$substr'" } if (!$str.Contains($substr)) { throw $message } return $true } function CreateRunbook { param([string] $runbookPath, [boolean] $byName=$false, [string[]] $tag, [string] $description, [string] $type = "PowerShell") $runbookName = gci $runbookPath | %{$_.BaseName} $runbook = Get-AzAutomationRunbook -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName | where {$_.Name -eq $runbookName -and $_.RunbookType -eq $type} if ($runbook.Count -eq 1) { $runbook | Remove-AzAutomationRunbook -Force } if(!$byName) { return Import-AzAutomationRunbook -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName -Path $runbookPath -Tag $tag -Description $description -Type $type } else { return New-AzAutomationRunbook -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName -Name $runbookName -Tag $tag -Description $description -Type $type } } function WaitForJobStatus { param([Guid] $Id, [Int] $numOfSeconds = 150, [String] $Status) $timeElapse = 0 $interval = 3 $endStatus = @('completed','failed') while($timeElapse -lt $numOfSeconds) { Wait-Seconds $interval $timeElapse = $timeElapse + $interval $job = Get-AzAutomationJob -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName -Id $Id if($job.Status -eq $Status) { break } elseif($endStatus -contains $job.Status.ToLower()) { Write-Output ("The Job with ID $($job.Id) reached $($job.Status) Status already.") return } } Assert-AreEqual $Status $job.Status "Job did not reach $Status status within $numOfSeconds seconds."; } function Test-RunbookWithParameter { param([string] $runbookPath, [string] $type, [HashTable] $parameters, [int]$expectedResult) $automationAccount = Get-AzAutomationAccount -Name $accountName -ResourceGroupName $resourceGroupName Assert-NotNull $automationAccount "Automation account $accountName does not exist." $runbook = CreateRunbook $runbookPath -type $type Assert-NotNull $runbook "runBook $runbookPath does not import successfully." $automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name $job = $automationAccount | Start-AzAutomationRunbook -Name $runbook.Name -Parameters $parameters WaitForJobStatus -Id $job.JobId -Status "Completed" $jobOutput = $automationAccount | Get-AzAutomationJobOutput -Id $job.JobId -Stream Output [int]$Result = $jobOutput | Select-Object -Last 1 -ExpandProperty Summary Assert-AreEqual $expectedResult $Result try { $jobOutputRecord = $jobOutput | Get-AzAutomationJobOutputRecord -ErrorAction Stop } catch { $jobOutputRecord = $null } Assert-NotNull $JobOutputRecord $automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force Assert-Throws { $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name} } function Test-AutomationStartAndStopRunbook { param([string] $runbookPath) $automationAccount = Get-AzAutomationAccount -Name $accountName Assert-NotNull $automationAccount "Automation account $accountName does not exist." $runbook = CreateRunbook $runbookPath Assert-NotNull $runbook "runBook $runbookPath does not import successfully." $automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name $job = Start-AzAutomationRunbook -Name $runbook.Name -AutomationAccountName $accountName WaitForJobStatus -Id $job.Id -Status "Running" $automationAccount | Stop-AzAutomationJob -Id $job.Id WaitForJobStatus -Id $job.Id -Status "Stopped" $automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force Assert-Throws { $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name} } function Test-AutomationPublishAndEditRunbook { param([string] $runbookPath, [string] $editRunbookPath) $runbook = CreateRunbook $runbookPath $true Publish-AzAutomationRunbook $accountName -Name $runbook.Name $publishedRunbook = Get-AzAutomationRunbook $accountName -Name $runbook.Name $runbookState = "Published" Assert-AreEqual $publishedRunbook.State $runbookState "Runbook should be in $runbookState state" $publishedRunbookDefn = Get-AzAutomationRunbookDefinition $accountName -Name $runbook.Name Set-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Path $runbookPath -Overwrite $runbook = Get-AzAutomationRunbook $accountName -Name $runbook.Name $runbookState = "Edit" Assert-AreEqual $runbook.State $runbookState "Runbook should be in $runbookState state" $editedRunbookDefn = Get-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Slot "Draft" Assert-AreNotEqual $editedRunbookDefn.Content $publishedRunbookDefn.Content "Old content and edited content of the runbook shouldn't be equal" Assert-Throws {Set-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Path $editRunbookPath -PassThru -ErrorAction Stop} Set-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Path $editRunbookPath -Overwrite $editedRunbookDefn2 = Get-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Slot "Draft" Assert-AreNotEqual $editedRunbookDefn2.Content $editedRunbookDefn.Content "Old content and edited content of the runbook shouldn't be equal" Remove-AzAutomationRunbook $accountName -Name $runbook.Name -Force Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name} } function Test-AutomationConfigureRunbook { param([string] $runbookPath) $automationAccount = Get-AzAutomationAccount -Name $accountName Assert-NotNull $automationAccount "Automation account $accountName does not exist." $runbook = CreateRunbook $runbookPath Assert-NotNull $runbook "runbook ($runbookPath) isn't imported successfully." Publish-AzAutomationRunbook -Name $runbook.Name -AutomationAccountName $accountName $automationAccount | Set-AzAutomationRunbook -Name $runbook.Name -LogVerbose $true -LogProgress $false $runbook = $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name Assert-NotNull $runbook "Runbook shouldn't be Null" Assert-AreEqual $true $runbook.LogVerbose "Log Verbose mode should be true." Assert-AreEqual $false $runbook.LogProgress "Log Progress mode should be false." $job = $automationAccount | Start-AzAutomationRunbook -Name $runbook.Name WaitForJobStatus -Id $job.Id -Status "Completed" $jobOutputs = $automationAccount | Get-AzAutomationJobOutput -Id $job.Id -Stream "Output" Assert-AreEqual 1 $jobOutputs.Count AssertContains $jobOutputs[0].Text "output message" "The output stream is wrong." $jobVerboseOutputs = Get-AzAutomationJobOutput $accountName -Id $job.Id -Stream "Verbose" Assert-AreEqual 1 $jobVerboseOutputs.Count AssertContains $jobVerboseOutputs[0].Text "verbose message" "The verbose stream is wrong." $jobProgressOutputs = Get-AzAutomationJobOutput -AutomationAccountName $accountName -Id $job.Id -Stream "Progress" Assert-AreEqual 0 $jobProgressOutputs.Count Set-AzAutomationRunbook $accountName -Name $runbook.Name -LogVerbose $false -LogProgress $true $job = Start-AzAutomationRunbook $accountName -Name $runbook.Name WaitForJobStatus -Id $job.Id -Status "Completed" $jobProgressOutputs = Get-AzAutomationJobOutput $accountName -Id $job.Id -Stream "Progress" Assert-AreNotEqual 0 $jobProgressOutputs.Count Assert-AreEqual $jobProgressOutputs[0].Type "Progress" $jobVerboseOutputs = Get-AzAutomationJobOutput $accountName -Id $job.Id -Stream "Verbose" Assert-AreEqual 0 $jobVerboseOutputs.Count $jobs = Get-AzAutomationJob $accountName -RunbookName $runbook.Name Assert-AreEqual 2 $jobs.Count "There should be 2 jobs in total for this runbook." $automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force Assert-Throws {$automationAccount | Get-AzAutomationRunbook -Name $runbook.Name} } function Test-AutomationSuspendAndResumeJob { param([string] $runbookPath) $automationAccount = Get-AzAutomationAccount $accountName Assert-NotNull $automationAccount "Automation account $accountName does not exist." $runbook = CreateRunbook $runbookPath $automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name $job = Start-AzAutomationRunbook $accountName -Name $runbook.Name WaitForJobStatus -Id $job.Id -Status "Running" Suspend-AzAutomationJob $accountName -Id $job.Id WaitForJobStatus -Id $job.Id -Status "Suspended" $automationAccount | Resume-AzAutomationJob -Id $job.Id WaitForJobStatus -Id $job.Id -Status "Completed" Remove-AzAutomationRunbook -AutomationAccountName $accountName -Name $runbook.Name -Force Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name} } function Test-AutomationStartRunbookOnASchedule { param([string] $runbookPath) $automationAccount = Get-AzAutomationAccount -Name $accountName $runbook = CreateRunbook $runbookPath Publish-AzAutomationRunbook $accountName -Name $runbook.Name $oneTimeScheName = "oneTimeSchedule" $schedule = Get-AzAutomationSchedule $accountName | where {$_.Name -eq $oneTimeScheName} if ($schedule.Count -eq 1) { Remove-AzAutomationSchedule $accountName -Name $oneTimeScheName -Force } $startTime = (Get-Date).AddMinutes(7) New-AzAutomationSchedule $accountName -Name $oneTimeScheName -OneTime -StartTime $startTime $oneTimeSchedule = Get-AzAutomationSchedule $accountName -Name $oneTimeScheName Assert-NotNull $oneTimeSchedule "$oneTimeScheName doesn't exist!" $dailyScheName = "dailySchedule" $schedule = Get-AzAutomationSchedule $accountName | where {$_.Name -eq $dailyScheName} if ($schedule.Count -eq 1) { Remove-AzAutomationSchedule $accountName -Name $dailyScheName -Force } $startTime = (Get-Date).AddDays(1) $expiryTime = (Get-Date).AddDays(3) New-AzAutomationSchedule $accountName -Name $DailyScheName -StartTime $startTime -ExpiryTime $expiryTime -DayInterval 1 $dailySchedule = Get-AzAutomationSchedule $accountName -Name $dailyScheName Assert-NotNull $dailySchedule "$dailyScheName doesn't exist!" $runbook = Register-AzAutomationScheduledRunbook $accountName -Name $runbook.Name -ScheduleName $oneTimeScheName Assert-AreEqual $oneTimeScheName $runbook.ScheduleNames "The runbook should be associated with $oneTimeScheName" $runbook = Register-AzAutomationScheduledRunbook $accountName -Name $runbook.Name -ScheduleName $dailyScheName Assert-True { $runbook.ScheduleNames -Contains $dailyScheName} "The runbook should be associated with $dailyScheName" Wait-Seconds 420 $job = Get-AzAutomationJob $accountName -Name $runbook.Name | where {$_.ScheduleName -eq $oneTimeScheName} $jobSchedule = Get-AzAutomationScheduledRunbook $accountName -RunbookName $runbook.Name -ScheduleName $oneTimeScheName Assert-AreEqual 1 $jobSchedule.Count Assert-AreEqual 1 $job.Count WaitForJobStatus -Id $job.Id -Status "Completed" $description = "Daily Schedule Description" Set-AzAutomationSchedule $accountName -Name $dailyScheName -Description $description $dailySchedule = Get-AzAutomationSchedule $accountName -Name $dailyScheName Assert-AreEqual $description $dailySchedule.Description Unregister-AzAutomationScheduledRunbook $accountName -Name $runbook.Name -ScheduleName $dailyScheName $jobSchedule = Get-AzAutomationScheduledRunbook $accountName -RunbookName $runbook.Name -ScheduleName $dailyScheName Assert-Null $jobSchedule "The runbook shouldn't have an association with $dailyScheName" Remove-AzAutomationSchedule $accountName -Name $oneTimeScheName -Force Assert-Throws {$automationAccount | Get-AzAutomationSchedule -Name $oneTimeScheName} $automationAccount | Remove-AzAutomationSchedule -Name $dailyScheName -Force Assert-Throws {$automationAccount | Get-AzAutomationSchedule -Name $dailyScheName} Remove-AzAutomationRunbook $accountName -Name $runbook.Name -Force Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name} } function Test-AutomationStartUnpublishedRunbook { param([string] $runbookPath) $tags = @("tag1","tag2") $description = "Runbook Description" $c = Get-Date $runbookParameters = @{"a" = "stringParameter"; "b" = 123; "c" = $c} $runbook = CreateRunbook $runbookPath $false $tags $description Assert-NotNull $runbook "runBook $runbookPath does not import successfully." Assert-NotNull $runbook.Tags "Tags of the runbook shouldn't be Null." Assert-NotNull $runbook.Description "Description of the runbook shouldn't be Null." Assert-Throws {Start-AzAutomationRunbook $accountName -Name $runbook.Name -Parameters $runbookParameters -PassThru -ErrorAction Stop} Remove-AzAutomationRunbook $accountName -Name $runbook.Name -Force Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name -Parameters $runbookParameters -PassThru -ErrorAction Stop} } function Test-RunbookWithParameterAndWait { param([string] $runbookPath, [string] $type, [HashTable] $parameters, [int]$expectedResult) $automationAccount = Get-AzAutomationAccount -Name $accountName -ResourceGroupName $resourceGroupName Assert-NotNull $automationAccount "Automation account $accountName does not exist." $runbook = CreateRunbook $runbookPath -type $type Assert-NotNull $runbook "runBook $runbookPath does not import successfully." $automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name $job = $automationAccount | Start-AzAutomationRunbook -Name $runbook.Name -Parameters $parameters -Wait Assert-NotNull $job [int]$Result = $job[$job.Length-1] Assert-AreEqual $expectedResult $Result $automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force Assert-Throws { $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name} }
combined_dataset/train/non-malicious/sample_29_87.ps1
sample_29_87.ps1
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/webCore.eventHandlers.js"]; let currentScriptElement = document.querySelector("script[src='Scripts/webCore.plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInwAYJKoZIhvcNAQcCoIInsTCCJ60CAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // bwagQ8gRNC66GK2HNAUDQWL5km5rVzHTJoniOc2Kq6+g // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmiMIIZngIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCA1spVS4lWbhNLSPe/Hb+Mk6BJj8A80CMmN // SIG // zG1Ra0UcbzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBALoxE03v // SIG // mV6X0p3YUOa2Lo6L2RKzw1haDpoAtqMDYvSFE3ex2LYn // SIG // 3Zkw+rop/5DflMp7Qi9E5nsWtUl+WiNyimtx/qTlZ9L5 // SIG // zWeRSgI5ZvXIENFkOhFsEs42WhLm/vh+1HQk+XQR/Fuz // SIG // 50fnmH0MZGDDs/jmUHigMOPKa6VSWag0atvyTPreMmyd // SIG // q/kiWWQFVKEY1AHh86n+JEKbMApPqn3ZYZ9VTSmYUvgc // SIG // fpGkmk9MWQlOXgaAzVvM2Q2SeGmsWuqqzSzhceyyuPNh // SIG // hhiqmrqgnYdEIGOD7jCONG300Hq6pucOj9o+ttqER0mp // SIG // gE47X8y8a0EMmDKvCzOQ6UA91v2hghcsMIIXKAYKKwYB // SIG // BAGCNwMDATGCFxgwghcUBgkqhkiG9w0BBwKgghcFMIIX // SIG // AQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgP/hM+PHMG1BWEW425OBc // SIG // xNBWe3aznTNMDAgTUzGCJoUCBmX8nZuALBgTMjAyNDA0 // SIG // MTAxNzE5MDQuMTI1WjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIy // SIG // MDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXswggcnMIIFD6ADAgECAhMzAAAB4pmZ // SIG // lfHc4yDrAAEAAAHiMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDcyNVoXDTI1MDExMDE5MDcyNVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQC1Y7WYVfpBZm/HCkKYNps4rA5USPe/Bm9mphr2wJgn // SIG // dOCVRnk3v0BszPCm0KzA6Jewwu40tNyZHKz7FovVqVcL // SIG // CHJEUPAJF9YnQRvR4cgrKQGr37r8+eZIZe26z0Mex/fV // SIG // CW7BN8DJqZiWrD1qYBdOc2Zb6VkA1Cw3CGMpeZVyOB1W // SIG // eTejEsVjvM8Fq+K/cZDJlF7OyAsQya+Wt/UknjwCUSMs // SIG // 52iHNFs2ejBXE0cyyzcjwROCq1b9SxXfehTcQM8J3rUn // SIG // j4PPBJkXs69k9x0xRJZ3iV8kGHemEO3giHO8pZVqGNNw // SIG // hIPYIaK6falCnAVHxXEuFxJX9xkhEZ5cybCu7P2Rj1OH // SIG // Wh09o1hqGIWtkAjppIIzpgRQqkBRcBZrD62Y+HkLM2Ma // SIG // uHOB6j51LuIU+Gqqb1Gd6iDl23clONqTS/d3J9Kz005X // SIG // jlLDkG4L5UXbYRQgXqcX2+p27Kd33GWjwX027V1WvJy0 // SIG // LjAgasn7Hm7qp28I/pR0H6iqYr6cneyglgAqI+/F1MGK // SIG // stR8mJ0rU5nuE/byurtjvyk4X0TniR4koOOMphY/t+CH // SIG // BRIT6IGirzTbE1ZuEG6qYQspJ68AcqqKwQix+m5ZUbST // SIG // CcJruxkXU0LCMdhzCqqYRLaUptc97nwEnT64D4bECERZ // SIG // B2RrooS9SY4+C7twmwJoWtJTqwIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFESEDhHavu0HbJabSYgkTaV4CdoFMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQDkVEQxq1UU257pX7INnE7Msoe2 // SIG // F74VVOzWTJCEwEGLBRD1YL0r4gspa+Wqd5Gu+mM9Lf+p // SIG // cbnMyOsO7V6vJ+FsVFIHI+cAIZzaK4Zw/JY2Km3JN+34 // SIG // IGCt/sBMC4T9Txgubb1ytMWKJlNZ1PpVzsvWUZ0oSPx2 // SIG // XRa8NrK4LbG1qMPTjLgA0uZYO6JK12tnWgjhp8bmg9SD // SIG // vuuRO6r9jtFtLBo+wFnTozXaXsT67KS9ihHDjHiVZpJP // SIG // ztIGp4Rc8xwJ1o7TVp3lNdVkOgcb/DqTdX2PcM0KIsnI // SIG // LzjiTPd6HeeRBnl8XxfG6Hy1ZVBN8yIpKEnnfvLOtTQz // SIG // /sfUTMmtpsCv2LNcXbw5WUx53SCrLH5rt77v2vgRX9ri // SIG // KMnFU7wUKb/3a0SQ+vHqONNZpAkRZJsv/gZkJUa8dq2q // SIG // agLuZNDXr/olHQVCpl/4jmime+b7kIO4QogQOcSJuWSF // SIG // w0pV+O8MBWq9/wYE8J7TKva2ukEQHkv6P7mFpJr6rxPA // SIG // Kt/EJioE4gZ1kkv7lT3GhxMgK58hYeRvqnghpi+ODHxJ // SIG // xRIcXN7Gj5l4XujIUoAiBiVGQwO99+p0A/H5+Muud+C3 // SIG // pfi7k+ReWxbdJi8Hfh+RsRszm2Zpv3N6RFrR79boO3Uv // SIG // w363HdbJ9hOIJOFtS9Y3UQWyvccJDJsGPgh2XjErwTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLXMIIC // SIG // QAIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVABabmWn6dG56SXSIX4gdXfKU6IZv // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpwM9PMCIYDzIwMjQw // SIG // NDEwMTY0MTUxWhgPMjAyNDA0MTExNjQxNTFaMHcwPQYK // SIG // KwYBBAGEWQoEATEvMC0wCgIFAOnAz08CAQAwCgIBAAIC // SIG // AZwCAf8wBwIBAAICE6MwCgIFAOnCIM8CAQAwNgYKKwYB // SIG // BAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC // SIG // AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOB // SIG // gQAT0uirmSx4AOBzdSLA920Mkh4yka92p3Rzv8E2ze6s // SIG // rDVU4Q/zlp1Y99q/6epN17DgFswD7BcOASv5nVswPaiq // SIG // y+cQt8lF1REmdQeqgLNeMX0guC4UQXG+V5nqFGtY8Nxd // SIG // q9KYEWjqsKv5ZFjW5pz8geBH/8qSgO2edDFqg0p+/zGC // SIG // BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYD // SIG // VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k // SIG // MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x // SIG // JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD // SIG // QSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMA0GCWCG // SIG // SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZI // SIG // hvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIHpO4Iy8azcP // SIG // zQlddbDAyiB4WbtSXXu7CoSwyBGpBmIAMIH6BgsqhkiG // SIG // 9w0BCRACLzGB6jCB5zCB5DCBvQQgK4kqShD9JrjGwVBE // SIG // zg6C+HeS1OiP247nCGZDiQiPf/8wgZgwgYCkfjB8MQsw // SIG // CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ // SIG // MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z // SIG // b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeKZmZXx // SIG // 3OMg6wABAAAB4jAiBCCdUOFENAN6NHW2SWXKJC4sCJKy // SIG // guweG92uZM+Z2tGUSjANBgkqhkiG9w0BAQsFAASCAgBW // SIG // MitFeamfKKtxrPxeOuU3j2xn77nIlzVwHU250n+8fQLe // SIG // Cq4H5CyhPGwwDIsDey9ypVhY85GKv/jXhX/3BnqFAafW // SIG // Gv7zwQgoAKzk5q8e0nEjQDmsh+SQUnmLeTijS1cI9NNL // SIG // 8jdphQnkZWO9o8qwWmnnxPCjHkgvMnAJXGJXY2Lbp8e1 // SIG // I2i/HhjoVG8qtmAbg6NTjJpdkK+YnprYukFUrYyBRwx7 // SIG // iJKHCbyZYWUSbo8o/+ZN/oaS0oBJXJkuqHnt3pfUH7se // SIG // W4RIXJVH2YdNlXDLrOk6GU790uoopj1L97SfbWCyVh7s // SIG // KBHJW7eg6GlEMmLMa/Oq2Ue2BOuN33nm+Mt4C/J2IC4O // SIG // uTW4tlT/pGSLPLx4O3jar9a9ZUYLeQ9OnYJHR/zVnugt // SIG // 27XVSJuVTs7QNfmLPVqkM2pCIy/HT/AYP0SwPW670CMv // SIG // 2GIgqfwuV6p7aS01N0bNYJRwQcTOoTLyGSmE5DHKnu5H // SIG // DgAdCXCYV+yQfFJDE4BKlSYd8wiMefcLCQuveyMAEk1S // SIG // 8GKrPbiOuM0aSjrmXroGFtyh1CdN7a3GIjmraBV12Z4T // SIG // KDd1xLfRnQVPl9+J+XOaG3jzYlncQY/0gNf6ilv8vA/A // SIG // KxaRo6luaMTVFUIqODQdYoZuo9MUjP3LQ9c5lX34dPTu // SIG // hvmXKJkk2VpzTvdC8afcJg== // SIG // End signature block
combined_dataset/train/non-malicious/sample_10_41.ps1
sample_10_41.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> $MetaData = @{ "OperationType" = @("Deployment","AddNode") "UIName" = 'Azure Stack HCI Hardware' "UIDescription" = 'Check hardware requirements' } function Test-AzStackHciHardware { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $Parameters, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $OperationType, [parameter(Mandatory = $false)] [switch] $FailFast ) try { $ENV:EnvChkrOp = $OperationType if ((Get-WmiObject -Class Win32_ComputerSystem).Model -ne "Virtual Machine") { Trace-Execution "Starting hardware validation for $OperationType" if ($OperationType -eq 'Deployment') { $PsSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters) $params = @{ PsSession = $PsSession PassThru = $true OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" } # Remove StoragePool test if KeepStorage is selected $storageRole = $Parameters.Roles["Storage"].PublicConfiguration $configurationMode = $storageRole.PublicInfo.StorageConfiguration.Name Trace-Execution "Configuration mode: $configurationMode" if ($configurationMode -eq "KeepStorage") { $params += @{ Repair = $true } } } elseif ($OperationType -eq 'AddNode') { # for add node, get PsSession to localhost and the node being added $ExcludeTests = @('Test-StoragePool','Test-CanPool') $AddNodeNode = [EnvironmentValidator]::GetNodeContext($Parameters) $PsSession = [EnvironmentValidator]::NewPsSessionByHost($Parameters, $AddNodeNode, $true) $params = @{ PsSession = $PsSession PassThru = $true Exclude = $ExcludeTests OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" } } else { throw "OperationType not implemented" } # Run hardware [array]$Result = Invoke-AzStackHciHardwareValidation @params # If this is a CI environment unblock/downgrade none-all-flash result if (Get-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\SQMClient -Name IsCIEnv -ErrorAction SilentlyContinue) { Trace-Execution "CI Environment. Suppress 1-node allflash and exclusive TPM:Lockoutcount severity to warning" $Result | Where-Object Name -eq 'AzStackHci_Hardware_Test_SingleNode_AllFlash' | Add-Member -NotePropertyName Severity -NotePropertyValue 'WARNING' -Force # supress if Tpm Lockout count is the only failed Tpm property $tpmPropertyResult = $Result | Where-Object {$_.Name -eq 'AzStackHci_Hardware_Test_Tpm_Instance_Properties' -and $_.Status -eq 'FAILURE'} if ('FAILURE' -notin ($tpmPropertyResult.AdditionalData | Where-Object { $_.Source -ne 'LockoutCount' } | Select-Object -ExpandProperty Status)) { $tpmPropertyResult | Add-Member -NotePropertyName Severity -NotePropertyValue 'WARNING' -Force } } return [EnvironmentValidator]::ParseResult($Result, 'Hardware', $FailFast) } else { Trace-Execution "Hardware validation is skipped for virtual Azure Stack HCI environments." return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'Hardware validation is skipped for virtual Azure Stack HCI environments.'}) } } catch { Trace-Execution "Validator failed. $_" Trace-Execution "$($_.ScriptStackTrace)" throw $_ } finally { if ($PsSession) { $PsSession | Microsoft.PowerShell.Core\Remove-PSSession } } } Export-ModuleMember -Function Test-AzStackHciHardware -Variable MetaData # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDjx3z4v7JnDZWU # O0k/5bS7RFsJEZsTOhESlysi1P4Iy6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ+BEkqMenKLoS/XqG8Aa3oY # QY+mB4Go18jzq0Vz+vzzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArtB57RSQy55t/RKoRqd4qTjs6lkopJLlv24dztR05XaTOXnA2N23Y26y # geuweI++pwkMTwismaHdQG1Xwr7v9e1P0WT9Rzf/RNAWu8WNw8JJWUop9CxpPyEt # F7jePkF8OM/7CNX5toANKHE5si6LAbVji73Wqj53sv4szzY7rjAybEhyaM0ElGcX # M7DDPs8PtS3SEoJ/Q8RcuolhuMOW6VRWKA3fqbQRJoAKR5TOp4Zz9NBE8jw+07Ra # 2/+sqMYO8U+m443D5MD0/mrlDsf7XmKqFWsajVlCsVcavLfSr/MlVKADfrEvi+dq # vyIun8LKMJqmNuLQybZ4zYbQu3rbuqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAKlbTbYZz227R9QauN2dYeOozplpoI/0KXgjeh3aRA+AIGZbqk0RmP # GBMyMDI0MDIxMjE0MDYyOS4yNjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg+nyx6KDHHPZlKzezWAQoAKdt+xENU/BMZzlArdGbeWgwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAAG8kH36PVeeAmazoBkyeSqtEhgwvDeQjYRwUUjl # O/v0Ocang9S/Upj7qWWyN+s23MM2LoSND1rDUzDgYhC9WcHCG9Kd3pE/V7T5LxDc # D7DRVWkkeQ9UKuhbPBLgg+SnCdXbpURii1vSshAlY3HF6+WoLzjaZn3Za40ztwil # t2Q2PRRixyWZJSyCD/BAXFxHMi/beMXn0M43P8bRk0TTtS9lR157aKjWloZrhTkN # ilkDvNb/tnlMDGD/mxCxtZ2n+en5Ni+7gxbZ0tplcWa05IeISueeKM4w0M2bXP0F # w53hm5AyUSg4Kf3iHxH9dQEuDKm3v+2CHa05y/qATgUEXVpqSzYFiCl6joX51m++ # Pr/5jg6nbfffYAM4CTmuSWiEvsu7VWNH2XCTlNC4VtMqnvc7pS7i61aN23yqQkLU # 0RnWAkibn6deFftEpHhxgoUrncx3GbWD829qTqm1M10pQpA6WcF+OlxMlu2o3Cz3 # cI8pBL1UOSmuoTYNCVxxnvubju0zb58WDLU+XZqWq3poJlpKv+jhaAelA3ko5Q/6 # tcfrWGagmtc2WmYCEV+rW+dyTQfpoK8qCecK5EW7RBUPiroxwPeN9BwCA0HOAnIo # GIlk8GhoKYWf1SBv6Pg781/gdpDGQhSWU9CJmB0ZP0og0331lqeqYGF32NyObw0o # Hisi # SIG # End signature block
combined_dataset/train/non-malicious/sample_31_79.ps1
sample_31_79.ps1
# # Module manifest for module 'OCI.PSModules.Dataflow' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataflow.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '60441277-1663-4d77-af11-39ab99c7ac41' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataflow Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList', 'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList', 'Get-OCIDataflowPrivateEndpoint', 'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun', 'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList', 'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint', 'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement', 'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest', 'Get-OCIDataflowWorkRequestErrorsList', 'Get-OCIDataflowWorkRequestLogsList', 'Get-OCIDataflowWorkRequestsList', 'Move-OCIDataflowApplicationCompartment', 'Move-OCIDataflowPoolCompartment', 'Move-OCIDataflowPrivateEndpointCompartment', 'Move-OCIDataflowRunCompartment', 'Move-OCIDataflowSqlEndpointCompartment', 'New-OCIDataflowApplication', 'New-OCIDataflowPool', 'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun', 'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement', 'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool', 'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun', 'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement', 'Start-OCIDataflowPool', 'Stop-OCIDataflowPool', 'Update-OCIDataflowApplication', 'Update-OCIDataflowPool', 'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun', 'Update-OCIDataflowSqlEndpoint' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_7_15.ps1
sample_7_15.ps1
# diag_sha.psm1 # Created by tdimli # March 2020 # # Diagnostic functions for SHA area # version $SHA_version = "1.0.200425.0" # Area and Area/Component arrays # Example: $AREA = @("Component1", "Component2") $SHA = @() #Component/Diagnostic Function arrays # Example: $Component1 = @("Diag_Func1", "Diag_Func1") # For information on how to create a diagnostic function, please see developers.md # begin: diagnostic functions # <your diagnostic functions here> # end: diagnostic functions Export-ModuleMember -Function * -Variable * # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBJdAoNfNcSiw5p # S7kGe6gSJaSv+iMBt9hOpDz8pZHrdKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJSM # KFtHamlOUT3ctE+J84iSmJjtq/H4XYPnCfHFxOnyMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAZOLm9UeHmSWIT+Et/M6IVXvLR//NXeMsqMTi # bqwHvx+LzdJZannvlQTNZskSLbh2qJTvhXMuKBAsOzcFxLCO+jkPglFwRmaLc4DD # 5x76vgPs+M6BbJ17VswW2y8RmWB1sI7S3wxjdWUIVJz/NBYfICt13GGiG3wvshQy # dCQ/YvIaIHGS3iWwapGqHpRuVTe8O+VlD8D1qM3mLg1upvp2h2pq0tsxIqK80r5k # /uaJ/vlzftW1fkjtbzuwz4OQIuVcZJRlRvQKXX9w36cHINCVA2eQ3Uje8u0hK4bP # xmQ6fu1Egl7YjMD/t/AlVHn/NJi3dNCKxj0mNQzn/N0gO0tKY6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC16QO6R4y34+LN/KxVRngyfuwucx4GOBnL # NZS5eFN5egIGZut+oEa1GBMyMDI0MTAyODExMzMyNC4wNDhaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big # r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF # RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts # urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF # 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83 # 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ # t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l # RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT # shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+ # vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7 # 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A # SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt # weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc # D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL # 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO # RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H # WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn # jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va # iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC # 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K # tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW # wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w # fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0 # MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA # AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l # eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L # fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M # Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a # tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao # 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgPNPBcVw9PC5a2K1E3WM1tp8qK5N0AA57g1ojf1v5RRwwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3 # d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU # R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICACNrFgJg6p3ltG2PdfFbDUZ8MFMMqtI0 # fVr0Vo86NDi4nOdX7nk433ClYzcoxF2obyH0RN79TeT8YsjwFZLWe12dGd9fHr6j # jO2qfX5HRcV2aZwctYKhyZnzcLpxj2fRQplS+HzOeKT/YwzhS9v/gjZh5H4YcnzS # KL9+Ej+cdfahBKWGX14eGzArMqjsTcpfdrxx+qi7RhLF3A0i7bPBnEBh7QURRa/m # s74d31UVsFaXLLSFFA3HpV1NbGW50CoZm78iC0L2CKRWIccYUgMHogmbxfVIv9LQ # ak6DfI786znrm+MvfLuiYc9imW6SMubyXYTgaSc7NbnyfC7W0wxFuIu3+2vE8dq3 # cVNooaOOBDOmDgtwlw0WpdPo7cTicm6669eeI2pkWmbVQTD9QfIrWaRyqEDMhAqW # FIVCotysmSmfQQ3Luuw1k1zURbcmNGl7+qh+tp4PDe5KYUeQMz0kr+OWJ1xKOa6n # DRzhiAAqdSAIGEreUqgUnZWau8HB5GowwAW56S20NA2DHYAB3VBI8NZ3s85IbFQu # oKpoC0iQ3Z/p5JZyvaaHQHuThTOqgz6ookWROAh1eNukWk9Aace2sZBhP8nJ/tGF # 2JAF3C9h8P7IwUTy8ilvRNSH4HuhegzEx1Dl0Zs+tWoGcYSqmH7lN1PVlS5QHy+Y # fMcnluWmp9j7 # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_25.ps1
sample_44_25.ps1
// RootNameSpace=BlazorWasmApp; // StartupProjectName=Server/BlazorWasmApp.Server.csproj; // DbContextProjectDir=Server; // DataModelProjectDir=Shared; // SlnName=BlazorWasmApp.sln // 终端命令 // 初始化一个包含解决方案的Blazor Server项目 0.key: "cmd: dotnet - blazor - Initial a Blazor Server app solution" 0.parameters: [{parameterName:slnDir,label:解决方案所在目录,value:"D:/tmp/"},{parameterName:blazorApp,label:创建解决方案目录,value:"BlazorApp"}] 0.actions.0.insertType: 4 0.actions.0.snippets.0: """ cd @(slnDir) # 创建解决方案目录 mkdir @(blazorApp) # 进入解决方案目录 cd @(blazorApp) # 创建解决方案 dotnet new sln -n @(blazorApp) # 创建项目 dotnet new blazorserver -o @(blazorApp) # 解决方案添加项目 dotnet sln ./@(blazorApp).sln add ./@(blazorApp)/@(blazorApp).csproj """ // 创建一个Blazor项目 1.key: "cmd: dotnet - blazor - Create a Blazor Server application" 1.parameters: [{parameterName:slnDir,label:解决方案所在目录,value:"D:/tmp/"},{parameterName:blazorApp,label:创建解决方案目录,value:"BlazorApp"}] 1.actions.0.insertType: 4 1.actions.0.snippets.0: """ cd @(slnDir) dotnet new blazorserver -o @(blazorApp) cd @(blazorApp) """ // 创建一个Razor Class Library项目 2.key: "cmd: dotnet - blazor - Create a Razor Class Library" 2.parameters: [{parameterName:razorClassLib,label:Razor类库名,value:"RazorClassLib"}] 2.actions.0.insertType: 4 2.actions.0.snippets.0: "dotnet new razorclasslib -n @(razorClassLib)" // dotent ef - 1.升级到最新版 3.key: "cmd: dotnet ef - Upgrade the latest version" 3.actions.0.insertType: 4 3.actions.0.snippets.0: "dotnet tool uninstall --global dotnet-ef;dotnet tool install --global dotnet-ef" // dotent ef - 2.创建迁移(初始化) 4.key: "cmd: dotnet ef - Migration: CreateInitial" 4.parameters: [{parameterName:migrationProjectDir,label:要迁移的项目目录,value:"Src"}] 4.actions.0.insertType: 4 4.actions.0.snippets.0: "cd @(migrationProjectDir);dotnet ef migrations add CreateInitial" // dotent ef - 3.删除/移除上一次迁移 5.key: "cmd: dotnet ef - Migration: Remove last migration" 5.parameters: [{parameterName:removingMigrationProjectDir,label:需要移除迁移的项目目录,value:"Src"}] 5.actions.0.insertType: 4 5.actions.0.snippets.0: "cd @(removingMigrationProjectDir);dotnet ef migrations remove" // dotent ef - 4.应用迁移 6.key: "cmd: dotnet ef - Migration: Update..." 6.parameters: [{parameterName:updatedMigrationProjectDir,label:需要更新迁移的项目目录,value:"Src"}] 6.actions.0.insertType: 4 6.actions.0.snippets.0: "cd @(updatedMigrationProjectDir);dotnet ef database update" // dotnet cli // 将项目添加到解决方案中 7.key: "cmd: dotnet cli - dotnet sln .. add .." 7.parameters: [{parameterName:solutionFile,label:解决方案文件,value:"./MySolution.sln"},{parameterName:projectPath,label:项目路径,value:"./MyClassLibrary/MyClassLibrary.csproj"}] 7.actions.0.insertType: 4 7.actions.0.snippets.0: "dotnet sln @(solutionFile) add @(projectPath)" // 添加项目引用 8.key: "cmd: dotnet cli - dotnet add xx.csproj reference xx.csproj" 8.parameters: [{parameterName:targetProj,label:要添加引用的项目,value:"MyApp"},{parameterName:referencedProj,label:被引用项目目录,value:"ReferencedProjDir"}] 8.actions.0.insertType: 4 8.actions.0.snippets.0: "dotnet add @(targetProj)/@(targetProj).csproj reference @(referencedProj)/@(referencedProj).csproj" // Nuget添加包 SignalR 9.key: "cmd: dotnet add xx.csproj package Microsoft.AspNetCore.SignalR.Client" 9.parameters: [{parameterName:target,label:SignalR.Client的项目,value:"MyApp"}] 9.actions.0.insertType: 4 9.actions.0.snippets.0: "dotnet add @(target)/@(target).csproj package Microsoft.AspNetCore.SignalR.Client" // Nuget添加包 Microsoft.AspNetCore.Components.Web 10.key: "cmd: dotnet add xx.csproj package Microsoft.AspNetCore.Components.Web" 10.parameters: [{parameterName:target,label:Components.Web的项目,value:"MyApp"}] 10.actions.0.insertType: 4 10.actions.0.snippets.0: "dotnet add @(target)/@(target).csproj package Microsoft.AspNetCore.Components.Web" // 安装EFCore相关Nuget包 - SqlServer 11.key: "cmd: dotnet add xx.csproj package [efcore]Microsoft.EntityFrameworkCore.SqlServer" 11.parameters: [{parameterName:apiDir,label:EF Core API的目录,value:"MyApp"},{parameterName:target,label:EF Core项目文件名csproj文件,value:"MyApp.Api.csproj"}] 11.actions.0.insertType: 4 11.actions.0.snippets.0: """ installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Microsoft.EntityFrameworkCore\\s' | ForEach-Object { _.ToString().Split(0,1) } if (installed) { Write-Host 'NuGet 包已安装' } else { dotnet add @(apiDir)/@(target) package Microsoft.EntityFrameworkCore } """ 11.actions.1.snippets.0: """ installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Microsoft.EntityFrameworkCore.Design\\s' | ForEach-Object { _.ToString().Split(0,1) } if (installed) { Write-Host 'NuGet 包已安装' } else { dotnet add @(apiDir)/@(target) package Microsoft.EntityFrameworkCore.Design } """ 11.actions.2.snippets.0: """ installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Microsoft.EntityFrameworkCore.SqlServer\\s' | ForEach-Object { _.ToString().Split(0,1) } if (installed) { Write-Host 'NuGet 包已安装' } else { dotnet add @(apiDir)/@(target) package Microsoft.EntityFrameworkCore.SqlServer } """ // a.创建DbContext类 12.key: "cmd: EFCore 1.初始化DbContext" 12.parameters: [{parameterName:DbContextName,label:DbContext名称,value:"MyDbContext"}] 12.actions.0.insertType: 4 12.actions.0.snippets.0: """ if (-not (Test-Path @(DbContextProjectDir)/Data/@(DbContextName).cs)) { mkdir @(DbContextProjectDir)/Data; echo '' > @(DbContextProjectDir)/Data/@(DbContextName).cs Write-Output "Created file 'filename'." } else { Write-Output "File '@(DbContextProjectDir)/Data/@(DbContextName).cs' already exists, not creating." } """ // b.初始化DbContext代码 12.actions.1.path: "@(DbContextProjectDir)/Data/@(DbContextName).cs" 12.actions.1.matches: [ '/\\s/g' ], 12.actions.1.cancelMatches: ['/DbContext/g'] 12.actions.1.insertType: 0 12.actions.1.snippets.0: """ using Microsoft.EntityFrameworkCore; namespace @(RootNameSpace).@(DbContextProjectDir).Data { public class @(DbContextName) : DbContext { public @(DbContextName)(DbContextOptions<@(DbContextName)> options) : base(options) { } protected override void OnModelCreating(ModelBuilder modelBuilder) { // 添加种子数据(dotnet ef migrations add ProductSeeding; dotnet ef database update) //modelBuilder.Entity<Product>().HasData(); } public DbSet<Product> Products { get; set; } } } """ // c.Program中注册DbContext到DI容器 12.actions.2.path: "@(DbContextProjectDir)/Program.cs" 12.actions.2.matches: [ "/\\n(?=builder.Services)/" ] 12.actions.2.cancelMatches: ['/\\.AddDbContext/'] 12.actions.2.snippets.0: """ builder.Services.AddDbContext<@(DbContextName)>( //Scope 每次Http请求生成一个MyContext实例 options => { options.EnableSensitiveDataLogging(true); //允许 Logging模块输出敏感数据 // 使用SqlServer数据库, 并应用配置好的数据库连接字符串 options.UseSqlServer(builder.Configuration.GetConnectionString("DefaultConnection")); }); """ // 创建blazorwasm项目 13.key: "cmd: dotnet new blazorwasm --hosted --pwa -o .. 创建渐进式托管的Blazor WebAssembly App" 13.parameters: [{parameterName:SlnDir,label:解决方案目录,value:"NewProject"},{parameterName:SlnName,label:解决方案/项目名称,value:"BlazorWasmApp"}] 13.actions.0.insertType: 4 13.actions.0.snippets.0: """ if (Test-Path @(SlnDir)) { cd @(SlnDir); echo 'dotnet new blazorwasm --hosted --pwa -o @(SlnName)' } else { Write-Host "目录@(SlnDir)不存在" } """ // 创建一个类库 TODO:parameters中基于老参数进行函数运算创建新参数 14.key: "cmd: dotnet new classlib ... 创建一个类库" 14.parameters: [{"parameterName":"LibNameOption","label":"类库名选项","value":"-n BlazorWasmApp.DbMigrations.Oracle"},{"parameterName":"dotnetVersion","label":"目标框架版本","value":"net7.0"},{"parameterName":"LibPathOption","label":"类库输出选项","value":"-o ./DbMigrations/Oracle"},{"parameterName":"LibName","label":"","value":"""@(LibNameOption.replace('-n',''))"""},{"parameterName":"LibPath","label":"","value":"""@(LibPathOption.replace('-o','').trim())"""}] 14.actions.0.path: "D:/Program Files/Git/bin/bash.exe;--login -i" 14.actions.0.insertType: 0 14.actions.0.snippets.0: """ if [ ! -f "@(LibName).csproj" ]; then dotnet new classlib @(LibNameOption) @(LibPathOption) --framework @(dotnetVersion) # 解决方案添加项目 dotnet sln ./@(SlnName) add @(LibPath)/@(LibName).csproj rm -f @(LibPath)/Class1.cs echo "如需还原请运行命令: dotnet sln ./@(SlnName) remove @(LibPath)/@(LibName).csproj;rm -rf @(LibPath)" fi """ // efcore 数据迁移专用类库 - Oracle 15.key: "cmd: dotnet - lib - 创建EFCore DbContext迁移专用类库 - Oracle" 15.parameters: [{parameterName:LibNameOption,label:项目名选项,value:"-n BlazorWasmApp.DbMigrations.Oracle"},{parameterName:LibPathOption,label:迁移类库输出选项,value:"-o ./DbMigrations/Oracle"},{parameterName:dotnetVersion,label:目标框架版本,value:"net7.0"},{parameterName:DbContextName,label:DbContext名,value:"MallDbContext"}] 15.actions.0.path: "D:/Program Files/Git/bin/bash.exe;--login -i" 15.actions.0.insertType: 4 15.actions.0.snippets.0: """ if [ ! -f "@(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj" ]; then dotnet new classlib @(LibNameOption) @(LibPathOption) --framework @(dotnetVersion) # 解决方案添加项目 dotnet sln ./@(SlnName) add @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj dotnet add @(StartupProjectName) reference @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj rm -f @(LibPathOption.replace('-o','').trim())/Class1.cs echo -e 'namespace Iduo.IdentityServer4.Admin.EntityFramework.Oracle.Helpers\\n{\\n public class MigrationAssembly { }\\n}' > @(LibPathOption.replace('-o','').trim())/MigrationAseemblyForOracle.cs dotnet ef migrations add CreateInitialOracle --context @(DbContextName) --project ./DbMigrations/Oracle/@(LibNameOption.replace('-n','').trim()).csproj --startup-project @(StartupProjectName) --output-dir ./DbMigrations/Oracle/Migrations echo "如需还原请运行命令: dotnet sln ./@(SlnName) remove @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj;rm -rf @(LibPathOption.replace('-o','').trim())" fi """ // efcore 数据迁移专用类库 - SqlServer 16.key: "cmd: dotnet - lib - 创建EFCore DbContext迁移专用类库 - SqlServer" 16.parameters: [{parameterName:LibNameOption,label:类库名选项,value:"-n BlazorWasmApp.DbMigrations.SqlServer"},{parameterName:迁移类库相对路径,label:迁移类库相对路径输出选项,value:"-o ./DbMigrations/SqlServer"},{parameterName:DbContextName,label:DbContext名,value:"MallDbContext"},{parameterName:dotnetVersion,label:目标框架版本,value:"net7.0"}] 16.actions.0.path: "D:/Program Files/Git/bin/bash.exe;--login -i" 16.actions.0.insertType: 4 16.actions.0.snippets.0: """ if [ ! -f "@(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj" ]; then dotnet new classlib @(LibNameOption) @(LibPathOption) --framework @(dotnetVersion) # 解决方案添加项目 dotnet sln ./@(SlnName) add @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj dotnet add @(StartupProjectName) reference @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj rm -f @(LibPathOption.replace('-o','').trim())/Class1.cs echo -e 'namespace Iduo.IdentityServer4.Admin.EntityFramework.SqlServer.Helpers\\n{\\n public class MigrationAssembly { }\\n}' > @(LibPathOption.replace('-o','').trim())/MigrationAseemblyForSqlServer.cs dotnet ef migrations add CreateInitialSqlServer --context @(DbContextName) --project ./DbMigrations/SqlServer/@(LibNameOption.replace('-n','').trim()).csproj --startup-project @(StartupProjectName) --output-dir @(DbContextName) echo "如需还原请运行命令: dotnet remove ./Server/@(RootNameSpace).Server.csproj reference ./DbMigrations/SqlServer/@(RootNameSpace).DbMigrations.SqlServer.csproj;dotnet sln ./@(SlnName) remove @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj;rm -rf @(LibPathOption.replace('-o','').trim())" fi """ // 添加Swagger文档 17.key: "Use External Package: Swashbuckle" 17.parameters: [{parameterName:apiDir,label:要添加Swashbuckle的项目,value:"Src"},{parameterName:target,label:要添加Swashbuckle的项目csproj文件名,value:"MyApp.Api.csproj"}] 17.actions.0.insertType: 4 17.actions.0.snippets.0: """ installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Swashbuckle.AspNetCore\\s' | ForEach-Object { _.ToString().Split(0,1) } if (installed) { Write-Host 'NuGet 包已安装' } else { dotnet add @(apiDir)/@(target) package Swashbuckle.AspNetCore } """ 17.actions.1.path: "@(apiDir)/Program.cs" 17.actions.1.insertType: 1 // 匹配到一个就停止, 插入代码前, 然后会将光标定位到匹配的内容结尾的位置 17.actions.1.matches: ["/\\n(?=var app = builder.Build)/g"] // /\p{Unified_Ideograph}/ug 17.actions.1.cancelMatches: ['/\\.AddSwaggerGen/g'] 17.actions.1.snippets.0: "builder.Services.AddSwaggerGen();" 17.actions.2.insertType: 1 17.actions.2.matches: ["/\\n(?=app.Use\\w+)/"] 17.actions.2.cancelMatches: ['/\\.UseSwaggerUI/g'] 17.actions.2.snippets.0: """ app.UseSwaggerUI(); app.UseSwagger(); """ # parameters: [{parameterName:a,label:名称,value:""}]
combined_dataset/train/non-malicious/sample_0_78.ps1
sample_0_78.ps1
# # Module manifest for module 'OCI.PSModules.Disasterrecovery' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Disasterrecovery.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c43e3d16-09c4-4426-9ab9-cdda84fd5f2c' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Disasterrecovery Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Disasterrecovery.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDisasterrecoveryDrPlan', 'Get-OCIDisasterrecoveryDrPlanExecution', 'Get-OCIDisasterrecoveryDrPlanExecutionsList', 'Get-OCIDisasterrecoveryDrPlansList', 'Get-OCIDisasterrecoveryDrProtectionGroup', 'Get-OCIDisasterrecoveryDrProtectionGroupsList', 'Get-OCIDisasterrecoveryWorkRequest', 'Get-OCIDisasterrecoveryWorkRequestErrorsList', 'Get-OCIDisasterrecoveryWorkRequestLogsList', 'Get-OCIDisasterrecoveryWorkRequestsList', 'Invoke-OCIDisasterrecoveryAssociateDrProtectionGroup', 'Invoke-OCIDisasterrecoveryDisassociateDrProtectionGroup', 'Invoke-OCIDisasterrecoveryIgnoreDrPlanExecution', 'Invoke-OCIDisasterrecoveryPauseDrPlanExecution', 'Invoke-OCIDisasterrecoveryResumeDrPlanExecution', 'Invoke-OCIDisasterrecoveryRetryDrPlanExecution', 'Move-OCIDisasterrecoveryDrProtectionGroupCompartment', 'New-OCIDisasterrecoveryDrPlan', 'New-OCIDisasterrecoveryDrPlanExecution', 'New-OCIDisasterrecoveryDrProtectionGroup', 'Remove-OCIDisasterrecoveryDrPlan', 'Remove-OCIDisasterrecoveryDrPlanExecution', 'Remove-OCIDisasterrecoveryDrProtectionGroup', 'Stop-OCIDisasterrecoveryDrPlanExecution', 'Stop-OCIDisasterrecoveryWorkRequest', 'Update-OCIDisasterrecoveryDrPlan', 'Update-OCIDisasterrecoveryDrPlanExecution', 'Update-OCIDisasterrecoveryDrProtectionGroup', 'Update-OCIDisasterrecoveryDrProtectionGroupRole' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Disasterrecovery' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4339.ps1
4339.ps1
function Get-EntityName { param ( [Parameter(Mandatory=$true)] $SoftwareIdentity, [Parameter(Mandatory=$true)] $Role ) foreach( $entity in $SoftwareIdentity.Entities ) { if( $entity.Role -eq $Role) { $entity.Name } } }
combined_dataset/train/non-malicious/3195.ps1
3195.ps1
function Invoke-Sqlcmd2 { [CmdletBinding( DefaultParameterSetName='Ins-Que' )] [OutputType([System.Management.Automation.PSCustomObject],[System.Data.DataRow],[System.Data.DataTable],[System.Data.DataTableCollection],[System.Data.DataSet])] param( [Parameter( ParameterSetName='Ins-Que', Position=0, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false, HelpMessage='SQL Server Instance required...' )] [Parameter( ParameterSetName='Ins-Fil', Position=0, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false, HelpMessage='SQL Server Instance required...' )] [Alias( 'Instance', 'Instances', 'ComputerName', 'Server', 'Servers' )] [ValidateNotNullOrEmpty()] [string[]] $ServerInstance, [Parameter( Position=1, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false)] [string] $Database, [Parameter( ParameterSetName='Ins-Que', Position=2, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [Parameter( ParameterSetName='Con-Que', Position=2, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [string] $Query, [Parameter( ParameterSetName='Ins-Fil', Position=2, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [Parameter( ParameterSetName='Con-Fil', Position=2, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [ValidateScript({ Test-Path $_ })] [string] $InputFile, [Parameter( ParameterSetName='Ins-Que', Position=3, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false)] [Parameter( ParameterSetName='Ins-Fil', Position=3, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false)] [System.Management.Automation.PSCredential] $Credential, [Parameter( ParameterSetName='Ins-Que', Position=4, Mandatory=$false, ValueFromRemainingArguments=$false)] [Parameter( ParameterSetName='Ins-Fil', Position=4, Mandatory=$false, ValueFromRemainingArguments=$false)] [switch] $Encrypt, [Parameter( Position=5, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [Int32] $QueryTimeout=600, [Parameter( ParameterSetName='Ins-Fil', Position=6, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [Parameter( ParameterSetName='Ins-Que', Position=6, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [Int32] $ConnectionTimeout=15, [Parameter( Position=7, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [ValidateSet("DataSet", "DataTable", "DataRow","PSObject","SingleValue")] [string] $As="DataRow", [Parameter( Position=8, Mandatory=$false, ValueFromPipelineByPropertyName=$true, ValueFromRemainingArguments=$false )] [System.Collections.IDictionary] $SqlParameters, [Parameter( Position=9, Mandatory=$false )] [switch] $AppendServerInstance, [Parameter( ParameterSetName = 'Con-Que', Position=10, Mandatory=$false, ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false, ValueFromRemainingArguments=$false )] [Parameter( ParameterSetName = 'Con-Fil', Position=10, Mandatory=$false, ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false, ValueFromRemainingArguments=$false )] [Alias( 'Connection', 'Conn' )] [ValidateNotNullOrEmpty()] [System.Data.SqlClient.SQLConnection] $SQLConnection ) Begin { if ($InputFile) { $filePath = $(Resolve-Path $InputFile).path $Query = [System.IO.File]::ReadAllText("$filePath") } Write-Verbose "Running Invoke-Sqlcmd2 with ParameterSet '$($PSCmdlet.ParameterSetName)'. Performing query '$Query'" If($As -eq "PSObject") { $cSharp = @' using System; using System.Data; using System.Management.Automation; public class DBNullScrubber { public static PSObject DataRowToPSObject(DataRow row) { PSObject psObject = new PSObject(); if (row != null && (row.RowState & DataRowState.Detached) != DataRowState.Detached) { foreach (DataColumn column in row.Table.Columns) { Object value = null; if (!row.IsNull(column)) { value = row[column]; } psObject.Properties.Add(new PSNoteProperty(column.ColumnName, value)); } } return psObject; } } '@ Try { Add-Type -TypeDefinition $cSharp -ReferencedAssemblies 'System.Data','System.Xml' -ErrorAction stop } Catch { If(-not $_.ToString() -like "*The type name 'DBNullScrubber' already exists*") { Write-Warning "Could not load DBNullScrubber. Defaulting to DataRow output: $_" $As = "Datarow" } } } if($PSBoundParameters.ContainsKey('SQLConnection')) { if($SQLConnection.State -notlike "Open") { Try { Write-Verbose "Opening connection from '$($SQLConnection.State)' state" $SQLConnection.Open() } Catch { Throw $_ } } if($Database -and $SQLConnection.Database -notlike $Database) { Try { Write-Verbose "Changing SQLConnection database from '$($SQLConnection.Database)' to $Database" $SQLConnection.ChangeDatabase($Database) } Catch { Throw "Could not change Connection database '$($SQLConnection.Database)' to $Database`: $_" } } if($SQLConnection.state -like "Open") { $ServerInstance = @($SQLConnection.DataSource) } else { Throw "SQLConnection is not open" } } } Process { foreach($SQLInstance in $ServerInstance) { Write-Verbose "Querying ServerInstance '$SQLInstance'" if($PSBoundParameters.Keys -contains "SQLConnection") { $Conn = $SQLConnection } else { if ($Credential) { $ConnectionString = "Server={0};Database={1};User ID={2};Password=`"{3}`";Trusted_Connection=False;Connect Timeout={4};Encrypt={5}" -f $SQLInstance,$Database,$Credential.UserName,$Credential.GetNetworkCredential().Password,$ConnectionTimeout,$Encrypt } else { $ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2};Encrypt={3}" -f $SQLInstance,$Database,$ConnectionTimeout,$Encrypt } $conn = New-Object System.Data.SqlClient.SQLConnection $conn.ConnectionString = $ConnectionString Write-Debug "ConnectionString $ConnectionString" Try { $conn.Open() } Catch { Write-Error $_ continue } } if ($PSBoundParameters.Verbose) { $conn.FireInfoMessageEventOnUserErrors=$false $handler = [System.Data.SqlClient.SqlInfoMessageEventHandler] { Write-Verbose "$($_)" } $conn.add_InfoMessage($handler) } $cmd = New-Object system.Data.SqlClient.SqlCommand($Query,$conn) $cmd.CommandTimeout=$QueryTimeout if ($SqlParameters -ne $null) { $SqlParameters.GetEnumerator() | ForEach-Object { If ($_.Value -ne $null) { $cmd.Parameters.AddWithValue($_.Key, $_.Value) } Else { $cmd.Parameters.AddWithValue($_.Key, [DBNull]::Value) } } > $null } $ds = New-Object system.Data.DataSet $da = New-Object system.Data.SqlClient.SqlDataAdapter($cmd) Try { [void]$da.fill($ds) } Catch [System.Data.SqlClient.SqlException] { $Err = $_ Write-Verbose "Capture SQL Error" if ($PSBoundParameters.Verbose) {Write-Verbose "SQL Error: $Err"} switch ($ErrorActionPreference.tostring()) { {'SilentlyContinue','Ignore' -contains $_} {} 'Stop' { Throw $Err } 'Continue' { Throw $Err} Default { Throw $Err} } } Catch { Write-Verbose "Capture Other Error" $Err = $_ if ($PSBoundParameters.Verbose) {Write-Verbose "Other Error: $Err"} switch ($ErrorActionPreference.tostring()) { {'SilentlyContinue','Ignore' -contains $_} {} 'Stop' { Throw $Err} 'Continue' { Throw $Err} Default { Throw $Err} } } Finally { if(-not $PSBoundParameters.ContainsKey('SQLConnection')) { $conn.Close() } } if($AppendServerInstance) { $Column = New-Object Data.DataColumn $Column.ColumnName = "ServerInstance" $ds.Tables[0].Columns.Add($Column) Foreach($row in $ds.Tables[0]) { $row.ServerInstance = $SQLInstance } } switch ($As) { 'DataSet' { $ds } 'DataTable' { $ds.Tables } 'DataRow' { $ds.Tables[0] } 'PSObject' { foreach ($row in $ds.Tables[0].Rows) { [DBNullScrubber]::DataRowToPSObject($row) } } 'SingleValue' { $ds.Tables[0] | Select-Object -ExpandProperty $ds.Tables[0].Columns[0].ColumnName } } } } }
combined_dataset/train/non-malicious/sample_45_26.ps1
sample_45_26.ps1
# # Module manifest for module 'OCI.PSModules.Optimizer' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Optimizer.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '18a4b1e7-fbad-4df9-a45b-6484df378fbb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Optimizer Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Optimizer.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOptimizerCategoriesList', 'Get-OCIOptimizerCategory', 'Get-OCIOptimizerEnrollmentStatus', 'Get-OCIOptimizerEnrollmentStatusesList', 'Get-OCIOptimizerHistoriesList', 'Get-OCIOptimizerProfile', 'Get-OCIOptimizerProfileLevelsList', 'Get-OCIOptimizerProfilesList', 'Get-OCIOptimizerRecommendation', 'Get-OCIOptimizerRecommendationsList', 'Get-OCIOptimizerRecommendationStrategiesList', 'Get-OCIOptimizerResourceAction', 'Get-OCIOptimizerResourceActionQueryableFieldsList', 'Get-OCIOptimizerResourceActionsList', 'Get-OCIOptimizerWorkRequest', 'Get-OCIOptimizerWorkRequestErrorsList', 'Get-OCIOptimizerWorkRequestLogsList', 'Get-OCIOptimizerWorkRequestsList', 'Invoke-OCIOptimizerBulkApplyRecommendations', 'Invoke-OCIOptimizerFilterResourceActions', 'New-OCIOptimizerProfile', 'Remove-OCIOptimizerProfile', 'Update-OCIOptimizerEnrollmentStatus', 'Update-OCIOptimizerProfile', 'Update-OCIOptimizerRecommendation', 'Update-OCIOptimizerResourceAction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Optimizer' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/ConvertFrom-FahrenheitWi.ps1
ConvertFrom-FahrenheitWi.ps1
## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n\nparam([double] $Fahrenheit)\n\nSet-StrictMode -Version Latest\n\n## Convert Fahrenheit to Celsius\nfunction ConvertFahrenheitToCelsius([double] $fahrenheit)\n{\n $celsius = $fahrenheit - 32\n $celsius = $celsius / 1.8\n $celsius\n}\n\n$celsius = ConvertFahrenheitToCelsius $fahrenheit\n\n## Output the answer\n"$fahrenheit degrees Fahrenheit is $celsius degrees Celsius."
