full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/sample_52_84.ps1
|
sample_52_84.ps1
|
Add-AppxPackage
exit
cd C:\Users\sampler-win_10_x64\Desktop\
Get-AppxPackage >apps.tx
cd C:\Users\sampler-win_10_x64\Desktop\
Get-AppxPackage -allusers | Select Name, PackageFullName > apps_v2.txt
Get-AppxPackage | Select Name, PackageFullName > apps_v2.txt
Get-AppxPackage
Get-AppxPackage -Online
Get-AppxPackage -h
Get-AppxPackage help
Get-help -Name Get-AppxPackage
Get-help -Name Add-AppxPackage
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize > C:\Users\sampler-win_10_x64\Desktop\InstalledPrograms-PS.txt
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize
cd ..
ls /l
ls
cd .\sampler-win_10_x64\
ls
cd .\Downloads\
ls
sha1sum .\shockwave-12.3.5.205-installer.exe
sha1sum shockwave-12.3.5.205-installer.exe
shasum shockwave-12.3.5.205-installer.exe
Get-FileHash shockwave-12.3.5.205-installer.exe sha1
Get-FileHash shockwave-12.3.5.205-installer.exe SHA1
Get-FileHash shockwave-12.3.5.205-installer.exe
Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA!
Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA1
Get-FileHash
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads - Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Alhorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Algorithm SHA1
clear
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SlackSetup.exe -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ZoomInstallerFull.exe -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\PBIDesktopSetup_x64.exe -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\atlassian-jira-software-9.13.0-x64.exe -Algorithm SHA1
cd C:\Program Files\WindowsApps
cd C:\Program Files\WindowsApps
ls
cd ..
ll
ls
cd ..
ls
cd '.\Program Files\'
ls
dir -Force
Get-ACL -Path .\WindowsApps\
ls
pwd
$filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (5).exe"
$hash = Get-FileHash -Path $filePath -Algorithm SHA1
Write-Output $hash.Hash.ToLower()
$filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeStandaloneSetup.exe"
$hash = Get-FileHash -Path $filePath -Algorithm SHA1
Write-Output $hash.Hash.ToLower()
$filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (6).exe"
$hash = Get-FileHash -Path $filePath -Algorithm SHA1
Write-Output $hash.Hash.ToLower()
$filePath = "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (6).exe"
$hash = Get-FileHash -Path $filePath -Algorithm SHA1
Write-Output $hash.Hash.ToLower()
Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ASE_Suite.winx64 (1).zip" -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ASE_Suite.linuxamd64.tgz -Algorithm SHA1
Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\CR202003P_300-70005715 (1).EXE" -Algorithm SHA1
Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeStandaloneSetup64 (2).exe" -Algorithm SHA1
Get-FileHash -Parth "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (14).exe" -Algorithm SHA1
Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (14).exe" -Algorithm SHA1
Get-FileHash -Path "C:\Users\sampler-win_10_x64\Downloads\ChromeSetup (19).exe" -Algorithm SHA1
|
combined_dataset/train/non-malicious/sample_37_35.ps1
|
sample_37_35.ps1
|
#
# Module manifest for module 'OCI.PSModules.Integration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Integration.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Integration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation',
'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList',
'Get-OCIIntegrationWorkRequest',
'Get-OCIIntegrationWorkRequestErrorsList',
'Get-OCIIntegrationWorkRequestLogsList',
'Get-OCIIntegrationWorkRequestsList',
'Move-OCIIntegrationInstanceCompartment',
'Move-OCIIntegrationInstanceNetworkEndpoint',
'Move-OCIIntegrationPrivateEndpointOutboundConnection',
'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance',
'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance',
'Update-OCIIntegrationInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_44_18.ps1
|
sample_44_18.ps1
|
#
# Module manifest for module 'OCI.PSModules.Email'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Email.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f1bd31ba-98e7-4163-b9d9-5016214290ab'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Email Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Email.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIEmailDkim', 'Get-OCIEmailDkimsList', 'Get-OCIEmailDomain',
'Get-OCIEmailDomainsList', 'Get-OCIEmailSender',
'Get-OCIEmailSendersList', 'Get-OCIEmailSuppression',
'Get-OCIEmailSuppressionsList', 'Get-OCIEmailWorkRequest',
'Get-OCIEmailWorkRequestErrorsList',
'Get-OCIEmailWorkRequestLogsList', 'Get-OCIEmailWorkRequestsList',
'Move-OCIEmailDomainCompartment', 'Move-OCIEmailSenderCompartment',
'New-OCIEmailDkim', 'New-OCIEmailDomain', 'New-OCIEmailSender',
'New-OCIEmailSuppression', 'Remove-OCIEmailDkim',
'Remove-OCIEmailDomain', 'Remove-OCIEmailSender',
'Remove-OCIEmailSuppression', 'Update-OCIEmailDkim',
'Update-OCIEmailDomain', 'Update-OCIEmailSender'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Email'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2767.ps1
|
2767.ps1
|
$data = & $env:windir\system32\sc query | ForEach-Object {
$svc = $_
if ($svc -match "SERVICE_NAME:\s(.*)") {
& $env:windir\system32\sc qfailure $($matches[1])
}
}
$ServiceName = $RstPeriod = $RebootMsg = $CmdLine = $FailAction1 = $FailAction2 = $FailAction3 = $False
$data | ForEach-Object {
$line = $_
$line = $line.Trim()
if ($line -match "^S.*\:\s(?<SvcName>[-_A-Za-z0-9]+)") {
if ($ServiceName) {
$o = "" | Select-Object ServiceName, RstPeriod, RebootMsg, CmdLine, FailAction1, FailAction2, FailAction3
$o.ServiceName, $o.RstPeriod, $o.RebootMsg, $o.CmdLine, $o.FailAction1, $o.FailAction2, $o.FailAction3 = `
(($ServiceName,$RstPeriod,$RebootMsg,$CmdLine,$FailAction1,$FailAction2,$FailAction3) -replace "False", $null)
$o
}
$ServiceName = $matches['SvcName']
} elseif ($line -match "^RESE.*\:\s(?<RstP>[0-9]+|INFINITE)") {
$RstPeriod = $matches['RstP']
} elseif ($line -match "^REB.*\:\s(?<RbtMsg>.*)") {
$RebootMsg = $matches['RbtMsg']
} elseif ($line -match "^C.*\:\s(?<Cli>.*)") {
$CmdLine = $matches['Cli']
} elseif ($line -match "^F.*\:\s(?<Fail1>.*)") {
$FailAction1 = $matches['Fail1']
$FailAction2 = $FailAction3 = $False
} elseif ($line -match "^(?<FailNext>REST.*)") {
if ($FailAction2) {
$FailAction3 = $matches['FailNext']
} else {
$FailAction2 = $matches['FailNext']
}
}
}
$o = "" | Select-Object ServiceName, RstPeriod, RebootMsg, CmdLine, FailAction1, FailAction2, FailAction3
$o.ServiceName, $o.RstPeriod, $o.RebootMsg, $o.CmdLine, $o.FailAction1, $o.FailAction2, $o.FailAction3 = `
(($ServiceName,$RstPeriod,$RebootMsg,$CmdLine,$FailAction1,$FailAction2,$FailAction3) -replace "False", $null)
$o
|
combined_dataset/train/non-malicious/3448.ps1
|
3448.ps1
|
function Get-ResourceGroupName
{
return getAssetName
}
function Get-DataFactoryName
{
return getAssetName
}
function Get-ProviderLocation($provider)
{
"Brazil South"
}
function Clean-DataFactory($rgname, $dfname)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) {
Remove-AzDataFactory -ResourceGroupName $rgname -Name $dfname -Force
}
}
function Clean-Tags
{
Get-AzTag | Remove-AzTag -Force
}
|
combined_dataset/train/non-malicious/sample_2_67.ps1
|
sample_2_67.ps1
|
#************************************************
# TS_HPPrinterDriverVersionCheck.ps1
# Version 1.0.1
# Date: 07/23/2013
# Author: v-alyao
# Description: [KSE Rule] [ Windows V3] HKCU\Software\Hewlett-Packard registry hive increases in size on Citrix servers
# Rule number: ca320e17-1fa3-4740-9f81-c97f299741b0
# Rule URL: https://kse.microsoft.com/Contribute/Idea/953fdd18-e9ca-4e44-81d4-fe5e613ed747
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber ca320e17-1fa3-4740-9f81-c97f299741b0
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_HPPrinterDriverVersionCheck"
$InformationCollected = new-object PSObject
$Script:HPPrinterDriverRegKey = ""
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
#Add your logic here to specify on which environments this rule will apply
if((($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2)) -or #Windows Server 2003
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or #Vista, 2008
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win7, 2008 R2
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2))) #Win8, 2012
{
$RDSEnabled = isRDSEnabled
if($RDSEnabled)
{
$Script:HPPrinterDriverRegKey = GetHPPrinterDriverRegKey
if($Script:HPPrinterDriverRegKey -ne "")
{
"[AppliesToSystem] HP Universal Printing Driver information was found from " + $HPPrinterDriver | WriteTo-StdOut -shortformat
return $true
}
}
}
return $false
}
Function isRDSEnabled
{
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("[isRDSEnabled] Checking if RDS is Enabled")
continue
}
"Checking if RDS is Enabled" | WriteTo-StdOut
$RDSEnabled = $false
if ((Get-CimInstance -Class Win32_OperatingSystem -Property ProductType).ProductType -ne 1) #Server
{
$TSSetting = (Get-CimInstance -Class Win32_TerminalServiceSetting -Namespace "root\CIMV2\TerminalServices").TerminalServerMode
if (($null -ne $TSSetting) -and ($TSSetting -eq 1))
{
$RDSEnabled = $true
}
}
"RDS is Enabled: $RDSEnabled" | WriteTo-StdOut
return $RDSEnabled
}
Function GetEnvironment([switch]$RegKey)
{
if($RegKey.IsPresent)
{
if($OSArchitecture -eq "AMD64")
{
$environment = "Windows x64"
}
elseif($OSArchitecture -eq "IA64")
{
$environment = "Windows IA64"
}
else
{
$environment = "Windows NT x86"
}
}
else
{
if($OSArchitecture -eq "AMD64")
{
$environment = "x64"
}
elseif($OSArchitecture -eq "IA64")
{
$environment = "IA64"
}
else
{
$environment = "W32X86"
}
}
return $environment
}
Function GetHPPrinterDriverRegKey()
{
$HPPrinterDriverRegKey = ""
$PrintRegKey = "HKLM:\SYSTEM\CurrentControlSet\Control\Print\Environments"
$environment = GetEnvironment -RegKey
$DriverRegKey = Join-Path (Join-Path $PrintRegKey $environment) "Drivers"
# Version-2 - Windows NT 4.0 - ignore this
# Version-3 - Windows 2000 or newer
$DriverWithVersionRegKey = Join-Path $DriverRegKey "Version-3"
if(Test-Path $DriverWithVersionRegKey)
{
$DriverWithVersion = Get-Item $DriverWithVersionRegKey
$SubKeys = $DriverWithVersion.GetSubKeyNames()
foreach($subKey in $SubKeys)
{
if($subKey.StartsWith("HP Universal Printing"))
{
$HPPrinterDriverRegKey = Join-Path $DriverWithVersionRegKey $subKey
}
}
}
return $HPPrinterDriverRegKey
}
Function CheckHPVersionAndRegKeyNumber()
{
$IsRuleFired = $false
$HPPrinterDriverInfo = Get-ItemProperty $Script:HPPrinterDriverRegKey
if(($null -ne $HPPrinterDriverInfo) -and ($null -ne $HPPrinterDriverInfo.'Configuration File'))
{
$environment = GetEnvironment
# 2 - Windows NT 4.0 - ignore this
# 3 - Windows 2000 or newer
$configFilePath = Join-Path (Join-Path (Join-Path "$Env:windir\system32\spool\drivers" $environment) "3") ($HPPrinterDriverInfo.'Configuration File')
if(Test-Path $configFilePath)
{
$fileInfo = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($configFilePath)
$versions = $fileInfo.FileVersion.Split(".")