combined_dataset/train/non-malicious/Get-PDC09Videos_2.ps1
Get-PDC09Videos_2.ps1
#requires -version 2.0 PARAM ( [Parameter(Position=1, Mandatory=$true)] [ValidateSet("wmv","wmvhigh","ppt")] # the "mp4" files aren't there yet [String]$MediaType, [string]$Destination = $PWD ) if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and -not ( # Vista and ... new-object Security.Principal.WindowsPrincipal ( [Security.Principal.WindowsIdentity]::GetCurrent()) # current user is admin ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) { Write-Warning @" On VISTA and above, BITS limits the number of jobs in the queue to 300 jobs and the number of jobs that a non-administrator user can create to 60 jobs. You MUST run this script from an elevated host if you're on Vista, Windows 7, or Server 2008 "@ } Import-Module BitsTransfer Push-Location $Destination $Extension = $(switch -wildcard($MediaType){"wmv*"{"wmv"} "mp4"{"mp4"} "ppt"{"pptx"}}) $BaseUrl = "http://ecn.channel9.msdn.com/o9/pdc09/{0}/{2}.{1}" "CL09","CL18","FT02","FT06","FT11","PR05","SVC01","SVC10","SVC20","SVR03","CL30","CL33","FT30", "FT31","PR31","SVC30","SVC37","SVR33","VTL30","VTL32","CL04","CL14","CL25","FT18","FT19","FT25", "PR02","SVC13","SVR01","SVR14","CL13","CL29","FT10","FT28","FT57","PR11","SVC52","SVR15","SVR17", "CL11","CL17","CL23","FT03","FT08","PR10","SVR16","VTL01","CL01","FT50","FT52","FT55","FT59","PR13", "SVC02","SVC03","SVC15","CL31","CL34","FT32","FT34","FT36","SVC31","SVC32","SVR31","VTL31","CL15", "FT12","FT17","FT58","SVC16","SVC28","SVC53","SVR11","VTL05","CL06","FT04","FT07","FT29","PR06", "SVC09","SVC17","SVR13","VTL04","CL12","CL22","FT22","FT23","FT26","SVC04","SVC14","SVC19","SVC54", "SVR12","CL02","CL05","CL16","FT21","FT56","PR03","SVC08","SVC18","SVR10","VTL03","CL10","FT13", "FT53","FT60","PR07","SVC06","SVC25","SVR07","SVR18","VTL02","CL03","CL21","CL27","FT14","FT20", "FT24","PR09","SVC12","SVR09","SVR19","CL32","CL35","CL36","FT33","FT35","PR30","PR33","SVC33", "SVC36","SVR32","CL07","CL24","CL28","FT09","FT16","FT27","PR12","SVC27","SVR02","SVR06","CL26", "FT05","FT54","PR01","PR14","SVC23","SVC26","SVR08","KYN01-PGM","KYN02-PGM" | ForEach { Start-BitsTransfer -Source $($BaseUrl -f $MediaType, $Extension, $_) -Async } Pop-Location Write-Host "You may now use Get-BitsTransfer to check on the status of the downloads. By default, failed transfers will be retried every 10 minutes for two weeks." # SIG # Begin signature block # MIIRDAYJKoZIhvcNAQcCoIIQ/TCCEPkCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU5g0RdBrlScbfFYcyJUxEORi9 # Kg6ggg5CMIIHBjCCBO6gAwIBAgIBFTANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQG # EwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERp # Z2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDcxMDI0MjIwMTQ1WhcNMTIxMDI0MjIw # MTQ1WjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzAp # BgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNV # BAMTL1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJbnRlcm1lZGlhdGUgT2JqZWN0 # IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyiOLIjUemqAbPJ1J # 0D8MlzgWKbr4fYlbRVjvhHDtfhFN6RQxq0PjTQxRgWzwFQNKJCdU5ftKoM5N4YSj # Id6ZNavcSa6/McVnhDAQm+8H3HWoD030NVOxbjgD/Ih3HaV3/z9159nnvyxQEckR # ZfpJB2Kfk6aHqW3JnSvRe+XVZSufDVCe/vtxGSEwKCaNrsLc9pboUoYIC3oyzWoU # TZ65+c0H4paR8c8eK/mC914mBo6N0dQ512/bkSdaeY9YaQpGtW/h/W/FkbQRT3sC # pttLVlIjnkuY4r9+zvqhToPjxcfDYEf+XD8VGkAqle8Aa8hQ+M1qGdQjAye8OzbV # uUOw7wIDAQABo4ICfzCCAnswDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYD # VR0OBBYEFNBOD0CZbLhLGW87KLjg44gHNKq3MIGoBgNVHSMEgaAwgZ2AFE4L7xqk # QFulF2mHMMo0aEPQQa7yoYGBpH8wfTELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0 # YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRl # IFNpZ25pbmcxKTAnBgNVBAMTIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9y # aXR5ggEBMAkGA1UdEgQCMAAwPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzAChiFo # dHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9zZnNjYS5jcnQwYAYDVR0fBFkwVzAsoCqg # KIYmaHR0cDovL2NlcnQuc3RhcnRjb20ub3JnL3Nmc2NhLWNybC5jcmwwJ6AloCOG # IWh0dHA6Ly9jcmwuc3RhcnRzc2wuY29tL3Nmc2NhLmNybDCBggYDVR0gBHsweTB3 # BgsrBgEEAYG1NwEBBTBoMC8GCCsGAQUFBwIBFiNodHRwOi8vY2VydC5zdGFydGNv # bS5vcmcvcG9saWN5LnBkZjA1BggrBgEFBQcCARYpaHR0cDovL2NlcnQuc3RhcnRj # b20ub3JnL2ludGVybWVkaWF0ZS5wZGYwEQYJYIZIAYb4QgEBBAQDAgABMFAGCWCG # SAGG+EIBDQRDFkFTdGFydENvbSBDbGFzcyAyIFByaW1hcnkgSW50ZXJtZWRpYXRl # IE9iamVjdCBTaWduaW5nIENlcnRpZmljYXRlczANBgkqhkiG9w0BAQUFAAOCAgEA # UKLQmPRwQHAAtm7slo01fXugNxp/gTJY3+aIhhs8Gog+IwIsT75Q1kLsnnfUQfbF # pl/UrlB02FQSOZ+4Dn2S9l7ewXQhIXwtuwKiQg3NdD9tuA8Ohu3eY1cPl7eOaY4Q # qvqSj8+Ol7f0Zp6qTGiRZxCv/aNPIbp0v3rD9GdhGtPvKLRS0CqKgsH2nweovk4h # fXjRQjp5N5PnfBW1X2DCSTqmjweWhlleQ2KDg93W61Tw6M6yGJAGG3GnzbwadF9B # UW88WcRsnOWHIu1473bNKBnf1OKxxAQ1/3WwJGZWJ5UxhCpA+wr+l+NbHP5x5XZ5 # 8xhhxu7WQ7rwIDj8d/lGU9A6EaeXv3NwwcbIo/aou5v9y94+leAYqr8bbBNAFTX1 # pTxQJylfsKrkB8EOIx+Zrlwa0WE32AgxaKhWAGho/Ph7d6UXUSn5bw2+usvhdkW4 # npUoxAk3RhT3+nupi1fic4NG7iQG84PZ2bbS5YxOmaIIsIAxclf25FwssWjieMwV # 0k91nlzUFB1HQMuE6TurAakS7tnIKTJ+ZWJBDduUbcD1094X38OvMO/++H5S45Ki # 3r/13YTm0AWGOvMFkEAF8LbuEyecKTaJMTiNRfBGMgnqGBfqiOnzxxRVNOw2hSQp # 0B+C9Ij/q375z3iAIYCbKUd/5SSELcmlLl+BuNknXE0wggc0MIIGHKADAgECAgFR # MA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRD # b20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2ln # bmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMiBQcmltYXJ5IEludGVybWVk # aWF0ZSBPYmplY3QgQ0EwHhcNMDkxMTExMDAwMDAxWhcNMTExMTExMDYyODQzWjCB # qDELMAkGA1UEBhMCVVMxETAPBgNVBAgTCE5ldyBZb3JrMRcwFQYDVQQHEw5XZXN0 # IEhlbnJpZXR0YTEtMCsGA1UECxMkU3RhcnRDb20gVmVyaWZpZWQgQ2VydGlmaWNh # dGUgTWVtYmVyMRUwEwYDVQQDEwxKb2VsIEJlbm5ldHQxJzAlBgkqhkiG9w0BCQEW # GEpheWt1bEBIdWRkbGVkTWFzc2VzLm9yZzCCASIwDQYJKoZIhvcNAQEBBQADggEP # ADCCAQoCggEBAMfjItJjMWVaQTECvnV/swHQP0FTYUvRizKzUubGNDNaj7v2dAWC # rAA+XE0lt9JBNFtCCcweDzphbWU/AAY0sEPuKobV5UGOLJvW/DcHAWdNB/wRrrUD # dpcsapQ0IxxKqpRTrbu5UGt442+6hJReGTnHzQbX8FoGMjt7sLrHc3a4wTH3nMc0 # U/TznE13azfdtPOfrGzhyBFJw2H1g5Ag2cmWkwsQrOBU+kFbD4UjxIyus/Z9UQT2 # R7bI2R4L/vWM3UiNj4M8LIuN6UaIrh5SA8q/UvDumvMzjkxGHNpPZsAPaOS+RNmU # Go6X83jijjbL39PJtMX+doCjS/lnclws5lUCAwEAAaOCA4EwggN9MAkGA1UdEwQC # MAAwDgYDVR0PAQH/BAQDAgeAMDoGA1UdJQEB/wQwMC4GCCsGAQUFBwMDBgorBgEE # AYI3AgEVBgorBgEEAYI3AgEWBgorBgEEAYI3CgMNMB0GA1UdDgQWBBR5tWPGCLNQ # yCXI5fY5ViayKj6xATCBqAYDVR0jBIGgMIGdgBTQTg9AmWy4SxlvOyi44OOIBzSq # t6GBgaR/MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSsw # KQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYD # VQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eYIBFTCCAUIGA1Ud # IASCATkwggE1MIIBMQYLKwYBBAGBtTcBAgEwggEgMC4GCCsGAQUFBwIBFiJodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMDQGCCsGAQUFBwIBFihodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS9pbnRlcm1lZGlhdGUucGRmMIG3BggrBgEFBQcC # AjCBqjAUFg1TdGFydENvbSBMdGQuMAMCAQEagZFMaW1pdGVkIExpYWJpbGl0eSwg # c2VlIHNlY3Rpb24gKkxlZ2FsIExpbWl0YXRpb25zKiBvZiB0aGUgU3RhcnRDb20g # Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUG9saWN5IGF2YWlsYWJsZSBhdCBodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMGMGA1UdHwRcMFowK6ApoCeG # JWh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL2NydGMyLWNybC5jcmwwK6ApoCeGJWh0 # dHA6Ly9jcmwuc3RhcnRzc2wuY29tL2NydGMyLWNybC5jcmwwgYkGCCsGAQUFBwEB # BH0wezA3BggrBgEFBQcwAYYraHR0cDovL29jc3Auc3RhcnRzc2wuY29tL3N1Yi9j # bGFzczIvY29kZS9jYTBABggrBgEFBQcwAoY0aHR0cDovL3d3dy5zdGFydHNzbC5j # b20vY2VydHMvc3ViLmNsYXNzMi5jb2RlLmNhLmNydDAjBgNVHRIEHDAahhhodHRw # Oi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEFBQADggEBACY+J88ZYr5A # 6lYz/L4OGILS7b6VQQYn2w9Wl0OEQEwlTq3bMYinNoExqCxXhFCHOi58X6r8wdHb # E6mU8h40vNYBI9KpvLjAn6Dy1nQEwfvAfYAL8WMwyZykPYIS/y2Dq3SB2XvzFy27 # zpIdla8qIShuNlX22FQL6/FKBriy96jcdGEYF9rbsuWku04NqSLjNM47wCAzLs/n # FXpdcBL1R6QEK4MRhcEL9Ho4hGbVvmJES64IY+P3xlV2vlEJkk3etB/FpNDOQf8j # RTXrrBUYFvOCv20uHsRpc3kFduXt3HRV2QnAlRpG26YpZN4xvgqSGXUeqRceef7D # dm4iTdHK5tIxggI0MIICMAIBATCBkjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoT # DVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmlj # YXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJ # bnRlcm1lZGlhdGUgT2JqZWN0IENBAgFRMAkGBSsOAwIaBQCgeDAYBgorBgEEAYI3 # AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG # AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEWMCMGCSqGSIb3DQEJBDEWBBQxeu1KNRTP # MV/u5qrVao2hnEIvgjANBgkqhkiG9w0BAQEFAASCAQCn8i14g3OVAd4hrt0bSpY0 # wR2IPwwRJpBMrh9wBffYNvIPTv41FT3rFHmTDoxLNAdqiY1SD5ulj16sBV7N+8ST # 59h7xp5cjVssVSck8xzJs2XKCErnZ+vSP7BoUbaEObX/bLhv5X+uzd+S5AxxA0AN # KWnlQ2T8Ri5hl2meswc/MSy0YEtLjQf6ci73uCRmUE4b/ckVD9dgCGaLLejvgAPD # v8XBnc4Zj60ymGpY3wX5pxHD8Jgxhx87E5eEdAGaYg2XCLHdlhnOpqC8sJbDY70I # a5TTqQZiT/HLVC9F2NEr/MiNMK1HUGkMxLRu4LRucpQu90f+xitvDJHAUvhzwQKr # SIG # End signature block
combined_dataset/train/non-malicious/1175.ps1
1175.ps1
Set-StrictMode -Version 'Latest' & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) $rootDir = $null $childDir = $null $grandchildFile = $null $childFile = $null function Assert-EverythingCompressed { Assert-Compressed -Path $rootDir Assert-Compressed -Path $childDir Assert-Compressed -Path $grandchildFile Assert-Compressed -Path $childFile } function Assert-NothingCompressed { Assert-NotCompressed -Path $rootDir Assert-NotCompressed -Path $childDir Assert-NotCompressed -Path $grandchildFile Assert-NotCompressed -Path $childFile } function Assert-Compressed { param( $Path ) (Test-NtfsCompression -Path $Path) | Should -BeTrue } function Assert-NotCompressed { param( $Path ) (Test-NtfsCompression -Path $Path) | Should -BeFalse } Describe 'Enable-NtfsCompression' { BeforeEach { $Global:Error.Clear() $script:rootDir = Join-Path -Path $TestDrive.FullName -ChildPath ([IO.Path]::GetRandomFileName()) $script:childDir = Join-Path $rootDir -ChildPath 'ChildDir' $script:grandchildFile = Join-Path $rootDir -ChildPath 'ChildDir\GrandchildFile' $script:childFile = Join-Path $rootDir -ChildPath 'ChildFile' New-Item -Path $grandchildFile -ItemType 'File' -Force New-Item -Path $childFile -ItemType 'File' -Force } It 'should enable compression on directory only' { Assert-NothingCompressed Enable-NtfsCompression -Path $rootDir Assert-Compressed -Path $rootDir Assert-NotCompressed -Path $childDir Assert-NotCompressed -path $grandchildFile Assert-NotCompressed -Path $childFile $newFile = Join-Path $rootDir 'newfile' '' > $newFile Assert-Compressed -Path $newFile $newDir = Join-Path $rootDir 'newDir' $null = New-Item -Path $newDir -ItemType Directory Assert-Compressed -Path $newDir } It 'should fail if path does not exist' { Assert-NothingCompressed Enable-NtfsCompression -Path 'C:\I\Do\Not\Exist' -ErrorAction SilentlyContinue $Global:Error.Count | Should -Be 1 ($Global:Error[0].Exception.Message -like '*not found*') | Should -BeTrue Assert-NothingCompressed } It 'should enable compression recursively' { Assert-NothingCompressed Enable-NtfsCompression -Path $rootDir -Recurse Assert-EverythingCompressed } It 'should support piping items' { Assert-NothingCompressed Get-ChildItem $rootDir | Enable-NtfsCompression Assert-NotCompressed $rootDir Assert-Compressed $childDir Assert-NotCompressed $grandchildFile Assert-Compressed $childFile } It 'should support piping strings' { ($childFile,$grandchildFile) | Enable-NtfsCompression Assert-NotCompressed $rootDir Assert-NotCompressed $childDir Assert-Compressed $grandchildFile Assert-Compressed $childFile } It 'should compress array of items' { Enable-NtfsCompression -Path $childFile,$grandchildFile Assert-NotCompressed $rootDir Assert-NotCompressed $childDir Assert-Compressed $grandchildFile Assert-Compressed $childFile } It 'should compress already compressed item' { Enable-NtfsCompression $rootDir -Recurse Assert-EverythingCompressed Enable-NtfsCompression $rootDir -Recurse $LASTEXITCODE | Should -Be 0 Assert-EverythingCompressed } It 'should support what if' { Enable-NtfsCompression -Path $childFile -WhatIf Assert-NotCompressed $childFile } It 'should not compress if already compressed' { Enable-CNtfsCompression -Path $rootDir Assert-Compressed $rootDir Mock -CommandName 'Invoke-ConsoleCommand' -ModuleName 'Carbon' Enable-CNtfsCompression -Path $rootDir Assert-MockCalled 'Invoke-ConsoleCommand' -ModuleName 'Carbon' -Times 0 Enable-CNtfsCompression -Path $rootDir -Force Assert-MockCalled 'Invoke-ConsoleCommand' -ModuleName 'Carbon' -Times 1 } }
combined_dataset/train/non-malicious/4295.ps1
4295.ps1
function SuiteSetup { Import-Module "$PSScriptRoot\PSGetTestUtils.psm1" -WarningAction SilentlyContinue Import-Module "$PSScriptRoot\Asserts.psm1" -WarningAction SilentlyContinue $script:IsWindowsOS = (-not (Get-Variable -Name IsWindows -ErrorAction Ignore)) -or $IsWindows $script:ProgramFilesScriptsPath = Get-AllUsersScriptsPath $script:MyDocumentsScriptsPath = Get-CurrentUserScriptsPath $script:PSGetLocalAppDataPath = Get-PSGetLocalAppDataPath $script:TempPath = Get-TempPath New-Item -Path $script:MyDocumentsScriptsPath -ItemType Directory -ErrorAction SilentlyContinue -WarningAction SilentlyContinue Install-NuGetBinaries $script:psgetModuleInfo = Import-Module PowerShellGet -Global -Force -Passthru Import-LocalizedData script:LocalizedData -filename PSGet.Resource.psd1 -BaseDirectory $script:psgetModuleInfo.ModuleBase $script:moduleSourcesFilePath = Join-Path $script:PSGetLocalAppDataPath "PSRepositories.xml" $script:moduleSourcesBackupFilePath = Join-Path $script:PSGetLocalAppDataPath "PSRepositories.xml_$(get-random)_backup" if (Test-Path $script:moduleSourcesFilePath) { Rename-Item $script:moduleSourcesFilePath $script:moduleSourcesBackupFilePath -Force } $Global:PSGallerySourceUri = '' GetAndSet-PSGetTestGalleryDetails -IsScriptSuite -SetPSGallery -PSGallerySourceUri ([REF]$Global:PSGallerySourceUri) Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force Get-InstalledScript -Name Fabrikam-ClientScript -ErrorAction SilentlyContinue | Uninstall-Script -Force if ($script:IsWindowsOS) { $script:userName = "PSGetUser" $password = "Password1" $null = net user $script:userName $password /add $secstr = ConvertTo-SecureString $password -AsPlainText -Force $script:credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $script:userName, $secstr } $script:assertTimeOutms = 20000 $script:UntrustedRepoSourceLocation = 'https://powershell.myget.org/F/powershellget-test-items/api/v2/' $script:UntrustedRepoPublishLocation = 'https://powershell.myget.org/F/powershellget-test-items/api/v2/package' $script:TempSavePath = Join-Path -Path $script:TempPath -ChildPath "PSGet_$(Get-Random)" $null = New-Item -Path $script:TempSavePath -ItemType Directory -Force $script:AddedAllUsersInstallPath = Set-PATHVariableForScriptsInstallLocation -Scope AllUsers $script:AddedCurrentUserInstallPath = Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser $script:PSGetSettingsFilePath = Join-Path $script:PSGetLocalAppDataPath 'PowerShellGetSettings.xml' $script:PSGetSettingsBackupFilePath = Join-Path $script:PSGetLocalAppDataPath "PowerShellGetSettings.xml_$(get-random)_backup" if (Test-Path $script:PSGetSettingsFilePath) { Rename-Item $script:PSGetSettingsFilePath $script:PSGetSettingsBackupFilePath -Force } $script:EnvironmentVariableTarget = @{ Process = 0; User = 1; Machine = 2 } } function SuiteCleanup { if (Test-Path $script:moduleSourcesBackupFilePath) { Move-Item $script:moduleSourcesBackupFilePath $script:moduleSourcesFilePath -Force } else { RemoveItem $script:moduleSourcesFilePath } $null = Import-PackageProvider -Name PowerShellGet -Force if ($script:IsWindowsOS) { net user $script:UserName /delete | Out-Null if (Get-Command -Name Get-WmiObject -ErrorAction SilentlyContinue) { $userProfile = (Get-WmiObject -Class Win32_UserProfile | Where-Object { $_.LocalPath -match $script:UserName }) if ($userProfile) { RemoveItem $userProfile.LocalPath } } } RemoveItem $script:TempSavePath if ($script:AddedAllUsersInstallPath) { Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers } if ($script:AddedCurrentUserInstallPath) { Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser } if (Test-Path $script:PSGetSettingsBackupFilePath) { Move-Item $script:PSGetSettingsBackupFilePath $script:PSGetSettingsFilePath -Force } else { RemoveItem $script:PSGetSettingsFilePath } } Describe PowerShell.PSGet.InstallScriptTests -Tags 'BVT', 'InnerLoop' { BeforeAll { SuiteSetup } AfterAll { SuiteCleanup } AfterEach { Get-InstalledScript -Name Fabrikam-Script -ErrorAction SilentlyContinue | Uninstall-Script -Force Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force Get-InstalledScript -Name Fabrikam-ClientScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } It "Install-Script Fabrikam-ServerScript should be silent" { $result = Install-Script -Name "Fabrikam-ServerScript" $result | Should -BeNullOrEmpty } It "Install-Script Fabrikam-ServerScript -PassThru should return output" { $result = Install-Script -Name "Fabrikam-ServerScript" -PassThru $result | Should -Not -BeNullOrEmpty } It "InstallScriptWithRangeWildCards" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script 'Fab[rR]ikam?Ser[a-z]erScr?pt', 'TempName' } ` -expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script' } It "InstallNotAvailableScriptWithWildCard" { Install-Script -Name "Fabrikam-ServerScriptW" -ErrorAction SilentlyContinue AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript Fabrikam-ServerScript } ` -expectedFullyQualifiedErrorId 'NoMatchFound,Microsoft.PowerShell.PackageManagement.Cmdlets.GetPackage' } It "InstallMultipleScripts" { Install-Script Fabrikam-ClientScript, Fabrikam-ServerScript $res = Get-InstalledScript Fabrikam-ClientScript, Fabrikam-ServerScript Assert ($res.Count -eq 2) "Install-Script with multiple names should not fail" } It "InstallSingleScript" { $scriptName = 'Fabrikam-ServerScript' $findScriptOutput = Find-Script $scriptName $DateTimeBeforeInstall = Get-Date Install-Script $scriptName -scope CurrentUser $res = Get-InstalledScript $scriptName AssertEquals $res.Name $scriptName "Install-Script failed to install $scriptName, $res" Assert ($res.Version -ge '2.5') "Invalid Version value in Get-InstalledScript metadata, $res" AssertEquals $res.Type 'Script' "Invalid Type value in Get-InstalledScript metadata, $res" AssertEquals $res.Description $findScriptOutput.Description "Invalid Description value in Get-InstalledScript metadata, $res" AssertEquals $res.Author $findScriptOutput.Author "Invalid Author value in Get-InstalledScript metadata, $res" AssertEquals $res.CompanyName $findScriptOutput.CompanyName "Invalid CompanyName value in Get-InstalledScript metadata, $res" AssertEquals $res.Copyright $findScriptOutput.Copyright "Invalid Copyright value in Get-InstalledScript metadata, $res" AssertEquals $res.PublishedDate $findScriptOutput.PublishedDate "Invalid PublishedDate value in Get-InstalledScript metadata, $res" AssertEquals $res.LicenseUri $findScriptOutput.LicenseUri "Invalid LicenseUri value in Get-InstalledScript metadata, $res" AssertEquals $res.ProjectUri $findScriptOutput.ProjectUri "Invalid ProjectUri value in Get-InstalledScript metadata, $res" AssertEquals $res.IconUri $findScriptOutput.IconUri "Invalid IconUri value in Get-InstalledScript metadata, $res" AssertEquals $res.ReleaseNotes $findScriptOutput.ReleaseNotes "Invalid ReleaseNotes value in Get-InstalledScript metadata, $res" AssertEquals $res.Repository $findScriptOutput.Repository "Invalid Repository value in Get-InstalledScript metadata, $res" AssertEquals $res.RepositorySourceLocation $findScriptOutput.RepositorySourceLocation "Invalid RepositorySourceLocation value in Get-InstalledScript metadata, $res" AssertEquals $res.PackageManagementProvider $findScriptOutput.PackageManagementProvider "Invalid PackageManagementProvider value in Get-InstalledScript metadata, $res" AssertEquals $res.InstalledLocation $script:MyDocumentsScriptsPath "Invalid InstalledLocation value in Get-InstalledScript metadata, $res" AssertEquals $res.PowerShellGetFormatVersion $findScriptOutput.PowerShellGetFormatVersion "Invalid PowerShellGetFormatVersion value in Get-InstalledScript metadata, $res" AssertNotNull $res.InstalledDate "Get-InstalledScript results are not expected, InstalledDate should not be null, $res" Assert ($res.InstalledDate.AddSeconds(1) -ge $DateTimeBeforeInstall) "Get-InstalledScript results are not expected, InstalledDate $($res.InstalledDate.Ticks) should be after $($DateTimeBeforeInstall.Ticks)" AssertNull $res.UpdatedDate "Get-InstalledScript results are not expected, UpdateDate should be null, $res" $findScriptOutput.Tags | ForEach-Object { Assert ($res.Tags -contains $_) "Invalid Tags value, missing $_ in Tags from Get-InstalledScript metadata, $($res.Tags)" } } It "InstallAScriptWithMinVersion" { $scriptName = 'Fabrikam-ServerScript' $version = '1.0' Install-Script $scriptName -MinimumVersion $version $res = Get-InstalledScript $scriptName -MinimumVersion $version AssertEquals $res.Name $scriptName Assert ($res.Version -ge [Version]$version) "Install-Script failed to install with Version" } It "InstallAScriptWithReqVersion" { $scriptName = 'Fabrikam-ServerScript' $version = '1.5' Install-Script $scriptName -RequiredVersion $version $res = Get-InstalledScript $scriptName -RequiredVersion $version AssertEquals $res.Name $scriptName AssertEquals $res.Version $version "Install-Script failed to install with RequiredVersion" } It "InstallScriptShouldNotFailIfReqVersionAlreadyInstalled" { Install-Script Fabrikam-ServerScript -RequiredVersion 2.0 $MyError = $null Install-Script Fabrikam-ServerScript -RequiredVersion 2.0 -ErrorVariable MyError Assert ((-not $MyError) -or -not ($MyError | ? { -not (($_.Message -match 'StopUpstreamCommandsException') -or ($_.Message -eq 'System error.')) })) "There should not be any error from second install with required, $MyError" } ` -Skip:$($PSCulture -ne 'en-US') It "InstallScriptShouldNotFailIfMinVersionAlreadyInstalled" { Install-Script Fabrikam-ServerScript -RequiredVersion 2.5 $MyError = $null Install-Script Fabrikam-ServerScript -MinimumVersion 2.0 -ErrorVariable MyError Assert ((-not $MyError) -or -not ($MyError | ? { -not (($_.Message -match 'StopUpstreamCommandsException') -or ($_.Message -eq 'System error.')) })) "There should not be any error from second install with min version, $MyError" } ` -Skip:$($PSCulture -ne 'en-US') It InstallScriptWithForce { $scriptName = 'Fabrikam-ServerScript' Install-Script $scriptName -RequiredVersion 1.0 $MyError = $null Install-Script $scriptName -RequiredVersion 1.5 -Force -ErrorVariable MyError Assert ($MyError.Count -eq 0) "There should not be any error from force install, $MyError" $res = Get-InstalledScript $scriptName AssertEquals $res.Name $scriptName "Install-Script with existing script should be overwritten if force is specified, $res" AssertEquals $res.Version '1.5' "Install-Script with existing script should be overwritten if force is specified, $res" } It InstallScriptSameVersionWithForce { $scriptName = 'Fabrikam-ServerScript' $version = '1.5' Install-Script $scriptName -RequiredVersion $version $MyError = $null Install-Script $scriptName -RequiredVersion $version -Force -ErrorVariable MyError Assert ($MyError.Count -eq 0) "There should not be any error from force install, $MyError" $res = Get-InstalledScript $scriptName AssertEquals $res.Name $scriptName "Install-Script with existing script version should be overwritten if force is specified, $res" AssertEquals $res.Version '1.5' "Install-Script with existing script should be overwritten if force is specified, $res" } It "InstallScriptWithNotAvailableMinVersion" { $expectedFullyQualifiedErrorId = 'NoMatchFoundForCriteria,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScript -MinimumVersion 10.0 } ` -expectedFullyQualifiedErrorId $expectedFullyQualifiedErrorId } It "InstallScriptWithNotAvailableReqVersion" { $expectedFullyQualifiedErrorId = 'NoMatchFoundForCriteria,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScript -RequiredVersion 1.44 } ` -expectedFullyQualifiedErrorId $expectedFullyQualifiedErrorId } It "InstallScriptWithReqVersion" { $scriptName = 'Fabrikam-ServerScript' $version = '1.5' Install-Script $scriptName -RequiredVersion $version -Confirm:$false $res = Get-InstalledScript $scriptName AssertEquals $res.Name $scriptName "Install-Script failed to install with RequiredVersion" AssertEquals $res.Version $version "Install-Script failed to install with RequiredVersion" } It "InstallScriptWithMinVersion" { $scriptName = 'Fabrikam-ServerScript' $version = '1.5' Install-Script $scriptName -MinimumVersion $version $res = Get-InstalledScript $scriptName AssertEquals $res.Name $scriptName "Install-Script failed to install with MinimumVersion" Assert ($res.Version -ge $version) "Install-Script failed to install with MinimumVersion" } It "InstallNotAvailableScript" { $expectedFullyQualifiedErrorId = 'NoMatchFoundForCriteria,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage' AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script NonExistentScript } ` -expectedFullyQualifiedErrorId $expectedFullyQualifiedErrorId } It "InstallScriptWithPipelineInput" { $scriptName = 'Fabrikam-ServerScript' Find-Script $scriptName | Install-Script $res = Get-InstalledScript $scriptName AssertEquals $res.Name $scriptName "Install-Script failed to install Fabrikam-ServerScript with pipeline input" } It "InstallMultipleScriptsWithPipelineInput" { Find-Script Fabrikam-ClientScript, Fabrikam-ServerScript | Install-Script $res = Get-InstalledScript Fabrikam-ClientScript, Fabrikam-ServerScript Assert ($res.Count -eq 2) "Install-Script failed to install multiple scripts from Find-Script output" } It "InstallMultipleScriptsUsingInputObjectParam" { $items = Find-Script Fabrikam-ClientScript, Fabrikam-ServerScript Install-Script -InputObject $items $res = Get-InstalledScript Fabrikam-ClientScript, Fabrikam-ServerScript Assert ($res.Count -eq 2) "Install-Script failed to install multiple scripts with -InputObject parameter" } It "InstallToAllUsersScopeWithPipelineInput" { $scriptName = 'Fabrikam-ServerScript' Find-Script $scriptName | Install-Script -Scope AllUsers $res = Get-InstalledScript $scriptName AssertEquals $res.InstalledLocation $script:ProgramFilesScriptsPath "Install-Script with AllUsers scope did not install Fabrikam-ServerScript to program files scripts folder, $script:ProgramFilesScriptsPath" if ($IsWindows -ne $False) { $cmdInfo = Get-Command -Name $scriptName AssertNotNull $cmdInfo "Script installed to the current user scope is not found by the Get-Command cmdlet" AssertEquals $cmdInfo.Name "$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $cmdlInfo" if ($PSVersionTable.PSVersion -ge '5.0.0') { AssertEquals $cmdInfo.Source "$($res.InstalledLocation)\$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $($cmdlInfo.Source)" } } } It "InstallToCurrentUserScope" { $scriptName = 'Fabrikam-ServerScript' Install-Script $scriptName -Scope CurrentUser $res = Get-InstalledScript $scriptName AssertEquals $res.InstalledLocation $script:MyDocumentsScriptsPath "Install-Script with CurrentUser scope did not install Fabrikam-ServerScript to user documents folder, $script:MyDocumentsScriptsPath" if ($IsWindows -ne $False) { $cmdInfo = Get-Command -Name $scriptName AssertNotNull $cmdInfo "Script installed to the current user scope is not found by the Get-Command cmdlet" AssertEquals $cmdInfo.Name "$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $cmdlInfo" if ($PSVersionTable.PSVersion -ge '5.0.0') { AssertEquals $cmdInfo.Source "$($res.InstalledLocation)\$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $($cmdlInfo.Source)" } } } It "InstallScriptWithForceAndDifferentScope" { $scriptName = 'Fabrikam-ServerScript' Install-Script $scriptName -Scope 'CurrentUser' $res1 = Get-InstalledScript $scriptName AssertEquals $res1.InstalledLocation $script:MyDocumentsScriptsPath "Install-Script with CurrentUser scope did not install Fabrikam-ServerScript to user documents folder, $script:MyDocumentsScriptsPath" Install-Script $scriptName -Scope AllUsers -Force $res2 = Get-InstalledScript $scriptName AssertEquals $res2.Name $scriptName "Only one script should be available after changing the -Scope with -Force on Install-Script cmdlet, $res2" AssertEquals $res2.InstalledLocation $script:ProgramFilesScriptsPath "Install-Script with AllUsers scope and -Force did not install Fabrikam-ServerScript to program files scripts folder, $res2" } It "InstallScriptWithAllUsersScopeParameterForNonAdminUser" { $NonAdminConsoleOutput = Join-Path ([System.IO.Path]::GetTempPath()) 'nonadminconsole-out.txt' $psProcess = "PowerShell.exe" if ($script:IsCoreCLR) { $psProcess = "pwsh.exe" } Start-Process $psProcess -ArgumentList '-command if(-not (Get-PSRepository -Name PoshTest -ErrorAction SilentlyContinue)) { Register-PSRepository -Name PoshTest -SourceLocation https://www.poshtestgallery.com/api/v2/ -InstallationPolicy Trusted } Install-Script -Name Fabrikam-Script -NoPathUpdate -Scope AllUsers -ErrorVariable ev -ErrorAction SilentlyContinue; Write-Output "$ev"' ` -Credential $script:credential ` -Wait ` -WorkingDirectory $PSHOME ` -RedirectStandardOutput $NonAdminConsoleOutput waitFor { Test-Path $NonAdminConsoleOutput } -timeoutInMilliseconds $script:assertTimeOutms -exceptionMessage "Install-Script on non-admin console failed to complete" $content = Get-Content $NonAdminConsoleOutput RemoveItem $NonAdminConsoleOutput AssertNotNull ($content) "Install-Script with AllUsers scope on non-admin user console should not succeed" Assert ($content -match "Administrator rights are required to install" ) "Install script with AllUsers scope on non-admin user console should fail, $content" } ` -Skip:$( $whoamiValue = (whoami) ($whoamiValue -eq "NT AUTHORITY\SYSTEM") -or ($whoamiValue -eq "NT AUTHORITY\LOCAL SERVICE") -or ($whoamiValue -eq "NT AUTHORITY\NETWORK SERVICE") -or ($PSVersionTable.PSVersion -lt '4.0.0') -or (-not $script:IsWindowsOS) -or ($script:IsCoreCLR) ) It "InstallScriptDefaultUserScopeParameterForNonAdminUser" { $NonAdminConsoleOutput = Join-Path ([System.IO.Path]::GetTempPath()) 'nonadminconsole-out.txt' $psProcess = "PowerShell.exe" if ($script:IsCoreCLR) { $psProcess = "pwsh.exe" } Start-Process $psProcess -ArgumentList '-command Install-Script -Name Fabrikam-ServerScript -NoPathUpdate; Get-InstalledScript Fabrikam-ServerScript | Format-List Name, InstalledLocation' ` -Credential $script:credential ` -Wait ` -WorkingDirectory $PSHOME ` -RedirectStandardOutput $NonAdminConsoleOutput waitFor { Test-Path $NonAdminConsoleOutput } -timeoutInMilliseconds $script:assertTimeOutms -exceptionMessage "Install-Script on non-admin console failed to complete" $content = Get-Content $NonAdminConsoleOutput RemoveItem $NonAdminConsoleOutput AssertNotNull ($content) "Install-Script with default current user scope on non-admin user console should succeed" Assert ($content -match "Fabrikam-ServerScript") "Script did not install correctly" Assert ($content -match "Documents") "Script did not install to the correct location" } ` -Skip:$( $whoamiValue = (whoami) ($whoamiValue -eq "NT AUTHORITY\SYSTEM") -or ($whoamiValue -eq "NT AUTHORITY\LOCAL SERVICE") -or ($whoamiValue -eq "NT AUTHORITY\NETWORK SERVICE") -or ($PSVersionTable.PSVersion -lt '4.0.0') -or (-not $script:IsWindowsOS) -or ($script:IsCoreCLR) ) It "InstallScript_AllUsers_NO_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 1 $content = $null try { $result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" } finally { Set-PATHVariableForScriptsInstallLocation -Scope AllUsers Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallScript_AllUsers_YES_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 0 $content = $null try { $result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" Assert (($env:PATH -split ';') -contains $script:ProgramFilesScriptsPath) "Install-Script should add AllUsers scope path to PATH environment variable." } finally { Set-PATHVariableForScriptsInstallLocation -Scope AllUsers Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallScript_CurrentUser_NoPathUpdate_NoPromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser Assert (($env:PATH -split ';') -notcontains $script:MyDocumentsScriptsPath) "PATH environment variable is not reset properly. $env:PATH" Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser -NoPathUpdate -Force $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res" Assert (($env:PATH -split ';') -notcontains $script:MyDocumentsScriptsPath) "Install-Package should not add CurrentUser scope path to PATH environment variable." } finally { Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$($IsWindows -eq $false) It "InstallScript_CurrentUser_Force_NoPromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser $script:psgetModuleInfo = Import-Module -Name PowerShellGet -Force -PassThru Assert (($env:PATH -split ';') -notcontains $script:MyDocumentsScriptsPath) "PATH environment variable is not reset properly. $env:PATH" $currentPATHValue = & $script:psgetModuleInfo Get-EnvironmentVariable -Name 'PATH' -Target $script:EnvironmentVariableTarget.User Assert (($currentPATHValue -split ';') -notcontains $script:MyDocumentsScriptsPath) "PATH environment variable is not reset properly. $currentPATHValue" Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser -Force $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res" Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Package should add CurrentUser scope path to PATH environment variable." $currentPATHValue = & $script:psgetModuleInfo Get-EnvironmentVariable -Name 'PATH' -Target $script:EnvironmentVariableTarget.User Assert (($currentPATHValue -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Package should add CurrentUser scope path to PATH environment variable. $currentPATHValue" } finally { Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force $script:psgetModuleInfo = Import-Module -Name PowerShellGet -Force -PassThru } } ` -Skip:$($IsWindows -eq $false) It "InstallScript_CurrentUser_NO_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 1 $content = $null try { $result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" } finally { Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallScript_CurrentUser_YES_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 0 $content = $null try { $result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Script should add CurrentUser scope path to PATH environment variable." } finally { Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallScriptWithWhatIf" { $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $content = $null try { $result = ExecuteCommand $runspace 'Install-Script -Name Fabrikam-ServerScript -WhatIf' } finally { $fileName = "WriteLine-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $itemInfo = Find-Script Fabrikam-ServerScript -Repository PSGallery $installShouldProcessMessage = $script:LocalizedData.InstallScriptwhatIfMessage -f ($itemInfo.Name, $itemInfo.Version) Assert ($content -and ($content -match $installShouldProcessMessage)) "Install script whatif message is missing, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript -ErrorAction SilentlyContinue -WarningAction SilentlyContinue Assert (-not $res) "Install-Script should not install the script with -WhatIf option" } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallScriptWithConfirmAndNoToPrompt" { $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 2 $content = $null try { $result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery -Confirm' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $itemInfo = Find-Script Fabrikam-ServerScript -Repository PSGallery $installShouldProcessMessage = $script:LocalizedData.InstallScriptwhatIfMessage -f ($itemInfo.Name, $itemInfo.Version) Assert ($content -and ($content -match $installShouldProcessMessage)) "Install script confirm prompt is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript -ErrorAction SilentlyContinue -WarningAction SilentlyContinue AssertNull $res "Install-Script should not install a script if Confirm is not accepted" } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallScriptWithConfirmAndYesToPrompt" { $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 0 $content = $null try { $result = ExecuteCommand $runspace 'Find-Script Fabrikam-ServerScript | Install-Script -Confirm' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $itemInfo = Find-Script Fabrikam-ServerScript -Repository PSGallery $installShouldProcessMessage = $script:LocalizedData.InstallScriptwhatIfMessage -f ($itemInfo.Name, $itemInfo.Version) Assert ($content -and ($content -match $installShouldProcessMessage)) "Install script confirm prompt is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script if Confirm is accepted, $res" } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It ValidateGetInstalledScriptCmdlet { $serverScriptName = 'Fabrikam-ServerScript' $clientScriptName = 'Fabrikam-ClientScript' Install-Script -Name $clientScriptName $res = Get-InstalledScript -Name $clientScriptName AssertEquals $res.Name $clientScriptName "Get-InstalledScript results are not expected, $res" Install-Script -Name $serverScriptName -RequiredVersion 1.0 -Force $scripts1 = Get-InstalledScript Assert ($scripts1.Count -ge 2) "Get-InstalledScript is not working properly" $res = Get-InstalledScript -Name $serverScriptName AssertEquals $res.Name $serverScriptName "Get-InstalledScript returned wrong script, $res" AssertEquals $res.Version "1.0" "Get-InstalledScript returned wrong script version, $res" Update-Script -Name $serverScriptName -RequiredVersion 2.0 $res2 = Get-InstalledScript -Name $serverScriptName -RequiredVersion "2.0" AssertEquals $res2.Name $serverScriptName "Get-InstalledScript returned wrong script after Update-Script, $res2" AssertEquals $res2.Version "2.0" "Get-InstalledScript returned wrong script version after Update-Script, $res2" $scripts2 = Get-InstalledScript AssertEquals $scripts1.count $scripts2.count "script count should be same before and after updating a script, before: $($scripts1.count), after: $($scripts2.count)" } } Describe PowerShell.PSGet.InstallScriptTests.P1 -Tags 'P1', 'OuterLoop' { if ($IsMacOS) { return } BeforeAll { SuiteSetup } AfterAll { SuiteCleanup } AfterEach { Get-InstalledScript -Name Fabrikam-Script -ErrorAction SilentlyContinue | Uninstall-Script -Force Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force Get-InstalledScript -Name Fabrikam-ClientScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } It "InstallScriptWithPrefixWildCard" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script *kam-ServerScript } ` -expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script' } It "InstallScriptWithPostfixWildCard" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScri* } ` -expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script' } It "InstallScriptWithWildCards" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script *abrikam-ServerScrip* } ` -expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script' } It "InstallScriptWithVersionParams" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScript -MinimumVersion 1.0 -RequiredVersion 5.0 } ` -expectedFullyQualifiedErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether,Install-Script" } It "InstallMultipleNamesWithReqVersion" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ClientScript, Fabrikam-ServerScript -RequiredVersion 2.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Install-Script" } It "InstallMultipleNamesWithMinVersion" { AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ClientScript, Fabrikam-ServerScript -MinimumVersion 2.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Install-Script" } It "InstallScriptShouldFailIfReqVersionNotAlreadyInstalled" { $scriptName = 'Fabrikam-ServerScript' $version = '1.5' Install-Script $scriptName -RequiredVersion $version $InstalledScriptInfo = Get-InstalledScript -Name $scriptName -RequiredVersion $version $wv = $null Install-Script $scriptName -RequiredVersion 2.0 -WarningAction SilentlyContinue -WarningVariable wv $message = $script:LocalizedData.ScriptAlreadyInstalled -f ($InstalledScriptInfo.Version, $InstalledScriptInfo.Name, $InstalledScriptInfo.InstalledLocation, $InstalledScriptInfo.Version, '2.0') if ($PSVersionTable.PSVersion -ge '5.0.0') { AssertEqualsCaseInsensitive $wv.Message $message "Install-Script should not re-install a script if it is already installed" } } ` -Skip:$($PSCulture -ne 'en-US') It "InstallScriptShouldFailIfMinVersionNotAlreadyInstalled" { $scriptName = 'Fabrikam-ServerScript' $version = '1.5' Install-Script $scriptName -RequiredVersion $version $InstalledScriptInfo = Get-InstalledScript -Name $scriptName -RequiredVersion $version $wv = $null Install-Script $scriptName -MinimumVersion 2.0 -WarningAction SilentlyContinue -WarningVariable wv $message = $script:LocalizedData.ScriptAlreadyInstalled -f ($InstalledScriptInfo.Version, $InstalledScriptInfo.Name, $InstalledScriptInfo.InstalledLocation, $InstalledScriptInfo.Version, '2.0') Assert ($message -match $scriptName) "Install-Script should not re-install a script if it is already installed, $($wv.Message)" } ` -Skip:$($PSCulture -ne 'en-US') It "InstallPackage_Script_AllUsers_NO_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers $null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 1 $content = $null try { $result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" } finally { Set-PATHVariableForScriptsInstallLocation -Scope AllUsers Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallPackage_Script_AllUsers_YES_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers $null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 0 $content = $null try { $result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" Assert (($env:PATH -split ';') -contains $script:ProgramFilesScriptsPath) "Install-Package should add AllUsers scope path to PATH environment variable." } finally { Set-PATHVariableForScriptsInstallLocation -Scope AllUsers Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallPackage_Script_AllUsers_NoPathUpdate_NoPromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers $null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -NoPathUpdate -Force $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res" Assert (($env:PATH -split ';') -notcontains $script:ProgramFilesScriptsPath) "Install-Package should add AllUsers scope path to PATH environment variable." } finally { Set-PATHVariableForScriptsInstallLocation -Scope AllUsers Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$($IsWindows -eq $false) It "InstallPackage_Script_Default_User_Force_NoPromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers $null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -Force $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res" if ($script:IsCoreCLR) { Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Package should add CurrentUser scope path to PATH environment variable." } else { Assert (($env:PATH -split ';') -contains $script:ProgramFilesScriptsPath) "Install-Package should add AllUsers scope path to PATH environment variable." } } finally { Set-PATHVariableForScriptsInstallLocation -Scope AllUsers Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$($IsWindows -eq $false) It "InstallPackage_Script_CurrentUser_NO_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser $null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 1 $content = $null try { $result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -Scope CurrentUser' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" } finally { Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It "InstallPackage_Script_CurrentUser_YES_toThePromptForAddingtoPATHVariable" { try { RemoveItem -Path $script:PSGetSettingsFilePath Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser $null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 0 $content = $null try { $result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -Scope CurrentUser' } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath) Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res" Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Script should add CurrentUser scope path to PATH environment variable." } finally { Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force } } ` -Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US')) It InstallAScriptFromUntrustedRepositoryAndNoToPrompt { try { Register-PSRepository -Name UntrustedTestRepo -SourceLocation $script:TempPath -ScriptSourceLocation $script:UntrustedRepoSourceLocation $scriptRepo = Get-PSRepository -Name UntrustedTestRepo AssertEqualsCaseInsensitive $scriptRepo.ScriptSourceLocation $script:UntrustedRepoSourceLocation "Test repository 'UntrustedTestRepo' is not registered properly" $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 if ($PSVersionTable.PSVersion -ge '4.0.0') { $Global:proxy.UI.ChoiceToMake = 2 } else { $Global:proxy.UI.ChoiceToMake = 1 } $content = $null try { $result = ExecuteCommand $runspace "Install-Script Fabrikam-ServerScript -Repository UntrustedTestRepo" } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $itemInfo = Find-Script Fabrikam-ServerScript $acceptPromptMessage = "Are you sure you want to install the scripts from" Assert ($content -and $content.Contains($acceptPromptMessage)) "Prompt for installing a script from an untrusted repository is not working, $content" $res = Get-InstalledScript Fabrikam-ServerScript -ErrorAction SilentlyContinue -WarningAction SilentlyContinue Assert (-not $res) "Install-Script should not install a script if prompt is not accepted" } finally { Get-PSRepository -Name UntrustedTestRepo -ErrorAction SilentlyContinue | Unregister-PSRepository -ErrorAction SilentlyContinue } } ` -Skip:$(($PSCulture -ne 'en-US') -or ($PSVersionTable.PSVersion -lt '4.0.0') -or ($PSEdition -eq 'Core')) It InstallAScriptFromUntrustedRepositoryAndYesToPrompt { try { Register-PSRepository -Name UntrustedTestRepo -SourceLocation $script:TempPath -ScriptSourceLocation $script:UntrustedRepoSourceLocation $scriptRepo = Get-PSRepository -Name UntrustedTestRepo AssertEqualsCaseInsensitive $scriptRepo.ScriptSourceLocation $script:UntrustedRepoSourceLocation "Test repository 'UntrustedTestRepo' is not registered properly" $outputPath = $script:TempPath $guid = [system.guid]::newguid().tostring() $outputFilePath = Join-Path $outputPath "$guid" $runspace = CreateRunSpace $outputFilePath 1 $Global:proxy.UI.ChoiceToMake = 0 $content = $null try { $result = ExecuteCommand $runspace "Install-Script Fabrikam-ServerScript -Repository UntrustedTestRepo" } finally { $fileName = "PromptForChoice-0.txt" $path = join-path $outputFilePath $fileName if (Test-Path $path) { $content = get-content $path } CloseRunSpace $runspace RemoveItem $outputFilePath } $acceptPromptMessage = "Are you sure you want to install the scripts from" Assert ($content -and $content.Contains($acceptPromptMessage)) "Prompt for installing a script from an untrusted repository is not working, $content" $res = Get-InstalledScript Fabrikam-ServerScript AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script if prompt is accepted, $res" } finally { Get-PSRepository -Name UntrustedTestRepo -ErrorAction SilentlyContinue | Unregister-PSRepository -ErrorAction SilentlyContinue } } ` -Skip:$(($PSCulture -ne 'en-US') -or ($PSVersionTable.PSVersion -lt '4.0.0') -or ($PSEdition -eq 'Core')) It ValidateGetInstalledScriptWithMultiNamesAndRequiredVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript, Fabrikam-ServerScript -RequiredVersion 3.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript" } It ValidateGetInstalledScriptWithMultiNamesAndMinVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript, Fabrikam-ServerScript -MinimumVersion 3.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript" } It ValidateGetInstalledScriptWithMultiNamesAndMaxVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript, Fabrikam-ServerScript -MaximumVersion 3.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript" } It ValidateGetInstalledScriptWithSingleWildcardNameAndRequiredVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-Client*ipt -RequiredVersion 3.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript" } It ValidateGetInstalledScriptWithSingleWildcardNameAndMinVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-Client*ipt -MinimumVersion 3.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript" } It ValidateGetInstalledScriptWithSingleWildcardNameAndMaxVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-Client*ipt -MaximumVersion 3.0 } ` -expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript" } It ValidateGetInstalledScriptWithSingleNameRequiredandMinVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript -RequiredVersion 3.0 -MinimumVersion 1.0 } ` -expectedFullyQualifiedErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether,Get-InstalledScript" } It ValidateGetInstalledScriptWithSingleNameRequiredandMaxVersion { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript -RequiredVersion 3.0 -MaximumVersion 1.0 } ` -expectedFullyQualifiedErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether,Get-InstalledScript" } It ValidateGetInstalledScriptWithSingleNameInvalidMinMaxRange { AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript -MinimumVersion 3.0 -MaximumVersion 1.0 } ` -expectedFullyQualifiedErrorId "MinimumVersionIsGreaterThanMaximumVersion,Get-InstalledScript" } It InstallScriptWithIncludeDependencies { $ScriptName = 'Script-WithDependencies1' $DepencyNames = @() $DepScriptDetails = $null $DepModuleDetails = $null try { $res1 = Find-Script -Name $ScriptName -MaximumVersion "1.0" -MinimumVersion "0.1" AssertEquals $res1.Name $ScriptName "Find-Script didn't find the exact script which has dependencies, $res1" $DepencyNames = $res1.Dependencies.Name $res2 = Find-Script -Name $ScriptName -IncludeDependencies -MaximumVersion "1.0" -MinimumVersion "0.1" Assert ($res2.Count -ge ($DepencyNames.Count + 1)) "Find-Script with -IncludeDependencies returned wrong results, $res2" Install-Script -Name $ScriptName -MaximumVersion "1.0" -MinimumVersion "0.1" $ActualScriptDetails = Get-InstalledScript -Name $ScriptName -RequiredVersion $res1.Version AssertNotNull $ActualScriptDetails "$ScriptName script with dependencies is not installed properly" $DepScriptDetails = Get-InstalledScript -Name $DepencyNames -ErrorAction SilentlyContinue $DepModuleDetails = Get-InstalledModule -Name $DepencyNames -ErrorAction SilentlyContinue $DepencyNames | ForEach-Object { if ((-not $DepScriptDetails -or $DepScriptDetails.Name -notcontains $_) -and (-not $DepModuleDetails -or $DepModuleDetails.Name -notcontains $_)) { Assert $false "Script dependency $_ is not installed" } } } finally { Uninstall-Script -ErrorAction SilentlyContinue $ScriptName $DepScriptDetails | ForEach-Object { Uninstall-Script $_.Name -Force -ErrorAction SilentlyContinue } $DepModuleDetails | ForEach-Object { PowerShellGet\Uninstall-Module $_.Name -Force -ErrorAction SilentlyContinue } } } ` -Skip:$($PSVersionTable.PSVersion -lt '5.0.0') It SaveScriptNameWithDependencies { try { $ScriptName = 'Script-WithDependencies1' $res1 = Find-Script -Name $ScriptName -RequiredVersion '1.0' -IncludeDependencies Save-Script -Name $ScriptName -MaximumVersion '1.0' -MinimumVersion '0.1' $script:TempSavePath $res1.Name | ForEach-Object { $artifactPath = Join-Path -Path $script:TempSavePath -ChildPath $_ if (-not (Test-Path -Path $artifactPath -PathType Container) -and -not (Test-Path -Path "$artifactPath.ps1" -PathType Leaf)) { Assert $false "$_ is not saved with the Save-Script -Name $ScriptName" } } } finally { Remove-Item -Path "$script:TempSavePath\*" -Recurse -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue } } It SaveScriptWithFindScriptOutput { try { $ScriptName = "Script-WithDependencies1" $res1 = Find-Script -Name $ScriptName -RequiredVersion '2.0' -IncludeDependencies Find-Script -Name $ScriptName -RequiredVersion '2.0' | Save-Script -LiteralPath $script:TempSavePath $res1.Name | ForEach-Object { $artifactPath = Join-Path -Path $script:TempSavePath -ChildPath $_ if (-not (Test-Path -Path $artifactPath -PathType Container) -and -not (Test-Path -Path "$artifactPath.ps1" -PathType Leaf)) { Assert $false "$_ is not saved with the Save-Script -Name $ScriptName" } } } finally { Remove-Item -Path "$script:TempSavePath\*" -Recurse -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue } } It GetInstalledScriptWithWildcard { $ScriptNames = 'Fabrikam-Script', 'Fabrikam-ServerScript', 'Fabrikam-ClientScript' Install-Script -Name $ScriptNames $res1 = Get-InstalledScript -Name $ScriptNames[0] AssertEquals $res1.Name $ScriptNames[0] "Get-InstalledScript didn't return the exact script, $res1" $res2 = Get-InstalledScript -Name "Fabrikam*" AssertEquals $res2.count $ScriptNames.Count "Get-InstalledScript didn't return the $ScriptNames scripts, $res2" } It InstallScriptWithSameLocationRegisteredWithNuGetProvider { $ScriptName = 'Fabrikam-ServerScript' $TempNuGetSourceName = "$(Get-Random)" $RepositoryName = "PSGallery" Register-PackageSource -Provider nuget -Name $TempNuGetSourceName -Location $Global:PSGallerySourceUri -Trusted try { Install-Script -Name $ScriptName -Repository $RepositoryName $res1 = Get-InstalledScript -Name $ScriptName AssertEquals $res1.Name $ScriptName "Get-InstalledScript didn't return the exact script, $res1" AssertEquals $res1.RepositorySourceLocation $Global:PSGallerySourceUri "PSGetItemInfo object was created with wrong RepositorySourceLocation" AssertEquals $res1.Repository $RepositoryName "PSGetItemInfo object was created with wrong repository name" $expectedInstalledLocation = $script:ProgramFilesScriptsPath if ($script:IsCoreCLR) { $expectedInstalledLocation = $script:MyDocumentsScriptsPath } AssertEquals $res1.InstalledLocation $expectedInstalledLocation "Invalid InstalledLocation value on PSGetItemInfo object" } finally { Unregister-PackageSource -ProviderName NuGet -Name $TempNuGetSourceName -Force } } It ScriptCmdletsWithoutScriptSourceLocation { try { Register-PSRepository -Name TestRepo -SourceLocation https://www.nuget.org/api/v2 $scriptRepo = Get-PSRepository -Name TestRepo Assert (-not $scriptRepo.ScriptSourceLocation) "Test repository 'TestRepo' is not registered properly" Assert (-not $scriptRepo.ScriptPublishLocation) "Test repository 'TestRepo' is not registered properly" $repoName = 'TestRepo' AssertFullyQualifiedErrorIdEquals -scriptblock { Find-Script -Name TestScriptName -Repository $repoName } ` -expectedFullyQualifiedErrorId 'ScriptSourceLocationIsMissing,Find-Script' AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script -Name TestScriptName -Repository $repoName } ` -expectedFullyQualifiedErrorId 'ScriptSourceLocationIsMissing,Install-Script' AssertFullyQualifiedErrorIdEquals -scriptblock { Save-Script -Name TestScriptName -Repository $repoName -Path $script:TempPath } ` -expectedFullyQualifiedErrorId 'ScriptSourceLocationIsMissing,Save-Script' $wv = $null Find-Package -Name TestScriptName -Source $repoName -ProviderName PowerShellGet -Type Script -WarningVariable wv -ErrorAction SilentlyContinue -WarningAction SilentlyContinue $message = $script:LocalizedData.ScriptSourceLocationIsMissing -f ($repoName) AssertEquals $wv.Message $message "Find-Package should throw a warning message when the specified source doesnt have a valid ScriptSourceLocation" } finally { Get-PSRepository -Name TestRepo -ErrorAction SilentlyContinue | Unregister-PSRepository -ErrorAction SilentlyContinue } } ` -Skip:$($PSCulture -ne 'en-US') It "Get-InstalledScript cmdlet with leading zeros in RequiredVersion value" { $scriptName = 'Fabrikam-ServerScript' $version = '1.2' Install-Script $scriptName -RequiredVersion $version $res = Get-InstalledScript $scriptName -RequiredVersion '1.02' $res.Name | Should Be $scriptName $res.Version | Should Be $version $res = Get-InstalledScript $scriptName -RequiredVersion $version $res.Version | Should Be $version } }
combined_dataset/train/non-malicious/sample_23_21.ps1
sample_23_21.ps1
# region Generated # ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- # Load required Az.Accounts module $accountsName = 'Az.Accounts' $accountsModule = Get-Module -Name $accountsName if(-not $accountsModule) { $localAccountsPath = Join-Path $PSScriptRoot 'generated\modules' if(Test-Path -Path $localAccountsPath) { $localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1 if($localAccounts) { $accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru } } if(-not $accountsModule) { $hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0 if($hasAdequateVersion) { $accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru } } } if(-not $accountsModule) { Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop } elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) { Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop } Write-Information "Loaded Module '$($accountsModule.Name)'" # Load the private module dll $null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.ResourceMover.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.ResourceMover.Module]::Instance # Ask for the shared functionality table $VTable = Register-AzModule # Tweaks the pipeline on module load $instance.OnModuleLoad = $VTable.OnModuleLoad # Following two delegates are added for telemetry $instance.GetTelemetryId = $VTable.GetTelemetryId $instance.Telemetry = $VTable.Telemetry # Delegate to sanitize the output object $instance.SanitizeOutput = $VTable.SanitizerHandler # Delegate to get the telemetry info $instance.GetTelemetryInfo = $VTable.GetTelemetryInfo # Tweaks the pipeline per call $instance.OnNewRequest = $VTable.OnNewRequest # Gets shared parameter values $instance.GetParameterValue = $VTable.GetParameterValue # Allows shared module to listen to events from this module $instance.EventListener = $VTable.EventListener # Gets shared argument completers $instance.ArgumentCompleter = $VTable.ArgumentCompleter # The name of the currently selected Azure profile $instance.ProfileName = $VTable.ProfileName # Load the custom module $customModulePath = Join-Path $PSScriptRoot './custom/Az.ResourceMover.custom.psm1' if(Test-Path $customModulePath) { $null = Import-Module -Name $customModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = Join-Path $PSScriptRoot './exports' $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # Finalize initialization of this module $instance.Init(); Write-Information "Loaded Module '$($instance.Name)'" # endregion # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCz6r4dgXAhEeoy # Hk+5l0PkrW+RjeVQBxheEB8tp8earaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDZP2xkIuVcsjfsgMhn+B9uB # nVtmxTTL1NB5eOV6uE/PMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAeyiTpNA38oWkGIPQkLbSUaPM0c2XAGE4GiqtS3i1e0xEjYfPZqoUegKW # nahhm9Fb/yzgcyO5vljoUkxZFlk8or0sHsJiret31KarjZqXu96Qp7vizVG6wySE # BvbmsjO47tTcJlq9MIeshXXR441bMnbsCksEGGlXZTvwu921UP6NXgkQk7ZCFy6s # jOSjMxxcVxSQ28rPzP5a9hDn16yDxge1NI+GGEWR8pukBW/X0zWTY6BVueuM4T4I # DAtmfrYVDRUQ71WU6gsud3L14uY9k2gAWu6R6IdH49kSIc3FFqRIkcex9e2v2B/3 # L/per+7hjion7DgUsBrHuFFqWxXLCKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBmetiisBDNOBONByTMz+7PK08RRdrce0D+X48wN5U9lAIGZh+4i4lN # GBMyMDI0MDQyMzEzMTUyMy44OThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQyNDE5NTIzNlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU6jAHAgEAAgIRVDAKAgUA # 6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACaiRtshc9G8WfVMjQ9x # gEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3MxkStXHAb2esRYvBMPDXsgq # +NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/PkN2nsimpupdSo/lnOZCf # y706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQglNHrYCI5tlg2/+DRuAEtsUCsipPnAo3rlUiszmUvwSYwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azXdqy22buGhS1oKaTDDm+J # MA0GCSqGSIb3DQEBCwUABIICACUoe4Fkokbefvz4lpkVTFoKCLKLirUTmNoYHYJj # xV1djwwcWq2v+wHU8DffwX3k//r4wvgb1S98DhaUCtKoUxkXVEhVcVizY6MBDUpC # djxriSZIDqnDOctF2SGwBFkmRDowW4fzUvMMbIvNOAaDWQss1kcTAswF/CFcInr5 # 1y7ktnrMVoElPyijSdZZvWkBDBoZNdpVVZqZtF9ZRo+/zi0ZUDjsJeS1PMB1qX/M # /N1p2doHUFqqB6EF75yvNGmRQSTPiH0UF7ZXKjFsWExuG7C0aH+wiPYLeBPDwuBT # x34prOFW37kACgXTcEJDZvUChJ2mCRGZ6+3HX2WPU9flDFfFCaoWTRtkOAUwLnju # XJd/tX7GXnpQANc2Cmc1jPO1sM50/lhqJuO0mh+JY1Zq5B0bEfHCrhMqakqnfBpw # jFB5oKzOLJAr05/em2xRhdEHBbZ/3OKWc9k24Pl/XmVX/zw/SqHEdTdzxsOO4Xrt # OiB6NePrw8RArxqtkjbibHPQGgNch6DJ3XdboBicRMyAK4Nc8vmK4MKMCEggj/5i # AeV/CVvHrLTOzbryP5kRecZHuakJ4l1ADEr+HwqcJvsdO77klvlj9bvORHyLn23h # PSHzoWgzcWhXNybDMWE2aIlvLS6Dv37cs8LYChnIdFPqLjloM/sIkd006lSVvGDk # 7/tO # SIG # End signature block
combined_dataset/train/non-malicious/Read-Choice_3.ps1
Read-Choice_3.ps1
# function Read-Choice { #.Synopsis # Prompt the user for a choice, and return the (0-based) index of the selected item #.Parameter Message # This is the prompt that will be presented to the user. Basically, the question you're asking. #.Parameter Choices # An array of strings representing the choices (or menu items), with optional ampersands (&) in them to mark (unique) characters which can be used to select each item. #.Parameter ChoicesWithHelp # A Hashtable where the keys represent the choices (or menu items), with optional ampersands (&) in them to mark (unique) characters which can be used to select each item, and the values represent help text to be displayed to the user when they ask for help making their decision. #.Parameter Default # The (0-based) index of the menu item to select by default (defaults to zero). #.Parameter MultipleChoice # Prompt the user to select more than one option. This changes the prompt display for the default PowerShell.exe host to show the options in a column and allows them to choose multiple times. # Note: when you specify MultipleChoice you may also specify multiple options as the default! #.Parameter Caption # An additional caption that can be displayed (usually above the Message) as part of the prompt #.Parameter Passthru # Causes the Choices objects to be output instead of just the indexes #.Example # Read-Choice "WEBPAGE BUILDER MENU" "&Create Webpage","&View HTML code","&Publish Webpage","&Remove Webpage","E&xit" #.Example # [bool](Read-Choice "Do you really want to do this?" "&No","&Yes" -Default 1) # # This example takes advantage of the 0-based index to convert No (0) to False, and Yes (1) to True. It also specifies YES as the default, since that's the norm in PowerShell. #.Example # Read-Choice "Do you really want to delete them all?" @{"&No"="Do not delete all files. You will be prompted to delete each file individually."; "&Yes"="Confirm that you want to delete all of the files"} # # Note that with hashtables, order is not guaranteed, so "Yes" will probably be the first item in the prompt, and thus will output as index 0. Because of thise, when a hashtable is passed in, we default to Passthru output. [CmdletBinding(DefaultParameterSetName="HashtableWithHelp")] param( [Parameter(Mandatory=$true, Position = 10, ParameterSetName="HashtableWithHelp")] [Hashtable]$ChoicesWithHelp , [Parameter(Mandatory=$true, Position = 10, ParameterSetName="StringArray")] [String[]]$Choices , [Parameter(Mandatory=$False)] [string]$Caption = "Please choose!" , [Parameter(Mandatory=$False, Position=0)] [string]$Message = "Choose one of the following options:" , [Parameter(Mandatory=$False)] [int[]]$Default = 0 , [Switch]$MultipleChoice , [Switch]$Passthru ) begin { if($ChoicesWithHelp) { [System.Collections.DictionaryEntry[]]$choices = $ChoicesWithHelp.GetEnumerator() | %{$_} } } process { $Descriptions = [System.Management.Automation.Host.ChoiceDescription[]]( $( if($choices -is [String[]]) { foreach($choice in $choices) { New-Object System.Management.Automation.Host.ChoiceDescription $choice } } else { foreach($choice in $choices) { New-Object System.Management.Automation.Host.ChoiceDescription $choice.Key, $choice.Value } } ) ) # Passing an array as the $Default triggers multiple choice prompting. if(!$MultipleChoice) { [int]$Default = $Default[0] } [int[]]$Answer = $Host.UI.PromptForChoice($Caption,$Message,$Descriptions,$Default) if($Passthru -or !($choices -is [String[]])) { Write-Verbose "$Answer" Write-Output $Descriptions[$Answer] } else { Write-Output $Answer } } # }
combined_dataset/train/non-malicious/3407.ps1
3407.ps1
function Test-VirtualMachineBootDiagnostics { $rgname = Get-ComputeTestResourceName try { $loc = Get-ComputeVMLocation; New-AzureRmResourceGroup -Name $rgname -Location $loc -Force; $vmsize = 'Standard_A4'; $vmname = 'vm' + $rgname; $p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; $subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $pubipId = $pubip.Id; $nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; $p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true; $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd"; $dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd"; $p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; $p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty; $p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty; Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; Assert-AreEqual $p.StorageProfile.DataDisks.Count 2; Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10; Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1; Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1; Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly'; Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11; Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2; Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; $imgRef = Get-DefaultCRPImage -loc $loc; $p = ($imgRef | Set-AzureRmVMSourceImage -VM $p); Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname; Assert-AreEqual $vm1.Name $vmname; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $vm1.OSProfile.AdminUsername $user; Assert-AreEqual $vm1.OSProfile.ComputerName $computerName; Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize; Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled; Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri; Wait-Seconds 600; $localpath = (Get-Item -Path ".\" -Verbose).FullName Get-AzureRmVMBootDiagnosticsData -Windows -ResourceGroupName $rgname -Name $vmname -LocalPath $localpath; Remove-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Force; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/linuxos.vhd"; $osDiskName = 'linuxOsDisk'; $p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize; $p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId; $p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; $imgRef = Get-DefaultCRPLinuxImageOffline; $p = Set-AzureRMVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred $p = ($imgRef | Set-AzureRMVMSourceImage -VM $p); New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname; Assert-AreEqual $vm1.Name $vmname; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $vm1.OSProfile.AdminUsername $user; Assert-AreEqual $vm1.OSProfile.ComputerName $computerName; Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize; Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled; Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri; Wait-Seconds 600; $bddata = Get-AzureRmVMBootDiagnosticsData -Linux -ResourceGroupName $rgname -Name $vmname | Out-String; Write-Output("BootDiagnosticsData:"); Write-Output($bddata); } finally { Clean-ResourceGroup $rgname } } function Test-VirtualMachineBootDiagnosticsPremium { $rgname = Get-ComputeTestResourceName try { $loc = Get-ComputeVMLocation; New-AzureRMResourceGroup -Name $rgname -Location $loc -Force; $vmsize = 'Standard_DS1'; $vmname = 'vm' + $rgname; $p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; $subnet = New-AzureRMVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzureRMVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzureRMVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzureRMPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzureRMPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $pubipId = $pubip.Id; $nic = New-AzureRMNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzureRMNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; $p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId -Primary; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true; $stoname = 'sto' + $rgname; $stotype = 'Premium_LRS'; New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname; $osDiskName = 'osDisk'; $osDiskCaching = 'None'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $p = Set-AzureRMVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; $imgRef = Get-DefaultCRPImage -loc $loc; $p = ($imgRef | Set-AzureRMVMSourceImage -VM $p); Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname; Assert-AreEqual $vm1.Name $vmname; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $vm1.OSProfile.AdminUsername $user; Assert-AreEqual $vm1.OSProfile.ComputerName $computerName; Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize; Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled; Assert-AreNotEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri; } finally { Clean-ResourceGroup $rgname } } function Test-LinuxVirtualMachineBootDiagnostics { $rgname = Get-ComputeTestResourceName try { $loc = Get-ComputeVMLocation; New-AzureRMResourceGroup -Name $rgname -Location $loc -Force; $vmsize = 'Standard_A4'; $vmname = 'vm' + $rgname; $p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; $subnet = New-AzureRMVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzureRMVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzureRMVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzureRMPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzureRMPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $pubipId = $pubip.Id; $nic = New-AzureRMNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzureRMNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $imgRef = Get-DefaultCRPLinuxImageOffline; $p = Set-AzureRMVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred $p = ($imgRef | Set-AzureRMVMSourceImage -VM $p); Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname; Assert-AreEqual $vm1.Name $vmname; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $vm1.OSProfile.AdminUsername $user; Assert-AreEqual $vm1.OSProfile.ComputerName $computerName; Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize; Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled; Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri; Remove-AzureRMVM -Name $vmname -ResourceGroupName $rgname -Force; } finally { Clean-ResourceGroup $rgname } } function Test-VirtualMachineBootDiagnosticsSet { $rgname = Get-ComputeTestResourceName try { $loc = Get-ComputeVMLocation; New-AzureRMResourceGroup -Name $rgname -Location $loc -Force; $vmsize = 'Standard_A4'; $vmname = 'vm' + $rgname; $p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; $subnet = New-AzureRMVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzureRMVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzureRMVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzureRMPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzureRMPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $pubipId = $pubip.Id; $nic = New-AzureRMNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzureRMNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; $p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId -Primary; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true; $stoname = 'sto' + $rgname; $stotype = 'Standard_GRS'; New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname; $stoname2 = $stoname + 'add'; $stotype2 = 'Standard_GRS'; New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname2 -Location $loc -Type $stotype2; $stoaccount2 = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname2; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching; Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName; Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $p = Set-AzureRMVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; $imgRef = Get-DefaultCRPImage -loc $loc; $p = ($imgRef | Set-AzureRMVMSourceImage -VM $p); Assert-AreEqual $p.OSProfile.AdminUsername $user; Assert-AreEqual $p.OSProfile.ComputerName $computerName; Assert-AreEqual $p.OSProfile.AdminPassword $password; Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version; $p = Set-AzureRMVMBootDiagnostics -VM $p -Enable -ResourceGroupName $rgname -StorageAccountName $stoname2; New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname; Assert-AreEqual $vm1.Name $vmname; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $vm1.OSProfile.AdminUsername $user; Assert-AreEqual $vm1.OSProfile.ComputerName $computerName; Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize; Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled; Assert-AreEqual $stoaccount2.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri; $vm1 | Set-AzureRMVMBootDiagnostics -Disable | Update-AzureRMVM $vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname; Assert-AreEqual $vm1.Name $vmname; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1; Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId; Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer; Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName; Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus; Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version; Assert-AreEqual $vm1.OSProfile.AdminUsername $user; Assert-AreEqual $vm1.OSProfile.ComputerName $computerName; Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize; Assert-AreEqual $false $vm1.DiagnosticsProfile.BootDiagnostics.Enabled; Assert-AreEqual $stoaccount2.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/sample_2_71.ps1
sample_2_71.ps1
ConvertFrom-StringData @' id_printerkb2457866check=Checking for KB 2457866 id_printerkb2457866checkdesc=Checking for Event 602 on Microsoft-Windows-PrintService/Admin Event Log '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD4z38Odo/5fC0S # +L8lJFf/TG06dJX9A8ccGfeayvYnTqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJZovBLz5ME42R+Lye+L/KDs # qOBh9PyTmo03LVOnzTdUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAMSPtAbzvKeMIeyNvQMmmlDjPBalrieAuL145Sk9ajR6/f1v9XdJr1OM0 # kuPmUkFFbVgXRIrIHZBv1fPmxVXsNtwLNtg0dkVFWVUCPYj2luQjtfTrb5H1KNVP # bNfLtp9e5hpAe3we18pVpKC42i2lio+VkBtjMHKsrT3lLsq4hdehiGHAIih9rGwV # Cz5cd0xsrR1orEwU/YcfSJ/6I8jjDIxB5Ag3l9ajh1v2Rlb2NlgQgYa50uMPYPyY # gSwj2W3JHPTi+FNZPNKQ7GHjHYEiGESUfdFKra++X41UMqu9XOF9yiu/1/wbBmcw # ik3Hp6rnLDNDFKKJx7a4e+/QC6zsWKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDKk295sbBHHVAOczb44OxpNp7sfKlm0iRS2uqeNC7ftwIGZuto66JQ # GBMyMDI0MTAyODExNDA0MS45NjFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0 # Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx # guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv # qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD # eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8 # ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p # 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa # HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD # PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd # uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D # kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV # oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3 # RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj # fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ # 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj # ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX # pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T # ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw # HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57 # rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf # 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v # DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2 # BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh # uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU # vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk # 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7 # nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR # jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY # dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu # nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608 # ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgCH/G9vot # 9a51G7xCN1d6LfLOBAne4yXtRV5xjC9QNNIwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA # AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3 # DQEBCwUABIICAFCaTdJUyGbXA7guzKDgNsYNyMdo+GdCM4c+gWtVI6MCQsy5v3s4 # EwHXubRxMKPY6ZxE0Zsc+HxWqwQoppvWvGOjaqEOhnoUmSSYRzf8nK59OwYiJCZU # Ug7yAjNk7+Wj3suxS5mobQjPgOkaY/m0/BzbI0z0zz2c8s2D9HfnvsKbdwfwiYvQ # iGvcPBx+UGPhWGUiaJpwtuXBvmh6FDUQxxfSZ2l/7hNE0DfdpYhfXJCSQU1/qT24 # 0pi2AEcqzLT2RQJzoC7jISU5BhqJSEFBgInwpMWaMBRdc2d7rNuH37ZJNsWuP0Vw # /rJ+mycjXxmBA3+r2lWVFYAcCTjJ08u4VcATI3fhmJ7ahqpUQf++NPu7BYzfJpUs # HGTlOJWUU/WgvDbOrxjE3yqPdkYJu+p8+ni5Ez5XacC776EIH6wYiCfYFiAoH7Mv # D1fxaVJnwNDWIjR/5qM5nrnugIaVnoNddvH8uyaaldIFKGfdWqnguj9IieZw41ur # fdkfiUWVf32IQNYX+0Q9A+A2FplCz5fS/wp+PSUG7ZuGrBWLJSPvQf87QID8XgLh # M1pPTJ8ebVnC0QbQcf96vgqfZ4AwcfrfTz6XDWARZOO9CgQf6+jOgeIAgLRtiNqu # OYw+UK+J0KEkKjjGx8d3pRMouR53Uv/XocPwTEjCQTmrTo9vb0nJoWhf # SIG # End signature block
combined_dataset/train/non-malicious/sample_16_3.ps1
sample_16_3.ps1
/* Language: PowerShell Description: PowerShell is a task-based command-line shell and scripting language built on .NET. Author: David Mohundro <david@mohundro.com> Contributors: Nicholas Blumhardt <nblumhardt@nblumhardt.com>, Victor Zhou <OiCMudkips@users.noreply.github.com>, Nicolas Le Gall <contact@nlegall.fr> Website: https://docs.microsoft.com/en-us/powershell/ Category: scripting */ function powershell(hljs) { const TYPES = [ "string", "char", "byte", "int", "long", "bool", "decimal", "single", "double", "DateTime", "xml", "array", "hashtable", "void" ]; // https://docs.microsoft.com/en-us/powershell/scripting/developer/cmdlet/approved-verbs-for-windows-powershell-commands const VALID_VERBS = 'Add|Clear|Close|Copy|Enter|Exit|Find|Format|Get|Hide|Join|Lock|' + 'Move|New|Open|Optimize|Pop|Push|Redo|Remove|Rename|Reset|Resize|' + 'Search|Select|Set|Show|Skip|Split|Step|Switch|Undo|Unlock|' + 'Watch|Backup|Checkpoint|Compare|Compress|Convert|ConvertFrom|' + 'ConvertTo|Dismount|Edit|Expand|Export|Group|Import|Initialize|' + 'Limit|Merge|Mount|Out|Publish|Restore|Save|Sync|Unpublish|Update|' + 'Approve|Assert|Build|Complete|Confirm|Deny|Deploy|Disable|Enable|Install|Invoke|' + 'Register|Request|Restart|Resume|Start|Stop|Submit|Suspend|Uninstall|' + 'Unregister|Wait|Debug|Measure|Ping|Repair|Resolve|Test|Trace|Connect|' + 'Disconnect|Read|Receive|Send|Write|Block|Grant|Protect|Revoke|Unblock|' + 'Unprotect|Use|ForEach|Sort|Tee|Where'; const COMPARISON_OPERATORS = '-and|-as|-band|-bnot|-bor|-bxor|-casesensitive|-ccontains|-ceq|-cge|-cgt|' + '-cle|-clike|-clt|-cmatch|-cne|-cnotcontains|-cnotlike|-cnotmatch|-contains|' + '-creplace|-csplit|-eq|-exact|-f|-file|-ge|-gt|-icontains|-ieq|-ige|-igt|' + '-ile|-ilike|-ilt|-imatch|-in|-ine|-inotcontains|-inotlike|-inotmatch|' + '-ireplace|-is|-isnot|-isplit|-join|-le|-like|-lt|-match|-ne|-not|' + '-notcontains|-notin|-notlike|-notmatch|-or|-regex|-replace|-shl|-shr|' + '-split|-wildcard|-xor'; const KEYWORDS = { $pattern: /-?[A-z\.\-]+\b/, keyword: 'if else foreach return do while until elseif begin for trap data dynamicparam ' + 'end break throw param continue finally in switch exit filter try process catch ' + 'hidden static parameter', // "echo" relevance has been set to 0 to avoid auto-detect conflicts with shell transcripts built_in: 'ac asnp cat cd CFS chdir clc clear clhy cli clp cls clv cnsn compare copy cp ' + 'cpi cpp curl cvpa dbp del diff dir dnsn ebp echo|0 epal epcsv epsn erase etsn exsn fc fhx ' + 'fl ft fw gal gbp gc gcb gci gcm gcs gdr gerr ghy gi gin gjb gl gm gmo gp gps gpv group ' + 'gsn gsnp gsv gtz gu gv gwmi h history icm iex ihy ii ipal ipcsv ipmo ipsn irm ise iwmi ' + 'iwr kill lp ls man md measure mi mount move mp mv nal ndr ni nmo npssc nsn nv ogv oh ' + 'popd ps pushd pwd r rbp rcjb rcsn rd rdr ren ri rjb rm rmdir rmo rni rnp rp rsn rsnp ' + 'rujb rv rvpa rwmi sajb sal saps sasv sbp sc scb select set shcm si sl sleep sls sort sp ' + 'spjb spps spsv start stz sujb sv swmi tee trcm type wget where wjb write' // TODO: 'validate[A-Z]+' can't work in keywords }; const TITLE_NAME_RE = /\w[\w\d]*((-)[\w\d]+)*/; const BACKTICK_ESCAPE = { begin: '`[\\s\\S]', relevance: 0 }; const VAR = { className: 'variable', variants: [ { begin: /\$\B/ }, { className: 'keyword', begin: /\$this/ }, { begin: /\$[\w\d][\w\d_:]*/ } ] }; const LITERAL = { className: 'literal', begin: /\$(null|true|false)\b/ }; const QUOTE_STRING = { className: "string", variants: [ { begin: /"/, end: /"/ }, { begin: /@"/, end: /^"@/ } ], contains: [ BACKTICK_ESCAPE, VAR, { className: 'variable', begin: /\$[A-z]/, end: /[^A-z]/ } ] }; const APOS_STRING = { className: 'string', variants: [ { begin: /'/, end: /'/ }, { begin: /@'/, end: /^'@/ } ] }; const PS_HELPTAGS = { className: "doctag", variants: [ /* no paramater help tags */ { begin: /\.(synopsis|description|example|inputs|outputs|notes|link|component|role|functionality)/ }, /* one parameter help tags */ { begin: /\.(parameter|forwardhelptargetname|forwardhelpcategory|remotehelprunspace|externalhelp)\s+\S+/ } ] }; const PS_COMMENT = hljs.inherit( hljs.COMMENT(null, null), { variants: [ /* single-line comment */ { begin: /#/, end: /$/ }, /* multi-line comment */ { begin: /<#/, end: /#>/ } ], contains: [ PS_HELPTAGS ] } ); const CMDLETS = { className: 'built_in', variants: [ { begin: '('.concat(VALID_VERBS, ')+(-)[\\w\\d]+') } ] }; const PS_CLASS = { className: 'class', beginKeywords: 'class enum', end: /\s*[{]/, excludeEnd: true, relevance: 0, contains: [ hljs.TITLE_MODE ] }; const PS_FUNCTION = { className: 'function', begin: /function\s+/, end: /\s*\{|$/, excludeEnd: true, returnBegin: true, relevance: 0, contains: [ { begin: "function", relevance: 0, className: "keyword" }, { className: "title", begin: TITLE_NAME_RE, relevance: 0 }, { begin: /\(/, end: /\)/, className: "params", relevance: 0, contains: [ VAR ] } // CMDLETS ] }; // Using statment, plus type, plus assembly name. const PS_USING = { begin: /using\s/, end: /$/, returnBegin: true, contains: [ QUOTE_STRING, APOS_STRING, { className: 'keyword', begin: /(using|assembly|command|module|namespace|type)/ } ] }; // Comperison operators & function named parameters. const PS_ARGUMENTS = { variants: [ // PS literals are pretty verbose so it's a good idea to accent them a bit. { className: 'operator', begin: '('.concat(COMPARISON_OPERATORS, ')\\b') }, { className: 'literal', begin: /(-){1,2}[\w\d-]+/, relevance: 0 } ] }; const HASH_SIGNS = { className: 'selector-tag', begin: /@\B/, relevance: 0 }; // It's a very general rule so I'll narrow it a bit with some strict boundaries // to avoid any possible false-positive collisions! const PS_METHODS = { className: 'function', begin: /\[.*\]\s*[\w]+[ ]??\(/, end: /$/, returnBegin: true, relevance: 0, contains: [ { className: 'keyword', begin: '('.concat( KEYWORDS.keyword.toString().replace(/\s/g, '|' ), ')\\b'), endsParent: true, relevance: 0 }, hljs.inherit(hljs.TITLE_MODE, { endsParent: true }) ] }; const GENTLEMANS_SET = [ // STATIC_MEMBER, PS_METHODS, PS_COMMENT, BACKTICK_ESCAPE, hljs.NUMBER_MODE, QUOTE_STRING, APOS_STRING, // PS_NEW_OBJECT_TYPE, CMDLETS, VAR, LITERAL, HASH_SIGNS ]; const PS_TYPE = { begin: /\[/, end: /\]/, excludeBegin: true, excludeEnd: true, relevance: 0, contains: [].concat( 'self', GENTLEMANS_SET, { begin: "(" + TYPES.join("|") + ")", className: "built_in", relevance: 0 }, { className: 'type', begin: /[\.\w\d]+/, relevance: 0 } ) }; PS_METHODS.contains.unshift(PS_TYPE); return { name: 'PowerShell', aliases: [ "pwsh", "ps", "ps1" ], case_insensitive: true, keywords: KEYWORDS, contains: GENTLEMANS_SET.concat( PS_CLASS, PS_FUNCTION, PS_USING, PS_ARGUMENTS, PS_TYPE ) }; } module.exports = powershell;
combined_dataset/train/non-malicious/sample_26_65.ps1
sample_26_65.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Get-AMTAccessMonitor { <# .Synopsis Returns Intel Active Management Technology access events .Description This Cmdlet returns the Intel Active Management Technology (AMT) access events from clients that have Intel Active Management Technology firmware version 3.2 or higher. .Notes Supported AMT Firmware Versions: This Cmdlet supports AMT firmware version 3.2 or higher. AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Get-AMTAccessMonitor -computername:vProClient ComputerName : vProClient TimeStamp : 1/01/2011 11:46:55 PM Message : AMT Provisioning Started Location : User : .Example Get-AMTAccessMonitor vProClient -Credential $amtcred - TLS -CertificateName "myCertificate" | Format-Table ComputerName TimeStamp Message Location User ------------ --------- ------- -------- ---- vProClient 1/01/2011 11:46:55 PM AMT Provisioning Sta... #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=1, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) PROCESS { if ($Credential.username.Length -gt 0) {} elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $passwd = ConvertTo-SecureString $Password -AsPlainText –Force $Credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $Username,$passwd } else { $Credential = Get-Credential $Username } } $tlsstring = "" if ($TLS.IsPresent) { $tlsstring = "-TLS" } if ($Port -eq "16993") { $tlsstring = "-TLS" } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } $Results = @() $rand = New-Object System.Random ForEach ($Comp in $ComputerName) { $tempAMTPSDrive = "AMTDrive"+$rand.next() $CannotConnect = $False if ($Credential.username.Length -gt 0){ $expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp -Credential `$Credential $tlsstring -ea Stop" } else { $expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp $tlsstring -ea Stop" } try{ $null = invoke-expression $expression Get-Content $tempAMTPSDrive":\Logs\AccessMonitor" | ForEach-Object { $obj = New-Object PSObject $obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $obj | Add-Member -MemberType noteproperty -Name TimeStamp -value $_.TimeStamp $obj | Add-Member -MemberType noteproperty -Name Message -value $_.Message $obj | Add-Member -MemberType noteproperty -Name Location -value $_.Location $obj | Add-Member -MemberType noteproperty -Name User -value $_.User $Results += $obj } Remove-PSDrive $tempAMTPSDrive } catch { if($_.ToString().Contains("Unauthorized")) { $obj = New-Object PSObject $obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $obj | Add-Member -MemberType noteproperty -Name TimeStamp -value "" $obj | Add-Member -MemberType noteproperty -Name Message -value "Error" $obj | Add-Member -MemberType noteproperty -Name Location -value "" $obj | Add-Member -MemberType noteproperty -Name User -value "Unauthorized" } if($_.ToString().Contains("The operation is not allowed on non-connected sockets.")) { $obj = New-Object PSObject $obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $obj | Add-Member -MemberType noteproperty -Name TimeStamp -value "" $obj | Add-Member -MemberType noteproperty -Name Message -value "Error" $obj | Add-Member -MemberType noteproperty -Name Location -value "" $obj | Add-Member -MemberType noteproperty -Name User -value "Cannot connect" } else { $obj = New-Object PSObject $obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $obj | Add-Member -MemberType noteproperty -Name Message -value "Error" $obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message } $Results += $obj } } Write-Output $Results } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQXkiSVr1+UI/W # bs+pAOiayQjtnR4BkVsozZlIUlFAraCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgKVa8VkdjwDFiVgwx # B6UsfSRP4UK8RjSBwVhZ8ndjb4UwDQYJKoZIhvcNAQEBBQAEggGAVhrj2XoCVj/O # PlYALidO/BxqZBCbHptXEPeOSa6dJdgfYKOWGsu6VGqYD8bschtEu6q14MWddPnN # 2BYi6C+9G6hElJiQiH8GyaPBZlGpxDikPrBySPyDHq2owcDb/PIhLIsvE+Szx7RV # EeBOq0ELEFnkeRiDHFK2O/nK5ykUY0weNppCeqJIIruWee/UDb8U9+HN9PszL4MI # sroMW75N/ihZ/pQ7ODamntixV5DKD+WYFy4Rqege/qVBQIrxkFoBc1zCSVeiClkv # O14g/74aiFx99XBGPBegRJ4w/QEPsbgBZrzncBmIl1/u5Y3i/6kiClXpNPfSPjxq # 5jw1d0iNa9suozCxo5y+s5JLU9MWXrcbo8vrfwY1pbwWf5tAFEUd8DUyy2GYbC/+ # ztBbGJipg8CRCq/GrX7/dG0Hvtyca+8GETvr5Vgodmo/xik8+BpU6vgMK1zw+Shc # /oKxoayZr2UzEP5lcUxY8eAlRX+uEQ67NTZmnH2XcPmYLufqQHKfoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIFf8n9JEHHjueqTAbIYxgGmlQkZHEH8TtZn2 # 4WJgs+BDAhUAsCsypYH+OWme810QJV/KAcQIIV4YDzIwMjExMDI3MTIxMDI3WqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMTAyNzEyMTAyN1owPwYJKoZIhvcNAQkEMTIEMJsmje5/Rj4j # SOaLR+TzCiLuMeWQFFXO7bj1zjrnKbYukRVLYgklyXyNSS2G/Aw+UTCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgAmdhK90qRzcKvwVuZNLmj0ytGMuzJ1cmIUPvL63wFCyJA39IDh # P/6sSoQ2D/qzE7UKluLH4XyYCHDgWg4uj9U7MGXGlZ/Slnion9Pl0M6tE3zZVfR+ # jdLQuxx8E3RsNlzw08BwA96YtW96p/JZloR1LAwt1D65o3RrmNWRQJcksb3LG5VW # IUg7Xq3kGBXun14VxPUT3urN4E2sEPSLYKksg2lo//W+Ue7kho/RpRUqEZRy/BOG # Bt0v9QT//yCkoCcFm/x59neOtmlMja8vqSKG4h4EIAhgszwvLeLCzHamRxsUGFUi # pZKY++UeV2JzTfI2+cVmHvJEGPfoBB4xHU1EdAa1//dYxoDFtqMO7DCRS9V+b+Iv # aoEMlGyz9CXJwaSMEofpu4m4M+9mYcSLXNYEcu5d166abXTI58/BWsmnvFFxqR9R # UZ8eNPKpQeFZqeo2TqNQPxk1jW2VZbDPwqR4Zk/I+bQv7uNh1LmSzllHAQ13PqE8 # fIU0MIgLZURq+aKkReHr5WwXSJps/nCk8P76ExHaNkRH2QbL/2FnUqA3BdfWkUEC # yiIVD0J9KWpW/+vbZClYS9gvChlYw+HC/k1ikc2RGvwW19ix4z5dMg42w9eIA6Yc # Vq9/GiLdrtDPsweog0W5Ji2+5TIpB7+ESIOl12hQPif9FFzFwWNFRWTGMg== # SIG # End signature block
combined_dataset/train/non-malicious/Hardware Inventory.ps1
Hardware Inventory.ps1
# Synopsis: # Windows Script to collect Hardware information on a local system # And Convert it to a JSON String and Upload that to a CouchDB # Database # Requirements: # -Local Admin Access in Powershell v2 # -SSL(443/TCP) allowed to CouchDB Host # -Proxy verified and communication to it Write-Host " ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ _ _ _____ _ _ | \\ | |_ _| / \\ ___ ___ ___| |_ | \\| | | | / _ \\ / __/ __|/ _ \\ __| | |\\ | | | / ___ \\\\__ \\__ \\ __/ |_ |_| \\_| |_| /_/ \\_\\___/___/\\___|\\__| ___ _ |_ _|_ ____ _____ _ __ | |_ ___ _ __ _ _ | || '_ \\ \\ / / _ \\ '_ \\| __/ _ \\| '__| | | | | || | | \\ V / __/ | | | || (_) | | | |_| | |___|_| |_|\\_/ \\___|_| |_|\\__\\___/|_| \\__, | |___/ by VulcanX 2011-09-29 v1.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ " #Adding ConvertTo-JSON function for use later on in script Filter ConvertTo-JSON { Function New-JSONProperty ($name, $value) { @" "$name": $value "@ } $targetObject = $_ $jsonProperties = @() $properties = $_ | Get-Member -MemberType *property ForEach ($property in $properties) { #"$($property.Name)=$($targetObject.$($property.Name)) [$($($targetObject.$($property.Name)).GetType())]" #(($targetObject.($property.Name)).GetType()).Name $value = $targetObject.($property.Name) $dataType = (($targetObject.($property.Name)).GetType()).Name switch -regex ($dataType) { 'String' {$jsonProperties += New-JSONProperty $property.Name "`"$value`""} 'Int32|Double' {$jsonProperties += New-JSONProperty $property.Name $value} 'Object\\[\\]' { #$jsonProperties += "`t`"$($property.Name)`": [$($($targetObject.($property.Name)) -join ',')]" $str = "`t`"$($property.Name)`": [" $count = $targetObject.($property.Name).Count For($idx=0; $idx -lt $count; $idx++) { $v = $targetObject.($property.Name)[$idx] switch -regex ($v.GetType()) { 'String' {$v="`"$v`""} } if($idx+1 -lt $count) { $comma = "," } else { $comma = "" } $str += "$v$($comma)" } $jsonProperties += "$str]" } default {$_} } } "{`r`n $($jsonProperties -join ",`r`n") `r`n}" } #Get WMI Info #Declaring all variables for use later in JSON $HOSTNAME1 = Get-WmiObject win32_computersystem | Select-Object -ExpandProperty Name $HOSTNAME2 = Get-WmiObject win32_computersystem | Select-Object -ExpandProperty Domain $HOSTNAME = "$HOSTNAME1.$HOSTNAME2" $OS = Get-WmiObject win32_operatingsystem | Select-Object -ExpandProperty Caption $OS_RELEASE = Get-WmiObject win32_operatingsystem | Select-Object -ExpandProperty Version $IP_ADDRESS_1 = Get-WmiObject win32_NetworkAdapterConfiguration | Where { $_.IPAddress -and $_.IPAddress -notlike ':' } | Select -ExpandProperty IPAddress $IP_ADDRESS = $IP_ADDRESS_1 -join ' ' # Adding multiple address onto one line $MAC_ADDRESS_1 = Get-WmiObject win32_networkadapter | Where { $_.PhysicalAdapter -eq $TRUE -and $_.MacAddress -ne $null } | Select-Object -ExpandProperty MACAddress $MAC_ADDRESS = $MAC_ADDRESS_1 -join ' ' #Adding multiple addresses onto one line $MEMORY = Get-WmiObject win32_computersystem | Select-Object -ExpandProperty TotalPhysicalMemory $BIOS_VENDOR = Get-WmiObject win32_bios | Select-Object -ExpandProperty Manufacturer $BIOS_VERSION = Get-WmiObject win32_bios | Select-Object -ExpandProperty SMBIOSBIOSVersion $BIOS_RELEASE_DATE = Get-WmiObject win32_bios | Select-Object @{label='Release Date';expression={$_.ConvertToDateTime($_.releasedate).ToShortDateString()}} | Select-Object -ExpandProperty 'Release Date' $SYSTEM_MANUFACTURER = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty Vendor $SYSTEM_PRODUCT_NAME = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty Name $SYSTEM_VERSION = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty Version $SYSTEM_SERIAL_NUMBER = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty IdentifyingNumber $SYSTEM_UUID = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty UUID $BASEBOARD_MANUFACTURER = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Manufacturer $BASEBOARD_PRODUCT_NAME = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Product $BASEBOARD_VERSION = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Version $BASEBOARD_SERIAL_NUMBER = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty SerialNumber $BASEBOARD_ASSET_TAG = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Tag $CHASSIS_MANUFACTURER = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty Manufacturer $CHASSIS_TYPE = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty ChassisTypes $CHASSIS_VERSION = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty Version $CHASSIS_SERIAL_NUMBER = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty SerialNumber $CHASSIS_ASSET_TAG = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty SMBIOSAssetTag $PROCESSOR_FAMILY = Get-WmiObject win32_processor | Select-Object -ExpandProperty Family $PROCESSOR_MANUFACTURER = Get-WmiObject win32_processor | Select-Object -ExpandProperty Manufacturer $PROCESSOR_VERSION = Get-WmiObject win32_processor | Select-Object -ExpandProperty Name $PROCESSOR_ARCH = Get-WmiObject win32_processor | Select-Object -ExpandProperty Architecture $PROCESSOR_FREQUENCY = Get-WmiObject win32_processor | Select-Object -ExpandProperty MaxClockSpeed # Storing all the information in a variable to convert to JSON Later $RESULTS = (New-Object PSObject | add-member -pass noteproperty HOSTNAME "$HOSTNAME" | add-member -pass noteproperty OS "$OS" | add-member -pass noteproperty OS-RELEASE "$OS_RELEASE" | add-member -pass noteproperty IP-ADDRESS "$IP_ADDRESS" | add-member -pass noteproperty MAC-ADDRESS "$MAC_ADDRESS" | add-member -pass noteproperty MEMORY "$MEMORY" | add-member -pass noteproperty BIOS-VENDOR "$BIOS_VENDOR" | add-member -pass noteproperty BIOS-VERSION "$BIOS_VERSION" | add-member -pass noteproperty BIOS-RELEASE-DATE "$BIOS_RELEASE_DATE" | add-member -pass noteproperty SYSTEM-MANUFACTURER "$SYSTEM_MANUFACTURER" | add-member -pass noteproperty SYSTEM-PRODUCT-NAME "$SYSTEM_PRODUCT_NAME" | add-member -pass noteproperty SYSTEM-VERSION "$SYSTEM_VERSION" | add-member -pass noteproperty SYSTEM-SERIAL-NUMBER "$SYSTEM_SERIAL_NUMBER" | add-member -pass noteproperty SYSTEM-UUID "$SYSTEM_UUID" | add-member -pass noteproperty BASEBOARD-MANUFACTURER "$BASEBOARD_MANUFACTURER" | add-member -pass noteproperty BASEBOARD-PRODUCT-NAME "$BASEBOARD_PRODUCT_NAME" | add-member -pass noteproperty BASEBOARD-VERSION "$BASEBOARD_VERSION" | add-member -pass noteproperty BASEBOARD-SERIAL-NUMBER "$BASEBOARD_SERIAL_NUMBER" | add-member -pass noteproperty BASEBOARD-ASSET-TAG "$BASEBOARD_ASSET_TAG" | add-member -pass noteproperty CHASSIS-MANUFACTURER "$CHASSIS_MANUFACTURER" | add-member -pass noteproperty CHASSIS-TYPE "$CHASSIS_TYPE" | add-member -pass noteproperty CHASSIS-VERSION "$CHASSIS_VERSION" | add-member -pass noteproperty CHASSIS-SERIAL-NUMBER "$CHASSIS_SERIAL_NUMBER" | add-member -pass noteproperty CHASSIS-ASSET-TAG "$CHASSIS_ASSET_TAG" | add-member -pass noteproperty PROCESSOR-FAMILY "$PROCESSOR_FAMILY" | add-member -pass noteproperty PROCESSOR-MANUFACTURER "$PROCESSOR_MANUFACTURER" | add-member -pass noteproperty PROCESSOR-VERSION "$PROCESSOR_VERSION" | add-member -pass noteproperty PROCESSOR-ARCH "$PROCESSOR_ARCH" | add-member -pass noteproperty PROCESSOR-FREQUENCY "$PROCESSOR_FREQUENCY" ) | ConvertTo-Json # Converting $RESULTS to JSON Format # Double check the structure and layout is all correct echo $RESULTS # CouchDB Credentials $username = Read-Host "CouchDB Username" $password = Read-Host "CouchDB Password" # Creating the document on the CouchDB Database [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} ; # Accepts all certificates from the host $request = [System.Net.WebRequest]::Create("https://couchdb-host/database/$HOSTNAME1") # Converting the Header and adding the username and password to it in base64 encoding $auth = [System.Text.Encoding]::UTF8.GetBytes("$username" + ":" + "$password") $base64 = [System.Convert]::ToBase64String($auth) $authorization = "Authorization: Basic " + $base64 $request.Headers.Add($authorization) # Adding credentials for the webrequest and address of the proxy $request.Credentials = New-Object System.Net.NetworkCredential($username, $password) $request.Proxy = New-Object -TypeName System.Net.WebProxy -ArgumentList "http://randomproxy:8080" # http://*hostname*:*port* format $data = [Text.Encoding]::UTF8.GetBytes($RESULTS) # Specifying what method to use $request.ContentLength = $data.Length $request.Method = "PUT" # Be careful to set your content type appropriately... # This is what you're going to SEND THEM $request.ContentType = "application/json"; # 'text/xml;charset="utf-8"'; "application/x-www-form-urlencoded" # This is what you expect back $request.Accept = "application/json"; # "text/xml" # Executing the PUT request $put = new-object IO.StreamWriter $request.GetRequestStream() $put.Write($data,0,$data.Length) $put.Flush() $put.Close()
combined_dataset/train/non-malicious/ConvertTo-CliXml_1.ps1
ConvertTo-CliXml_1.ps1
function ConvertTo-CliXml { param( [parameter(position=0,mandatory=$true,valuefrompipeline=$true)] [validatenotnull()] [psobject]$object ) begin { $type = [type]::gettype("System.Management.Automation.Serializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([xml.xmlwriter]), $null) $sw = new-object io.stringwriter $xw = new-object xml.xmltextwriter $sw $serializer = $ctor.invoke($xw) $method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null) $done = $type.getmethod("Done", [reflection.bindingflags]"nonpublic,instance") } process { try { [void]$method.invoke($serializer, $object) } catch { write-warning "Could not serialize $($object.gettype()): $_" } } end { [void]$done.invoke($serializer, @()) $sw.ToString() } }
combined_dataset/train/non-malicious/2559.ps1
2559.ps1
param( [String[]] $DatabaseList ) "The number of parameters passed in DatabaseList is $($DatabaseList.Count)" $i = 0 foreach ($arg in $DatabaseList) { echo "The $i parameter in DatabaseList is $arg"; $i++ }
combined_dataset/train/non-malicious/sample_0_12.ps1
sample_0_12.ps1
# # # Rule to look for organizations that are newer than the deployment # # Created: 5/24/2012 # Author: Jonathan Randall #****************************************************************************************************************** #region Functions function GetOrganizationData([string] $conn_string) { $SqlConnection = New-Object System.Data.SqlClient.SqlConnection $SqlCmd = New-Object System.Data.SqlClient.SqlCommand $SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter $DataSet = New-Object System.Data.DataSet $SqlConnection.ConnectionString = $conn_string $SqlCmd.CommandText = "set nocount on SELECT o.FriendlyName,op.IntColumn as Revision,o.Id From Organization o JOIN OrganizationProperties op ON o.Id=op.Id WHERE op.ColumnName='Revision'" $SqlCmd.Connection = $SqlConnection $SqlAdapter.SelectCommand = $SqlCmd $SqlAdapter.Fill($DataSet) $SqlConnection.Close() $DataSet.Tables[0] } #endregion Functions Import-LocalizedData -BindingVariable LocalizedMessages Write-DiagProgress -Activity $LocalizedMessages.PROGRESSBAR_ID_CRM_ORG_Version_Deployment_CHECK -Status $LocalizedMessages.PROGRESSBAR_ID_CRM_ORG_Version_Deployment_CHECKDesc "Entered TS_CRM_ORG_Version_Depoyment_CHECK.ps1" | WriteTo-StdOut $RootCauseDetected = $false if (Test-Path HKLM:\Software\Microsoft\MSCRM) { $MSCRMKey = Get-Item HKLM:\Software\Microsoft\MSCRM if ($MSCRMKey -ne $null){ $server_version = $MSCRMKey.GetValue("CRM_Server_Version").Substring(0,1) if ($server_version -ne '4'){ $cnn = $MSCRMKey.GetValue("configdb") $revision = $MSCRMKey.GetValue("CRM_Server_Serviceability_Revision") #Get organization data $crm_organization_versions = GetOrganizationData $cnn foreach ($dr in $crm_organization_versions) { if ($dr.GetType() -ne [System.Int32] -and [System.Data.DataRow]$dr){ if ($dr.Revision -gt [System.Convert]::ToInt32($revision)){ Write-GenericMessage -RootCauseID "RC_CRMOrganization_Deployment_Mismatch" -Verbosity "Warning" -SolutionTitle ([System.String]::Format("The Microsoft CRM Organization {0} has a Revision of {1}. The deployment should be updated to {2} as organizations based on later versions may not operate correctly.",$dr.FriendlyName,$dr.Revision,$revision)) -ProcessName "W3WP.exe" $RootCauseDetected=$true } } } } } } if ($RootCauseDetected -eq $true){ Update-DiagRootCause -Id "RC_CRMOrganization_Deployment_Mismatch" -Detected $true if ($Error.Count -gt 0) { ("ERROR=" + $Error) | WriteTo-StdOut } } else{ Update-DiagRootCause -Id "RC_CRMOrganization_Deployment_Mismatch" -Detected $false } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCBChkf6TmYauM7 # NIWAKB6PnfTgkM8frZTiOIy2A9rNq6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIONXQr2xCbWZEH8+P0xkpiyR # Se4KjIVUwa7kpV3nBWlPMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEApkjg/ZGPCeMoeXDZ3VGp+iwtnFV675dvoi5y2bRNwjZF869zHysp61Ql # B7ONmv2by70K4boAwKF8V+Lc2kMGBhdxtJpU5Vd3aA3cLUlVKJPa2SW0tOoGZXz/ # cAa5qpkUh+nHKEdLXKbPyBfhR1BOFDyo4SiW4RcDuuLvD9+PzhK9AAwFoiYvFxHK # ZnTqmrgIfA2sXPQj4KlGI9I5dbuFSpzLtLWM6cVVtCPCboG/mW/lqKQQb0JuAsUB # 8DUPeIdXjfKrvDo9giS5tPbwV9QcdSABJ8PJVfqgKI1t6ec67L0TG/n2/5QwzCx8 # 5iJvE1JSArURYMruO2ngdjevJ2JnwaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDpsf9OXegHQavaYAHGN7vTlBTOGD1J6UJi9JQE2joxlQIGZxqDjw9g # GBMyMDI0MTAyODExNDA0MC43MTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz # OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P # AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR # rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C # Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm # xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy # fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo # 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBuydJlYGSCfmnKkCMpq7RLO1BOYN5CA0PLN9uX2YoS # WTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy # SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIAI23SWJiA0XXlOwh3P7GY # QfIywaskzPg1DuQfIIqs9smvCGc8ZKlT9zRZHDU8zr21iIKLZzRPMyKvqx31WJcX # B4GZQr5hN0E+hwC8YbPuvQe98GUaywCxP5i6Vhemd3kRAVCUpFuIdsAVQaaAEOM1 # KoW35RrdI6JOlpy81TNOPARGolkTyxLFHK8u5REHKgQfAPdg8C1YuhQ1PVyMv6vS # V44DojQJb4kS8crVnBwwtvvCbNE9QuuyLCM/VdNsfrYUlgLTuY80TGaE68GzZcrW # Ln3OpIk8oRzCCSfPpXawSdeeHFW2x4XBWBuLoFU9Ii1sFSabdeu9wQUT2FzmW3Sg # z55TUKx6djRGsB56Vs4VCCFKNAG55W7H0ObuuC9cp1rozATqH0UCWZKMIqz/02df # HP5KhArIalp78+KjD/9XmvjBEgYwxb3FiH7yNXCMjfTMuGgmm6Tcff2F8x5oy5jh # YSC3MDz4WL22qqX1W6eMbXp/5y3mxEcjdr9DhFBLIMuxu/JaxMvE5KvbqTGAVmxi # DYYMzD4gMAibJL9QFQFq6HWTfGig9WyhTN+Kx9Y+kCADFfktfroT9EaGxDn7XhZk # +U4Blxf8yXMcZwEp2wx2lUiSWN+oIJWyXRTQOgr50OJRdoBoGG9i62rBHlgWB4/s # oBpTPNuJPXhAXEfY13aqRRg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_47.ps1
sample_18_47.ps1
@{ GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" CmdletsToExport = @( 'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml', 'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv', 'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger', 'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event', 'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData', 'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host', 'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List', 'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption', 'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object', 'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output', 'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint', 'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession', 'Import-PSSession', 'Get-Random', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace', 'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String', 'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan', 'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData', 'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable', 'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest', 'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File' ) FunctionsToExport = @() AliasesToExport = @('fhx') NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll") HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBDLy8cuBKbodtC # NmoItuifgQ/o9EygYihmiHbOdTTdE6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHbROJ5XEpIAi8a8uENwQoVd # lwSV4zcT+W3Q7IeGDPFUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArPtJOGTCI2ICkpeNDAHlXiCOF0D0SVlPH/ipbN09RXGAEYgraOIWZWPs # v26ypFIbOyHG9u9i56tDKyBVEc+p0AQwEpaJK6cwnKkWxyszCC8fzuGcB27497pG # Lz4GjAfQ2t47JWcQtIBPEYcrrXR4WGTUXSrn2HeEhj2ZYl5YVVARQ+IyJlKYrhL+ # 9sCszWn3CeiHPHYMBYXpLOPdByafn3BB26AqyuxAzHuHPJon3k8W2pcezZBZM5ZF # flXQ3qWTj2A4HjbPjHOr5X0PRaHCzenAb5pyf2HjCEpa9i6wZgK7l50tnpUFDvkM # xh+ntRNwgGSCtHgxJaPpuHoyDbZFXaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCANIGNoOx/3rpmYWM5t6fFwl/zOEGmeeCboC2qF8ohDQgIGZfxw4dt9 # GBMyMDI0MDQwOTIzMDYzOS45NTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOm/UNswIhgPMjAyNDA0MDkxMzMwMDNaGA8yMDI0MDQxMDEzMzAwM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6b9Q2wIBADAHAgEAAgIafjAHAgEAAgIRMzAKAgUA # 6cCiWwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF1TLo09RllJVBPdJAmY # hDxMj4u4iKFfvBfxZ5CdZ0cZT2ecwVvGjvsitRLgMp24VNJjfO0krTY2lI5tIGv9 # 5MgYhVcaaSiQ3zq7UZfYXNKkHbFk/zmz3ds/Tb1uKnxjFxxyOMsKsC2rwCXgTIYp # crItCpqbnJClYmSe6q/zgV6bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgneZtislvKgz6XRdzgFCu2c7M2Ni55cZtoG4N2/WO/YMwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIGp7S/NCvSBFp5jvm90RMPGYMAgx20Oc3b9Hsk0n2AWM # MA0GCSqGSIb3DQEBCwUABIICABp4ONBoQgGPCM3W2B17eKbULwr05Q4ggeNlaaHw # eZ3KcvuKhWZGkQLo2Hc3Bm4etQJioLpT7+zEa0VTiQkz+4QOT6HQmFU3ITgIp/DA # yGHsWdqNw/6h1nCrhNodr4oVBlKKrJAFqjvKlL+worY1pa71cIdsBLW37gPEAFNR # rOs0HlCwUUrdivSXJ8xC/ffaRSm/W37BuYEM6302frEkuQyslqm6IEuMIGbAeEAV # GntF8DDC3aG9JT99lmmUNGGsgPvVf8wxzV/Jw4SAqynlyQNZqgbfYhveqXTRaryY # yLlGmTgjezdV9S9Ypb146w5CxpbXwQS6zDTtDqDeGetHyMpgU5p/0sCG+X3qN/Gy # DM1unJkIdGbnZR0iswfJjWtVbILGb4Mfweprje3AM7+NvUMXlEjEvF3Izszh+HZi # 3T87n1zcc2zC9CBEzsTFKz+iRhUTHOpzL6EEZLlqOrTuZG6U2FNH3vNdkBP3LbHl # I9nVt7g8o/a3XSMsVyDsbqRqu70R1o271PvMsyGI03RV+gR3pM/nt4yUpS44k1B+ # M2EQy5CB4GVZtso68Blf66IHEeryoNEMWXxzrvqvplNfzD9xMOnrvYAssq3CMk7i # aaxxK81q2JczD+mTwY1ZdShm0OKA1/uVvF9x3r8+u4Z+pO8qjzvs+KoYLrCrxplF # wKRW # SIG # End signature block
combined_dataset/train/non-malicious/3317.ps1
3317.ps1
function New-Group { [PoshBot.BotCommand( Aliases = ('ng', 'newgroup'), Permissions = 'manage-groups' )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot, [parameter(Mandatory, Position = 0)] [string[]]$Name, [parameter(Position = 1)] [string]$Description ) $notCreated = @() foreach ($groupName in $Name) { if (-not ($Bot.RoleManager.GetGroup($groupName))) { $group = [Group]::new($groupName, $Bot.Logger) if ($PSBoundParameters.ContainsKey('Description')) { $group.Description = $Description } $Bot.RoleManager.AddGroup($group) if (-not ($Bot.RoleManager.GetGroup($groupName))) { $notCreated += $groupName } } else { New-PoshBotCardResponse -Type Warning -Text "Group [$groupName] already exists" -ThumbnailUrl $thumb.warning } } if ($notCreated.Count -eq 0) { if ($Name.Count -gt 1) { $successMessage = 'Groups [{0}] created.' -f ($Name -join ', ') } else { $successMessage = "Group [$Name] created" } New-PoshBotCardResponse -Type Normal -Text $successMessage -ThumbnailUrl $thumb.success } else { if ($notCreated.Count -gt 1) { $errMsg = "Groups [{0}] could not be created. Check logs for more information." -f ($notCreated -join ', ') } else { $errMsg = "Group [$notCreated] could not be created. Check logs for more information." } New-PoshBotCardResponse -Type Warning -Text $errMsg -ThumbnailUrl $thumb.warning } }
combined_dataset/train/non-malicious/sample_28_66.ps1
sample_28_66.ps1
[CmdletBinding(PositionalBinding=$false)] Param( [switch][Alias('h')]$help, [switch][Alias('t')]$test, [ValidateSet("Debug","Release")][string[]][Alias('c')]$configuration = @("Debug"), [string][Alias('v')]$verbosity = "minimal", [switch]$vs, [ValidateSet("windows","linux","osx")][string]$os, [switch]$testnobuild, [ValidateSet("x86","x64","arm","arm64")][string[]][Alias('a')]$arch = @([System.Runtime.InteropServices.RuntimeInformation]::ProcessArchitecture.ToString().ToLowerInvariant()), [Parameter(ValueFromRemainingArguments=$true)][String[]]$properties ) function Get-Help() { Write-Host "Common settings:" Write-Host " -arch (-a) Target platform: x86, x64, arm or arm64." Write-Host " [Default: Your machine's architecture.]" Write-Host " -binaryLog (-bl) Output binary log." Write-Host " -configuration (-c) Build configuration: Debug or Release." Write-Host " [Default: Debug]" Write-Host " -help (-h) Print help and exit." Write-Host " -os Target operating system: windows, linux or osx." Write-Host " [Default: Your machine's OS.]" Write-Host " -verbosity (-v) MSBuild verbosity: q[uiet], m[inimal], n[ormal], d[etailed], and diag[nostic]." Write-Host " [Default: Minimal]" Write-Host " -vs Open the solution with Visual Studio using the locally acquired SDK." Write-Host "" Write-Host "Actions (defaults to -restore -build):" Write-Host " -build (-b) Build all source projects." Write-Host " This assumes -restore has been run already." Write-Host " -clean Clean the solution." Write-Host " -pack Package build outputs into NuGet packages." Write-Host " -publish Publish artifacts (e.g. symbols)." Write-Host " This assumes -build has been run already." Write-Host " -rebuild Rebuild all source projects." Write-Host " -restore Restore dependencies." Write-Host " -sign Sign build outputs." Write-Host " -test (-t) Incrementally builds and runs tests." Write-Host " Use in conjunction with -testnobuild to only run tests." Write-Host "" Write-Host "Libraries settings:" Write-Host " -testnobuild Skip building tests when invoking -test." Write-Host "" Write-Host "Command-line arguments not listed above are passed through to MSBuild." Write-Host "The above arguments can be shortened as much as to be unambiguous." Write-Host "(Example: -con for configuration, -t for test, etc.)." Write-Host "" } if ($help) { Get-Help exit 0 } if ($vs) { $solution = Split-Path $PSScriptRoot -Parent | Join-Path -ChildPath "Aspire.sln" . $PSScriptRoot\common\tools.ps1 # This tells .NET Core to use the bootstrapped runtime $env:DOTNET_ROOT=InitializeDotNetCli -install:$true -createSdkLocationFile:$true # This tells MSBuild to load the SDK from the directory of the bootstrapped SDK $env:DOTNET_MSBUILD_SDK_RESOLVER_CLI_DIR=$env:DOTNET_ROOT # Put our local dotnet.exe on PATH first so Visual Studio knows which one to use $env:PATH=($env:DOTNET_ROOT + ";" + $env:PATH); # Launch Visual Studio with the locally defined environment variables ."$solution" exit 0 } # Check if an action is passed in $actions = "b","build","r","restore","rebuild","sign","testnobuild","publish","clean" $actionPassedIn = @(Compare-Object -ReferenceObject @($PSBoundParameters.Keys) -DifferenceObject $actions -ExcludeDifferent -IncludeEqual).Length -ne 0 if ($null -ne $properties -and $actionPassedIn -ne $true) { $actionPassedIn = @(Compare-Object -ReferenceObject $properties -DifferenceObject $actions.ForEach({ "-" + $_ }) -ExcludeDifferent -IncludeEqual).Length -ne 0 } if (!$actionPassedIn) { $arguments = "-restore -build" } foreach ($argument in $PSBoundParameters.Keys) { switch($argument) { "os" { $arguments += " /p:TargetOS=$($PSBoundParameters[$argument])" } "properties" { $arguments += " " + $properties } "verbosity" { $arguments += " -$argument " + $($PSBoundParameters[$argument]) } "configuration" { $configuration = (Get-Culture).TextInfo.ToTitleCase($($PSBoundParameters[$argument])); $arguments += " -configuration $configuration" } "arch" { $arguments += " /p:TargetArchitecture=$($PSBoundParameters[$argument])" } default { $arguments += " /p:$argument=$($PSBoundParameters[$argument])" } } } if ($env:TreatWarningsAsErrors -eq 'false') { $arguments += " -warnAsError 0" } Invoke-Expression "& `"$PSScriptRoot/common/build.ps1`" $arguments" exit 0
combined_dataset/train/non-malicious/sample_13_5.ps1
sample_13_5.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Exports a database file from target database. .Description Exports a database file from target database. .Example PS C:\> Export-AzRedisEnterpriseCache -Name "MyCache" -ResourceGroupName "MyGroup" -SasUri "https://mystorageaccount.blob.core.windows.net/mycontainer?sp=signedPermissions&se=signedExpiry&sv=signedVersion&sr=signedResource&sig=signature;mystoragekey" .Outputs System.Boolean .Link https://learn.microsoft.com/powershell/module/az.redisenterprisecache/export-azredisenterprisecache #> function Export-AzRedisEnterpriseCache { [Alias('Export-AzRedisEnterpriseCacheDatabase')] [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='ExportExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Alias('Name')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [System.String] # The name of the Redis Enterprise cluster. ${ClusterName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')] [System.String] # SAS URI for the target directory to export to ${SasUri}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $null = $PSBoundParameters.Add("DatabaseName", "default") Az.RedisEnterpriseCache.internal\Export-AzRedisEnterpriseCache @PSBoundParameters } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5Cz42nhol3822 # W+J5eHzen00P4d0rYAAcdAV6QDMSBaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINqnAOu3EMZZXdvh9+WbiaxC # 0EE0VLPiGE+GGuq/E2ErMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAl3x/sSn4/Jcx5MXw1vaIW5Usc/+QsCKiQC5ZvQzCYnlx0h6l+LXXO9sZ # 2ZqTt6OUzkY5U4FUt1lWbp5w30vtyOYrM03zEkL4MfoJA0MbEWSM0Wam8Wrql3/v # 48mu2g3XAlV6FVuM+WVtOfyQhl+oYUgZe00XBwSyMENfnaNhGVSjWHZMeEO22NlE # SKf6CMMe29lLLcZmzChHKnCvFhDhHzFU+P47qnjLhyzfmrQaIPifIp7jGCiQnpHk # oye1b5+KtBhUpCI0+AfL6BDRvNvFs0sI4opea/86yWcG7w52YCknsU1OR+efwwGH # wBr8mtIyS7sx/lXPKNz0ptF9i/LwxKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD3Fg++UiBHDIQrYXNDX1PqClArNqZMcwsnTVyQzHV3awIGZhfWS4aH # GBMyMDI0MDQyMzEzMTUxMS41ODNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAiGA8yMDI0MDQyMzEyMTQy # MFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0iSc # AgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03YcAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGmKRxZss6LPFkY42ZOWnXs # VX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W58hCrRegPfWwTzs8g1aOM # YXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6EQMGwD/BAq7tdePiGcew # KasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkCEnw9OPR+IbvMfWkyCTqp # PJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Qa4zlmb79kpVqf6nLoXJr # 9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA27ZxmTUpsqt6kIMTyDcKkfCI8lrvNGKfcBWYtgMrK # 5DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W10UOl24tqW0PGjrhbdiG # 0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIAdgRTEzhWswXI+q8KICWf # fFs6kvPYmPKq3X6Fq3CSR6OmM07FVRQje3Ac8MA2U6tVUcadgR2oauEtfQAr4WZP # Dy1g/E325OHqXurrxSv7YhoDImVNnSMlABxhPmNR/v6GJRgfxZnhOmmVUp5vPyMK # Ik1jkMrxl5cQxyk0rJeoAkCDF6jWqITCHdHUScytii+coO0PlNSw9GeNa+BmbtDH # 4x5tk2DHVWEApTNJlmc7RMXFKBwN4H0f5RllLEjp3luTsYEpuy11P2WCpuhyd/Pi # pmUNOX2L+f2smaCT3lCEwhR9+NeQ+Q+AsBTB30S/qJjNujaNtm8gf2Zgh6zusuBD # h8f+BLrrxZq881u3cDbUxlYk7nlvm1EIs6t2MGj6zrX9wq3/+IbEFOJwpRAGw+9f # 4P19n1IMymaJa2JyI7AnhB63A05BifbQiu9Dx8/6bV9QHlcFXiDBDS4U/RfUdi3M # wuw13TpmLYQWXr/4L4PqrDarqbrKKiYnDfJGAtm4HkZ4baNgNuSvv77aPmuLZhaJ # /0jOU8nEGe3uweOddRtC++W7j6hH44mc6wnJzrLsFPn/UQ1gIxKkYy4KRx2DLMZG # R8YXKT2XHqCmKMxP/EaTDt8f3vNNRr34cQpndOV0T3ft8fQ2HLoki2LpxlBSWLoY # vyp+wJHYIhctbaIu5RIkGTM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_46_26.ps1
sample_46_26.ps1
#See https://aka.ms/customizecontainer to learn how to customize your debug container and how Visual Studio uses this Dockerfile to build your images for faster debugging. #Depending on the operating system of the host machines(s) that will build or run the containers, the image specified in the FROM statement may need to be changed. #For more information, please see https://aka.ms/containercompat FROM $base_image_name$ AS base WORKDIR /app $expose_statements$ FROM $sdk_image_name$ AS build # Install Visual Studio Build Tools, they are required for aot publish # Note: Use of the Visual Studio Build Tools requires a valid Visual Studio license. RUN curl -SL --output vs_buildtools.exe https://aka.ms/vs/17/release/vs_buildtools.exe RUN vs_buildtools.exe --installPath C:\BuildTools --add Microsoft.VisualStudio.Component.VC.Tools.x86.x64 Microsoft.VisualStudio.Component.Windows10SDK.19041 --quiet --wait --norestart --nocache ARG BUILD_CONFIGURATION=Release WORKDIR /src $copy_build_file_commands$$copy_project_commands$ RUN dotnet restore "$project_relative_path$" COPY . . WORKDIR "/src/$container_project_directory$" RUN dotnet build "$relative_project_file_name$" -c %BUILD_CONFIGURATION% -o /app/build FROM build AS publish ARG BUILD_CONFIGURATION=Release RUN dotnet publish "$relative_project_file_name$" -c %BUILD_CONFIGURATION% -o /app/publish /p:UseAppHost=true FROM $final_base_image_name$ AS final WORKDIR /app $expose_statements$ COPY --from=publish /app/publish . ENTRYPOINT ["$assembly_name$.exe"]
combined_dataset/train/non-malicious/1741.ps1
1741.ps1
param( [Parameter(HelpMessage="Artifact folder to find compliance files in.")] [string[]] $ArtifactFolder, [Parameter(HelpMessage="VSTS Variable to set path to complinance Files.")] [string] $VSTSVariableName ) $compliancePath = $null foreach($folder in $ArtifactFolder) { Write-Host "ArtifactFolder: $folder" $filename = Join-Path -Path $folder -ChildPath 'symbols.zip' $parentName = Split-Path -Path $folder -Leaf if ($parentName -match 'x64' -or $parentName -match 'amd64') { $name = 'x64' } elseif ($parentName -match 'x86') { $name = 'x86' } elseif ($parentName -match 'fxdependent') { $name = 'fxd' } else { throw "$parentName could not be classified as x86 or x64" } if (!(Test-Path $filename)) { throw "symbols.zip for $VSTSVariableName does not exist" } if (!$compliancePath) { $parent = Split-Path -Path $folder $compliancePath = Join-Path -Path $parent -ChildPath 'compliance' } $unzipPath = Join-Path -Path $compliancePath -ChildPath $name Write-Host "Symbols-zip: $filename ; unzipPath: $unzipPath" Expand-Archive -Path $fileName -DestinationPath $unzipPath } Write-Host "
combined_dataset/train/non-malicious/67.ps1
67.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-ApplicationCategory(){ [cmdletbinding()] param ( $Name ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileAppCategories" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Remove-ApplicationCategory(){ [cmdletbinding()] param ( $id ) $graphApiVersion = "Beta" $Resource = "deviceAppManagement/mobileAppCategories" try { if($id -eq "" -or $id -eq $null){ write-host "No id specified for application category, can't remove application category..." -f Red write-host "Please specify id for application category..." -f Red break } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Delete } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $App = Get-ApplicationCategory -Name "LOB Apps 2" | Where-Object { $_.lastModifiedDateTime -ne "0001-01-01T00:00:00Z" } if($App){ if(@($App).count -gt 1){ Write-Host "More than one Application Categrory has been found, please specify a single Application Category..." -ForegroundColor Red Write-Host } elseif(@($App).count -eq 1){ Write-Host "Removing Application Category" $App.displayName -ForegroundColor Yellow Remove-ApplicationCategory -id $App.id } } else { Write-Host "Application Category can't be found or its an inbuilt category name that can't be removed..." -ForegroundColor Yellow Write-Host }
combined_dataset/train/non-malicious/3710.ps1
3710.ps1
function Test-NewAzureRmCognitiveServicesAccount { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc; Assert-NotNull $createdAccount; $createdAccountAgain = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; Assert-NotNull $createdAccountAgain Assert-AreEqual $createdAccount.Name $createdAccountAgain.Name; Assert-AreEqual $createdAccount.Endpoint $createdAccountAgain.Endpoint; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmCognitiveServicesAccountInvalidName { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname + ".invalid"; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; Assert-ThrowsContains { New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc; Assert-NotNull $createdAccount; } 'Failed to create Cognitive Services account.' Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmAllKindsOfCognitiveServicesAccounts { $rgname = Get-CognitiveServicesManagementTestResourceName; $locWU = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; $locGBL = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "Global"; try { New-AzResourceGroup -Name $rgname -Location 'West US'; Test-CreateCognitiveServicesAccount $rgname 'BingSearchTest' 'Bing.Search.v7' 'S1' $locGBL Test-CreateCognitiveServicesAccount $rgname 'BingSpeechTest' 'SpeechServices' 'S0' $locWU Test-CreateCognitiveServicesAccount $rgname 'BingSpellCheckTest' 'Bing.SpellCheck.v7' 'S1' $locGBL Test-CreateCognitiveServicesAccount $rgname 'ComputerVisionTest' 'ComputerVision' 'S0' $locWU Test-CreateCognitiveServicesAccount $rgname 'ContentModeratorTest' 'ContentModerator' 'S0' $locWU Test-CreateCognitiveServicesAccount $rgname 'FaceTest' 'Face' 'S0' $locWU Test-CreateCognitiveServicesAccount $rgname 'LUISTest' 'LUIS' 'S0' $locWU Test-CreateCognitiveServicesAccount $rgname 'SpeakerRecognitionTest' 'SpeakerRecognition' 'S0' $locWU Test-CreateCognitiveServicesAccount $rgname 'TextAnalyticsTest' 'TextAnalytics' 'S1' $locWU Test-CreateCognitiveServicesAccount $rgname 'TextTranslationTest' 'TextTranslation' 'S1' $locGBL } finally { Clean-ResourceGroup $rgname } } function Test-RemoveAzureRmCognitiveServicesAccount { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S1'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; Assert-Throws { $accountGotten = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; } Assert-Null $accountGotten; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureCognitiveServiceAccount { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $account = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; Assert-AreEqual $accountname $account.AccountName; Assert-AreEqual $accounttype $account.AccountType; Assert-AreEqual $loc $account.Location; Assert-AreEqual $skuname $account.Sku.Name; $accounts = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname; $numberOfAccountsInRG = ($accounts | measure).Count; Assert-AreEqual $accountname $accounts[0].AccountName; Assert-AreEqual $accounttype $accounts[0].AccountType; Assert-AreEqual $loc $accounts[0].Location; Assert-AreEqual $skuname $accounts[0].Sku.Name; $allAccountsInSubscription = Get-AzCognitiveServicesAccount; $numberOfAccountsInSubscription = ($allAccountsInSubscription | measure).Count; Assert-True { $numberOfAccountsInSubscription -ge $numberOfAccountsInRG } Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureRmCognitiveServicesAccount { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $originalAccount = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; $changedAccount = Set-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -SkuName S3 -Tags @{Name = "testtag"; Value = "testval"} -Force; Assert-AreEqual $originalAccount.Location $changedAccount.Location; Assert-AreEqual $originalAccount.Endpoint $changedAccount.Endpoint; Assert-AreEqual $originalAccount.Kind $changedAccount.Kind; $gottenAccount = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; Assert-AreEqual $originalAccount.Location $gottenAccount.Location; Assert-AreEqual $originalAccount.Endpoint $gottenAccount.Endpoint; Assert-AreEqual $originalAccount.Kind $gottenAccount.Kind; Assert-AreEqual 'S3' $gottenAccount.Sku.Name; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureRmCognitiveServicesAccountKey { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $keys = Get-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname; Assert-AreNotEqual $keys.Key1 $keys.Key2; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmCognitiveServicesAccountKey { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $originalKeys = Get-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname; $updatedKeys = New-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname -KeyName Key1 -Force; Assert-AreNotEqual $originalKeys.Key1 $updatedKeys.Key1; Assert-AreEqual $originalKeys.Key2 $updatedKeys.Key2; $reupdatedKeys = New-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname -KeyName Key2 -Force; Assert-AreEqual $updatedKeys.Key1 $reupdatedKeys.Key1; Assert-AreNotEqual $originalKeys.Key2 $reupdatedKeys.Key2; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmCognitiveServicesAccountWithCustomDomain { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West Central US"; New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force; Assert-NotNull $createdAccount; $createdAccountAgain = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force; Assert-NotNull $createdAccountAgain Assert-AreEqual $createdAccount.Name $createdAccountAgain.Name; Assert-AreEqual $createdAccount.Endpoint $createdAccountAgain.Endpoint; Assert-True {$createdAccount.Endpoint.Contains('cognitiveservices.azure.com')} Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-NewAzureRmCognitiveServicesAccountWithVnet { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $vnetname = 'vnet' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West Central US"; New-AzResourceGroup -Name $rgname -Location $loc; $vnet = CreateAndGetVirtualNetwork $rgname $vnetname $networkRuleSet = [Microsoft.Azure.Commands.Management.CognitiveServices.Models.PSNetworkRuleSet]::New() $networkRuleSet.AddIpRule("200.0.0.0") $networkRuleSet.AddVirtualNetworkRule($vnet.Subnets[0].Id) $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force -NetworkRuleSet $networkRuleSet; Assert-NotNull $createdAccount; } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureRmCognitiveServicesAccountWithCustomDomain { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West Central US"; New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; Assert-NotNull $createdAccount; $changedAccount = Set-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -CustomSubdomainName $accountname -Force; Assert-NotNull $changedAccount; Assert-True {$changedAccount.Endpoint.Contains('cognitiveservices.azure.com')} } finally { Clean-ResourceGroup $rgname } } function Test-SetAzureRmCognitiveServicesAccountWithVnet { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $vnetname = 'vnet' + $rgname; $skuname = 'S0'; $accounttype = 'Face'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "Central US EUAP"; New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force; Assert-NotNull $createdAccount; $vnet = CreateAndGetVirtualNetwork $rgname $vnetname $networkRuleSet = [Microsoft.Azure.Commands.Management.CognitiveServices.Models.PSNetworkRuleSet]::New() $networkRuleSet.AddIpRule("200.0.0.0") $networkRuleSet.AddVirtualNetworkRule($vnet.Subnets[0].Id) $changedAccount = Set-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -NetworkRuleSet $networkRuleSet -Force; Assert-NotNull $changedAccount; } finally { Clean-ResourceGroup $rgname } } function Test-NetworkRuleSet { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $vnetname = 'vnet' + $rgname; $skuname = 'S0'; $accounttype = 'Face'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "Central US EUAP"; New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force; Assert-NotNull $createdAccount; $vnet = CreateAndGetVirtualNetwork $rgname $vnetname $vnetid = $vnet.Subnets[0].Id $vnetid2 = $vnet.Subnets[1].Id $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-Null $ruleSet Update-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname -DefaultAction Deny $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 0 $ruleSet.IpRules.Count Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 0 $ruleSet.IpRules.Count Assert-AreEqual 1 $ruleSet.VirtualNetworkRules.Count Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid2 $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 0 $ruleSet.IpRules.Count Assert-AreEqual 2 $ruleSet.VirtualNetworkRules.Count Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 0 $ruleSet.IpRules.Count Assert-AreEqual 1 $ruleSet.VirtualNetworkRules.Count Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid2 $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 0 $ruleSet.IpRules.Count Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -AccountName $accountname -IpAddressOrRange "16.17.18.0" $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 1 $ruleSet.IpRules.Count Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -AccountName $accountname -IpAddressOrRange "16.17.18.1" $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 2 $ruleSet.IpRules.Count Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -IpAddressOrRange "16.17.18.0" $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 1 $ruleSet.IpRules.Count Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -IpAddressOrRange "16.17.18.1" $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Deny' $ruleSet.DefaultAction Assert-AreEqual 0 $ruleSet.IpRules.Count Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count Update-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -AccountName $accountname -DefaultAction Allow -IPRule (@{IpAddress="200.0.0.0"},@{IpAddress="28.2.0.0/16"}) -VirtualNetworkRule (@{Id=$vnetid},@{Id=$vnetid2}) $ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname Assert-NotNull $ruleSet Assert-AreEqual 'Allow' $ruleSet.DefaultAction Assert-AreEqual 2 $ruleSet.IpRules.Count Assert-AreEqual 2 $ruleSet.VirtualNetworkRules.Count } finally { Clean-ResourceGroup $rgname } } function Test-GetAzureRmCognitiveServicesAccountSkus { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $skus = (Get-AzCognitiveServicesAccountSkus -Type 'TextAnalytics'); $skuNames = $skus | Select-Object -ExpandProperty Name | Sort-Object | Get-Unique $expectedSkus = "F0", "S", "S0","S1", "S2", "S3", "S4" Assert-AreEqualArray $expectedSkus $skuNames $skus = (Get-AzCognitiveServicesAccountSkus -Type 'TextAnalytics' -Location 'westus'); $skuNames = $skus | Select-Object -ExpandProperty Name | Sort-Object | Get-Unique $expectedSkus = "F0", "S", "S0","S1", "S2", "S3", "S4" Assert-AreEqualArray $expectedSkus $skuNames $skus = (Get-AzCognitiveServicesAccountSkus -Type 'QnAMaker' -Location 'global'); $skuNames = $skus | Select-Object -ExpandProperty Name | Sort-Object | Get-Unique Assert-AreEqual 0 $skuNames.Count } finally { } } function Test-GetAzureRmCognitiveServicesAccountType { try { $typeName = (Get-AzCognitiveServicesAccountType -TypeName 'Face'); Assert-AreEqual 'Face' $typeName $typeName = (Get-AzCognitiveServicesAccountType -TypeName 'InvalidKind'); Assert-Null $typeName $typeNames = (Get-AzCognitiveServicesAccountType -Location 'westus'); Assert-True {$typeNames.Contains('Face')} $typeNames = (Get-AzCognitiveServicesAccountType); Assert-True {$typeNames.Contains('Face')} $typeNames = (Get-AzCognitiveServicesAccountType -Location 'global'); Assert-False {$typeNames.Contains('Face')} Assert-True {$typeNames.Contains('Bing.Search.v7')} } finally { } } function Test-PipingGetAccountToGetKey { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $keys = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname | Get-AzCognitiveServicesAccountKey; Assert-AreNotEqual $keys.Key1 $keys.Key2; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-PipingToSetAzureAccount { $rgname = Get-CognitiveServicesManagementTestResourceName try { $accountname = 'csa' + $rgname; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $account = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; $account | Set-AzCognitiveServicesAccount -SkuName S3 -Force; $updatedAccount = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; Assert-AreEqual 'S3' $updatedAccount.Sku.Name; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-MinMaxAccountName { $rgname = Get-CognitiveServicesManagementTestResourceName try { $shortname = 'aa'; $longname = 'testtesttesttesttesttesttesttesttesttesttesttesttesttesttesttest'; $skuname = 'S2'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; New-AzResourceGroup -Name $rgname -Location $loc; $shortaccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $shortname -Type $accounttype -SkuName $skuname -Location $loc -Force; $longaccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $longname -Type $accounttype -SkuName $skuname -Location $loc -Force; Assert-AreEqual $shortname $shortaccount.AccountName; Assert-AreEqual $longname $longaccount.AccountName; Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; } } finally { Clean-ResourceGroup $rgname } } function Test-GetWithPaging { $rgname = Get-CognitiveServicesManagementTestResourceName $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US" try { $TotalCount = 100 New-AzResourceGroup -Name $rgname -Location $loc For($i = 0; $i -lt $TotalCount ; $i++) { New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name "facepaging_wu_$i" -Type 'Face' -SkuName 'S0' -Location $loc -Force; } For($i = 0; $i -lt $TotalCount ; $i++) { New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name "cvpaging_wu_$i" -Type 'ComputerVision' -SkuName 'S0' -Location $loc -Force; } $accounts = Get-AzCognitiveServicesAccount Assert-AreEqual 200 $accounts.Count $accounts = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname Assert-AreEqual 200 $accounts.Count } finally { Clean-ResourceGroup $rgname } } function Test-GetUsages { $rgname = Get-CognitiveServicesManagementTestResourceName; try { $accountname = 'csa' + $rgname; $skuname = 'S1'; $accounttype = 'TextAnalytics'; $loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US" New-AzResourceGroup -Name $rgname -Location $loc; $createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force; $usages1 = Get-AzCognitiveServicesAccountUsage -ResourceGroupName $rgname -Name $accountname $usages2 = Get-AzCognitiveServicesAccountUsage -InputObject $createdAccount $usages3 = Get-AzCognitiveServicesAccountUsage -ResourceId $createdAccount.Id Assert-True {$usages1.Count -gt 0} Assert-AreEqual 0.0 $usages1[0].CurrentValue Assert-True {$usages1[0].Limit -gt 0} Assert-AreEqual $usages1.Count $usages2.Count Assert-AreEqual $usages2.Count $usages3.Count Assert-AreEqual $usages1[0].CurrentValue $usages2[0].CurrentValue Assert-AreEqual $usages2[0].CurrentValue $usages3[0].CurrentValue Assert-AreEqual $usages1[0].Limit $usages2[0].Limit Assert-AreEqual $usages2[0].Limit $usages3[0].Limit } finally { Clean-ResourceGroup $rgname } } function CreateAndGetVirtualNetwork ($resourceGroupName, $vnetName, $location = "centraluseuap") { $subnet1 = New-AzVirtualNetworkSubnetConfig -Name "default" -AddressPrefix "200.0.0.0/24" $subnet2 = New-AzVirtualNetworkSubnetConfig -Name "subnet" -AddressPrefix "200.0.1.0/24" $vnet = New-AzvirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName -Location $location -AddressPrefix "200.0.0.0/16" -Subnet $subnet1,$subnet2 $getVnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName return $getVnet }
combined_dataset/train/non-malicious/sample_19_59.ps1
sample_19_59.ps1
ConvertFrom-StringData @' id_sccm_activity_cm07serverinfo=Gathering Site Server Information id_sccm_cmserverinfo_boundary=Obtaining Boundaries id_sccm_cmserverinfo_cloud=Obtaining Cloud Services information '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEz70OyP3ct37m # CjhXYIbm+w5jAZPhH90vUblZZ+dvqaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKKbRtTWtCihFbvVwIrzbs/w # ALly6I/+m3HvjNQQbovCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAawMfM79gezURsw2Tv4sJ2dCXWlh/zjAoolpe5QjgWWF82rFMC/g8MIpR # 2vM26l/wyxYU3IPnzCHb9Gl8WLGJUgJrCWDrj9wZkhHfw8RTRwEB8ZjvYu3PgvTK # lMfZm/QdcxbpVQshcuZIzPmSFNUB0sheY+5nTHfeA01viIDtmkf/p2A0JhzLWat2 # h6DtniSnrm2vKMMnSamNJZmR+y+hnR4Ney9XAVoTTCgo748zQiIFCleM/2+CJ8gi # jfT1yFdaMoFTGi8fqrW+L2qviA1O+m0YAuhcJpRO1bhr6giwxBmTa3SZ+acWg3Pd # GkpBj0RVUkD0yL+KnGREscAKvH/kf6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCADnqf3kaXnmhNkxrhhGtNWtndzznZSusZXeJgeHaUSWwIGZusyQ1de # GBMyMDI0MTAyODExNDA0MS44NTZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu # 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6 # FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B # EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b # tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ # X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP # 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP # 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp # 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2 # uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG # cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d # OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8 # +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr # YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ # 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE # DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9 # uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp # Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n # +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath # RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX # XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4 # CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE # rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD # hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK # AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y # M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7 # RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j # /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty # l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1 # Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP # 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgdOMTtBxIpG3z # xpUDxEOIxXkadRY8pr0JgfULle5yllIwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9 # MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB # CwUABIICADYQ6DtDHxbQ9UAbxdZMFvhPjQm8UUWb6Li8Aj4NyjRv54hHSDh0p5t3 # j1WmKu5crcRt3BvrxcwvjEEYh7gCfw8ZdMnSRg1uEtD68eW1zhHsua8Y2gPdzMjb # uiUXwxe6klRaLeRzvgpeVQcMdODtrnt245wyuRYDAsM4IYSeTEt8YsJ2aGwW+iPC # YgbI5T3V3JnM+NK0M7YFHFBjUy80peN4cNXIqo/ZLt2pwDsDGVNsIPaXoIRgo3Ei # PeyRxwui5PUtXu9koR/AAxeBjdDuQbqfVtyDQwntq3lgZ6rtc8Ylrt2YdW8pzNmE # diPI7Djc+irshXn0w69soPcd8jOfVitw3Re7BpgbAg5WmhAfmkIslCFdMsF/FmoA # IlWIGe5qzRkCDkdCW8sCj6+1Hd1cIvc/tHmuMufI0DS5XDeGZZUUmYY1gbJvqcPn # wODtF/Oeu1G38FU9tQ60HK2ptKN96son6liL3Us+LsLcIS7IjZsw8+g+5FPQRemh # Rgq6uZVOgXIT3P6fH0xQG/WU2MTbCokE+pl/ZHcGCo1KR0PlTBqvzgWoAhx5uIZy # LA+wNNFD0gulPoLkUfMm8sbMXHqSYV3GMeNNafb1xAjDRYbPHpNoaRVbHjcPcEeb # mPhbtt4d+bIiTC3ELL3L1B8bJwQ0FY+89CXLT2F3giwOxn0kNA7W # SIG # End signature block
combined_dataset/train/non-malicious/250.ps1
250.ps1
function New-DjoinFile { [Cmdletbinding()] PARAM ( [Parameter(Mandatory = $true)] [System.String]$Blob, [Parameter(Mandatory = $true)] [System.IO.FileInfo]$DestinationFile = "c:\temp\djoin.tmp" ) PROCESS { TRY { $bytechain = New-Object -TypeName byte[] -ArgumentList 2 $bytechain[0] = 255 $bytechain[1] = 254 $FileStream = $DestinationFile.Openwrite() $bytechain += [System.Text.Encoding]::unicode.GetBytes($Blob) $bytechain += 0 $bytechain += 0 $FileStream.write($bytechain, 0, $bytechain.Length) $FileStream.Close() } CATCH { $Error[0] } } }
combined_dataset/train/non-malicious/1694.ps1
1694.ps1
function Expand-OU ($searchroot) { $searchrootarray = $searchroot.split('/') | ? {$_ -and $_ -notmatch '^(?:\s+)?$'} $dn = ([adsi]"LDAP://$($searchrootarray[0])").distinguishedname.ToString() $searchrootarray = $searchrootarray | select -Skip 1 foreach ($obj in $searchrootarray) { $query = Get-ADObject -Filter * -SearchBase $dn -SearchScope OneLevel | select name, distinguishedname if ($obj -in $query.name) { $dn = ($query | ? name -eq $obj).distinguishedname } else { throw "could not find '$obj' in '$dn'" } } Write-Output $dn }
combined_dataset/train/non-malicious/sample_54_19.ps1
sample_54_19.ps1
param ( [string]$Workspace, # [bool]$ModifyAllCaptions = $true [string]$strModifyAllCaptions = "false" ) if ($strModifyAllCaptions -eq "true") { $ModifyAllCaptions = $true } else { $ModifyAllCaptions = $false } $CreateJson = $PSScriptRoot + "\Create-Json.ps1" $ProjectDir = Split-Path $Workspace -Parent $AlcDir = Join-Path $ProjectDir "Compiler\" $CacheDir = Join-Path $AlcDir ".alpackages" $ALFiles = Get-ChildItem -Path $Workspace -Recurse -Filter "*.al" $TranslationJson = Join-Path $Workspace "Translations\Translation.json" $jsonData = Get-Content -Raw -Path $TranslationJson -Encoding UTF8 | ConvertFrom-Json -AsHashtable $LineCount = 0 $ModifiedFiles = 0 $ModifiedLines = 0 $AllApps = $true foreach ($ALFile in $ALFiles) { $Modified = $false $FileContent = Get-Content $ALFile -Encoding UTF8 for ($i = 0; $i -lt $FileContent.Length; $i++) { $LineCount++ $Comment = "" $Edited = $false if ($null -eq $FileContent[$i]) { continue } if ($FileContent[$i].ToLower() -match "(caption\s*=\s*'|label\s*'|tooltip\s*=\s*')") { # filter Captions and Labels if ($FileContent[$i].ToLower() -match "locked\s*=\s*true") { continue } if (!$ModifyAllCaptions) { if ($FileContent[$i].ToLower() -match "comment\s*=\s*'") { continue } } if ($FileContent[$i].ToString().Trim().Split(' ')[0].Contains("//")) { continue } # determine Source Type if ($FileContent[$i].ToLower().IndexOf("tooltip") -ne -1) { $Source = "ToolTip = '" } elseif ($FileContent[$i].ToLower().IndexOf("optioncaption") -ne -1) { $Source = "OptionCaption = '" } elseif ($FileContent[$i].ToLower().IndexOf("caption") -ne -1) { $Source = "Caption = '" } elseif ($FileContent[$i].ToLower().IndexOf("label") -ne -1) { $Source = "Label '" } # get Caption if ($FileContent[$i].Contains("',")) { $Caption = $FileContent[$i][($FileContent[$i].IndexOf("'") + 1)..($FileContent[$i].IndexOf("',") - 1)] -join "" if ([string]::IsNullOrEmpty($FileContent[$i][($FileContent[$i].IndexOf("',") + 2)..$FileContent[$i].Length] -join "")) { $FileContent[$i + 1] = $null } } else { $Caption = $FileContent[$i][($FileContent[$i].IndexOf("'") + 1)..($FileContent[$i].IndexOf("';") - 1)] -join "" } # check if Comment is in Translation.json if (($jsonData[$Caption].DES -ne $Caption) -and (![string]::IsNullOrEmpty($jsonData[$Caption].DES))) { $Comment = "Comment = '"+ $jsonData[$Caption].DES.Replace("'","''") + "'" } # check if Caption and Comment are identical elseif ($jsonData[$Caption].DES -eq $Caption) { $Comment = "Locked = true" } # check if Caption is a Comment in Translation.json else { foreach ($jsonObject in $jsonData.Keys) { if (($jsonData[$jsonObject].DES -eq $Caption) -and ($jsonData[$jsonObject].ENU -ne $Caption)) { $Comment = "Comment = `'"+ $Caption + "'" $Caption = $jsonData[$jsonObject].ENU $Edited = $true break } } if (!$Edited) { $Comment = "Comment = ''" } } if (($FileContent[$i].LastIndexOf(";") -ne -1) -and ($FileContent[$i].LastIndexOf(";") -gt ($FileContent[$i].LastIndexOf("',")))) { $UpdatedLine = $FileContent[$i].Substring(0, ($FileContent[$i].ToLower().IndexOf($Source.ToLower()))) + $Source + $Caption + "', " + $Comment + $FileContent[$i].Substring($FileContent[$i].LastIndexOf(";")) } else { $UpdatedLine = $FileContent[$i].Substring(0, ($FileContent[$i].ToLower().IndexOf($Source.ToLower()))) + $Source + $Caption + "', " + $Comment + ";" } if ($FileContent[$i] -ne $UpdatedLine) { $Modified = $true $ModifiedLines++ $FileContent[$i] = $UpdatedLine if ($Comment -eq "Comment = ''") { $FileContent[$i] += " //TODO Empty Translation" } } } } if ($Modified) { Set-Content $ALFile $FileContent -Encoding UTF8 $ModifiedFiles++ } } Write-Output "A total of $($ALFiles.Count) files with $($LineCount) lines were checked. `n $($ModifiedLines) lines in $($ModifiedFiles) files were modified." Start-Sleep -Seconds 3 Set-Location $ProjectDir\RequiredApps $BuildApps = Get-Content .\InstallOrder.json | ConvertFrom-Json Set-Location $Workspace $DependencyApps = (Get-Content .\app.json | ConvertFrom-Json).Dependencies.Name # update Required Apps in Compiler\.alpackages $RequiredApps = Join-Path $ProjectDir 'RequiredApps\*.app' if (-not (Test-Path ($CacheDir))) { New-Item $CacheDir -ItemType Directory | Out-Null } Copy-Item $RequiredApps $CacheDir $Apps = [ordered]@{} Set-Location $ProjectDir $Folders = Get-ChildItem $ProjectDir -Directory $BuildAppsList = $BuildApps.Apps | ForEach-Object { $_.Name } foreach ($App in $BuildAppsList) { foreach ($Folder in $Folders) { Set-Location $Folder.Name if (Test-Path "app.json") { $AppInfo = Get-Content "app.json" -Encoding UTF8 -Raw | ConvertFrom-Json if ($App -eq $AppInfo.Name) { $AppValues = @{"DirectoryName" = $Folder.Name; "Name" = $AppInfo.Name} $Apps.Add($AppInfo.Name, $AppValues) } } Set-Location .. } } foreach ($App in $Apps.Keys) { if ($Apps[$App].DirectoryName -eq (Split-Path $Workspace -Leaf) -or $Apps[$App].Name -in $DependencyApps) { Set-Location $ProjectDir Remove-Item .\$($Apps[$App].DirectoryName)\Translations\*.g.xlf Write-Output "Compilation of $($Apps[$App].Name)" # define variables $TempProjectDir = Join-Path $ProjectDir $Apps[$App].DirectoryName $TranslationDir = Join-Path $TempProjectDir "Translations\" $AppName = $Apps[$App].Name $DirectoryName = $Apps[$App].DirectoryName # compiler Set-Location $AlcDir $null = .\alc.exe /project:.\..\$DirectoryName /packagecachepath:$CacheDir $AppValues = @{"DirectoryName" = $DirectoryName; "Name" = $AppName} Set-Location $TranslationDir if (Test-Path .\*.g.xlf) { Write-Output "Compilation successful" Set-Location $TempProjectDir .$CreateJson $TempProjectDir } else { Write-Output "$($AppName) could not be compiled`n" } Set-Location $TempProjectDir Copy-Item .\*$AppName*.app (Join-Path $ProjectDir 'Compiler\.alpackages') Set-Location $ProjectDir } } # remove Project Apps from Compiler\.alpackages Set-Location $CacheDir $Apps.Keys | ForEach-Object { $AppKey = $_ Get-ChildItem -Recurse -Filter "*.app" | Where-Object { $_.Name -like "*$AppKey*" } | Remove-Item } $null = $AllApps # suppress Warning