if(([int]$versions[0] -lt 61) -or (([int]$versions[0] -eq 61) -and ([int]$versions[1] -le 71)))
{
$InformationCollected | add-member -membertype noteproperty -name "HP Universal Printing Driver Version" -value ($fileInfo.FileVersion)
$IsRuleFired = $true
}
}
}
#If the number of registry keys is more than $RedNumberOfRegKey, fire the rule
$RedNumberOfRegKey = 50
$HPHKCURegKey = "HKCU:\Software\Hewlett-Packard"
if(Test-Path $HPHKCURegKey)
{
$HPHKCU = Get-ChildItem $HPHKCURegKey -Recurse
if(($null -ne $HPHKCU) -and ($HPHKCU.Count -gt $RedNumberOfRegKey))
{
$InformationCollected | add-member -membertype noteproperty -name "Number Of HP Registry Keys" -value ($HPHKCU.Count)
$IsRuleFired = $true
}
}
return $IsRuleFired
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
$RootCauseDetected = CheckHPVersionAndRegKeyNumber
#Add information to InformationCollected
#$InformationCollected | add-member -membertype noteproperty -name "Information Collected Name" -value $Value
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBZmenKdq00Ivon
# oyqzPdCzAe0iR0wBcAmfcBn1BMORGaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDiZ
# OhEzAQR6x66u1romJMJkVB2sfM7OLi5H0NaoM1ULMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAOPskLrwR/Ron99IQX7bvXz+WbjWrS8ctbOdZ
# ANYPPw1YId5Im4W1ME7H+OjQ01i/NYldJf6M2mk6DAXspSWfcfMnVMp4stLtpbxe
# ERq4k4e9VsKn1jzPh5Nf6RgkK40oT84S+dmmLujTpeCyAHqW9jR5HfXDsiuTx0BA
# JZn0vuO+gz9DHFCzfkHISU7PfTiXXmEn5F0vdFOIhklW2X2XYdqWEPIyfr4feYNP
# Ak3+9CF/2HkIeiuF2ABoIZWyr0luBYxwmo7FmNb/zTS7QMK/1dEjwFM6rJNHePJo
# MDOsOELZcPOOlMDjyEmNLAJ9W3z/E3GnP4aApTmW4cBhxuaH/aGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAZ7wyy7hZnfZs5hMxLp6H0WcjH9pIcorv5
# XFArucmpHgIGZxqItyNBGBMyMDI0MTAyODExNDA0My4xNDRaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB
# AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW
# b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T
# 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo
# n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB
# +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA
# lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f
# xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU
# TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM
# 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp
# 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc
# 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8
# HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp
# F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV
# bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5
# 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe
# kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx
# iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE
# GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd
# iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2
# JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix
# UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi
# 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q
# bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D
# r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAi
# GA8yMDI0MTAyODA1NDg0MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyaQ5AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEg
# Ea636VH1IhLDsW3Fa0ADcc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeq
# PPb9X5bmbVFXObHp67WigFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/n
# qvDz8msZXcAtE96/FvXd43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6
# hMlUIcog3CD8TCcit1MWEuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/
# jpNVEuQ5uey+mvVyZ/KaPkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa
# JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCEtauQi+iwepk1lWZys73+a2zf
# 5t8gcdE3+Ssktoq7EjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj
# ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlH
# i0Od4rfyi3FO/mCmLpu/ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIApPZo
# RG0sbKw9+x2z2puB5/sPLPti+MxLWhhNWiLa0etat5CwOuf5B4lNh0h108im51Jd
# ib1w//iRygZG+xlrijIeW1Kz1T1ZjGtKiff2e+ni1TttAKa9r/NUPdoFIbmOo6qL
# jgPw1j8zZKHyPls3MVP7SQzIcU3foiBXlEqq5tXiwnznTcXipMOMGtKW8MYj8IEm
# 77g5P47Ykt2fusVVLAZQCehssSc7+J3IA8irTTckm/AJxWdjI+Zeatv92tysazG0
# 9/gC6OEiyMERltc2SYwof81LI6ilDGl579K9q2sy2+lufVFu+szsfuHcZm9wxwhC
# gVHKqflE5skdU4CZtKqnw3IHPUQHz5hNgRpEdlhPpeKVhVQA/Ojco1NmfDtkrKhC
# 4Mu5KzJ9b1FKNEIeFa3bPoafahO9ePtFMRM0a+bkF8Ntssc9sC7g5B0qja2ltTav
# XR8idHMD2K4TjH2xyvIts7KHhA/ser/HdImu0TLsn4vN/Bp+4PNklqKkLJz67Wzy
# aVBT/emSeCs/5Ux5XSaKnykTkBgOh2gQzhyITWJG0wI89a/WYBSM4w/VDhPS0FUv
# MPFO8Y1Z56iN72v7zcpBFiox6UrddykK/fCoplS/pqDYw4bm53S9cF613VKf6BYi
# KWbFb2xB/xi2ReNMNQt+FD4D+c2bjKpn+N/Zjk4=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_39_86.ps1
|
sample_39_86.ps1
|
@{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIIllgYJKoZIhvcNAQcCoIIlhzCCJYMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ
# mTCCGZUCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiqaVqK3TgLMEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAv1uJ+e+9OY2v17aC27EGCXji
# Yw5Exspv4dTWfbUyJUuiR7jlnSg8vtn3v7sD1PgNDSqjb0cbgylmIEqg0XHMb2f2
# 10q53JJEKaUWzJORxlE2Ez/9TOCRrCJ75c1Qv2nl/rzNz3iWCRvjIAPZkVPHpn6s
# NaCX+Jl1wTbJlbSf+/1CD7RoBHk1o0Fq+1pZkqCzVvioZu5BxwAaWHJQdKwyYaV9
# kujlcq9HjmNT1WBKHfBzqUxYwQehKrPZdinM5Hwbq5Ym2TixcLmxIoDX9bcF+a61
# /5jDbIjKnmYIO8kMDHq5ZryVbj6I5VKHSXjzNU5V0EB4EHT8RT186gBqVK0BGaGC
# FygwghckBgorBgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDSxVW9nlzb6PqreGdErw9x
# 6jeF/KW0L7vYOjGQhAzBRAIGZbqlHGxwGBIyMDI0MDIxNzIxMTMwMC4yN1owBIAC
# AfSggdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# LTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm
# MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RDA4Mi00QkZELUVFQkExJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgIT
# MwAAAdzB4IzCX1hejgABAAAB3DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEwMTIxOTA3MDZaFw0yNTAxMTAxOTA3MDZa
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAi8izIDWyOD2RIonN6WtRYXlKGphYvzdqafdITknIhU9QLsXqpNwumGEd
# n2J1/bV/RFoatTwQfJ0Xw3E8xHYpU2IC0IY8lryRXUIa+fdt4YHabaW2aolqcbvW
# YDLCuQoBNieLAos9AsnTQSRfDlNLB+Yldt2BAsWUfJ8DkqD6lSwlfOq6aQi8SvQN
# c++m0AaqR0UsrCjgFOUSCe/N5N9e6TNfy9C1MAt9Um5NSBFTvOg/9EVa3dZqBqFn
# pSWgjQULxeUFANUNfkl4wSzHuOAkN0ScrjhjyAe4RZEOr5Ib1ejQYg6OK5NYPm6/
# e+USYgDJH/utIW9wufACox2pzL+KpA8yUM5x3QBueI/yJrUFARSd9lPdTHIr2ssH
# 9JGIo/IcOWDyhbBfKK/f5sYHp2Z0zrW6vqdS18N/nWU9wqErhWjzek4TX+eJaVWc
# QdBX00nn8NtRKpbZGpNRrY7Yq6+zJEYwSCMYkDXb9KqtGqW8TZ+I3lmZlW2pI9Zo
# hqzHtrQYH591PD6B5GfoyjZLr79tkTBL/QgnmBwoaKc1t/JDXGu9Zc+1fMo5+OSH
# vmJG5ei6sZU9GqSbPlRjP5HnJswlaP6Z9warPaFdXyJmcJkMGuudmK+cSsIyHkWV
# +Dzj3qlPSmGNRMfYYKEci8ThINKTaHBY/+4cH2ASzyn/097+a30CAwEAAaOCAUkw
# ggFFMB0GA1UdDgQWBBToc9IF3Q58Rfe41ax2RKtpQZ7d2zAfBgNVHSMEGDAWgBSf
# pxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w
# JTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAC
# hlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29m
# dCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAA
# MBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG
# 9w0BAQsFAAOCAgEA2etvwTCvx5f8fWwq3eufBMPHgCqAduQw1Cj6RQbAIg1dLfLU
# ZRx2qwr9HWDpN/u03HWrQ2kqTUlO6lQl8d0TEq2S6EcD7zaVPvIhKn9jvh2onTdE
# JPhD7yihBdMzPGJ7B8StUu3xZ595udxJPSLrKkq/zukJiTEzbhtupsz9X4zlUGmk
# JSztH5wROLP/MQDUBtkv++Je0eavIDQIZ34+31z5p2xh+bup7lQydLR/9gmYQQyQ
# SoZcLPIsr52H5SwWLR3iWR1wT5mrkk2Mgd6xfXDO0ZUC29fQNgNl03ZZnWST6E4x
# uVRX8vyfVhbOE//ldCdiXTcB9cSuf7URq3KWJ/N3cKEnXG4YbvphtaCJFecO8KLA
# Oq9Ql69VFjWrLjLi+VUppKG1t1+A/IZ54n9hxIE405zQM1NZuMxsvnSp4gQLSUdK
# kvatFg1W7eGwfMbyfm7kJBqM/DH0/Omxkh4VM0fJUXqS6MjhWj0287/MXw63jggy
# PgztRf1lrhDAZ/kHvXHns6NpfneDFPi/Oge8QFcX2oKYdGBcEttGiYl8OfrRqXO/
# t2kJVAi5DTrafIhkqexfHO4oVvRONdbDo4WkbVuyNek6jkMweTKyuJvEeivhjPl1
# mNXIcA3IqjRtKsCVV6KFxobkXvhJlPwW3IcBboiAtznD/cP5HWhsOEpnbVYwggdx
# MIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGI
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
# aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5
# MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciEL
# eaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa
# 4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxR
# MTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEByd
# Uv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi9
# 47SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi
# ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
# /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY
# 7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtco
# dgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH
# 29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94
# q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcV
# AQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0G
# A1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQB
# gjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v
# cGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgw
# GQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
# /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
# BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJv
# ZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4w
# TDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIB
# AJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRs
# fNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6
# Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveV
# tihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKB
# GUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoy
# GtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE
# cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
# a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+
# k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0
# +CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cir
# Ooo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEA
# oYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0w
# KwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAk
# BgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxN
# aWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAcOf9z
# P7fJGQhQIl9Jsvd2OdASpqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA6XuLrzAiGA8yMDI0MDIxODAzNDY1NVoY
# DzIwMjQwMjE5MDM0NjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpe4uvAgEA
# MAcCAQACAhb1MAcCAQACAjIlMAoCBQDpfN0vAgEAMDYGCisGAQQBhFkKBAIxKDAm
# MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN
# AQEFBQADgYEAFA7hbwsahrjJYQPcGehP3fEi6B5Izd27at9pzpY1AZV7tFHHfW1/
# fBcL6cNuG0hcEnvku6RS5pJGi5oR72Q6j9E2OIRZz9u9anhoIyblag+wF+DsYGV3
# tPFCCnz1tRjCB95cBY6W2t2l3qMlEfRMFktFACRkPguQ8IEOtFh+5HoxggQNMIIE
# CQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw
# JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzC
# X1hejgABAAAB3DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqG
# SIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDI+ID3uiUnMPYqIkxblWOOl65sK1tf
# QY/VkqaP1tluVDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFOnF4pq2UQ/
# jLypnOO5YvQ67QirEQsOFfZMvKXEgg03MIGYMIGApH4wfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwIgQghS5/MPpsDNeC
# UVruOSOpGIQgGctDddv45jBMIDL/XFYwDQYJKoZIhvcNAQELBQAEggIATyBF9Bbt
# tcmtA0NfURMIFk8IUg7Oc3WsHJlp2ZtjBfM+IRWchmC8Gzf6zYVlSK/i43hqekIe
# 1IEq1HxhN0qFMdsgGIucb2jms5A7lKitqxW6JteV7K8Rjyj9PeRzFqfHr779hb1W
# EBZrBfrxU3f0DSk7/VpqJx893xl6jYx+cXx6fRCPLSUGlD/d16lhevM2+YgEWAj6
# WXcwjX+CXFN5MARc8wEFA36+d3CtizdsaeDcbiqEj08xaxl542cibi1d+UfQKYM8
# Gf3sqVigbj90G7XHFpG/cd4h/2/EHZbuERqYot0qK7UM3R39mE5XYwV3vCLA7gff
# nPdmfVD4q0Qp60ySId1jHxHXR+/7GZTneWcRNZgqOw58leShy6xDc1zym0FQWLY2
# UuJu/Vr0Esfq46Ei8PPCjtClQdjhPUGn7liR5kjFHfDRRINdPZ21d3+66rqvjqIw
# D/TtZ9uwdz5jPwbwq346Pkxet/Fqi+zZ+bJVk8iVlMSEY6n5lETu5+i/NHqyWAoH
# lkFsK9J1VsziaXfxNHzwgMobJsS9Q5gHBC9pU29WcopsGeWelWtxntE1/zB61szx
# rAHWU2I+loORPN4I1lgIMDABA3jF3fuHIfjw/E7Kts2QW362ADsqaGDff1A6xzI6
# lz4BickEWsP/CzTwvIJsDdOkHhaaETdxg50=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_23_0.ps1
|
sample_23_0.ps1
|
#
# Module manifest for module 'OCI.PSModules.Analytics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Analytics.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '88b806b7-e2b4-4102-95eb-65f27d654438'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Analytics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Analytics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAnalyticsInstance', 'Get-OCIAnalyticsInstancesList',
'Get-OCIAnalyticsPrivateAccessChannel',
'Get-OCIAnalyticsWorkRequest',
'Get-OCIAnalyticsWorkRequestErrorsList',
'Get-OCIAnalyticsWorkRequestLogsList',
'Get-OCIAnalyticsWorkRequestsList',
'Invoke-OCIAnalyticsScaleAnalyticsInstance',
'Invoke-OCIAnalyticsSetKmsKey',
'Move-OCIAnalyticsInstanceCompartment',
'Move-OCIAnalyticsInstanceNetworkEndpoint',
'New-OCIAnalyticsInstance', 'New-OCIAnalyticsPrivateAccessChannel',
'New-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsInstance',
'Remove-OCIAnalyticsPrivateAccessChannel',
'Remove-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsWorkRequest',
'Start-OCIAnalyticsInstance', 'Stop-OCIAnalyticsInstance',
'Update-OCIAnalyticsInstance',
'Update-OCIAnalyticsPrivateAccessChannel',
'Update-OCIAnalyticsVanityUrl'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Analytics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_1_81.ps1
|
sample_1_81.ps1
|
#************************************************
# DC_CollectSqlErrorlogs.ps1
# Version 1.0.0
# Date: 8-19-2011
# Author: Shon Hauck - Shonh@Microsoft.com
# Description: Collects OS Performance Related Information
# Processor Information
# Operating System Performance Information
#
# NOTE:
#
#************************************************
# Copyright ?2008, Microsoft Corporation. All rights reserved.
# You may use this code and information and create derivative works of it,
# provided that the following conditions are met:
# 1. This code and information and any derivative works may only be used for
# troubleshooting a) Windows and b) products for Windows, in either case using
# the Windows Troubleshooting Platform
# 2. Any copies of this code and information
# and any derivative works must retain the above copyright notice, this list of
# conditions and the following disclaimer.
# 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND,
# WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES
# OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND
# INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION
# WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER.
if($debug -eq $true){[void]$shell.popup("DC_SQL_Misc_OS_Perf_Data.ps1")}
Import-LocalizedData -BindingVariable SQLMiscOSPerfData
#Import-LocalizedData -BindingVariable SQLMiscOSPerfData -FileName SQL_OS_Perf_Info -UICulture en-us
## CPU_PV.VBS
Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Description
$sectionDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info
$OutputFile = $ComputerName + "_Processor_Details.txt"
$CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe CPU_PL.vbs //NOLOGO > $OutputFile"
$fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Description
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
##SYSINFO.vbs
Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description
$OutputFile = $ComputerName + "_OS_Perf_Details.txt"
$CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe SYSINFO.vbs //NOLOGO > $OutputFile"
$fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
##PerfOS_Stats.vbs
Write-DiagProgress -Activity $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Processor_Info -Status $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Information_Description
$OutputFile = $ComputerName + "_OS_Perf_Statistics.txt"
$CommandToExecute = "$Env:windir\system32\cmd.exe /c cscript.exe PerfOS_Stats.vbs //NOLOGO > $OutputFile"
$fileDescription = $SQLMiscOSPerfData.ID_SQL_Setup_Perf_Statistic_Description
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
# SIG # Begin signature block
# MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMMEu9A8ptIJZE
# HuGiUjtiK9ToFjTJ43P2mqmzWTXDQqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG+oRd3LuEb8wNAJ8F+9PTJ8
# K4H8wVUmC6z5PhNb19mXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAnmDC1pFm/kFRlhGgHKKZVKBnqx9eemD+/O8aEjDcP52Is5Uabvkk86GW
# Eu2TAXuFm8QDqXD2BIPNdpbQQEU/uOEY7ejl4xMOmuOPh033Nx+DlMZzupq84hok
# eYwfXpKyGLXGk+2wCyZFTk8ZD6S+Q+VFNcm3ZxxSLRepiEp00Pu40krVJ46Ds39g
# U1exChtk6GeJIIIrIDQfaaw5FDO9KoGNlz3UmbegLbWj7//pLWS1dMgACO2icLoL
# QJHCthCawr4IYM+2eqj1jCxrmXiDpqbg1fDCALcpm2PfWlvSWfN9e1q4FyN22X4P
# 6OMS4cLbHrGLoBtkySM9tramKPPZ9aGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC
# F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBpvuYSFj2VDdt0MPBVsKAfe0hOFY7fNYlyGIMjsvtm6AIGZxp+Oc3T
# GBIyMDI0MTAyODExNDA0Mi45OFowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EeowggcgMIIFCKADAgECAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU1
# NVoXDTI1MDMwNTE4NDU1NVowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4NjAzLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBALG6UJm20h/xf3utb38n5DhWD0+K6AHXJrX8NHHEtbaH
# DLhCC1TePl9XvlkprpdNNCFbkKWQaXqCnWd3lUGzHglv6hTg+wwDZ+h7yA/1tA09
# XEgcwm7pNhyuuff0d1163bGR2pSHPPJJdo8WoUyTZWJ8R+P4dHomF42zYsvObwUM
# mb6kF108MtqD9H4A8hYfJ+2r2K3AzRY/lnR19DIjhaVV5RL6+i2w9tab5EqwfgVA
# 2HNvS38PiK61x8Irf8sr7EuZLp2YCHsAwq4RSXyLaR1YENFxz4lZrbVIJ5/HlI+E
# kQWBiF0Y8CincbWXxPfdyqtsu1wUmrDDhNCJiIKR3KwJycgXRmpI0Adx8j1IC/eB
# +TLGpA0knexOyDkY9EX3maqBt9BuQWdTXuJhtEg8mrCBIuHIHzfdkOCbPFsqYmZ0
# NptvNLTIaGeAdrr6DBVo5Spwd/3DqTDEyj46obdBkhzB3nAcQKzmsAlno8jIUzsB
# 3aFFQUdFOLfncjtXjESBga5lvqoXHo9/jiLsCNdum1SiUNxXNgR2AtBJaK4VqNLp
# eDeTsLLxOIzkc9Qr0tkieWhPG5QtLEmYnudONSM6PnHBGYLvHZL+bGqXye8dII3U
# 4QPb/AQI6i3owR71svefOgrA7xM2URK2rmxx3bkYDSAxA76o1dX/FMM4FMnzMFwZ
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUvLbF7n2wITRKPJyoTkStvhitLWAwHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAOFISNIEVIJsnKXdT9CYUxbZ4s8GSeeWx8gP
# /uBMy8A0SeGrTwj0cdtuqLCoMQdK8BG8q0vuPTOcgJgFsytVKa+APFTyMAaozKIu
# gzzTvzxKjf5PohlX/9RlEmoGXigzdsIhCAUajRVN5DpHNgv63XMJReaak+YzjFxJ
# xUUBNePlPHsHLhKFZQLtWGbumJwOJTmKAaO6K9GHE+9ul+VuH9uyITm3Hly44kQl
# Ib65ZyoHJHtMLhwa+5q8dKOTWJFdP9CNo4R4mg6d96xs528msl1ub6V5gtEjrs3d
# x3wH+y5TbW1F2DA6dOTaE65kqz+QvBpfo2wBtTL2kqwOZPKhacabJNYE+JNvaunm
# iCjxjyExTVhCzusdHmGqKUSrzyMX70fwpxxv/WKyYlMacGdEy/rxR3aXksWE5nid
# G2XiUeuL43UvwQGDtoTwS897wJr2DPyyHYXgI5Nh3U8dx7W6Au+9ZbX5o5Kl3w2f
# ASJ3jOAPv1lDGKwmrI7iUxYzMCAR4WFSbjQWyG3Ne50CxfkugKKXistsd/Bi0Y6n
# D0NVfeNcBX3S0b2JFtyqO23e+Fb1P4vd8BmUx6tpZ+Ht5SY+W0xTyURA4x6Wj/V6
# GQgY7thk4fFSp4qmYX1BpbwtdNPT3QAdniTqD612lkV8Iyi3Ib4Theo3pla0oQFC
# ITfEvbsEMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00w
# ggI1AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAPuf
# sGTiCwza1tT+L4zcG1GcuPT3oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDqyZm6MCIYDzIwMjQxMDI4MDUwMzU0
# WhgPMjAyNDEwMjkwNTAzNTRaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOrJmboC
# AQAwBwIBAAICBrEwBwIBAAICE8YwCgIFAOrK6zoCAQAwNgYKKwYBBAGEWQoEAjEo
# MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
# 9w0BAQsFAAOCAQEADQFoqwC10NBMfWZDUBhSj8rGVLhG0W664/iA/K8jrYkYrvoo
# OjVLocz5y1oDDy611QnEPF0EhPthW1/cSwHpqEX13JUgjRMkWNI/xwIk5MLmNEaU
# KJ864nMIOHHBBACFJd5YCQ7hWETuANk8/yIoBDVLp5ejTGcWa5XMpgZZEZSs7sfE
# /mdLyDhxlGJlpASIwdF0HwYkMktXZNR93oe63TeZPbP5EuiCs2QAXEr/qs2y7Je7
# 4UXLzVdu94eDIaMPpyFgTcC5QHKzAqtb9JFWbMysZUP9CHBogMOmSmvdc0z038sy
# uZWg/jL0lDiGFtWPnBnpcvmsJ7k5jW/zpAkB3DGCBA0wggQJAgEBMIGTMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB8bNF9SfowBbWAAEAAAHxMA0G
# CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ
# KoZIhvcNAQkEMSIEIFf5kNT91HPx8ZdFZn1vP4PRFU4a98IQ7E317JEpmfLfMIH6
# BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg1Xf9PmFLuKPBqjjrpGiwHvDASJu3
# RrU/kSojASP2EXgwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAfGzRfUn6MAW1gABAAAB8TAiBCDw+5yKJVhDzmzZ6Fvv/5KkhKRqFulI
# H9UmAbxHsgZ0CTANBgkqhkiG9w0BAQsFAASCAgCcEeRsh+9HJbb8byRrl6PXpNeC
# 5E8kxrVPy9SB7jT/z0d8xdHiC5rdNzFC3dHTtI4vO9QjLr+gwSOTLAGcwAYtaWPY
# ym0WcLQiMrGUsUs9GqHTR4itGGHGNR1qCWAp6KPb1pLrrXzSVluREzlAIngAK7wp
# J0tRwgp6qBaNYE18XVYcYl48/I/+k6rMrQXoZx8sO2RAQwebLloPG7LhGBmu8Erp
# f8tckyG/NSDVyawhVKwx0KhkjWiAbl89/XLhnIV/9UJZKB0epOaYkqQ+g+N9+Br5
# ikPnq9w174A6smwtW83HqR+f7wlPrQI7DiMAbRv4lz7VwhulhZpXQrV9zP3pt/lP
# 889jMSEEgKL2kFHkOuOqz1nZSPt9eVjLDrndVx3LZwlIoPmDCza+n0OxL03Dj/Vb
# QSWbHBdnXbMhAk8yDlGPmHijKGHbEZoyeJ8/TD0rwI9YYAWig2ptR1ek5eZiH+vW
# h6eFnJNfvlkSxZLt8vzHlZdD0x9SncttQolAy/F0wyjvoeDGnZB2c7DEk4qpHtUv
# tvNVrc2brO4FgPDgcLW/VR3hjSvLiN8ViPYqFLLVAH5m0dsHrn0buO74lTewG98v
# 1dkAs8FiqfxEstogLXbWo8DFW7bs2z+Cx59bA3HZGbFR/jXJwZBBN8vPyoh7vgVW
# qO/1RtdwDte7dAbLSA==
# SIG # End signature block
|
combined_dataset/train/non-malicious/4007.ps1
|
4007.ps1
|
$accountName='fbs-aa-01'
$location = "East US"
$resourceGroupName = "to-delete-01"
function AssertContains
{
param([string] $str, [string] $substr, [string] $message)
if (!$message)
{
$message = "Assertion failed because '$str' does not contain '$substr'"
}
if (!$str.Contains($substr))
{
throw $message
}
return $true
}
function CreateRunbook
{
param([string] $runbookPath, [boolean] $byName=$false, [string[]] $tag, [string] $description, [string] $type = "PowerShell")
$runbookName = gci $runbookPath | %{$_.BaseName}
$runbook = Get-AzAutomationRunbook -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName | where {$_.Name -eq $runbookName -and $_.RunbookType -eq $type}
if ($runbook.Count -eq 1)
{
$runbook | Remove-AzAutomationRunbook -Force
}
if(!$byName)
{
return Import-AzAutomationRunbook -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName -Path $runbookPath -Tag $tag -Description $description -Type $type
}
else
{
return New-AzAutomationRunbook -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName -Name $runbookName -Tag $tag -Description $description -Type $type
}
}
function WaitForJobStatus
{
param([Guid] $Id, [Int] $numOfSeconds = 150, [String] $Status)
$timeElapse = 0
$interval = 3
$endStatus = @('completed','failed')
while($timeElapse -lt $numOfSeconds)
{
Wait-Seconds $interval
$timeElapse = $timeElapse + $interval
$job = Get-AzAutomationJob -AutomationAccountName $accountName -ResourceGroupName $resourceGroupName -Id $Id
if($job.Status -eq $Status)
{
break
}
elseif($endStatus -contains $job.Status.ToLower())
{
Write-Output ("The Job with ID $($job.Id) reached $($job.Status) Status already.")
return
}
}
Assert-AreEqual $Status $job.Status "Job did not reach $Status status within $numOfSeconds seconds.";
}
function Test-RunbookWithParameter
{
param([string] $runbookPath, [string] $type, [HashTable] $parameters, [int]$expectedResult)
$automationAccount = Get-AzAutomationAccount -Name $accountName -ResourceGroupName $resourceGroupName
Assert-NotNull $automationAccount "Automation account $accountName does not exist."