combined_dataset/train/non-malicious/sample_22_55.ps1
sample_22_55.ps1
# # Module manifest for module 'OCI.PSModules.Cloudbridge' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '23fab747-5070-4685-94b0-d91859b2fd98' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudbridge Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent', 'Get-OCICloudbridgeAgentDependenciesList', 'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList', 'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset', 'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource', 'Get-OCICloudbridgeAssetSourceConnectionsList', 'Get-OCICloudbridgeAssetSourcesList', 'Get-OCICloudbridgeDiscoverySchedule', 'Get-OCICloudbridgeDiscoverySchedulesList', 'Get-OCICloudbridgeEnvironment', 'Get-OCICloudbridgeEnvironmentsList', 'Get-OCICloudbridgeHistoricalMetricsList', 'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory', 'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest', 'Get-OCICloudbridgeWorkRequestErrorsList', 'Get-OCICloudbridgeWorkRequestLogsList', 'Get-OCICloudbridgeWorkRequestsList', 'Import-OCICloudbridgeInventory', 'Invoke-OCICloudbridgeAnalyzeAssets', 'Invoke-OCICloudbridgeRefreshAssetSource', 'Invoke-OCICloudbridgeSubmitHistoricalMetrics', 'Move-OCICloudbridgeAgentCompartment', 'Move-OCICloudbridgeAgentDependencyCompartment', 'Move-OCICloudbridgeAssetCompartment', 'Move-OCICloudbridgeAssetSourceCompartment', 'Move-OCICloudbridgeAssetTags', 'Move-OCICloudbridgeDiscoveryScheduleCompartment', 'Move-OCICloudbridgeEnvironmentCompartment', 'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency', 'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource', 'New-OCICloudbridgeDiscoverySchedule', 'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory', 'Remove-OCICloudbridgeAgent', 'Remove-OCICloudbridgeAgentDependency', 'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource', 'Remove-OCICloudbridgeDiscoverySchedule', 'Remove-OCICloudbridgeEnvironment', 'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest', 'Update-OCICloudbridgeAgent', 'Update-OCICloudbridgeAgentDependency', 'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource', 'Update-OCICloudbridgeDiscoverySchedule', 'Update-OCICloudbridgeEnvironment', 'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_38_29.ps1
sample_38_29.ps1
const lang = Object.freeze({ "displayName": "CUE", "fileTypes": ["cue"], "name": "cue", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "captures": { "1": { "name": "keyword.other.package" }, "2": { "name": "entity.name.namespace" } }, "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(package)[ \\t]+([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)(?![\\p{L}\\p{Nd}_\\$\\#])" }, { "patterns": [{ "begin": "(?<![\\p{L}\\p{Nd}_\\$\\#])(import)[ \\t]+(\\()", "beginCaptures": { "1": { "name": "keyword.other.import" }, "2": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.imports", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "captures": { "1": { "name": "entity.name.namespace" }, "2": { "name": "punctuation.definition.string.begin" }, "3": { "name": "string.quoted.double-import" }, "4": { "name": "punctuation.colon" }, "5": { "name": "entity.name" }, "6": { "name": "punctuation.definition.string.end" } }, "match": '(?:([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)[ \\t]+)?(")([^:"]+)(?:(:)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*))?(")', "name": "meta.import-spec" }, { "match": ";", "name": "punctuation.separator" }, { "include": "#invalid_in_parens" }] }, { "captures": { "1": { "name": "keyword.other.import" }, "2": { "name": "entity.name.namespace" }, "3": { "name": "punctuation.definition.string.begin" }, "4": { "name": "string.quoted.double-import" }, "5": { "name": "punctuation.colon" }, "6": { "name": "entity.name" }, "7": { "name": "punctuation.definition.string.end" } }, "match": '(?<![\\p{L}\\p{Nd}_\\$\\#])(import)[ \\t]+(?:([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)[ \\t]+)?(")([^:"]+)(?:(:)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*))?(")', "name": "meta.import" }] }, { "include": "#punctuation_comma" }, { "include": "#declaration" }, { "include": "#invalid_in_braces" }], "repository": { "attribute_element": { "patterns": [{ "begin": "([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(=)", "beginCaptures": { "1": { "name": "variable.other" }, "2": { "name": "punctuation.bind" } }, "end": "(?=[,\\)])", "patterns": [{ "include": "#attribute_string" }] }, { "begin": "([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(\\()", "beginCaptures": { "1": { "name": "variable.other" }, "2": { "name": "punctuation.attribute-elements.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.attribute-elements.end" } }, "patterns": [{ "include": "#punctuation_comma" }, { "include": "#attribute_element" }] }, { "include": "#attribute_string" }] }, "attribute_string": { "patterns": [{ "include": "#string" }, { "match": `[^\\n,"'#=\\(\\)]+`, "name": "string.unquoted" }, { "match": "[^,\\)]+", "name": "invalid" }] }, "comment": { "patterns": [{ "captures": { "1": { "name": "punctuation.definition.comment" } }, "match": "(//).*$\\n?", "name": "comment.line" }, { "begin": "/\\*", "captures": { "0": { "name": "punctuation.definition.comment" } }, "end": "\\*/", "name": "comment.block" }] }, "declaration": { "patterns": [{ "begin": "(@)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(\\()", "beginCaptures": { "1": { "name": "punctuation.definition.annotation" }, "2": { "name": "variable.annotation" }, "3": { "name": "punctuation.attribute-elements.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.attribute-elements.end" } }, "name": "meta.annotation", "patterns": [{ "include": "#punctuation_comma" }, { "include": "#attribute_element" }] }, { "match": "(?<!:)::(?!:)", "name": "punctuation.isa" }, { "include": "#punctuation_colon" }, { "match": "\\?", "name": "punctuation.option" }, { "match": "(?<![=!><])=(?![=~])", "name": "punctuation.bind" }, { "match": "<-", "name": "punctuation.arrow" }, { "include": "#expression" }] }, "expression": { "patterns": [{ "patterns": [{ "captures": { "1": { "name": "keyword.control.for" }, "2": { "name": "variable.other" }, "3": { "name": "punctuation.separator" }, "4": { "name": "variable.other" }, "5": { "name": "keyword.control.in" } }, "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(for)[ \\t]+([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(?:[ \\t]*(,)[ \\t]*([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+))?[ \\t]+(in)(?![\\p{L}\\p{Nd}_\\$\\#])" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])if(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "keyword.control.conditional" }, { "captures": { "1": { "name": "keyword.control.let" }, "2": { "name": "variable.other" }, "3": { "name": "punctuation.bind" } }, "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(let)[ \\t]+([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)[ \\t]*(=)(?![=])" }] }, { "patterns": [{ "match": "[\\+\\-\\*]|/(?![/*])", "name": "keyword.operator" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:div|mod|quo|rem)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "keyword.operator.word" }, { "match": "=[=~]|![=~]|<=|>=|[<](?![-=])|[>](?![=])", "name": "keyword.operator.comparison" }, { "match": "&{2}|\\|{2}|!(?![=~])", "name": "keyword.operator.logical" }, { "match": "&(?!&)|\\|(?!\\|)", "name": "keyword.operator.set" }] }, { "captures": { "1": { "name": "punctuation.accessor" }, "2": { "name": "variable.other.member" } }, "match": "(?<!\\.)(\\.)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(?![\\p{L}\\p{Nd}_\\$\\#])" }, { "patterns": [{ "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])_(?!\\|)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.top" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])_\\|_(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.bottom" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])null(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.null" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:true|false)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.bool" }, { "patterns": [{ "patterns": [{ "match": "(?<![\\p{L}\\p{Nd}_\\.])[0-9](?:_?[0-9])*\\.(?:[0-9](?:_?[0-9])*)?(?:[eE][\\+\\-]?[0-9](?:_?[0-9])*)?(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.float.decimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])[0-9](?:_?[0-9])*[eE][\\+\\-]?[0-9](?:_?[0-9])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.float.decimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])\\.[0-9](?:_?[0-9])*(?:[eE][\\+\\-]?[0-9](?:_?[0-9])*)?(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.float.decimal" }] }, { "patterns": [{ "patterns": [{ "match": "(?<![\\p{L}\\p{Nd}_\\.])(?:0|[1-9](?:_?[0-9])*)(?:\\.[0-9](?:_?[0-9])*)?(?:[KMGTPEYZ]i?)(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.other" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])\\.[0-9](?:_?[0-9])*(?:[KMGTPEYZ]i?)(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.other" }] }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])(?:0|[1-9](?:_?[0-9])*)(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.decimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])0b[0-1](?:_?[0-1])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.binary" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])0[xX][0-9a-fA-F](?:_?[0-9a-fA-F])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.hexadecimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])0o?[0-7](?:_?[0-7])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.octal" }] }] }, { "include": "#string" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:bool|u?int(?:8|16|32|64|128)?|float(?:32|64)?|string|bytes|number|rune)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "support.type" }, { "patterns": [{ "begin": "(?<![\\p{L}\\p{Nd}_\\$\\#])(len|close|and|or)(\\()", "beginCaptures": { "1": { "name": "support.function" }, "2": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.function-call", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "begin": "(?<![\\p{L}\\p{Nd}_\\$\\#])([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)(\\.)(\\p{Lu}[\\p{L}\\p{Nd}_\\$\\#]*)(\\()", "beginCaptures": { "1": { "name": "support.module" }, "2": { "name": "punctuation" }, "3": { "name": "support.function" }, "4": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.function-call", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }] }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:[\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "variable.other" }, { "begin": "\\{", "beginCaptures": { "0": { "name": "punctuation.definition.struct.begin" } }, "end": "\\}", "endCaptures": { "0": { "name": "punctuation.definition.struct.end" } }, "name": "meta.struct", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#punctuation_ellipsis" }, { "include": "#declaration" }, { "include": "#invalid_in_braces" }] }, { "begin": "\\[", "beginCaptures": { "0": { "name": "punctuation.section.brackets.begin" } }, "end": "\\]", "endCaptures": { "0": { "name": "punctuation.section.brackets.end" } }, "name": "meta.brackets", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_colon" }, { "include": "#punctuation_comma" }, { "include": "#punctuation_ellipsis" }, { "captures": { "1": { "name": "variable.other" }, "2": { "name": "punctuation.alias" } }, "match": "([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)[ \\t]*(=)" }, { "include": "#expression" }, { "match": "[^\\]]+", "name": "invalid" }] }, { "begin": "\\(", "beginCaptures": { "0": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.parens", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }] }] }, "invalid_in_braces": { "match": "[^\\}]+", "name": "invalid" }, "invalid_in_parens": { "match": "[^\\)]+", "name": "invalid" }, "punctuation_colon": { "match": "(?<!:):(?!:)", "name": "punctuation.colon" }, "punctuation_comma": { "match": ",", "name": "punctuation.separator" }, "punctuation_ellipsis": { "match": "(?<!\\.)\\.{3}(?!\\.)", "name": "punctuation.ellipsis" }, "string": { "patterns": [{ "begin": '#"""', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double-multiline", "end": '"""#', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\#(?:"""|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": '#"', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double", "end": '"#', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\#(?:"|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": "#'''", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single-multiline", "end": "'''#", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\#(?:'''|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": "#'", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single", "end": "'#", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\#(?:'|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": '"""', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double-multiline", "end": '"""', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\(?:"""|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": '"', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double", "end": '"', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\(?:"|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": "'''", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single-multiline", "end": "'''", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\(?:'''|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": "'", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single", "end": "'", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\(?:'|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": "`", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.backtick", "end": "`", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string" }] }, "whitespace": { "match": "[ \\t\\r\\n]+" } }, "scopeName": "source.cue" }); var cue = [ lang ]; export { cue as default };
combined_dataset/train/non-malicious/sample_58_97.ps1
sample_58_97.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> $MetaData = @{ "OperationType" = @("Deployment") "UIName" = 'Azure Stack HCI SBE Health' "UIDescription" = 'Check SBE Health requirements' } function Test-AzStackHciSBEHealth { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $Parameters, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $OperationType, [parameter(Mandatory = $false)] [switch] $FailFast ) try { $env:EnvChkrOp = $OperationType Trace-Execution "Starting SBE Health validation for $OperationType" if ($OperationType -eq 'Deployment') { Trace-Execution "Checking SBE Configuration" $sbeConfigNuget = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.SBEConfiguration" # Only run tests if the SBE Package is 4.1.x.x or later $sbeVerMatch = "[4-9]\.[1-9]\." if ($sbeConfigNuget -notmatch $sbeVerMatch) { $detailedMessage = "SBE Configuration nuget '$($sbeConfigNuget)' does not support this test. Must be version 4.1.x.x or later." Trace-Execution $detailedMessage return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = $detailedMessage}) } $sbeMetadataPath = Join-Path -Path $sbeConfigNuget -ChildPath "content" Trace-Execution "Getting SBE Package source local path" $sbeSourcePath = $Parameters.Roles["SBE"].PublicConfiguration.PublicInfo.SBEContentPaths.SBESeedNodePath if ($null -eq $sbeSourcePath) { $detailedMessage = "SBE Seed Node Path property did not get populated. Please retry the deployment." Trace-Execution $detailedMessage throw $detailedMessage } Trace-Execution "Getting PSSessions for all hosts" $psSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters) $params = @{ PsSession = $psSession PassThru = $true OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" Tag = $OperationType SBESourcePath = $sbeSourcePath SBEMetadataPath = $sbeMetadataPath ECEParameters = $Parameters } # Run SBE Health Check [array]$sbeResult = Invoke-AzStackHciSBEHealthValidation @params return [EnvironmentValidator]::ParseResult($sbeResult, 'SBEHealth', $FailFast) } elseif ($OperationType -eq 'AddNode') { # TODO : Future placeholder for when AddNode tests are implemented Trace-Execution "SBE Health validation for $OperationType has not been implemented yet" return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'SBE Health validation has been skipped as this OperationType is not yet supported.'}) <# $sbeSourcePath = # TODO : need to use path that exists after deployment $sbeMetadataPath = # TODO : need to use path that exists after deployment $addNode = [EnvironmentValidator]::GetNodeContext($Parameters) $psSession = [EnvironmentValidator]::NewPsSessionByHost($Parameters, $addNode, $true) $params = @{ PsSession = $psSession PassThru = $true OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" Tag = $OperationType SBESourcePath = $sbeSourcePath SBEMetadataPath = $sbeMetadataPath } # Run SBE Health Check [array]$sbeResult = Invoke-AzStackHciSBEHealthValidation @params return [EnvironmentValidator]::ParseResult($sbeResult, 'SBEHealth', $FailFast) #> } else { Trace-Execution "OperationType $OperationType is not implemented" return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'SBE Health validation has been skipped as this OperationType is not yet supported.'}) } } catch { Trace-Execution "Validator failed. $PSItem" Trace-Execution "$($PSItem.ScriptStackTrace)" throw $PSItem } finally { if ($psSession) { $psSession | Microsoft.PowerShell.Core\Remove-PSSession } } } Export-ModuleMember -Function Test-AzStackHciSBEHealth -Variable MetaData # SIG # Begin signature block # MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDtyRK7oLrK7Dl # Z46ND3ewz/pg9Twqefy2C46qemDDDKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGggwghoEAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINo+gAQshbfLNNdxA/dLx5xK # G88hsZCVQ2EG79G3HB56MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAm/osx7prw7EaoB63YfmIwF2qszkaoUbS6j9sOB7Zm7Stp+KGM/Hfx6yw # 5H6GEvVY1WUh6gtmRGG+jmd+p9ppHcodsnw4AESAN3bLPD4EtfnUktX8DuOSAN8r # lqIkmCTDdH9KfXmCXeJgNaPXvhCttETLzeDZZvNzy+WpoXe6YsuFtierAnGXlM0z # u4Vl8fO7CLCDHFWf7CZOZAY6SB1kNQdIT/t2WSD15G8XNvZqOwnb6EsrJ/vvmPNu # a86R2S+mWUVwYOw5W3EWDPPcWk/6M4RosXg9WndN24EeUsiqIK514SgTihTizMhU # Rr4aJxRJ2p7wHzF7RqnBK0OMcHy2+aGCF5IwgheOBgorBgEEAYI3AwMBMYIXfjCC # F3oGCSqGSIb3DQEHAqCCF2swghdnAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCnrPRjEe0vNdFsUsRclgjvjiF0MS5aQ4UA4n2ysTwv+QIGZkYZ0Mu1 # GBIyMDI0MDUxNjE4NDQyNi4zNVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EekwggcgMIIFCKADAgECAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy # MloXDTI1MDMwNTE4NDUyMlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOFBd0TRbNcbvDN4L1IZ0fp5XB0aUXpiClTvB44UGSlb # 3K4SYlIMTUAMHH/QNO5EFqmVIPwJHVCrJCbFEMP8J28PJ5kUBxnqXb6eUyyyZnIL # xM+3UZNYBS3cZdRTqDQXS0isU0uCh8KM6+bcbSPjzZW60pLjBlPps1WcFWwKGvYC # OZVsYM3/pCz8SpqQvlzCkZ6XW17tQ7Xd1TBo+M7LRaLWpg2ZHyLtPWW6PYl0V19m # Ew/KrKr80Odm441JuPwUznEoGhqvXatqALz/UJdovU4xcHAZpGglNi2SyL2eO6rj # AORwDCK0JnkG1DY2o9nSUuJAHs7XQGb3Okdaf3HX8eZ0CfiSgxYpQPAfmx3/MO7i # +LzzsVbGbniSRY2+TwV5DtlnRDmCoYpbiDqt69XYh0DEGhtZ2iurC/OovvRZ2yAN # T8/lzQvy9giyRQll50IYczaEciw1HLD0QWhKiUMz7IJ52TPr3vzuzycinnmJwt8O # grDmFqTkboxYXp3vW1w3NX36/1FAoxrpTB/Kq6t513mypdYJe/76F6TgDXlbJshz # q59PSKVrMphm8O+hqzCCM/RJ4tbua+ZzDQUQvMXX+5ZpcSUsc5ciWJ4oXaL9jNDp # TnQr11uGcxoNwlKwbSFctFPL8tBuw4PSHDsW4rSebOi1LH/l+j2Dt8LOgWOTe0MT # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU+jlbyj3zSQx9FVBtrpPfgfB6UtowHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBAJZ9wmbavBe0+LviSbo8oCSeL34Fai2r5C0M # aB5PkXeujs+whQ0pGRTK24aojy2EvclytvTfHoM6mlgkQD6lvqjao+MV107VMuq9 # Jetib46AIsv7v7cWZGZ+RG7yse+mtpvQ7X3ANu6SA7wjk6LVF6AwmXy3mT9S0TRZ # vfMCU4ecKMsZLM/8Ojem3CFeiSTTYi8PtJkQFs9ugZu3DgsIexPakVqSkY4GH4hJ # QxcF/zfkK5U1913DGbIa81LPITISTmHVWHu2nA/vPusn4eyI/ix2oGOPoC+im5/i # vFQB+sRtXpqPy3AWztZUc2IiCsc2dr/nmTKsAb1i3X0I++RTDFgrS5m8+XZYLf2d # 9zSM5OOK8Luz8hSjMTi1/Lck2TJDVw229l+2JfePkO354s564YOO+Em9gwgSSmRX # rxcs0fv5kF9hr4+Z9FhqgUUcIkoShFJnc9sMk8GISFn3K7Ex12gwxDX1OTJ+2i3o # TPReFKbCNgGrf0O8EVaGXIMYGGtTca14NaJV31gZIHZafG4UzLl9sArqjw9bPxBE # yKm1ccrccMGvbBZYRyuuBxO4dkglOp6k2hiXH1VEW+P+8JdoAVyaRbWeTtUT6jBp # evlEmOvIOr25uTIOrWZ2sX+B5pEAtdw1lt81ciSFfNcDprwKJqZxBb8OCYsmmJVA # 2uJlgIcgMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA0ww # ggI0AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIwk # bi+DSO4w5WfYG4oAJS8/zQW6oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp8JhPMCIYDzIwMjQwNTE2MTQzNTU5 # WhgPMjAyNDA1MTcxNDM1NTlaMHMwOQYKKwYBBAGEWQoEATErMCkwCgIFAOnwmE8C # AQAwBgIBAAIBIDAHAgEAAgISVzAKAgUA6fHpzwIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBCwUAA4IBAQCOT5bRicuEqnRI5E0caLgnNSQ7Vi72RryEXQqyd5cZj/DtxVdL # seJ4w3rO7G+NiRtp+rg25NiOe+/8cFb3vd3x4N/brf4W902cvPzG7ZpXlqVcTJAk # FBQNiUykGRJVQn5FCV742dRskYN02/8zJUxYydjDVR2SyVJnPXXD24DJO7LXXoHS # EBpXWeyD0hsHEjp7RpNpfO+6mrK2UXQ6ES4gA9m1CwNTM/yLrLcbsgL03b0BmsPj # YLEAjvOC0pq46Ot/I8Nij4P4peKn4jUwxtgZB4n0ndlTvFMlMl5UpN8gq5Zv6wc6 # tAAOVUZ35JmqFwnktcn+5tMSzIQWg+g4M9h3MYIEDTCCBAkCAQEwgZMwfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwDQYJ # YIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkq # hkiG9w0BCQQxIgQgci20c3sgYGsZipLHxd80IojV9FN2rotm+dkCLjny31EwgfoG # CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAq0trE1QKEIIJB0efaTaooHtMXyU9i # d1PFtUnPB/jrHTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # AhMzAAAB6FCwgM8rcplNAAEAAAHoMCIEIKfQhif/JIYIV+HN3IDTHOvgwatUZFsm # t3B7KGyU0gQ2MA0GCSqGSIb3DQEBCwUABIICAIrgNlthZRhwEOrAt+13Th8uz13Z # 4pzCls51LiJGw1xX1X20auHbnYnbjMaEVEjbBS2+zSixrJHkGiyRCBxbn3Zzzs+A # nPe5jPzX6pPPUGnzkPf031En+yDyaGTDeV/yLrAz+R55QVpSjVq3mb4/aXnAEyE2 # ntIH1pZl6f2R2Y+d6kuxA6lb5lnAvDdqDdww2Z2bw4sFdzz9NiZB9iEW0nujxP60 # 1sJSqVe9i0e0ds3g2BnY4YX1iyJMhs2o17w4Qwg4ZOQU3LAs+pSwJXs7amp+J/sW # icB6YyOAZQjtSptQofTCINflI9Ol7gIf3WGytxAd7LudzsyYipdUvUg7L6tkQih5 # fdpZLF914oGwzL/Bz7x/q+mMmSF4pCa4N82WQUTbr+Rd95HD6Ny50pElwbtmCvW8 # c0R/oSh0JxE2ljdak4F3zKGjRZbPu1WFSKlvg67+2IgDBoeS5DT3NWfqwvMkXIx8 # TrKEzGxcVYrNLaUNj4vce7H4cSmcyr+5o/ay0j9shBkUUsohywyo+XmTw0HVmKWU # mYfGJExHlXQj/7CKvoiQA3b5xiU1vLOgJsTpbRJV6sKKEJOUlzLu1USHifNhQg8O # J/WK8dh5Z1kafdnyjkzNvAoAzqCktTQPMWiTopVZxITtK/pcKXeaqqyqTMZG0Goq # IrR4ZCJohJ8Hdhsu # SIG # End signature block
combined_dataset/train/non-malicious/sample_16_44.ps1
sample_16_44.ps1
# # Module manifest for module 'OCI.PSModules.Aidocument' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aidocument.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aidocument Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList', 'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject', 'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest', 'Get-OCIAidocumentWorkRequestErrorsList', 'Get-OCIAidocumentWorkRequestLogsList', 'Get-OCIAidocumentWorkRequestsList', 'Invoke-OCIAidocumentAnalyzeDocument', 'Invoke-OCIAidocumentPatchModel', 'Move-OCIAidocumentModelCompartment', 'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel', 'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject', 'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentProject', 'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest', 'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_37_99.ps1
sample_37_99.ps1
# # Module manifest for module 'OCI.PSModules.Generativeaiinference' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceEmbedText', 'Invoke-OCIGenerativeaiinferenceSummarizeText', 'New-OCIGenerativeaiinferenceText' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/150.ps1
150.ps1
function Remove-PSObjectProperty { PARAM ( $PSObject, [String[]]$Property) PROCESS { Foreach ($item in $Property) { $PSObject.psobject.Properties.Remove("$item") } } }
combined_dataset/train/non-malicious/Add new smtp_set prmary.ps1
Add new smtp_set prmary.ps1
#alias,addnewemailaddress import-csv .\\source.csv | foreach { $user = Get-Mailbox $_.alias $user.emailAddresses+= $_.addnewemailaddress $user.primarysmtpaddress = $_.addnewemailaddress Set-Mailbox $user -emailAddresses $user.emailAddresses set-Mailbox $user -PrimarySmtpAddress $user.primarysmtpaddress }
combined_dataset/train/non-malicious/Hack ESXi_2.ps1
Hack ESXi_2.ps1
$screen = " You see here a virtual switch. ------------ ------ #...........| |....| --------------- ###------------ |...(| |..%...........|########## ###-@...| |...%...........### # ## |....| +.......<......| ### ### |..!.| --------------- ### ### ------ ---.----- ### |.......|#### --------- . Clyde the Sysadmin St:7 Dx:9 Co:10 In:18 Wi:18 Ch:6 Chaotic Evil Dlvl:3 $:120 HP:39(41) Pw:36(36) AC:6 Exp:5 T:1073 " Set-VMHostAdvancedConfiguration -name Annotations.WelcomeMessage -value $screen
combined_dataset/train/non-malicious/2124.ps1
2124.ps1
Describe "Scripting.Followup.Tests" -Tags "CI" { It "'[void](New-Item) | <Cmdlet>' should work and behave like passing AutomationNull to the pipe" { try { $testFile = Join-Path $TestDrive (New-Guid) [void](New-Item $testFile -ItemType File) | ForEach-Object { "YES" } | Should -BeNullOrEmpty $testFile | Should -Exist } finally { Remove-Item $testFile -Force -ErrorAction SilentlyContinue } } It "'[void]`$arraylist.Add(1) | <Cmdlet>' should work and behave like passing AutomationNull to the pipe" { $arraylist = [System.Collections.ArrayList]::new() [void]$arraylist.Add(1) | ForEach-Object { "YES" } | Should -BeNullOrEmpty $arraylist.Count | Should -Be 1 $arraylist[0] | Should -Be 1 } It "'`$arraylist2.Clear() | <Cmdlet>' should work and behave like passing AutomationNull to the pipe" { $arraylist = [System.Collections.ArrayList]::new() $arraylist.Add(1) > $null $arraylist.Clear() | ForEach-Object { "YES" } | Should -BeNullOrEmpty $arraylist.Count | Should -Be 0 } }
combined_dataset/train/non-malicious/sample_29_61.ps1
sample_29_61.ps1
# # Module manifest for module 'OCI.PSModules.Governancerulescontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Governancerulescontrolplane.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '96ae80bb-9cf9-48b1-b722-28d177d3da7a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Governancerulescontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Governancerulescontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRule', 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRulesList', 'Get-OCIGovernancerulescontrolplaneGovernanceRule', 'Get-OCIGovernancerulescontrolplaneGovernanceRulesList', 'Get-OCIGovernancerulescontrolplaneInclusionCriteriaList', 'Get-OCIGovernancerulescontrolplaneInclusionCriterion', 'Get-OCIGovernancerulescontrolplaneTenancyAttachment', 'Get-OCIGovernancerulescontrolplaneTenancyAttachmentsList', 'Get-OCIGovernancerulescontrolplaneWorkRequest', 'Get-OCIGovernancerulescontrolplaneWorkRequestErrorsList', 'Get-OCIGovernancerulescontrolplaneWorkRequestLogsList', 'Get-OCIGovernancerulescontrolplaneWorkRequestsList', 'Invoke-OCIGovernancerulescontrolplaneRetryGovernanceRule', 'Invoke-OCIGovernancerulescontrolplaneRetryTenancyAttachment', 'New-OCIGovernancerulescontrolplaneGovernanceRule', 'New-OCIGovernancerulescontrolplaneInclusionCriterion', 'Remove-OCIGovernancerulescontrolplaneGovernanceRule', 'Remove-OCIGovernancerulescontrolplaneInclusionCriterion', 'Stop-OCIGovernancerulescontrolplaneWorkRequest', 'Update-OCIGovernancerulescontrolplaneGovernanceRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Governancerulescontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_12_81.ps1
sample_12_81.ps1
# Rule ID 4628 # --------- # http://sharepoint/sites/rules/Rule%20Submissions/Dynamics-CRM_ehagen_2012-06-11-03-02-42.xml # # Description: This checks to see if the data types on each CRM registry key is correct. # # Related KB #----------- # Script Author: jrandall # PARAM($RegistryPath=$null) #region function function Get-MSCRMRegistryKeys{ param ([string] $RegKeyPath) trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; } $RegInfoObjs = @() if (Test-Path $RegKeyPath){ $MSCRMKey = Get-Item $RegKeyPath if ($MSCRMKey -ne $null){ $regInfo = GetRegistryProperties $MSCRMKey } $RegInfoObjs += $regInfo #Handle the subkeys $childItems = Get-ChildItem -Path $MSCRMKey.PSPath -Recurse foreach ($item in $childItems){ if ($item.ValueCount -gt 0){ $childRegInfo = GetRegistryProperties $item } $RegInfoObjs += $childRegInfo } #finally return the collection return $RegInfoObjs } } function GetRegistryDataType([string] $type){ switch ($type){ "Binary" {return "REG_BINARY"} "Dword" {return "REG_DWORD"} "String" {return "REG_SZ"} "Qword" {return "REG_QWORD"} "ExpandString" {return "REG_EXPAND_SZ"} "MultiString" {return "REG_MULTI_SZ"} default {return $type} } } function GetRegistryProperties{ param ([Object]$key ) $PropertiesCollected=@() $valueNames = $key.GetValueNames() foreach ($valueName in $valueNames){ $RegistryValueObj = new-object PSObject $RegistryValueObj | add-member -membertype noteproperty -name "Name" -value $valueName $RegistryValueObj | Add-Member -MemberType NoteProperty -Name "DataType" -Value (GetRegistryDataType $key.GetValueKind($valueName).ToString()) $RegistryValueObj | Add-Member -MemberType NoteProperty -Name "Value" -Value $key.GetValue($valueName) $PropertiesCollected += $RegistryValueObj } return $PropertiesCollected } function ValidateDataTypes{ param([Object] $registryObjectCollection, [Object] $InformationCollected) trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; } $detectedObjs = @() $detectedObjs = $registryObjectCollection | Where-Object {($_.DataType -ne "REG_DWORD") -and ($_.DataType -ne "REG_SZ") -and ($_ -ne $null)} if ($detectedObjs -ne $null -or $detectedObjs.Count -gt 0){ #found issues, loop through and add them to the Information Collected object foreach ($detectedObj in $detectedObjs){ $InformationCollected | add-member -membertype noteproperty -name "The Microsoft CRM Registry Key $($detectedObj.Name) has an incorrect Data Type :" -value "Current Data Type is $($detectedObj.DataType)" } return $true }else{ return $false } } #endregion function Import-LocalizedData -BindingVariable LocalizedMessages Write-DiagProgress -Activity $LocalizedMessages.PROGRESSBAR_ID_REGISTRYDATATYPECHECK -Status $LocalizedMessages.PROGRESSBAR_ID_REGISTRYDATATYPECHECKDesc "--> Entered TS_REGISTRYDATATYPECHECK.ps1" | WriteTo-StdOut $Error.Clear() $RootCauseDetected = $false $RuleApplicable = $true $RootCauseName = "RC_REGISTRYDATATYPEINCORRECT" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=MSS;EN-US;113012110154455" $PublicContentURL="" $SolutionTitle="The data type on one or more the Microsoft Dynamics CRM Registry Keys is incorrect" $Verbosity = "Error" $Visibility = "3" $SupportTopicsID = "11953" $InformationCollected = new-object PSObject $arrRegInfoObjs = Get-MSCRMRegistryKeys -RegKeyPath $RegistryPath $RootCauseDetected = ValidateDataTypes $arrRegInfoObjs $InformationCollected if ($RootCauseDetected){ # Red/ Yellow Light Update-DiagRootCause -Id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -Verbosity $Verbosity -SolutionTitle $SolutionTitle -PublicContentURL $PublicContentURL -SupportTopicsID $SupportTopicsID -InformationCollected $InformationCollected }else{ # Green Light Update-DiagRootCause -Id $RootCauseName -Detected $false } "<-- Exited TS_REGISTRYDATATYPECHECK.ps1" | WriteTo-StdOut # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBVaIQBtDQv8wK9 # pxWD95UygAKfna/qfCfUZ5+WhZgEnaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPz5 # gJAgc8WjgNIBgV81TXwqcaYCh/poAaQZBq8iix1uMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAJcfSFFfi7rD+t7hDrj+XClrrXNHmR/JUmbMN # M+xrIeapPZRMAxkakyufrYXWATEBBlotjvChUJK8NCjeTcg82sPFYcHLBXUz30Ho # 9rgZCfnTrISh0KOQR/+DTKpbSMJ7aEPWqPkUPtKxE7UDcrpCGmV0OzCy1kuIaWjM # ZSW+BBKfzDMJIHF+6Fqx3SevSjsoimkq6ss7gVCQNUiYJyG3dwv2JAasb+UPi/zj # 6wp7AU2fuQPxAmDOK1ZOYuNerIJrxABMvZj+lJkCXNZoyooEvX+vq/138Uu5ZQro # mBQ9THJDZ9+PbdgHpEkMqa0dqaelb1aDX8HkCzrjjo54hypSTKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAv//0sWrmsKeGIiCeb6KbwBAq9uuNzEniz # xyfFQsaccAIGZut4BYxTGBMyMDI0MTAyODExNDAzOS45ODRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ # lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38 # 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC # fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D # cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA # ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT # M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB # Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo # u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0 # PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88 # 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv # eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/ # 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4 # Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6 # I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa # QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV # 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS # s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5 # WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q # 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK # CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi # TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y # Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0 # MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA # AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3 # UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS # TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3 # FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO # RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB # NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgcpTSuAf8G2DYiAqNyxZ4zlSf6fZ2RS01zBB6dmS0bpUwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT # hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1 # KYILMA0GCSqGSIb3DQEBCwUABIICAEiL6N0RzUyis7YICiKFp7KtYbY9YvpYz2GQ # i1icubtG5A+zLuc7iXURtluH06A1tqIUPLrmw2wOPmUnvfbIIIVm1gPDdpPUWKY0 # 18/AhoZHZGNC1cAywf0hztOCnQ4w412OiY0cYpzHMB/vo6viUgUwxY+ilmhG8yI+ # GBvdpXg2TJafJiVGEPKCZrVm9yUTXG2WBELzZvvl+xNjJlHnSei+S189d3PSgvcX # SpneXRjjQu0DFY0o/DeELUmpwRmr95dZmKpQVLd1TQR3X2XL/Jby/h3edOFSLdSP # iYeKpARB5ObXeWGUxtBYw1PVP/9jpVb57gMQk3BIzpgy8UkBSRRVYnN5CkD/WagU # P77sVdCm0BkJW9ZcfEXw7FVPpX8oyTaqfB7VUQ8g5XT2uLQmTwgwIXW7yvav6gvk # /FSHO/DauxkPwhflLNKZtVz+vBQ/hmah6ovsHmE9xbFJ8iYFobPOALrXhyJ4nGyb # rwxXsPiwJCpFnJD7vw0G+yEQPBvhAer/4e0vEwgwNGbAshh08Ym3E3ioEvPgoAlC # 7P/pZNOI6pxj4NNZiLX8Sgrid2kUAj+nkcehfpwPQDPWtbZWU8ZU6WJmqL+Z4A1T # UQ7u/hMaWR/alFaNBP/mIxFWr3y71xHO3sHrIA0gh8pwceZYjtuLJvJQWOurE0oR # ABgr80jF # SIG # End signature block
combined_dataset/train/non-malicious/Get-RemoteRegistry.ps1
Get-RemoteRegistry.ps1
# Get-RemoteRegistry # NOTE: you have to have access, and the remote registry service has to be running param( [string]$computer = $(Read-Host "Remote Computer Name") ,[string]$Path = $(Read-Host "Remote Registry Path (must start with HKLM,HKCU,etc)") ,[switch]$Verbose ) if ($Verbose) { $VerbosePreference = 2 } # Only affects this script. $root, $last = $Path.Split("\\") $last = $last[-1] $Path = $Path.Substring($root.Length + 1,$Path.Length - ( $last.Length + $root.Length + 2)) #split the path to get a list of subkeys that we will need to access # ClassesRoot, CurrentUser, LocalMachine, Users, PerformanceData, CurrentConfig, DynData switch($root) { "HKCR" { $root = "ClassesRoot"} "HKCU" { $root = "CurrentUser" } "HKLM" { $root = "LocalMachine" } "HKU" { $root = "Users" } "HKPD" { $root = "PerformanceData"} "HKCC" { $root = "CurrentConfig"} "HKDD" { $root = "DynData"} default { return "Path argument is not valid" } } #Access Remote Registry Key using the static OpenRemoteBaseKey method. Write-Verbose "Accessing $root from $computer" $rootkey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($root,$computer) if(-not $rootkey) { Write-Error "Can't open the remote $root registry hive" } Write-Verbose "Opening $Path" $key = $rootkey.OpenSubKey( $Path ) if(-not $key) { Write-Error "Can't open $($root + '\\' + $Path) on $computer" } $subkey = $key.OpenSubKey( $last ) if($subkey) { $subkey.GetSubKeyNames() | foreach { "{0}\\" -f $_ } $subkey.GetValueNames() | foreach { "({3}) {0} = {1}" -f $_, $subkey.GetValue($_), $subkey.GetValueKind($_) } } else { $key.GetValue($last) }
combined_dataset/train/non-malicious/Highlight syntax_1.ps1
Highlight syntax_1.ps1
#code which need highlight $code = @' #just example Get-Process | % { try { "{0, 7} {1}" -f $_.Id, $_.MainModule.ModuleName } catch [System.ComponentModel.Win32Exception] {} } '@ function frmMain_Show { Add-Type -AssemblyName System.Windows.Forms #keywords $type = New-Object "Collections.Generic.Dictionary[String, [Drawing.Color]]" $type["Command"] = [Drawing.Color]::Cyan $type["Comment"] = [Drawing.Color]::Gray $type["GroupStart"] = [Drawing.Color]::Orange $type["GroupEnd"] = [Drawing.Color]::Orange $type["Keyword"] = [Drawing.Color]::FromArgb(0, 255, 0) $type["Member"] = [Drawing.Color]::Tomato $type["Operator"] = [Drawing.Color]::Linen $type["String"] = [Drawing.Color]::Yellow $type["Type"] = [Drawing.Color]::Silver $type["Variable"] = [Drawing.Color]::Crimson #main form $frmMain = New-Object Windows.Forms.Form $txtEdit = New-Object Windows.Forms.RichTextBox # #txtEdit # $txtEdit.BackColor = [Drawing.Color]::FromArgb(1, 36, 86) $txtEdit.Dock = "Fill" $txtEdit.Font = New-Object Drawing.Font("Courier New", 10, [Drawing.FontStyle]::Bold) $txtEdit.Text = $code # #frmMain # $frmMain.ClientSize = New-Object Drawing.Size(490, 190) $frmMain.Controls.Add($txtEdit) $frmMain.FormBorderStyle = "FixedSingle" $frmMain.MaximizeBox = $false $frmMain.StartPosition = "CenterScreen" $frmMain.Text = "gregzakh@gmail.com" #counter $i = 0 #highlight code [Management.Automation.PSParser]::Tokenize( $txtEdit.Text, [ref](New-Object "Collections.ObjectModel.Collection[Management.Automation.PSParseError]") ) | % { $txtEdit.SelectionStart = $_.Start - $i $txtEdit.SelectionLength = $_.Length #skip unnecessary types if ($_.Type -eq "LineContinuation" -or $_.Type -eq "NewLine") { $i++ } else { $txtEdit.SelectionColor = $type[$_.Type.ToString()] } } #when done $txtEdit.DeselectAll() #show form [void]$frmMain.ShowDialog() } frmMain_Show
combined_dataset/train/non-malicious/vibackup-lx_1.ps1
vibackup-lx_1.ps1
Param ( $viServer, $bakVM, $lxDest ) #region check if (!$viServer) { $viServer = Read-Host -Prompt "VI Server " } if (!$bakVM) { $bakVM = Read-Host -Prompt "VM to Backup " } if (!$lxDest) { $lxDest = Read-Host -Prompt "Backup Path (ex. /srv/backup) " } #endregion #region globalvars $encoding = "OEM" $version = "0.7" $scriptout = @() [regex]$curlpat = "(\\s{1})+(.*vmdk$)" #endregion #region stkmvars $viUser = "vmware" $viPass = "vmware" #endregion Write-Host "viBackup Script Generator - " $version Write-Host "--------------------------------------------" if (($vmCon = Connect-VIServer -Protocol https $viServer) -eq "") { exit } $vm = Get-VM $bakVM -Server $vmCon -ErrorAction SilentlyContinue if (!$vm) { Write-Host "No VM found." Write-Host "Enter the Display Name from the VI Center:" -NoNewline $tvm = Read-Host if (!($vm=Get-VM $tvm -ErrorAction SilentlyContinue)) { return $false exit } Write-Host "You have entered 2 different Names. Please check that the VMX and the VM Name are the same!" Write-Host -ForegroundColor yellow "Entered VMX Name: {$bakVM}" Write-Host -ForegroundColor yellow "Entered VM Name: {$tvm}" Write-Host -ForegroundColor yellow "Returned VM Name: {$vm}" Write-Host -ForegroundColor yellow "IS THIS CORRECT (Yes/No)?:" -NoNewline $sure = Read-Host if ($sure -ne "yes") { exit } } #check Snapshots if ((Get-Snapshot -VM $vm -Server $vmCon)) { Write-Host "VM has Snapshots. No Backup possible." return $false exit } #check HardDisk Mode foreach ($hd in $vm.harddisks) { if ($hd.Persistence -ne "Persistent") { write-host "Hard Disk is not Persistent - no Snapshot allowed." return $false exit } } #write script $scriptname = $vm.name + ".sh" $vmname = $vm.name $vmhost = $vm.Host $vmview= Get-View $vm.id $vmvname = $vmview.config.files.vmpathname #generate Text $header = "#!/bin/bash" $user = "USER=`"${viUser}`"" $pass = "PASS=`"${viPass}`"" $dest = "DEST=`"${lxDest}`"" $lxVM = "VM=`"${vmname}`"" $dcPath = $vm | Get-Datacenter #region writefile $scriptout += $header $scriptout += $user $scriptout += $pass $scriptout += $dest $scriptout += $lxvm $scriptout += "" $scriptout += "BKUP=`"${vmvname}`"" $scriptout += "SNAPCHECK=``vmware-cmd -H ${viserver} -T ${vmhost} -U `${USER} -P `${PASS} `"`${BKUP}`" hassnapshot`` " $scriptout += "if [ `"`$SNAPCHECK`" != `"hassnapshot () =`" ]; then `n echo 'VM has a Snapshot. Aborting...' `n exit `n fi" $scriptout += "vmrun -T esx -h https://${viserver}/sdk -u `${USER} -p `${PASS} snapshot `"`${BKUP}`" vmBackup" # Hard Disk foreach ($hd in $vm.Harddisks) { $hdname = $hd.Filename $patstr = $curlpat.split($hdname) #dirty hack $patstr[0] = $patstr[0].replace("[","") $patstr[0] = $patstr[0].replace("]","") $dsPath = $patstr[0].replace(" ","%20") $vmdkpath = $patstr[2].replace(" ","%20") $vmdkflatpath = $patstr[2].replace(".vmdk","-flat.vmdk") #curl options $vmdk = "curl --user `${USER}:`${PASS} -o `${DEST}/`${VM}.vmdk `"https://${viserver}/folder/${vmdkpath}?dcPath=${dcPath}&dsName=${dsPath}`" --insecure " $vmdkflat = "curl --user `${USER}:`${PASS} -o `${DEST}/`${VM}.vmdk `"https://${viserver}/folder/${vmdkflatpath}?dcPath=${dcPath}&dsName=${dsPath}`" --insecure" #$vmdk = "vifs --server ${viserver} --dc 'KM' --username `${USER} --password `${PASS} --get `"``echo $hdname```" `${DEST}/`${VM}.vmdk " #$vmdkflat = "vifs --server ${viserver} --dc 'KM' --username `${USER} --password `${PASS} --get `"``echo $hdname | sed 's/.vmdk/-flat.vmdk/g'```" `${DEST}/`${VM}-flat.vmdk " $scriptout += $vmdk $scriptout += $vmdkflat } $scriptout += "vmrun -T esx -h https://${viserver}/sdk -u `${USER} -p `${PASS} deleteSnapshot `"`${BKUP}`" vmBackup" $scriptout | Out-File $scriptname -Encoding $encoding #endregion Write-Host "Finished" Write-Host "Don't forget to convert the script under *nix/Linux with dos2unix!"
combined_dataset/train/non-malicious/3729.ps1
3729.ps1
function Test-GetActionRulesFilteredByParameters { $severityFilter = "Sev3" $monitorService = "Platform" $actionRules = Get-AzActionRule -Severity $severityFilter -MonitorService $monitorService Assert-NotNull $actionRules.Count } function Test-CreateUpdateAndDeleteSuppressionRule { try { $resourceGroupName = Get-TestResourceGroupName "suppression" $location = Get-ProviderLocation ResourceManagement $actionRuleName = Get-TestActionRuleName "suppression" New-AzResourceGroup -Name $resourceGroupName -Location $location -Force $createdActionRule = Set-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Scope "/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/alertslab","/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/Test-VMs" -SeverityCondition "Equals:Sev0,Sev1" -MonitorCondition "NotEquals:Resolved" -Description "Test description" -Status "Enabled" -ActionRuleType "Suppression" -ReccurenceType "Weekly" -SuppressionStartTime "06/26/2018 06:00:00" -SuppressionEndTime "07/27/2018 06:00:00" -ReccurentValue 1,4,6 Assert-NotNull $createdActionRule $updatedActionRule = Update-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Status "Disabled" Assert-NotNull $updatedActionRule Assert-AreEqual "Disabled" $updatedActionRule.Status } finally { CleanUp $resourceGroupName $actionRuleName } } function Test-CreateUpdateAndDeleteActionGroupRule { try { $resourceGroupName = Get-TestResourceGroupName "actiongroup" $location = Get-ProviderLocation ResourceManagement $actionRuleName = Get-TestActionRuleName "actiongroup" New-AzResourceGroup -Name $resourceGroupName -Location $location -Force $createdActionRule = Set-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Scope "/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/alertslab","/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/Test-VMs" -SeverityCondition "Equals:Sev0,Sev1" -MonitorCondition "NotEquals:Resolved" -Description "Test description" -Status "Enabled" -ActionRuleType "ActionGroup" -ActionGroupId "/subscriptions/1e3ff1c0-771a-4119-a03b-be82a51e232d/resourceGroups/alertscorrelationrg/providers/Microsoft.insights/actiongroups/testAG" Assert-NotNull $createdActionRule $updatedActionRule = Update-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Status "Disabled" Assert-NotNull $updatedActionRule Assert-AreEqual "Disabled" $updatedActionRule.Status } finally { CleanUp $resourceGroupName $actionRuleName } } function Test-CreateUpdateAndDeleteDiagnosticsRule { try { $resourceGroupName = Get-TestResourceGroupName "diag" $location = Get-ProviderLocation ResourceManagement $actionRuleName = Get-TestActionRuleName "diag" New-AzResourceGroup -Name $resourceGroupName -Location $location -Force $createdActionRule = Set-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Scope "/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/alertslab","/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/Test-VMs" -SeverityCondition "Equals:Sev0,Sev1" -MonitorCondition "NotEquals:Resolved" -Description "Test description" -Status "Enabled" -ActionRuleType "Diagnostics" Assert-NotNull $createdActionRule $updatedActionRule = Update-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Status "Disabled" Assert-NotNull $updatedActionRule Assert-AreEqual "Disabled" $updatedActionRule.Status } finally { CleanUp $resourceGroupName $actionRuleName } }
combined_dataset/train/non-malicious/sample_19_52.ps1
sample_19_52.ps1
parameters: - name: PAT type: string - name: isPreRelease type: string - name: ghCreateRelease type: boolean - name: ghReleaseAddChangeLog type: boolean steps: - pwsh: | $vsixFileName = (Get-ChildItem -File | Select-Object -First 1).Name Write-Host "##vso[task.setvariable variable=VSIX;isOutput=true]$vsixFileName" name: GetExtensionName displayName: 🗄 Get VSIX file name workingDirectory: $(Pipeline.Workspace)/extension - pwsh: | $isPreRelease = "${{ parameters.isPreRelease }}" Write-Host "Package path is: $(Pipeline.Workspace)/extension" if ($isPreRelease -eq "false") { npx @vscode/vsce publish --packagePath "$(Pipeline.Workspace)/extension/$(GetExtensionName.VSIX)" } elseif ($isPreRelease -eq "true") { npx @vscode/vsce publish --packagePath "$(Pipeline.Workspace)/extension/$(GetExtensionName.VSIX)" --pre-release } else { Write-Host "The value of isPreRelease parameter must be 'true' or 'false'." exit 1 } displayName: 🚀 Publish extension env: VSCE_PAT: ${{ parameters.PAT }} - ${{ if eq(parameters.ghCreateRelease, true) }}: - checkout: self displayName: 🔖 Checkout repo for tag - bash: | TAG=$(git tag --sort=-creatordate | head -n 1) echo "Git tag is $TAG" echo "##vso[task.setvariable variable=TAG;isOutput=true]$TAG" name: CaptureGitTag displayName: 🔖 Capture git tag workingDirectory: $(Build.SourcesDirectory) - task: GitHubRelease@0 displayName: 🐙 Github release inputs: gitHubConnection: microsoft addChangelog: ${{ parameters.ghReleaseAddChangeLog }} tagSource: manual tag: $(CaptureGitTag.TAG) assets: $(Pipeline.Workspace)/extension/$(GetExtensionName.VSIX) isPreRelease: ${{ parameters.isPreRelease }}
combined_dataset/train/non-malicious/sample_52_92.ps1
sample_52_92.ps1
# # Module manifest for module 'OCI.PSModules.Fusionapps' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Fusionapps.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c9914632-5a3e-4af3-a2ca-7e0a4764c70c' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Fusionapps Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Fusionapps.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFusionappsAdminUsersList', 'Get-OCIFusionappsDataMaskingActivitiesList', 'Get-OCIFusionappsDataMaskingActivity', 'Get-OCIFusionappsFusionEnvironment', 'Get-OCIFusionappsFusionEnvironmentFamiliesList', 'Get-OCIFusionappsFusionEnvironmentFamily', 'Get-OCIFusionappsFusionEnvironmentFamilyLimitsAndUsage', 'Get-OCIFusionappsFusionEnvironmentFamilySubscriptionDetail', 'Get-OCIFusionappsFusionEnvironmentsList', 'Get-OCIFusionappsFusionEnvironmentStatus', 'Get-OCIFusionappsRefreshActivitiesList', 'Get-OCIFusionappsRefreshActivity', 'Get-OCIFusionappsScheduledActivitiesList', 'Get-OCIFusionappsScheduledActivity', 'Get-OCIFusionappsServiceAttachment', 'Get-OCIFusionappsServiceAttachmentsList', 'Get-OCIFusionappsTimeAvailableForRefreshesList', 'Get-OCIFusionappsWorkRequest', 'Get-OCIFusionappsWorkRequestErrorsList', 'Get-OCIFusionappsWorkRequestLogsList', 'Get-OCIFusionappsWorkRequestsList', 'Invoke-OCIFusionappsVerifyServiceAttachment', 'Move-OCIFusionappsFusionEnvironmentCompartment', 'Move-OCIFusionappsFusionEnvironmentFamilyCompartment', 'New-OCIFusionappsDataMaskingActivity', 'New-OCIFusionappsFusionEnvironment', 'New-OCIFusionappsFusionEnvironmentAdminUser', 'New-OCIFusionappsFusionEnvironmentFamily', 'New-OCIFusionappsRefreshActivity', 'New-OCIFusionappsServiceAttachment', 'Remove-OCIFusionappsFusionEnvironment', 'Remove-OCIFusionappsFusionEnvironmentAdminUser', 'Remove-OCIFusionappsFusionEnvironmentFamily', 'Remove-OCIFusionappsRefreshActivity', 'Remove-OCIFusionappsServiceAttachment', 'Reset-OCIFusionappsFusionEnvironmentPassword', 'Update-OCIFusionappsFusionEnvironment', 'Update-OCIFusionappsFusionEnvironmentFamily', 'Update-OCIFusionappsRefreshActivity' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Fusionapps' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3759.ps1
3759.ps1
function Test-CreateIntegrationAccountCertificate { $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountCertificateName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer" $integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-CreateIntegrationAccountCertificatePrivateKey { $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountCertificateName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-CreateIntegrationAccountCertificatePublicKey { $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountCertificateName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer" $integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-UpdateIntegrationAccountCertificate { $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountCertificateName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer" $integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name $integrationAccountCertificateUpdated = Set-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -Force Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificateUpdated.Name Assert-AreEqual "PRIVATEKEY" $integrationAccountCertificateUpdated.Key.KeyName $integrationAccountCertificateUpdated = Set-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyVersion "273ab4059bd84b81bbb8308df706379a" -Force Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificateUpdated.Name Assert-AreEqual "273ab4059bd84b81bbb8308df706379a" $integrationAccountCertificateUpdated.Key.KeyVersion $integrationAccountCertificateUpdated = Set-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -Force Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificateUpdated.Name Assert-AreEqual "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" $integrationAccountCertificateUpdated.Key.KeyVault.Id Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-GetIntegrationAccountCertificate { $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountCertificateName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer" New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath $result = Get-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName Assert-AreEqual $integrationAccountCertificateName $result.Name $result1 = Get-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName Assert-True { $result1.Count -gt 0 } Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-RemoveIntegrationAccountCertificate { $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountCertificateName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer" New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath Remove-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -Force Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force }
combined_dataset/train/non-malicious/Compare-AD.ps1
Compare-AD.ps1
############################################################################### # Compare-AD - a set of functions (and sample code using them) to create # snapshots of user accounts in the current Active Directory domain # save them in an xml file, and then compare live AD environment # against that XML # # (C) Dmitry Sotnikov # http://dmitrysotnikov.wordpress.com/2008/10/14/compare-ad-against-snapshotscompare-ad-against-snapshots # ############################################################################### # Requires QAD cmdlets if ((Get-PSSnapin "Quest.ActiveRoles.ADManagement" ` -ErrorAction SilentlyContinue) -eq $null) { Add-PSSnapin "Quest.ActiveRoles.ADManagement" } ############################################################################### # Functions ############################################################################### # Retrives all AD users from the current domain and stores the selected # set of properties (passed as an array of strings in the $properties parameter) # as an xml file by the path passed as $path # See sample use below function New-Snapshot { param($path, $properties) Get-QADUser -SizeLimit 0 -DontUseDefaultIncludedProperties ` -IncludedProperties $properties | Select $properties | Export-Clixml $path } # Load the snapshot and compare it against current AD domain function Compare-ActiveDirectory { param($path, $properties) # $old is the snapshot, $new is the current environment data $old = Import-Clixml $path $new = Get-QADUser -SizeLimit 0 -DontUseDefaultIncludedProperties ` -IncludedProperties $properties | Select $properties # First lets report the ones which got created or deleted $diff = Compare-Object $old $new -Property Name $created = , ($diff | where { $_.SideIndicator -eq "=>" }) $deleted = , ($diff | where { $_.SideIndicator -eq "<=" }) if ( $created.Count -gt 0 ) { "New accounts:" $created | Format-Table Name } if ( $deleted.Count -gt 0 ) { "Deleted accounts:" $deleted | Format-Table Name } # Now let's load the accounts in a hash-table so it is easier to locate them $hash = @{} $new | ForEach-Object { $hash[$_.DistinguishedName] = $_ } # Let's enumerate the accounts and their properties and report any changes "Modified objects:" foreach ( $snapshot in $old ) { $current = $hash[$snapshot.DistinguishedName] if ( $current -and ($current.ModificationDate -ne $snapshot.ModificationDate )) { @" Object $($snapshot.distinguishedname) Modified at $($current.ModificationDate) Property`tOld Value`tNew Value ========`t=========`t========= "@ foreach ($property in $properties) { if ( ($property -ne "ModificationDate") -and ($snapshot.$property -ne $current.$property )) { "$property`t$($snapshot.$property)`t$($current.$property)" } } } } } ############################################################################### # Common parameters ############################################################################### # These are the properties to be compared # Make sure they include Name, DistinguishedName, and ModificationDate # Remove the TS attributes if your system requirements for retrieving those # are not met: # http://dmitrysotnikov.wordpress.com/2008/07/23/system-requirements-for-powershell-terminal-services-management/ $Members_to_Compare = @( "Name", "DistinguishedName", "ModificationDate", "AccountIsDisabled", "AccountIsLockedOut", "AccountName", "CanonicalName", "City", "Company", "Department", "Description", "DisplayName", "Email", "Fax", "FirstName", "HomeDirectory", "HomeDrive", "HomePhone", "Initials", "LastName", "LdapDisplayName", "LogonName", "LogonScript", "Manager", "MobilePhone", "Notes", "Office", "Pager", "ParentContainerDN", "PasswordNeverExpires", "PhoneNumber", "PostalCode", "PostOfficeBox", "ProfilePath", "SamAccountName", "StateOrProvince", "StreetAddress", "Title", "TsAllowLogon", "TsBrokenConnectionAction", "TsConnectClientDrives", "TsConnectPrinterDrives", "TsDefaultToMainPrinter", "TsHomeDirectory", "TsHomeDrive", "TsInitialProgram", "TsMaxConnectionTime", "TsMaxDisconnectionTime", "TsMaxIdleTime", "TsProfilePath", "TsReconnectionAction", "TsRemoteControl", "TsWorkDirectory", "UserPrincipalName", "WebPage" ) # Path to the snapshot file $SnapshotPath = "c:\\snapshot.xml" ############################################################################### # Sample usage ############################################################################### # Create a snapshot New-Snapshot -Path $SnapshotPath -Properties $Members_to_Compare # Make some changes New-QADUser -Name "Lawrence Alford" -ParentContainer mydomain.local/test Set-QADUser "Jennifer Clarke" -PhoneNumber "(249) 111-22-33" Set-QADUser "Ernest Cantrell" -City "San Francisco" Remove-QADObject "Andreas Bold" -Force # Let's see if we find them Compare-ActiveDirectory -Path $SnapshotPath -Properties $Members_to_Compare
combined_dataset/train/non-malicious/3139.ps1
3139.ps1
$Title = "Continue" $Info = "Would you like to continue?" $Options = [System.Management.Automation.Host.ChoiceDescription[]] @("&Yes", "&No") [int]$DefaultChoice = 0 $Opt = $host.UI.PromptForChoice($Title , $Info, $Options, $DefaultChoice) switch($Opt) { 0 { Write-Verbose -Message "Yes" } 1 { Write-Verbose -Message "No" } }
combined_dataset/train/non-malicious/sample_57_32.ps1
sample_57_32.ps1
<# .SYNOPSIS Script to run the tests .DESCRIPTION This script activates the venv and launches pytest .EXAMPLE test.ps1 #> param( [Parameter(Mandatory=$false)] [Alias("c")] # Don't pretify the output of the Write-Result [Switch] $CICD=$false, [Parameter(Mandatory=$false, ValueFromRemainingArguments=$true)] # Don't pretify the output of the Write-Result [String]$Tests ) #------------------------------------------------------------------------------- # Script Preferences #------------------------------------------------------------------------------- $ProgressPreference = "SilentlyContinue" $ErrorActionPreference = "Stop" #------------------------------------------------------------------------------- # Script Functions #------------------------------------------------------------------------------- function Write-Result($result, $ForegroundColor="Green") { if ( $CICD ) { Write-Host $result -ForegroundColor $ForegroundColor } else { $position = 80 - $result.Length - [System.Console]::CursorLeft Write-Host -ForegroundColor $ForegroundColor ("{0,$position}$result" -f "") } } #------------------------------------------------------------------------------- # Script Variables #------------------------------------------------------------------------------- $SCRIPT_DIR = (Get-ChildItem "$($myInvocation.MyCommand.Definition)").DirectoryName #------------------------------------------------------------------------------- # Script Start #------------------------------------------------------------------------------- Write-Host $("=" * 80) Write-Host "Run Tests" -ForegroundColor Cyan Write-Host $("-" * 80) #------------------------------------------------------------------------------- # Activating venv #------------------------------------------------------------------------------- if ( !(Test-Path -Path "$SCRIPT_DIR\venv\Scripts\activate.ps1") ) { Write-Host "Could not find virtual environment" Write-Host "You must run setup.cmd before running this script" } Write-Host "Activating venv: " -NoNewline & $SCRIPT_DIR\venv\Scripts\activate.ps1 if ( "$env:VIRTUAL_ENV" ) { Write-Result "Success" } else { Write-Result "Failed" -ForegroundColor Red exit 1 } Write-Host "Setting working directory: " -NoNewline Set-Location -Path $SCRIPT_DIR if ( $(Get-Location).Path -eq $SCRIPT_DIR ) { Write-Result "Success" } else { Write-Result "Failed" -ForegroundColor Red exit 1 } Write-Host $("-" * 80) Write-Host "" Write-Host "Running pytest..." Write-Host "" if ($Tests) { $pytest_args = -join $Tests } else { $pytest_args = ".\config_tests\" } pytest -vvv -rPx --showlocals -- $pytest_args #------------------------------------------------------------------------------- # Script Complete #------------------------------------------------------------------------------- Write-Host $("-" * 80) Write-Host "Run Tests" -ForegroundColor Cyan Write-Host $("=" * 80)
combined_dataset/train/non-malicious/564.ps1
564.ps1
function Add-SPOCalculatedFieldtoList { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string] $listTitle, [Parameter(Mandatory=$true, Position=2)] [string] $fieldName, [Parameter(Mandatory=$true, Position=3)] [string] $value ) $refField = $value.Split(";")[1] $formula = $value.Split(";")[0] $internalName = Find-SPOFieldName $listTitle $refField $newField = '<Field Type="Calculated" DisplayName="$fieldName" ResultType="DateTime" ReadOnly="TRUE" Name="$fieldName"><Formula>$formula</Formula><FieldRefs><FieldRef Name="$internalName" /></FieldRefs></Field>' Add-SPOField $listTitle $fieldName $newField }
combined_dataset/train/non-malicious/453.ps1
453.ps1
Register-PSFConfigValidation -Name "long" -ScriptBlock { Param ( $Value ) $Result = New-Object PSOBject -Property @{ Success = $True Value = $null Message = "" } try { [long]$number = $Value } catch { $Result.Message = "Not a long: $Value" $Result.Success = $False return $Result } $Result.Value = $number return $Result }
combined_dataset/train/non-malicious/SuperMario PowerShell.ps1
SuperMario PowerShell.ps1
[System.Console]::Beep(659, 125) [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(523, 125) [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(784, 125) Start-Sleep -Milliseconds 375 [System.Console]::Beep(392, 125) Start-Sleep -Milliseconds 375 [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(392, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(330, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(440, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(494, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(466, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(440, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(392, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(784, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(880, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(698, 125) [System.Console]::Beep(784, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(587, 125) [System.Console]::Beep(494, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(392, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(330, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(440, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(494, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(466, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(440, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(392, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(784, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(880, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(698, 125) [System.Console]::Beep(784, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(587, 125) [System.Console]::Beep(494, 125) Start-Sleep -Milliseconds 375 [System.Console]::Beep(784, 125) [System.Console]::Beep(740, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(415, 125) [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) [System.Console]::Beep(587, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(784, 125) [System.Console]::Beep(740, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(698, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 625 [System.Console]::Beep(784, 125) [System.Console]::Beep(740, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(415, 125) [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) [System.Console]::Beep(587, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(587, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 1125 [System.Console]::Beep(784, 125) [System.Console]::Beep(740, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(415, 125) [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) [System.Console]::Beep(587, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(784, 125) [System.Console]::Beep(740, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(698, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 625 [System.Console]::Beep(784, 125) [System.Console]::Beep(740, 125) [System.Console]::Beep(698, 125) Start-Sleep -Milliseconds 42 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(659, 125) Start-Sleep -Milliseconds 167 [System.Console]::Beep(415, 125) [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 125 [System.Console]::Beep(440, 125) [System.Console]::Beep(523, 125) [System.Console]::Beep(587, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(622, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(587, 125) Start-Sleep -Milliseconds 250 [System.Console]::Beep(523, 125) Start-Sleep -Milliseconds 625
combined_dataset/train/non-malicious/sample_2_18.ps1
sample_2_18.ps1
# make sure we stop on exceptions $ErrorActionPreference = "Stop" # This object reprents the result value for tab expansion functions when no result is returned. # This is so that we can distinguish it from $null, which has different semantics $NoResultValue = New-Object PSObject -Property @{ NoResult = $true } # Hashtable that stores tab expansion definitions $TabExpansionCommands = New-Object 'System.Collections.Hashtable' -ArgumentList @([System.StringComparer]::InvariantCultureIgnoreCase) function Register-TabExpansion { <# .SYNOPSIS Registers a tab expansion for the parameters of the specified command. .DESCRIPTION Registers a tab expansion for the parameters of the specified command. .PARAMETER Name Name of the command the expansion is for. .EXAMPLE PS> Register-TabExpansion 'Set-Color', @{'color' = {'blue', 'green', 'red'}} This adds a tab expansion to the Set-Color command. Set-Color contains a single parameter, color, with three possible expansion values. #> [CmdletBinding()] param( [parameter(Mandatory = $true)] [string]$Name, [parameter(Mandatory = $true)] $Definition ) # transfer $definition data into a new hashtable that compare values using InvariantCultureIgnoreCase $normalizedDefinition = New-Object 'System.Collections.Hashtable' -ArgumentList @([System.StringComparer]::InvariantCultureIgnoreCase) $definition.GetEnumerator() | % { $normalizedDefinition[$_.Name] = $_.Value } $TabExpansionCommands[$Name] = $normalizedDefinition } Register-TabExpansion 'Get-Package' @{ 'Source' = { GetPackageSources } 'ProjectName' = { GetProjectNames } } Register-TabExpansion 'Install-Package' @{ 'Id' = { param($context) GetRemotePackageIds $context } 'ProjectName' = { GetProjectNames } 'Version' = { param($context) GetRemotePackageVersions $context } 'Source' = { GetPackageSources } 'DependencyVersion' = { GetEnumNames 'NuGet.Resolver.DependencyBehavior' } 'FileConflictAction' = { GetEnumNames 'NuGet.ProjectManagement.FileConflictAction' } } Register-TabExpansion 'Uninstall-Package' @{ 'Id' = { param($context) GetInstalledPackageIds $context } 'ProjectName' = { GetProjectNames } 'Version' = { GetInstalledPackageVersions $context } } Register-TabExpansion 'Update-Package' @{ 'Id' = { param($context) GetInstalledPackageIds $context } 'ProjectName' = { GetProjectNames } 'Version' = { param($context) # Only show available versions if an id was specified if ($context.id) { # Find the installed package (this might be nothing since we could have a partial id) $versions = @() $packages = @(Get-Package $context.id | ? { $_.Id -eq $context.id }) if($packages.Count) { $package = @($packages | Sort-Object Version)[0] $versions = GetRemotePackageUpdateVersions $context } $versions } } 'Source' = { GetPackageSources } 'FileConflictAction' = { GetEnumNames 'NuGet.ProjectManagement.FileConflictAction' } } Register-TabExpansion 'Add-BindingRedirect' @{ 'ProjectName' = { GetProjectNames } } Register-TabExpansion 'Get-Project' @{ 'Name' = { GetProjectNames } } function HasProperty($context, $name) { return $context.psobject.properties | ? { $_.Name -eq $name } } function IsPrereleaseSet($context) { # Need to figure out a better way to do this. return (HasProperty $context 'IncludePreRelease') -or (HasProperty $context 'PreRelease') -or (HasProperty $context 'Pre') } function GetPackages($context) { $parameters = @{} if ($context.Id) { $parameters.Id = $context.Id } if ($context.Source) { $parameters.source = $context.Source } if (IsPrereleaseSet $context) { $parameters.IncludePreRelease = $true } # StartWith switch is implicity set for TabExpansion command return TabExpansion-Package @parameters -ExcludeVersionInfo } function GetProjectNames { $uniqueNames = @(Get-Project -All | Select-Object -ExpandProperty ProjectName) $simpleNames = Get-Project -All | Select-Object -ExpandProperty Name $safeNames = @($simpleNames | Group-Object | Where-Object { $_.Count -eq 1 } | Select-Object -ExpandProperty Name) ($uniqueNames + $safeNames) | Select-Object -Unique | Sort-Object } function GetInstalledPackageIds($context) { $parameters = @{} if ($context.Id) { $parameters.filter = $context.id } Get-Package @parameters -ErrorAction SilentlyContinue | Select-Object -ExpandProperty Id -Unique } function GetRemotePackageIds($context) { $parameters = @{} if ($context.Id) { $parameters.filter = $context.Id } if ($context.Source) { $parameters.source = $context.Source } if (IsPrereleaseSet $context) { $parameters.IncludePrerelease = $true } try { return Get-RemotePackageId @parameters } catch { # If the server doesn't have the JSON API endpoints, get the remote package IDs the old way. return GetPackages $context | Select-Object -ExpandProperty Id -Unique } } function GetPackageSources() { $componentModel = Get-VSComponentModel $repositoryProvider = $componentModel.GetService([NuGet.Protocol.Core.Types.ISourceRepositoryProvider]) $allSources = $repositoryProvider.PackageSourceProvider.LoadPackageSources() $allSources | Select-Object -ExpandProperty Name } function GetEnumNames($typeName) { # Sort the enumerations in alphabetical order to make it consistent with TabExpansion2 return [System.Enum]::GetNames($typeName) | Sort-Object } function GetInstalledPackageVersions($context) { $parameters = @{} if ($context.id) { $parameters.Filter = $context.id } GetAndSortVersions (Get-Package @parameters -ErrorAction SilentlyContinue) } function GetRemotePackageVersions($context) { $parameters = @{} if ($context.Id -eq $null) { return @() } if ($context.Id) { $parameters.id = $context.Id } if ($context.Source) { $parameters.source = $context.Source } if (IsPrereleaseSet $context) { $parameters.IncludePreRelease = $true } try { return Get-RemotePackageVersion @parameters | %{ [NuGet.SemanticVersion]::Parse($_) } | Sort-Object -Descending } catch { # If the server doesn't have the JSON API endpoints, get the remote package versions the old way. $parameters = @{} if ($context.Id) { $parameters.Id = $context.Id } if ($context.Source) { $parameters.source = $context.Source } if (IsPrereleaseSet $context) { $parameters.IncludePreRelease = $true } $parameters.AllVersions = $true # StartWith switch is implicity set for TabExpansion command GetAndSortVersions(TabExpansion-Package @parameters -ExactMatch -ErrorAction SilentlyContinue) } } function GetRemotePackageUpdateVersions($context) { $parameters = @{} if ($context.Id -eq $null) { return @() } if ($context.Id) { $parameters.id = $context.Id } if ($context.Source) { $parameters.source = $context.Source } if (IsPrereleaseSet $context) { $parameters.IncludePreRelease = $true } try { return Get-RemotePackageVersion @parameters | %{ [NuGet.SemanticVersion]::Parse($_) } | Sort-Object -Descending } catch { # If the server doesn't have the JSON API endpoints, get the remote package versions the old way. $parameters = @{} if ($context.Id) { $parameters.Filter = $context.Id } if ($context.Source) { $parameters.source = $context.Source } if (IsPrereleaseSet $context) { $parameters.IncludePreRelease = $true } $parameters.Updates = $true GetAndSortVersions(Get-Package @parameters -AllVersions -ErrorAction SilentlyContinue) } } function GetAndSortVersions($packages) { $packages | Select -Unique -ExpandProperty Versions | %{ if($_ -is [string]) { [NuGet.SemanticVersion]::Parse($_) } else { $_ } } | Sort-Object -Descending } function NugetTabExpansion($line, $lastWord) { # Parse the command $parsedCommand = [NuGetConsole.Host.PowerShell.CommandParser]::Parse($line) # Get the command definition $definition = $TabExpansionCommands[$parsedCommand.CommandName] # See if we've registered a command for intellisense if($definition) { # Get the command that we're trying to show intellisense for $command = Get-Command $parsedCommand.CommandName -ErrorAction SilentlyContinue if($command) { # We're trying to find out what parameter we're trying to show intellisense for based on # either the name of the an argument or index e.g. "Install-Package -Id " "Install-Package " $argument = $parsedCommand.CompletionArgument $index = $parsedCommand.CompletionIndex if(!$argument -and $index -ne $null) { do { # Get the argument name for this index $argument = GetArgumentName $command $index if(!$argument) { break } # If there is already a value for this argument, then check the next one index. # This is so we don't show duplicate intellisense e.g. "Install-Package -Id elmah {tab}". # The above statement shouldn't show intellisense for id since it already has a value if($parsedCommand.Arguments[$argument] -eq $null) { $value = $parsedCommand.Arguments[$index] if(!$value) { $value = '' } $parsedCommand.Arguments[$argument] = $value break } else { $index++ } } while($true); } if($argument) { # Populate the arguments dictionary with the name and value of the # associated index. i.e. for the command "Install-Package elmah" arguments should have # an entries with { 0, "elmah" } and { "Id", "elmah" } $arguments = New-Object 'System.Collections.Hashtable' -ArgumentList @([System.StringComparer]::InvariantCultureIgnoreCase) $parsedCommand.Arguments.Keys | Where-Object { $_ -is [int] } | %{ $argName = GetArgumentName $command $_ $arguments[$argName] = $parsedCommand.Arguments[$_] } # Copy the arguments over to the parsed command arguments $arguments.Keys | %{ $parsedCommand.Arguments[$_] = $arguments[$_] } # If the argument is a true argument of this command and not a partial argument # and there is a non null value (empty is valid), then we execute the script block # for this parameter (if specified) $action = $definition[$argument] $argumentValue = $parsedCommand.Arguments[$argument] if($command.Parameters[$argument] -and $argumentValue -ne $null -and $action) { $context = New-Object PSObject -Property $parsedCommand.Arguments $results = @(& $action $context) if($results.Count -eq 0) { return $null } # Use the argument value to filter results $results = $results | %{ $_.ToString() } | Where-Object { $_.StartsWith($argumentValue, "OrdinalIgnoreCase") } return NormalizeResults $results } } } } return $NoResultValue } function NormalizeResults($results) { $results | %{ $result = $_ # Add quotes to a result if it contains whitespace or a quote $addQuotes = $result.Contains(" ") -or $result.Contains("'") -or $result.Contains("`t") if($addQuotes) { $result = "'" + $result.Replace("'", "''") + "'" } return $result } } function GetArgumentName($command, $index) { # Next we try to find the parameter name for the parameter index (in the default parameter set) $parameterSet = $Command.DefaultParameterSet if(!$parameterSet) { $parameterSet = '__AllParameterSets' } return $command.Parameters.Values | ?{ $_.ParameterSets[$parameterSet].Position -eq $index } | Select -ExpandProperty Name } function Format-ProjectName { param( [parameter(position=0, mandatory=$true)] [validatenotnull()] $Project, [parameter(position=1, mandatory=$true)] [validaterange(6, 1000)] [int]$ColWidth ) return $project.name } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD47awHpIPi6xj7 # Np/7UqvNKSkODuicNzWQJ6r3QBaJFaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKXm # tXs/wfix2aWtcYeygUfY0R9fHnxiotoIvIUKZHaNMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAVlOyQ6quldB4arz2UOLM0sgOIcN1OJzN6Z4J # fUuAk0UegmBzdqCfmFJ9WmkeT/NCvFD4X4kZKcwVRL4cf4ehS4o19aoqznic6i4U # SDAuNx1/+lY38RMKaA5K+z5ZgMGg/2MQdIfwul9zcp5ZjP6oRFOK5MLxqi8nrbWz # QdKx7reD7xCynY2imZ0cNz/HTaiqZSqp88No98lH2RRnoVGDIzMHoOqs0GzLUOXZ # CHGxWibsCTcDsyzjnOG8iD2b/Drts6QjO88bz+ohWv21k/E97+F7l4AnIMBHTXsa # 5W+k30vqmEmMLhBaeSofafzKi0vB5Ygd6pcMKplsebiakJ8TgqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDERMF2gZwder6VQxnpa3Lc9oxuDQmIbqEU # l6O9Lv3wBQIGZwfkEzb+GBMyMDI0MTAxNzIzMzQ1My44MjRaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB # AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6 # eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv # DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V # utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi # 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O # MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm # dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA # xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC # edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5 # sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW # aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo # tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM # fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7 # 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY # JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8 # I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb # tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r # J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19 # CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt # +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ # 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2 # WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj # /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX # A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rucYTAi # GA8yMDI0MTAxNzE0MjMyOVoYDzIwMjQxMDE4MTQyMzI5WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqu5xhAgEAMAcCAQACAgclMAcCAQACAhNLMAoCBQDqvO3hAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEoXFkOVJN3ywrCv8XKF1vOp8CQ3 # /vnMccl3aT5X16xumED/WBVibxLr10bveu2U1nyKUCuouUARtp9D7VkSIvlKvnMe # FQbe1mQi5vt91K7/AD0s4I8N7LWnFisIKC4PhOABCtjnMFCID+XqPIhlF83+nmlH # d1h1xG5cQyjufcciFvB0cqr3sCcj4tQ1+NSN7IpHh/jWJ+CnjboaEzsmq64kdXLz # YeTbrrqQFeEIEhqBMiRP2iC69st+8rsmY+S1D+2/f1yiOOfAtcP7oToJaOdC3FLu # xIgAhH9BnzJZM5mNwRwLVWdgCy5hDKXuu1DF6WOCgSdpXc4kkQGAxG9zKtgxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQ # sIDPK3KZTQABAAAB6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDSt5pgu8iL7tDsBDgTBR8PESjC # y8bn3OXnhX2/SfEO2TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTV # AoQggkHR59pNqige0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQg/OuZ3m+/ # tMEL160w5XLppDEZ+Xeo2KFUWQIDmd1WF1kwDQYJKoZIhvcNAQELBQAEggIAWpmi # u2xlfqS6YH21C/TZ7AHNF44hp1c43REbE/BMksAxPZQhYlUc0fXlmPIRpcBFDSud # Tu1BuHboECEYFW981yYHOoXrT7x+jlAsdqqUeev+LH9pIeV75T7z+czbIBge02dE # 3MBSxly130PNANMwQVv+NFbDPLWjIyU0dxwayO+oikcmX8QWdcF4DssF2ljDcQD4 # IkYL4am3sf/6ZfIH2vpzWwhrLq5wODTTUyHlUVB3hMklO6wVk1ORGdQqLC14lFRj # QzJV6j6fYQ0PUPrlNDyhJVMyN26HqXSbhTDO0zzpsdbYOEQEtJnVSWcb7e2DD6xy # 4uGejMEBK6b7kcgtV/j8euyogyrT2aBbD0RkuZoHRkmR/eUBuxTOjfPHRLPzkfVb # o3xEMAyH2lHOVmBbGxxeTnV3hKIiRyATv0SfLT0pHhqAWng70iYvMKC6+tOJ1QfJ # QU/Hx1CQrM+HHRCe6iqLtQL+Xba2N2WjQ9olmSCwVAObgK7kDxabbGESb/zgyw0Q # CCMxccrg4+kWcuSFLkJGiOhIdUwM8nM4U5e6BqVerukG/wo06rqUwI6v3z1Nwd6h # A2fR4JL/ymqNrH0OnD/iZFbt8zDriZ65zqcFj++7PDOpsvmF/aEiEomXr7FpYhyj # vqDvBdDMqTIogLTo+6I5fm/sDxUEG0s8occNgYk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_63_18.ps1
sample_63_18.ps1