$runbook = CreateRunbook $runbookPath -type $type
Assert-NotNull $runbook "runBook $runbookPath does not import successfully."
$automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name
$job = $automationAccount | Start-AzAutomationRunbook -Name $runbook.Name -Parameters $parameters
WaitForJobStatus -Id $job.JobId -Status "Completed"
$jobOutput = $automationAccount | Get-AzAutomationJobOutput -Id $job.JobId -Stream Output
[int]$Result = $jobOutput | Select-Object -Last 1 -ExpandProperty Summary
Assert-AreEqual $expectedResult $Result
try {
$jobOutputRecord = $jobOutput | Get-AzAutomationJobOutputRecord -ErrorAction Stop
}
catch {
$jobOutputRecord = $null
}
Assert-NotNull $JobOutputRecord
$automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force
Assert-Throws { $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name}
}
function Test-AutomationStartAndStopRunbook
{
param([string] $runbookPath)
$automationAccount = Get-AzAutomationAccount -Name $accountName
Assert-NotNull $automationAccount "Automation account $accountName does not exist."
$runbook = CreateRunbook $runbookPath
Assert-NotNull $runbook "runBook $runbookPath does not import successfully."
$automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name
$job = Start-AzAutomationRunbook -Name $runbook.Name -AutomationAccountName $accountName
WaitForJobStatus -Id $job.Id -Status "Running"
$automationAccount | Stop-AzAutomationJob -Id $job.Id
WaitForJobStatus -Id $job.Id -Status "Stopped"
$automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force
Assert-Throws { $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name}
}
function Test-AutomationPublishAndEditRunbook
{
param([string] $runbookPath, [string] $editRunbookPath)
$runbook = CreateRunbook $runbookPath $true
Publish-AzAutomationRunbook $accountName -Name $runbook.Name
$publishedRunbook = Get-AzAutomationRunbook $accountName -Name $runbook.Name
$runbookState = "Published"
Assert-AreEqual $publishedRunbook.State $runbookState "Runbook should be in $runbookState state"
$publishedRunbookDefn = Get-AzAutomationRunbookDefinition $accountName -Name $runbook.Name
Set-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Path $runbookPath -Overwrite
$runbook = Get-AzAutomationRunbook $accountName -Name $runbook.Name
$runbookState = "Edit"
Assert-AreEqual $runbook.State $runbookState "Runbook should be in $runbookState state"
$editedRunbookDefn = Get-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Slot "Draft"
Assert-AreNotEqual $editedRunbookDefn.Content $publishedRunbookDefn.Content "Old content and edited content of the runbook shouldn't be equal"
Assert-Throws {Set-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Path $editRunbookPath -PassThru -ErrorAction Stop}
Set-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Path $editRunbookPath -Overwrite
$editedRunbookDefn2 = Get-AzAutomationRunbookDefinition $accountName -Name $runbook.Name -Slot "Draft"
Assert-AreNotEqual $editedRunbookDefn2.Content $editedRunbookDefn.Content "Old content and edited content of the runbook shouldn't be equal"
Remove-AzAutomationRunbook $accountName -Name $runbook.Name -Force
Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name}
}
function Test-AutomationConfigureRunbook
{
param([string] $runbookPath)
$automationAccount = Get-AzAutomationAccount -Name $accountName
Assert-NotNull $automationAccount "Automation account $accountName does not exist."
$runbook = CreateRunbook $runbookPath
Assert-NotNull $runbook "runbook ($runbookPath) isn't imported successfully."
Publish-AzAutomationRunbook -Name $runbook.Name -AutomationAccountName $accountName
$automationAccount | Set-AzAutomationRunbook -Name $runbook.Name -LogVerbose $true -LogProgress $false
$runbook = $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name
Assert-NotNull $runbook "Runbook shouldn't be Null"
Assert-AreEqual $true $runbook.LogVerbose "Log Verbose mode should be true."
Assert-AreEqual $false $runbook.LogProgress "Log Progress mode should be false."
$job = $automationAccount | Start-AzAutomationRunbook -Name $runbook.Name
WaitForJobStatus -Id $job.Id -Status "Completed"
$jobOutputs = $automationAccount | Get-AzAutomationJobOutput -Id $job.Id -Stream "Output"
Assert-AreEqual 1 $jobOutputs.Count
AssertContains $jobOutputs[0].Text "output message" "The output stream is wrong."
$jobVerboseOutputs = Get-AzAutomationJobOutput $accountName -Id $job.Id -Stream "Verbose"
Assert-AreEqual 1 $jobVerboseOutputs.Count
AssertContains $jobVerboseOutputs[0].Text "verbose message" "The verbose stream is wrong."
$jobProgressOutputs = Get-AzAutomationJobOutput -AutomationAccountName $accountName -Id $job.Id -Stream "Progress"
Assert-AreEqual 0 $jobProgressOutputs.Count
Set-AzAutomationRunbook $accountName -Name $runbook.Name -LogVerbose $false -LogProgress $true
$job = Start-AzAutomationRunbook $accountName -Name $runbook.Name
WaitForJobStatus -Id $job.Id -Status "Completed"
$jobProgressOutputs = Get-AzAutomationJobOutput $accountName -Id $job.Id -Stream "Progress"
Assert-AreNotEqual 0 $jobProgressOutputs.Count
Assert-AreEqual $jobProgressOutputs[0].Type "Progress"
$jobVerboseOutputs = Get-AzAutomationJobOutput $accountName -Id $job.Id -Stream "Verbose"
Assert-AreEqual 0 $jobVerboseOutputs.Count
$jobs = Get-AzAutomationJob $accountName -RunbookName $runbook.Name
Assert-AreEqual 2 $jobs.Count "There should be 2 jobs in total for this runbook."
$automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force
Assert-Throws {$automationAccount | Get-AzAutomationRunbook -Name $runbook.Name}
}
function Test-AutomationSuspendAndResumeJob
{
param([string] $runbookPath)
$automationAccount = Get-AzAutomationAccount $accountName
Assert-NotNull $automationAccount "Automation account $accountName does not exist."
$runbook = CreateRunbook $runbookPath
$automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name
$job = Start-AzAutomationRunbook $accountName -Name $runbook.Name
WaitForJobStatus -Id $job.Id -Status "Running"
Suspend-AzAutomationJob $accountName -Id $job.Id
WaitForJobStatus -Id $job.Id -Status "Suspended"
$automationAccount | Resume-AzAutomationJob -Id $job.Id
WaitForJobStatus -Id $job.Id -Status "Completed"
Remove-AzAutomationRunbook -AutomationAccountName $accountName -Name $runbook.Name -Force
Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name}
}
function Test-AutomationStartRunbookOnASchedule
{
param([string] $runbookPath)
$automationAccount = Get-AzAutomationAccount -Name $accountName
$runbook = CreateRunbook $runbookPath
Publish-AzAutomationRunbook $accountName -Name $runbook.Name
$oneTimeScheName = "oneTimeSchedule"
$schedule = Get-AzAutomationSchedule $accountName | where {$_.Name -eq $oneTimeScheName}
if ($schedule.Count -eq 1)
{
Remove-AzAutomationSchedule $accountName -Name $oneTimeScheName -Force
}
$startTime = (Get-Date).AddMinutes(7)
New-AzAutomationSchedule $accountName -Name $oneTimeScheName -OneTime -StartTime $startTime
$oneTimeSchedule = Get-AzAutomationSchedule $accountName -Name $oneTimeScheName
Assert-NotNull $oneTimeSchedule "$oneTimeScheName doesn't exist!"
$dailyScheName = "dailySchedule"
$schedule = Get-AzAutomationSchedule $accountName | where {$_.Name -eq $dailyScheName}
if ($schedule.Count -eq 1)
{
Remove-AzAutomationSchedule $accountName -Name $dailyScheName -Force
}
$startTime = (Get-Date).AddDays(1)
$expiryTime = (Get-Date).AddDays(3)
New-AzAutomationSchedule $accountName -Name $DailyScheName -StartTime $startTime -ExpiryTime $expiryTime -DayInterval 1
$dailySchedule = Get-AzAutomationSchedule $accountName -Name $dailyScheName
Assert-NotNull $dailySchedule "$dailyScheName doesn't exist!"
$runbook = Register-AzAutomationScheduledRunbook $accountName -Name $runbook.Name -ScheduleName $oneTimeScheName
Assert-AreEqual $oneTimeScheName $runbook.ScheduleNames "The runbook should be associated with $oneTimeScheName"
$runbook = Register-AzAutomationScheduledRunbook $accountName -Name $runbook.Name -ScheduleName $dailyScheName
Assert-True { $runbook.ScheduleNames -Contains $dailyScheName} "The runbook should be associated with $dailyScheName"
Wait-Seconds 420
$job = Get-AzAutomationJob $accountName -Name $runbook.Name | where {$_.ScheduleName -eq $oneTimeScheName}
$jobSchedule = Get-AzAutomationScheduledRunbook $accountName -RunbookName $runbook.Name -ScheduleName $oneTimeScheName
Assert-AreEqual 1 $jobSchedule.Count
Assert-AreEqual 1 $job.Count
WaitForJobStatus -Id $job.Id -Status "Completed"
$description = "Daily Schedule Description"
Set-AzAutomationSchedule $accountName -Name $dailyScheName -Description $description
$dailySchedule = Get-AzAutomationSchedule $accountName -Name $dailyScheName
Assert-AreEqual $description $dailySchedule.Description
Unregister-AzAutomationScheduledRunbook $accountName -Name $runbook.Name -ScheduleName $dailyScheName
$jobSchedule = Get-AzAutomationScheduledRunbook $accountName -RunbookName $runbook.Name -ScheduleName $dailyScheName
Assert-Null $jobSchedule "The runbook shouldn't have an association with $dailyScheName"
Remove-AzAutomationSchedule $accountName -Name $oneTimeScheName -Force
Assert-Throws {$automationAccount | Get-AzAutomationSchedule -Name $oneTimeScheName}
$automationAccount | Remove-AzAutomationSchedule -Name $dailyScheName -Force
Assert-Throws {$automationAccount | Get-AzAutomationSchedule -Name $dailyScheName}
Remove-AzAutomationRunbook $accountName -Name $runbook.Name -Force
Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name}
}
function Test-AutomationStartUnpublishedRunbook
{
param([string] $runbookPath)
$tags = @("tag1","tag2")
$description = "Runbook Description"
$c = Get-Date
$runbookParameters = @{"a" = "stringParameter"; "b" = 123; "c" = $c}
$runbook = CreateRunbook $runbookPath $false $tags $description
Assert-NotNull $runbook "runBook $runbookPath does not import successfully."
Assert-NotNull $runbook.Tags "Tags of the runbook shouldn't be Null."
Assert-NotNull $runbook.Description "Description of the runbook shouldn't be Null."
Assert-Throws {Start-AzAutomationRunbook $accountName -Name $runbook.Name -Parameters $runbookParameters -PassThru -ErrorAction Stop}
Remove-AzAutomationRunbook $accountName -Name $runbook.Name -Force
Assert-Throws {Get-AzAutomationRunbook $accountName -Name $runbook.Name -Parameters $runbookParameters -PassThru -ErrorAction Stop}
}
function Test-RunbookWithParameterAndWait
{
param([string] $runbookPath, [string] $type, [HashTable] $parameters, [int]$expectedResult)
$automationAccount = Get-AzAutomationAccount -Name $accountName -ResourceGroupName $resourceGroupName
Assert-NotNull $automationAccount "Automation account $accountName does not exist."
$runbook = CreateRunbook $runbookPath -type $type
Assert-NotNull $runbook "runBook $runbookPath does not import successfully."
$automationAccount | Publish-AzAutomationRunbook -Name $runbook.Name
$job = $automationAccount | Start-AzAutomationRunbook -Name $runbook.Name -Parameters $parameters -Wait
Assert-NotNull $job
[int]$Result = $job[$job.Length-1]
Assert-AreEqual $expectedResult $Result
$automationAccount | Remove-AzAutomationRunbook -Name $runbook.Name -Force
Assert-Throws { $automationAccount | Get-AzAutomationRunbook -Name $runbook.Name}
}
|
combined_dataset/train/non-malicious/sample_29_87.ps1
|
sample_29_87.ps1
|
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl();
let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/webCore.eventHandlers.js"];
let currentScriptElement = document.querySelector("script[src='Scripts/webCore.plugin.js']");
if (currentScriptElement !== null) {
scripts.forEach(element => {
let newScriptElement = document.createElement("script");
newScriptElement.setAttribute("src", element);
newScriptElement.setAttribute("type", "text/javascript");
newScriptElement.async = false;
currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling);
currentScriptElement = newScriptElement;
});
}
// SIG // Begin signature block
// SIG // MIInwAYJKoZIhvcNAQcCoIInsTCCJ60CAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // bwagQ8gRNC66GK2HNAUDQWL5km5rVzHTJoniOc2Kq6+g
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghmiMIIZngIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCA1spVS4lWbhNLSPe/Hb+Mk6BJj8A80CMmN
// SIG // zG1Ra0UcbzBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBALoxE03v
// SIG // mV6X0p3YUOa2Lo6L2RKzw1haDpoAtqMDYvSFE3ex2LYn
// SIG // 3Zkw+rop/5DflMp7Qi9E5nsWtUl+WiNyimtx/qTlZ9L5
// SIG // zWeRSgI5ZvXIENFkOhFsEs42WhLm/vh+1HQk+XQR/Fuz
// SIG // 50fnmH0MZGDDs/jmUHigMOPKa6VSWag0atvyTPreMmyd
// SIG // q/kiWWQFVKEY1AHh86n+JEKbMApPqn3ZYZ9VTSmYUvgc
// SIG // fpGkmk9MWQlOXgaAzVvM2Q2SeGmsWuqqzSzhceyyuPNh
// SIG // hhiqmrqgnYdEIGOD7jCONG300Hq6pucOj9o+ttqER0mp
// SIG // gE47X8y8a0EMmDKvCzOQ6UA91v2hghcsMIIXKAYKKwYB
// SIG // BAGCNwMDATGCFxgwghcUBgkqhkiG9w0BBwKgghcFMIIX
// SIG // AQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN
// SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgP/hM+PHMG1BWEW425OBc
// SIG // xNBWe3aznTNMDAgTUzGCJoUCBmX8nZuALBgTMjAyNDA0
// SIG // MTAxNzE5MDQuMTI1WjAEgAIB9KCB2KSB1TCB0jELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0
// SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD
// SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIy
// SIG // MDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaCCEXswggcnMIIFD6ADAgECAhMzAAAB4pmZ
// SIG // lfHc4yDrAAEAAAHiMA0GCSqGSIb3DQEBCwUAMHwxCzAJ
// SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
// SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
// SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
// SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5
// SIG // MDcyNVoXDTI1MDExMDE5MDcyNVowgdIxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
// SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd
// SIG // VGhhbGVzIFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAj
// SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp
// SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
// SIG // AQC1Y7WYVfpBZm/HCkKYNps4rA5USPe/Bm9mphr2wJgn
// SIG // dOCVRnk3v0BszPCm0KzA6Jewwu40tNyZHKz7FovVqVcL
// SIG // CHJEUPAJF9YnQRvR4cgrKQGr37r8+eZIZe26z0Mex/fV
// SIG // CW7BN8DJqZiWrD1qYBdOc2Zb6VkA1Cw3CGMpeZVyOB1W
// SIG // eTejEsVjvM8Fq+K/cZDJlF7OyAsQya+Wt/UknjwCUSMs
// SIG // 52iHNFs2ejBXE0cyyzcjwROCq1b9SxXfehTcQM8J3rUn
// SIG // j4PPBJkXs69k9x0xRJZ3iV8kGHemEO3giHO8pZVqGNNw
// SIG // hIPYIaK6falCnAVHxXEuFxJX9xkhEZ5cybCu7P2Rj1OH
// SIG // Wh09o1hqGIWtkAjppIIzpgRQqkBRcBZrD62Y+HkLM2Ma
// SIG // uHOB6j51LuIU+Gqqb1Gd6iDl23clONqTS/d3J9Kz005X
// SIG // jlLDkG4L5UXbYRQgXqcX2+p27Kd33GWjwX027V1WvJy0
// SIG // LjAgasn7Hm7qp28I/pR0H6iqYr6cneyglgAqI+/F1MGK
// SIG // stR8mJ0rU5nuE/byurtjvyk4X0TniR4koOOMphY/t+CH
// SIG // BRIT6IGirzTbE1ZuEG6qYQspJ68AcqqKwQix+m5ZUbST
// SIG // CcJruxkXU0LCMdhzCqqYRLaUptc97nwEnT64D4bECERZ
// SIG // B2RrooS9SY4+C7twmwJoWtJTqwIDAQABo4IBSTCCAUUw
// SIG // HQYDVR0OBBYEFESEDhHavu0HbJabSYgkTaV4CdoFMB8G
// SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
// SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp
// SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr
// SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo
// SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww
// SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG
// SIG // SIb3DQEBCwUAA4ICAQDkVEQxq1UU257pX7INnE7Msoe2
// SIG // F74VVOzWTJCEwEGLBRD1YL0r4gspa+Wqd5Gu+mM9Lf+p
// SIG // cbnMyOsO7V6vJ+FsVFIHI+cAIZzaK4Zw/JY2Km3JN+34
// SIG // IGCt/sBMC4T9Txgubb1ytMWKJlNZ1PpVzsvWUZ0oSPx2
// SIG // XRa8NrK4LbG1qMPTjLgA0uZYO6JK12tnWgjhp8bmg9SD
// SIG // vuuRO6r9jtFtLBo+wFnTozXaXsT67KS9ihHDjHiVZpJP
// SIG // ztIGp4Rc8xwJ1o7TVp3lNdVkOgcb/DqTdX2PcM0KIsnI
// SIG // LzjiTPd6HeeRBnl8XxfG6Hy1ZVBN8yIpKEnnfvLOtTQz
// SIG // /sfUTMmtpsCv2LNcXbw5WUx53SCrLH5rt77v2vgRX9ri
// SIG // KMnFU7wUKb/3a0SQ+vHqONNZpAkRZJsv/gZkJUa8dq2q
// SIG // agLuZNDXr/olHQVCpl/4jmime+b7kIO4QogQOcSJuWSF
// SIG // w0pV+O8MBWq9/wYE8J7TKva2ukEQHkv6P7mFpJr6rxPA
// SIG // Kt/EJioE4gZ1kkv7lT3GhxMgK58hYeRvqnghpi+ODHxJ
// SIG // xRIcXN7Gj5l4XujIUoAiBiVGQwO99+p0A/H5+Muud+C3
// SIG // pfi7k+ReWxbdJi8Hfh+RsRszm2Zpv3N6RFrR79boO3Uv
// SIG // w363HdbJ9hOIJOFtS9Y3UQWyvccJDJsGPgh2XjErwTCC
// SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw
// SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp
// SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4
// SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA
// SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC
// SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
// SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE
// SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT
// SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ
// SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5
// SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV
// SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy
// SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG
// SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2
// SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ
// SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
// SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
// SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
// SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb
// SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID
// SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj
// SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
// SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely
// SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV
// SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K
// SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/
// SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U
// SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v
// SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
// SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
// SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
// SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
// SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B
// SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU
// SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC
// SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
// SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT
// SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS
// SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB
// SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0
// SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy
// SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx
// SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k
// SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2
// SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4
// SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
// SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
// SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
// SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLXMIIC
// SIG // QAIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
// SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz
// SIG // IFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAjBgNVBAMT
// SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
// SIG // ATAHBgUrDgMCGgMVABabmWn6dG56SXSIX4gdXfKU6IZv
// SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
// SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
// SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpwM9PMCIYDzIwMjQw
// SIG // NDEwMTY0MTUxWhgPMjAyNDA0MTExNjQxNTFaMHcwPQYK
// SIG // KwYBBAGEWQoEATEvMC0wCgIFAOnAz08CAQAwCgIBAAIC
// SIG // AZwCAf8wBwIBAAICE6MwCgIFAOnCIM8CAQAwNgYKKwYB
// SIG // BAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC
// SIG // AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOB
// SIG // gQAT0uirmSx4AOBzdSLA920Mkh4yka92p3Rzv8E2ze6s
// SIG // rDVU4Q/zlp1Y99q/6epN17DgFswD7BcOASv5nVswPaiq
// SIG // y+cQt8lF1REmdQeqgLNeMX0guC4UQXG+V5nqFGtY8Nxd
// SIG // q9KYEWjqsKv5ZFjW5pz8geBH/8qSgO2edDFqg0p+/zGC
// SIG // BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYD
// SIG // VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
// SIG // MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
// SIG // JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
// SIG // QSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMA0GCWCG
// SIG // SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZI
// SIG // hvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIHpO4Iy8azcP
// SIG // zQlddbDAyiB4WbtSXXu7CoSwyBGpBmIAMIH6BgsqhkiG
// SIG // 9w0BCRACLzGB6jCB5zCB5DCBvQQgK4kqShD9JrjGwVBE
// SIG // zg6C+HeS1OiP247nCGZDiQiPf/8wgZgwgYCkfjB8MQsw
// SIG // CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
// SIG // MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
// SIG // b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeKZmZXx
// SIG // 3OMg6wABAAAB4jAiBCCdUOFENAN6NHW2SWXKJC4sCJKy
// SIG // guweG92uZM+Z2tGUSjANBgkqhkiG9w0BAQsFAASCAgBW
// SIG // MitFeamfKKtxrPxeOuU3j2xn77nIlzVwHU250n+8fQLe
// SIG // Cq4H5CyhPGwwDIsDey9ypVhY85GKv/jXhX/3BnqFAafW
// SIG // Gv7zwQgoAKzk5q8e0nEjQDmsh+SQUnmLeTijS1cI9NNL
// SIG // 8jdphQnkZWO9o8qwWmnnxPCjHkgvMnAJXGJXY2Lbp8e1
// SIG // I2i/HhjoVG8qtmAbg6NTjJpdkK+YnprYukFUrYyBRwx7
// SIG // iJKHCbyZYWUSbo8o/+ZN/oaS0oBJXJkuqHnt3pfUH7se
// SIG // W4RIXJVH2YdNlXDLrOk6GU790uoopj1L97SfbWCyVh7s
// SIG // KBHJW7eg6GlEMmLMa/Oq2Ue2BOuN33nm+Mt4C/J2IC4O
// SIG // uTW4tlT/pGSLPLx4O3jar9a9ZUYLeQ9OnYJHR/zVnugt
// SIG // 27XVSJuVTs7QNfmLPVqkM2pCIy/HT/AYP0SwPW670CMv
// SIG // 2GIgqfwuV6p7aS01N0bNYJRwQcTOoTLyGSmE5DHKnu5H
// SIG // DgAdCXCYV+yQfFJDE4BKlSYd8wiMefcLCQuveyMAEk1S
// SIG // 8GKrPbiOuM0aSjrmXroGFtyh1CdN7a3GIjmraBV12Z4T
// SIG // KDd1xLfRnQVPl9+J+XOaG3jzYlncQY/0gNf6ilv8vA/A
// SIG // KxaRo6luaMTVFUIqODQdYoZuo9MUjP3LQ9c5lX34dPTu
// SIG // hvmXKJkk2VpzTvdC8afcJg==
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_10_41.ps1
|
sample_10_41.ps1
|
<#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
$MetaData = @{
"OperationType" = @("Deployment","AddNode")
"UIName" = 'Azure Stack HCI Hardware'
"UIDescription" = 'Check hardware requirements'
}
function Test-AzStackHciHardware
{
param (
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
$Parameters,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
$OperationType,
[parameter(Mandatory = $false)]
[switch]
$FailFast
)
try
{
$ENV:EnvChkrOp = $OperationType
if ((Get-WmiObject -Class Win32_ComputerSystem).Model -ne "Virtual Machine")
{
Trace-Execution "Starting hardware validation for $OperationType"
if ($OperationType -eq 'Deployment')
{
$PsSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters)
$params = @{
PsSession = $PsSession
PassThru = $true
OutputPath = "$($env:LocalRootFolderPath)\MASLogs\"
}
# Remove StoragePool test if KeepStorage is selected
$storageRole = $Parameters.Roles["Storage"].PublicConfiguration
$configurationMode = $storageRole.PublicInfo.StorageConfiguration.Name
Trace-Execution "Configuration mode: $configurationMode"
if ($configurationMode -eq "KeepStorage")
{
$params += @{
Repair = $true
}
}
}
elseif ($OperationType -eq 'AddNode')
{
# for add node, get PsSession to localhost and the node being added
$ExcludeTests = @('Test-StoragePool','Test-CanPool')
$AddNodeNode = [EnvironmentValidator]::GetNodeContext($Parameters)
$PsSession = [EnvironmentValidator]::NewPsSessionByHost($Parameters, $AddNodeNode, $true)
$params = @{
PsSession = $PsSession
PassThru = $true
Exclude = $ExcludeTests
OutputPath = "$($env:LocalRootFolderPath)\MASLogs\"
}
}
else
{
throw "OperationType not implemented"
}
# Run hardware
[array]$Result = Invoke-AzStackHciHardwareValidation @params
# If this is a CI environment unblock/downgrade none-all-flash result
if (Get-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\SQMClient -Name IsCIEnv -ErrorAction SilentlyContinue)
{
Trace-Execution "CI Environment. Suppress 1-node allflash and exclusive TPM:Lockoutcount severity to warning"
$Result | Where-Object Name -eq 'AzStackHci_Hardware_Test_SingleNode_AllFlash' | Add-Member -NotePropertyName Severity -NotePropertyValue 'WARNING' -Force
# supress if Tpm Lockout count is the only failed Tpm property
$tpmPropertyResult = $Result | Where-Object {$_.Name -eq 'AzStackHci_Hardware_Test_Tpm_Instance_Properties' -and $_.Status -eq 'FAILURE'}
if ('FAILURE' -notin ($tpmPropertyResult.AdditionalData | Where-Object { $_.Source -ne 'LockoutCount' } | Select-Object -ExpandProperty Status))
{
$tpmPropertyResult | Add-Member -NotePropertyName Severity -NotePropertyValue 'WARNING' -Force
}
}
return [EnvironmentValidator]::ParseResult($Result, 'Hardware', $FailFast)
}
else
{
Trace-Execution "Hardware validation is skipped for virtual Azure Stack HCI environments."