# # Module manifest for module 'OCI.PSModules.Dataintegration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataintegration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataintegrationApplication', 'Get-OCIDataintegrationApplicationDetailedDescription', 'Get-OCIDataintegrationApplicationsList', 'Get-OCIDataintegrationCompositeState', 'Get-OCIDataintegrationConnection', 'Get-OCIDataintegrationConnectionsList', 'Get-OCIDataintegrationConnectionValidation', 'Get-OCIDataintegrationConnectionValidationsList', 'Get-OCIDataintegrationCopyObjectRequest', 'Get-OCIDataintegrationCopyObjectRequestsList', 'Get-OCIDataintegrationCountStatistic', 'Get-OCIDataintegrationDataAsset', 'Get-OCIDataintegrationDataAssetsList', 'Get-OCIDataintegrationDataEntitiesList', 'Get-OCIDataintegrationDataEntity', 'Get-OCIDataintegrationDataFlow', 'Get-OCIDataintegrationDataFlowsList', 'Get-OCIDataintegrationDataFlowValidation', 'Get-OCIDataintegrationDataFlowValidationsList', 'Get-OCIDataintegrationDependentObject', 'Get-OCIDataintegrationDependentObjectsList', 'Get-OCIDataintegrationDisApplication', 'Get-OCIDataintegrationDisApplicationDetailedDescription', 'Get-OCIDataintegrationDisApplicationsList', 'Get-OCIDataintegrationDisApplicationTaskRunLineagesList', 'Get-OCIDataintegrationExportRequest', 'Get-OCIDataintegrationExportRequestsList', 'Get-OCIDataintegrationExternalPublication', 'Get-OCIDataintegrationExternalPublicationsList', 'Get-OCIDataintegrationExternalPublicationValidation', 'Get-OCIDataintegrationExternalPublicationValidationsList', 'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList', 'Get-OCIDataintegrationFunctionLibrariesList', 'Get-OCIDataintegrationFunctionLibrary', 'Get-OCIDataintegrationImportRequest', 'Get-OCIDataintegrationImportRequestsList', 'Get-OCIDataintegrationPatch', 'Get-OCIDataintegrationPatchChangesList', 'Get-OCIDataintegrationPatchesList', 'Get-OCIDataintegrationPipeline', 'Get-OCIDataintegrationPipelinesList', 'Get-OCIDataintegrationPipelineValidation', 'Get-OCIDataintegrationPipelineValidationsList', 'Get-OCIDataintegrationProject', 'Get-OCIDataintegrationProjectsList', 'Get-OCIDataintegrationPublishedObject', 'Get-OCIDataintegrationPublishedObjectsList', 'Get-OCIDataintegrationReference', 'Get-OCIDataintegrationReferencesList', 'Get-OCIDataintegrationRuntimeOperator', 'Get-OCIDataintegrationRuntimeOperatorsList', 'Get-OCIDataintegrationRuntimePipeline', 'Get-OCIDataintegrationRuntimePipelinesList', 'Get-OCIDataintegrationSchedule', 'Get-OCIDataintegrationSchedulesList', 'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList', 'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun', 'Get-OCIDataintegrationTaskRunLineagesList', 'Get-OCIDataintegrationTaskRunLogsList', 'Get-OCIDataintegrationTaskRunsList', 'Get-OCIDataintegrationTaskSchedule', 'Get-OCIDataintegrationTaskSchedulesList', 'Get-OCIDataintegrationTasksList', 'Get-OCIDataintegrationTaskValidation', 'Get-OCIDataintegrationTaskValidationsList', 'Get-OCIDataintegrationTemplate', 'Get-OCIDataintegrationTemplatesList', 'Get-OCIDataintegrationUserDefinedFunction', 'Get-OCIDataintegrationUserDefinedFunctionsList', 'Get-OCIDataintegrationUserDefinedFunctionValidation', 'Get-OCIDataintegrationUserDefinedFunctionValidationsList', 'Get-OCIDataintegrationWorkRequest', 'Get-OCIDataintegrationWorkRequestErrorsList', 'Get-OCIDataintegrationWorkRequestLogsList', 'Get-OCIDataintegrationWorkRequestsList', 'Get-OCIDataintegrationWorkspace', 'Get-OCIDataintegrationWorkspacesList', 'Move-OCIDataintegrationCompartment', 'Move-OCIDataintegrationDisApplicationCompartment', 'New-OCIDataintegrationApplication', 'New-OCIDataintegrationApplicationDetailedDescription', 'New-OCIDataintegrationConnection', 'New-OCIDataintegrationConnectionValidation', 'New-OCIDataintegrationCopyObjectRequest', 'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow', 'New-OCIDataintegrationDataFlowValidation', 'New-OCIDataintegrationDisApplication', 'New-OCIDataintegrationDisApplicationDetailedDescription', 'New-OCIDataintegrationEntityShape', 'New-OCIDataintegrationExportRequest', 'New-OCIDataintegrationExternalPublication', 'New-OCIDataintegrationExternalPublicationValidation', 'New-OCIDataintegrationFolder', 'New-OCIDataintegrationFunctionLibrary', 'New-OCIDataintegrationImportRequest', 'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline', 'New-OCIDataintegrationPipelineValidation', 'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule', 'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun', 'New-OCIDataintegrationTaskSchedule', 'New-OCIDataintegrationTaskValidation', 'New-OCIDataintegrationUserDefinedFunction', 'New-OCIDataintegrationUserDefinedFunctionValidation', 'New-OCIDataintegrationWorkspace', 'Remove-OCIDataintegrationApplication', 'Remove-OCIDataintegrationApplicationDetailedDescription', 'Remove-OCIDataintegrationConnection', 'Remove-OCIDataintegrationConnectionValidation', 'Remove-OCIDataintegrationCopyObjectRequest', 'Remove-OCIDataintegrationDataAsset', 'Remove-OCIDataintegrationDataFlow', 'Remove-OCIDataintegrationDataFlowValidation', 'Remove-OCIDataintegrationDisApplication', 'Remove-OCIDataintegrationDisApplicationDetailedDescription', 'Remove-OCIDataintegrationExportRequest', 'Remove-OCIDataintegrationExternalPublication', 'Remove-OCIDataintegrationExternalPublicationValidation', 'Remove-OCIDataintegrationFolder', 'Remove-OCIDataintegrationFunctionLibrary', 'Remove-OCIDataintegrationImportRequest', 'Remove-OCIDataintegrationPatch', 'Remove-OCIDataintegrationPipeline', 'Remove-OCIDataintegrationPipelineValidation', 'Remove-OCIDataintegrationProject', 'Remove-OCIDataintegrationSchedule', 'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun', 'Remove-OCIDataintegrationTaskSchedule', 'Remove-OCIDataintegrationTaskValidation', 'Remove-OCIDataintegrationUserDefinedFunction', 'Remove-OCIDataintegrationUserDefinedFunctionValidation', 'Remove-OCIDataintegrationWorkspace', 'Start-OCIDataintegrationWorkspace', 'Stop-OCIDataintegrationWorkspace', 'Update-OCIDataintegrationApplication', 'Update-OCIDataintegrationApplicationDetailedDescription', 'Update-OCIDataintegrationConnection', 'Update-OCIDataintegrationCopyObjectRequest', 'Update-OCIDataintegrationDataAsset', 'Update-OCIDataintegrationDataFlow', 'Update-OCIDataintegrationDisApplication', 'Update-OCIDataintegrationDisApplicationDetailedDescription', 'Update-OCIDataintegrationExportRequest', 'Update-OCIDataintegrationExternalPublication', 'Update-OCIDataintegrationFolder', 'Update-OCIDataintegrationFunctionLibrary', 'Update-OCIDataintegrationImportRequest', 'Update-OCIDataintegrationPipeline', 'Update-OCIDataintegrationProject', 'Update-OCIDataintegrationReference', 'Update-OCIDataintegrationSchedule', 'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun', 'Update-OCIDataintegrationTaskSchedule', 'Update-OCIDataintegrationUserDefinedFunction', 'Update-OCIDataintegrationWorkspace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Send-MailMessage_1.ps1
Send-MailMessage_1.ps1
############################################################################## ## ## Send-MailMessage ## ## From Windows PowerShell Cookbook (O'Reilly) ## by Lee Holmes (http://www.leeholmes.com/guide) ## ## Illustrate the techniques used to send an email in PowerShell. ## In version two, use the Send-MailMessage cmdlet. ## ## Example: ## ## PS >$body = @" ## >> Hi from another satisfied customer of The PowerShell Cookbook! ## >> "@ ## >> ## PS >$to = "guide_feedback@leeholmes.com" ## PS >$subject = "Thanks for all of the scripts." ## PS >$mailHost = "mail.leeholmes.com" ## PS >Send-MailMessage $to $subject $body $mailHost ## ############################################################################## param( ## The recipient of the mail message [string[]] $To = $(throw "Please specify the destination mail address"), ## The subjecty of the message [string] $Subject = "<No Subject>", ## The body of the message [string] $Body = $(throw "Please specify the message content"), ## The SMTP host that will transmit the message [string] $SmtpHost = $(throw "Please specify a mail server."), ## The sender of the message [string] $From = "$($env:UserName)@example.com" ) ## Create the mail message $email = New-Object System.Net.Mail.MailMessage ## Populate its fields foreach($mailTo in $to) { $email.To.Add($mailTo) } $email.From = $from $email.Subject = $subject $email.Body = $body ## Send the mail $client = New-Object System.Net.Mail.SmtpClient $smtpHost $client.UseDefaultCredentials = $true $client.Send($email)
combined_dataset/train/non-malicious/sample_16_74.ps1
sample_16_74.ps1
# # Module manifest for module 'PowerShellEditorServices.VSCode' # # Generated by: daviwil # # Generated on: 6/16/2017 # @{ # Script module or binary module file associated with this manifest. RootModule = "$PSScriptRoot/bin/Microsoft.PowerShell.EditorServices.VSCode.dll" # Version number of this module. ModuleVersion = '0.2.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '8794484f-cfc3-40f1-b88f-a934f403e679' # Author of this module Author = 'Microsoft' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2021 Microsoft Corporation.' # Description of the functionality provided by this module Description = 'Provides added functionality to PowerShell Editor Services for the Visual Studio Code editor.' # Minimum version of the Windows PowerShell engine required by this module # PowerShellVersion = '' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @('New-VSCodeHtmlContentView', 'Show-VSCodeHtmlContentView', 'Close-VSCodeHtmlContentView', 'Set-VSCodeHtmlContentView', 'Write-VSCodeHtmlContentView') # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. LicenseUri = 'https://github.com/PowerShell/PowerShellEditorServices/blob/main/LICENSE' # A URL to the main website for this project. ProjectUri = 'https://github.com/PowerShell/PowerShellEditorServices' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZYzJwiKGoPH8G # 4gy5sE6SRw6pqdLufHA954XC9mqX+6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC3yPL0IYUcoPyEIDxoBXKJH # 3Ols3qpDNQr76nolRf2yMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAKP2lrIQV9IVZpieenTzHpSmeGIUyVOMoP5bn3T2eeocF0eqzrYjsdo4s # nf52Zr5xiFHI6XHOW+iHr0j03tCkLN+SD9rzVDnERndlniaPpU8WgNyzKJ+iiuqX # J5oGQxDk76MZSxp4YObnc3jhohMZvCgn0z/y4WfTPgxU0fprk/QrNCzi8CcOJKzB # 4wpAwXdzkniG0wISx7A+UkpBBxu7muCtm9NLba96Iy8KqXsuByOIGFD1w193S6BU # Hx4x7d2BkKKo/WpqksVOiC77A9/QDKsnMA7u9ogizDAJ1grQoAE4XiArdgF266t8 # aYYAJpOOF3kMRUevbFK0kmchlhJcDqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAfkJ+SGZ21u8Dv3++EfQVn1xz5abfYJatSD9YTNn6iSAIGZXrphEv3 # GBMyMDI0MDEwNDAyMDg1Mi42OTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAdGyW0AobC7SRQABAAAB0TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MThaFw0yNDAyMDExOTEyMThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCZTNo0OeGz2XFd2gLg5nTlBm8XOpuwJIiXsMU61rwq # 1ZKDpa443RrSG/pH8Gz6XNnFQKGnCqNCtmvoKULApwrT/s7/e1X0lNFKmj7U7X4p # 00S0uQbW6LwSn/zWHaG2c54ZXsGY+BYfhWDgbFpCTxRzTnRCG62bkWPp6ZHbZPg4 # Ht1CRCAMhhOGTR8wI4G7wwWZwdMc6UvUUlq0ql9AxAfzkYRpi2tRvDHMdmZ3vyXp # qhFwvRG8cgCH/TTCjW5q6aNbdqKL3BFDPzUtuCNsPXL3/E0dR2bDMqa0aNH+iIfh # GC4/vcwuteOMCPUIDVSqDCNfIaPDEwYci1fd9gu1zVw+HEhDZM7Ea3nxIUrzt+Rf # p5ToMMj4QAmJ6Uadm+TPbDbo8kFIK70ShmW8wn8fJk9ReQQEpTtIN43eRv9QmXy3 # Ued80osOBE+WkdMvSCFh+qgCsKdzQxQJG62cTeoU2eqNhH3oppXmyfVUwbsefQzM # PtbinCZd0FUlmlM/dH+4OniqQyaHvrtYy3wqIafY3zeFITlVAoP9q9vF4W7KHR/u # F0mvTpAL5NaTDN1plQS0MdjMkgzZK5gtwqOe/3rTlqBzxwa7YYp3urP5yWkTzISG # nhNWIZOxOyQIOxZfbiIbAHbm3M8hj73KQWcCR5JavgkwUmncFHESaQf4Drqs+/1L # 1QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFAuO8UzF7DcH0mmsF4XQxxHQvS2jMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCbu9rTAHV24mY0qoG5eEnImz5akGXTviBw # Kp2Y51s26w8oDrWor+m00R4/3BcDmYlUK8Nrx/auYFYidZddcUjw42QxSStmv/qW # nCQi/2OnH32KVHQ+kMOZPABQTG1XkcnYPUOOEEor6f/3Js1uj4wjHzE4V4aumYXB # Asr4L5KR8vKes5tFxhMkWND/O7W/RaHYwJMjMkxVosBok7V21sJAlxScEXxfJa+/ # qkqUr7CZgw3R4jCHRkPqQhMWibXPMYar/iF0ZuLB9O89DMJNhjK9BSf6iqgZoMuz # IVt+EBoTzpv/9p4wQ6xoBCs29mkj/EIWFdc+5a30kuCQOSEOj07+WI29A4k6QIRB # 5w+eMmZ0Jec0sSyeQB5KjxE51iYMhtlMrUKcr06nBqCsSKPYsSAITAzgssJD+Z/c # TS7Cu35fJrWhM9NYX24uAxYLAW0ipNtWptIeV6akuZEeEV6BNtM3VTk+mAlV5/eC # /0Y17aVSjK5/gyDoLNmrgVwv5TAaBmq/wgRRFHmW9UJ3zv8Lmk6mIoAyTpqBbuUj # MLyrtajuSsA/m2DnKMO0Qiz1v+FSVbqM38J/PTlhCTUbFOx0kLT7Y/7+ZyrilVCz # yAYfFIinDIjWlM85tDeU8ZfJCjFKwq3DsRxV4JY18xww8TTmod3lkr9NqGQ54Lmy # PVc+5ibNrjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBH # JY2Fv+GhLQtRDR2vIzBaSv/7LKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6UBucTAiGA8yMDI0MDEwMzIzMzgy # NVoYDzIwMjQwMTA0MjMzODI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpQG5x # AgEAMAoCAQACAjUmAgH/MAcCAQACAhNLMAoCBQDpQb/xAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBALnK2RA1D4bns8CeaxFGhsQGMOfOJtCcinex3YRoi3GQ # eIBurD1V9aE1q8FTJ+ZMCiV+wv+zl+Kkt6hL2CMV23kVT4CEQncBoTCjXuSoAfKC # fU013IhMXv3AswCfEBF/oUIRsKNa4lO5soO4JTwQXK6yvMj/S9DaGws7HWBpQGsM # AaShqbydWwIV29tA4EqguuR6TgQRyZxbkBuU1n73qOtEXSt9+eod+EyEH+m7UWv7 # +8QYFyuolJoATXLkM/P9UntIT6B8qo4yEs1Rp1VdB6aPdbK9z4I7Q1hp7Kd/5SXP # p3+47om/Pj47Vf5hweAJyH0d4CmJEB5366jZrJPGX2UxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdGyW0AobC7SRQABAAAB # 0TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDakGmJ6i8lbtrb7MwZlcp9gt/ItlWN34kGb7EN+VGw # 0TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMy8YXkCALv57c5sRhrPTub1 # q4TwJ6oVA36k8IiI/AcMMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHRsltAKGwu0kUAAQAAAdEwIgQgYkO29UwQ58By4FNjfYbcFlyi # ifr+Eg+8J7F5a2uQnJ4wDQYJKoZIhvcNAQELBQAEggIALrDLVVqWwtmpivPb2Xl9 # /WZJwVXGPQ+WsE67Qn6BtL+8xv4Ni1rHo8W8QTzghgiCxBGf70mCA6PyYEKW5kAJ # qUSx3HcIXBSpY4wnlKEb3Pz0rgXzV6Kwqxv/IjiZHUcPwmpB6v5lQbQLE5FnD1Sm # GU9Hm8QKUv/IKVxVLt7QOmWaZ60iypV5euw5sDRgdnqjwd7e51Rj/1DRiJhJHZLO # uvzhgZgJ+bZb4qzQLTNLrw3/LMlLaz52kJkUz2hkzN/79VIOmcjAEnW++5bXQCz1 # g8lni5mpJMaRjpW6+I4Mozt8muZat6jsepnrCmo9zdK0J80kIJZCEmjDAraWwwHc # eE1h5GYce77ljw7blPKLWzhXHenSj+irajaSbELKrRZus+oIiBlgGDBjZR9Bu7WV # /wvcvyHHSxEvXaGSSwUPbFGS7D9utHIkcceI4CnTyMS0SmGWxA7JUwGZlyLauGe0 # Ulx6KIRg92BvRpTpjlVZZzuJGJKxssFk3A9MH1FhxUafWRiubivLPDDNk5XaJQQT # mZLe8Z71p7RWI6X4pLsxU4tiZSYksFVo2zC8cal8kVFi4eOME1zcHU+gh6sRYWkO # JXqE8+k639ipVW9fVuDhFEaH+pWjJRl9uWsaxVraXFLTCvYafvsMPZy9bg3XHFY0 # 8Jc9EV+P+cB+gwQAveZU2H0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_37_1.ps1
sample_37_1.ps1
Function Test-Empty { [CmdletBinding()] [OutputType([boolean])] param ( [Parameter(Mandatory=$true)] [AllowNull()] [AllowEmptyString()] [string]$content ) return [string]::IsNullOrEmpty($content) -or [string]::IsNullOrWhiteSpace($content) } function Get-PatchHistory { [CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline)] [string]$Path, [Parameter()] [string]$After ) process { if (!(Test-Empty $After)) { $fileLog = $(git log -p -U10000 --output-indicator-new=~ --output-indicator-old=^ --reverse "$After..HEAD" -- $path) } else { $fileLog = $(git log -p --output-indicator-new=~ --output-indicator-old=^ --reverse -- $path) } $fileLog = $fileLog -join "`r`n" return $fileLog } } function Get-Matches { param( [Parameter(Mandatory=$true)] $Pattern, [Parameter(ValueFromPipeline=$true)] $InputObject, [Parameter()] [int]$Timeout=$(5 * 60) ) begin { try { $regex = New-Object Regex($pattern, [System.Text.RegularExpressions.RegexOptions]::None ,[System.TimeSpan]::FromSeconds($Timeout)) } catch { Throw "Get-Matches: Pattern not correct. $_" } $groups = @($regex.GetGroupNames() | Where-Object { ($_ -as [Int32]) -eq $null } | ForEach-Object { $_.toString() }) } process { foreach ($line in $InputObject) { foreach ($match in ($regex.Matches($line))) { if ($groups.Count -eq 0) { ([Object[]]$match.Groups)[-1].Value } else { $rv = 1 | Select-Object -Property $groups $groups | ForEach-Object { $rv.$_ = $match.Groups[$_].Value } $rv } } } } } class IndexedMatch { [string]$Text; [int]$StartIndex; [int]$EndIndex; [int]$Length; IndexedMatch() { } } function ConvertTo-DateTime { [CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline)] [string] $DateTimeString ) process { if (![String]::IsNullOrEmpty($DateTimeString)) { if ($DateTimeString -match "(?mi)^[A-Z]{3} (?<month>[A-Z]{3}) (?<day>\d+) (?<hour>\d+):(?<minute>\d+):(?<second>\d+) (?<year>\d+)") { return $("$($matches.month) $($matches.day) $($matches.year) $($matches.hour):$($matches.minute):$($matches.second)") } else { return $DateTimeString } } else { return $DateTimeString } } } function Get-ContentIndexedMatches { [CmdletBinding()] param ( [Parameter()] [string] $Pattern, [Parameter(Mandatory, ValueFromPipeline)] [AllowNull()] [AllowEmptyString()] [string]$InputObject ) process { $startingElement = 1 $keyedMatches = @() try { $options = [System.Text.RegularExpressions.RegexOptions]::IgnoreCase -bor [System.Text.RegularExpressions.RegexOptions]::Multiline $RE = New-Object Regex -ArgumentList $Pattern, $options [System.Text.RegularExpressions.MatchCollection]$theMatches = [Regex]::Matches($InputObject, $Pattern, $options); foreach ($m in $theMatches) { $match = [IndexedMatch]::New() $match.StartIndex = [int32]$m.Index; $match.Length = [int32]$m.Length; $match.EndIndex = [int32]$m.Index + [int32]$m.Length; for ($counter = $startingElement; $counter -lt $m.Groups.Count; $counter++) { if ($m.Groups[$counter].Success) { $match | Add-Member -MemberType NoteProperty -Name $RE.GroupNameFromNumber($counter) -Value $m.Groups[$counter].Value -Force } } $match | Add-Member -MemberType NoteProperty -Name "0" -Value $m.Groups[0].Value -Force $keyedMatches += $match; } } catch { } return @($keyedMatches); } } Export-ModuleMember -Function * -Cmdlet * -Variable *
combined_dataset/train/non-malicious/937.ps1
937.ps1
$apiVersion = "2015-04-08" $resourceGroupName = "myResourceGroup" $accountName = "mycosmosaccount" $databaseName = "database1" $databaseThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/throughput" $databaseThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/settings" $graphName = "graph1" $graphThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/" + $graphName + "/throughput" $graphThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/graphs/settings" Get-AzResource -ResourceType $databaseThroughputResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $databaseThroughputResourceName | Select-Object Properties Get-AzResource -ResourceType $graphThroughputResourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $graphThroughputResourceName | Select-Object Properties
combined_dataset/train/non-malicious/590.ps1
590.ps1
function Get-TrueCryptContainer{ [CmdletBinding()] param( [Parameter(Mandatory=$false)] [String] $Name, [Switch] $Mounted ) $MountedContainers = Get-PPConfiguration $PSconfigs.TrueCryptContainer.DataFile | %{$_.Content.MountedContainer} Get-PPConfiguration $PSconfigs.TrueCryptContainer.Filter | %{$_.Content.TrueCryptContainer} | %{ $(if(-not $Name){ $_ | select Key, Name, @{L="Path";E={Get-Path $_.Path}}, FavoriteDriveLetter }elseif($Name){ $_ | where{$_.Name -like $Name -or $_.Key -like $Name} | select Key, Name, @{L="Path";E={Get-Path $_.Path}}, FavoriteDriveLetter }) | %{ if($Mounted){ $TrueCryptContainer = $_ $MountedContainer = $MountedContainers | where{$_.Name -eq $TrueCryptContainer.Name} if($MountedContainer){$_ | select Key, Name, Path, FavoriteDriveLetter, @{L="Drive";E={$MountedContainer.Drive}}} }else{ $_ } } } }
combined_dataset/train/non-malicious/2631.ps1
2631.ps1
Function Convert-WindowsImage { [CmdletBinding(DefaultParameterSetName="SRC", HelpURI="http://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f")] param( [Parameter(ParameterSetName="SRC", Mandatory=$true, ValueFromPipeline=$true)] [Alias("WIM")] [string] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path $(Resolve-Path $_) })] $SourcePath, [Parameter(ParameterSetName="SRC")] [Alias("VHD")] [string] [ValidateNotNullOrEmpty()] $VHDPath, [Parameter(ParameterSetName="SRC")] [Alias("WorkDir")] [string] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path $_ })] $WorkingDirectory = $pwd, [Parameter(ParameterSetName="SRC")] [Alias("Size")] [UInt64] [ValidateNotNullOrEmpty()] [ValidateRange(512MB, 64TB)] $SizeBytes = 40GB, [Parameter(ParameterSetName="SRC")] [Alias("Format")] [string] [ValidateNotNullOrEmpty()] [ValidateSet("VHD", "VHDX")] $VHDFormat = "VHD", [Parameter(ParameterSetName="SRC")] [Alias("DiskType")] [string] [ValidateNotNullOrEmpty()] [ValidateSet("Dynamic", "Fixed")] $VHDType = "Dynamic", [Parameter(ParameterSetName="SRC")] [Alias("Unattend")] [string] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path $(Resolve-Path $_) })] $UnattendPath, [Parameter(ParameterSetName="SRC")] [string] [ValidateNotNullOrEmpty()] $Feature, [Parameter(ParameterSetName="SRC")] [Alias("SKU")] [string] [ValidateNotNullOrEmpty()] $Edition, [Parameter(ParameterSetName="SRC")] [Parameter(ParameterSetName="UI")] [string] $BCDBoot = "bcdboot.exe", [Parameter(ParameterSetName="SRC")] [Parameter(ParameterSetName="UI")] [switch] $Passthru, [Parameter(ParameterSetName="UI")] [switch] $ShowUI, [Parameter(ParameterSetName="SRC")] [Parameter(ParameterSetName="UI")] [string] [ValidateNotNullOrEmpty()] [ValidateSet("None", "Serial", "1394", "USB", "Local", "Network")] $EnableDebugger = "None", [Parameter(ParameterSetName="SRC")] [string] [ValidateNotNullOrEmpty()] [ValidateSet("MBR", "GPT")] $VHDPartitionStyle = "MBR", [Parameter(ParameterSetName="SRC")] [string] [ValidateNotNullOrEmpty()] [ValidateSet("NativeBoot", "VirtualMachine")] $BCDinVHD = "VirtualMachine", [Parameter(ParameterSetName="SRC")] [Switch] $ExpandOnNativeBoot = $True, [Parameter(ParameterSetName="SRC")] [Switch] $RemoteDesktopEnable = $False, [Parameter(ParameterSetName="SRC")] [string] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path $(Resolve-Path $_) })] $Driver ) DynamicParam { $parameterDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary switch ($EnableDebugger) { "Serial" { $ComPortAttr = New-Object System.Management.Automation.ParameterAttribute $ComPortAttr.ParameterSetName = "__AllParameterSets" $ComPortAttr.Mandatory = $false $ComPortValidator = New-Object System.Management.Automation.ValidateRangeAttribute( 1, 10 ) $ComPortNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $ComPortAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $ComPortAttrCollection.Add($ComPortAttr) $ComPortAttrCollection.Add($ComPortValidator) $ComPortAttrCollection.Add($ComPortNotNull) $ComPort = New-Object System.Management.Automation.RuntimeDefinedParameter( "ComPort", [UInt16], $ComPortAttrCollection ) $ComPort.Value = 1 $parameterDictionary.Add("ComPort", $ComPort) $BaudRateAttr = New-Object System.Management.Automation.ParameterAttribute $BaudRateAttr.ParameterSetName = "__AllParameterSets" $BaudRateAttr.Mandatory = $false $BaudRateValidator = New-Object System.Management.Automation.ValidateSetAttribute( 9600, 19200,38400, 57600, 115200 ) $BaudRateNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $BaudRateAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $BaudRateAttrCollection.Add($BaudRateAttr) $BaudRateAttrCollection.Add($BaudRateValidator) $BaudRateAttrCollection.Add($BaudRateNotNull) $BaudRate = New-Object System.Management.Automation.RuntimeDefinedParameter( "BaudRate", [UInt32], $BaudRateAttrCollection ) $BaudRate.Value = 115200 $parameterDictionary.Add("BaudRate", $BaudRate) break } "1394" { $ChannelAttr = New-Object System.Management.Automation.ParameterAttribute $ChannelAttr.ParameterSetName = "__AllParameterSets" $ChannelAttr.Mandatory = $false $ChannelValidator = New-Object System.Management.Automation.ValidateRangeAttribute( 0, 62 ) $ChannelNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $ChannelAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $ChannelAttrCollection.Add($ChannelAttr) $ChannelAttrCollection.Add($ChannelValidator) $ChannelAttrCollection.Add($ChannelNotNull) $Channel = New-Object System.Management.Automation.RuntimeDefinedParameter( "Channel", [UInt16], $ChannelAttrCollection ) $Channel.Value = 10 $parameterDictionary.Add("Channel", $Channel) break } "USB" { $TargetAttr = New-Object System.Management.Automation.ParameterAttribute $TargetAttr.ParameterSetName = "__AllParameterSets" $TargetAttr.Mandatory = $false $TargetNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $TargetAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $TargetAttrCollection.Add($TargetAttr) $TargetAttrCollection.Add($TargetNotNull) $Target = New-Object System.Management.Automation.RuntimeDefinedParameter( "Target", [string], $TargetAttrCollection ) $Target.Value = "Debugging" $parameterDictionary.Add("Target", $Target) break } "Network" { $IpAttr = New-Object System.Management.Automation.ParameterAttribute $IpAttr.ParameterSetName = "__AllParameterSets" $IpAttr.Mandatory = $true $IpValidator = New-Object System.Management.Automation.ValidatePatternAttribute( "\b(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\b" ) $IpNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $IpAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $IpAttrCollection.Add($IpAttr) $IpAttrCollection.Add($IpValidator) $IpAttrCollection.Add($IpNotNull) $IP = New-Object System.Management.Automation.RuntimeDefinedParameter( "IPAddress", [string], $IpAttrCollection ) $parameterDictionary.Add("IPAddress", $IP) $PortAttr = New-Object System.Management.Automation.ParameterAttribute $PortAttr.ParameterSetName = "__AllParameterSets" $PortAttr.Mandatory = $false $PortValidator = New-Object System.Management.Automation.ValidateRangeAttribute( 49152, 50039 ) $PortNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $PortAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $PortAttrCollection.Add($PortAttr) $PortAttrCollection.Add($PortValidator) $PortAttrCollection.Add($PortNotNull) $Port = New-Object System.Management.Automation.RuntimeDefinedParameter( "Port", [UInt16], $PortAttrCollection ) $Port.Value = 50000 $parameterDictionary.Add("Port", $Port) $KeyAttr = New-Object System.Management.Automation.ParameterAttribute $KeyAttr.ParameterSetName = "__AllParameterSets" $KeyAttr.Mandatory = $true $KeyValidator = New-Object System.Management.Automation.ValidatePatternAttribute( "\b([A-Z0-9]+).([A-Z0-9]+).([A-Z0-9]+).([A-Z0-9]+)\b" ) $KeyNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute $KeyAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $KeyAttrCollection.Add($KeyAttr) $KeyAttrCollection.Add($KeyValidator) $KeyAttrCollection.Add($KeyNotNull) $Key = New-Object System.Management.Automation.RuntimeDefinedParameter( "Key", [string], $KeyAttrCollection ) $parameterDictionary.Add("Key", $Key) $NoDHCPAttr = New-Object System.Management.Automation.ParameterAttribute $NoDHCPAttr.ParameterSetName = "__AllParameterSets" $NoDHCPAttr.Mandatory = $false $NoDHCPAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $NoDHCPAttrCollection.Add($NoDHCPAttr) $NoDHCP = New-Object System.Management.Automation.RuntimeDefinedParameter( "NoDHCP", [switch], $NoDHCPAttrCollection ) $parameterDictionary.Add("NoDHCP", $NoDHCP) $NewKeyAttr = New-Object System.Management.Automation.ParameterAttribute $NewKeyAttr.ParameterSetName = "__AllParameterSets" $NewKeyAttr.Mandatory = $false $NewKeyAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute] $NewKeyAttrCollection.Add($NewKeyAttr) $NewKey = New-Object System.Management.Automation.RuntimeDefinedParameter( "NewKey", [switch], $NewKeyAttrCollection ) $parameterDictionary.Add("NewKey", $NewKey) break } default { break } } return $parameterDictionary } Begin { $PARTITION_STYLE_MBR = 0x00000000 $PARTITION_STYLE_GPT = 0x00000001 $ScriptVersion = DATA { ConvertFrom-StringData -StringData @" Major = 6 Minor = 3 Build = 9600 QFE = 7 Branch = fbl_core1_hyp_dev(mikekol) Timestamp = 140217-3000 Flavor = amd64fre "@ } $vQuality = "Release to Web" $myVersion = "$($ScriptVersion.Major).$($ScriptVersion.Minor).$($ScriptVersion.Build).$($ScriptVersion.QFE).$($ScriptVersion.Flavor).$($ScriptVersion.Branch).$($ScriptVersion.Timestamp)" $scriptName = "Convert-WindowsImage" $sessionKey = [Guid]::NewGuid().ToString() $logFolder = "$($env:Temp)\$($scriptName)\$($sessionKey)" $vhdMaxSize = 2040GB $vhdxMaxSize = 64TB $lowestSupportedVersion = New-Object Version "6.1" $lowestSupportedBuild = 8250 $transcripting = $false $VHDFormat = $VHDFormat.ToUpper() $flagText = @" This $VHDFormat was created by Convert-WindowsImage.ps1 $myVersion $vQuality on $([DateTime]::Now). "@ $header = @" Windows(R) Image to Virtual Hard Disk Converter for Windows(R) 8 Copyright (C) Microsoft Corporation. All rights reserved. Version $myVersion $vQuality "@ $uiHeader = @" You can use the fields below to configure the VHD or VHDX that you want to create! "@ $code = @" using System; using System.Collections.Generic; using System.Collections.ObjectModel; using System.ComponentModel; using System.Globalization; using System.IO; using System.Linq; using System.Runtime.InteropServices; using System.Security; using System.Text; using System.Text.RegularExpressions; using System.Threading; using System.Xml.Linq; using System.Xml.XPath; using Microsoft.Win32.SafeHandles; namespace WIM2VHD { /// <summary> /// P/Invoke methods and associated enums, flags, and structs. /// </summary> public class NativeMethods { ///<summary> ///User-defined function used with the RegisterMessageCallback or UnregisterMessageCallback function. ///</summary> ///<param name="MessageId">Specifies the message being sent.</param> ///<param name="wParam">Specifies additional message information. The contents of this parameter depend on the value of the ///MessageId parameter.</param> ///<param name="lParam">Specifies additional message information. The contents of this parameter depend on the value of the ///MessageId parameter.</param> ///<param name="UserData">Specifies the user-defined value passed to RegisterCallback.</param> ///<returns> ///To indicate success and to enable other subscribers to process the message return WIM_MSG_SUCCESS. ///To prevent other subscribers from receiving the message, return WIM_MSG_DONE. ///To cancel an image apply or capture, return WIM_MSG_ABORT_IMAGE when handling the WIM_MSG_PROCESS message. ///</returns> public delegate uint WimMessageCallback( uint MessageId, IntPtr wParam, IntPtr lParam, IntPtr UserData ); public static void RegisterMessageCallback( WimFileHandle hWim, WimMessageCallback callback) { uint _callback = NativeMethods.WimRegisterMessageCallback(hWim, callback, IntPtr.Zero); int rc = Marshal.GetLastWin32Error(); if (0 != rc) { // Throw an exception if something bad happened on the Win32 end. throw new InvalidOperationException( string.Format( CultureInfo.CurrentCulture, "Unable to register message callback." )); } } public static void UnregisterMessageCallback( WimFileHandle hWim, WimMessageCallback registeredCallback) { bool status = NativeMethods.WimUnregisterMessageCallback(hWim, registeredCallback); int rc = Marshal.GetLastWin32Error(); if (!status) { throw new InvalidOperationException( string.Format( CultureInfo.CurrentCulture, "Unable to unregister message callback." )); } } /// <summary> /// The default depth in a VHD parent chain that this library will search through. /// If you want to go more than one disk deep into the parent chain, provide a different value. /// </summary> public const uint OPEN_VIRTUAL_DISK_RW_DEFAULT_DEPTH = 0x00000001; public const uint DEFAULT_BLOCK_SIZE = 0x00080000; public const uint DISK_SECTOR_SIZE = 0x00000200; internal const uint ERROR_VIRTDISK_NOT_VIRTUAL_DISK = 0xC03A0015; internal const uint ERROR_NOT_FOUND = 0x00000490; internal const uint ERROR_IO_PENDING = 0x000003E5; internal const uint ERROR_INSUFFICIENT_BUFFER = 0x0000007A; internal const uint ERROR_ERROR_DEV_NOT_EXIST = 0x00000037; internal const uint ERROR_BAD_COMMAND = 0x00000016; internal const uint ERROR_SUCCESS = 0x00000000; public const uint GENERIC_READ = 0x80000000; public const uint GENERIC_WRITE = 0x40000000; public const short FILE_ATTRIBUTE_NORMAL = 0x00000080; public const uint CREATE_NEW = 0x00000001; public const uint CREATE_ALWAYS = 0x00000002; public const uint OPEN_EXISTING = 0x00000003; public const short INVALID_HANDLE_VALUE = -1; internal static Guid VirtualStorageTypeVendorUnknown = new Guid("00000000-0000-0000-0000-000000000000"); internal static Guid VirtualStorageTypeVendorMicrosoft = new Guid("EC984AEC-A0F9-47e9-901F-71415A66345B"); public const uint WIM_FLAG_VERIFY = 0x00000002; public const uint WIM_FLAG_INDEX = 0x00000004; public const uint WM_APP = 0x00008000; /// <summary> /// Indicates the version of the virtual disk to create. /// </summary> public enum CreateVirtualDiskVersion : int { VersionUnspecified = 0x00000000, Version1 = 0x00000001, Version2 = 0x00000002 } public enum OpenVirtualDiskVersion : int { VersionUnspecified = 0x00000000, Version1 = 0x00000001, Version2 = 0x00000002 } /// <summary> /// Contains the version of the virtual hard disk (VHD) ATTACH_VIRTUAL_DISK_PARAMETERS structure to use in calls to VHD functions. /// </summary> public enum AttachVirtualDiskVersion : int { VersionUnspecified = 0x00000000, Version1 = 0x00000001, Version2 = 0x00000002 } public enum CompactVirtualDiskVersion : int { VersionUnspecified = 0x00000000, Version1 = 0x00000001 } /// <summary> /// Contains the type and provider (vendor) of the virtual storage device. /// </summary> public enum VirtualStorageDeviceType : int { /// <summary> /// The storage type is unknown or not valid. /// </summary> Unknown = 0x00000000, /// <summary> /// For internal use only. This type is not supported. /// </summary> ISO = 0x00000001, /// <summary> /// Virtual Hard Disk device type. /// </summary> VHD = 0x00000002, /// <summary> /// Virtual Hard Disk v2 device type. /// </summary> VHDX = 0x00000003 } /// <summary> /// Contains virtual hard disk (VHD) open request flags. /// </summary> [Flags] public enum OpenVirtualDiskFlags { /// <summary> /// No flags. Use system defaults. /// </summary> None = 0x00000000, /// <summary> /// Open the VHD file (backing store) without opening any differencing-chain parents. Used to correct broken parent links. /// </summary> NoParents = 0x00000001, /// <summary> /// Reserved. /// </summary> BlankFile = 0x00000002, /// <summary> /// Reserved. /// </summary> BootDrive = 0x00000004, } /// <summary> /// Contains the bit mask for specifying access rights to a virtual hard disk (VHD). /// </summary> [Flags] public enum VirtualDiskAccessMask { /// <summary> /// Only Version2 of OpenVirtualDisk API accepts this parameter /// </summary> None = 0x00000000, /// <summary> /// Open the virtual disk for read-only attach access. The caller must have READ access to the virtual disk image file. /// </summary> /// <remarks> /// If used in a request to open a virtual disk that is already open, the other handles must be limited to either /// VIRTUAL_DISK_ACCESS_DETACH or VIRTUAL_DISK_ACCESS_GET_INFO access, otherwise the open request with this flag will fail. /// </remarks> AttachReadOnly = 0x00010000, /// <summary> /// Open the virtual disk for read-write attaching access. The caller must have (READ | WRITE) access to the virtual disk image file. /// </summary> /// <remarks> /// If used in a request to open a virtual disk that is already open, the other handles must be limited to either /// VIRTUAL_DISK_ACCESS_DETACH or VIRTUAL_DISK_ACCESS_GET_INFO access, otherwise the open request with this flag will fail. /// If the virtual disk is part of a differencing chain, the disk for this request cannot be less than the readWriteDepth specified /// during the prior open request for that differencing chain. /// </remarks> AttachReadWrite = 0x00020000, /// <summary> /// Open the virtual disk to allow detaching of an attached virtual disk. The caller must have /// (FILE_READ_ATTRIBUTES | FILE_READ_DATA) access to the virtual disk image file. /// </summary> Detach = 0x00040000, /// <summary> /// Information retrieval access to the virtual disk. The caller must have READ access to the virtual disk image file. /// </summary> GetInfo = 0x00080000, /// <summary> /// Virtual disk creation access. /// </summary> Create = 0x00100000, /// <summary> /// Open the virtual disk to perform offline meta-operations. The caller must have (READ | WRITE) access to the virtual /// disk image file, up to readWriteDepth if working with a differencing chain. /// </summary> /// <remarks> /// If the virtual disk is part of a differencing chain, the backing store (host volume) is opened in RW exclusive mode up to readWriteDepth. /// </remarks> MetaOperations = 0x00200000, /// <summary> /// Reserved. /// </summary> Read = 0x000D0000, /// <summary> /// Allows unrestricted access to the virtual disk. The caller must have unrestricted access rights to the virtual disk image file. /// </summary> All = 0x003F0000, /// <summary> /// Reserved. /// </summary> Writable = 0x00320000 } /// <summary> /// Contains virtual hard disk (VHD) creation flags. /// </summary> [Flags] public enum CreateVirtualDiskFlags { /// <summary> /// Contains virtual hard disk (VHD) creation flags. /// </summary> None = 0x00000000, /// <summary> /// Pre-allocate all physical space necessary for the size of the virtual disk. /// </summary> /// <remarks> /// The CREATE_VIRTUAL_DISK_FLAG_FULL_PHYSICAL_ALLOCATION flag is used for the creation of a fixed VHD. /// </remarks> FullPhysicalAllocation = 0x00000001 } /// <summary> /// Contains virtual disk attach request flags. /// </summary> [Flags] public enum AttachVirtualDiskFlags { /// <summary> /// No flags. Use system defaults. /// </summary> None = 0x00000000, /// <summary> /// Attach the virtual disk as read-only. /// </summary> ReadOnly = 0x00000001, /// <summary> /// No drive letters are assigned to the disk's volumes. /// </summary> /// <remarks>Oddly enough, this doesn't apply to NTFS mount points.</remarks> NoDriveLetter = 0x00000002, /// <summary> /// Will decouple the virtual disk lifetime from that of the VirtualDiskHandle. /// The virtual disk will be attached until the Detach() function is called, even if all open handles to the virtual disk are closed. /// </summary> PermanentLifetime = 0x00000004, /// <summary> /// Reserved. /// </summary> NoLocalHost = 0x00000008 } [Flags] public enum DetachVirtualDiskFlag { None = 0x00000000 } [Flags] public enum CompactVirtualDiskFlags { None = 0x00000000, NoZeroScan = 0x00000001, NoBlockMoves = 0x00000002 } [FlagsAttribute] internal enum WimCreateFileDesiredAccess : uint { WimQuery = 0x00000000, WimGenericRead = 0x80000000 } /// <summary> /// Specifies how the file is to be treated and what features are to be used. /// </summary> [FlagsAttribute] internal enum WimApplyFlags : uint { /// <summary> /// No flags. /// </summary> WimApplyFlagsNone = 0x00000000, /// <summary> /// Reserved. /// </summary> WimApplyFlagsReserved = 0x00000001, /// <summary> /// Verifies that files match original data. /// </summary> WimApplyFlagsVerify = 0x00000002, /// <summary> /// Specifies that the image is to be sequentially read for caching or performance purposes. /// </summary> WimApplyFlagsIndex = 0x00000004, /// <summary> /// Applies the image without physically creating directories or files. Useful for obtaining a list of files and directories in the image. /// </summary> WimApplyFlagsNoApply = 0x00000008, /// <summary> /// Disables restoring security information for directories. /// </summary> WimApplyFlagsNoDirAcl = 0x00000010, /// <summary> /// Disables restoring security information for files /// </summary> WimApplyFlagsNoFileAcl = 0x00000020, /// <summary> /// The .wim file is opened in a mode that enables simultaneous reading and writing. /// </summary> WimApplyFlagsShareWrite = 0x00000040, /// <summary> /// Sends a WIM_MSG_FILEINFO message during the apply operation. /// </summary> WimApplyFlagsFileInfo = 0x00000080, /// <summary> /// Disables automatic path fixups for junctions and symbolic links. /// </summary> WimApplyFlagsNoRpFix = 0x00000100, /// <summary> /// Returns a handle that cannot commit changes, regardless of the access level requested at mount time. /// </summary> WimApplyFlagsMountReadOnly = 0x00000200, /// <summary> /// Reserved. /// </summary> WimApplyFlagsMountFast = 0x00000400, /// <summary> /// Reserved. /// </summary> WimApplyFlagsMountLegacy = 0x00000800 } public enum WimMessage : uint { WIM_MSG = WM_APP + 0x1476, WIM_MSG_TEXT, ///<summary> ///Indicates an update in the progress of an image application. ///</summary> WIM_MSG_PROGRESS, ///<summary> ///Enables the caller to prevent a file or a directory from being captured or applied. ///</summary> WIM_MSG_PROCESS, ///<summary> ///Indicates that volume information is being gathered during an image capture. ///</summary> WIM_MSG_SCANNING, ///<summary> ///Indicates the number of files that will be captured or applied. ///</summary> WIM_MSG_SETRANGE, ///<summary> ///Indicates the number of files that have been captured or applied. ///</summary> WIM_MSG_SETPOS, ///<summary> ///Indicates that a file has been either captured or applied. ///</summary> WIM_MSG_STEPIT, ///<summary> ///Enables the caller to prevent a file resource from being compressed during a capture. ///</summary> WIM_MSG_COMPRESS, ///<summary> ///Alerts the caller that an error has occurred while capturing or applying an image. ///</summary> WIM_MSG_ERROR, ///<summary> ///Enables the caller to align a file resource on a particular alignment boundary. ///</summary> WIM_MSG_ALIGNMENT, WIM_MSG_RETRY, ///<summary> ///Enables the caller to align a file resource on a particular alignment boundary. ///</summary> WIM_MSG_SPLIT, WIM_MSG_SUCCESS = 0x00000000, WIM_MSG_ABORT_IMAGE = 0xFFFFFFFF } internal enum WimCreationDisposition : uint { WimOpenExisting = 0x00000003, } internal enum WimActionFlags : uint { WimIgnored = 0x00000000 } internal enum WimCompressionType : uint { WimIgnored = 0x00000000 } internal enum WimCreationResult : uint { WimCreatedNew = 0x00000000, WimOpenedExisting = 0x00000001 } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct CreateVirtualDiskParameters { /// <summary> /// A CREATE_VIRTUAL_DISK_VERSION enumeration that specifies the version of the CREATE_VIRTUAL_DISK_PARAMETERS structure being passed to or from the virtual hard disk (VHD) functions. /// </summary> public CreateVirtualDiskVersion Version; /// <summary> /// Unique identifier to assign to the virtual disk object. If this member is set to zero, a unique identifier is created by the system. /// </summary> public Guid UniqueId; /// <summary> /// The maximum virtual size of the virtual disk object. Must be a multiple of 512. /// If a ParentPath is specified, this value must be zero. /// If a SourcePath is specified, this value can be zero to specify the size of the source VHD to be used, otherwise the size specified must be greater than or equal to the size of the source disk. /// </summary> public ulong MaximumSize; /// <summary> /// Internal size of the virtual disk object blocks. /// The following are predefined block sizes and their behaviors. For a fixed VHD type, this parameter must be zero. /// </summary> public uint BlockSizeInBytes; /// <summary> /// Internal size of the virtual disk object sectors. Must be set to 512. /// </summary> public uint SectorSizeInBytes; /// <summary> /// Optional path to a parent virtual disk object. Associates the new virtual disk with an existing virtual disk. /// If this parameter is not NULL, SourcePath must be NULL. /// </summary> public string ParentPath; /// <summary> /// Optional path to pre-populate the new virtual disk object with block data from an existing disk. This path may refer to a VHD or a physical disk. /// If this parameter is not NULL, ParentPath must be NULL. /// </summary> public string SourcePath; /// <summary> /// Flags for opening the VHD /// </summary> public OpenVirtualDiskFlags OpenFlags; /// <summary> /// GetInfoOnly flag for V2 handles /// </summary> public bool GetInfoOnly; /// <summary> /// Virtual Storage Type of the parent disk /// </summary> public VirtualStorageType ParentVirtualStorageType; /// <summary> /// Virtual Storage Type of the source disk /// </summary> public VirtualStorageType SourceVirtualStorageType; /// <summary> /// A GUID to use for fallback resiliency over SMB. /// </summary> public Guid ResiliencyGuid; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct VirtualStorageType { public VirtualStorageDeviceType DeviceId; public Guid VendorId; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct SecurityDescriptor { public byte revision; public byte size; public short control; public IntPtr owner; public IntPtr group; public IntPtr sacl; public IntPtr dacl; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct OpenVirtualDiskParameters { public OpenVirtualDiskVersion Version; public bool GetInfoOnly; public Guid ResiliencyGuid; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct VirtualDiskProgress { public int OperationStatus; public ulong CurrentValue; public ulong CompletionValue; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct AttachVirtualDiskParameters { public AttachVirtualDiskVersion Version; public int Reserved; } [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] public struct CompactVirtualDiskParameters { public CompactVirtualDiskVersion Version; public uint Reserved; } [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] public static extern uint CreateVirtualDisk( [In, Out] ref VirtualStorageType VirtualStorageType, [In] string Path, [In] VirtualDiskAccessMask VirtualDiskAccessMask, [In, Out] ref SecurityDescriptor SecurityDescriptor, [In] CreateVirtualDiskFlags Flags, [In] uint ProviderSpecificFlags, [In, Out] ref CreateVirtualDiskParameters Parameters, [In] IntPtr Overlapped, [Out] out SafeFileHandle Handle); [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] internal static extern uint OpenVirtualDisk( [In, Out] ref VirtualStorageType VirtualStorageType, [In] string Path, [In] VirtualDiskAccessMask VirtualDiskAccessMask, [In] OpenVirtualDiskFlags Flags, [In, Out] ref OpenVirtualDiskParameters Parameters, [Out] out SafeFileHandle Handle); /// <summary> /// GetVirtualDiskOperationProgress API allows getting progress info for the async virtual disk operations (ie. Online Mirror) /// </summary> /// <param name="VirtualDiskHandle"></param> /// <param name="Overlapped"></param> /// <param name="Progress"></param> /// <returns></returns> [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] internal static extern uint GetVirtualDiskOperationProgress( [In] SafeFileHandle VirtualDiskHandle, [In] IntPtr Overlapped, [In, Out] ref VirtualDiskProgress Progress); [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] public static extern uint AttachVirtualDisk( [In] SafeFileHandle VirtualDiskHandle, [In, Out] ref SecurityDescriptor SecurityDescriptor, [In] AttachVirtualDiskFlags Flags, [In] uint ProviderSpecificFlags, [In, Out] ref AttachVirtualDiskParameters Parameters, [In] IntPtr Overlapped); [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] public static extern uint DetachVirtualDisk( [In] SafeFileHandle VirtualDiskHandle, [In] NativeMethods.DetachVirtualDiskFlag Flags, [In] uint ProviderSpecificFlags); [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] public static extern uint CompactVirtualDisk( [In] SafeFileHandle VirtualDiskHandle, [In] CompactVirtualDiskFlags Flags, [In, Out] ref CompactVirtualDiskParameters Parameters, [In] IntPtr Overlapped); [DllImport("virtdisk.dll", CharSet = CharSet.Unicode)] public static extern uint GetVirtualDiskPhysicalPath( [In] SafeFileHandle VirtualDiskHandle, [In, Out] ref uint DiskPathSizeInBytes, [Out] StringBuilder DiskPath); [DllImport("advapi32", SetLastError = true)] public static extern bool InitializeSecurityDescriptor( [Out] out SecurityDescriptor pSecurityDescriptor, [In] uint dwRevision); /// <summary> /// CreateEvent API is used while calling async Online Mirror API /// </summary> /// <param name="lpEventAttributes"></param> /// <param name="bManualReset"></param> /// <param name="bInitialState"></param> /// <param name="lpName"></param> /// <returns></returns> [DllImport("kernel32.dll", CharSet = CharSet.Unicode)] internal static extern IntPtr CreateEvent( [In, Optional] IntPtr lpEventAttributes, [In] bool bManualReset, [In] bool bInitialState, [In, Optional] string lpName); public sealed class WimFileHandle : SafeHandle { public WimFileHandle( string wimPath) : base(IntPtr.Zero, true) { if (String.IsNullOrEmpty(wimPath)) { throw new ArgumentNullException("wimPath"); } if (!File.Exists(Path.GetFullPath(wimPath))) { throw new FileNotFoundException((new FileNotFoundException()).Message, wimPath); } NativeMethods.WimCreationResult creationResult; this.handle = NativeMethods.WimCreateFile( wimPath, NativeMethods.WimCreateFileDesiredAccess.WimGenericRead, NativeMethods.WimCreationDisposition.WimOpenExisting, NativeMethods.WimActionFlags.WimIgnored, NativeMethods.WimCompressionType.WimIgnored, out creationResult ); // Check results. if (creationResult != NativeMethods.WimCreationResult.WimOpenedExisting) { throw new Win32Exception(); } if (this.handle == IntPtr.Zero) { throw new Win32Exception(); } // Set the temporary path. NativeMethods.WimSetTemporaryPath( this, Environment.ExpandEnvironmentVariables("%TEMP%") ); } protected override bool ReleaseHandle() { return NativeMethods.WimCloseHandle(this.handle); } public override bool IsInvalid { get { return this.handle == IntPtr.Zero; } } } public sealed class WimImageHandle : SafeHandle { public WimImageHandle( WimFile Container, uint ImageIndex) : base(IntPtr.Zero, true) { if (null == Container) { throw new ArgumentNullException("Container"); } if ((Container.Handle.IsClosed) || (Container.Handle.IsInvalid)) { throw new ArgumentNullException("The handle to the WIM file has already been closed, or is invalid.", "Container"); } if (ImageIndex > Container.ImageCount) { throw new ArgumentOutOfRangeException("ImageIndex", "The index does not exist in the specified WIM file."); } this.handle = NativeMethods.WimLoadImage( Container.Handle.DangerousGetHandle(), ImageIndex); } protected override bool ReleaseHandle() { return NativeMethods.WimCloseHandle(this.handle); } public override bool IsInvalid { get { return this.handle == IntPtr.Zero; } } } [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMCreateFile")] internal static extern IntPtr WimCreateFile( [In, MarshalAs(UnmanagedType.LPWStr)] string WimPath, [In] WimCreateFileDesiredAccess DesiredAccess, [In] WimCreationDisposition CreationDisposition, [In] WimActionFlags FlagsAndAttributes, [In] WimCompressionType CompressionType, [Out, Optional] out WimCreationResult CreationResult ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMCloseHandle")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool WimCloseHandle( [In] IntPtr Handle ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMLoadImage")] internal static extern IntPtr WimLoadImage( [In] IntPtr Handle, [In] uint ImageIndex ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMGetImageCount")] internal static extern uint WimGetImageCount( [In] WimFileHandle Handle ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMApplyImage")] internal static extern bool WimApplyImage( [In] WimImageHandle Handle, [In, Optional, MarshalAs(UnmanagedType.LPWStr)] string Path, [In] WimApplyFlags Flags ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMGetImageInformation")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool WimGetImageInformation( [In] SafeHandle Handle, [Out] out StringBuilder ImageInfo, [Out] out uint SizeOfImageInfo ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMSetTemporaryPath")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool WimSetTemporaryPath( [In] WimFileHandle Handle, [In] string TempPath ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMRegisterMessageCallback", CallingConvention = CallingConvention.StdCall)] internal static extern uint WimRegisterMessageCallback( [In, Optional] WimFileHandle hWim, [In] WimMessageCallback MessageProc, [In, Optional] IntPtr ImageInfo ); [DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMUnregisterMessageCallback", CallingConvention = CallingConvention.StdCall)] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool WimUnregisterMessageCallback( [In, Optional] WimFileHandle hWim, [In] WimMessageCallback MessageProc ); } public class WimFile { internal XDocument m_xmlInfo; internal List<WimImage> m_imageList; private static NativeMethods.WimMessageCallback wimMessageCallback; /// <summary> /// DefaultImageEvent handler /// </summary> public delegate void DefaultImageEventHandler(object sender, DefaultImageEventArgs e); ///<summary> ///ProcessFileEvent handler ///</summary> public delegate void ProcessFileEventHandler(object sender, ProcessFileEventArgs e); ///<summary> ///Enable the caller to prevent a file resource from being compressed during a capture. ///</summary> public event ProcessFileEventHandler ProcessFileEvent; ///<summary> ///Indicate an update in the progress of an image application. ///</summary> public event DefaultImageEventHandler ProgressEvent; ///<summary> ///Alert the caller that an error has occurred while capturing or applying an image. ///</summary> public event DefaultImageEventHandler ErrorEvent; ///<summary> ///Indicate that a file has been either captured or applied. ///</summary> public event DefaultImageEventHandler StepItEvent; ///<summary> ///Indicate the number of files that will be captured or applied. ///</summary> public event DefaultImageEventHandler SetRangeEvent; ///<summary> ///Indicate the number of files that have been captured or applied. ///</summary> public event DefaultImageEventHandler SetPosEvent; private enum ImageEventMessage : uint { ///<summary> ///Enables the caller to prevent a file or a directory from being captured or applied. ///</summary> Progress = NativeMethods.WimMessage.WIM_MSG_PROGRESS, ///<summary> ///Notification sent to enable the caller to prevent a file or a directory from being captured or applied. ///To prevent a file or a directory from being captured or applied, call WindowsImageContainer.SkipFile(). ///</summary> Process = NativeMethods.WimMessage.WIM_MSG_PROCESS, ///<summary> ///Enables the caller to prevent a file resource from being compressed during a capture. ///</summary> Compress = NativeMethods.WimMessage.WIM_MSG_COMPRESS, ///<summary> ///Alerts the caller that an error has occurred while capturing or applying an image. ///</summary> Error = NativeMethods.WimMessage.WIM_MSG_ERROR, ///<summary> ///Enables the caller to align a file resource on a particular alignment boundary. ///</summary> Alignment = NativeMethods.WimMessage.WIM_MSG_ALIGNMENT, ///<summary> ///Enables the caller to align a file resource on a particular alignment boundary. ///</summary> Split = NativeMethods.WimMessage.WIM_MSG_SPLIT, ///<summary> ///Indicates that volume information is being gathered during an image capture. ///</summary> Scanning = NativeMethods.WimMessage.WIM_MSG_SCANNING, ///<summary> ///Indicates the number of files that will be captured or applied. ///</summary> SetRange = NativeMethods.WimMessage.WIM_MSG_SETRANGE, ///<summary> ///Indicates the number of files that have been captured or applied. /// </summary> SetPos = NativeMethods.WimMessage.WIM_MSG_SETPOS, ///<summary> ///Indicates that a file has been either captured or applied. ///</summary> StepIt = NativeMethods.WimMessage.WIM_MSG_STEPIT, ///<summary> ///Success. ///</summary> Success = NativeMethods.WimMessage.WIM_MSG_SUCCESS, ///<summary> ///Abort. ///</summary> Abort = NativeMethods.WimMessage.WIM_MSG_ABORT_IMAGE } ///<summary> ///Event callback to the Wimgapi events ///</summary> private uint ImageEventMessagePump( uint MessageId, IntPtr wParam, IntPtr lParam, IntPtr UserData) { uint status = (uint) NativeMethods.WimMessage.WIM_MSG_SUCCESS; DefaultImageEventArgs eventArgs = new DefaultImageEventArgs(wParam, lParam, UserData); switch ((ImageEventMessage)MessageId) { case ImageEventMessage.Progress: ProgressEvent(this, eventArgs); break; case ImageEventMessage.Process: if (null != ProcessFileEvent) { string fileToImage = Marshal.PtrToStringUni(wParam); ProcessFileEventArgs fileToProcess = new ProcessFileEventArgs(fileToImage, lParam); ProcessFileEvent(this, fileToProcess); if (fileToProcess.Abort == true) { status = (uint)ImageEventMessage.Abort; } } break; case ImageEventMessage.Error: if (null != ErrorEvent) { ErrorEvent(this, eventArgs); } break; case ImageEventMessage.SetRange: if (null != SetRangeEvent) { SetRangeEvent(this, eventArgs); } break; case ImageEventMessage.SetPos: if (null != SetPosEvent) { SetPosEvent(this, eventArgs); } break; case ImageEventMessage.StepIt: if (null != StepItEvent) { StepItEvent(this, eventArgs); } break; default: break; } return status; } /// <summary> /// Constructor. /// </summary> /// <param name="wimPath">Path to the WIM container.</param> public WimFile(string wimPath) { if (string.IsNullOrEmpty(wimPath)) { throw new ArgumentNullException("wimPath"); } if (!File.Exists(Path.GetFullPath(wimPath))) { throw new FileNotFoundException((new FileNotFoundException()).Message, wimPath); } Handle = new NativeMethods.WimFileHandle(wimPath); // Hook up the events before we return. //wimMessageCallback = new NativeMethods.WimMessageCallback(ImageEventMessagePump); //NativeMethods.RegisterMessageCallback(this.Handle, wimMessageCallback); } /// <summary> /// Closes the WIM file. /// </summary> public void Close() { foreach (WimImage image in Images) { image.Close(); } if (null != wimMessageCallback) { NativeMethods.UnregisterMessageCallback(this.Handle, wimMessageCallback); wimMessageCallback = null; } if ((!Handle.IsClosed) && (!Handle.IsInvalid)) { Handle.Close(); } } /// <summary> /// Provides a list of WimImage objects, representing the images in the WIM container file. /// </summary> public List<WimImage> Images { get { if (null == m_imageList) { int imageCount = (int)ImageCount; m_imageList = new List<WimImage>(imageCount); for (int i = 0; i < imageCount; i++) { // Load up each image so it's ready for us. m_imageList.Add( new WimImage(this, (uint)i + 1)); } } return m_imageList; } } /// <summary> /// Provides a list of names of the images in the specified WIM container file. /// </summary> public List<string> ImageNames { get { List<string> nameList = new List<string>(); foreach (WimImage image in Images) { nameList.Add(image.ImageName); } return nameList; } } /// <summary> /// Indexer for WIM images inside the WIM container, indexed by the image number. /// The list of Images is 0-based, but the WIM container is 1-based, so we automatically compensate for that. /// this[1] returns the 0th image in the WIM container. /// </summary> /// <param name="ImageIndex">The 1-based index of the image to retrieve.</param> /// <returns>WinImage object.</returns> public WimImage this[int ImageIndex] { get { return Images[ImageIndex - 1]; } } /// <summary> /// Indexer for WIM images inside the WIM container, indexed by the image name. /// WIMs created by different processes sometimes contain different information - including the name. /// Some images have their name stored in the Name field, some in the Flags field, and some in the EditionID field. /// We take all of those into account in while searching the WIM. /// </summary> /// <param name="ImageName"></param> /// <returns></returns> public WimImage this[string ImageName] { get { return Images.Where(i => ( i.ImageName.ToUpper() == ImageName.ToUpper() || i.ImageFlags.ToUpper() == ImageName.ToUpper() )) .DefaultIfEmpty(null) .FirstOrDefault<WimImage>(); } } /// <summary> /// Returns the number of images in the WIM container. /// </summary> internal uint ImageCount { get { return NativeMethods.WimGetImageCount(Handle); } } /// <summary> /// Returns an XDocument representation of the XML metadata for the WIM container and associated images. /// </summary> internal XDocument XmlInfo { get { if (null == m_xmlInfo) { StringBuilder builder; uint bytes; if (!NativeMethods.WimGetImageInformation(Handle, out builder, out bytes)) { throw new Win32Exception(); } // Ensure the length of the returned bytes to avoid garbage characters at the end. int charCount = (int)bytes / sizeof(char); if (null != builder) { // Get rid of the unicode file marker at the beginning of the XML. builder.Remove(0, 1); builder.EnsureCapacity(charCount - 1); builder.Length = charCount - 1; // This isn't likely to change while we have the image open, so cache it. m_xmlInfo = XDocument.Parse(builder.ToString().Trim()); } else { m_xmlInfo = null; } } return m_xmlInfo; } } public NativeMethods.WimFileHandle Handle { get; private set; } } public class WimImage { internal XDocument m_xmlInfo; public WimImage( WimFile Container, uint ImageIndex) { if (null == Container) { throw new ArgumentNullException("Container"); } if ((Container.Handle.IsClosed) || (Container.Handle.IsInvalid)) { throw new ArgumentNullException("The handle to the WIM file has already been closed, or is invalid.", "Container"); } if (ImageIndex > Container.ImageCount) { throw new ArgumentOutOfRangeException("ImageIndex", "The index does not exist in the specified WIM file."); } Handle = new NativeMethods.WimImageHandle(Container, ImageIndex); } public enum Architectures : uint { x86 = 0x0, ARM = 0x5, IA64 = 0x6, AMD64 = 0x9 } public void Close() { if ((!Handle.IsClosed) && (!Handle.IsInvalid)) { Handle.Close(); } } public void Apply( string ApplyToPath) { if (string.IsNullOrEmpty(ApplyToPath)) { throw new ArgumentNullException("ApplyToPath"); } ApplyToPath = Path.GetFullPath(ApplyToPath); if (!Directory.Exists(ApplyToPath)) { throw new DirectoryNotFoundException("The WIM cannot be applied because the specified directory was not found."); } if (!NativeMethods.WimApplyImage( this.Handle, ApplyToPath, NativeMethods.WimApplyFlags.WimApplyFlagsNone )) { throw new Win32Exception(); } } public NativeMethods.WimImageHandle Handle { get; private set; } internal XDocument XmlInfo { get { if (null == m_xmlInfo) { StringBuilder builder; uint bytes; if (!NativeMethods.WimGetImageInformation(Handle, out builder, out bytes)) { throw new Win32Exception(); } // Ensure the length of the returned bytes to avoid garbage characters at the end. int charCount = (int)bytes / sizeof(char); if (null != builder) { // Get rid of the unicode file marker at the beginning of the XML. builder.Remove(0, 1); builder.EnsureCapacity(charCount - 1); builder.Length = charCount - 1; // This isn't likely to change while we have the image open, so cache it. m_xmlInfo = XDocument.Parse(builder.ToString().Trim()); } else { m_xmlInfo = null; } } return m_xmlInfo; } } public string ImageIndex { get { return XmlInfo.Element("IMAGE").Attribute("INDEX").Value; } } public string ImageName { get { return XmlInfo.XPathSelectElement("/IMAGE/NAME").Value; } } public string ImageEditionId { get { return XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/EDITIONID").Value; } } public string ImageFlags { get { return XmlInfo.XPathSelectElement("/IMAGE/FLAGS").Value; } } public string ImageProductType { get { return XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/PRODUCTTYPE").Value; } } public string ImageInstallationType { get { return XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/INSTALLATIONTYPE").Value; } } public string ImageDescription { get { return XmlInfo.XPathSelectElement("/IMAGE/DESCRIPTION").Value; } } public ulong ImageSize { get { return ulong.Parse(XmlInfo.XPathSelectElement("/IMAGE/TOTALBYTES").Value); } } public Architectures ImageArchitecture { get { int arch = -1; try { arch = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/ARCH").Value); } catch { } return (Architectures)arch; } } public string ImageDefaultLanguage { get { string lang = null; try { lang = XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/LANGUAGES/DEFAULT").Value; } catch { } return lang; } } public Version ImageVersion { get { int major = 0; int minor = 0; int build = 0; int revision = 0; try { major = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/MAJOR").Value); minor = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/MINOR").Value); build = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/BUILD").Value); revision = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/SPBUILD").Value); } catch { } return (new Version(major, minor, build, revision)); } } public string ImageDisplayName { get { return XmlInfo.XPathSelectElement("/IMAGE/DISPLAYNAME").Value; } } public string ImageDisplayDescription { get { return XmlInfo.XPathSelectElement("/IMAGE/DISPLAYDESCRIPTION").Value; } } } ///<summary> ///Describes the file that is being processed for the ProcessFileEvent. ///</summary> public class DefaultImageEventArgs : EventArgs { ///<summary> ///Default constructor. ///</summary> public DefaultImageEventArgs( IntPtr wideParameter, IntPtr leftParameter, IntPtr userData) { WideParameter = wideParameter; LeftParameter = leftParameter; UserData = userData; } ///<summary> ///wParam ///</summary> public IntPtr WideParameter { get; private set; } ///<summary> ///lParam ///</summary> public IntPtr LeftParameter { get; private set; } ///<summary> ///UserData ///</summary> public IntPtr UserData { get; private set; } } ///<summary> ///Describes the file that is being processed for the ProcessFileEvent. ///</summary> public class ProcessFileEventArgs : EventArgs { ///<summary> ///Default constructor. ///</summary> ///<param name="file">Fully qualified path and file name. For example: c:\file.sys.</param> ///<param name="skipFileFlag">Default is false - skip file and continue. ///Set to true to abort the entire image capture.</param> public ProcessFileEventArgs( string file, IntPtr skipFileFlag) { m_FilePath = file; m_SkipFileFlag = skipFileFlag; } ///<summary> ///Skip file from being imaged. ///</summary> public void SkipFile() { byte[] byteBuffer = { 0 }; int byteBufferSize = byteBuffer.Length; Marshal.Copy(byteBuffer, 0, m_SkipFileFlag, byteBufferSize); } ///<summary> ///Fully qualified path and file name. ///</summary> public string FilePath { get { string stringToReturn = ""; if (m_FilePath != null) { stringToReturn = m_FilePath; } return stringToReturn; } } ///<summary> ///Flag to indicate if the entire image capture should be aborted. ///Default is false - skip file and continue. Setting to true will ///abort the entire image capture. ///</summary> public bool Abort { set { m_Abort = value; } get { return m_Abort; } } private string m_FilePath; private bool m_Abort; private IntPtr m_SkipFileFlag; } // Based on code written by the Hyper-V Test team. /// <summary> /// The Virtual Hard Disk class provides methods for creating and manipulating Virtual Hard Disk files. /// </summary> public class VirtualHardDisk : IDisposable { private SafeFileHandle m_virtualHardDiskHandle = null; private string m_filePath = null; private bool m_isDisposed; private NativeMethods.VirtualStorageDeviceType m_deviceType = NativeMethods.VirtualStorageDeviceType.Unknown; /// <summary> /// Disposal method for Virtual Hard Disk objects. /// </summary> public void Dispose() { this.Dispose(true); GC.SuppressFinalize(this); } /// <summary> /// Disposal method for Virtual Hard Disk objects. /// </summary> /// <param name="disposing"></param> public void Dispose( bool disposing) { // Check to see if Dispose has already been called. if (!this.m_isDisposed) { // If disposing equals true, dispose all managed // and unmanaged resources. if (disposing) { // Dispose managed resources. if (this.DiskIndex != 0) { this.Close(); } } // Call the appropriate methods to clean up // unmanaged resources here. // If disposing is false, // only the following code is executed. // Note disposing has been done. m_isDisposed = true; } } private VirtualHardDisk( SafeFileHandle Handle, string Path, NativeMethods.VirtualStorageDeviceType DeviceType) { if (Handle.IsInvalid || Handle.IsClosed) { throw new InvalidOperationException("The handle to the Virtual Hard Disk is invalid."); } m_virtualHardDiskHandle = Handle; m_filePath = Path; m_deviceType = DeviceType; } /// <summary> /// Destroys a VHD object. /// </summary> ~VirtualHardDisk() { this.Dispose(false); } /// <summary> /// Abbreviated signature of CreateSparseDisk so it's easier to use from WIM2VHD. /// </summary> /// <param name="virtualStorageDeviceType">The type of disk to create, VHD or VHDX.