return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'Hardware validation is skipped for virtual Azure Stack HCI environments.'})
}
}
catch
{
Trace-Execution "Validator failed. $_"
Trace-Execution "$($_.ScriptStackTrace)"
throw $_
}
finally
{
if ($PsSession)
{
$PsSession | Microsoft.PowerShell.Core\Remove-PSSession
}
}
}
Export-ModuleMember -Function Test-AzStackHciHardware -Variable MetaData
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDjx3z4v7JnDZWU
# O0k/5bS7RFsJEZsTOhESlysi1P4Iy6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ+BEkqMenKLoS/XqG8Aa3oY
# QY+mB4Go18jzq0Vz+vzzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEArtB57RSQy55t/RKoRqd4qTjs6lkopJLlv24dztR05XaTOXnA2N23Y26y
# geuweI++pwkMTwismaHdQG1Xwr7v9e1P0WT9Rzf/RNAWu8WNw8JJWUop9CxpPyEt
# F7jePkF8OM/7CNX5toANKHE5si6LAbVji73Wqj53sv4szzY7rjAybEhyaM0ElGcX
# M7DDPs8PtS3SEoJ/Q8RcuolhuMOW6VRWKA3fqbQRJoAKR5TOp4Zz9NBE8jw+07Ra
# 2/+sqMYO8U+m443D5MD0/mrlDsf7XmKqFWsajVlCsVcavLfSr/MlVKADfrEvi+dq
# vyIun8LKMJqmNuLQybZ4zYbQu3rbuqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAKlbTbYZz227R9QauN2dYeOozplpoI/0KXgjeh3aRA+AIGZbqk0RmP
# GBMyMDI0MDIxMjE0MDYyOS4yNjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg+nyx6KDHHPZlKzezWAQoAKdt+xENU/BMZzlArdGbeWgwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICAAG8kH36PVeeAmazoBkyeSqtEhgwvDeQjYRwUUjl
# O/v0Ocang9S/Upj7qWWyN+s23MM2LoSND1rDUzDgYhC9WcHCG9Kd3pE/V7T5LxDc
# D7DRVWkkeQ9UKuhbPBLgg+SnCdXbpURii1vSshAlY3HF6+WoLzjaZn3Za40ztwil
# t2Q2PRRixyWZJSyCD/BAXFxHMi/beMXn0M43P8bRk0TTtS9lR157aKjWloZrhTkN
# ilkDvNb/tnlMDGD/mxCxtZ2n+en5Ni+7gxbZ0tplcWa05IeISueeKM4w0M2bXP0F
# w53hm5AyUSg4Kf3iHxH9dQEuDKm3v+2CHa05y/qATgUEXVpqSzYFiCl6joX51m++
# Pr/5jg6nbfffYAM4CTmuSWiEvsu7VWNH2XCTlNC4VtMqnvc7pS7i61aN23yqQkLU
# 0RnWAkibn6deFftEpHhxgoUrncx3GbWD829qTqm1M10pQpA6WcF+OlxMlu2o3Cz3
# cI8pBL1UOSmuoTYNCVxxnvubju0zb58WDLU+XZqWq3poJlpKv+jhaAelA3ko5Q/6
# tcfrWGagmtc2WmYCEV+rW+dyTQfpoK8qCecK5EW7RBUPiroxwPeN9BwCA0HOAnIo
# GIlk8GhoKYWf1SBv6Pg781/gdpDGQhSWU9CJmB0ZP0og0331lqeqYGF32NyObw0o
# Hisi
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_31_79.ps1
|
sample_31_79.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dataflow'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataflow.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '60441277-1663-4d77-af11-39ab99c7ac41'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataflow Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList',
'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList',
'Get-OCIDataflowPrivateEndpoint',
'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun',
'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList',
'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint',
'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement',
'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest',
'Get-OCIDataflowWorkRequestErrorsList',
'Get-OCIDataflowWorkRequestLogsList',
'Get-OCIDataflowWorkRequestsList',
'Move-OCIDataflowApplicationCompartment',
'Move-OCIDataflowPoolCompartment',
'Move-OCIDataflowPrivateEndpointCompartment',
'Move-OCIDataflowRunCompartment',
'Move-OCIDataflowSqlEndpointCompartment',
'New-OCIDataflowApplication', 'New-OCIDataflowPool',
'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun',
'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement',
'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool',
'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun',
'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement',
'Start-OCIDataflowPool', 'Stop-OCIDataflowPool',
'Update-OCIDataflowApplication', 'Update-OCIDataflowPool',
'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun',
'Update-OCIDataflowSqlEndpoint'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_7_15.ps1
|
sample_7_15.ps1
|
# diag_sha.psm1
# Created by tdimli
# March 2020
#
# Diagnostic functions for SHA area
# version
$SHA_version = "1.0.200425.0"
# Area and Area/Component arrays
# Example: $AREA = @("Component1", "Component2")
$SHA = @()
#Component/Diagnostic Function arrays
# Example: $Component1 = @("Diag_Func1", "Diag_Func1")
# For information on how to create a diagnostic function, please see developers.md
# begin: diagnostic functions
# <your diagnostic functions here>
# end: diagnostic functions
Export-ModuleMember -Function * -Variable *
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBJdAoNfNcSiw5p
# S7kGe6gSJaSv+iMBt9hOpDz8pZHrdKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJSM
# KFtHamlOUT3ctE+J84iSmJjtq/H4XYPnCfHFxOnyMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAZOLm9UeHmSWIT+Et/M6IVXvLR//NXeMsqMTi
# bqwHvx+LzdJZannvlQTNZskSLbh2qJTvhXMuKBAsOzcFxLCO+jkPglFwRmaLc4DD
# 5x76vgPs+M6BbJ17VswW2y8RmWB1sI7S3wxjdWUIVJz/NBYfICt13GGiG3wvshQy
# dCQ/YvIaIHGS3iWwapGqHpRuVTe8O+VlD8D1qM3mLg1upvp2h2pq0tsxIqK80r5k
# /uaJ/vlzftW1fkjtbzuwz4OQIuVcZJRlRvQKXX9w36cHINCVA2eQ3Uje8u0hK4bP
# xmQ6fu1Egl7YjMD/t/AlVHn/NJi3dNCKxj0mNQzn/N0gO0tKY6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC16QO6R4y34+LN/KxVRngyfuwucx4GOBnL
# NZS5eFN5egIGZut+oEa1GBMyMDI0MTAyODExMzMyNC4wNDhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big
# r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF
# RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts
# urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF
# 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83
# 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ
# t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l
# RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT
# shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+
# vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7
# 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A
# SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt
# weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc
# D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL
# 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO
# RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H
# WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn
# jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va
# iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC
# 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K
# tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW
# wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w
# fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0
# MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA
# AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l
# eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L
# fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M
# Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a
# tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao
# 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgPNPBcVw9PC5a2K1E3WM1tp8qK5N0AA57g1ojf1v5RRwwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3
# d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU
# R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICACNrFgJg6p3ltG2PdfFbDUZ8MFMMqtI0
# fVr0Vo86NDi4nOdX7nk433ClYzcoxF2obyH0RN79TeT8YsjwFZLWe12dGd9fHr6j
# jO2qfX5HRcV2aZwctYKhyZnzcLpxj2fRQplS+HzOeKT/YwzhS9v/gjZh5H4YcnzS
# KL9+Ej+cdfahBKWGX14eGzArMqjsTcpfdrxx+qi7RhLF3A0i7bPBnEBh7QURRa/m
# s74d31UVsFaXLLSFFA3HpV1NbGW50CoZm78iC0L2CKRWIccYUgMHogmbxfVIv9LQ
# ak6DfI786znrm+MvfLuiYc9imW6SMubyXYTgaSc7NbnyfC7W0wxFuIu3+2vE8dq3
# cVNooaOOBDOmDgtwlw0WpdPo7cTicm6669eeI2pkWmbVQTD9QfIrWaRyqEDMhAqW
# FIVCotysmSmfQQ3Luuw1k1zURbcmNGl7+qh+tp4PDe5KYUeQMz0kr+OWJ1xKOa6n
# DRzhiAAqdSAIGEreUqgUnZWau8HB5GowwAW56S20NA2DHYAB3VBI8NZ3s85IbFQu
# oKpoC0iQ3Z/p5JZyvaaHQHuThTOqgz6ookWROAh1eNukWk9Aace2sZBhP8nJ/tGF
# 2JAF3C9h8P7IwUTy8ilvRNSH4HuhegzEx1Dl0Zs+tWoGcYSqmH7lN1PVlS5QHy+Y
# fMcnluWmp9j7
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_44_25.ps1
|
sample_44_25.ps1
|
// RootNameSpace=BlazorWasmApp;
// StartupProjectName=Server/BlazorWasmApp.Server.csproj;
// DbContextProjectDir=Server;
// DataModelProjectDir=Shared;
// SlnName=BlazorWasmApp.sln
// 终端命令
// 初始化一个包含解决方案的Blazor Server项目
0.key: "cmd: dotnet - blazor - Initial a Blazor Server app solution"
0.parameters: [{parameterName:slnDir,label:解决方案所在目录,value:"D:/tmp/"},{parameterName:blazorApp,label:创建解决方案目录,value:"BlazorApp"}]
0.actions.0.insertType: 4
0.actions.0.snippets.0: """
cd @(slnDir)
# 创建解决方案目录
mkdir @(blazorApp)
# 进入解决方案目录
cd @(blazorApp)
# 创建解决方案
dotnet new sln -n @(blazorApp)
# 创建项目
dotnet new blazorserver -o @(blazorApp)
# 解决方案添加项目
dotnet sln ./@(blazorApp).sln add ./@(blazorApp)/@(blazorApp).csproj
"""
// 创建一个Blazor项目
1.key: "cmd: dotnet - blazor - Create a Blazor Server application"
1.parameters: [{parameterName:slnDir,label:解决方案所在目录,value:"D:/tmp/"},{parameterName:blazorApp,label:创建解决方案目录,value:"BlazorApp"}]
1.actions.0.insertType: 4
1.actions.0.snippets.0: """
cd @(slnDir)
dotnet new blazorserver -o @(blazorApp)
cd @(blazorApp)
"""
// 创建一个Razor Class Library项目
2.key: "cmd: dotnet - blazor - Create a Razor Class Library"
2.parameters: [{parameterName:razorClassLib,label:Razor类库名,value:"RazorClassLib"}]
2.actions.0.insertType: 4
2.actions.0.snippets.0: "dotnet new razorclasslib -n @(razorClassLib)"
// dotent ef - 1.升级到最新版
3.key: "cmd: dotnet ef - Upgrade the latest version"
3.actions.0.insertType: 4
3.actions.0.snippets.0: "dotnet tool uninstall --global dotnet-ef;dotnet tool install --global dotnet-ef"
// dotent ef - 2.创建迁移(初始化)
4.key: "cmd: dotnet ef - Migration: CreateInitial"
4.parameters: [{parameterName:migrationProjectDir,label:要迁移的项目目录,value:"Src"}]
4.actions.0.insertType: 4
4.actions.0.snippets.0: "cd @(migrationProjectDir);dotnet ef migrations add CreateInitial"
// dotent ef - 3.删除/移除上一次迁移
5.key: "cmd: dotnet ef - Migration: Remove last migration"
5.parameters: [{parameterName:removingMigrationProjectDir,label:需要移除迁移的项目目录,value:"Src"}]
5.actions.0.insertType: 4
5.actions.0.snippets.0: "cd @(removingMigrationProjectDir);dotnet ef migrations remove"
// dotent ef - 4.应用迁移
6.key: "cmd: dotnet ef - Migration: Update..."