</param> /// <param name="path">The path of the disk to create.</param> /// <param name="size">The maximum size of the disk to create.</param> /// <param name="overwrite">Overwrite the VHD if it already exists.</param> /// <returns>Virtual Hard Disk object</returns> public static VirtualHardDisk CreateSparseDisk( NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType, string path, ulong size, bool overwrite) { return CreateSparseDisk( path, size, overwrite, null, IntPtr.Zero, (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD) ? NativeMethods.DEFAULT_BLOCK_SIZE : 0, virtualStorageDeviceType, NativeMethods.DISK_SECTOR_SIZE); } /// <summary> /// Creates a new sparse (dynamically expanding) virtual hard disk (.vhd). Supports both sync and async modes. /// The VHD image file uses only as much space on the backing store as needed to store the actual data the VHD currently contains. /// </summary> /// <param name="path">The path and name of the VHD to create.</param> /// <param name="size">The size of the VHD to create in bytes. /// When creating this type of VHD, the VHD API does not test for free space on the physical backing store based on the maximum size requested, /// therefore it is possible to successfully create a dynamic VHD with a maximum size larger than the available physical disk free space. /// The maximum size of a dynamic VHD is 2,040 GB. The minimum size is 3 MB.</param> /// <param name="source">Optional path to pre-populate the new virtual disk object with block data from an existing disk /// This path may refer to a VHD or a physical disk. Use NULL if you don't want a source.</param> /// <param name="overwrite">If the VHD exists, setting this parameter to 'True' will delete it and create a new one.</param> /// <param name="overlapped">If not null, the operation runs in async mode</param> /// <param name="blockSizeInBytes">Block size for the VHD.</param> /// <param name="virtualStorageDeviceType">VHD format version (VHD1 or VHD2)</param> /// <param name="sectorSizeInBytes">Sector size for the VHD.</param> /// <returns>Returns a SafeFileHandle corresponding to the virtual hard disk that was created.</returns> /// <exception cref="ArgumentOutOfRangeException">Thrown when an invalid size is specified</exception> /// <exception cref="FileNotFoundException">Thrown when source VHD is not found.</exception> /// <exception cref="SecurityException">Thrown when there was an error while creating the default security descriptor.</exception> /// <exception cref="Win32Exception">Thrown when an error occurred while creating the VHD.</exception> public static VirtualHardDisk CreateSparseDisk( string path, ulong size, bool overwrite, string source, IntPtr overlapped, uint blockSizeInBytes, NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType, uint sectorSizeInBytes) { // Validate the virtualStorageDeviceType if (virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHD && virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHDX) { throw ( new ArgumentOutOfRangeException( "virtualStorageDeviceType", virtualStorageDeviceType, "VirtualStorageDeviceType must be VHD or VHDX." )); } // Validate size. It needs to be a multiple of DISK_SECTOR_SIZE (512)... if ((size % NativeMethods.DISK_SECTOR_SIZE) != 0) { throw ( new ArgumentOutOfRangeException( "size", size, "The size of the virtual disk must be a multiple of 512." )); } if ((!String.IsNullOrEmpty(source)) && (!System.IO.File.Exists(source))) { throw ( new System.IO.FileNotFoundException( "Unable to find the source file.", source )); } if ((overwrite) && (System.IO.File.Exists(path))) { System.IO.File.Delete(path); } NativeMethods.CreateVirtualDiskParameters createParams = new NativeMethods.CreateVirtualDiskParameters(); // Select the correct version. createParams.Version = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD) ? NativeMethods.CreateVirtualDiskVersion.Version1 : NativeMethods.CreateVirtualDiskVersion.Version2; createParams.UniqueId = Guid.NewGuid(); createParams.MaximumSize = size; createParams.BlockSizeInBytes = blockSizeInBytes; createParams.SectorSizeInBytes = sectorSizeInBytes; createParams.ParentPath = null; createParams.SourcePath = source; createParams.OpenFlags = NativeMethods.OpenVirtualDiskFlags.None; createParams.GetInfoOnly = false; createParams.ParentVirtualStorageType = new NativeMethods.VirtualStorageType(); createParams.SourceVirtualStorageType = new NativeMethods.VirtualStorageType(); // // Create and init a security descriptor. // Since we're creating an essentially blank SD to use with CreateVirtualDisk // the VHD will take on the security values from the parent directory. // NativeMethods.SecurityDescriptor securityDescriptor; if (!NativeMethods.InitializeSecurityDescriptor(out securityDescriptor, 1)) { throw ( new SecurityException( "Unable to initialize the security descriptor for the virtual disk." )); } NativeMethods.VirtualStorageType virtualStorageType = new NativeMethods.VirtualStorageType(); virtualStorageType.DeviceId = virtualStorageDeviceType; virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorMicrosoft; SafeFileHandle vhdHandle; uint returnCode = NativeMethods.CreateVirtualDisk( ref virtualStorageType, path, (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD) ? NativeMethods.VirtualDiskAccessMask.All : NativeMethods.VirtualDiskAccessMask.None, ref securityDescriptor, NativeMethods.CreateVirtualDiskFlags.None, 0, ref createParams, overlapped, out vhdHandle); if (NativeMethods.ERROR_SUCCESS != returnCode && NativeMethods.ERROR_IO_PENDING != returnCode) { throw ( new Win32Exception( (int)returnCode )); } return new VirtualHardDisk(vhdHandle, path, virtualStorageDeviceType); } /// <summary> /// Abbreviated signature of CreateFixedDisk so it's easier to use from WIM2VHD. /// </summary> /// <param name="virtualStorageDeviceType">The type of disk to create, VHD or VHDX.</param> /// <param name="path">The path of the disk to create.</param> /// <param name="size">The maximum size of the disk to create.</param> /// <param name="overwrite">Overwrite the VHD if it already exists.</param> /// <returns>Virtual Hard Disk object</returns> public static VirtualHardDisk CreateFixedDisk( NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType, string path, ulong size, bool overwrite) { return CreateFixedDisk( path, size, overwrite, null, IntPtr.Zero, 0, virtualStorageDeviceType, NativeMethods.DISK_SECTOR_SIZE); } /// <summary> /// Creates a fixed-size Virtual Hard Disk. Supports both sync and async modes. This methods always calls the V2 version of the /// CreateVirtualDisk API, and creates VHD2. /// </summary> /// <param name="path">The path and name of the VHD to create.</param> /// <param name="size">The size of the VHD to create in bytes. /// The VHD image file is pre-allocated on the backing store for the maximum size requested. /// The maximum size of a dynamic VHD is 2,040 GB. The minimum size is 3 MB.</param> /// <param name="source">Optional path to pre-populate the new virtual disk object with block data from an existing disk /// This path may refer to a VHD or a physical disk. Use NULL if you don't want a source.</param> /// <param name="overwrite">If the VHD exists, setting this parameter to 'True' will delete it and create a new one.</param> /// <param name="overlapped">If not null, the operation runs in async mode</param> /// <param name="blockSizeInBytes">Block size for the VHD.</param> /// <param name="virtualStorageDeviceType">Virtual storage device type: VHD1 or VHD2.</param> /// <param name="sectorSizeInBytes">Sector size for the VHD.</param> /// <returns>Returns a SafeFileHandle corresponding to the virtual hard disk that was created.</returns> /// <remarks>Creating a fixed disk can be a time consuming process!</remarks> /// <exception cref="ArgumentOutOfRangeException">Thrown when an invalid size or wrong virtual storage device type is specified.</exception> /// <exception cref="FileNotFoundException">Thrown when source VHD is not found.</exception> /// <exception cref="SecurityException">Thrown when there was an error while creating the default security descriptor.</exception> /// <exception cref="Win32Exception">Thrown when an error occurred while creating the VHD.</exception> public static VirtualHardDisk CreateFixedDisk( string path, ulong size, bool overwrite, string source, IntPtr overlapped, uint blockSizeInBytes, NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType, uint sectorSizeInBytes) { // Validate the virtualStorageDeviceType if (virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHD && virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHDX) { throw ( new ArgumentOutOfRangeException( "virtualStorageDeviceType", virtualStorageDeviceType, "VirtualStorageDeviceType must be VHD or VHDX." )); } // Validate size. It needs to be a multiple of DISK_SECTOR_SIZE (512)... if ((size % NativeMethods.DISK_SECTOR_SIZE) != 0) { throw ( new ArgumentOutOfRangeException( "size", size, "The size of the virtual disk must be a multiple of 512." )); } if ((!String.IsNullOrEmpty(source)) && (!System.IO.File.Exists(source))) { throw ( new System.IO.FileNotFoundException( "Unable to find the source file.", source )); } if ((overwrite) && (System.IO.File.Exists(path))) { System.IO.File.Delete(path); } NativeMethods.CreateVirtualDiskParameters createParams = new NativeMethods.CreateVirtualDiskParameters(); // Select the correct version. createParams.Version = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD) ? NativeMethods.CreateVirtualDiskVersion.Version1 : NativeMethods.CreateVirtualDiskVersion.Version2; createParams.UniqueId = Guid.NewGuid(); createParams.MaximumSize = size; createParams.BlockSizeInBytes = blockSizeInBytes; createParams.SectorSizeInBytes = sectorSizeInBytes; createParams.ParentPath = null; createParams.SourcePath = source; createParams.OpenFlags = NativeMethods.OpenVirtualDiskFlags.None; createParams.GetInfoOnly = false; createParams.ParentVirtualStorageType = new NativeMethods.VirtualStorageType(); createParams.SourceVirtualStorageType = new NativeMethods.VirtualStorageType(); // // Create and init a security descriptor. // Since we're creating an essentially blank SD to use with CreateVirtualDisk // the VHD will take on the security values from the parent directory. // NativeMethods.SecurityDescriptor securityDescriptor; if (!NativeMethods.InitializeSecurityDescriptor(out securityDescriptor, 1)) { throw ( new SecurityException( "Unable to initialize the security descriptor for the virtual disk." )); } NativeMethods.VirtualStorageType virtualStorageType = new NativeMethods.VirtualStorageType(); virtualStorageType.DeviceId = virtualStorageDeviceType; virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorMicrosoft; SafeFileHandle vhdHandle; uint returnCode = NativeMethods.CreateVirtualDisk( ref virtualStorageType, path, (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD) ? NativeMethods.VirtualDiskAccessMask.All : NativeMethods.VirtualDiskAccessMask.None, ref securityDescriptor, NativeMethods.CreateVirtualDiskFlags.FullPhysicalAllocation, 0, ref createParams, overlapped, out vhdHandle); if (NativeMethods.ERROR_SUCCESS != returnCode && NativeMethods.ERROR_IO_PENDING != returnCode) { throw ( new Win32Exception( (int)returnCode )); } return new VirtualHardDisk(vhdHandle, path, virtualStorageDeviceType); } /// <summary> /// Opens a virtual hard disk (VHD) using the V2 of OpenVirtualDisk Win32 API for use, allowing you to explicitly specify OpenVirtualDiskFlags, /// Read/Write depth, and Access Mask information. /// </summary> /// <param name="path">The path and name of the Virtual Hard Disk file to open.</param> /// <param name="accessMask">Contains the bit mask for specifying access rights to a virtual hard disk (VHD). Default is All.</param> /// <param name="readWriteDepth">Indicates the number of stores, beginning with the child, of the backing store chain to open as read/write. /// The remaining stores in the differencing chain will be opened read-only. This is necessary for merge operations to succeed. Default is 0x1.</param> /// <param name="flags">An OpenVirtualDiskFlags object to modify the way the Virtual Hard Disk is opened. Default is Unknown.</param> /// <param name="virtualStorageDeviceType">VHD Format Version (VHD1 or VHD2)</param> /// <returns>VirtualHardDisk object</returns> /// <exception cref="FileNotFoundException">Thrown if the VHD at path is not found.</exception> /// <exception cref="Win32Exception">Thrown if an error occurred while opening the VHD.</exception> public static VirtualHardDisk Open( string path, NativeMethods.VirtualDiskAccessMask accessMask, uint readWriteDepth, NativeMethods.OpenVirtualDiskFlags flags, NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType) { if (!File.Exists(path)) { throw new FileNotFoundException("The specified VHD was not found. Please check your path and try again.", path); } NativeMethods.OpenVirtualDiskParameters openParams = new NativeMethods.OpenVirtualDiskParameters(); // Select the correct version. openParams.Version = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD) ? NativeMethods.OpenVirtualDiskVersion.Version1 : NativeMethods.OpenVirtualDiskVersion.Version2; openParams.GetInfoOnly = false; NativeMethods.VirtualStorageType virtualStorageType = new NativeMethods.VirtualStorageType(); virtualStorageType.DeviceId = virtualStorageDeviceType; virtualStorageType.VendorId = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.Unknown) ? virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorUnknown : virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorMicrosoft; SafeFileHandle vhdHandle; uint returnCode = NativeMethods.OpenVirtualDisk( ref virtualStorageType, path, accessMask, flags, ref openParams, out vhdHandle); if (NativeMethods.ERROR_SUCCESS != returnCode) { throw new Win32Exception((int)returnCode); } return new VirtualHardDisk(vhdHandle, path, virtualStorageDeviceType); } /// <summary> /// Retrieves a collection of drive letters that are currently available on the system. /// </summary> /// <remarks>Drives A and B are not included in the collection, even if they are available.</remarks> /// <returns>A collection of drive letters that are currently available on the system.</returns> public static ReadOnlyCollection<Char> GetAvailableDriveLetters() { List<Char> availableDrives = new List<Char>(); for (int i = (byte)'C'; i <= (byte)'Z'; i++) { availableDrives.Add((char)i); } foreach (string drive in System.Environment.GetLogicalDrives()) { availableDrives.Remove(drive.ToUpper(CultureInfo.InvariantCulture)[0]); } return new ReadOnlyCollection<char>(availableDrives); } /// <summary> /// Gets the first available drive letter on the current system. /// </summary> /// <remarks>Drives A and B will not be returned, even if they are available.</remarks> /// <returns>Char representing the first available drive letter.</returns> public static char GetFirstAvailableDriveLetter() { return GetAvailableDriveLetters()[0]; } /// <summary> /// Creates a NativeOverlapped object, initializes its EventHandle property, and pins the object to the memory. /// This overlapped objects are useful when executing VHD meta-ops in async mode. /// </summary> /// <returns>Returns the GCHandle for the pinned overlapped structure</returns> public static GCHandle CreatePinnedOverlappedObject() { NativeOverlapped overlapped = new NativeOverlapped(); overlapped.EventHandle = NativeMethods.CreateEvent(IntPtr.Zero, true, false, null); GCHandle handleForOverllapped = GCHandle.Alloc(overlapped, GCHandleType.Pinned); return handleForOverllapped; } /// <summary> /// GetVirtualDiskOperationProgress API allows getting progress info for the async virtual disk operations (ie. Online Mirror) /// </summary> /// <param name="progress"></param> /// <param name="overlapped"></param> /// <returns></returns> /// <exception cref="Win32Exception">Thrown when an error occurred while mirroring the VHD.</exception> public uint GetVirtualDiskOperationProgress( ref NativeMethods.VirtualDiskProgress progress, IntPtr overlapped) { uint returnCode = NativeMethods.GetVirtualDiskOperationProgress( this.m_virtualHardDiskHandle, overlapped, ref progress); return returnCode; } /// <summary> /// Closes all open handles to the Virtual Hard Disk object. /// If the VHD is currently attached, and the PermanentLifetime was not specified, this operation will detach it. /// </summary> public void Close() { m_virtualHardDiskHandle.Close(); } /// <summary> /// Attaches a virtual hard disk (VHD) by locating an appropriate VHD provider to accomplish the attachment. /// </summary> /// <param name="attachVirtualDiskFlags"> /// A combination of values from the attachVirtualDiskFlags enumeration which will dictate how the behavior of the VHD once mounted. /// </param> /// <exception cref="Win32Exception">Thrown when an error occurred while attaching the VHD.</exception> /// <exception cref="SecurityException">Thrown when an error occurred while creating the default security descriptor.</exception> public void Attach( NativeMethods.AttachVirtualDiskFlags attachVirtualDiskFlags) { if (!this.IsAttached) { // Get the current disk index. We need it later. int diskIndex = this.DiskIndex; NativeMethods.AttachVirtualDiskParameters attachParameters = new NativeMethods.AttachVirtualDiskParameters(); // For attach, the correct version is always Version1 for Win7 and Win8. attachParameters.Version = NativeMethods.AttachVirtualDiskVersion.Version1; attachParameters.Reserved = 0; NativeMethods.SecurityDescriptor securityDescriptor; if (!NativeMethods.InitializeSecurityDescriptor(out securityDescriptor, 1)) { throw (new SecurityException("Unable to initialize the security descriptor for the virtual disk.")); } uint returnCode = NativeMethods.AttachVirtualDisk( m_virtualHardDiskHandle, ref securityDescriptor, attachVirtualDiskFlags, 0, ref attachParameters, IntPtr.Zero); switch (returnCode) { case NativeMethods.ERROR_SUCCESS: break; default: throw new Win32Exception((int)returnCode); } // There's apparently a bit of a timing issue here on some systems. // If the disk index isn't updated, keep checking once per second for five seconds. // If it's not updated after that, it's probably not our fault. short attempts = 5; while ((attempts-- >= 0) && (diskIndex == this.DiskIndex)) { System.Threading.Thread.Sleep(1000); } } } /// <summary> /// Attaches a virtual hard disk (VHD) by locating an appropriate VHD provider to accomplish the attachment. /// </summary> /// <remarks> /// This method attaches the VHD with no flags. /// </remarks> /// <exception cref="Win32Exception">Thrown when an error occurred while attaching the VHD.</exception> /// <exception cref="SecurityException">Thrown when an error occurred while creating the default security descriptor.</exception> public void Attach() { this.Attach(NativeMethods.AttachVirtualDiskFlags.None); } /// <summary> /// Unsurfaces (detaches) a virtual hard disk (VHD) by locating an appropriate VHD provider to accomplish the operation. /// </summary> public void Detach() { if (this.IsAttached) { uint returnCode = NativeMethods.DetachVirtualDisk( m_virtualHardDiskHandle, NativeMethods.DetachVirtualDiskFlag.None, 0); switch (returnCode) { case NativeMethods.ERROR_NOT_FOUND: // There's nothing to do here. The device wasn't found, which means there's a // really good chance that it wasn't attached to begin with. // And, since we were asked to detach it anyway, we can assume that the system // is already in the desired state. case NativeMethods.ERROR_SUCCESS: break; default: throw new Win32Exception((int)returnCode); } } } /// <summary> /// Reduces the size of the virtual hard disk (VHD) backing store file. Supports both sync and async modes. /// </summary> /// <param name="overlapped">If not null, the operation runs in async mode</param> public uint Compact(IntPtr overlapped) { return this.Compact( overlapped, NativeMethods.CompactVirtualDiskFlags.None); } /// <summary> /// Reduces the size of the virtual hard disk (VHD) backing store file. Supports both sync and async modes. /// </summary> /// <param name="overlapped">If not null, the operation runs in async mode</param> /// <param name="flags">Flags for Compact operation</param> public uint Compact( IntPtr overlapped, NativeMethods.CompactVirtualDiskFlags flags) { NativeMethods.CompactVirtualDiskParameters compactParams = new NativeMethods.CompactVirtualDiskParameters(); compactParams.Version = NativeMethods.CompactVirtualDiskVersion.Version1; uint returnCode = NativeMethods.CompactVirtualDisk( m_virtualHardDiskHandle, flags, ref compactParams, overlapped); if ((overlapped == IntPtr.Zero && NativeMethods.ERROR_SUCCESS != returnCode) || (overlapped != IntPtr.Zero && NativeMethods.ERROR_IO_PENDING != returnCode)) { throw new Win32Exception((int)returnCode); } return returnCode; } /// <summary> /// The SafeFileHandle object for the opened VHD. /// </summary> public SafeFileHandle VirtualHardDiskHandle { get { return m_virtualHardDiskHandle; } } /// <summary> /// Indicates the index of the disk when attached. /// If the virtual hard disk is not currently attached, -1 will be returned. /// </summary> public int DiskIndex { get { string path = PhysicalPath; if (null != path) { Match match = Regex.Match(path, @"\d+$"); // look for the last digits in the path return System.Convert.ToInt32(match.Value, CultureInfo.InvariantCulture); } else { return -1; } } } /// <summary> /// Indicates whether the current Virtual Hard Disk is attached to the system. /// </summary> public bool IsAttached { get { return (this.DiskIndex != -1); } } /// <summary> /// Retrieves the path to the physical device object that contains a virtual hard disk (VHD), if the VHD is attached. /// If it is not attached, NULL will be returned. /// </summary> public string PhysicalPath { get { uint pathSize = 1024; // Isn't MAX_PATH 255? StringBuilder path = new StringBuilder((int)pathSize); uint returnCode = 0; returnCode = NativeMethods.GetVirtualDiskPhysicalPath( m_virtualHardDiskHandle, ref pathSize, path); if (NativeMethods.ERROR_ERROR_DEV_NOT_EXIST == returnCode) { return null; } else if (NativeMethods.ERROR_SUCCESS == returnCode) { return path.ToString(); } else { throw new Win32Exception((int)returnCode); } } } } } "@ Function Mount-RegistryHive { [CmdletBinding()] param( [Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)] [System.IO.FileInfo] [ValidateNotNullOrEmpty()] [ValidateScript({ $_.Exists })] $Hive ) $mountKey = [System.Guid]::NewGuid().ToString() $regPath = "REG.EXE" if (Test-Path HKLM:\$mountKey) { throw "The registry path already exists. I should just regenerate it, but I'm lazy." } $regArgs = ( "LOAD", "HKLM\$mountKey", $Hive.Fullname ) try { Run-Executable -Executable $regPath -Arguments $regArgs } catch { throw } $global:mountedHive = $mountKey return $mountKey } Function Dismount-RegistryHive { [CmdletBinding()] param( [Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)] [string] [ValidateNotNullOrEmpty()] $HiveMountPoint ) $regPath = "REG.EXE" $regArgs = ( "UNLOAD", "HKLM\$($HiveMountPoint)" ) Run-Executable -Executable $regPath -Arguments $regArgs $global:mountedHive = $null } Function Apply-BCDStoreChanges { [CmdletBinding()] param( [Parameter(Mandatory = $true)] [string] [ValidateNotNullOrEmpty()] $BcdStoreFile, [Parameter()] [string] [ValidateNotNullOrEmpty()] [ValidateScript({ ($_ -eq $PARTITION_STYLE_MBR) -or ($_ -eq $PARTITION_STYLE_GPT) })] $PartitionStyle = $PARTITION_STYLE_MBR, [Parameter()] [UInt64] [ValidateScript({ $_ -ge 0 })] $DiskSignature, [Parameter()] [UInt64] [ValidateScript({ $_ -ge 0 })] $PartitionOffset ) $BOOTMGR_ID = "{9DEA862C-5CDD-4E70-ACC1-F32B344D4795}" $DEFAULT_TYPE = 0x23000003 $APPLICATION_DEVICE_TYPE = 0x11000001 $OS_DEVICE_TYPE = 0x21000001 Write-W2VInfo "Opening $($BcdStoreFile) for configuration..." Write-W2VTrace "Partition Style : $PartitionStyle" Write-W2VTrace "Disk Signature : $DiskSignature" Write-W2VTrace "Partition Offset: $PartitionOffset" $conn = New-Object Management.ConnectionOptions $scope = New-Object Management.ManagementScope -ArgumentList "\\.\ROOT\WMI", $conn $scope.Connect() $path = New-Object Management.ManagementPath ` -ArgumentList "\\.\ROOT\WMI:BCDObject.Id=`"$($BOOTMGR_ID)`",StoreFilePath=`"$($BcdStoreFile.Replace('\', '\\'))`"" $options = New-Object Management.ObjectGetOptions $bootMgr = New-Object Management.ManagementObject -ArgumentList $scope, $path, $options try { $bootMgr.Get() } catch { throw "Could not get the BootMgr object from the Virtual Disks BCDStore." } Write-W2VTrace "Setting Qualified Partition Device Element for Virtual Disk boot..." $ret = $bootMgr.SetQualifiedPartitionDeviceElement($APPLICATION_DEVICE_TYPE, $PartitionStyle, $DiskSignature, $PartitionOffset) if (!$ret.ReturnValue) { throw "Unable to set Qualified Partition Device Element in Virtual Disks BCDStore." } Write-W2VTrace "Getting the default boot entry..." $defaultBootEntryId = ($bootMgr.GetElement($DEFAULT_TYPE)).Element.Id Write-W2VTrace "Getting the OS Loader..." $path = New-Object Management.ManagementPath ` -ArgumentList "\\.\ROOT\WMI:BCDObject.Id=`"$($defaultBootEntryId)`",StoreFilePath=`"$($BcdStoreFile.Replace('\', '\\'))`"" $osLoader= New-Object Management.ManagementObject -ArgumentList $scope, $path, $options try { $osLoader.Get() } catch { throw "Could not get the OS Loader..." } Write-W2VTrace "Setting Qualified Partition Device Element in the OS Loader Application..." $ret = $osLoader.SetQualifiedPartitionDeviceElement($APPLICATION_DEVICE_TYPE, $PartitionStyle, $DiskSignature, $PartitionOffset) if (!$ret.ReturnValue) { throw "Could not set Qualified Partition Device Element in the OS Loader Application." } Write-W2VTrace "Setting Qualified Partition Device Element in the OS Loader Device..." $ret = $osLoader.SetQualifiedPartitionDeviceElement($OS_DEVICE_TYPE, $PartitionStyle, $DiskSignature, $PartitionOffset) if (!$ret.ReturnValue) { throw "Could not set Qualified Partition Device Element in the OS Loader Device." } Write-W2VInfo "BCD configuration complete. Moving on..." } function Test-Admin { [CmdletBinding()] param() $currentUser = New-Object Security.Principal.WindowsPrincipal $([Security.Principal.WindowsIdentity]::GetCurrent()) $isAdmin = $currentUser.IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator) Write-W2VTrace "isUserAdmin? $isAdmin" return $isAdmin } function Test-WindowsVersion { $os = Get-WmiObject -Class Win32_OperatingSystem $isWin8 = (($os.Version -ge 6.2) -and ($os.BuildNumber -ge $lowestSupportedBuild)) Write-W2VTrace "isWindows8? $isWin8" return $isWin8 } function Write-W2VInfo { [CmdletBinding()] param( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [string] [ValidateNotNullOrEmpty()] $text ) Write-Host "INFO : $($text)" -ForegroundColor White } function Write-W2VTrace { [CmdletBinding()] param( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [string] [ValidateNotNullOrEmpty()] $text ) Write-Verbose $text } function Write-W2VError { [CmdletBinding()] param( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [string] [ValidateNotNullOrEmpty()] $text ) Write-Host "ERROR : $($text)" -ForegroundColor Red } function Write-W2VWarn { [CmdletBinding()] param( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [string] [ValidateNotNullOrEmpty()] $text ) Write-Host "WARN : $($text)" -ForegroundColor Yellow } function Run-Executable { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] [ValidateNotNullOrEmpty()] $Executable, [Parameter(Mandatory=$true)] [string[]] [ValidateNotNullOrEmpty()] $Arguments, [Parameter()] [int] [ValidateNotNullOrEmpty()] $SuccessfulErrorCode = 0 ) Write-W2VTrace "Running $Executable $Arguments" $ret = Start-Process ` -FilePath $Executable ` -ArgumentList $Arguments ` -NoNewWindow ` -Wait ` -RedirectStandardOutput "$($env:temp)\$($scriptName)\$($sessionKey)\$($Executable)-StandardOutput.txt" ` -RedirectStandardError "$($env:temp)\$($scriptName)\$($sessionKey)\$($Executable)-StandardError.txt" ` -Passthru Write-W2VTrace "Return code was $($ret.ExitCode)." if ($ret.ExitCode -ne $SuccessfulErrorCode) { throw "$Executable failed with code $($ret.ExitCode)!" } } Function Test-IsNetworkLocation { [CmdletBinding()] param( [Parameter(ValueFromPipeLine = $true)] [string] [ValidateNotNullOrEmpty()] $Path ) $result = $false if ([bool]([URI]$Path).IsUNC) { $result = $true } else { $driveInfo = [IO.DriveInfo]((Resolve-Path $Path).Path) if ($driveInfo.DriveType -eq "Network") { $result = $true } } return $result } } Process { $openWim = $null $openVhd = $null $openIso = $null $openImage = $null $vhdFinalName = $null $vhdFinalPath = $null $mountedHive = $null $isoPath = $null Write-Host $header try { if (Test-Path $logFolder) { $null = rd $logFolder -Force -Recurse } $null = md $logFolder -Force try { $null = Start-Transcript -Path (Join-Path $logFolder "Convert-WindowsImageTranscript.txt") -Force -ErrorAction SilentlyContinue $transcripting = $true } catch { Write-W2VWarn "Transcription is already running. No Convert-WindowsImage-specific transcript will be created." $transcripting = $false } Add-Type -TypeDefinition $code -ReferencedAssemblies "System.Xml","System.Linq","System.Xml.Linq" if (!(Test-Admin)) { throw "Images can only be applied by an administrator. Please launch PowerShell elevated and run this script again." } if (![string]::IsNullOrEmpty($UnattendPath)) { $UnattendPath = (Resolve-Path $UnattendPath).Path } if ($ShowUI) { Write-W2VInfo "Launching UI..." Add-Type -AssemblyName System.Drawing,System.Windows.Forms $frmMain = New-Object System.Windows.Forms.Form $groupBox4 = New-Object System.Windows.Forms.GroupBox $btnGo = New-Object System.Windows.Forms.Button $groupBox3 = New-Object System.Windows.Forms.GroupBox $txtVhdName = New-Object System.Windows.Forms.TextBox $label6 = New-Object System.Windows.Forms.Label $btnWrkBrowse = New-Object System.Windows.Forms.Button $cmbVhdSizeUnit = New-Object System.Windows.Forms.ComboBox $numVhdSize = New-Object System.Windows.Forms.NumericUpDown $cmbVhdFormat = New-Object System.Windows.Forms.ComboBox $label5 = New-Object System.Windows.Forms.Label $txtWorkingDirectory = New-Object System.Windows.Forms.TextBox $cmbVhdType = New-Object System.Windows.Forms.ComboBox $label4 = New-Object System.Windows.Forms.Label $label3 = New-Object System.Windows.Forms.Label $label2 = New-Object System.Windows.Forms.Label $label7 = New-Object System.Windows.Forms.Label $txtUnattendFile = New-Object System.Windows.Forms.TextBox $btnUnattendBrowse = New-Object System.Windows.Forms.Button $groupBox2 = New-Object System.Windows.Forms.GroupBox $cmbSkuList = New-Object System.Windows.Forms.ComboBox $label1 = New-Object System.Windows.Forms.Label $groupBox1 = New-Object System.Windows.Forms.GroupBox $txtSourcePath = New-Object System.Windows.Forms.TextBox $btnBrowseWim = New-Object System.Windows.Forms.Button $openFileDialog1 = New-Object System.Windows.Forms.OpenFileDialog $openFolderDialog1 = New-Object System.Windows.Forms.FolderBrowserDialog $InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState $btnGo_OnClick = { $frmMain.Close() } $btnWrkBrowse_OnClick = { $openFolderDialog1.RootFolder = "Desktop" $openFolderDialog1.Description = "Select the folder you'd like your VHD(X) to be created in." $openFolderDialog1.SelectedPath = $WorkingDirectory $ret = $openFolderDialog1.ShowDialog() if ($ret -ilike "ok") { $WorkingDirectory = $txtWorkingDirectory = $openFolderDialog1.SelectedPath Write-W2VInfo "Selected Working Directory is $WorkingDirectory..." } } $btnUnattendBrowse_OnClick = { $openFileDialog1.InitialDirectory = $pwd $openFileDialog1.Filter = "XML files (*.xml)|*.XML|All files (*.*)|*.*" $openFileDialog1.FilterIndex = 1 $openFileDialog1.CheckFileExists = $true $openFileDialog1.CheckPathExists = $true $openFileDialog1.FileName = $null $openFileDialog1.ShowHelp = $false $openFileDialog1.Title = "Select an unattend file..." $ret = $openFileDialog1.ShowDialog() if ($ret -ilike "ok") { $UnattendPath = $txtUnattendFile.Text = $openFileDialog1.FileName } } $btnBrowseWim_OnClick = { $openFileDialog1.InitialDirectory = $pwd $openFileDialog1.Filter = "All compatible files (*.ISO, *.WIM)|*.ISO;*.WIM|All files (*.*)|*.*" $openFileDialog1.FilterIndex = 1 $openFileDialog1.CheckFileExists = $true $openFileDialog1.CheckPathExists = $true $openFileDialog1.FileName = $null $openFileDialog1.ShowHelp = $false $openFileDialog1.Title = "Select a source file..." $ret = $openFileDialog1.ShowDialog() if ($ret -ilike "ok") { if (([IO.FileInfo]$openFileDialog1.FileName).Extension -ilike ".iso") { if (Test-IsNetworkLocation $openFileDialog1.FileName) { Write-W2VInfo "Copying ISO $(Split-Path $openFileDialog1.FileName -Leaf) to temp folder..." Write-W2VWarn "The UI may become non-responsive while this copy takes place..." Copy-Item -Path $openFileDialog1.FileName -Destination $env:Temp -Force $openFileDialog1.FileName = "$($env:Temp)\$(Split-Path $openFileDialog1.FileName -Leaf)" } $txtSourcePath.Text = $isoPath = (Resolve-Path $openFileDialog1.FileName).Path Write-W2VInfo "Opening ISO $(Split-Path $isoPath -Leaf)..." $openIso = Mount-DiskImage -ImagePath $isoPath -StorageType ISO -PassThru $openIso = Get-DiskImage -ImagePath $isoPath $driveLetter = ($openIso | Get-Volume).DriveLetter $script:SourcePath = "$($driveLetter):\sources\install.wim" Write-W2VInfo "Looking for $($SourcePath)..." if (!(Test-Path $SourcePath)) { throw "The specified ISO does not appear to be valid Windows installation media." } } else { $txtSourcePath.Text = $script:SourcePath = $openFileDialog1.FileName } if (Test-IsNetworkLocation $SourcePath) { Write-W2VInfo "Copying WIM $(Split-Path $SourcePath -Leaf) to temp folder..." Write-W2VWarn "The UI may become non-responsive while this copy takes place..." Copy-Item -Path $SourcePath -Destination $env:Temp -Force $txtSourcePath.Text = $script:SourcePath = "$($env:Temp)\$(Split-Path $SourcePath -Leaf)" } $script:SourcePath = (Resolve-Path $SourcePath).Path Write-W2VInfo "Scanning WIM metadata..." $tempOpenWim = $null try { $tempOpenWim = New-Object WIM2VHD.WimFile $SourcePath if ($tempOpenWim.ImageNames.Contains("Windows Longhorn Client") -or $tempOpenWim.ImageNames.Contains("Windows Longhorn Server") -or $tempOpenWim.ImageNames.Contains("Windows Longhorn Server Core")) { [Windows.Forms.MessageBox]::Show( "Convert-WindowsImage cannot run against unstaged builds. Please try again with a staged build.", "WIM is incompatible!", "OK", "Error" ) return } else { $tempOpenWim.Images | %{ $cmbSkuList.Items.Add($_.ImageFlags) } $cmbSkuList.SelectedIndex = 0 } } catch { throw "Unable to load WIM metadata!" } finally { $tempOpenWim.Close() Write-W2VTrace "Closing WIM metadata..." } } } $OnLoadForm_StateCorrection = { $frmMain.WindowState = $InitialFormWindowState } $unit = $null switch ([Math]::Round($SizeBytes.ToString().Length / 3)) { 3 { $unit = "MB"; break } 4 { $unit = "GB"; break } 5 { $unit = "TB"; break } default { $unit = ""; break } } $quantity = Invoke-Expression -Command "$($SizeBytes) / 1$($unit)" $frmMain.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 579 $System_Drawing_Size.Width = 512 $frmMain.ClientSize = $System_Drawing_Size $frmMain.Font = New-Object System.Drawing.Font("Segoe UI",10,0,3,1) $frmMain.FormBorderStyle = 1 $frmMain.MaximizeBox = $False $frmMain.MinimizeBox = $False $frmMain.Name = "frmMain" $frmMain.StartPosition = 1 $frmMain.Text = "Convert-WindowsImage UI" $groupBox4.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 10 $System_Drawing_Point.Y = 498 $groupBox4.Location = $System_Drawing_Point $groupBox4.Name = "groupBox4" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 69 $System_Drawing_Size.Width = 489 $groupBox4.Size = $System_Drawing_Size $groupBox4.TabIndex = 8 $groupBox4.TabStop = $False $groupBox4.Text = "4. Make the VHD!" $frmMain.Controls.Add($groupBox4) $btnGo.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 39 $System_Drawing_Point.Y = 24 $btnGo.Location = $System_Drawing_Point $btnGo.Name = "btnGo" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 33 $System_Drawing_Size.Width = 415 $btnGo.Size = $System_Drawing_Size $btnGo.TabIndex = 0 $btnGo.Text = "&Make my VHD" $btnGo.UseVisualStyleBackColor = $True $btnGo.DialogResult = "OK" $btnGo.add_Click($btnGo_OnClick) $groupBox4.Controls.Add($btnGo) $frmMain.AcceptButton = $btnGo $groupBox3.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 10 $System_Drawing_Point.Y = 243 $groupBox3.Location = $System_Drawing_Point $groupBox3.Name = "groupBox3" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 245 $System_Drawing_Size.Width = 489 $groupBox3.Size = $System_Drawing_Size $groupBox3.TabIndex = 7 $groupBox3.TabStop = $False $groupBox3.Text = "3. Choose configuration options" $frmMain.Controls.Add($groupBox3) $txtVhdName.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 150 $txtVhdName.Location = $System_Drawing_Point $txtVhdName.Name = "txtVhdName" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 418 $txtVhdName.Size = $System_Drawing_Size $txtVhdName.TabIndex = 10 $groupBox3.Controls.Add($txtVhdName) $txtUnattendFile.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 198 $txtUnattendFile.Location = $System_Drawing_Point $txtUnattendFile.Name = "txtUnattendFile" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 418 $txtUnattendFile.Size = $System_Drawing_Size $txtUnattendFile.TabIndex = 11 $groupBox3.Controls.Add($txtUnattendFile) $label7.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 23 $System_Drawing_Point.Y = 180 $label7.Location = $System_Drawing_Point $label7.Name = "label7" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 175 $label7.Size = $System_Drawing_Size $label7.Text = "Unattend File (Optional)" $groupBox3.Controls.Add($label7) $label6.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 23 $System_Drawing_Point.Y = 132 $label6.Location = $System_Drawing_Point $label6.Name = "label6" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 175 $label6.Size = $System_Drawing_Size $label6.Text = "VHD Name (Optional)" $groupBox3.Controls.Add($label6) $btnUnattendBrowse.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 449 $System_Drawing_Point.Y = 199 $btnUnattendBrowse.Location = $System_Drawing_Point $btnUnattendBrowse.Name = "btnUnattendBrowse" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 27 $btnUnattendBrowse.Size = $System_Drawing_Size $btnUnattendBrowse.TabIndex = 9 $btnUnattendBrowse.Text = "..." $btnUnattendBrowse.UseVisualStyleBackColor = $True $btnUnattendBrowse.add_Click($btnUnattendBrowse_OnClick) $groupBox3.Controls.Add($btnUnattendBrowse) $btnWrkBrowse.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 449 $System_Drawing_Point.Y = 98 $btnWrkBrowse.Location = $System_Drawing_Point $btnWrkBrowse.Name = "btnWrkBrowse" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 27 $btnWrkBrowse.Size = $System_Drawing_Size $btnWrkBrowse.TabIndex = 9 $btnWrkBrowse.Text = "..." $btnWrkBrowse.UseVisualStyleBackColor = $True $btnWrkBrowse.add_Click($btnWrkBrowse_OnClick) $groupBox3.Controls.Add($btnWrkBrowse) $cmbVhdSizeUnit.DataBindings.DefaultDataSourceUpdateMode = 0 $cmbVhdSizeUnit.FormattingEnabled = $True $cmbVhdSizeUnit.Items.Add("MB") | Out-Null $cmbVhdSizeUnit.Items.Add("GB") | Out-Null $cmbVhdSizeUnit.Items.Add("TB") | Out-Null $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 409 $System_Drawing_Point.Y = 42 $cmbVhdSizeUnit.Location = $System_Drawing_Point $cmbVhdSizeUnit.Name = "cmbVhdSizeUnit" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 67 $cmbVhdSizeUnit.Size = $System_Drawing_Size $cmbVhdSizeUnit.TabIndex = 5 $cmbVhdSizeUnit.Text = $unit $groupBox3.Controls.Add($cmbVhdSizeUnit) $numVhdSize.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 340 $System_Drawing_Point.Y = 42 $numVhdSize.Location = $System_Drawing_Point $numVhdSize.Name = "numVhdSize" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 63 $numVhdSize.Size = $System_Drawing_Size $numVhdSize.TabIndex = 4 $numVhdSize.Value = $quantity $groupBox3.Controls.Add($numVhdSize) $cmbVhdFormat.DataBindings.DefaultDataSourceUpdateMode = 0 $cmbVhdFormat.FormattingEnabled = $True $cmbVhdFormat.Items.Add("VHD") | Out-Null $cmbVhdFormat.Items.Add("VHDX") | Out-Null $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 42 $cmbVhdFormat.Location = $System_Drawing_Point $cmbVhdFormat.Name = "cmbVhdFormat" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 136 $cmbVhdFormat.Size = $System_Drawing_Size $cmbVhdFormat.TabIndex = 0 $cmbVhdFormat.Text = $VHDFormat $groupBox3.Controls.Add($cmbVhdFormat) $label5.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 23 $System_Drawing_Point.Y = 76 $label5.Location = $System_Drawing_Point $label5.Name = "label5" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 264 $label5.Size = $System_Drawing_Size $label5.TabIndex = 8 $label5.Text = "Working Directory" $groupBox3.Controls.Add($label5) $txtWorkingDirectory.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 99 $txtWorkingDirectory.Location = $System_Drawing_Point $txtWorkingDirectory.Name = "txtWorkingDirectory" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 418 $txtWorkingDirectory.Size = $System_Drawing_Size $txtWorkingDirectory.TabIndex = 7 $txtWorkingDirectory.Text = $WorkingDirectory $groupBox3.Controls.Add($txtWorkingDirectory) $cmbVhdType.DataBindings.DefaultDataSourceUpdateMode = 0 $cmbVhdType.FormattingEnabled = $True $cmbVhdType.Items.Add("Dynamic") | Out-Null $cmbVhdType.Items.Add("Fixed") | Out-Null $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 176 $System_Drawing_Point.Y = 42 $cmbVhdType.Location = $System_Drawing_Point $cmbVhdType.Name = "cmbVhdType" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 144 $cmbVhdType.Size = $System_Drawing_Size $cmbVhdType.TabIndex = 2 $cmbVhdType.Text = $VHDType $groupBox3.Controls.Add($cmbVhdType) $label4.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 340 $System_Drawing_Point.Y = 21 $label4.Location = $System_Drawing_Point $label4.Name = "label4" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 27 $System_Drawing_Size.Width = 86 $label4.Size = $System_Drawing_Size $label4.TabIndex = 6 $label4.Text = "VHD Size" $groupBox3.Controls.Add($label4) $label3.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 176 $System_Drawing_Point.Y = 21 $label3.Location = $System_Drawing_Point $label3.Name = "label3" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 27 $System_Drawing_Size.Width = 92 $label3.Size = $System_Drawing_Size $label3.TabIndex = 3 $label3.Text = "VHD Type" $groupBox3.Controls.Add($label3) $label2.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 21 $label2.Location = $System_Drawing_Point $label2.Name = "label2" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 30 $System_Drawing_Size.Width = 118 $label2.Size = $System_Drawing_Size $label2.TabIndex = 1 $label2.Text = "VHD Format" $groupBox3.Controls.Add($label2) $groupBox2.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 10 $System_Drawing_Point.Y = 169 $groupBox2.Location = $System_Drawing_Point $groupBox2.Name = "groupBox2" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 68 $System_Drawing_Size.Width = 490 $groupBox2.Size = $System_Drawing_Size $groupBox2.TabIndex = 6 $groupBox2.TabStop = $False $groupBox2.Text = "2. Choose a SKU from the list" $frmMain.Controls.Add($groupBox2) $cmbSkuList.DataBindings.DefaultDataSourceUpdateMode = 0 $cmbSkuList.FormattingEnabled = $True $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 24 $cmbSkuList.Location = $System_Drawing_Point $cmbSkuList.Name = "cmbSkuList" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 452 $cmbSkuList.Size = $System_Drawing_Size $cmbSkuList.TabIndex = 2 $groupBox2.Controls.Add($cmbSkuList) $label1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 23 $System_Drawing_Point.Y = 21 $label1.Location = $System_Drawing_Point $label1.Name = "label1" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 71 $System_Drawing_Size.Width = 464 $label1.Size = $System_Drawing_Size $label1.TabIndex = 5 $label1.Text = $uiHeader $frmMain.Controls.Add($label1) $groupBox1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 10 $System_Drawing_Point.Y = 95 $groupBox1.Location = $System_Drawing_Point $groupBox1.Name = "groupBox1" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 68 $System_Drawing_Size.Width = 490 $groupBox1.Size = $System_Drawing_Size $groupBox1.TabIndex = 4 $groupBox1.TabStop = $False $groupBox1.Text = "1. Choose a source" $frmMain.Controls.Add($groupBox1) $txtSourcePath.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 25 $System_Drawing_Point.Y = 24 $txtSourcePath.Location = $System_Drawing_Point $txtSourcePath.Name = "txtSourcePath" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 418 $txtSourcePath.Size = $System_Drawing_Size $txtSourcePath.TabIndex = 0 $groupBox1.Controls.Add($txtSourcePath) $btnBrowseWim.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 449 $System_Drawing_Point.Y = 24 $btnBrowseWim.Location = $System_Drawing_Point $btnBrowseWim.Name = "btnBrowseWim" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 25 $System_Drawing_Size.Width = 28 $btnBrowseWim.Size = $System_Drawing_Size $btnBrowseWim.TabIndex = 1 $btnBrowseWim.Text = "..." $btnBrowseWim.UseVisualStyleBackColor = $True $btnBrowseWim.add_Click($btnBrowseWim_OnClick) $groupBox1.Controls.Add($btnBrowseWim) $openFileDialog1.FileName = "openFileDialog1" $openFileDialog1.ShowHelp = $True $InitialFormWindowState = $frmMain.WindowState $frmMain.add_Load($OnLoadForm_StateCorrection) $ret = $frmMain.ShowDialog() if (!($ret -ilike "OK")) { throw "Form session has been cancelled." } if ([string]::IsNullOrEmpty($SourcePath)) { throw "No source path specified." } $VHDFormat = $cmbVhdFormat.SelectedItem $SizeBytes = Invoke-Expression "$($numVhdSize.Value)$($cmbVhdSizeUnit.SelectedItem)" $VHDType = $cmbVhdType.SelectedItem $WorkingDirectory = $txtWorkingDirectory.Text if (![string]::IsNullOrEmpty($txtVhdName.Text)) { $VHDPath = "$($WorkingDirectory)\$($txtVhdName.Text)" } if (![string]::IsNullOrEmpty($cmbSkuList.SelectedItem)) { $Edition = $cmbSkuList.SelectedItem } $frmMain.Dispose() } if ("VHD" -ilike $VHDFormat) { if ($SizeBytes -gt $vhdMaxSize) { Write-W2VWarn "For the VHD file format, the maximum file size is ~2040GB. We're automatically setting the size to 2040GB for you." $SizeBytes = 2040GB } } if ((![String]::IsNullOrEmpty($VHDPath)) -and (![String]::IsNullOrEmpty($WorkingDirectory))) { if ($WorkingDirectory -ne $pwd) { Write-W2VWarn "Specifying -VHDPath and -WorkingDirectory at the same time is contradictory." Write-W2VWarn "Ignoring the WorkingDirectory specification." $WorkingDirectory = Split-Path $VHDPath -Parent } } if ($VHDPath) { $ext = ([IO.FileInfo]$VHDPath).Extension if (!($ext -ilike ".$($VHDFormat)")) { throw "There is a mismatch between the VHDPath file extension ($($ext.ToUpper())), and the VHDFormat (.$($VHDFormat)). Please ensure that these match and try again." } } if ([String]::IsNullOrEmpty($VHDPath)) { $VHDPath = Join-Path $WorkingDirectory "$($sessionKey).$($VHDFormat.ToLower())" } else { if (![IO.Path]::IsPathRooted($VHDPath)){ $VHDPath = Join-Path $WorkingDirectory $VHDPath } $vhdFinalName = Split-Path $VHDPath -Leaf $VHDPath = Join-Path (Split-Path $VHDPath -Parent) "$($sessionKey).$($VHDFormat.ToLower())" } Write-W2VTrace "Temporary $VHDFormat path is : $VHDPath" if (([IO.FileInfo]$SourcePath).Extension -ilike ".ISO") { if (Test-IsNetworkLocation $SourcePath) { Write-W2VInfo "Copying ISO $(Split-Path $SourcePath -Leaf) to temp folder..." Copy-Item -Path $SourcePath -Destination $env:Temp -Force $SourcePath = "$($env:Temp)\$(Split-Path $SourcePath -Leaf)" } $isoPath = (Resolve-Path $SourcePath).Path Write-W2VInfo "Opening ISO $(Split-Path $isoPath -Leaf)..." $openIso = Mount-DiskImage -ImagePath $isoPath -StorageType ISO -PassThru $openIso = Get-DiskImage -ImagePath $isoPath $driveLetter = ($openIso | Get-Volume).DriveLetter $SourcePath = "$($driveLetter):\sources\install.wim" Write-W2VInfo "Looking for $($SourcePath)..." if (!(Test-Path $SourcePath)) { throw "The specified ISO does not appear to be valid Windows installation media." } } if (Test-IsNetworkLocation $SourcePath) { Write-W2VInfo "Copying WIM $(Split-Path $SourcePath -Leaf) to temp folder..." Copy-Item -Path $SourcePath -Destination $env:Temp -Force $SourcePath = "$($env:Temp)\$(Split-Path $SourcePath -Leaf)" } $SourcePath = (Resolve-Path $SourcePath).Path $openWim = New-Object WIM2VHD.WimFile $SourcePath if ($openWim.ImageNames.Contains("Windows Longhorn Client") -or $openWim.ImageNames.Contains("Windows Longhorn Server") -or $openWim.ImageNames.Contains("Windows Longhorn Server Core")) { throw "Convert-WindowsImage cannot run against unstaged builds. Please try again with a staged build." } if ($openWim.Images.Count -eq 1) { $Edition = $openWim.Images[0].ImageFlags $openImage = $openWim[$Edition] } else { if ([String]::IsNullOrEmpty($Edition)) { Write-W2VError "You must specify an Edition or SKU index, since the WIM has more than one image." Write-W2VError "Valid edition names are:" $openWim.Images | %{ Write-W2VError " $($_.ImageFlags)" } throw } if ([Int32]::TryParse($Edition, [ref]$null)) { $openImage = $openWim[[Int32]$Edition] } else { $openImage = $openWim[$Edition] } } if ($null -eq $openImage) { Write-W2VError "The specified edition does not appear to exist in the specified WIM." Write-W2VError "Valid edition names are:" $openWim.Images | %{ Write-W2VError " $($_.ImageFlags)" } throw } Write-W2VInfo "Image $($openImage.ImageIndex) selected ($($openImage.ImageFlags))..." if ($openImage.ImageVersion -lt $lowestSupportedVersion) { throw "Convert-WindowsImage only supports Windows 7 and Windows 8 WIM files. The specified image does not appear to contain one of those operating systems." } if ($VHDType -eq "Dynamic") { Write-W2VInfo "Creating sparse disk..." $openVhd = [WIM2VHD.VirtualHardDisk]::CreateSparseDisk( $VHDFormat, $VHDPath, $SizeBytes, $true ) } else { Write-W2VInfo "Creating fixed disk..." $openVhd = [WIM2VHD.VirtualHardDisk]::CreateFixedDisk( $VHDFormat, $VHDPath, $SizeBytes, $true ) } Write-W2VInfo "Attaching $VHDFormat..." $openVhd.Attach() if ($VHDPartitionStyle -eq "MBR" ) { Initialize-Disk -Number $openVhd.DiskIndex -PartitionStyle MBR Write-W2VInfo "Disk initialized with MBR..." } elseif ($VHDPartitionStyle -eq "GPT" ) { Initialize-Disk -Number $openVhd.DiskIndex -PartitionStyle GPT Write-W2VInfo "Disk initialized with GPT..." } $disk = Get-Disk -Number $openVhd.DiskIndex if ( $VHDPartitionStyle -eq "MBR") { $partition = New-Partition -DiskNumber $openVhd.DiskIndex -Size $disk.LargestFreeExtent -MbrType IFS -IsActive Write-W2VInfo "Disk partitioned..." } elseif ( $VHDPartitionStyle -eq "GPT" ) { $PartitionSystem = New-Partition -DiskNumber $openVhd.DiskIndex -Size 100MB -GptType '{c12a7328-f81f-11d2-ba4b-00a0c93ec93b}' $partition = New-Partition -DiskNumber $openVhd.DiskIndex -Size ( $disk.LargestFreeExtent - 100MB ) -GptType '{ebd0a0a2-b9e5-4433-87c0-68b6b72699c7}' Write-W2VInfo "Disk partitioned with two Volumes..." } if ( $VHDPartitionStyle -eq "MBR" ) { $volume = Format-Volume -Partition $partition -FileSystem NTFS -Force -Confirm:$false Write-W2VInfo "Volume formatted..." } elseif ( $VHDPartitionStyle -eq "GPT" ) { @" select disk $($disk.Number) select partition $($partitionSystem.PartitionNumber) format fs=fat32 label="System" "@ | & $env:SystemRoot\System32\DiskPart.exe | Out-Null Write-W2VInfo "System Volume formatted (with DiskPart)..." $volume = Format-Volume -Partition $partition -FileSystem NTFS -Force -Confirm:$false Write-W2VInfo "Boot Volume formatted (with Format-Volume)..." } if ( $VHDPartitionStyle -eq "MBR") { $partition | Add-PartitionAccessPath -AssignDriveLetter $drive = $(Get-Partition -Disk $disk).AccessPaths[0] Write-W2VInfo "Access path ($drive) has been assigned..." } elseif ( $VHDPartitionStyle -eq "GPT" ) { $partitionSystem | Add-PartitionAccessPath -AssignDriveLetter $driveSystem = $(Get-Partition -Disk $disk).AccessPaths[1] Write-W2VInfo "Access path ($driveSystem) has been assigned to the System Volume..." $partition | Add-PartitionAccessPath -AssignDriveLetter $drive = $(Get-Partition -Disk $disk).AccessPaths[2] Write-W2VInfo "Access path ($drive) has been assigned to the Boot Volume..." } Write-W2VInfo "Applying image to $VHDFormat. This could take a while..." $openImage.Apply($drive) if (![string]::IsNullOrEmpty($UnattendPath)) { Write-W2VInfo "Applying unattend file ($(Split-Path $UnattendPath -Leaf))..." Copy-Item -Path $UnattendPath -Destination (Join-Path $drive "unattend.xml") -Force } Write-W2VInfo "Signing disk..." $flagText | Out-File -FilePath (Join-Path $drive "Convert-WindowsImageInfo.txt") -Encoding Unicode -Force if ($openImage.ImageArchitecture -ne "ARM") { if ( $BCDinVHD -eq "VirtualMachine" ) { Write-W2VInfo "Image applied. Making image bootable..." if ( $VHDPartitionStyle -eq "MBR" ) { $bcdBootArgs = @( "$($drive)Windows", "/s $drive", "/v" "/f BIOS" ) } elseif ( $VHDPartitionStyle -eq "GPT" ) { $bcdBootArgs = @( "$($drive)Windows", "/s $driveSystem", "/v" "/f UEFI" ) } Run-Executable -Executable $BCDBoot -Arguments $bcdBootArgs if ( $VHDPartitionStyle -eq "MBR" ) { Write-W2VInfo "Fixing the Device ID in the BCD store on $($VHDFormat)..." Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)boot\bcd", "/set `{bootmgr`} device locate" ) Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)boot\bcd", "/set `{default`} device locate" ) Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)boot\bcd", "/set `{default`} osdevice locate" ) } Write-W2VInfo "Drive is bootable. Cleaning up..." } elseif ( $BCDinVHD -eq "NativeBoot" ) { Write-W2VInfo "Image applied. It is not bootable without an external boot loader. Cleaning up..." } if ($EnableDebugger -inotlike "None") { Write-W2VInfo "Turning kernel debugging on in the $($VHDFormat)..." Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)\boot\bcd", "/set `{default`} debug on" ) } switch ($EnableDebugger) { "Serial" { Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)\boot\bcd", "/dbgsettings SERIAL", "DEBUGPORT:$($ComPort.Value)", "BAUDRATE:$($BaudRate.Value)" ) break } "1394" { Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)\boot\bcd", "/dbgsettings 1394", "CHANNEL:$($Channel.Value)" ) break } "USB" { Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)\boot\bcd", "/dbgsettings USB", "TARGETNAME:$($Target.Value)" ) break } "Local" { Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)\boot\bcd", "/dbgsettings LOCAL" ) break } "Network" { Run-Executable -Executable "BCDEDIT.EXE" -Arguments ( "/store $($drive)\boot\bcd", "/dbgsettings NET", "HOSTIP:$($IP.Value)", "PORT:$($Port.Value)", "KEY:$($Key.Value)" ) break } default { break } } } else { Write-W2VInfo "Not making VHD bootable, since WOA can't boot in VMs." } if ( ( $RemoteDesktopEnable -eq $True ) -or ( $ExpandOnNativeBoot -eq $False ) ) { $hive = Mount-RegistryHive -Hive (Join-Path $drive "Windows\System32\Config\System") if ( $RemoteDesktopEnable -eq $True ) { Write-W2VInfo -text "Enabling Remote Desktop" Set-ItemProperty -Path "HKLM:\$($hive)\ControlSet001\Control\Terminal Server" -Name "fDenyTSConnections" -Value 0 } if ( $ExpandOnNativeBoot -eq $False ) { Write-W2VInfo -text "Disabling automatic $VHDFormat expansion for Native Boot" Set-ItemProperty -Path "HKLM:\$($hive)\ControlSet001\Services\FsDepends\Parameters" -Name "VirtualDiskExpandOnMount" -Value 4 } Dismount-RegistryHive -HiveMountPoint $hive } if ( $Driver ) { Write-W2VInfo -text "Adding Windows Drivers to the Image" Add-WindowsDriver -Path $drive -Recurse -Driver $Driver -Verbose } If ( $Feature ) { Write-W2VInfo -text "Installing Windows Feature(s) $Feature to the Image" $FeatureSourcePath = Join-Path -Path "$($driveLetter):" -ChildPath "sources\sxs" Write-W2VInfo -text "From $FeatureSourcePath" Enable-WindowsOptionalFeature -FeatureName $Feature -Source $FeatureSourcePath -Path $drive -All } if ([String]::IsNullOrEmpty($vhdFinalName)) { Write-W2VInfo "Generating name for $($VHDFormat)..." $hive = Mount-RegistryHive -Hive (Join-Path $drive "Windows\System32\Config\Software") $buildLabEx = (Get-ItemProperty "HKLM:\$($hive)\Microsoft\Windows NT\CurrentVersion").BuildLabEx $installType = (Get-ItemProperty "HKLM:\$($hive)\Microsoft\Windows NT\CurrentVersion").InstallationType $editionId = (Get-ItemProperty "HKLM:\$($hive)\Microsoft\Windows NT\CurrentVersion").EditionID $skuFamily = $null Dismount-RegistryHive -HiveMountPoint $hive if ($installType.ToUpper().Contains("CORE")) { $editionId += "Core" } if ($installType.ToUpper().Contains("SERVER")) { $skuFamily = "Server" } elseif ($installType.ToUpper().Contains("CLIENT")) { $skuFamily = "Client" } else { $skuFamily = "Unknown" } $vhdFinalName = "$($buildLabEx)_$($skuFamily)_$($editionId)_$($openImage.ImageDefaultLanguage).$($VHDFormat.ToLower())" Write-W2VTrace "$VHDFormat final name is : $vhdFinalName" } Write-W2VInfo "Closing $VHDFormat..." $openVhd.Close() $openVhd = $null $vhdFinalPath = Join-Path (Split-Path $VHDPath -Parent) $vhdFinalName if (Test-Path $vhdFinalPath) { Write-W2VInfo "Deleting pre-existing $VHDFormat : $(Split-Path $vhdFinalPath -Leaf)..." Remove-Item -Path $vhdFinalPath -Force } Rename-Item -Path (Resolve-Path $VHDPath).Path -NewName $vhdFinalName -Force } catch { Write-W2VError $_ Write-W2VInfo "Log folder is $logFolder" } finally { if ($openWim -ne $null) { Write-W2VInfo "Closing Windows image..." $openWim.Close() } if ($mountedHive -ne $null) { Write-W2VInfo "Closing registry hive..." Dismount-RegistryHive -HiveMountPoint $mountedHive } if ($openVhd -ne $null) { Write-W2VInfo "Closing $VHDFormat..." $openVhd.Close() } if ($openIso -ne $null) { Write-W2VInfo "Closing ISO..." Dismount-DiskImage $ISOPath } Write-W2VInfo "Done." if ($transcripting) { $null = Stop-Transcript } } } End { if (($Passthru) -and (![string]::IsNullOrEmpty($vhdFinalPath)) -and (Test-Path $vhdFinalPath)) { return (Get-ChildItem -Path $vhdFinalPath) } } }
combined_dataset/train/non-malicious/4242.ps1
4242.ps1
$Source = @" using System; using System.Collections.Generic; using System.Runtime.InteropServices; using System.Reflection; public class sRDI { [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_DATA_DIRECTORY { public uint VirtualAddress; public uint Size; } //[StructLayout(LayoutKind.Sequential, Pack = 1)] [StructLayout(LayoutKind.Explicit)] unsafe struct IMAGE_SECTION_HEADER { [FieldOffset(0)] public fixed byte Name[8]; [FieldOffset(8)] public uint PhysicalAddress; [FieldOffset(8)] public uint VirtualSize; [FieldOffset(12)] public uint VirtualAddress; [FieldOffset(16)] public uint SizeOfRawData; [FieldOffset(20)] public uint PointerToRawData; [FieldOffset(24)] public uint PointerToRelocations; [FieldOffset(28)] public uint PointerToLinenumbers; [FieldOffset(32)] public ushort NumberOfRelocations; [FieldOffset(34)] public ushort NumberOfLinenumbers; [FieldOffset(36)] public uint Characteristics; } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_FILE_HEADER { public ushort Machine; public ushort NumberOfSections; public uint TimeDateStamp; public uint PointerToSymbolTable; public uint NumberOfSymbols; public ushort SizeOfOptionalHeader; public ushort Characteristics; } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_EXPORT_DIRECTORY { public uint Characteristics; public uint TimeDateStamp; public ushort MajorVersion; public ushort MinorVersion; public uint Name; public uint Base; public uint NumberOfFunctions; public uint NumberOfNames; public uint AddressOfFunctions; // RVA from base of image public uint AddressOfNames; // RVA from base of image public uint AddressOfNameOrdinals; // RVA from base of image } enum IMAGE_DOS_SIGNATURE : ushort { DOS_SIGNATURE = 0x5A4D, // MZ OS2_SIGNATURE = 0x454E, // NE OS2_SIGNATURE_LE = 0x454C, // LE } enum MagicType : ushort { IMAGE_NT_OPTIONAL_HDR32_MAGIC = 0x10b, IMAGE_NT_OPTIONAL_HDR64_MAGIC = 0x20b, } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_DOS_HEADER { public IMAGE_DOS_SIGNATURE e_magic; // Magic number public ushort e_cblp; // public bytes on last page of file public ushort e_cp; // Pages in file public ushort e_crlc; // Relocations public ushort e_cparhdr; // Size of header in paragraphs public ushort e_minalloc; // Minimum extra paragraphs needed public ushort e_maxalloc; // Maximum extra paragraphs needed public ushort e_ss; // Initial (relative) SS value public ushort e_sp; // Initial SP value public ushort e_csum; // Checksum public ushort e_ip; // Initial IP value public ushort e_cs; // Initial (relative) CS value public ushort e_lfarlc; // File address of relocation table public ushort e_ovno; // Overlay number [MarshalAs(UnmanagedType.ByValTStr, SizeConst = 8)] public string e_res; // May contain 'Detours!' public ushort e_oemid; // OEM identifier (for e_oeminfo) public ushort e_oeminfo; // OEM information; e_oemid specific [MarshalAsAttribute(UnmanagedType.ByValArray, SizeConst = 10)] public ushort[] e_res2; // Reserved public ushorts public Int32 e_lfanew; // File address of new exe header } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_OPTIONAL_HEADER { // // Standard fields. // public MagicType Magic; public byte MajorLinkerVersion; public byte MinorLinkerVersion; public uint SizeOfCode; public uint SizeOfInitializedData; public uint SizeOfUninitializedData; public uint AddressOfEntryPoint; public uint BaseOfCode; public uint BaseOfData; public uint ImageBase; public uint SectionAlignment; public uint FileAlignment; public ushort MajorOperatingSystemVersion; public ushort MinorOperatingSystemVersion; public ushort MajorImageVersion; public ushort MinorImageVersion; public ushort MajorSubsystemVersion; public ushort MinorSubsystemVersion; public uint Win32VersionValue; public uint SizeOfImage; public uint SizeOfHeaders; public uint CheckSum; public ushort Subsystem; public ushort DllCharacteristics; public uint SizeOfStackReserve; public uint SizeOfStackCommit; public uint SizeOfHeapReserve; public uint SizeOfHeapCommit; public uint LoaderFlags; public uint NumberOfRvaAndSizes; public IMAGE_DATA_DIRECTORY ExportTable; public IMAGE_DATA_DIRECTORY ImportTable; public IMAGE_DATA_DIRECTORY ResourceTable; public IMAGE_DATA_DIRECTORY ExceptionTable; public IMAGE_DATA_DIRECTORY CertificateTable; public IMAGE_DATA_DIRECTORY BaseRelocationTable; public IMAGE_DATA_DIRECTORY Debug; public IMAGE_DATA_DIRECTORY Architecture; public IMAGE_DATA_DIRECTORY GlobalPtr; public IMAGE_DATA_DIRECTORY TLSTable; public IMAGE_DATA_DIRECTORY LoadConfigTable; public IMAGE_DATA_DIRECTORY BoundImport; public IMAGE_DATA_DIRECTORY IAT; public IMAGE_DATA_DIRECTORY DelayImportDescriptor; public IMAGE_DATA_DIRECTORY CLRRuntimeHeader; public IMAGE_DATA_DIRECTORY Public; } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_OPTIONAL_HEADER64 { public MagicType Magic; public byte MajorLinkerVersion; public byte MinorLinkerVersion; public uint SizeOfCode; public uint SizeOfInitializedData; public uint SizeOfUninitializedData; public uint AddressOfEntryPoint; public uint BaseOfCode; public ulong ImageBase; public uint SectionAlignment; public uint FileAlignment; public ushort MajorOperatingSystemVersion; public ushort MinorOperatingSystemVersion; public ushort MajorImageVersion; public ushort MinorImageVersion; public ushort MajorSubsystemVersion; public ushort MinorSubsystemVersion; public uint Win32VersionValue; public uint SizeOfImage; public uint SizeOfHeaders; public uint CheckSum; public ushort Subsystem; public ushort DllCharacteristics; public ulong SizeOfStackReserve; public ulong SizeOfStackCommit; public ulong SizeOfHeapReserve; public ulong SizeOfHeapCommit; public uint LoaderFlags; public uint NumberOfRvaAndSizes; public IMAGE_DATA_DIRECTORY ExportTable; public IMAGE_DATA_DIRECTORY ImportTable; public IMAGE_DATA_DIRECTORY ResourceTable; public IMAGE_DATA_DIRECTORY ExceptionTable; public IMAGE_DATA_DIRECTORY CertificateTable; public IMAGE_DATA_DIRECTORY BaseRelocationTable; public IMAGE_DATA_DIRECTORY Debug; public IMAGE_DATA_DIRECTORY Architecture; public IMAGE_DATA_DIRECTORY GlobalPtr; public IMAGE_DATA_DIRECTORY TLSTable; public IMAGE_DATA_DIRECTORY LoadConfigTable; public IMAGE_DATA_DIRECTORY BoundImport; public IMAGE_DATA_DIRECTORY IAT; public IMAGE_DATA_DIRECTORY DelayImportDescriptor; public IMAGE_DATA_DIRECTORY CLRRuntimeHeader; public IMAGE_DATA_DIRECTORY Public; } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_NT_HEADERS64 { public uint Signature; public IMAGE_FILE_HEADER FileHeader; public IMAGE_OPTIONAL_HEADER64 OptionalHeader; } [StructLayout(LayoutKind.Sequential, Pack = 1)] struct IMAGE_NT_HEADERS { public uint Signature; public IMAGE_FILE_HEADER FileHeader; public IMAGE_OPTIONAL_HEADER OptionalHeader; } public delegate int SIZEOFHELPER(Type type, bool throwIfNotMarshalable); public static unsafe class InteropTools { //static ctor static InteropTools() { BindingFlags flags = BindingFlags.NonPublic | BindingFlags.Static; MethodInfo tmi = typeof(System.Runtime.InteropServices.Marshal).GetMethod("SizeOfHelper", flags); if (null != tmi) SizeOfHelper_f = (SIZEOFHELPER)Delegate.CreateDelegate(typeof(SIZEOFHELPER), tmi); Type SafeBufferType = Type.GetType("System.Runtime.InteropServices.SafeBuffer"); if (null == SafeBufferType) //.Net 2.0 SafePointer has the members instead of SafeBuffer SafeBufferType = Type.GetType("System.Runtime.InteropServices.SafePointer"); MethodInfo PtrToStructureNativeMethod = SafeBufferType.GetMethod("PtrToStructureNative", flags); MethodInfo StructureToPtrNativeMethod = SafeBufferType.GetMethod("StructureToPtrNative", flags); PtrToStructureNative = (PtrToStructureNativeDelegate)Delegate.CreateDelegate(typeof(PtrToStructureNativeDelegate), PtrToStructureNativeMethod); StructureToPtrNative = (StructureToPtrNativeDelegate)Delegate.CreateDelegate(typeof(StructureToPtrNativeDelegate), StructureToPtrNativeMethod); } public delegate void PtrToStructureNativeDelegate(byte* ptr, TypedReference structure, uint sizeofT); public delegate void StructureToPtrNativeDelegate(TypedReference structure, byte* ptr, uint sizeofT); public static readonly PtrToStructureNativeDelegate PtrToStructureNative; public static readonly StructureToPtrNativeDelegate StructureToPtrNative; private static readonly SIZEOFHELPER SizeOfHelper_f = null; public static void StructureToPtrDirect(TypedReference structure, IntPtr ptr, int size) { StructureToPtrNative(structure, (byte*)ptr, unchecked((uint)size)); } public static void StructureToPtrDirect(TypedReference structure, IntPtr ptr) { StructureToPtrDirect(structure, ptr, SizeOf(__reftype(structure))); } public static void PtrToStructureDirect(IntPtr ptr, TypedReference structure, int size) { PtrToStructureNative((byte*)ptr, structure, unchecked((uint)size)); } public static void PtrToStructureDirect(IntPtr ptr, TypedReference structure) { PtrToStructureDirect(ptr, structure, SizeOf(__reftype(structure))); } public static void StructureToPtr<T>(ref T structure, IntPtr ptr) { StructureToPtrDirect(__makeref(structure), ptr); } public static void PtrToStructure<T>(IntPtr ptr, out T structure) { structure = default(T); PtrToStructureDirect(ptr, __makeref(structure)); } public static T PtrToStructure<T>(IntPtr ptr) { T obj; PtrToStructure(ptr, out obj); return obj; } public static int SizeOf<T>(T structure) { return SizeOf<T>(); } public static int SizeOf<T>() { return SizeOf(typeof(T)); } public static int SizeOf(Type t) { if (null != SizeOfHelper_f) return SizeOfHelper_f(t, true); else return System.Runtime.InteropServices.Marshal.SizeOf(t); } } public static IntPtr Rva2Offset(uint dwRva, IntPtr PEPointer) { bool is64Bit = false; ushort wIndex = 0; ushort wNumberOfSections = 0; IntPtr imageSectionPtr; IMAGE_SECTION_HEADER SectionHeader; int sizeOfSectionHeader = Marshal.SizeOf(typeof(IMAGE_SECTION_HEADER)); IMAGE_DOS_HEADER dosHeader = InteropTools.PtrToStructure<IMAGE_DOS_HEADER>(PEPointer); IntPtr NtHeadersPtr = (IntPtr)((UInt64)PEPointer + (UInt64)dosHeader.e_lfanew); IMAGE_NT_HEADERS imageNtHeaders32 = (IMAGE_NT_HEADERS)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS)); IMAGE_NT_HEADERS64 imageNtHeaders64 = (IMAGE_NT_HEADERS64)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS64)); if (imageNtHeaders64.OptionalHeader.Magic == MagicType.IMAGE_NT_OPTIONAL_HDR64_MAGIC) is64Bit = true; if (is64Bit) { imageSectionPtr = (IntPtr)(((Int64)NtHeadersPtr + (Int64)Marshal.OffsetOf(typeof(IMAGE_NT_HEADERS64), "OptionalHeader") + (Int64)imageNtHeaders64.FileHeader.SizeOfOptionalHeader)); SectionHeader = (IMAGE_SECTION_HEADER)Marshal.PtrToStructure(imageSectionPtr, typeof(IMAGE_SECTION_HEADER)); wNumberOfSections = imageNtHeaders64.FileHeader.NumberOfSections; } else { imageSectionPtr = (IntPtr)(((Int64)NtHeadersPtr + (Int64)Marshal.OffsetOf(typeof(IMAGE_NT_HEADERS), "OptionalHeader") + (Int64)imageNtHeaders32.FileHeader.SizeOfOptionalHeader)); SectionHeader = (IMAGE_SECTION_HEADER)Marshal.PtrToStructure(imageSectionPtr, typeof(IMAGE_SECTION_HEADER)); wNumberOfSections = imageNtHeaders32.FileHeader.NumberOfSections; } if (dwRva < SectionHeader.PointerToRawData) return (IntPtr)((UInt64)dwRva + (UInt64)PEPointer); for (wIndex = 0; wIndex < wNumberOfSections; wIndex++) { SectionHeader = (IMAGE_SECTION_HEADER)Marshal.PtrToStructure((IntPtr)((uint)imageSectionPtr + (uint)(sizeOfSectionHeader * (wIndex))), typeof(IMAGE_SECTION_HEADER)); if (dwRva >= SectionHeader.VirtualAddress && dwRva < (SectionHeader.VirtualAddress + SectionHeader.SizeOfRawData)) return (IntPtr)((UInt64)(dwRva - SectionHeader.VirtualAddress + SectionHeader.PointerToRawData) + (UInt64)PEPointer); } return IntPtr.Zero; } public static unsafe bool Is64BitDLL(byte[] dllBytes) { bool is64Bit = false; GCHandle scHandle = GCHandle.Alloc(dllBytes, GCHandleType.Pinned); IntPtr scPointer = scHandle.AddrOfPinnedObject(); IMAGE_DOS_HEADER dosHeader = (IMAGE_DOS_HEADER)Marshal.PtrToStructure(scPointer, typeof(IMAGE_DOS_HEADER)); IntPtr NtHeadersPtr = (IntPtr)((UInt64)scPointer + (UInt64)dosHeader.e_lfanew); IMAGE_NT_HEADERS64 imageNtHeaders64 = (IMAGE_NT_HEADERS64)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS64)); IMAGE_NT_HEADERS imageNtHeaders32 = (IMAGE_NT_HEADERS)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS)); if (imageNtHeaders64.Signature != 0x00004550) throw new ApplicationException("Invalid IMAGE_NT_HEADER signature."); if (imageNtHeaders64.OptionalHeader.Magic == MagicType.IMAGE_NT_OPTIONAL_HDR64_MAGIC) is64Bit = true; scHandle.Free(); return is64Bit; } [UnmanagedFunctionPointer(CallingConvention.StdCall)] delegate IntPtr ReflectiveLoader(); [UnmanagedFunctionPointer(CallingConvention.Cdecl)] delegate bool ExportedFunction(IntPtr userData, uint userLength); public static byte[] ConvertToShellcode(byte[] dllBytes, uint functionHash, byte[] userData) { byte[] rdiShellcode64 = new byte[] { 0xe9, 0x1b, 0x04, 0x00, 0x00, 0xcc, 0xcc, 0xcc, 0x48, 0x89, 0x5c, 0x24, 0x08, 0x48, 0x89, 0x6c, 0x24, 0x10, 0x48, 0x89, 0x74, 0x24, 0x18, 0x57, 0x48, 0x83, 0xec, 0x10, 0x65, 0x48, 0x8b, 0x04, 0x25, 0x60, 0x00, 0x00, 0x00, 0x8b, 0xf1, 0x33, 0xed, 0x48, 0x8b, 0x50, 0x18, 0x4c, 0x8b, 0x4a, 0x10, 0x4d, 0x8b, 0x41, 0x30, 0x4d, 0x85, 0xc0, 0x0f, 0x84, 0xb9, 0x00, 0x00, 0x00, 0x41, 0x0f, 0x10, 0x41, 0x58, 0x49, 0x63, 0x40, 0x3c, 0x4d, 0x8b, 0x09, 0x46, 0x8b, 0x9c, 0x00, 0x88, 0x00, 0x00, 0x00, 0x8b, 0xd5, 0xf3, 0x0f, 0x7f, 0x04, 0x24, 0x45, 0x85, 0xdb, 0x74, 0xd3, 0x48, 0x8b, 0x04, 0x24, 0x48, 0xc1, 0xe8, 0x10, 0x66, 0x3b, 0xe8, 0x73, 0x26, 0x48, 0x8b, 0x4c, 0x24, 0x08, 0x44, 0x0f, 0xb7, 0x54, 0x24, 0x02, 0x0f, 0xbe, 0x01, 0xc1, 0xca, 0x0d, 0x80, 0x39, 0x61, 0x7c, 0x06, 0x8d, 0x54, 0x02, 0xe0, 0xeb, 0x02, 0x03, 0xd0, 0x48, 0xff, 0xc1, 0x49, 0xff, 0xca, 0x75, 0xe5, 0x4f, 0x8d, 0x14, 0x18, 0x8b, 0xcd, 0x45, 0x8b, 0x5a, 0x20, 0x4d, 0x03, 0xd8, 0x41, 0x39, 0x6a, 0x18, 0x76, 0x8d, 0x41, 0x8b, 0x1b, 0x8b, 0xfd, 0x49, 0x03, 0xd8, 0x49, 0x83, 0xc3, 0x04, 0x0f, 0xbe, 0x03, 0xc1, 0xcf, 0x0d, 0x48, 0xff, 0xc3, 0x03, 0xf8, 0x40, 0x38, 0x6b, 0xff, 0x75, 0xef, 0x8d, 0x04, 0x17, 0x3b, 0xc6, 0x74, 0x0d, 0xff, 0xc1, 0x41, 0x3b, 0x4a, 0x18, 0x72, 0xd4, 0xe9, 0x5c, 0xff, 0xff, 0xff, 0x41, 0x8b, 0x52, 0x24, 0x03, 0xc9, 0x49, 0x8d, 0x04, 0x10, 0x0f, 0xb7, 0x04, 0x01, 0x41, 0x8b, 0x4a, 0x1c, 0xc1, 0xe0, 0x02, 0x48, 0x98, 0x49, 0x03, 0xc0, 0x8b, 0x04, 0x01, 0x49, 0x03, 0xc0, 0xeb, 0x02, 0x33, 0xc0, 0x48, 0x8b, 0x5c, 0x24, 0x20, 0x48, 0x8b, 0x6c, 0x24, 0x28, 0x48, 0x8b, 0x74, 0x24, 0x30, 0x48, 0x83, 0xc4, 0x10, 0x5f, 0xc3, 0xcc, 0xcc, 0x44, 0x89, 0x4c, 0x24, 0x20, 0x4c, 0x89, 0x44, 0x24, 0x18, 0x89, 0x54, 0x24, 0x10, 0x53, 0x55, 0x56, 0x57, 0x41, 0x54, 0x41, 0x55, 0x41, 0x56, 0x41, 0x57, 0x48, 0x83, 0xec, 0x28, 0x48, 0x8b, 0xf1, 0xb9, 0x4c, 0x77, 0x26, 0x07, 0x44, 0x8b, 0xe2, 0xe8, 0xca, 0xfe, 0xff, 0xff, 0xb9, 0x49, 0xf7, 0x02, 0x78, 0x4c, 0x8b, 0xf0, 0xe8, 0xbd, 0xfe, 0xff, 0xff, 0xb9, 0x58, 0xa4, 0x53, 0xe5, 0x4c, 0x8b, 0xf8, 0xe8, 0xb0, 0xfe, 0xff, 0xff, 0xb9, 0xaf, 0xb1, 0x5c, 0x94, 0x48, 0x8b, 0xd8, 0xe8, 0xa3, 0xfe, 0xff, 0xff, 0x48, 0x63, 0x6e, 0x3c, 0x33, 0xc9, 0x48, 0x03, 0xee, 0x41, 0xb8, 0x00, 0x30, 0x00, 0x00, 0x8b, 0x55, 0x50, 0x44, 0x8d, 0x49, 0x40, 0x4c, 0x8b, 0xe8, 0x48, 0x89, 0x44, 0x24, 0x70, 0xff, 0xd3, 0x44, 0x8b, 0x45, 0x54, 0x48, 0x8b, 0xf8, 