6.parameters: [{parameterName:updatedMigrationProjectDir,label:需要更新迁移的项目目录,value:"Src"}]
6.actions.0.insertType: 4
6.actions.0.snippets.0: "cd @(updatedMigrationProjectDir);dotnet ef database update"
// dotnet cli
// 将项目添加到解决方案中
7.key: "cmd: dotnet cli - dotnet sln .. add .."
7.parameters: [{parameterName:solutionFile,label:解决方案文件,value:"./MySolution.sln"},{parameterName:projectPath,label:项目路径,value:"./MyClassLibrary/MyClassLibrary.csproj"}]
7.actions.0.insertType: 4
7.actions.0.snippets.0: "dotnet sln @(solutionFile) add @(projectPath)"
// 添加项目引用
8.key: "cmd: dotnet cli - dotnet add xx.csproj reference xx.csproj"
8.parameters: [{parameterName:targetProj,label:要添加引用的项目,value:"MyApp"},{parameterName:referencedProj,label:被引用项目目录,value:"ReferencedProjDir"}]
8.actions.0.insertType: 4
8.actions.0.snippets.0: "dotnet add @(targetProj)/@(targetProj).csproj reference @(referencedProj)/@(referencedProj).csproj"
// Nuget添加包 SignalR
9.key: "cmd: dotnet add xx.csproj package Microsoft.AspNetCore.SignalR.Client"
9.parameters: [{parameterName:target,label:SignalR.Client的项目,value:"MyApp"}]
9.actions.0.insertType: 4
9.actions.0.snippets.0: "dotnet add @(target)/@(target).csproj package Microsoft.AspNetCore.SignalR.Client"
// Nuget添加包 Microsoft.AspNetCore.Components.Web
10.key: "cmd: dotnet add xx.csproj package Microsoft.AspNetCore.Components.Web"
10.parameters: [{parameterName:target,label:Components.Web的项目,value:"MyApp"}]
10.actions.0.insertType: 4
10.actions.0.snippets.0: "dotnet add @(target)/@(target).csproj package Microsoft.AspNetCore.Components.Web"
// 安装EFCore相关Nuget包 - SqlServer
11.key: "cmd: dotnet add xx.csproj package [efcore]Microsoft.EntityFrameworkCore.SqlServer"
11.parameters: [{parameterName:apiDir,label:EF Core API的目录,value:"MyApp"},{parameterName:target,label:EF Core项目文件名csproj文件,value:"MyApp.Api.csproj"}]
11.actions.0.insertType: 4
11.actions.0.snippets.0: """
installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Microsoft.EntityFrameworkCore\\s' | ForEach-Object { _.ToString().Split(0,1) }
if (installed) {
Write-Host 'NuGet 包已安装'
} else {
dotnet add @(apiDir)/@(target) package Microsoft.EntityFrameworkCore
}
"""
11.actions.1.snippets.0: """
installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Microsoft.EntityFrameworkCore.Design\\s' | ForEach-Object { _.ToString().Split(0,1) }
if (installed) {
Write-Host 'NuGet 包已安装'
} else {
dotnet add @(apiDir)/@(target) package Microsoft.EntityFrameworkCore.Design
}
"""
11.actions.2.snippets.0: """
installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Microsoft.EntityFrameworkCore.SqlServer\\s' | ForEach-Object { _.ToString().Split(0,1) }
if (installed) {
Write-Host 'NuGet 包已安装'
} else {
dotnet add @(apiDir)/@(target) package Microsoft.EntityFrameworkCore.SqlServer
}
"""
// a.创建DbContext类
12.key: "cmd: EFCore 1.初始化DbContext"
12.parameters: [{parameterName:DbContextName,label:DbContext名称,value:"MyDbContext"}]
12.actions.0.insertType: 4
12.actions.0.snippets.0: """
if (-not (Test-Path @(DbContextProjectDir)/Data/@(DbContextName).cs)) {
mkdir @(DbContextProjectDir)/Data; echo '' > @(DbContextProjectDir)/Data/@(DbContextName).cs
Write-Output "Created file 'filename'."
} else {
Write-Output "File '@(DbContextProjectDir)/Data/@(DbContextName).cs' already exists, not creating."
}
"""
// b.初始化DbContext代码
12.actions.1.path: "@(DbContextProjectDir)/Data/@(DbContextName).cs"
12.actions.1.matches: [ '/\\s/g' ],
12.actions.1.cancelMatches: ['/DbContext/g']
12.actions.1.insertType: 0
12.actions.1.snippets.0: """
using Microsoft.EntityFrameworkCore;
namespace @(RootNameSpace).@(DbContextProjectDir).Data
{
public class @(DbContextName) : DbContext
{
public @(DbContextName)(DbContextOptions<@(DbContextName)> options) : base(options) { }
protected override void OnModelCreating(ModelBuilder modelBuilder)
{
// 添加种子数据(dotnet ef migrations add ProductSeeding; dotnet ef database update)
//modelBuilder.Entity<Product>().HasData();
}
public DbSet<Product> Products { get; set; }
}
}
"""
// c.Program中注册DbContext到DI容器
12.actions.2.path: "@(DbContextProjectDir)/Program.cs"
12.actions.2.matches: [ "/\\n(?=builder.Services)/" ]
12.actions.2.cancelMatches: ['/\\.AddDbContext/']
12.actions.2.snippets.0: """
builder.Services.AddDbContext<@(DbContextName)>( //Scope 每次Http请求生成一个MyContext实例
options =>
{
options.EnableSensitiveDataLogging(true); //允许 Logging模块输出敏感数据
// 使用SqlServer数据库, 并应用配置好的数据库连接字符串
options.UseSqlServer(builder.Configuration.GetConnectionString("DefaultConnection"));
});
"""
// 创建blazorwasm项目
13.key: "cmd: dotnet new blazorwasm --hosted --pwa -o .. 创建渐进式托管的Blazor WebAssembly App"
13.parameters: [{parameterName:SlnDir,label:解决方案目录,value:"NewProject"},{parameterName:SlnName,label:解决方案/项目名称,value:"BlazorWasmApp"}]
13.actions.0.insertType: 4
13.actions.0.snippets.0: """
if (Test-Path @(SlnDir)) {
cd @(SlnDir); echo 'dotnet new blazorwasm --hosted --pwa -o @(SlnName)'
} else {
Write-Host "目录@(SlnDir)不存在"
}
"""
// 创建一个类库 TODO:parameters中基于老参数进行函数运算创建新参数
14.key: "cmd: dotnet new classlib ... 创建一个类库"
14.parameters: [{"parameterName":"LibNameOption","label":"类库名选项","value":"-n BlazorWasmApp.DbMigrations.Oracle"},{"parameterName":"dotnetVersion","label":"目标框架版本","value":"net7.0"},{"parameterName":"LibPathOption","label":"类库输出选项","value":"-o ./DbMigrations/Oracle"},{"parameterName":"LibName","label":"","value":"""@(LibNameOption.replace('-n',''))"""},{"parameterName":"LibPath","label":"","value":"""@(LibPathOption.replace('-o','').trim())"""}]
14.actions.0.path: "D:/Program Files/Git/bin/bash.exe;--login -i"
14.actions.0.insertType: 0
14.actions.0.snippets.0: """
if [ ! -f "@(LibName).csproj" ]; then
dotnet new classlib @(LibNameOption) @(LibPathOption) --framework @(dotnetVersion)
# 解决方案添加项目
dotnet sln ./@(SlnName) add @(LibPath)/@(LibName).csproj
rm -f @(LibPath)/Class1.cs
echo "如需还原请运行命令: dotnet sln ./@(SlnName) remove @(LibPath)/@(LibName).csproj;rm -rf @(LibPath)"
fi
"""
// efcore 数据迁移专用类库 - Oracle
15.key: "cmd: dotnet - lib - 创建EFCore DbContext迁移专用类库 - Oracle"
15.parameters: [{parameterName:LibNameOption,label:项目名选项,value:"-n BlazorWasmApp.DbMigrations.Oracle"},{parameterName:LibPathOption,label:迁移类库输出选项,value:"-o ./DbMigrations/Oracle"},{parameterName:dotnetVersion,label:目标框架版本,value:"net7.0"},{parameterName:DbContextName,label:DbContext名,value:"MallDbContext"}]
15.actions.0.path: "D:/Program Files/Git/bin/bash.exe;--login -i"
15.actions.0.insertType: 4
15.actions.0.snippets.0: """
if [ ! -f "@(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj" ]; then
dotnet new classlib @(LibNameOption) @(LibPathOption) --framework @(dotnetVersion)
# 解决方案添加项目
dotnet sln ./@(SlnName) add @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj
dotnet add @(StartupProjectName) reference @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj
rm -f @(LibPathOption.replace('-o','').trim())/Class1.cs
echo -e 'namespace Iduo.IdentityServer4.Admin.EntityFramework.Oracle.Helpers\\n{\\n public class MigrationAssembly { }\\n}' > @(LibPathOption.replace('-o','').trim())/MigrationAseemblyForOracle.cs
dotnet ef migrations add CreateInitialOracle --context @(DbContextName) --project ./DbMigrations/Oracle/@(LibNameOption.replace('-n','').trim()).csproj --startup-project @(StartupProjectName) --output-dir ./DbMigrations/Oracle/Migrations
echo "如需还原请运行命令: dotnet sln ./@(SlnName) remove @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj;rm -rf @(LibPathOption.replace('-o','').trim())"
fi
"""
// efcore 数据迁移专用类库 - SqlServer
16.key: "cmd: dotnet - lib - 创建EFCore DbContext迁移专用类库 - SqlServer"
16.parameters: [{parameterName:LibNameOption,label:类库名选项,value:"-n BlazorWasmApp.DbMigrations.SqlServer"},{parameterName:迁移类库相对路径,label:迁移类库相对路径输出选项,value:"-o ./DbMigrations/SqlServer"},{parameterName:DbContextName,label:DbContext名,value:"MallDbContext"},{parameterName:dotnetVersion,label:目标框架版本,value:"net7.0"}]
16.actions.0.path: "D:/Program Files/Git/bin/bash.exe;--login -i"
16.actions.0.insertType: 4
16.actions.0.snippets.0: """
if [ ! -f "@(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj" ]; then
dotnet new classlib @(LibNameOption) @(LibPathOption) --framework @(dotnetVersion)
# 解决方案添加项目
dotnet sln ./@(SlnName) add @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj
dotnet add @(StartupProjectName) reference @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj
rm -f @(LibPathOption.replace('-o','').trim())/Class1.cs
echo -e 'namespace Iduo.IdentityServer4.Admin.EntityFramework.SqlServer.Helpers\\n{\\n public class MigrationAssembly { }\\n}' > @(LibPathOption.replace('-o','').trim())/MigrationAseemblyForSqlServer.cs
dotnet ef migrations add CreateInitialSqlServer --context @(DbContextName) --project ./DbMigrations/SqlServer/@(LibNameOption.replace('-n','').trim()).csproj --startup-project @(StartupProjectName) --output-dir @(DbContextName)
echo "如需还原请运行命令: dotnet remove ./Server/@(RootNameSpace).Server.csproj reference ./DbMigrations/SqlServer/@(RootNameSpace).DbMigrations.SqlServer.csproj;dotnet sln ./@(SlnName) remove @(LibPathOption.replace('-o','').trim())/@(LibNameOption.replace('-n','').trim()).csproj;rm -rf @(LibPathOption.replace('-o','').trim())"
fi
"""
// 添加Swagger文档
17.key: "Use External Package: Swashbuckle"
17.parameters: [{parameterName:apiDir,label:要添加Swashbuckle的项目,value:"Src"},{parameterName:target,label:要添加Swashbuckle的项目csproj文件名,value:"MyApp.Api.csproj"}]
17.actions.0.insertType: 4
17.actions.0.snippets.0: """
installed = dotnet list '@(apiDir)/@(target)' package --include-transitive | Select-String 'Swashbuckle.AspNetCore\\s' | ForEach-Object { _.ToString().Split(0,1) }
if (installed) {
Write-Host 'NuGet 包已安装'
} else {
dotnet add @(apiDir)/@(target) package Swashbuckle.AspNetCore
}
"""
17.actions.1.path: "@(apiDir)/Program.cs"
17.actions.1.insertType: 1
// 匹配到一个就停止, 插入代码前, 然后会将光标定位到匹配的内容结尾的位置
17.actions.1.matches: ["/\\n(?=var app = builder.Build)/g"]
// /\p{Unified_Ideograph}/ug
17.actions.1.cancelMatches: ['/\\.AddSwaggerGen/g']
17.actions.1.snippets.0: "builder.Services.AddSwaggerGen();"
17.actions.2.insertType: 1
17.actions.2.matches: ["/\\n(?=app.Use\\w+)/"]
17.actions.2.cancelMatches: ['/\\.UseSwaggerUI/g']
17.actions.2.snippets.0: """
app.UseSwaggerUI();
app.UseSwagger();
"""
# parameters: [{parameterName:a,label:名称,value:""}]
|
combined_dataset/train/non-malicious/sample_0_78.ps1
|
sample_0_78.ps1
|
#
# Module manifest for module 'OCI.PSModules.Disasterrecovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Disasterrecovery.dll'