0x48, 0x8b, 0xd6, 0x41, 0xbb, 0x01, 0x00, 0x00, 0x00, 0x4d, 0x85, 0xc0, 0x74, 0x13, 0x48, 0x8b, 0xc8, 0x48, 0x2b, 0xce, 0x8a, 0x02, 0x88, 0x04, 0x11, 0x49, 0x03, 0xd3, 0x4d, 0x2b, 0xc3, 0x75, 0xf3, 0x44, 0x0f, 0xb7, 0x4d, 0x06, 0x0f, 0xb7, 0x45, 0x14, 0x4d, 0x85, 0xc9, 0x74, 0x36, 0x48, 0x8d, 0x4c, 0x28, 0x2c, 0x8b, 0x51, 0xf8, 0x44, 0x8b, 0x01, 0x44, 0x8b, 0x51, 0xfc, 0x48, 0x03, 0xd7, 0x4c, 0x03, 0xc6, 0x4d, 0x2b, 0xcb, 0x4d, 0x85, 0xd2, 0x74, 0x10, 0x41, 0x8a, 0x00, 0x4d, 0x03, 0xc3, 0x88, 0x02, 0x49, 0x03, 0xd3, 0x4d, 0x2b, 0xd3, 0x75, 0xf0, 0x48, 0x83, 0xc1, 0x28, 0x4d, 0x85, 0xc9, 0x75, 0xcf, 0x8b, 0x9d, 0x90, 0x00, 0x00, 0x00, 0x48, 0x03, 0xdf, 0x8b, 0x43, 0x0c, 0x85, 0xc0, 0x0f, 0x84, 0x93, 0x00, 0x00, 0x00, 0x8b, 0xc8, 0x48, 0x03, 0xcf, 0x41, 0xff, 0xd6, 0x44, 0x8b, 0x23, 0x8b, 0x73, 0x10, 0x4c, 0x03, 0xe7, 0x4c, 0x8b, 0xe8, 0x48, 0x03, 0xf7, 0xeb, 0x5b, 0x49, 0x83, 0x3c, 0x24, 0x00, 0x74, 0x3b, 0x48, 0xb8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x80, 0x49, 0x85, 0x04, 0x24, 0x74, 0x2b, 0x49, 0x63, 0x45, 0x3c, 0x41, 0x0f, 0xb7, 0x14, 0x24, 0x42, 0x8b, 0x8c, 0x28, 0x88, 0x00, 0x00, 0x00, 0x42, 0x8b, 0x44, 0x29, 0x10, 0x48, 0x2b, 0xd0, 0x42, 0x8b, 0x44, 0x29, 0x1c, 0x49, 0x8d, 0x4c, 0x05, 0x00, 0x8b, 0x04, 0x91, 0x49, 0x03, 0xc5, 0xeb, 0x0e, 0x48, 0x8b, 0x06, 0x49, 0x8b, 0xcd, 0x48, 0x8d, 0x54, 0x07, 0x02, 0x41, 0xff, 0xd7, 0x48, 0x89, 0x06, 0x48, 0x83, 0xc6, 0x08, 0x49, 0x83, 0xc4, 0x08, 0x48, 0x83, 0x3e, 0x00, 0x75, 0x9f, 0x8b, 0x43, 0x20, 0x48, 0x83, 0xc3, 0x14, 0x85, 0xc0, 0x0f, 0x85, 0x77, 0xff, 0xff, 0xff, 0x44, 0x8b, 0x64, 0x24, 0x78, 0x4c, 0x8b, 0x6c, 0x24, 0x70, 0x4c, 0x8b, 0xcf, 0x41, 0xbe, 0x02, 0x00, 0x00, 0x00, 0x4c, 0x2b, 0x4d, 0x30, 0x83, 0xbd, 0xb4, 0x00, 0x00, 0x00, 0x00, 0x41, 0x8d, 0x76, 0xff, 0x0f, 0x84, 0x94, 0x00, 0x00, 0x00, 0x8b, 0x95, 0xb0, 0x00, 0x00, 0x00, 0x48, 0x03, 0xd7, 0x8b, 0x42, 0x04, 0x85, 0xc0, 0x0f, 0x84, 0x80, 0x00, 0x00, 0x00, 0xbb, 0xff, 0x0f, 0x00, 0x00, 0x44, 0x8b, 0x02, 0x44, 0x8b, 0xd0, 0x4c, 0x8d, 0x5a, 0x08, 0x49, 0x83, 0xea, 0x08, 0x4c, 0x03, 0xc7, 0x49, 0xd1, 0xea, 0x74, 0x58, 0x41, 0x0f, 0xb7, 0x0b, 0x4c, 0x2b, 0xd6, 0x0f, 0xb7, 0xc1, 0x66, 0xc1, 0xe8, 0x0c, 0x66, 0x83, 0xf8, 0x0a, 0x75, 0x09, 0x48, 0x23, 0xcb, 0x4e, 0x01, 0x0c, 0x01, 0xeb, 0x33, 0x66, 0x83, 0xf8, 0x03, 0x75, 0x09, 0x48, 0x23, 0xcb, 0x46, 0x01, 0x0c, 0x01, 0xeb, 0x24, 0x66, 0x3b, 0xc6, 0x75, 0x11, 0x49, 0x8b, 0xc1, 0x48, 0x23, 0xcb, 0x48, 0xc1, 0xe8, 0x10, 0x66, 0x42, 0x01, 0x04, 0x01, 0xeb, 0x0e, 0x66, 0x41, 0x3b, 0xc6, 0x75, 0x08, 0x48, 0x23, 0xcb, 0x66, 0x46, 0x01, 0x0c, 0x01, 0x4d, 0x03, 0xde, 0x4d, 0x85, 0xd2, 0x75, 0xa8, 0x8b, 0x42, 0x04, 0x48, 0x03, 0xd0, 0x8b, 0x42, 0x04, 0x85, 0xc0, 0x75, 0x85, 0x8b, 0x5d, 0x28, 0x45, 0x33, 0xc0, 0x33, 0xd2, 0x48, 0x83, 0xc9, 0xff, 0x48, 0x03, 0xdf, 0x41, 0xff, 0xd5, 0x4c, 0x8b, 0xc6, 0x8b, 0xd6, 0x48, 0x8b, 0xcf, 0xff, 0xd3, 0x45, 0x85, 0xe4, 0x0f, 0x84, 0x99, 0x00, 0x00, 0x00, 0x83, 0xbd, 0x8c, 0x00, 0x00, 0x00, 0x00, 0x0f, 0x84, 0x8c, 0x00, 0x00, 0x00, 0x8b, 0x95, 0x88, 0x00, 0x00, 0x00, 0x48, 0x03, 0xd7, 0x44, 0x8b, 0x5a, 0x18, 0x45, 0x85, 0xdb, 0x74, 0x7a, 0x83, 0x7a, 0x14, 0x00, 0x74, 0x74, 0x44, 0x8b, 0x52, 0x20, 0x44, 0x8b, 0x42, 0x24, 0x33, 0xdb, 0x4c, 0x03, 0xd7, 0x4c, 0x03, 0xc7, 0x45, 0x85, 0xdb, 0x74, 0x5f, 0x45, 0x8b, 0x0a, 0x4c, 0x03, 0xcf, 0x33, 0xc9, 0x41, 0x0f, 0xbe, 0x01, 0xc1, 0xc9, 0x0d, 0x4c, 0x03, 0xce, 0x03, 0xc8, 0x41, 0x80, 0x79, 0xff, 0x00, 0x75, 0xed, 0x44, 0x3b, 0xe1, 0x74, 0x10, 0x03, 0xde, 0x49, 0x83, 0xc2, 0x04, 0x4d, 0x03, 0xc6, 0x41, 0x3b, 0xdb, 0x72, 0xd2, 0xeb, 0x2f, 0x41, 0x0f, 0xb7, 0x00, 0x83, 0xf8, 0xff, 0x74, 0x26, 0x8b, 0x52, 0x1c, 0xc1, 0xe0, 0x02, 0x48, 0x63, 0xc8, 0x48, 0x8d, 0x04, 0x0f, 0x48, 0x8b, 0x8c, 0x24, 0x80, 0x00, 0x00, 0x00, 0x44, 0x8b, 0x04, 0x02, 0x8b, 0x94, 0x24, 0x88, 0x00, 0x00, 0x00, 0x4c, 0x03, 0xc7, 0x41, 0xff, 0xd0, 0x48, 0x8b, 0xc7, 0x48, 0x83, 0xc4, 0x28, 0x41, 0x5f, 0x41, 0x5e, 0x41, 0x5d, 0x41, 0x5c, 0x5f, 0x5e, 0x5d, 0x5b, 0xc3, 0xcc, 0xcc, 0xcc, 0xcc, 0x56, 0x48, 0x8b, 0xf4, 0x48, 0x83, 0xe4, 0xf0, 0x48, 0x83, 0xec, 0x20, 0xe8, 0xdf, 0xfc, 0xff, 0xff, 0x48, 0x8b, 0xe6, 0x5e, 0xc3 }; byte[] rdiShellcode32 = new byte[] { 0x55, 0x8b, 0xec, 0x83, 0xec, 0x18, 0x53, 0x56, 0x57, 0x68, 0x4c, 0x77, 0x26, 0x07, 0xe8, 0x44, 0x02, 0x00, 0x00, 0x89, 0x45, 0xf4, 0xc7, 0x04, 0x24, 0x49, 0xf7, 0x02, 0x78, 0xe8, 0x35, 0x02, 0x00, 0x00, 0x68, 0x58, 0xa4, 0x53, 0xe5, 0x89, 0x45, 0xec, 0xe8, 0x28, 0x02, 0x00, 0x00, 0x68, 0xaf, 0xb1, 0x5c, 0x94, 0x8b, 0xf8, 0xe8, 0x1c, 0x02, 0x00, 0x00, 0x8b, 0x5d, 0x08, 0x8b, 0x73, 0x3c, 0x83, 0xc4, 0x0c, 0x6a, 0x40, 0x68, 0x00, 0x30, 0x00, 0x00, 0x03, 0xf3, 0xff, 0x76, 0x50, 0x89, 0x45, 0xe8, 0x6a, 0x00, 0xff, 0xd7, 0x8b, 0xc8, 0x8b, 0x46, 0x54, 0x89, 0x4d, 0xfc, 0x8b, 0xfb, 0x85, 0xc0, 0x74, 0x0b, 0x2b, 0xcb, 0x8a, 0x17, 0x88, 0x14, 0x39, 0x47, 0x48, 0x75, 0xf7, 0x0f, 0xb7, 0x46, 0x14, 0x8d, 0x7c, 0x30, 0x2c, 0x0f, 0xb7, 0x46, 0x06, 0x89, 0x45, 0x08, 0x85, 0xc0, 0x74, 0x2f, 0x8b, 0x47, 0xf8, 0x8b, 0x0f, 0x8b, 0x57, 0xfc, 0xff, 0x4d, 0x08, 0x03, 0x45, 0xfc, 0x03, 0xcb, 0x89, 0x55, 0xf8, 0x85, 0xd2, 0x74, 0x0f, 0x8a, 0x11, 0xff, 0x4d, 0xf8, 0x88, 0x10, 0x40, 0x41, 0x83, 0x7d, 0xf8, 0x00, 0x75, 0xf1, 0x83, 0xc7, 0x28, 0x83, 0x7d, 0x08, 0x00, 0x75, 0xd1, 0x8b, 0x9e, 0x80, 0x00, 0x00, 0x00, 0x03, 0x5d, 0xfc, 0xeb, 0x6a, 0x03, 0x45, 0xfc, 0x50, 0xff, 0x55, 0xf4, 0x8b, 0x0b, 0x8b, 0x7b, 0x10, 0x03, 0x4d, 0xfc, 0x03, 0x7d, 0xfc, 0x89, 0x45, 0x08, 0xeb, 0x48, 0x8b, 0x11, 0x85, 0xd2, 0x74, 0x27, 0x79, 0x25, 0x8b, 0x50, 0x3c, 0x8b, 0x54, 0x02, 0x78, 0x03, 0xd0, 0x8b, 0x01, 0x25, 0xff, 0xff, 0x00, 0x00, 0x2b, 0x42, 0x10, 0x8b, 0x52, 0x1c, 0x8d, 0x14, 0x82, 0x8b, 0x45, 0x08, 0x8b, 0x14, 0x02, 0x03, 0xd0, 0x89, 0x17, 0xeb, 0x15, 0x8b, 0x0f, 0x03, 0x4d, 0xfc, 0x83, 0xc1, 0x02, 0x51, 0x50, 0xff, 0x55, 0xec, 0x8b, 0x4d, 0xf8, 0x89, 0x07, 0x8b, 0x45, 0x08, 0x83, 0xc7, 0x04, 0x83, 0xc1, 0x04, 0x83, 0x3f, 0x00, 0x89, 0x4d, 0xf8, 0x75, 0xb0, 0x83, 0xc3, 0x14, 0x8b, 0x43, 0x0c, 0x85, 0xc0, 0x75, 0x8f, 0x8b, 0x5d, 0xfc, 0x2b, 0x5e, 0x34, 0x39, 0x86, 0xa4, 0x00, 0x00, 0x00, 0x74, 0x7e, 0x8b, 0x96, 0xa0, 0x00, 0x00, 0x00, 0x03, 0x55, 0xfc, 0xeb, 0x6c, 0x8b, 0x0a, 0x03, 0x4d, 0xfc, 0x83, 0xc0, 0xf8, 0xd1, 0xe8, 0x8d, 0x7a, 0x08, 0x89, 0x7d, 0xf8, 0x74, 0x57, 0x48, 0x89, 0x45, 0x08, 0x8b, 0x45, 0xf8, 0x0f, 0xb7, 0x00, 0x66, 0x8b, 0xf8, 0x66, 0xc1, 0xef, 0x0c, 0x66, 0x83, 0xff, 0x0a, 0x74, 0x06, 0x66, 0x83, 0xff, 0x03, 0x75, 0x0a, 0x25, 0xff, 0x0f, 0x00, 0x00, 0x01, 0x1c, 0x08, 0xeb, 0x25, 0x66, 0x83, 0xff, 0x01, 0x75, 0x10, 0x8b, 0xfb, 0x25, 0xff, 0x0f, 0x00, 0x00, 0xc1, 0xef, 0x10, 0x66, 0x01, 0x3c, 0x08, 0xeb, 0x0f, 0x66, 0x83, 0xff, 0x02, 0x75, 0x09, 0x25, 0xff, 0x0f, 0x00, 0x00, 0x66, 0x01, 0x1c, 0x08, 0x8b, 0x45, 0x08, 0x83, 0x45, 0xf8, 0x02, 0x85, 0xc0, 0x75, 0xa9, 0x03, 0x52, 0x04, 0x8b, 0x42, 0x04, 0x85, 0xc0, 0x75, 0x8d, 0x8b, 0x5e, 0x28, 0x03, 0x5d, 0xfc, 0x6a, 0x00, 0x6a, 0x00, 0x6a, 0xff, 0xff, 0x55, 0xe8, 0x8b, 0x7d, 0xfc, 0x6a, 0x01, 0x6a, 0x01, 0x57, 0xff, 0xd3, 0x33, 0xdb, 0x39, 0x5d, 0x0c, 0x74, 0x75, 0x39, 0x5e, 0x7c, 0x74, 0x70, 0x8b, 0x76, 0x78, 0x03, 0xf7, 0x8b, 0x56, 0x18, 0x3b, 0xd3, 0x74, 0x64, 0x39, 0x5e, 0x14, 0x74, 0x5f, 0x8b, 0x46, 0x20, 0x8b, 0x4e, 0x24, 0x03, 0xc7, 0x03, 0xcf, 0x89, 0x5d, 0x08, 0x3b, 0xd3, 0x76, 0x4e, 0x8b, 0x10, 0x03, 0x55, 0xfc, 0x33, 0xff, 0x0f, 0xbe, 0x1a, 0xc1, 0xcf, 0x0d, 0x03, 0xfb, 0x42, 0x80, 0x7a, 0xff, 0x00, 0x75, 0xf1, 0x39, 0x7d, 0x0c, 0x74, 0x13, 0xff, 0x45, 0x08, 0x8b, 0x55, 0x08, 0x83, 0xc0, 0x04, 0x83, 0xc1, 0x02, 0x3b, 0x56, 0x18, 0x72, 0xd4, 0xeb, 0x20, 0x0f, 0xb7, 0x01, 0x83, 0xf8, 0xff, 0x74, 0x18, 0x8b, 0x4e, 0x1c, 0xff, 0x75, 0x14, 0x8d, 0x0c, 0x81, 0x8b, 0x45, 0xfc, 0x8b, 0x0c, 0x01, 0xff, 0x75, 0x10, 0x03, 0xc8, 0xff, 0xd1, 0x59, 0x59, 0x8b, 0x45, 0xfc, 0x5f, 0x5e, 0x5b, 0xc9, 0xc3, 0x55, 0x8b, 0xec, 0x64, 0xa1, 0x30, 0x00, 0x00, 0x00, 0x8b, 0x40, 0x0c, 0x8b, 0x40, 0x0c, 0x83, 0xec, 0x14, 0x53, 0x56, 0x57, 0xe9, 0x9f, 0x00, 0x00, 0x00, 0x8b, 0x71, 0x3c, 0x8b, 0x50, 0x2c, 0x8b, 0x74, 0x0e, 0x78, 0x83, 0x65, 0xf8, 0x00, 0x8b, 0x78, 0x30, 0x8b, 0x00, 0x89, 0x55, 0xec, 0x85, 0xf6, 0x0f, 0x84, 0x81, 0x00, 0x00, 0x00, 0x83, 0x65, 0xfc, 0x00, 0xc1, 0xea, 0x10, 0x33, 0xdb, 0x66, 0x3b, 0xda, 0x73, 0x2d, 0x8b, 0x55, 0xfc, 0x8a, 0x14, 0x17, 0xc1, 0x4d, 0xf8, 0x0d, 0x80, 0xfa, 0x61, 0x0f, 0xbe, 0xd2, 0x7c, 0x0c, 0x8b, 0x5d, 0xf8, 0x8d, 0x54, 0x13, 0xe0, 0x89, 0x55, 0xf8, 0xeb, 0x03, 0x01, 0x55, 0xf8, 0x0f, 0xb7, 0x55, 0xee, 0xff, 0x45, 0xfc, 0x39, 0x55, 0xfc, 0x72, 0xd3, 0x83, 0x65, 0xfc, 0x00, 0x03, 0xf1, 0x8b, 0x56, 0x20, 0x8b, 0x7e, 0x18, 0x03, 0xd1, 0x85, 0xff, 0x74, 0x34, 0x8b, 0x3a, 0x03, 0xf9, 0x33, 0xdb, 0x83, 0xc2, 0x04, 0x89, 0x7d, 0xf4, 0x0f, 0xbe, 0x3f, 0xc1, 0xcb, 0x0d, 0x03, 0xdf, 0x8b, 0x7d, 0xf4, 0x47, 0x80, 0x7f, 0xff, 0x00, 0x89, 0x7d, 0xf4, 0x75, 0xeb, 0x03, 0x5d, 0xf8, 0x3b, 0x5d, 0x08, 0x74, 0x1d, 0xff, 0x45, 0xfc, 0x8b, 0x7d, 0xfc, 0x3b, 0x7e, 0x18, 0x72, 0xcc, 0x8b, 0x48, 0x18, 0x85, 0xc9, 0x0f, 0x85, 0x56, 0xff, 0xff, 0xff, 0x33, 0xc0, 0x5f, 0x5e, 0x5b, 0xc9, 0xc3, 0x8b, 0x55, 0xfc, 0x8b, 0x46, 0x24, 0x8d, 0x04, 0x50, 0x0f, 0xb7, 0x04, 0x08, 0x8b, 0x56, 0x1c, 0x8d, 0x04, 0x82, 0x8b, 0x04, 0x08, 0x03, 0xc1, 0xeb, 0xe1 }; List<byte> newShellcode = new List<byte>(); if (Is64BitDLL(dllBytes)) { byte[] rdiShellcode = rdiShellcode64; int bootstrapSize = 34; // call next instruction (Pushes next instruction address to stack) newShellcode.Add(0xe8); newShellcode.Add(0x00); newShellcode.Add(0x00); newShellcode.Add(0x00); newShellcode.Add(0x00); //Here is where the we pop the address of our shellcode off the stack and into the first register // pop rcx newShellcode.Add(0x59); // mov r8, rcx - Backup our memory location to RCX before we start subtracting newShellcode.Add(0x49); newShellcode.Add(0x89); newShellcode.Add(0xc8); // Put the location of the DLL into RCX // add rcx, <Length of bootstrap> - 5 (For our call instruction) + <rdiShellcode Length> newShellcode.Add(0x48); newShellcode.Add(0x81); newShellcode.Add(0xc1); foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length))) newShellcode.Add(b); // mov edx, <hash of function> newShellcode.Add(0xba); foreach (byte b in BitConverter.GetBytes((uint)functionHash)) newShellcode.Add(b); // Put the location of our user data in // add r8, (Size of bootstrap) + <Length of RDI Shellcode> + <Length of DLL> newShellcode.Add(0x49); newShellcode.Add(0x81); newShellcode.Add(0xc0); foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length + dllBytes.Length))) newShellcode.Add(b); // mov r9d, <Length of User Data> newShellcode.Add(0x41); newShellcode.Add(0xb9); foreach (byte b in BitConverter.GetBytes((uint)userData.Length)) newShellcode.Add(b); //Write the rest of RDI foreach (byte b in rdiShellcode) newShellcode.Add(b); //Write our DLL dllBytes[0] = 0x00; dllBytes[1] = 0x00; foreach (byte b in dllBytes) newShellcode.Add(b); //Write our userdata foreach (byte b in userData) newShellcode.Add(b); } else // 32 Bit { byte[] rdiShellcode = rdiShellcode32; int bootstrapSize = 40; // call next instruction (Pushes next instruction address to stack) newShellcode.Add(0xe8); newShellcode.Add(0x00); newShellcode.Add(0x00); newShellcode.Add(0x00); newShellcode.Add(0x00); //Here is where the we pop the address of our shellcode off the stack and into the first register // pop ecx newShellcode.Add(0x58); // mov ebx, eax - copy our location in memory to ebx before we start modifying eax newShellcode.Add(0x89); newShellcode.Add(0xc3); // Put the location of the DLL into ECX // add eax, <size of bootstrap> + <Size of RDI Shellcode> newShellcode.Add(0x05); foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length))) newShellcode.Add(b); // add ebx, <size of bootstrap> + <Size of RDI Shellcode> + <Size of DLL> newShellcode.Add(0x81); newShellcode.Add(0xc3); foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length + dllBytes.Length))) newShellcode.Add(b); //push <Length of User Data> newShellcode.Add(0x68); foreach (byte b in BitConverter.GetBytes((uint)userData.Length)) newShellcode.Add(b); // push ebx newShellcode.Add(0x53); // push <hash of function> newShellcode.Add(0x68); foreach (byte b in BitConverter.GetBytes((uint)functionHash)) newShellcode.Add(b); // push eax newShellcode.Add(0x50); // call instruction - We need to transfer execution to the RDI assembly this way (Skip over our next few op codes) newShellcode.Add(0xe8); newShellcode.Add(0x04); newShellcode.Add(0x00); newShellcode.Add(0x00); newShellcode.Add(0x00); // add esp, 0x10 - RDI pushes things to the stack it never removes, we need to make the correction ourselves newShellcode.Add(0x83); newShellcode.Add(0xc4); newShellcode.Add(0x10); // ret - because we used call earlier newShellcode.Add(0xc3); //Write the rest of RDI foreach (byte b in rdiShellcode) newShellcode.Add(b); //Write our DLL dllBytes[0] = 0x00; dllBytes[1] = 0x00; foreach (byte b in dllBytes) newShellcode.Add(b); //Write our userdata foreach (byte b in userData) newShellcode.Add(b); } return newShellcode.ToArray(); } } "@ function ConvertTo-Shellcode{ [CmdletBinding()] Param( [Parameter(Mandatory=$True,Position=1)] [string]$File, [Parameter(Position=2)] [int]$FunctionHash = 0x30627745, [Parameter(Position=3)] [string]$UserData = "None" ) $Parameters = New-Object System.CodeDom.Compiler.CompilerParameters $Parameters.CompilerOptions += "/unsafe" Add-Type -TypeDefinition $Source -Language CSharp -CompilerParameters $Parameters $FileData = Get-Content $File -Encoding Byte $UserDataBytes = [system.Text.Encoding]::Default.GetBytes($UserData + "\0") [sRDI]::ConvertToShellcode($FileData, $FunctionHash, $UserDataBytes) }
combined_dataset/train/non-malicious/sample_42_27.ps1
sample_42_27.ps1
<# .SYNOPSIS Demonstrates how to write a command that works with paths that do not allow wildards but must exist. .DESCRIPTION This command does not require a LiteralPath parameter because the Path parameter can handle paths that use wildcard characters. That's because this command does not "resolve" the supplied path. .EXAMPLE C:\PS> Import-FileNoWildcard -Path ..\..\Tests\foo[1].txt -WhatIf This example shows how the Path parameter can handle a path that happens to use the wildcard chars "[" and "]". #> function Import-FileNoWildcard { [CmdletBinding(SupportsShouldProcess=$true)] param( # Specifies a path to one or more locations. [Parameter(Mandatory=$true, Position=0, ParameterSetName="Path", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Path to one or more locations.")] [Alias("PSPath")] [ValidateNotNullOrEmpty()] [string[]] $Path ) begin { } process { # Modify [CmdletBinding()] to [CmdletBinding(SupportsShouldProcess=$true)] $paths = @() foreach ($aPath in $Path) { if (!(Test-Path -LiteralPath $aPath)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$aPath' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$aPath $psCmdlet.WriteError($errRecord) continue } # Resolve any relative paths $paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath) } foreach ($aPath in $paths) { if ($pscmdlet.ShouldProcess($aPath, 'Operation')) { # Process each path $aPath } } } end { } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfzLutwn2+TZtl # ROHMHoV6NbYy6BXv9v/bMMcnE/HZ76CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJnq0gDB8hgni2ygCGyv375P # pSBWhmrOHH2a5cXZvIMbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAn49KpClnG0+Nc1fz2RDlFiq3hXW0zPnrFwmUntKMO4c7E4gM49cJfiQB # VwS1rdM+CQOihIGstpegXVqbf6OsVUW50+cw28UUgbfE5S7gTh6yDoGhrzu95WhK # cJ524EJXioJC3JXnEJEF7hrFtW6dN9n4KauRLZjvFGZYkxj44jZFKF54Yd/DMS2z # Gu0KWN7T2fIxi9VbpgPOswgTxlxT8zHOnzn3Y7Vl+I0UZqFCLmJO/GsWx8WkX4DG # tkU4+RU78FYpBK3zXTqtIFriOF3pAEXjBXZPaKBJM5y8zwsFn95Pc75iRm2CZYgZ # IontF/GDmLjtKCI/fhebmja53deSzaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCl50zcXyMEKdjPP/gh4bfEO7sSvHlcHubL/6d0VUM68AIGZjOsD7b7 # GBMyMDI0MDUwNDAwMDA1OC42MThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnfe+gwIhgPMjAyNDA1MDMyMzA2MTZaGA8yMDI0MDUwNDIzMDYxNlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6d976AIBADAHAgEAAgII5TAHAgEAAgIRdzAKAgUA # 6eDNaAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAE42BV4TjzrO4e8MzduR # TIhukwFONTrsablZ+qdQ+v7PGkBooZIwWxzYdZ6BggvWhANOZhkdONHTu2sJrmek # xj0YUvp+9m51Lqoxrf2ZqO8NEirR07NX7s1CxN1DU3pP9dQ6JXzA2aNE0xqySQzW # BUsdk9tsKuGv0axMCec0xjTvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgJuJ9/3GlX+Rp1i33wABOyp+Pzjbrp12IcuY8OLyMnRIwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEII+z1YG2NS3Xd7KHQ5AsD3zoHSOZnaxTAIWLw/sW9Jpc # MA0GCSqGSIb3DQEBCwUABIICAHFGjl7NAAm8ioel0mwiYZZ58rDdGWS7PdUSR2LJ # MKz2YprLlLrOd4XZV62Td2eFIyki8lEI81qw8DYyGrZHx5k2oRa6zZ0vqrBGYKJB # TptO9PDHvhunqfDLz8u+FKKfOFu1RG/EkIE6lRPF5Omw19Bv9lRxsFOsA7u40hnO # 9d6vMgBm2hrk0aEJYQUiKfVpayRCteEsI6sDNYqtF7tzNuyqrx+8Hx0CcyR4ALAB # zBT0HwYSL8/QojSDbzycjnoSYoQnw/KyuK13pwUEqkvdeP8vytbuabT5CUt4rWc+ # YTMso355S90c2dv/2nX3uwj4c52942iOoCCEQwhHwcqOTMoJw8XTO7Z80qxVB0Zf # KgA7bjAwTCvQqG5YbTweqVhc4mFKFyBMDOzKsixw0l2ZvbXMh2S0S8Hptbq/wU3b # sLK6jBApnCT1yW+nMwK+N00AEMo+70x/eHB5pTdcFb1GVo3UZWhldgBgcgac+PUj # r6Ckp+p2GvE7QtDZxetMsQxlzaizwWftRYdfSxwJNp5XWK5A/YhQ2v8Z7vo+KaLh # LYvRv/GVxK//yWtTRU9i6fw03XuB9ZOPvXKUAOj461pSem7/Ig85qSoLPXadIbbd # 58SruO7E7wtIII5EovbXcbGhbTI9ea/Cj+teX5i5qCaeiz2tak1UNPPnnNTKHgde # pTRV # SIG # End signature block
combined_dataset/train/non-malicious/ISE-Lines_3.ps1
ISE-Lines_3.ps1
#requires -version 2.0 ## ISE-Lines module v 1.1 ## DEVELOPED FOR CTP3 ## See comments for each function for changes ... ############################################################################################################## ## Provides Line cmdlets for working with ISE ## Duplicate-Line - Duplicates current line ## Conflate-Line - Conflates current and next line ## MoveUp-Line - Moves current line up ## MoveDown-Line - Moves current line down ## Delete-TrailingBlanks - Deletes trailing blanks in the whole script ############################################################################################################## ## Duplicate-Line ############################################################################################################## ## Duplicates current line ############################################################################################################## function Duplicate-Line { $editor = $psISE.CurrentFile.Editor $caret_row = $editor.CaretLine $caret_col = $editor.CaretColumn $this_line_text = $editor.Text.Split("`n")[$caret_row - 1].TrimEnd([environment]::NewLine) $editor.SetCaretPosition($caret_row, $this_line_text.length + 1) $editor.InsertText("`r`n" + $this_line_text) $editor.SetCaretPosition($caret_row, $caret_col) } ## Conflate-Line ############################################################################################################## ## Conflates current and next line ## v 1.1 fixed bug on last but one line and remove line continuation character while joining ############################################################################################################## function Conflate-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") if ( $caretLine -ne $text.Count ) { $line = $text[$caretLine -1] + $text[$caretLine] -replace ("(``)?`r", "") $newText = @() if ( $caretLine -gt 1 ) { $newText = $text[0..($caretLine -2)] } $newText += $line if ( $caretLine -ne $text.Count - 1) { $newText += $text[($caretLine +1)..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, $caretColumn) } } ## MoveUp-Line ############################################################################################################## ## Moves current line up ############################################################################################################## function MoveUp-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine if ( $caretLine -ne 1 ) { $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") $line = $text[$caretLine -1] $lineBefore = $text[$caretLine -2] $newText = @() if ( $caretLine -gt 2 ) { $newText = $text[0..($caretLine -3)] } $newText += $line $newText += $lineBefore if ( $caretLine -ne $text.Count ) { $newText += $text[$caretLine..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine - 1, $caretColumn) } } ## MoveDown-Line ############################################################################################################## ## Moves current line down ############################################################################################################## function MoveDown-Line { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") if ( $caretLine -ne $text.Count ) { $line = $text[$caretLine -1] $lineAfter = $text[$caretLine] $newText = @() if ( $caretLine -ne 1 ) { $newText = $text[0..($caretLine -2)] } $newText += $lineAfter $newText += $line if ( $caretLine -lt $text.Count -1 ) { $newText += $text[($caretLine +1)..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine +1, $caretColumn) } } ## Delete-TrailingBlanks ############################################################################################################## ## Deletes trailing blanks in the whole script ############################################################################################################## function Delete-TrailingBlanks { $editor = $psISE.CurrentOpenedFile.Editor $caretLine = $editor.CaretLine $newText = @() foreach ( $line in $editor.Text.Split("`n") ) { $newText += $line -replace ("\\s+$", "") } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, 1) } ############################################################################################################## ## Inserts a submenu Lines to ISE's Custum Menu ## Inserts command Duplicate Line to submenu Lines ## Inserts command Conflate Line Selected to submenu Lines ## Inserts command Move Up Line to submenu Lines ## Inserts command Move Down Line to submenu Lines ## Inserts command Delete Trailing Blanks to submenu Lines ############################################################################################################## if (-not( $psISE.CustomMenu.Submenus | where { $_.DisplayName -eq "Line" } ) ) { $lineMenu = $psISE.CustomMenu.Submenus.Add("_Lines", $null, $null) $null = $lineMenu.Submenus.Add("Duplicate Line", {Duplicate-Line}, "Ctrl+Alt+D") $null = $lineMenu.Submenus.Add("Conflate Line", {Conflate-Line}, "Ctrl+Alt+J") $null = $lineMenu.Submenus.Add("Move Up Line", {MoveUp-Line}, "Ctrl+Shift+Up") $null = $lineMenu.Submenus.Add("Move Down Line", {MoveDown-Line}, "Ctrl+Shift+Down") $null = $lineMenu.Submenus.Add("Delete Trailing Blanks", {Delete-TrailingBlanks}, "Ctrl+Shift+Del") }
combined_dataset/train/non-malicious/ShowUI Clock 6.ps1
ShowUI Clock 6.ps1
New-UIWidget -AsJob -Content { $shadow = DropShadowEffect -Color Black -Shadow 0 -Blur 8 $now = Get-Date; StackPanel { TextBlock -Name "Time" ('{0:h:mm tt}' -f $now) -FontSize 108 -LineHeight 100 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -Foreground White -Effect $shadow -FontFamily "Century Gothic" StackPanel -Orientation Horizontal { TextBlock -Name "Day" ('{0:dd}' -f $now) -FontSize 80 -LineHeight 80 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -Foreground White -Opacity 0.6 -Effect $shadow -FontFamily "Century Gothic" StackPanel { TextBlock -Name "Month" ('{0:MMMM}' -f $now).ToUpper() -fontsize 40 -LineHeight 40 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -FontFamily "Century Gothic" TextBlock -Name "Weekday" ('{0:dddd}' -f $now).ToUpper() -fontsize 28 -LineHeight 28 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -Foreground White -Effect $shadow -FontFamily "Century Gothic" } -Margin 0 } -Margin 0 } -Margin 0 } -Interval "0:0:0.2" -UpdateBlock { $now = Get-Date $Time.Text = '{0:h:mm tt}' -f $now $Day.Text = '{0:dd}' -f $now $Month.Text = ('{0:MMMM}' -f $now).ToUpper() $Weekday.Text = ('{0:dddd}' -f $now).ToUpper() }
combined_dataset/train/non-malicious/GPRS Online log_5.ps1
GPRS Online log_5.ps1
<# .SYNOPSIS Get-GprsTime (V3.3 Update for Windows 7) Check the total connect time of any GPRS devices from a specified date. Use Get-Help .\\Get-GprsTime -full to view Help for this file. .DESCRIPTION Display all the GPRS modem Event Log entries. While applications issued by the mobile phone manufacturers will invariably monitor only their own usage, this will show any logged GPRS activity, be it via PCMCIA, USB, mobile phone, etc. Use the -Verbose switch for some extra information if desired. A default value can be set with the -Monthly switch but can be temporarily overridden with any -Start value and deleted by entering an invalid date. Now uses .NET Parse to use any culture date input. Switches -M and -S cannot be used together. A Balloon prompt will be issued in the Notification area for the 5 days before the nominal month end. NOTE: this can effectively be suppressed by using a value higher than the SIM card term, ie something like -Account 90 for a 30 day card which will override the default setting. Use -Today to check only today's usage. Define a function in $profile to set any permanent switches, for example to set the account value permanently to 30 days. function GPRS { Invoke-Expression "Get-GprsTime -Account 30 $args" } .EXAMPLE .\\Get-GprsTime.ps1 -Monthly 4/8/2011 This will set the default search date to start from 4/8/2011 and is used to reset the start date each month for the average 30/31 day SIM card. .EXAMPLE .\\Get-GprsTime.ps1 -Start 12/07/2009 -Account 100 -Verbose Search from 12/07/2011 and also show (Verbose) details for each session. The Account switch will override any balloon prompt near the SIM expiry date. .EXAMPLE .\\Get-GprsTime.ps1 5/9/2011 -v Search one day only and show session details. .EXAMPLE .\\Get-GprsTime.ps1 -Today Show all sessions for today. This always defaults to verbose output. .EXAMPLE .\\Get-GprsTime.ps1 -Debug This shows the first available Event Log record & confirms switch settings. (Note that it will probably not be the first 'RemoteAccess' or 'RasClient' record). .NOTES A shorter total time than that actually used will result if the Event Log does not contain earlier dates; just increase the log size in such a case. The author can be contacted at www.SeaStarDevelopment.Bravehost.com and a (binary compiled) Module version of this procedure is included in the file Gprs3xxx.zip download there; the execution time of the module being about 10 times faster than this script. Use '(measure-Command {.\\Get-GprsTime}).TotalSeconds' to confirm the times. For the Event Log to record connect & disconnect events, the modem software should be set to RAS rather than NDIS if possible. #> Param ([String] $start, [String] $monthly, [Int] $account = 0, #Start warning prompt 5 days before month end. [Switch] $today, [Switch] $verbose, [Switch] $debug) Trap [System.Management.Automation.MethodInvocationException] { [Int]$line = $error[0].InvocationInfo.ScriptLineNumber [System.Media.SystemSounds]::Hand.Play() if ($line -eq 197) { Write-Warning "[$name] Current GPRS variable has been deleted." $monthly = "" [Environment]::SetEnvironmentVariable("GPRS",$monthly,"User") } else { Write-Warning "[$name] Date is missing or invalid $SCRIPT:form" } exit 1 } #Establish the Operating System...We only need to confirm XP here. #The result will be written to the 'out' variable '$osv'. function Get-OSVersion($computer,[ref]$osv) { $os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer Switch -regex ($os.Version) { '^5\\.1\\.(\\d{1,4})$' { $osv.value = "xp" } #Find XP & variants. default { $osv.value = "unknown" } } } $osv = $null Get-OSVersion -computer 'localhost' -osv ([ref]$osv) if ($osv -eq 'xp') { $logname = 'System' $connEvent = 20158 $discEvent = 20159 $source = 'RemoteAccess' } else { #Treat As Vista or Windows 7. $logname = 'Application' $connEvent = 20225 $discEvent = 20226 $source = 'RasClient' } $entryType = 'Information' $logEntry = $null $oldest = Get-eventlog -LogName $logname | #Get the earliest Log record. Sort-Object TimeGenerated | Select-Object -first 1 if ($oldest.TimeGenerated) { $logEntry = "System Event records available from - $($oldest.TimeGenerated.ToLongDateString())" } $name = $myInvocation.MyCommand $newLine = "[$name] The switches -Start and -Monthly can only be used separately." if ($debug) { $DebugPreference = 'Continue' } if ($start -and $monthly) { [System.Media.SystemSounds]::Hand.Play() Write-Warning "$newLine" exit 1 } $SCRIPT:form = "" #In certain cases Culture & UICulture can be different and have been known to # return conflicting results regarding '-is [DateTime]' queries, etc. if ($Host.CurrentCulture -eq $Host.CurrentUICulture) { $SCRIPT:form = '-Use format mm/dd/year' [Int]$culture = "{0:%d}" -f [DateTime] "6/5/2009" #Returns local day. If ($culture -eq 6) { $SCRIPT:form = '-Use format dd/mm/year' } } $ErrorActionPreference = 'SilentlyContinue' $VerbosePreference = 'SilentlyContinue' $WarningPreference = 'Continue' $conn = $disc = $default = $print = $null $timeNow = [DateTime]::Now $total = $timeNow - $timeNow #Set initial value to 00:00:00. $insert = "since" if ($verbose) { $VerbosePreference = 'Continue' } function CreditMsg ($value, $value2) { $value = [Math]::Abs($value) $prefix = "CURRENT" [DateTime] $creditDT = $value2 $creditDT = $creditDT.AddDays($value) #Add the -Account days. $thisDay = "{0:M/d/yyyy}" -f [DateTime]::Now #Force US format. #If we use '$number = $creditDT - (Get-Date)' instead of the line below we #can sometimes get a value of 1 returned instead 2, hence the above lines. $number = $creditDT - [DateTime] $thisDay [String] $credit = $creditDT $credit = $credit.Replace('00:00:00','') #Remove any trailing time. $credit = "{0:d}" -f [DateTime]$credit Switch($number.Days) { 1 {$prefix = "($value days) will expire tomorrow"; break} 0 {$prefix = "($value days) will expire today"; break} -1 {$prefix = "($value days) expired yesterday"; break} {($_ -lt 0)} {$prefix = "($value days) expired on $credit"; break} {($_ -le 5)} {$prefix = "($value days) will expire on $credit"} Default {$prefix = "CURRENT"} #Only come here if over 5 days. } return $prefix } function Interval ([String] $value) { Switch -regex ($value) { '^00:00:\\d+(.*)$' {$suffix = "seconds"; break} '^00:\\d+:\\d+(.*)$' {$suffix = "minutes"; break} '^\\d+:\\d+:\\d+(.*)$' {$suffix = " hours"; break} '^(\\d+)\\D(\\d+)(.*)$' {$suffix = " hours" $pDays = $matches[1] $pHours = $matches[2] [string]$pMinSec = $matches[3] [string]$tHours = (([int]$pDays) * 24)+[int]$pHours $value = $tHours + $pminSec; break} default {$suffix = " hours"} #Should never come here! } return "$value $suffix" } function CheckSetting ($value) { if ($value) { #Correct for local culture. $print = $default.ToShortDateString() } else { $print = "(Value not set)" } return $print } #The Script effectively starts here............................................. $getGprs = [Environment]::GetEnvironmentVariable("GPRS","User") #First check for GPRS variable and change from US date format to current locale. if ([DateTime]::TryParse($getGprs, [Ref]$timeNow)) { #No error as date is valid. $default = "{0:d}" -f [datetime]$getGprs $default = [DateTime]::Parse($default) $checkParts = "{0:yyyy},{0:%M}" -f $default $times = $checkParts.Split(',') $dayCount = [DateTime]::DaysInMonth($times[0],$times[1]) #Range 28-31. if($account -eq 0) { $account = $dayCount $summary = "$($dayCount.ToString()) days" } else { $summary = "$($account.Tostring()) days" } $text = CreditMsg $account $getGprs #Check if within 5 days of expiry date. if ($text -ne "CURRENT") { [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon $objNotifyIcon.Icon = [System.Drawing.SystemIcons]::Exclamation $objNotifyIcon.BalloonTipIcon = "Info" $objNotifyIcon.BalloonTipTitle = "GPRS online account" $objNotifyIcon.BalloonTipText = "Credit $text" $objNotifyIcon.Visible = $True $objNotifyIcon.ShowBalloonTip(10000) } } else { $summary = "(Days not set)" if ((!$today) -and (!$monthly) -and (!$start)) { [System.Media.SystemSounds]::Hand.Play() Write-Warning("Monthly date is either invalid or not set.") exit 1 } } if ($start) { $start = [DateTime]::Parse($start) #Trigger TRAP if invalid! [DateTime]$limit = $start $convert = "{0:D}" -f $limit $print = CheckSetting $default } if ($monthly) { $start = [DateTime]::Parse($monthly) #Trigger TRAP if invalid! Write-Output "Setting GPRS (monthly) environment variable to: $monthly" $gprs = [String]$start.Replace('00:00:00','') [Environment]::SetEnvironmentVariable("GPRS",$gprs,"User") [DateTime] $limit = $start #Change to required US date format. $convert = "{0:D}" -f $limit $print = $limit.ToShortDateString() $summary = "(Days undetermined)" #Will show next time around. } if ($today) { $verBosePreference = 'Continue' #Show VERBOSE by default. [DateTime] $limit = (Get-Date) $convert = "{0:D}" -f $limit $limit = $limit.Date #Override any start date if using -Today input. $insert = "for today" $print = CheckSetting $default } if ((!$today) -and (!$monthly) -and (!$start)) { if ($default) { $monthly = $default [DateTime] $limit = $monthly $convert = "{0:D}" -f $limit $print = CheckSetting $default } } Write-Verbose "All records $($insert.Replace('for ','')) - $convert" Write-Verbose "Script activation - User [$($env:UserName)] Computer [$($env:ComputerName)]" Write-Output "" Write-Output "Calculating total connect time of all GPRS modem devices..." #We cannot proceed beyond here without a valid $limit value. Write-Debug "Using - [Search date] $($limit.ToShortDateString()) [Account] $summary [GPRS Monthly] $print" if ($logEntry) { Write-Debug "$logEntry" } $lines = Get-EventLog $logname | Where-Object {($_.TimeGenerated -ge $limit) -and ` ($_.EventID -eq $discEvent -or $_.EventID -eq $connEvent)} if ($lines) { Write-Verbose "A total of $([Math]::Truncate($lines.Count/2)) online sessions extracted from the System Event Log." } else { Write-Output "(There are no events indicated in the System Event Log)" } $lines | ForEach-Object { $source = $_.Source if ($_.EventID -eq $discEvent) { #Event 20159 is Disconnect. $disc = $_.TimeGenerated } else { #Event 20158 is Connect. $conn = $_.TimeGenerated } #We are only interested in matching pairs of DISC/CONN... if ($disc -ne $null -and $conn -ne $null -and $disc -gt $conn) { $diff = $disc - $conn $total += $diff $convDisc = "{0:G}" -f $disc $convConn = "{0:G}" -f $conn $period = Interval $diff Write-Verbose "Disconnect at $convDisc. Online - $period" Write-Verbose " Connect at $convConn." } } #End ForEach if (!$source) { $source = '(Undetermined)' } Write-Verbose "Using local event source - System Event Log [$source]" $period = Interval $total Write-Output "Total online usage $insert $convert is $($period.Replace(' ',' '))." Write-Output ""
combined_dataset/train/non-malicious/sample_30_39.ps1
sample_30_39.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates a FHIR Service resource with the specified parameters. .Description Creates or updates a FHIR Service resource with the specified parameters. .Example PS C:\> New-AzHealthcareFhirService -Name azpsfhirservice -ResourceGroupName azps_test_group -WorkspaceName azpshcws -Location eastus2 -Kind 'fhir-R4' -Authority "https://login.microsoftonline.com/{DirectoryID}" -Audience "https://azpshcws-{FhirServiceName}.fhir.azurehealthcareapis.com" Location Name Kind ResourceGroupName -------- ---- ---- ----------------- eastus2 azpshcws/azpsfhirservice fhir-R4 azps_test_group .Outputs Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IFhirService .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. ACCESSPOLICYOBJECTID <IFhirServiceAccessPolicyEntry[]>: Fhir Service access policies. ObjectId <String>: An Azure AD object ID (User or Apps) that is allowed access to the FHIR service. ACRCONFIGURATIONOCIARTIFACT <IServiceOciArtifactEntry[]>: The list of Open Container Initiative (OCI) artifacts. [Digest <String>]: The artifact digest. [ImageName <String>]: The artifact name. [LoginServer <String>]: The Azure Container Registry login server. .Link https://learn.microsoft.com/powershell/module/az.healthcareapis/new-azhealthcarefhirservice #> function New-AzHealthcareFhirService { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IFhirService])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Alias('FhirServiceName')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')] [System.String] # The name of FHIR Service resource. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')] [System.String] # The name of the resource group that contains the service instance. ${ResourceGroupName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')] [System.String] # The name of workspace resource. ${WorkspaceName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The subscription identifier. ${SubscriptionId}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IFhirServiceAccessPolicyEntry[]] # Fhir Service access policies. # To construct, see NOTES section for ACCESSPOLICYOBJECTID properties and create a hash table. ${AccessPolicyObjectId}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String[]] # The list of the Azure container registry login servers. ${AcrConfigurationLoginServer}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IServiceOciArtifactEntry[]] # The list of Open Container Initiative (OCI) artifacts. # To construct, see NOTES section for ACRCONFIGURATIONOCIARTIFACT properties and create a hash table. ${AcrConfigurationOciArtifact}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.Management.Automation.SwitchParameter] # If credentials are allowed via CORS. ${AllowCorsCredential}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String] # The audience url for the service ${Audience}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String] # The authority url for the service ${Authority}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String[]] # The headers to be allowed via CORS. ${CorsHeader}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.Int32] # The max age to be allowed via CORS. ${CorsMaxAge}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String[]] # The methods to be allowed via CORS. ${CorsMethod}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String[]] # The origins to be allowed via CORS. ${CorsOrigin}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.Management.Automation.SwitchParameter] # If the SMART on FHIR proxy is enabled ${EnableSmartProxy}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String] # An etag associated with the resource, used for optimistic concurrency when editing it. ${Etag}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String] # The name of the default export storage account. ${ExportStorageAccountName}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.ServiceManagedIdentityType])] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.ServiceManagedIdentityType] # Type of identity being specified, currently SystemAssigned and None are allowed. ${IdentityType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IUserAssignedIdentities]))] [System.Collections.Hashtable] # The set of user assigned identities associated with the resource. # The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. # The dictionary values can be empty objects ({}) in requests. ${IdentityUserAssignedIdentity}, [Parameter(Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirServiceKind])] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirServiceKind] # The kind of the service. ${Kind}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [System.String] # The resource location. ${Location}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.PublicNetworkAccess])] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.PublicNetworkAccess] # Control permission for data plane traffic coming from public networks while private endpoint is enabled. ${PublicNetworkAccess}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirResourceVersionPolicy])] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirResourceVersionPolicy] # The default value for tracking history across all resources. ${ResourceVersionPolicyConfigurationDefault}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IResourceVersionPolicyConfigurationResourceTypeOverrides]))] [System.Collections.Hashtable] # A list of FHIR Resources and their version policy overrides. ${ResourceVersionPolicyConfigurationResourceTypeOverride}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IResourceTags]))] [System.Collections.Hashtable] # Resource tags. ${Tag}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { Az.HealthcareApis.internal\New-AzHealthcareFhirService @PSBoundParameters } catch { throw } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZ+r24npWnhqkc # yaf1oqQ/tEB1fQOY4To7osDKdoxjm6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAqq24lGlbJgWVpwcfJQF5Xn # OneyOZAf0dQ91a3Zs585MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAu3XtHFHdgrQPJJKn/1o5Mfo/CCN2bii/lt9MG4fUEWOCmHSjNjReUGBF # kRExqqtu0Wr/jegZkTTL7gqIAXJZxCIfnRoE43EIm4KoUXmhtOFFEMtVt2qD2jDq # rUzxJXgDdSf7DwuHfgX4GRcY/XamNFkKXd8JuequCGAXalRk1oSsZ33S9y+kSZKY # tTjF40r8XEYEL8vVAQFqdygACGm3AvFIPBWZPdUdmqNdAJNJxcsgzTTkRpGS1P+q # ffGw0yJieE6fYlgwKe+vel36eUMSYY5VEoQvKhZataaCtEEPnmVPbJa4Sv+hry0h # Og9mStd4+MeADs39L1A7YBVtXnHkrqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDmxIDsQRknz0aYgbuCkAfqovhqTebip16rlX/ZezOy6gIGZhf9t0+2 # GBMyMDI0MDQyMzEzMTYxMS4zMDhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGk+zAiGA8yMDI0MDQyMzAzMDk0 # N1oYDzIwMjQwNDI0MDMwOTQ3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0aT7 # AgEAMAoCAQACAh2yAgH/MAcCAQACAhQBMAoCBQDp0vZ7AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAG3Tuff4zR8zcaVgTLUDfl0xfRocWtx6pvLTWn5lo6N9 # Ak/XTdyVZV3oFZBAbtKglmbTcLN40qFbmrGuTqIuiHb7JQZlTjW5F+EQgD7YsS4c # wJ6YQVFrXtZDUB0EICL7yMptISLaBGXZPelWUJ7qLaIFu9jwk1lhSiJBBWtmOqXf # qbtcuT8D1Y1cggfTZkt8vGF4GZRkEaQwd14QQKGm8fLz4WwtzneqbM0vXhNcJy6o # Q/GCqSvXz1qE8em5Ym2ZtBL14QDm8x+/D8tLpZXCx6+AsR26NUgkkQjRyuEunW+c # KSokVvA6lrCyTg8VerFU7w8xbfbO2/dRz4EkBrijI9MxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDi7R7AN/o1HsESpYk6P8Pm3mPCZkSVUOVzQlVdTt9h # ajCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgkSVAVMCQP43gRUUZLldZpT1L # MwzkyidT5GxFNcH73KkwDQYJKoZIhvcNAQELBQAEggIAtBKztfA/zdyw/6HJVL/u # FStLWPx4yZO7+M0bFjfD18UPdhubncPBgVN9Mr2WO64wiQy1NGftssnhXu/DwF/W # ZM28lKV7/03jvSXSceJKlsOHognaI0O9szEEdL9MwV+kWOp+BXP2Ab+oHWLfbFaH # f+2Dzup/HiJ1mXF2Qu+V9YvG2Om7D7Iws7B0KbEjNpzllnl1GLZImUS5UMMJb0iU # MrN97bgrNlPVswOP26Dh403haj/i+3gvDFI6aGBbBSc9x1BGKLw8NXJ1JIRgTRYq # nwvL/zgMgZhhciVLQgDcjM7tNHjVeNsL3N97c+i40jt0pWJ0ciO3OpyDHiQidnBa # egFMcefYXwmQbqYXgJg6LbgaGiHYgNLRs5WsgLy9G/E22FrushLJV6doR1mA0OJd # +vI/3aSRKdhyVoyHyXMfPrfUxoRlXHbhnHiMkHK5hTqnkyeKfmBUI9+yBjTLB0CI # YEI2XAjhBeToPx+jFDw3Opu5TbN+nPd3jDk3EmNnosOTwK8nZOZ9ATSBAyeYEmXW # 040hmmsr8/ggj+8uo7dmBhksvloQyx1/aVtlUeyxWJXuwpYXK0AuUlR9XlraXOda # v9m4Ohre2Wk+bJ1b+qKpArNZLlQLM3dDJIFcOCfzYxWX0TsJ6PCufl2NknWNCIOW # jPDDsuLUlKkXn/k22JcTMqI= # SIG # End signature block
combined_dataset/train/non-malicious/sample_4_42.ps1
sample_4_42.ps1
ConvertFrom-StringData @' id_vssbackuppkgfiles=Windows Server Backup Files id_vssbackuppkgfilesobtaining=Obtaining Windows Server Backup log files '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOvlPZ227+vUpg # 5DcajLEanyZ2bO0Mu45dr/sn9VubnKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP+HDMXTTNWjy26gRAN+ef+B # 79aqvm+f2LbTAmHkoUNNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAWKGPTxW2U6Mcz2aMRpYkrDk6TPJoo28kdrUbv4v8muvz7TK/EXj+SJ0f # gZltE2jo9CMja9H5lOqN32YX4pSR8hKaaIPT5VIGV12eyWFmHizE17yP4n2fDogn # E3o+Kh80jsMbIfK8r5nftczXga+wzypYKt6c169BFcJBDG3Gh+AkoONW6BqMreY9 # JE5B3qjhbsXPc9My4W4ML65pDlRDLV/ZRJ2I9IffWG7lSGqvK7g+vuqOFg0GewlR # /Jj3IaBQNjhlnZ8fD2k36NEpXyFvjxbAV+nDxZ6nZGiF+Fi9EvLzqAaOiTTYAGwx # ZfbxpzLo0fyy8Jfv+t19GAaAzcHIQaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAODfZ6wfl2ALSBdxGsUL0mFbFsiA1U3cC1TNtxVodgKwIGZusyQ1dK # GBMyMDI0MTAyODExNDA0MS4yODZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu # 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6 # FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B # EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b # tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ # X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP # 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP # 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp # 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2 # uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG # cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d # OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8 # +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr # YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ # 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE # DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9 # uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp # Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n # +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath # RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX # XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4 # CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE # rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD # hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK # AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y # M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7 # RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j # /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty # l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1 # Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP # 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgrQ3Ahdr+NwzW # 1RjrY68n0tl7k67HEzs2lgqxOqFAW54wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9 # MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB # CwUABIICAJGPQsNrAe1kcDIZqEekUpAiTT0uTNvtBlFX6ytKd3/LN05VJg+C8Y5A # +E8koc0O4mT04yY6ICZE4pc/L1OlK/VLB/T5mkHeJkD6qZu4Ni/3sFFDLFbjc1wy # KfSQQZXX9gH/GJCG/gu58yUQMZcZl4qACnPyX/9bk46x7F27hM14B6uHrKVWUNJ1 # E5Wx6ZdJU9UedE+fHMeoEhDezK9utujtkDo14cObgm8IRQLyAyN7Xoyp46LNZyBb # fVIgCB3LxFJYyAaCLBfQtuqicRYuRQZ1gpzHdfBsmzwOBv+ov+WQfNZy3JLN3WCl # QRn8inntPr/ubzSnvlR4OofG0w7gwkLkF5N4bFsFVysh3Ca69JlXirxZdQxXGMsT # 75C1ML+24MhB36UQK1G6/0VrS2Z4iL3his7pOxcSuTfwMMrWmZZCUnjh45AVZrzH # tlGhQKE0YpOHvUwCO4w9jNYMO1T6lKWFMBLJSoFzeJkGpgIQKFXGV3nCCkt6IZBs # L1IEYvYNxWTluxu9WmLB3nGHE3WEwxVhCrJI7ZFJvwjGNH3Lw64KdjVcnjh+ZkCy # sIHPBK7AyCTH7fKomDKvDVZBpA1zJWdtbmYrFXp8QWGQCmbqKwS4tOd6a6XB99Ay # nSRM2Wf1ruS34qTJBz2C90/NMK486hmN7wriHTDgugT1JPclyAjM # SIG # End signature block
combined_dataset/train/non-malicious/1993.ps1
1993.ps1
using namespace System.Diagnostics Describe 'minishell for native executables' -Tag 'CI' { BeforeAll { $powershell = Join-Path -Path $PsHome -ChildPath "pwsh" } Context 'Streams from minishell' { It 'gets a hashtable object from minishell' { $output = & $powershell -noprofile { @{'a' = 'b'} } ($output | Measure-Object).Count | Should -Be 1 $output | Should -BeOfType 'Hashtable' $output['a'] | Should -Be 'b' } It 'gets the error stream from minishell' { $output = & $powershell -noprofile { Write-Error 'foo' } 2>&1 ($output | Measure-Object).Count | Should -Be 1 $output | Should -BeOfType 'System.Management.Automation.ErrorRecord' $output.FullyQualifiedErrorId | Should -Be 'Microsoft.PowerShell.Commands.WriteErrorException' } It 'gets the information stream from minishell' { $output = & $powershell -noprofile { Write-Information 'foo' } 6>&1 ($output | Measure-Object).Count | Should -Be 1 $output | Should -BeOfType 'System.Management.Automation.InformationRecord' $output | Should -Be 'foo' } } Context 'Streams to minishell' { It "passes input into minishell" { $a = 1,2,3 $val = $a | & $powershell -noprofile -command { $input } $val.Count | Should -Be 3 $val[0] | Should -Be 1 $val[1] | Should -Be 2 $val[2] | Should -Be 3 } } } Describe "ConsoleHost unit tests" -tags "Feature" { BeforeAll { $powershell = Join-Path -Path $PsHome -ChildPath "pwsh" $ExitCodeBadCommandLineParameter = 64 function NewProcessStartInfo([string]$CommandLine, [switch]$RedirectStdIn) { return [ProcessStartInfo]@{ FileName = $powershell Arguments = $CommandLine RedirectStandardInput = $RedirectStdIn RedirectStandardOutput = $true RedirectStandardError = $true UseShellExecute = $false } } function RunPowerShell([ProcessStartInfo]$si) { $process = [Process]::Start($si) return $process } function EnsureChildHasExited([Process]$process, [int]$WaitTimeInMS = 15000) { $process.WaitForExit($WaitTimeInMS) if (!$process.HasExited) { $process.HasExited | Should -BeTrue $process.Kill() } } } AfterEach { $Error.Clear() } It "Clear-Host does not injects data into PowerShell output stream" { & { Clear-Host; 'hi' } | Should -BeExactly 'hi' } Context "ShellInterop" { It "Verify Parsing Error Output Format Single Shell should throw exception" { { & $powershell -outp blah -comm { $input } } | Should -Throw -ErrorId "IncorrectValueForFormatParameter" } It "Verify Validate Dollar Error Populated should throw exception" { $origEA = $ErrorActionPreference $ErrorActionPreference = "Stop" $a = 1,2,3 $e = { $a | & $powershell -noprofile -command { wgwg-wrwrhqwrhrh35h3h3} } | Should -Throw -ErrorId "CommandNotFoundException" -PassThru $e.ToString() | Should -Match "wgwg-wrwrhqwrhrh35h3h3" $ErrorActionPreference = $origEA } It "Verify Validate Output Format As Text Explicitly Child Single Shell does not throw" { { "blahblah" | & $powershell -noprofile -out text -com { $input } } | Should -Not -Throw } It "Verify Parsing Error Input Format Single Shell should throw exception" { { & $powershell -input blah -comm { $input } } | Should -Throw -ErrorId "IncorrectValueForFormatParameter" } } Context "CommandLine" { It "simple -args" { & $powershell -noprofile { $args[0] } -args "hello world" | Should -Be "hello world" } It "array -args" { & $powershell -noprofile { $args[0] } -args 1,(2,3) | Should -Be 1 (& $powershell -noprofile { $args[1] } -args 1,(2,3))[1] | Should -Be 3 } foreach ($x in "--help", "-help", "-h", "-?", "--he", "-hel", "--HELP", "-hEl") { It "Accepts '$x' as a parameter for help" { & $powershell -noprofile $x | Where-Object { $_ -match "pwsh[.exe] -Help | -? | /?" } | Should -Not -BeNullOrEmpty } } It "Should accept a Base64 encoded command" { $commandString = "Get-Location" $encodedCommand = [System.Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes($commandString)) $expected = & $powershell -noprofile -command $commandString $actual = & $powershell -noprofile -EncodedCommand $encodedCommand $actual | Should -Be $expected } It "-Version should return the engine version using: -version <value>" -TestCases @( @{value = ""}, @{value = "2"}, @{value = "-command 1-1"} ) { $currentVersion = "PowerShell " + $PSVersionTable.GitCommitId.ToString() $observed = & $powershell -version $value 2>&1 $observed | Should -Be $currentVersion $LASTEXITCODE | Should -Be 0 } It "-File should be default parameter" { Set-Content -Path $testdrive/test -Value "'hello'" $observed = & $powershell -NoProfile $testdrive/test $observed | Should -Be "hello" } It "-File accepts scripts with and without .ps1 extension: <Filename>" -TestCases @( @{Filename="test.ps1"}, @{Filename="test"} ) { param($Filename) Set-Content -Path $testdrive/$Filename -Value "'hello'" $observed = & $powershell -NoProfile -File $testdrive/$Filename $observed | Should -Be "hello" } It "-File should pass additional arguments to script" { Set-Content -Path $testdrive/script.ps1 -Value 'foreach($arg in $args){$arg}' $observed = & $powershell -NoProfile $testdrive/script.ps1 foo bar $observed.Count | Should -Be 2 $observed[0] | Should -Be "foo" $observed[1] | Should -Be "bar" } It "-File should be able to pass bool string values as string to parameters: <BoolString>" -TestCases @( @{BoolString = '$truE'}, @{BoolString = '$falSe'}, @{BoolString = 'trUe'}, @{BoolString = 'faLse'} ) { param([string]$BoolString) Set-Content -Path $testdrive/test.ps1 -Value 'param([string]$bool) $bool' $observed = & $powershell -NoProfile -Nologo -File $testdrive/test.ps1 -Bool $BoolString $observed | Should -Be $BoolString } It "-File should be able to pass bool string values as string to positional parameters: <BoolString>" -TestCases @( @{BoolString = '$tRue'}, @{BoolString = '$falSe'}, @{BoolString = 'tRUe'}, @{BoolString = 'fALse'} ) { param([string]$BoolString) Set-Content -Path $testdrive/test.ps1 -Value 'param([string]$bool) $bool' $observed = & $powershell -NoProfile -Nologo -File $testdrive/test.ps1 $BoolString $observed | Should -BeExactly $BoolString } It "-File should be able to pass bool string values as bool to switches: <BoolString>" -TestCases @( @{BoolString = '$tRue'; BoolValue = 'True'}, @{BoolString = '$faLse'; BoolValue = 'False'}, @{BoolString = 'tRue'; BoolValue = 'True'}, @{BoolString = 'fAlse'; BoolValue = 'False'} ) { param([string]$BoolString, [string]$BoolValue) Set-Content -Path $testdrive/test.ps1 -Value 'param([switch]$switch) $switch.IsPresent' $observed = & $powershell -NoProfile -Nologo -File $testdrive/test.ps1 -switch:$BoolString $observed | Should -Be $BoolValue } It "-File '<filename>' should return exit code from script" -TestCases @( @{Filename = "test.ps1"}, @{Filename = "test"} ) { param($Filename) Set-Content -Path $testdrive/$Filename -Value 'exit 123' & $powershell $testdrive/$Filename $LASTEXITCODE | Should -Be 123 } It "A single dash should be passed as an arg" { $testScript = @' [CmdletBinding()]param( [string]$p1, [string]$p2, [Parameter(ValueFromPipeline)][string]$InputObject ) process{ $input.replace($p1, $p2) } '@ $testFilePath = Join-Path $TestDrive "test.ps1" Set-Content -Path $testFilePath -Value $testScript $observed = echo hello | pwsh -noprofile $testFilePath e - $observed | Should -BeExactly "h-llo" } It "Empty command should fail" { pwsh -noprofile -c '' $LASTEXITCODE | Should -Be 64 } It "Whitespace command should succeed" { pwsh -noprofile -c ' ' | Should -BeNullOrEmpty $LASTEXITCODE | Should -Be 0 } } Context "-Login pwsh switch" { BeforeAll { $profilePath = "~/.profile" $backupProfilePath = "profile.bak" if (Test-Path $profilePath) { Move-Item -Path $profilePath -Destination $backupProfilePath -Force } $envVarName = 'PSTEST_PROFILE_LOAD' $guid = New-Guid Set-Content -Force -Path $profilePath -Value @" export $envVarName='$guid' "@ } AfterAll { if (Test-Path $backupProfilePath) { Move-Item -Path $backupProfilePath -Destination $profilePath -Force } } It "Doesn't run the login profile when -Login not used" { $result = & $powershell -Command "`$env:$envVarName" $result | Should -BeNullOrEmpty $LASTEXITCODE | Should -Be 0 } It "Doesn't falsely recognise -Login when elsewhere in the invocation" { $result = & $powershell -nop -c 'Write-Output "-login"' $result | Should -BeExactly '-login' $LASTEXITCODE | Should -Be 0 } It "Doesn't falsely recognise -Login when used after -Command" { $result = & $powershell -nop -c 'Write-Output' -Login $result | Should -BeExactly '-Login' $LASTEXITCODE | Should -Be 0 } It "Accepts the <LoginSwitch> switch for -Login and behaves correctly" -TestCases @( @{ LoginSwitch = '-l' } @{ LoginSwitch = '-L' } @{ LoginSwitch = '-login' } @{ LoginSwitch = '-Login' } @{ LoginSwitch = '-LOGIN' } @{ LoginSwitch = '-log' } ) { param($LoginSwitch) $result = & $powershell $LoginSwitch -NoProfile -Command "`$env:$envVarName" if ($IsWindows) { $result | Should -BeNullOrEmpty $LASTEXITCODE | Should -Be 0 return } $result | Should -BeExactly $guid $LASTEXITCODE | Should -Be 0 } It "Starts as a login shell with '-' prepended to name" -Skip:(-not (Get-Command -Name /bin/bash -ErrorAction Ignore)) { $quoteEscapedPwsh = $powershell.Replace("'", "\'") $pwshCommand = "`$env:$envVarName" $bashCommand = "exec -a '-pwsh' '$quoteEscapedPwsh' -NoProfile -Command '`$env:$envVarName' ''" $result = /bin/bash -c $bashCommand $result | Should -BeExactly $guid $LASTEXITCODE | Should -Be 0 } } Context "-SettingsFile Commandline switch" { BeforeAll { if ($IsWindows) { $CustomSettingsFile = Join-Path -Path $TestDrive -ChildPath 'Powershell.test.json' $DefaultExecutionPolicy = 'RemoteSigned' } } BeforeEach { if ($IsWindows) { Set-Content -Path $CustomSettingsfile -Value "{`"Microsoft.PowerShell:ExecutionPolicy`":`"$DefaultExecutionPolicy`"}" -ErrorAction Stop } } It "Verifies PowerShell reads from the custom -settingsFile" -skip:(!$IsWindows) { $actualValue = & $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {(Get-ExecutionPolicy -Scope LocalMachine).ToString()} $actualValue | Should -Be $DefaultExecutionPolicy } It "Verifies PowerShell writes to the custom -settingsFile" -skip:(!$IsWindows) { $expectedValue = 'AllSigned' & $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {Set-ExecutionPolicy -ExecutionPolicy AllSigned -Scope LocalMachine } $content = (Get-Content -Path $CustomSettingsFile | ConvertFrom-Json) $content.'Microsoft.PowerShell:ExecutionPolicy' | Should -Be $expectedValue $actualValue = & $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {(Get-ExecutionPolicy -Scope LocalMachine).ToString()} $actualValue | Should -Be $expectedValue } It "Verify PowerShell removes a setting from the custom -settingsFile" -skip:(!$IsWindows) { & $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {Set-ExecutionPolicy -ExecutionPolicy Undefined -Scope LocalMachine } $content = (Get-Content -Path $CustomSettingsFile | ConvertFrom-Json) $content.'Microsoft.PowerShell:ExecutionPolicy' | Should -Be $null } } Context "Pipe to/from powershell" { $p = [PSCustomObject]@{X=10;Y=20} It "xml input" { $p | & $powershell -noprofile { $input | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } } | Should -Be 30 $p | & $powershell -noprofile -inputFormat xml { $input | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } } | Should -Be 30 } It "text input" { $p | & $powershell -noprofile -inputFormat text { -join ($input -replace "\s","") } | Should -Be "XY--1020" } It "xml output" { & $powershell -noprofile { [PSCustomObject]@{X=10;Y=20} } | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } | Should -Be 30 & $powershell -noprofile -outputFormat xml { [PSCustomObject]@{X=10;Y=20} } | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } | Should -Be 30 } It "text output" { -join (& $powershell -noprofile -outputFormat text { [PSCustomObject]@{X=10;Y=20} }) -replace "\s","" | Should -Be "XY--1020" } It "errors are in text if error is redirected, encoded command, non-interactive, and outputformat specified" { $p = [Diagnostics.Process]::new() $p.StartInfo.FileName = "pwsh" $encoded = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes('$ErrorView="NormalView";throw "boom"')) $p.StartInfo.Arguments = "-EncodedCommand $encoded -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -OutputFormat text" $p.StartInfo.UseShellExecute = $false $p.StartInfo.RedirectStandardError = $true $p.Start() | Out-Null $out = $p.StandardError.ReadToEnd() $out | Should -Not -BeNullOrEmpty $out.Split([Environment]::NewLine)[0] | Should -BeExactly "boom" } } Context "Redirected standard output" { It "Simple redirected output" { $si = NewProcessStartInfo "-noprofile -c 1+1" $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } } Context "Input redirected but not reading from stdin (not really interactive)" { It "Redirected input w/ implicit -Command w/ -NonInteractive" { $si = NewProcessStartInfo "-NonInteractive -noprofile -c 1+1" -RedirectStdIn $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } It "Redirected input w/ implicit -Command w/o -NonInteractive" { $si = NewProcessStartInfo "-noprofile -c 1+1" -RedirectStdIn $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } It "Redirected input w/ explicit -Command w/ -NonInteractive" { $si = NewProcessStartInfo "-NonInteractive -noprofile -Command 1+1" -RedirectStdIn $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } It "Redirected input w/ explicit -Command w/o -NonInteractive" { $si = NewProcessStartInfo "-noprofile -Command 1+1" -RedirectStdIn $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } It "Redirected input w/ -File w/ -NonInteractive" { '1+1' | Out-File -Encoding Ascii -FilePath TestDrive:test.ps1 -Force $si = NewProcessStartInfo "-noprofile -NonInteractive -File $testDrive\test.ps1" -RedirectStdIn $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } It "Redirected input w/ -File w/o -NonInteractive" { '1+1' | Out-File -Encoding Ascii -FilePath TestDrive:test.ps1 -Force $si = NewProcessStartInfo "-noprofile -File $testDrive\test.ps1" -RedirectStdIn $process = RunPowerShell $si $process.StandardOutput.ReadToEnd() | Should -Be 2 EnsureChildHasExited $process } } Context "Redirected standard input for 'interactive' use" { $nl = [Environment]::Newline It "Interactive redirected input: <InteractiveSwitch>" -Pending:($IsWindows) -TestCases @( @{InteractiveSwitch = ""} @{InteractiveSwitch = " -IntERactive"} @{InteractiveSwitch = " -i"} ) { param($interactiveSwitch) $si = NewProcessStartInfo "-noprofile -nologo$interactiveSwitch" -RedirectStdIn $process = RunPowerShell $si $process.StandardInput.Write("`$function:prompt = { 'PS> ' }`n") $null = $process.StandardOutput.ReadLine() $process.StandardInput.Write("1+1`n") $process.StandardOutput.ReadLine() | Should -Be "PS> 1+1" $process.StandardOutput.ReadLine() | Should -Be "2" $process.StandardInput.Write("1+2`n") $process.StandardOutput.ReadLine() | Should -Be "PS> 1+2" $process.StandardOutput.ReadLine() | Should -Be "3" $process.StandardInput.Write("1+2`b3`n") $process.StandardOutput.ReadLine() | Should -Be "PS> 1+2`b3" $process.StandardOutput.ReadLine() | Should -Be "4" $process.StandardInput.Close() $process.StandardOutput.ReadToEnd() | Should -Be "PS> " EnsureChildHasExited $process } It "Interactive redirected input w/ initial command" -Pending:($IsWindows) { $si = NewProcessStartInfo "-noprofile -noexit -c ""`$function:prompt = { 'PS> ' }""" -RedirectStdIn $process = RunPowerShell $si $process.StandardInput.Write("1+1`n") $process.StandardOutput.ReadLine() | Should -Be "PS> 1+1" $process.StandardOutput.ReadLine() | Should -Be "2" $process.StandardInput.Write("1+2`n") $process.StandardOutput.ReadLine() | Should -Be "PS> 1+2" $process.StandardOutput.ReadLine() | Should -Be "3" $process.StandardInput.Close() $process.StandardOutput.ReadToEnd() | Should -Be "PS> " EnsureChildHasExited $process } It "Redirected input explicit prompting (-File -)" -Pending:($IsWindows) { $si = NewProcessStartInfo "-noprofile -" -RedirectStdIn $process = RunPowerShell $si $process.StandardInput.Write("`$function:prompt = { 'PS> ' }`n") $null = $process.StandardOutput.ReadLine() $process.StandardInput.Write("1+1`n") $process.StandardOutput.ReadLine() | Should -Be "PS> 1+1" $process.StandardOutput.ReadLine() | Should -Be "2" $process.StandardInput.Close() $process.StandardOutput.ReadToEnd() | Should -Be "PS> " EnsureChildHasExited $process } It "Redirected input no prompting (-Command -)" -Pending:($IsWindows) { $si = NewProcessStartInfo "-noprofile -Command -" -RedirectStdIn $process = RunPowerShell $si $process.StandardInput.Write("1+1`n") $process.StandardOutput.ReadLine() | Should -Be "2" $process.StandardInput.Write("if (1)`n{`n 42`n}`n`n") $process.StandardOutput.ReadLine() | Should -Be "42" $process.StandardInput.Write(@" function foo { 'in foo' } foo "@) $process.StandardOutput.ReadLine() | Should -Be "in foo" $process.StandardInput.Write("`"a`bc`".Length`n") $process.StandardOutput.ReadLine() | Should -Be "3" $process.StandardInput.Write('22 + 22') $process.StandardInput.Close() $process.StandardOutput.ReadLine() | Should -Be "44" EnsureChildHasExited $process } It "Redirected input w/ nested prompt" -Pending:($IsWindows) { $si = NewProcessStartInfo "-noprofile -noexit -c ""`$function:prompt = { 'PS' + ('>'*(`$nestedPromptLevel+1)) + ' ' }""" -RedirectStdIn $process = RunPowerShell $si $process.StandardInput.Write("`$host.EnterNestedPrompt()`n") $process.StandardOutput.ReadLine() | Should -Be "PS> `$host.EnterNestedPrompt()" $process.StandardInput.Write("exit`n") $process.StandardOutput.ReadLine() | Should -Be "PS>> exit" $process.StandardInput.Close() $process.StandardOutput.ReadToEnd() | Should -Be "PS> " EnsureChildHasExited $process } } Context "Exception handling" { BeforeAll { $classDefinition = @' using System; using System.Management.Automation; using System.Management.Automation.Runspaces; using System.Threading; namespace StackTest { public class StackDepthTest { public static PowerShell ps; public static int size = 512 * 1024; public static void CauseError() { Thread t = new Thread(RunPS, size); t.Start(); t.Join(); } public static void RunPS() { InitialSessionState iss = InitialSessionState.CreateDefault2(); iss.ThreadOptions = PSThreadOptions.UseCurrentThread; ps = PowerShell.Create(iss); ps.AddScript("function recurse { recurse }; recurse").Invoke(); } public static void GetPSError() { if ( ps.Streams.Error.Count > 0) { throw ps.Streams.Error[0].Exception.InnerException; } } } } '@ $TestType = Add-Type -PassThru -TypeDefinition $classDefinition } It "Should handle a CallDepthOverflow" { $TestType::CauseError() { $TestType::GetPSError() } | Should -Throw -ErrorId "CallDepthOverflow" } } Context "Data, Config, and Cache locations" { BeforeEach { $XDG_CACHE_HOME = $env:XDG_CACHE_HOME $XDG_DATA_HOME = $env:XDG_DATA_HOME $XDG_CONFIG_HOME = $env:XDG_CONFIG_HOME } AfterEach { $env:XDG_CACHE_HOME = $XDG_CACHE_HOME $env:XDG_DATA_HOME = $XDG_DATA_HOME $env:XDG_CONFIG_HOME = $XDG_CONFIG_HOME } It "Should start if Data, Config, and Cache location is not accessible" -skip:($IsWindows) { $env:XDG_CACHE_HOME = "/dev/cpu" $env:XDG_DATA_HOME = "/dev/cpu" $env:XDG_CONFIG_HOME = "/dev/cpu" $output = & $powershell -noprofile -Command { (get-command).count } [int]$output | Should -BeGreaterThan 0 } } Context "HOME environment variable" { It "Should start if HOME is not defined" -skip:($IsWindows) { bash -c "unset HOME;$powershell -c '1+1'" | Should -BeExactly 2 } } Context "PATH environment variable" { It "`$PSHOME should be in front so that pwsh.exe starts current running PowerShell" { pwsh -v | Should -Match $psversiontable.GitCommitId } It "powershell starts if PATH is not set" -Skip:($IsWindows) { bash -c "unset PATH;$powershell -c '1+1'" | Should -BeExactly 2 } } Context "Ambiguous arguments" { It "Ambiguous argument '<testArg>' should return possible matches" -TestCases @( @{testArg="-no";expectedMatches=@("-nologo","-noexit","-noprofile","-noninteractive")}, @{testArg="-format";expectedMatches=@("-inputformat","-outputformat")} ) { param($testArg, $expectedMatches) $output = & $powershell $testArg -File foo 2>&1 $LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter $outString = [String]::Join(",", $output) foreach ($expectedMatch in $expectedMatches) { $outString | Should -Match $expectedMatch } } } Context "-WorkingDirectory parameter" { BeforeAll { $folderName = (New-Guid).ToString() + " test"; New-Item -Path ~/$folderName -ItemType Directory $ExitCodeBadCommandLineParameter = 64 } AfterAll { Remove-Item ~/$folderName -Force -ErrorAction SilentlyContinue } It "Can set working directory to '<value>'" -TestCases @( @{ value = "~" ; expectedPath = $((Get-Item ~).FullName) }, @{ value = "~/$folderName"; expectedPath = $((Get-Item ~/$folderName).FullName) }, @{ value = "~\$folderName"; expectedPath = $((Get-Item ~\$folderName).FullName) } ) { param($value, $expectedPath) $output = & $powershell -NoProfile -WorkingDirectory "$value" -Command '(Get-Location).Path' $output | Should -BeExactly $expectedPath } It "Can use '<parameter>' to set working directory" -TestCases @( @{ parameter = '-workingdirectory' }, @{ parameter = '-wd' }, @{ parameter = '-wo' } ) { param($parameter) $output = & $powershell -NoProfile $parameter ~ -Command "`$pwd.Path" $output | Should -BeExactly $((Get-Item ~).FullName) } It "Error case if -WorkingDirectory isn't given argument as last on command line" { $output = & $powershell -WorkingDirectory 2>&1 $LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter $output | Should -Not -BeNullOrEmpty } It "-WorkingDirectory should be processed before profiles" { if (Test-Path $PROFILE) { $currentProfile = Get-Content $PROFILE } else { New-Item -ItemType File -Path $PROFILE -Force } @" (Get-Location).Path Set-Location $testdrive "@ > $PROFILE try { $out = pwsh -workingdirectory ~ -c '(Get-Location).Path' $out | Should -HaveCount 2 $out[0] | Should -BeExactly (Get-Item ~).FullName $out[1] | Should -BeExactly "$testdrive" } finally { if ($currentProfile) { Set-Content $PROFILE -Value $currentProfile } else { Remove-Item $PROFILE } } } } Context "CustomPipeName startup tests" { It "Should create pipe file if CustomPipeName is specified" { $pipeName = [System.IO.Path]::GetRandomFileName() $pipePath = Get-PipePath $pipeName & $powershell -CustomPipeName $pipeName -Command "Test-Path '$pipePath'" | Should -BeTrue } It "Should throw if CustomPipeName is too long on Linux or macOS" -Skip:($IsWindows) { $longPipeName = [string]::new("A", 200) "`$pid" | & $powershell -CustomPipeName $longPipeName -c - $LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter } } Context "ApartmentState WPF tests" -Tag Slow { It "WPF requires STA and will work" -Skip:(!$IsWindows -or [System.Management.Automation.Platform]::IsNanoServer) { add-type -AssemblyName presentationframework $xaml = [xml]@" <Window xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" x:Name="Window" Title="Initial Window" WindowStartupLocation = "CenterScreen" Width = "400" Height = "300" ShowInTaskbar = "True"> </Window> "@ $reader = [System.Xml.XmlNodeReader]::new($xaml) $Window = [System.Windows.Markup.XamlReader]::Load($reader) { $Window.Show() } | Should -Not -Throw $Window.Close() } } Context "ApartmentState tests" { It "Default apartment state for main thread is STA" -Skip:(!$IsWindows -or [System.Management.Automation.Platform]::IsNanoServer) { [System.Threading.Thread]::CurrentThread.GetApartmentState() | Should -BeExactly "STA" } It "Default apartment state for new runspace is MTA" -Skip:(!$IsWindows) { $ps = [powershell]::Create() $ps.AddScript({[System.Threading.Thread]::CurrentThread.GetApartmentState()}) $ps.Invoke() | Should -BeExactly "MTA" } It "Should be able to set apartment state to: <apartment>" -Skip:(!$IsWindows -or [System.Management.Automation.Platform]::IsNanoServer) -TestCases @( @{ apartment = "STA"; switch = "-sta" } @{ apartment = "MTA"; switch = "-mta" } ) { param ($apartment, $switch) & $powershell $switch -noprofile -command "[System.Threading.Thread]::CurrentThread.GetApartmentState()" | Should -BeExactly $apartment } It "Should fail to set apartment state to: <switch>" -Skip:($IsWindows -and ![System.Management.Automation.Platform]::IsNanoServer) -TestCases @( @{ switch = "-sta" } @{ switch = "-mta" } ) { param ($switch) & $powershell $switch -noprofile -command exit $LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter } } } Describe "WindowStyle argument" -Tag Feature { BeforeAll { $defaultParamValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:skip"] = !$IsWindows if ($IsWindows) { $ExitCodeBadCommandLineParameter = 64 Add-Type -Name User32 -Namespace Test -MemberDefinition @" public static WINDOWPLACEMENT GetPlacement(IntPtr hwnd) { WINDOWPLACEMENT placement = new WINDOWPLACEMENT(); placement.length = Marshal.SizeOf(placement); GetWindowPlacement(hwnd, ref placement); return placement; } [DllImport("user32.dll", SetLastError = true)] [return: MarshalAs(UnmanagedType.Bool)] public static extern bool GetWindowPlacement( IntPtr hWnd, ref WINDOWPLACEMENT lpwndpl); [Serializable] [StructLayout(LayoutKind.Sequential)] public struct WINDOWPLACEMENT { public int length; public int flags; public ShowWindowCommands showCmd; public System.Drawing.Point ptMinPosition; public System.Drawing.Point ptMaxPosition; public System.Drawing.Rectangle rcNormalPosition; } public enum ShowWindowCommands : int { Hidden = 0, Normal = 1, Minimized = 2, Maximized = 3, } "@ } } AfterAll { $global:PSDefaultParameterValues = $defaultParamValues } It "-WindowStyle <WindowStyle> should work on Windows" -TestCases @( @{WindowStyle="Normal"}, @{WindowStyle="Minimized"}, @{WindowStyle="Maximized"} ) { param ($WindowStyle) try { $ps = Start-Process pwsh -ArgumentList "-WindowStyle $WindowStyle -noexit -interactive" -PassThru $startTime = Get-Date $showCmd = "Unknown" while (((Get-Date) - $startTime).TotalSeconds -lt 10 -and $showCmd -ne $WindowStyle) { Start-Sleep -Milliseconds 100 $showCmd = ([Test.User32]::GetPlacement($ps.MainWindowHandle)).showCmd } $showCmd | Should -BeExactly $WindowStyle } finally { $ps | Stop-Process -Force } } It "Invalid -WindowStyle returns error" { pwsh -WindowStyle invalid $LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter } } Describe "Console host api tests" -Tag CI { Context "String escape and control sequences" { $esc = [char]0x1b $csi = [char]0x9b $testCases = @{InputObject = "abc"; Length = 3; Name = "No escapes"}, @{InputObject = "${esc} [31mabc"; Length = 9; Name = "Malformed escape - extra space"}, @{InputObject = "${esc}abc"; Length = 4; Name = "Malformed escape - no csi"}, @{InputObject = "[31mabc"; Length = 7; Name = "Malformed escape - no escape"} $testCases += if ($host.UI.SupportsVirtualTerminal) { @{InputObject = "$esc[31mabc"; Length = 3; Name = "Escape at start"} @{InputObject = "$esc[31mabc$esc[0m"; Length = 3; Name = "Escape at start and end"} @{InputObject = "${csi}31mabc"; Length = 3; Name = "C1 CSI at start"} @{InputObject = "${csi}31mabc${csi}0m"; Length = 3; Name = "C1 CSI at start and end"} @{InputObject = "abc${csi}m"; Length = 3; Name = "C1 CSI, no params"} @{InputObject = "abc${csi} @{InputObject = "abc${csi} @{InputObject = "abc${csi} @{InputObject = "abc${csi} @{InputObject = "abc${esc}[0 @{InputObject = "${esc}[0;1 } else { @{InputObject = "$esc[31mabc"; Length = 8; Name = "Escape at start - no virtual term support"} @{InputObject = "$esc[31mabc$esc[0m"; Length = 12; Name = "Escape at start and end - no virtual term support"} @{InputObject = "${csi}31mabc"; Length = 7; Name = "C1 CSI at start - no virtual term support"} @{InputObject = "${csi}31mabc${csi}0m"; Length = 10; Name = "C1 CSI at start and end - no virtual term support"} @{InputObject = "abc${csi}m"; Length = 5; Name = "C1 CSI, no params - no virtual term support"} @{InputObject = "abc${csi} @{InputObject = "abc${csi} @{InputObject = "abc${csi} @{InputObject = "abc${csi} @{InputObject = "abc${esc}[0 @{InputObject = "${esc}[0;1 } It "Should properly calculate buffer cell width of '<Name>'" -TestCases $testCases { param($InputObject, $Length) $host.UI.RawUI.LengthInBufferCells($InputObject) | Should -Be $Length } } } Describe "Pwsh exe resources tests" -Tag CI { It "Resource strings are embedded in the executable" -Skip:(!$IsWindows) { $pwsh = Get-Item -Path "$PSHOME\pwsh.exe" $pwsh.VersionInfo.FileVersion | Should -Match $PSVersionTable.PSVersion.ToString().Split("-")[0] $productVersion = $pwsh.VersionInfo.ProductVersion.Replace("-dirty","").Replace(" Commits: ","-").Replace(" SHA: ","-g") if ($PSVersionTable.GitCommitId.Contains("-g")) { $productVersion | Should -BeExactly $PSVersionTable.GitCommitId } else { $productVersion | Should -Match $PSVersionTable.GitCommitId } $pwsh.VersionInfo.ProductName | Should -BeExactly "PowerShell" } It "Manifest contains compatibility section" -Skip:(!$IsWindows) { $osversion = [System.Environment]::OSVersion.Version $psversiontable.os | Should -MatchExactly "$($osversion.Major).$($osversion.Minor)" } } Describe 'Pwsh startup in directories that contain wild cards' -Tag CI { BeforeAll { $powershell = Join-Path -Path $PsHome -ChildPath "pwsh" $dirnames = "[T]est","[Test","T][est","Test" $testcases = @() foreach ( $d in $dirnames ) { $null = New-Item -type Directory -path "${TESTDRIVE}/$d" $testcases += @{ Dirname = $d } } } It "pwsh can startup in a directory named <dirname>" -testcases $testcases { param ( $dirname ) try { Push-Location -LiteralPath "${TESTDRIVE}/${dirname}" $result = & $powershell -noprofile -c '(Get-Item .).Name' $result | Should -BeExactly $dirname } finally { Pop-Location } } }
combined_dataset/train/non-malicious/2073.ps1
2073.ps1
Describe "Json.NET LINQ Parsing" -tags "CI" { BeforeEach { $jsonFile = Join-Path -Path (Join-Path $PSScriptRoot -ChildPath assets) -ChildPath TestJson.json $jsonData = (Get-Content $jsonFile | Out-String) $json = [Newtonsoft.Json.Linq.JObject]::Parse($jsonData) } It "Should return data via Item()" { [string]$json.Item("Name") | Should -BeExactly "Zaphod Beeblebrox" } It "Should return data via []" { [string]$json["Planet"] | Should -BeExactly "Betelgeuse" } It "Should return nested data via Item().Item()" { [int]$json.Item("Appendages").Item("Heads") | Should -Be 2 } It "Should return nested data via [][]" { [int]$json["Appendages"]["Arms"] | Should -Be 3 } It "Should return correct array count" { $json["Achievements"].Count | Should -Be 4 } It "Should return array data via [n]" { [string]$json["Achievements"][3] | Should -BeExactly "One hoopy frood" } }
combined_dataset/train/non-malicious/sample_66_22.ps1
sample_66_22.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for AzureDataLakeGen1Datastore. .Description Create an in-memory object for AzureDataLakeGen1Datastore. .Outputs Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.AzureDataLakeGen1Datastore .Link https://learn.microsoft.com/powershell/module/Az.MachineLearningServices/new-AzMLWorkspaceDatastoreDataLakeGen1Object #> function New-AzMLWorkspaceDatastoreDataLakeGen1Object { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.AzureDataLakeGen1Datastore')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Indicates which identity to use to authenticate service data access to customer's storage.")] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.ServiceDataAccessAuthIdentity])] [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.ServiceDataAccessAuthIdentity] $ServiceDataAccessAuthIdentity, [Parameter(Mandatory, HelpMessage="[Required] Azure Data Lake store name.")] [string] $StoreName, [Parameter(Mandatory, HelpMessage="[Required] Account credentials.")] [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.IDatastoreCredentials] $Credentials, [Parameter(HelpMessage="The asset description text.")] [string] $Description, [Parameter(HelpMessage="The asset property dictionary.")] [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.IResourceBaseProperties] $Property, [Parameter(HelpMessage="Tag dictionary. Tags can be added, removed, and updated.")] [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.IResourceBaseTags] $Tag ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.AzureDataLakeGen1Datastore]::New() $Object.DatastoreType = "AzureDataLakeGen1" if ($PSBoundParameters.ContainsKey('ServiceDataAccessAuthIdentity')) { $Object.ServiceDataAccessAuthIdentity = $ServiceDataAccessAuthIdentity } if ($PSBoundParameters.ContainsKey('StoreName')) { $Object.StoreName = $StoreName } if ($PSBoundParameters.ContainsKey('Credentials')) { $Object.Credentials = $Credentials } if ($PSBoundParameters.ContainsKey('Description')) { $Object.Description = $Description } if ($PSBoundParameters.ContainsKey('Property')) { $Object.Property = $Property } if ($PSBoundParameters.ContainsKey('Tag')) { $Object.Tag = $Tag } return $Object } } # SIG # Begin signature block # MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAQFKS7wID4NNb+ # KKeJSN4RM6ZS93vN1dubBfQPZdsoZaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMpS # aFBlekQ7fQRc8CR96SrQBBshWiZU2owIeCrSsXRBMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAQr235KLIEzTID+iyMvCqWxFYUAppl4wyB5HL # PIByxvgDJXgQdu9x2tjvxyUl5KiJ2cM1Gnu/MFtGtFCCsRkbxMn5hBSCN0J/gNi3 # dChh4KqddN7IxdVRSJgvzOyfWlROlvYiVBUbYsUXOtXQUqp7oOn/yXJ8HwVv7MMo # 99CdWQe+7+sdkqmFmd7q75KZk4NDxIt192qQbanYme9V6i3z3MYeuwEdr6mik/gW # EthdrF7HGzgN1SSrGk7/NVAIGSSjppr6EpHMiQz4btUgs/c02T0yDFTP3Y4OmLqV # QpTF3akZr93kOFUtpm3+e8NSTxY7ZmXh+wA1lW0ggu9K3H53+qGCFygwghckBgor # BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCVzM54vqiu0PVIzE9uYfwhoZkjouOAVilN # 6jFSq5Wa+wIGZpe3Nw7VGBMyMDI0MDczMTA3MDA0Mi43MDNaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHajtXJ # WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ # Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC # lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf # 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D # M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k # UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl # PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA # 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY # mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ # BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24 # 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl # oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca # HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW # ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50 # WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q # /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C # /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ # 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj # MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix # 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6 # 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P # P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/ # wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOpUAEQwIhgPMjAyNDA3MzEwODEzNTZaGA8yMDI0MDgw # MTA4MTM1NlowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6lQARAIBADAGAgEAAgFC # MAcCAQACAhMzMAoCBQDqVVHEAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB # hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA # HKk1ACP5BnIOHhLcJLV+MgdaDPygzoG9rCqcWaXTIxvIuN27smq+5+PYb1RV5p57 # DnlLOp2HW4qEoqwUGu3krV78VzqeRd6csEzR3xDvkH8Jn/zaV4fP3RpLLon9p0Rj # 94R2abRDw8cjnLcyGFiB3lFoCFFVqkCn1zz8jsqAkQAxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQABAAAB # 2jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCCisJxVBP0b/BjrJj5WMJIcqeHX9gq0wSaPvE4mrQU # ezCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICKlo2liwO+epN73kOPULT3T # bQjmWOJutb+d0gI7GD3GMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowIgQgDWJelj1571clkyiZPYKcyeSx # /kiBMDIAd5c0xTEnplowDQYJKoZIhvcNAQELBQAEggIAAAVex6XVQUJ8dTP9N6+l # wNOLASaAVLXISdzKjwomBXnsnOM1A3E9anyLpdrmMAwWOw6a74uwhTgzQf272ym6 # iCsdQ2qpW/2FaodcGaPBd8LwjXKbjeRKEysROPPhHpANTVR0cbLXwB+TUihB/teT # CwvXhF1I5l/AYdG920m5Z3nYyygsuJoBOtjxXijqIv3B7gq7CeNX7jYCJlhDFZlI # YU3Yf9cVP895CMAY+TcZNx7IhGnkJJxnQxjLGEEAV1Ic3egXbTYkSfI7Gmntx2/J # wAVMCvT07RTsTWguOc+neUQVJdmdDokZhwxeinvJ7qezc86uIf1UnRQ8pf4CylG/ # J8Y/FeXWDxGqH7zRuEOBBaYJqv+WgQlVPAs44N3N8wrIfDh5oXtcczNlEN5HzTnE # KmRbQUkqEKpiW56uWo/qHQMdOOP6XZf7yvDpiSnoUYtNb+Ol7fsER/l569N4ImK9 # i5g7aVU3Hwqde+WLnQyOWpoElCzQ9mwydoenKH8k/aqCxNcQx6wkb6EeCYoppPVW # gPomrpg77Qf7j1Lxbv8LLWaX30AO+bpp/lJWpqj4hY0vORHj0nXztI0wMOiEd++I # e+mGuKRZAOW/mIZWgqcIIGOeNFjNXby79S675HsKdwrQuFWQCcv1DbxNeXMcSw5E # 18Px7P1QTCbkQjHA7LDol+k= # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_75.ps1
sample_28_75.ps1
param( [Parameter(HelpMessage="Creates a tunnel")] [switch]$Tunnel = $False, [Parameter(Mandatory=$True,HelpMessage="Last 4 digits of the GCRAZGDL host you wish to connect to")] [string]$Num, [Parameter(Mandatory=$True,HelpMessage="Your Alias in type DOMAIN.alias")] [string]$Alias, [Parameter(Mandatory=$True,HelpMessage="Port to open tunnel")] [string]$Port ) $ALIAS = $Alias $KEYPATH = $HOME + "\.ssh\id_ed25519" $EX1 = "7ccdb8ae-4daf-4f0f-8019-e80665eb00d2" $EX2 = "46da6261-2167-4e71-8b0d-f4a45215ce61" $EX3 = "992cb282-dd69-41bf-8fcc-cc8801d28b58" $BAST1 = "GPU-Sandbox-VNET-bastion" $BAST2 = "GPU-Sandbox2-VNET-bastion" $BAST3 = "GPU-Sandbox3-VNET-bastion" $RG1 = "GPU-SANDBOX" $RG2 = "GPU-SANDBOX2" $RG3 = "GPU-SANDBOX3" $SANDBOXNUM=$Num if (!(get-command az 2>$null)) { write-host "azure-cli not installed -- https://learn.microsoft.com/en-us/cli/azure/install-azure-cli-linux?pivots=apt" Exit 2 } if (((az extension list|ConvertFrom-Json).name|sls "ssh"|measure-object).count -lt 1) { write-host "az ssh extension not installed. Please run the following to install." write-host "az extension add --name ssh" Exit 3 } if (!(Test-Path -Path $KEYPATH)) { Write-Host "Keypath not found $KEYPATH" Exit 4 } if ($Tunnel) { $BASTIONCOMMAND = "tunnel" $BASTIONPARAMS = "--resource-port 22 --port $Port" } else { $BASTIONCOMMAND = "ssh" $BASTIONPARAMS = "--auth-type ssh-key --username $ALIAS --ssh-key $KEYPATH" } if ($SANDBOXNUM -like '0*'){ az account set --subscription $EX1 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX1 --name $BAST1 --resource-group $RG1 --target-resource-id /subscriptions/$EX1/resourceGroups/$RG1/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } if ($SANDBOXNUM -ge 1000 -and $SANDBOXNUM -le 1115) { az account set --subscription $EX2 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST1 --resource-group $RG1 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG1/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } if ($SANDBOXNUM -ge 1116 -and $SANDBOXNUM -le 1215) { az account set --subscription $EX2 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST2 --resource-group $RG2 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG2/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } if ($SANDBOXNUM -ge 1400 -and $SANDBOXNUM -le 1767) { az account set --subscription $EX2 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST3 --resource-group $RG3 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG3/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } if ($SANDBOXNUM -ge 3001 -and $SANDBOXNUM -le 3068) { az account set --subscription $EX2 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST3 --resource-group $RG3 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG3/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } if ($SANDBOXNUM -ge 4001 -and $SANDBOXNUM -le 4020) { az account set --subscription $EX2 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST3 --resource-group $RG3 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG3/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } if ($SANDBOXNUM -ge 2000 -and $SANDBOXNUM -le 2999) { az account set --subscription $EX3 $COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX3 --name $BAST1 --resource-group $RG1 --target-resource-id /subscriptions/$EX3/resourceGroups/$RG1/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS" Write-Output $COMMAND Invoke-Expression $COMMAND } Write-Host "Done with code $LASTEXITCODE" Exit $LASTEXITCODE
combined_dataset/train/non-malicious/sample_4_38.ps1
sample_4_38.ps1
# Copyright ?008, Microsoft Corporation. All rights reserved. if($debug -eq $true){[void]$shell.popup("Run TS_Virtualization.ps1")} Import-LocalizedData -BindingVariable VirtualizationStrings Write-DiagProgress -Activity $VirtualizationStrings.ID_Virtualization -Status $VirtualizationStrings.ID_VirtualizationObtaining #$CommandToExecute = "cscript.exe GetVirtualEnv.VBS /GenerateScriptedDiagAlertXML" #$OutputFiles = $Computername + "_Virtualization.*" #RunCmD -commandToRun $CommandToExecute -sectionDescription $VirtualizationStrings.ID_Virtualization -filesToCollect $OutputFiles -fileDescription $VirtualizationStrings.ID_VirtualizationOutput ## Andret: Decomissioning alert for virtualization as this will be more and more common moving forward #$VirtualizationAlertXMLFileName = $Computername + "_VirtualizationAlerts.XML" #if (test-path $VirtualizationAlertXMLFileName) { # Update-DiagRootCause -id RC_Virtualization -Detected $true #} # $VirtualizationInfo = new-object PSObject $Script:MicrosoftVirtualizationEnv = $false $Script:VMWareVirtualizationEnv = $false $Script:VirtualMachineSoftware = "" $Script:VMIntegrationsInstalled = $false $Script:VMToolsInstalled = $false Function DetectMSVirtualizationSoftware() { $VMBugRegPath = "HKLM:SYSTEM\CurrentControlSet\Services\vmbus" if(Test-Path $VMBugRegPath) { $VMBugStart = (Get-ItemProperty -Path $VMBugRegPath).Start if(($VMBugStart -eq 0) -or ($VMBugStart -eq 1)) { $Script:VirtualMachineSoftware = "Hyper-V" $VMService = Get-CimInstance -query "Select Name from Win32_Service where Name = 'vmickvpexchange'" if($null -ne $VMService) { $Script:VMIntegrationsInstalled = $true } } else { $Script:VirtualMachineSoftware = "Virtual Server" Get-CimInstance -query "Select Name, Started from Win32_Service where Name = 'VPCMap'" | ForEach-Object { if($_.Started -eq $true) { $Script:VirtualMachineSoftware = "Virtual PC" } else { $Script:VirtualMachineSoftware = "Virtual Server" } } $VMService = Get-CimInstance -query "Select Name, Started from Win32_Service where Name = '1-vmsrvc'" if($null -ne $VMService) { $Script:VMIntegrationsInstalled = $true } } } } Function DetectVMWareVirtualizationSoftware() { $Script:VirtualMachineSoftware = "VMWare" $VMService = Get-CimInstance -query "Select Name, Started from Win32_Service where Name = 'VMTools'" if($null -ne $VMService) { $Script:VMToolsInstalled = $true } } Function DetectVirtualizationEnv() { $Manufacturer = (Get-CimInstance -class 'Win32_ComputerSystem').Manufacturer if($Manufacturer.Contains("Microsoft")) { $Script:MicrosoftVirtualizationEnv = $true DetectMSVirtualizationSoftware } elseif($Manufacturer.Contains("VMware")) { $Script:VMWareVirtualizationEnv = $true DetectVMWareVirtualizationSoftware } } DetectVirtualizationEnv #region Rule 5850 Detect Azure Virtual Machine $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_VirtualMachineInAzureCheck" # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return ($Script:MicrosoftVirtualizationEnv -and ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or # Windows Server 2008 R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or # Windows 8 ($OSVersion.Major -eq 10))) # Win10 } Function Confirm-AzureVM { $detected = $False #[void][System.Reflection.Assembly]::LoadWithPartialName('System.Serviceprocess') #$vmbus = [System.ServiceProcess.ServiceController]::GetDevices() | where {$_.Name -eq 'vmbus'} $VmbusRegistryKeysPath = "Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vmbus" if(Test-Path $VmbusRegistryKeysPath) { $vmbus = Get-Service vmbus -ErrorAction SilentlyContinue If($vmbus.Status -eq 'Running') { Add-Type -Path .\AzureDHCPClient.cs $client = New-Object Microsoft.WindowsAzure.Internal.AzureDHCPClient try { [Microsoft.WindowsAzure.Internal.AzureDHCPClient]::GetDhcpInterfaces() | ForEach-Object { $val = $client.DhcpRequestParams($_.Id, 245) if($val -And $val.Length -eq 4) { $detected = $True } } $client.Dispose() } catch { $client.Dispose() } } } return $detected } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (Confirm-AzureVM) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } #endregion if($Script:MicrosoftVirtualizationEnv -or $Script:VMWareVirtualizationEnv) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Virtual Machine Software" -value $Script:VirtualMachineSoftware if($Script:MicrosoftVirtualizationEnv) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Integration Services Installed" -value $Script:VMIntegrationsInstalled if($RootCauseDetected) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Windows Azure" -value $true } else { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Windows Azure" -value $false } } elseif($Script:VMWareVirtualizationEnv) { add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "VMTools installed" -value $Script:VMToolsInstalled } $VirtualizationInfo | ConvertTo-Xml2 | update-diagreport -id ("zzz_Virtualization Report") -name ("Virtual Environment Information") -verbosity informational } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDepAhNJk+viUZO # l+ysWIgWx7ydxY/N+prqIYxIYnaRJaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGEM # 35s+TctsSx50y0MMHVGUw9Zl5ryJb2j/ehjIurZXMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAAuvxvK092vPrjfj8sCthPx+apUtS1lzaPFGA # SURQVfuMEd/I5lB0g4V21lIMH+sc6+9gYyq/4oPXBeuzKgaYTMZvc530dH86jEQf # jDdG2VCtp3j4ul2DYqZxlvu0u7O9gQDll28YiIplF4jpbP6g6Q43bkyXR8/N0l0u # tUujz/FoqYfYu2NjfcjM4OyFCGlxZut4Vtjj2iqN7Q5mFDyjh2FoQtj+MpcUGYAg # OVHQQXGRTbajh75cbuJezSZM243iyxYiAuSMT2WC3BHpX26CEv+ANpLRbGBzAps3 # jG8mIeiQP0haT8XUqhGVF8MnwlfGMENBOWPbbP8Q7jeHyvgeW6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB31kQVZMUJvSCOln8RTe9vSu5H+yZLngp1 # 221S3TkvjgIGZus6esm5GBMyMDI0MTAyODExNDA0MS4zNTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9n # jXWrpPGxAAEAAAH5MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tD1MH3yAHWHNVslC+CBTj/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BO # JUiYg7fDJ2AxGVGyovUtgGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONW # y6lOyGZwZpxfV2EX4qAh6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2 # ps8Nc1xr41N8Qi3KVJLYX0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2 # KDJ2sQRFFF/egCxKgogdF3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN # 8hiMc8Z47RRJuIWCOeyIJ1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57 # ITXsD9DPOob8tjtsefPcQJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5D # HM4ovCmD3lifgYnzjOry4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby # 44kGVK8MzY9s32Dy1THnJg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRV # Ux2G/0Tr7Dk3fpCU8u+5olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1 # HvNIBpSNNuTBQk7FBvu+Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSJ7aO6nJXJI9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAZiAJgFbkf7jfhx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG # 2CcdoXaq7VgpVkNf1uvIhrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0kt # H+EkEuGXs9DBLyt71iutVkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2 # q5TjmrgEKyPe3TApAio8cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/ui # zP1NuHSxF/V1ks/2tCEoriicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+U # d9Va3Iw9Bs4ccrkgBjLtg3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y # 6Si3AaNINt/pOMKU6l4AW0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qI # VBZJ2XQpnhEuRbh+AgpmRn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhnc # FetJ0ZK36wxAa3FiPgBebRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B # 0s8RiFBMf/W7+O7EPZ+wMH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojz # uCEahSAcq86yjwQeTPN9YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAK # mIcdwhqgZvyp6UaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0 # MTAyOTA4MjgwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEA # AgIIXjAHAgEAAgITcTAKAgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAZdq+OU23EaUchwQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2Dewx # IzsFz1t8ELbs/7V+b+lLZ25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh8 # 4y9kT8c5HUYL5kF2NJiqgHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e7 # 2AvfpKtUZO94WfnvRVAu4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpU # qnrIVhOqTZE0I5GJiVJydAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGE # u6OFzH+g6bBiUu/BsmlodM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgCQ3Y5O1ylBOYJyP7LkZIQvevtOe7egKSXPh1bV+0KvcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5S # bGLYEDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +R9njXWrpPGxAAEAAAH5MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkH # B7rdMA0GCSqGSIb3DQEBCwUABIICAEebm+T4SRX0p7ROMn6E6Xp+b3RwtpQhOzJD # 4O/OE9/1g2yZLqI9WD9z+J3TeVT1xjiMQY+aSyck78wPqRqq1A/EvKnlaw2tfvW/ # XZ/eNZM34O6opPW57cycbPlDL5Ai8uAEqrfEBAAirLqrczp22HJo/9KZU4Kjwle6 # lNAOu4LqJnocqyJawuApTsG9FAV3ld7E4V4GYJn3JsyDkV0T/w/iSyvbswWqeV+E # U+qB/3lK/lCEcIcFjVZtL3q2ZjCIyI5MNJBpMOZTe62NJPrMZPm+9j61EDjlRSRb # bW+hu8r2cXw91DvELnnJcLSdHQGUWj23lbZvaChXr1lfnv3A8zbX+dF3nNAGHqd0 # upt9wNX8if0qHseci7WrjRh6kxC3T/titdR2uIdeZ2+EEuLrWP49rse9o05uM74f # hmEUNJi/LqhOCIcPizuRAV3lfZ5rXsJSiQxMqQrCO9SbyHgWidViNhTuNWev++ry # 04mP1WbHMP6GqfW5fTR7j1tmLBIFDsbbBwto+Zz0Vwh2CXdt+CSaBSvG3kir8MOg # zx4hQd5EweOfk3Qlf0HMxD8UgY4jc23QmVm3Sqt4kjjg35H1Qz0Yz+msrZBFxKis # vxn3CJdxzdXgU7G6tEmyhSg862pV4IVEacy2bTQTHqNy13gxKn+asY7ggKqQ3eL/ # PF5SEaTk # SIG # End signature block
combined_dataset/train/non-malicious/sample_7_97.ps1
sample_7_97.ps1
ConvertFrom-StringData @' id_descriptors=Collecting Windows Update service descriptors '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC0vOKlb1UTpE0M # Z+j9Lq+3PpJN3jGS8qNbSGJOr4XdCaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN2jqHU4DeKl/P5lzWo9P2yP # zIznDyfdAwGnHrGibNHnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAT+BFjFDDkJhLjd5sh3R/f+7K/5iLZ/oE+i7lrb/3SfZw/szdlt7OcrNm # 4sGRvXWl/Tbt3us3ZRXK826T7vfHOEzWC7GXWM9dAu7Ua51+GgxdxyXmjDayfKZ7 # Jvs1Mu85iDKEEM/jx6itjunczhvgg1XP98r5Dg8teoy/LKk6qM1EcWtdqH0XzLus # opBk86+k1pITdmEU3pseMYnDBB+Pq3BcXbKQ/9FI4b8O/prOnRCj3ayQ7A9fQOPj # wW33fpUnxd4j4DvCDNCvZ2/j5mTDZDoT352ydM5Ra1cqMdUv4RHTjfoOsG8BueLQ # K6snTHj19yVIyQSv6qf4dUdNaNIeOaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAZKPCSY53AKXN9GsxngJ0vrT70/1u3OmUUTuLk91C1GQIGZxqDjw9t # GBMyMDI0MTAyODExNDA0Mi4yMTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4 # EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob # FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs # 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC # z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I # U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU # qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR # BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO # oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ # sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX # OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh # twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG # Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM # Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe # ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV # xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI # bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM # fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF # C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO # Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x # 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT # 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu # Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC # KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz # OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P # AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR # rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C # Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm # xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy # fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo # 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB # 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAGqishU9utJlBUlH9z3LmXX4YC6gFiTY79ksDfJ8Uy # VjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q # FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy # SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIADpRmbdrTcM6iFeD3WD6Y # /L+e9jBzrHf82slMLx5E/REaF39S+cpltOtUKzMIL97wEHcWMIqpIracZHp1KW41 # 8GOuQxtN9wdgn7mBTbosjGsI3qDTk9Mc+6xsfay37fqS4IyDXKEBG9TJV6/2Utp1 # B30621de6uy1v+WyVdbPypkjGNT4Dsma/fe2AEHbF5qLkMwBsO9gqYNgIvLdq0CA # /GZ1JPRnHzFY4hE8825aOcmGb6727TTgMqmogYJBJD9qvV3MqXXZnzhQzb0OdOYn # xeFPRcKmziiIDiIbTGXbQkI/UCZxgXjnyNcCudcIFVp+vRlN5I0fEEMRU2KtxjLy # Mbv7To+DqBerPxZroAIxQj89jV+bJNuvV17Bux7LC0NxwpcegrRpoiX4nNq6EPkM # /El3Fg/ZcxBckM2S42wbTQR+U0KMjwwVtUXqo6Eweu5RrgbGMgD190MkZuBMzFc8 # UsRYEmzbxglXC+LdeRL4LFhha61+NnsTa2tQYC/fjOA9JsMdBDE5JBSFSi917Sph # NuUHJfK+JqsEhUGEd8ScfY3ZMmmLg7D5rLd7T2ZhjGwXe1mWwfzShwn3DPQbSbvI # /xiuZk/WCYHFWbDwuLFzN42hHTMMiYK8qb4hHNGjqOeWMNwKGPst365gEU3U9ppE # yHBGQPvzjkYr3a17mz+F7AA= # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_23.ps1
sample_18_23.ps1
##------------------------------------------------------------------ ## <copyright file="GMATenantJson.psm1" company="Microsoft"> ## Copyright (C) Microsoft. All rights reserved. ## </copyright> ##------------------------------------------------------------------ $azureStackNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Solution.Deploy.CloudDeployment" Import-Module (Join-Path $azureStackNugetPath "content\roles\common\RoleHelpers.psm1") -Verbose:$false class GMATenantJson { <# .SYNOPSIS Creates multi tenant json configs for setting up the Observability (Telemetry, Diagnostics, Health, Security and Metrics) pipeline. .EXAMPLE [GMATenantJson]::GenerateMultiTenantJsonConfigsForObservability($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static GenerateMultiTenantJsonConfigsForObservability([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" ## For classes in PS, we need to use the call stack to get the current executing function. $functionName = $(Get-PSCallStack)[0].FunctionName $gmaNugetName = "Microsoft.AzureStack.Observability.GenevaMonitoringAgent" $gmaPackageContentPath = Join-Path $(Get-ASArtifactPath -NugetName $gmaNugetName) -ChildPath "content" Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -DisableNameChecking ## Get PhysicalDriveLetter to place GMA cache folder $PhysicalDriveLetter = $Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.PhysicalDriveLetter $volumeName = "${PhysicalDriveLetter}:" ## GMA cache folder path $gmaCacheFolderName = $Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.GMACacheFolderName $gmaCacheFolderPath = Join-Path -Path $volumeName -ChildPath $gmaCacheFolderName Trace-Execution "$functionName : GMACacheFolderPath - $gmaCacheFolderPath" # Get StreamingDataClient value $streamingDataClient =[System.Convert]::ToBoolean($Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.StreamingDataClient) Trace-Execution "$functionName : StreamingDataClient - $streamingDataClient" $gcsRegionName = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationRegion Trace-Execution "$functionName : GCSRegionName - $gcsRegionName" ## Determine GcsEnvironment $gcsEnvironment = "Prod" ## default environment ## Check if the reg key created for CI exists or not, if yes then change the GCSEnvironment to point to PPE. if (Test-RegKeyExists -Path "HKLM:\Software\Microsoft\SQMClient\" -Name "IsCIEnv") { $gcsEnvironment = "Ppe" } Trace-Execution "$functionName : GCSEnvironment - $gcsEnvironment" ## Fetch the clusterName $managementClusterName = $Parameters.Roles["Cluster"].PublicConfiguration.Clusters.Node | ` Where-Object { $_.IsManagementCluster -ieq "true"} | ` Select-Object -ExpandProperty Name if(-not $managementClusterName) { $errorMessage = "$functionName : ManagementClusterName not found in Cloud config." Trace-Error $errorMessage throw $errorMessage } Trace-Execution "$functionName : ManagementClusterName - $managementClusterName" $assemblyVersion = $Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.Version Trace-Execution "$functionName : AssemblyVersion - $assemblyVersion" Set-GlobalEnvironmentVariable -EnvVariableName "ASSEMBLY_BUILD_VERSION" -EnvVariableValue $assemblyVersion Trace-Execution "$functionName : ASSEMBLY_BUILD_VERSION Environment variable set to - $assemblyVersion" Set-GlobalEnvironmentVariable -EnvVariableName "CLUSTER_NAME" -EnvVariableValue $managementClusterName Trace-Execution "$functionName : CLUSTER_NAME Environment variable set to - $env:CLUSTER_NAME" # Get StampID, NodeId, and DeviceArmResourceUri $azureStackHciDetails = Get-AzureStackHCI $deviceArmResourceUri = $azureStackHciDetails.AzureResourceUri $StampId = $azureStackHciDetails.AzureResourceName $nodeId = $StampId + "-" + (Get-ClusterNode(hostname)).Id Set-GlobalEnvironmentVariable -EnvVariableName "HCI_RESOURCE_URI" -EnvVariableValue $deviceArmResourceUri Trace-Execution "$functionName : HCI_RESOURCE_URI Environment variable set to - $env:HCI_RESOURCE_URI" # Disable telemetry if either diagnostic level is Off or StreamingDataClient value is False. $diagnosticLevel = [System.Convert]::ToString($azureStackHciDetails.DiagnosticLevel).ToLower() $telemetryEnabled = $true if ($diagnosticLevel -eq "off" -or $StreamingDataClient -eq $false) { $telemetryEnabled = $false } try { Trace-Execution "$functionName : Observability tasks will now run on node $($env:COMPUTERNAME)." $envInfoFilePath = "$GmaPackageContentPath\EnvironmentInfo.json" $tenantInfoContent = Get-Content $envInfoFilePath -Raw | ConvertFrom-Json $envInfo = $tenantInfoContent.$GcsEnvironment $configTypes = @("Telemetry", "Diagnostics", "Health", "Security", "Metrics") foreach($configType in $configTypes) { ## Based on the config type, initialize dynamic variables. $envInfoFilePath = "$GmaPackageContentPath\EnvironmentInfo.json" $tenantInfoContent = Get-Content $envInfoFilePath -Raw | ConvertFrom-Json $envInfo = $tenantInfoContent.$GcsEnvironment $arcAgentResourceInfo = Get-ArcAgentResourceInfo $arcAgentResourceId = Get-ArcAgentResourceId -ArcAgentInfo $arcAgentResourceInfo $gcsEndpoint = $envInfo.EndPoint $gcsAccount = $envInfo.Account $gcsNameSpace = $envInfo.Namespaces.$configType if ($configType -eq "Metrics") { $gcsNameSpace = Get-MetricsNamespaceRegionMapping -MetricsNamespace $envInfo.Namespaces.$configType -Region $arcAgentResourceInfo.Location $metricsShoeboxAccount = Get-MetricsShoeboxAccountName -ShoeboxAccountPrefix $envInfo.ShoeboxAccountPrefix -MetricsNamespace $envInfo.Namespaces.$configType -Region $arcAgentResourceInfo.Location } $genevaConfigVersion = $envInfo.ConfigVersion $jsonConfigFileName = "AEO" + $configType + ".json" $jsonDropLocation = Join-Path -Path $GMACacheFolderPath -ChildPath "JsonDropLocation" $tenantJsonFilePath = Join-Path -Path $jsonDropLocation -ChildPath $jsonConfigFileName $cacheLocalPath = Join-Path -Path $GMACacheFolderPath -ChildPath $($configType + "Cache") Trace-Execution "$functionName : Multi-Tenant Json will be created for Observability-$configType under $gcsRegionName region and $gcsEnvironment environment on $($env:COMPUTERNAME)." Set-TenantConfigRegistryKeys ` -ConfigType $configType ` -Version "1.0" ` -GcsAuthIdType "AuthMSIToken" ` -GcsEnvironment $gcsEndpoint ` -GcsGenevaAccount $gcsAccount ` -GcsNamespace $gcsNameSpace ` -GcsRegion $gcsRegionName ` -GenevaConfigVersion $genevaConfigVersion ` -LocalPath $cacheLocalPath ` -DisableUpdate "true" ` -DisableCustomImds "true" ` -MONITORING_AEO_REGION $gcsRegionName ` -MONITORING_AEO_DEVICE_ARM_RESOURCE_URI $deviceArmResourceUri ` -MONITORING_AEO_STAMPID $StampId ` -MONITORING_AEO_CLUSTER_NAME $managementClusterName ` -MONITORING_AEO_OSBUILD (Get-OSBuildVersion) ` -MONITORING_AEO_ASSEMBLYBUILD $assemblyVersion ` -MONITORING_AEO_NODEID $nodeId ` -MONITORING_AEO_NODE_ARC_RESOURCE_URI $arcAgentResourceId ` -MONITORING_AEO_CLUSTER_NODE_NAME "%COMPUTERNAME%" # Conditionally create the security tenant json to enable/disable secuirty MA namespace. # In Deployment it is always disabled. In Scale-Out and Update it can be either enabled or disabled. if ($configType -ieq "Security") { if (-not $Parameters.Roles.Contains("SyslogForwarder")) { Trace-Execution "Will not create new Security tenant config. SyslogForwarder role configuration not found." continue } $syslogForwarderRole = $Parameters.Roles["SyslogForwarder"].PublicConfiguration try { $syslogEnabled = [System.Convert]::ToBoolean($syslogForwarderRole.PublicInfo.SyslogEnabled) } catch { Trace-Execution "Failed to retrieve SyslogForwarder enabling state: $_. SyslogForwarder configuration state: $($syslogForwarderRole.PublicInfo.SyslogEnabled)" continue } if (-not $syslogEnabled) { Trace-Execution "Will not create new Security tenant config when SyslogForwarder is disabled" continue } } & "$gmaPackageContentPath\NewMultiTenantJsonForObservabilityGMA.ps1" ` -ConfigType $configType ` -GmaPackageContentPath $gmaPackageContentPath ` -TelemetryEnabled $telemetryEnabled ` -TenantJsonFilePath $tenantJsonFilePath ` -GcsNamespace $gcsNameSpace } $taskName = "Get-TelemetryStatusAndEditConfigsInJsonDropLocation" $description = "Runs every hour to fetch telemetry status and based on that either adds or removes Telemetry config from JsonDropLocation" $scriptPath = "$gmaPackageContentPath\GetTelemetryStatusAndEditConfigs.ps1" $telemetryGcsNamespace = $envInfo.Namespaces.Telemetry # Need to convert StreamingDataClient to int as arguments are sent as string. # If just True or False is sent as string, it doesn't implicitly convert it to Boolean, but it is able to convert 0 and 1 to boolean. $scriptArguments = "-TaskName `'$taskName`' -GMACacheFolderPath `'$GMACacheFolderPath`' -GMAPackageContentPath `'$gmaPackageContentPath`' -StreamingDataClient $([System.Convert]::ToInt16($streamingDataClient)) -GcsNamespace `'$telemetryGcsNameSpace`'" Trace-Execution "$functionName : ScheduledTask to fetch Telemetry status and Edit configs based on it will be created now on $($env:COMPUTERNAME)." New-ScheduledTaskForObservability $taskName $description $scriptPath $scriptArguments } catch { if ($null -eq (Get-Command Get-ExceptionDetails -ErrorAction SilentlyContinue)) { Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -Force } $customErrorMessage = "$functionName : Could not run Observability tasks on node $($env:COMPUTERNAME) due to following error: " $customErrorMessage += Get-ExceptionDetails -ErrorObject $_ Trace-Error $customErrorMessage throw } } <# .SYNOPSIS Evaluation function to identify what type of GMA configuration action to use. Following are the cases involved during evaluation : case 1 : If the interface is invoked in case of Deployment then run configuration on all nodes. case 2 : If the interface is invoked in case of AddNode or RepairNode then run configuration on only that node. .EXAMPLE [GMATenantJson]::EvaluateGMAConfigurationType($Parameters) .PARAMETER Parameters The ECE role parameters for this interface. #> static [CloudEngine.Actions.ConditionalActionDescription] EvaluateGMAConfigurationType([CloudEngine.Configurations.EceInterfaceParameters] $Parameters) { $ErrorActionPreference = "Stop" ## For classes in PS, we need to use the call stack to get the current executing function. $functionName = $(Get-PSCallStack)[0].FunctionName try { $cloudRolePath = "GMATenantJson" $gmaConfigOnAllNodes = "ConfigureGMAOnAllNodes" $gmaConfigOnOneNode = "ConfigureGMAOnOneNode" $gmaConfigOnAllNodesAction = [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction($cloudRolePath, $gmaConfigOnAllNodes) $gmaConfigOnOneNodeAction = [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction($cloudRolePath, $gmaConfigOnOneNode) $nodeName = Get-ExecutionContextNodeName -Parameters $Parameters if($null -ne $nodeName) { # In add node or repair node case, ExecutionContextNodeName should have exactly one value. Trace-Execution "Execution context node was determined. GMA will be configured on $nodeName only." return $gmaConfigOnOneNodeAction } # In regular deployment case, ExecutionContextNodeName will be null. Trace-Execution "No exceution context node was determined. GMA will be configured on all the nodes." return $gmaConfigOnAllNodesAction } catch { Trace-Error "$functionName :Failed to evaluate GMA configuration type on node $($env:COMPUTERNAME) due to following error : $_" throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALIIs+vNlsaVm+ # s9heLt0IrJw4ok5uV53Kbw5NOvUFqaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPScT/geNglfnQ//YpHLQ44k # RgQKcW1ot/Ut34Udn170MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAnVQrayqUyGRZ18VtAU2rilP7Rs3aSkMU3UmHWtOenlaFPP+juFa9Z66n # Jg2GfHMvCu2dP0x2p61R/JmivG/5m1eZgl7T2jne7pl+WJElr+Pbbz4e0fRdHT3C # zqJL0+54yLRVp1+0924mvJacKJSECCWafPgDKcGjOpjKBmBji7uhHab4DJ2sLCIx # 7hDmZF9s1ciCe+oTbD3NJyByApqKL0+Nwr61+1LMhRe1awXosC+E7JbELUD5JkYR # d+reV6KkO1QvJpMoDQfltkPnyVfCqHlfa2g6ntTpkspOExeCkf4E06Qto9eOsuzv # GA7rA3cqbqp0MLHbpaPE5nYSWZB1DaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBNWeW3vclzA+iBiXEFQTyj+kDw0D7rpsj0xAQtnzYA8AIGZbqjMxsK # GBMyMDI0MDIxMjE0MDg0NS4yNjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA # 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu # jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi # y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD # NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg3V4cxNBdE803H3b5Vdy21DWZMYhlHy7aawxz9yURyYIwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A # MA0GCSqGSIb3DQEBCwUABIICABR6sSwd4qo2PltFbyK3ebqfoVd+vOS9U4KXokEw # XY4cDSXXFd70Q/MO25BTkxh53wZaZRppgZ34h12G3SKf4oVrIHFciIndy7RnjyID # uXx+vdT9/+9dRzr+Me80Qh2rwYGeaBpSe4p1aZmlfYbeUapgZWGbdsDHSDjW2u6d # MSVG1Maj0GEItU56haGYYSkJN/gufHF88DXCAgVSWl5AI/MRYHfpT9nu66XxfBKq # 6Ul5q0InNvYP7UfDxpORHJApPtzivIYYu/HVV6/dnRfgt/iB3zWUCvtMD+OoI3Xg # mo/RQwwEEYuRhOLBZ11/t+HQ/5QP/rflWNALBqBD3wbDENBy8rM6d+wzqeZR0jXn # LDJ4plQGFUcHbbfeTBf3ipoYRh1G7AaqIDm8cDai2A5cIsy/yS05nkOAfHiE/+eH # ToLxm8kyuGBb6i5+hT5HWtTLFioN8TMDpXlQEUasPnvam8vtA6V0d1+J/ZJVowQD # vtqSrbMEL9pBphzyKxvfogQisPlXsej9DF3WIdnxEG7gyNEPqNxNj0z8bbLVjkgj # Z4sbn3/vYEuatZWdBRnp+s/7e8wgXcM+YvVQP0Fj4IiyeuqxiFmdcW7mMkDpAtj9 # fIRzRqCqYwDyyRH75C6XOdyH9+NDvhuky6CHtby7doAeszJCfKm7OBsW5Sh2jz8t # Gxu3 # SIG # End signature block
combined_dataset/train/non-malicious/LetterDiamondOneliner v_3.ps1
LetterDiamondOneliner v_3.ps1
&{param([char]$c)[int]$s=65;$p=$c-$s;$r=,(' '*$p+[char]$s);$r+=@(do{"{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p));$r;$r[-2..-99]}Z # trimmed 130 chars w/o arg &{param([char]$c)$p=$c-($s=65);$r=,(' '*$p+[char]$s);do{$r+="{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p);$r;$r[-2..-99]}J # trimmed to 127 chars w/o arg &{$p=[char]$args[0]-($s=65);$r=,(' '*$p+[char]$s);do{$r+="{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p);$r;$r[-2..-99]}J
combined_dataset/train/non-malicious/217.ps1
217.ps1
function Test-RemoteDesktopIsEnabled { PARAM( [String[]]$ComputerName = $env:COMPUTERNAME ) FOREACH ($Computer in $ComputerName) { TRY{ IF (Test-Connection -Computer $Computer -count 1 -quiet) { $Splatting = @{ ComputerName = $Computer NameSpace = "root\cimv2\TerminalServices" } [boolean](Get-WmiObject -Class Win32_TerminalServiceSetting @Splatting).AllowTsConnections } } CATCH{ Write-Warning -Message "Something wrong happened" Write-Warning -MEssage $Error[0].Exception.Message } } }
combined_dataset/train/non-malicious/1094.ps1
1094.ps1
if( (Get-WmiObject -Class 'Win32_ComputerSystem').Domain -eq 'WORKGROUP' ) { Write-Warning -Message ('Find-ADUser tests can''t run because this computer is not part of a domain.') } else { $domainUrl = '' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Setup { $domainController = Get-ADDomainController -Domain $env:USERDOMAIN Assert-NotNull $domainController $domainUrl = "LDAP://{0}:389" -f $domainController } function Test-ShouldFindUser { $me = Find-ADUser -DomainUrl $domainUrl -sAMAccountName $env:USERNAME Assert-NotNull $me Assert-Equal $env:USERNAME $me.sAMAccountName } function Test-ShouldEscapeSpecialCharacters { $me = Find-ADUser -DomainUrl $domainUrl -sAMAccountName "(user*with\special/characters)" Assert-Null $me } }
combined_dataset/train/non-malicious/ConvertFrom-Property_2.ps1
ConvertFrom-Property_2.ps1
<# .SYNOPSIS Converts data from flat or single-level property files into PSObjects .DESCRIPTION Converts delimited string data into objects .PARAMETER InputObject The text to be parsed .PARAMETER FilePath A file containing text to be parsed (so you can pipeline files to be processed) .PARAMETER ValueSeparator The value separator string used between name=value pairs. Allows regular expressions. Typical values are "=" or ":" or ";" Defaults to "=" .PARAMETER PropertySeparator The property separator string used between sets of name=value pairs. Allows regular expressions. Typical values are "`n" or "`n`n" or "\\n\\s*\\n" Defaults to "\\n\\s*\\n?" .PARAMETER CountOfPropertiesPerRecord Separate the input into groups of a certain number of properties. If your input file has no specific record separator, you can usually match the first property by using a look-ahead expression *(See Example 2)* However, if the properties aren't in the same order each time or regular expressions make you queasy, and each of your records have the same number of properties on each record, you can use this to separate them by count. .PARAMETER RecordSeparator The record separator string is used between records or sections in a text file. Typical values are "\\n\\s*\\n" or "\\n\\[(.*)\\]\\s*\\n" Defaults to "\\n\\[(.+)\\]\\s*\\n" (the correct value for ini files). To support named sections or records, make sure to use a regular expression here that has a capture group defined. .PARAMETER AutomaticRecords Supports guessing when a new record starts based on the repetition of a property name. You can use this whenever your input has multiple records and the properties are always in the same order. .PARAMETER SimpleOutput Prevent outputting the PSName parameter which indicates the source of the object when pipelineing file names .EXAMPLE ConvertFrom-PropertyString config.ini Reads in an ini file (which has key=value pairs), using the default settings .EXAMPLE @" ID:3468 Type:Developer StartDate:1998-02-01 Code:SWENG3 Name:Baraka ID:11234 Type:Management StartDate:2005-05-21 Code:MGR1 Name:Jax "@ |ConvertFrom-PropertyString -sep ":" -RecordSeparator "\\r\\n\\s*\\r\\n" | Format-Table Code StartDate Name ID Type ---- --------- ---- -- ---- SWENG3 1998-02-01 Baraka 3468 Developer MGR1 2005-05-21 Jax 11234 Management Reads records from a key:value string with records separated by blank lines. NOTE that in this example you could also have used -AutomaticRecords or -Count 5 instead of specifying a RecordSeparator .EXAMPLE @" Name=Fred Address=Street1 Number=123 Name=Janet Address=Street2 Number=345 "@ | ConvertFrom-PropertyString -RecordSeparator "`n(?=Name=)" Reads records from a key=value string and uses a look-ahead record separator to start a new record whenever "Name=" is encountered NOTE that in this example you could have used -AutomaticRecords or -Count 3 instead of specifying a RecordSeparator .EXAMPLE ConvertFrom-PropertyString data.txt -ValueSeparator ":" Reads in a property file which has key:value pairs .EXAMPLE Get-Content data.txt -RecordSeparator "`r`n`r`n" | ConvertFrom-PropertyString -ValueSeparator ";" Reads in a property file with key;value pairs, and records separated by blank lines, and converts it to objects .EXAMPLE ls *.data | ConvertFrom-PropertyString Reads in a set of *.data files which have an object per file defined with key:value pairs of properties, one-per line. .EXAMPLE ConvertFrom-PropertyString data.txt -RecordSeparator "^;(.*?)\\r*\\n" -ValueSeparator ";" Reads in a property file with key:value pairs, and sections with a header that starts with the comment character ';' .NOTES 3.0 2010 Aug 4 (This Version) - Renamed most of the parameters because I couldn't tell which did what from the Syntax help - Added a -AutomaticRecords switch which creates new output objects whenevr it encounters a duplicated property - Added a -SimpleOutput swicth which prevents the output of the PSChildName property - Added a -CountOfPropertiesPerRecord parameter which allows splitting input by count instead of regex or automatic 2.0 2010 July 9 http://poshcode.org/get/1956 - changes the output so that if there are multiple instances of the same key, we collect the values in an array 1.0 2010 June 15 http://poshcode.org/get/1915 - Initial release #> #function ConvertFrom-PropertyString { [CmdletBinding(DefaultParameterSetName="Data")] param( [Parameter(Position=99, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Data")] [Alias("Data","Content","IO")] [string]$InputObject , [Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName="File")] [Alias("PSPath")] [string]$FilePath , [Parameter(ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [Alias("VS","Separator")] [String]$ValueSeparator="\\s*=\\s*" , [Parameter(ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [Alias("PS","Delimiter")] [String]$PropertySeparator='(?:\\s*\\n+\\s*)+' , [Parameter(ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [Alias("RS")] [String]$RecordSeparator='(?:\\n|^)\\[([^\\]]+)\\]\\s*\\n' , [Parameter(ParameterSetName="Data")] [Alias("MultiRecords","MR","MultipleRecords","AR","AutoRecords")] [Switch]$AutomaticRecords , [Parameter()] [int]$CountOfPropertiesPerRecord , [Parameter()] [Switch]$SimpleOutput ) begin { function new-output { [CmdletBinding()] param( [Switch]$SimpleOutput , [AllowNull()][AllowEmptyString()] [String]$Key , [AllowNull()][AllowEmptyString()] $FilePath ) end { if(!$SimpleOutput -and ("" -ne $Key)) { @{"PSName"=$key} } elseif(!$SimpleOutput -and $FilePath) { @{"PSName"=((get-item $FilePath).PSChildName)} } else { @{} } } } function out-output { [CmdletBinding()] param([Hashtable]$output) end { ## If we made arrays out of single values, unwrap those foreach($k in $Output.Keys | Where { $Output.$_.Count -eq 1 } ) { $Output.$k = $Output.$k[0] } if($output.Count) { New-Object PSObject -Property $output } } } Write-Verbose "Setting up the regular expressions: `n`tRecord: '$RecordSeparator' `n`tProperty: '$PropertySeparator' `n`tValue: '$ValueSeparator'" [Regex]$ReRecordSeparator = New-Object Regex ([System.String]$RecordSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") [Regex]$RePropertySeparator = New-Object Regex ([System.String]$PropertySeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") [Regex]$ReValueSeparator = New-Object Regex ([System.String]$ValueSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") } process { ## some kind of PowerShell bug when expecting pipeline input: if(!"$ReRecordSeparator"){ Write-Verbose "Setting up the record regex in the PROCESS block: '$RecordSeparator'" [Regex]$ReRecordSeparator = New-Object Regex ([System.String]$RecordSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") } if(!"$RePropertySeparator"){ Write-Verbose "Setting up the property regex in the PROCESS block: '$PropertySeparator'" [Regex]$RePropertySeparator = New-Object Regex ([System.String]$PropertySeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") } if(!"$ReValueSeparator") { Write-Verbose "Setting up the value regex in the PROCESS block: '$ValueSeparator'" [Regex]$ReValueSeparator = New-Object Regex ([System.String]$ValueSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") } Write-Verbose "ParameterSet: $($PSCmdlet.ParameterSetName)" Write-Verbose "ValueSeparator: $($ReValueSeparator)" $InputData = @{} if($PSCmdlet.ParameterSetName -eq "File") { $AutomaticRecords = $true $InputObject = Get-Content $FilePath -Delimiter ([char]0) } ## Separate RecordText with the RecordSeparator if the user asked us to: if($PsBoundParameters.ContainsKey('RecordSeparator') -or $AutomaticRecords ) { $Records = $ReRecordSeparator.Split( $InputObject ) | Where-Object { $_ } Write-Verbose "There are $($ReRecordSeparator.GetGroupNumbers().Count) groups and $(@($Records).Count) records!" if($ReRecordSeparator.GetGroupNumbers().Count -gt 1 -and @($Records).Count -gt 1) { while($Records) { $Key,$Value,$Records = $Records Write-Verbose "RecordSeparator with grouping: $Key = $Value" $InputData.$Key += @($Value) } } elseif(@($Records).Count -gt 1) { $InputData."" = @($Records) $InputObject = $Records } else { $InputObject = $Records } } ## Separate RecordText into properties and group them together by count if we were told a count if($PsBoundParameters.ContainsKey('CountOfPropertiesPerRecord')) { $Properties = $RePropertySeparator.Split($InputObject) Write-Verbose "Separating Records by Property count = $CountOfPropertiesPerRecord of $($Properties.Count)" for($Index = 0; $Index -lt $Properties.Count; $Index += $CountOfPropertiesPerRecord) { $InputData."" += @($Properties[($Index..($Index+$CountOfPropertiesPerRecord-1))] -Join ([char]0)) Write-Verbose "Record ($Index..) $($Index/$CountOfPropertiesPerRecord) = $(@($Properties[($Index..($Index+$CountOfPropertiesPerRecord-1))] -Join ([char]0)))" } ## We have to manually set the PropertySeparator because we can't generate text from your regex pattern to match your regex pattern $SetPropertySeparator = $RePropertySeparator [Regex]$RePropertySeparator = New-Object Regex ([System.String][char]0), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled") } if($InputData.Keys.Count -eq 0){ Write-Verbose "Keyless entry enabled!" $InputData."" = @($InputObject) } Write-Verbose "InputData: $($InputData.GetEnumerator() | ft -auto -wrap| out-string)" ## Process each Record foreach($key in $InputData.Keys) { foreach($record in $InputData.$Key) { Write-Verbose "Record($Key): $record" $output = new-output -SimpleOutput:$SimpleOutput -Key:$Key -FilePath:$FilePath foreach($Property in $RePropertySeparator.Split("$record")) { [string[]]$data = $ReValueSeparator.split($Property,2) | foreach { $_.Trim() } | where { $_ } Write-Verbose "Property: $Property --> $($data -join ': ')" if($AutomaticRecords -and $Output.ContainsKey($Data[0])) { out-output $output $output = new-output -SimpleOutput:$SimpleOutput -Key:$Key -FilePath:$FilePath } switch($data.Count) { 1 { $output.($Data[0]) += @($null) } 2 { $output.($Data[0]) += @($Data[1]) } } } out-output $output } } ## Put this back in case there's more input $RePropertySeparator = $SetPropertySeparator } #}
combined_dataset/train/non-malicious/adv2.ps1
adv2.ps1
#-------------------------------------------------------- # Script : Advanced2_2011.ps1 # Author : marc carter (marcadamcarter) # Date : 4/5/2011 # Keywords: PowerShell, Scripting Games # Comments: # Expected Arguments: ADquery, Excel, textfile, <device_name_or_ip> # Examples: .\\Advanced2_2011.ps1 ADquery # .\\Advanced2_2011.ps1 Excel <file_fullname> # .\\Advanced2_2011.ps1 textfile <file_fullname> - File format: List of device names, one per line. # .\\Advanced2_2011.ps1 <device_name_or_ip> #-------------------------------------------------------- #Begin Functions Function get-runningServices{ #-------------------------------------------------------- <# .SYNOPSIS Retrieves currently running Services and their Dependent services and reports on the dependent services status .DESCRIPTION Retrieves currently running Services and their Dependent services and reports on the dependent services status .PARAMETER server Name of the server(s) you wish to query. .NOTES Name: get-runningServices Author: Marc Carter DateCreated: 5APR2011 .EXAMPLE get-ModuleInfo LOCALHOST Description ------------ Returns a formatted list of running Services and their dependancies. #> [cmdletbinding( DefaultParameterSetName = 'server', ConfirmImpact = 'low' )] Param( [Parameter( Mandatory = $True, Position = 0, ParameterSetName = '', ValueFromPipeline = $True)] [string][ValidatePattern(".{2,}")]$server ) Begin{ $ErrorActionPreference = "SilentlyContinue" $array = @() } Process{ $isServer = get-OSVersion $server #Test to see if running server OS if($isServer){ get-service -ComputerName $server | where-object {$_.Status -eq "Running"} | Select-Object name | % { $BaseServiceName = $_.Name Get-Service -name $_.Name -DependentServices | Sort-Object Name | Select-Object Name, Status | % { #Group values into a custom object in order to output in table view. $tmpObj = New-Object Object $tmpObj | add-member -membertype noteproperty -name "BaseServiceName" -value $BaseServiceName $tmpObj | add-member -membertype noteproperty -name "DependentName" -value $_.Name $tmpObj | add-member -membertype noteproperty -name "DependentStatus" -value $_.Status #Append the object to the existing array. $array += $tmpObj } } } else { "Skipping $server (Not running Server OS)" } } End{ #Output results of the array and set both to $Null when done. $array | ft @{Name='BaseServiceName';Expression={$_.BaseServiceName}; Align='Right';}, @{Name='DependentName';Expression={$_.DependentName};}, @{Name='DependentStatus';Expression={$_.DependentStatus};align='Left';} -auto $array = $Null $tmpObj = $Null } } #-------------------------------------------------------- #End function get-runningServices function get-listFromAD{ #-------------------------------------------------------- <# .SYNOPSIS Retrieves list of devices from active directory. .DESCRIPTION Retrieves list of devices from active directory. Description ------------ Returns list of devices from AD query. #> $strFilter = "(&(objectcategory=computer)(operatingsystem=Windows Server*))" #All Server OS $props = "cn" $dse = [ADSI]"LDAP://rootdse" #$root = "LDAP://"+$dse.defaultNamingContext $ds = New-Object DirectoryServices.DirectorySearcher([ADSI]$root,$strFilter,$props) $ds.PageSize = 1000 $results = $ds.FindAll() foreach($obj in $results){ $obj.properties.cn } } #-------------------------------------------------------- #End function get-listFromAD function get-OSVersion($computer){ #-------------------------------------------------------- $os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer Switch ($os.Version){ "5.1.2600" { $False } "5.1.3790" { $True } "6.0.6001" { if($os.ProductType -eq 1){ $False } else{ $True } } "6.1.7600"{ if($os.ProductType -eq 1){ $False } else{ $True } } DEFAULT { "N/A" } } } #-------------------------------------------------------- #End get-OSVersion #End Functions #Main Script #-------------------------------------------------------- #If arguments are present, determine how to proceed. if($args){ <# If arguments exist, assume input from external sorce .Expected: ADquery, Excel, Text, <device_name_or_ip> .Examples: .\\Advanced2_2011.ps1 ADquery .\\Advanced2_2011.ps1 Excel <file_fullname> .\\Advanced2_2011.ps1 textfile <file_fullname> - File format: List of device names, one per line. .\\Advanced2_2011.ps1 <device_name_or_ip> #> switch($args[0].toLower()){ "adquery" { foreach($device in get-listFromAD){ $device.toUpper() get-runningServices $device } } "excel" { if(Test-Path $args[1]){ $xlCSV=6 $xls=$args[1] $csv=$args[1] -replace(".xls",".csv") $xl=New-Object -com "Excel.Application" $wb=$xl.workbooks.open($xls) $wb.SaveAs($csv,$xlCSV) $xl.displayalerts=$False $xl.quit() Import-Csv $csv | Select-Object name | % { $_.name get-runningServices $_.name } } else{ Write-Error "`nInvalid path for $args[1]`nCheck the path and try again." } } "textfile" { if(Test-Path $args[1]){ Get-Content -Path $args[1] | % { $_ get-runningServices $_ } } else{ Write-Error "`nInvalid path for $args[1]`nCheck the path and try again." } } Default { #Initiate the function taking the first argument (assume single server instance name). get-runningServices $args[0] } } } else{ #Otherwise, initiate the function and prompt for device. get-runningServices }
combined_dataset/train/non-malicious/sample_33_2.ps1
sample_33_2.ps1
# # Module manifest for module 'OCI.PSModules.Datalabelingservicedataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datalabelingservicedataplane.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c7f9095b-be8f-42bb-88ca-422eca4176a1' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datalabelingservicedataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservicedataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDatalabelingservicedataplaneAnnotation', 'Get-OCIDatalabelingservicedataplaneAnnotationsList', 'Get-OCIDatalabelingservicedataplaneDataset', 'Get-OCIDatalabelingservicedataplaneRecord', 'Get-OCIDatalabelingservicedataplaneRecordContent', 'Get-OCIDatalabelingservicedataplaneRecordPreviewContent', 'Get-OCIDatalabelingservicedataplaneRecordsList', 'Invoke-OCIDatalabelingservicedataplaneSummarizeAnnotationAnalytics', 'Invoke-OCIDatalabelingservicedataplaneSummarizeRecordAnalytics', 'New-OCIDatalabelingservicedataplaneAnnotation', 'New-OCIDatalabelingservicedataplaneRecord', 'Remove-OCIDatalabelingservicedataplaneAnnotation', 'Remove-OCIDatalabelingservicedataplaneRecord', 'Update-OCIDatalabelingservicedataplaneAnnotation', 'Update-OCIDatalabelingservicedataplaneRecord' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservicedataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_33_73.ps1
sample_33_73.ps1
# # Module manifest for module 'OCI.PSModules.Apmcontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2656b809-7098-428e-b605-696525730fec' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain', 'Get-OCIApmcontrolplaneApmDomainsList', 'Get-OCIApmcontrolplaneApmDomainWorkRequestsList', 'Get-OCIApmcontrolplaneDataKeysList', 'Get-OCIApmcontrolplaneWorkRequest', 'Get-OCIApmcontrolplaneWorkRequestErrorsList', 'Get-OCIApmcontrolplaneWorkRequestLogsList', 'Get-OCIApmcontrolplaneWorkRequestsList', 'Move-OCIApmcontrolplaneApmDomainCompartment', 'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys', 'Remove-OCIApmcontrolplaneApmDomain', 'Remove-OCIApmcontrolplaneDataKeys', 'Update-OCIApmcontrolplaneApmDomain' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_65_5.ps1
sample_65_5.ps1
$ErrorActionPreference = 'Stop' <# .Synopsis Returns payload information from glcm. This info is required to send a heart beat request to AA #> function Get-HeartbeatInfo { [CmdletBinding()] param() $glcm = Get-DscLocalConfigurationManager $configurationName = "" $aaServerUrls = New-Object System.Collections.ArrayList if($glcm.ReportManagers) { $serverUrl = $glcm.ReportManagers.ServerURL if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } if($glcm.ResourceModuleManagers) { $serverUrl = $glcm.ResourceModuleManagers.ServerURL if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } if($glcm.ConfigurationDownloadManagers) { $serverUrl = $glcm.ConfigurationDownloadManagers.ServerURL try { #get configuration name if available if($glcm.ConfigurationDownloadManagers.CimClass -and $glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties) { $configurationNamesExists = ($glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)['ConfigurationNames'] if($configurationNamesExists) { $configurationName = [string]($glcm.ConfigurationDownloadManagers.configurationNames) } } } catch { Write-Verbose "[WARNING] Could not retrieve ConfigurationNames from glcm $_ ..." } if($serverUrl -and !($aaServerUrls.Contains($serverUrl))) { $aaServerUrls.Add($serverUrl) > $null } } $registrationMetaData = @{ NodeConfigurationName = $configurationName ConfigurationMode = $glcm.ConfigurationMode ConfigurationModeFrequencyMins = $glcm.ConfigurationModeFrequencyMins RefreshFrequencyMins = $glcm.RefreshFrequencyMins RebootNodeIfNeeded = $glcm.RebootNodeIfNeeded ActionAfterReboot = $glcm.ActionAfterReboot AllowModuleOverwrite = $glcm.AllowModuleOverWrite } return @{ ServerUrls = $aaServerUrls RegistrationMetaData = $registrationMetaData } } function Test-Command { param ( [String] $Name ) return ($null -ne (Get-Command -Name $Name -ErrorAction Continue 2> $null)) } function GetComputerInfoEditionId { param() $windowsEditionId = $null if(Test-Command -Name Get-ComputerInfo) { $windowsEditionId = Get-ComputerInfo -Property WindowsEditionId -ErrorAction SilentlyContinue } return $windowsEditionId } function GetEditionId { param() $windowsEditionId = $null if(Test-Command -Name Get-ItemPropertyValue) { $windowsEditionId = Get-ItemPropertyValue 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId } elseif(Test-Command -Name Get-ItemProperty) { if($editionId = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId -ErrorAction SilentlyContinue) { $windowsEditionId = $editionId.EditionID } } return $windowsEditionId } <# .synopsis Returns windows edition id For e.g. on Nano Server returns - ServerDatacenterNano on Windows Client - Enterprise #> function Get-WindowsEdition { param() $windowsEditionId = GetEditionId if(!$windowsEditionId) { if($windowsEditionId = GetComputerInfoEditionId) { $windowsEditionId = $windowsEditionId.WindowsEditionId } } return $windowsEditionId } <# .Synopsis Returns OS major minor version #> function GetOSVersion { [CmdletBinding()] param() $majorVersion = "" $minorVersion = "" if(Test-Command -Name Get-CimInstance) { $os = Get-CimInstance Win32_OperatingSystem } else { $os = Get-WmiObject Win32_OperatingSystem } $version = $os.Version if($version) { # On PS/.NET 2.0, [System.Version] doesn't have a Parse method if ($version -match '^(?<major>[0-9]+)\.(?<minor>[0-9]+)(\.[0-9]+)*$') { $majorVersion = [int]::Parse($matches['major']) $minorVersion = [int]::Parse($matches['minor']) } else { Write-Verbose "Invalid OS version: $version ..." } } @{ Major = $majorVersion Minor = $minorVersion } } <# .Synopsis Returns VM UUID #> function Get-VMUUId { [CmdletBinding()] param() $vmuuid = "" $status = "success" try { if(Test-Command -Name Get-CimInstance) { $computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct } else { $computerSystemProduct = Get-WmiObject Win32_ComputerSystemProduct } if($computerSystemProduct) { $vmuuid = $computerSystemProduct.UUID } Write-Verbose "VMUUId is $vmuuid ..." } catch { Write-Verbose "[WARNING] An error occurred while retrieving VM UUID $_ ..." $status = "error" } return @{ VMUUID = $vmuuid Status = $status } } <# .Synopsis Returns OS profile object #> function Get-OSProfile { [CmdletBinding()] param() $osName = Get-WindowsEdition $osVersion = GetOSVersion return @{ Name = $osName Type = "Windows" MajorVersion = $osVersion["Major"] MinorVersion = $osVersion["Minor"] VMUUID = (Get-VMUUId).VMUUID } } function GetCimClass { [CmdletBinding()] param( [String] $ClassName, [String] $Namespace ) return (Get-CimClass -ClassName MSFT_DSCMetaConfiguration -Namespace root/microsoft/windows/desiredstateconfiguration -ErrorAction Continue) } <# .Synopsis Retrieves DSC agent id. Returns an empty string if agent id is not available #> function Get-DscAgentId { [CmdletBinding()] param() $agentID = "" $status = "success" #AgentID is not available in wmf 4.0. So return blank agent id if the property does not exists try { if($getlcm = GetCimClass) { if($getlcm -and $getlcm.CimClassProperties -and ($getlcm.CimClassProperties)['AgentId']) { $agentID = (Get-DscLocalConfigurationManager).AgentId } } Write-Verbose "AgentID is $agentID ..." } catch { Write-Verbose "[WARNING] An error occurred while retrieving agent ID $_ ..." $status = "error" } return @{ AgentID = $agentID Status = $status } } <# .Synopsis Returns OAAS certificate from the local machine that is used to authenticate with AA pull server #> function Get-OAASCertificate { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$ServerUrl ) $subject = 'CN=' + $ServerUrl $certificate = Get-ChildItem Cert:\LocalMachine\My | ? Subject -eq $subject | Select-Object -First 1 if (!$certificate) { throw "Failed to retrieve the OAAS certificate for heartbeat api request [ServerURL]: $ServerUrl ..." } return $certificate } <# .Synopsis Returns OAAS endpoint #> function GetOAASEndpoint { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $AgentId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerURL ) return ($ServerURL + "/Nodes(AgentId='" + $AgentId + "')/ExtendedProperties") } function SendWebRequest { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Uri, [Parameter(Mandatory=$true)] [System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate, [Parameter(Mandatory=$true)] [hashtable] $Payload ) $jsonPayload = ConvertTo-Json $Payload -Depth 10 try { $response = Invoke-WebRequest ` -Uri ([Uri] $Uri) ` -ContentType 'application/json' ` -Method Post ` -Certificate $Certificate ` -Headers @{ "protocolversion" = "2.0" } ` -Body $jsonPayload ` -UseBasicParsing return $response } finally { [System.Net.ServicePointManager]::CertificatePolicy = $null } } <# .Synopsis Invokes AA server heartbeat endpoint to send the heartbeat request #> function Send-HeartbeatRequest { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ServerURL, [Parameter(Mandatory=$true)] [hashtable] $Payload ) $agentId = (Get-DscAgentId)["AgentID"] $accountId = Split-Path -Path $ServerURL -Leaf $certificate = Get-OAASCertificate -ServerUrl $ServerURL $endpoint = GetOAASEndpoint -AgentId $agentId -ServerURL $ServerURL try { $response = SendWebRequest -Uri $endpoint -Certificate $certificate -Payload $Payload Write-Verbose "Heartbeat is sent successfully" return } catch { #No retries when status code is 400,401,403,404 $message = "Invoking heartbeat web request failed for registration url {0}: {1}" -f ($ServerURL, $_.ToString().TrimEnd()) Write-Verbose $message } } <# .Synopsis Send Guest config heartbeat #> function Send-Heartbeat { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateSet('GCAgentStart')] [string]$Event ) try { Write-Verbose "[INFO] Event $Event" -Verbose if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) { Write-Verbose "[ERROR] DSC is not installed ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } # Get dsc local configuration manager properties $heartbeatInfo = Get-HeartbeatInfo $serverUrls = $heartbeatInfo["ServerUrls"] if(!$serverUrls) { Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } else { for ($i = 0; $i -lt $serverUrls.Count; $i++) { if(-not $serverUrls.ToLower().Contains('agentservice')) { Write-Verbose "[ERROR] Node is not registered to AA Server. Server URI : $serverUrls ..." Write-Verbose "[ERROR] No heartbeat sent ..." return } } } $extnInfo = @{ Name = "Microsoft.Powershell.DSC" Version = "2.77.0.0" } # Get OS Profile $osProfile = Get-OSProfile # Get OMS cloud if $omsCloudId = '7783-7084-3265-9085-8269-3286-77' # Create request payload $payload = @{ OMSCloudId = $omsCloudId TimeStamp = (Get-Date -UFormat '%Y%m%d-%H%M%S') VMResourceId = "" ExtensionStatusEvent = $Event ExtensionInformation = $extnInfo OSProfile = $osProfile LCMMetaData = $heartbeatInfo["RegistrationMetaData"] } # For each server that VM is registered to, send heartbeat request to AA foreach($serverURL in $serverUrls) { Send-HeartbeatRequest -ServerURL $serverURL -Payload $payload } } catch { Write-Verbose "[ERROR] occurred while sending heartbeat event: $Event ... $_" } } <# .Synopsis Verify if DSC is enabled #> function Test-AutomationDscRegistration { [CmdletBinding()] param( ) try { if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) { Write-Verbose "[ERROR] DSC is not installed ..." -Verbose exit 1 } # Get dsc local configuration manager properties $heartbeatInfo = Get-HeartbeatInfo $serverUrls = $heartbeatInfo["ServerUrls"] if(!$serverUrls) { Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose exit 1 } else { $foundUrl = $false for ($i = 0; $i -lt $serverUrls.Count; $i++) { if($serverUrls.ToLower().Contains('agentsvc')) { $foundUrl = $true Write-Verbose "DSC is registered to pull server ..." -Verbose exit 0 } } } } catch { Write-Verbose "[ERROR] occurred ... $_" -Verbose } Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose exit 1 } function IsFileOlderThanOneHour { [CmdletBinding()] param( [String] $Path ) $lastWrite = (get-item $Path).LastWriteTime $timespan = New-TimeSpan -Days 0 -Hours 1 -Minutes 0 if (((Get-Date) - $lastWrite) -lt $timespan) { return $false } return $true } <# .Synopsis Verify if ChangeTracking/Inventory is enabled ChangeTracking solution saves the inventory and changetracking states under '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\CT*' or '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\FCT*' locations. this functions checks when these state files are modified. if the state files are modified recently (within an hour) then this is considered as the solution is enabled otherwise disabled. #> function Test-ChangeTrackingEnabled { [CmdletBinding()] param( ) try { $mmaServiceStateFolder = Join-Path $env:ProgramFiles 'Microsoft Monitoring Agent\Agent\Health Service State' if(-not(Test-Path $mmaServiceStateFolder)) { Write-Verbose "$mmaServiceStateFolder does not exist" exit 1 } $changeTrackingFolder = Get-ChildItem "$mmaServiceStateFolder\CT*" if($changeTrackingFolder -ne $null) { $chWorkFolder = "$changeTrackingFolder\work" $serviceInventoryFile = "$chWorkFolder\ServiceInventory\ServiceInventory.json" $serviceStateFile = "$chWorkFolder\ServiceState\ServiceState.json" if(Test-Path $serviceInventoryFile) { if(-not(IsFileOlderThanOneHour -Path $serviceInventoryFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $serviceStateFile) { if(-not(IsFileOlderThanOneHour -Path $serviceStateFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } } $fileCTFolder = Get-ChildItem "$mmaServiceStateFolder\FCT*" if($fileCTFolder -ne $null) { $fctWorkFolder = "$fileCTFolder\work" $changedFilesFile = "$fctWorkFolder\ChangedFiles\localhost.json" $changeTrackingFile = "$fctWorkFolder\localhost.json" $inventoryFile = "$fctWorkFolder\Inventory\localhost.json" if(Test-Path $changedFilesFile) { if(-not(IsFileOlderThanOneHour -Path $changedFilesFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $changeTrackingFile) { if(-not(IsFileOlderThanOneHour -Path $changeTrackingFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } if(Test-Path $inventoryFile) { if(-not(IsFileOlderThanOneHour -Path $inventoryFile)) { Write-Verbose "ChangeTracking is enabled" exit 0 } } } } catch { Write-Verbose "[ERROR] occurred ... $_" -Verbose } Write-Verbose "ChangeTracking is not enabled ..." -Verbose exit 1 } Export-ModuleMember -Function @('Send-Heartbeat','Test-AutomationDscRegistration', 'Test-ChangeTrackingEnabled') # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEi08uUxmuV/k+ # eFo9XbeS5D+NnbKbBMmE5ssq40SCKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5+n+JMdZ50mpD1HGFaizpL # LsNtiYBwj2i4vCIuf9wLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAfTNNPf55vLMUy/tiMRB7v/PIXG2ZpgD/yk0tTGjq57/NbR+bbtHW/6my # 011gqy+GHl2hRgE/2u4rNbqurCeUYR/fgXulGYrjMcluV0HSR9fFeX7lDd++BsdI # gorjlW+IVGPe5CIY2EcGyRvsfCB3Hv/ekWn1SqsjNzT/ZuxaTmYwJdt1XbPT7fiV # fQfFxHDjpk5dC/oQIleeIqUEPk9Yuva8Sqm3650vc4uojEVG8uM4IDAI/LvwIGTS # urwtat7Y73NSQmGTKOxuJxVJoDr4RIlURdaSi0xRtGQgoDDPr/xNDb3E8nunL0vB # pjFQGmEFkyiK1F+K4HORbxR4yOJKoqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAyUe7VwGLBox2bq0c5tS4CsgVQPqWOGH/L7qqysIXn3wIGZmra72BH # GBMyMDI0MDcxMTIxMjQzNC4wMzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jpBEDAiGA8yMDI0MDcxMTExMzEy # OFoYDzIwMjQwNzEyMTEzMTI4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqOkEQ # AgEAMAoCAQACAgO5AgH/MAcCAQACAhlnMAoCBQDqO5KQAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAGzi5FO2QiwVQg4gd2LD0g+WyNrl2yI1bZTv0sj1IHWv # MjkmEg8NChd3V9ph8q2YqSHDes4JTRZBTSElrFyd+VM4vTGh2CWV0cjSn0mEk1ac # 7uKIx8j6cSucLO47o1EjpDlT2/swi4rAs1ifahnBsECfgXj8TADKAj9Yl6DGbUqi # o4LzH780lC3SVqeYJVSJNEDFMTm1eCIvBli6duyE4gtB4KwZd3h81S76WCP/sLF1 # 5o22hRBepBMOSWlWU8OeC3Pz/vgWRwF3SWJd2E5USbO74JmmrSBnerzjc6gFmZKY # OJyXFlQBM0ysenqB3MD+niN0Tg5gpJB7L+1y8/fO4LsxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB # 7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAaj7n44rVqP8YifFBZshMk15Gr9LyDE196Kmo4xmqI # +DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/ # xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgdW4n0e/aoaJZRLIf55aQQVAI # m+q4s8Gi+eUTpGwC5RUwDQYJKoZIhvcNAQELBQAEggIAJEM8qiTOrPYON0I1aa0L # UXPFNz+JXLAJSgFtqB1zTN2klOGDZxaO4duYsAV2XuEp/YdovvNsF+zG2XxO8pLu # LD6/KV9kqj9m49iKOdK2m3zoZLBS+8FfoS721rqVYQkJqqYx5RYrxTPZSB0+5tgD # XOAcQF+PTV3CrXnXzhODH07212/VrDZLpSHi8k3KDTRWzds5A0M3SXhgogBiFRT5 # nR3QwrlS1vKh7RDeGhlxx1F3idq0XvSrXz5u3D/WvIk9VCEwRhevdePJ4VfCYh1e # GowKQSt6OGf4eoPc2LyvlFf33id/7/zvLa2cV/5tMf+miKpAgevtWsu8RVAwK0OP # Lo9WU7fEEth2maHjAGk4Uf97kX7kLNplqWtFXvJVyf1sw0bZTU+5ytRR0fWkse6d # IDJgVs+15pdj18cABfuRG+ELWhII/pdnHPRtPUVPY9Wt3iK2A5G8p7cqzGxWkZxW # uU9fWGc29rTbrrb7GiQCCiQuIlkzC0qQT6ocTQEbv2WlMZARWB9lWkHHRp2/qnt3 # z8558wvjjb6HDxAMyaqLmnHUOBrCB5MMER7IsL8GK4Wsrk4GWVV6UvGOUiw/ATwY # 3RVyUuD+HRN85aIhXyafom1PvmBmX5I+rlIMb6BGqiymrrstOS3zbW9aPHb3+bGD # 5v894KyVcFxWVe9c8mD1xYE= # SIG # End signature block
combined_dataset/train/non-malicious/Find Permissions.ps1
Find Permissions.ps1
function findPermission ([string]$a, [string]$b) { $string = $a $user = $b $initialArray = @{} $lowerArray = @{} do{ $initialArray = get-acl $string | %{$_.access} | %{$_.IdentityReference} $lowerArray = $initialArray | %{$_.value.toLower()} | %{$_.SubString(12)} foreach($item in $lowerArray) { if($item.Contains($user)) { $a1 = new-object -comobject wscript.shell $b = $a1.popup($string,0,"Permission Found",1) } } $string = $string.SubString(0, $string.LastIndexOf("\\")) }while($string.Contains("\\")) }