# Version number of this module.
ModuleVersion = '93.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c43e3d16-09c4-4426-9ab9-cdda84fd5f2c'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Disasterrecovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Disasterrecovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDisasterrecoveryDrPlan',
'Get-OCIDisasterrecoveryDrPlanExecution',
'Get-OCIDisasterrecoveryDrPlanExecutionsList',
'Get-OCIDisasterrecoveryDrPlansList',
'Get-OCIDisasterrecoveryDrProtectionGroup',
'Get-OCIDisasterrecoveryDrProtectionGroupsList',
'Get-OCIDisasterrecoveryWorkRequest',
'Get-OCIDisasterrecoveryWorkRequestErrorsList',
'Get-OCIDisasterrecoveryWorkRequestLogsList',
'Get-OCIDisasterrecoveryWorkRequestsList',
'Invoke-OCIDisasterrecoveryAssociateDrProtectionGroup',
'Invoke-OCIDisasterrecoveryDisassociateDrProtectionGroup',
'Invoke-OCIDisasterrecoveryIgnoreDrPlanExecution',
'Invoke-OCIDisasterrecoveryPauseDrPlanExecution',
'Invoke-OCIDisasterrecoveryResumeDrPlanExecution',
'Invoke-OCIDisasterrecoveryRetryDrPlanExecution',
'Move-OCIDisasterrecoveryDrProtectionGroupCompartment',
'New-OCIDisasterrecoveryDrPlan',
'New-OCIDisasterrecoveryDrPlanExecution',
'New-OCIDisasterrecoveryDrProtectionGroup',
'Remove-OCIDisasterrecoveryDrPlan',
'Remove-OCIDisasterrecoveryDrPlanExecution',
'Remove-OCIDisasterrecoveryDrProtectionGroup',
'Stop-OCIDisasterrecoveryDrPlanExecution',
'Stop-OCIDisasterrecoveryWorkRequest',
'Update-OCIDisasterrecoveryDrPlan',
'Update-OCIDisasterrecoveryDrPlanExecution',
'Update-OCIDisasterrecoveryDrProtectionGroup',
'Update-OCIDisasterrecoveryDrProtectionGroupRole'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Disasterrecovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4339.ps1
|
4339.ps1
|
function Get-EntityName
{
param
(
[Parameter(Mandatory=$true)]
$SoftwareIdentity,
[Parameter(Mandatory=$true)]
$Role
)
foreach( $entity in $SoftwareIdentity.Entities )
{
if( $entity.Role -eq $Role)
{
$entity.Name
}
}
}
|
combined_dataset/train/non-malicious/3195.ps1
|
3195.ps1
|
function Invoke-Sqlcmd2
{
[CmdletBinding( DefaultParameterSetName='Ins-Que' )]
[OutputType([System.Management.Automation.PSCustomObject],[System.Data.DataRow],[System.Data.DataTable],[System.Data.DataTableCollection],[System.Data.DataSet])]
param(
[Parameter( ParameterSetName='Ins-Que',
Position=0,
Mandatory=$true,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false,
HelpMessage='SQL Server Instance required...' )]
[Parameter( ParameterSetName='Ins-Fil',
Position=0,
Mandatory=$true,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false,
HelpMessage='SQL Server Instance required...' )]
[Alias( 'Instance', 'Instances', 'ComputerName', 'Server', 'Servers' )]
[ValidateNotNullOrEmpty()]
[string[]]
$ServerInstance,
[Parameter( Position=1,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false)]
[string]
$Database,
[Parameter( ParameterSetName='Ins-Que',
Position=2,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName='Con-Que',
Position=2,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[string]
$Query,
[Parameter( ParameterSetName='Ins-Fil',
Position=2,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName='Con-Fil',
Position=2,
Mandatory=$true,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[ValidateScript({ Test-Path $_ })]
[string]
$InputFile,
[Parameter( ParameterSetName='Ins-Que',
Position=3,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false)]
[Parameter( ParameterSetName='Ins-Fil',
Position=3,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false)]
[System.Management.Automation.PSCredential]
$Credential,
[Parameter( ParameterSetName='Ins-Que',
Position=4,
Mandatory=$false,
ValueFromRemainingArguments=$false)]
[Parameter( ParameterSetName='Ins-Fil',
Position=4,
Mandatory=$false,
ValueFromRemainingArguments=$false)]
[switch]
$Encrypt,
[Parameter( Position=5,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Int32]
$QueryTimeout=600,
[Parameter( ParameterSetName='Ins-Fil',
Position=6,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName='Ins-Que',
Position=6,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[Int32]
$ConnectionTimeout=15,
[Parameter( Position=7,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[ValidateSet("DataSet", "DataTable", "DataRow","PSObject","SingleValue")]
[string]
$As="DataRow",
[Parameter( Position=8,
Mandatory=$false,
ValueFromPipelineByPropertyName=$true,
ValueFromRemainingArguments=$false )]
[System.Collections.IDictionary]
$SqlParameters,
[Parameter( Position=9,
Mandatory=$false )]
[switch]
$AppendServerInstance,
[Parameter( ParameterSetName = 'Con-Que',
Position=10,
Mandatory=$false,
ValueFromPipeline=$false,
ValueFromPipelineByPropertyName=$false,
ValueFromRemainingArguments=$false )]
[Parameter( ParameterSetName = 'Con-Fil',
Position=10,
Mandatory=$false,
ValueFromPipeline=$false,
ValueFromPipelineByPropertyName=$false,
ValueFromRemainingArguments=$false )]
[Alias( 'Connection', 'Conn' )]
[ValidateNotNullOrEmpty()]
[System.Data.SqlClient.SQLConnection]
$SQLConnection
)
Begin
{
if ($InputFile)
{
$filePath = $(Resolve-Path $InputFile).path
$Query = [System.IO.File]::ReadAllText("$filePath")
}
Write-Verbose "Running Invoke-Sqlcmd2 with ParameterSet '$($PSCmdlet.ParameterSetName)'. Performing query '$Query'"
If($As -eq "PSObject")
{
$cSharp = @'
using System;
using System.Data;
using System.Management.Automation;
public class DBNullScrubber
{
public static PSObject DataRowToPSObject(DataRow row)
{
PSObject psObject = new PSObject();
if (row != null && (row.RowState & DataRowState.Detached) != DataRowState.Detached)
{
foreach (DataColumn column in row.Table.Columns)
{
Object value = null;
if (!row.IsNull(column))
{
value = row[column];
}
psObject.Properties.Add(new PSNoteProperty(column.ColumnName, value));
}
}
return psObject;
}
}
'@
Try
{
Add-Type -TypeDefinition $cSharp -ReferencedAssemblies 'System.Data','System.Xml' -ErrorAction stop
}
Catch
{
If(-not $_.ToString() -like "*The type name 'DBNullScrubber' already exists*")
{
Write-Warning "Could not load DBNullScrubber. Defaulting to DataRow output: $_"
$As = "Datarow"
}
}
}
if($PSBoundParameters.ContainsKey('SQLConnection'))
{
if($SQLConnection.State -notlike "Open")
{
Try
{
Write-Verbose "Opening connection from '$($SQLConnection.State)' state"
$SQLConnection.Open()
}
Catch
{
Throw $_
}
}
if($Database -and $SQLConnection.Database -notlike $Database)
{
Try
{
Write-Verbose "Changing SQLConnection database from '$($SQLConnection.Database)' to $Database"
$SQLConnection.ChangeDatabase($Database)
}
Catch
{
Throw "Could not change Connection database '$($SQLConnection.Database)' to $Database`: $_"
}
}
if($SQLConnection.state -like "Open")
{
$ServerInstance = @($SQLConnection.DataSource)
}
else
{
Throw "SQLConnection is not open"
}
}
}
Process
{
foreach($SQLInstance in $ServerInstance)
{
Write-Verbose "Querying ServerInstance '$SQLInstance'"
if($PSBoundParameters.Keys -contains "SQLConnection")
{
$Conn = $SQLConnection
}
else
{
if ($Credential)
{
$ConnectionString = "Server={0};Database={1};User ID={2};Password=`"{3}`";Trusted_Connection=False;Connect Timeout={4};Encrypt={5}" -f $SQLInstance,$Database,$Credential.UserName,$Credential.GetNetworkCredential().Password,$ConnectionTimeout,$Encrypt
}
else
{
$ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2};Encrypt={3}" -f $SQLInstance,$Database,$ConnectionTimeout,$Encrypt
}
$conn = New-Object System.Data.SqlClient.SQLConnection
$conn.ConnectionString = $ConnectionString
Write-Debug "ConnectionString $ConnectionString"
Try
{
$conn.Open()
}
Catch
{
Write-Error $_
continue
}
}
if ($PSBoundParameters.Verbose)
{
$conn.FireInfoMessageEventOnUserErrors=$false
$handler = [System.Data.SqlClient.SqlInfoMessageEventHandler] { Write-Verbose "$($_)" }
$conn.add_InfoMessage($handler)
}
$cmd = New-Object system.Data.SqlClient.SqlCommand($Query,$conn)
$cmd.CommandTimeout=$QueryTimeout
if ($SqlParameters -ne $null)
{
$SqlParameters.GetEnumerator() |
ForEach-Object {
If ($_.Value -ne $null)
{ $cmd.Parameters.AddWithValue($_.Key, $_.Value) }
Else
{ $cmd.Parameters.AddWithValue($_.Key, [DBNull]::Value) }
} > $null
}
$ds = New-Object system.Data.DataSet
$da = New-Object system.Data.SqlClient.SqlDataAdapter($cmd)
Try
{
[void]$da.fill($ds)
}
Catch [System.Data.SqlClient.SqlException]
{
$Err = $_
Write-Verbose "Capture SQL Error"
if ($PSBoundParameters.Verbose) {Write-Verbose "SQL Error: $Err"}
switch ($ErrorActionPreference.tostring())
{
{'SilentlyContinue','Ignore' -contains $_} {}
'Stop' { Throw $Err }
'Continue' { Throw $Err}
Default { Throw $Err}
}
}
Catch
{
Write-Verbose "Capture Other Error"
$Err = $_
if ($PSBoundParameters.Verbose) {Write-Verbose "Other Error: $Err"}
switch ($ErrorActionPreference.tostring())
{
{'SilentlyContinue','Ignore' -contains $_} {}
'Stop' { Throw $Err}
'Continue' { Throw $Err}
Default { Throw $Err}
}
}
Finally
{
if(-not $PSBoundParameters.ContainsKey('SQLConnection'))
{
$conn.Close()
}
}
if($AppendServerInstance)
{
$Column = New-Object Data.DataColumn
$Column.ColumnName = "ServerInstance"
$ds.Tables[0].Columns.Add($Column)
Foreach($row in $ds.Tables[0])
{
$row.ServerInstance = $SQLInstance
}
}
switch ($As)
{
'DataSet'
{
$ds
}
'DataTable'
{
$ds.Tables
}
'DataRow'
{
$ds.Tables[0]
}
'PSObject'
{
foreach ($row in $ds.Tables[0].Rows)
{
[DBNullScrubber]::DataRowToPSObject($row)
}
}
'SingleValue'
{
$ds.Tables[0] | Select-Object -ExpandProperty $ds.Tables[0].Columns[0].ColumnName
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_45_26.ps1
|
sample_45_26.ps1
|
#
# Module manifest for module 'OCI.PSModules.Optimizer'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Optimizer.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '18a4b1e7-fbad-4df9-a45b-6484df378fbb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Optimizer Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Optimizer.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOptimizerCategoriesList', 'Get-OCIOptimizerCategory',
'Get-OCIOptimizerEnrollmentStatus',
'Get-OCIOptimizerEnrollmentStatusesList',
'Get-OCIOptimizerHistoriesList', 'Get-OCIOptimizerProfile',
'Get-OCIOptimizerProfileLevelsList', 'Get-OCIOptimizerProfilesList',
'Get-OCIOptimizerRecommendation',
'Get-OCIOptimizerRecommendationsList',
'Get-OCIOptimizerRecommendationStrategiesList',
'Get-OCIOptimizerResourceAction',
'Get-OCIOptimizerResourceActionQueryableFieldsList',
'Get-OCIOptimizerResourceActionsList',
'Get-OCIOptimizerWorkRequest',
'Get-OCIOptimizerWorkRequestErrorsList',
'Get-OCIOptimizerWorkRequestLogsList',
'Get-OCIOptimizerWorkRequestsList',
'Invoke-OCIOptimizerBulkApplyRecommendations',
'Invoke-OCIOptimizerFilterResourceActions',
'New-OCIOptimizerProfile', 'Remove-OCIOptimizerProfile',
'Update-OCIOptimizerEnrollmentStatus', 'Update-OCIOptimizerProfile',
'Update-OCIOptimizerRecommendation',
'Update-OCIOptimizerResourceAction'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Optimizer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/ConvertFrom-FahrenheitWi.ps1
|
ConvertFrom-FahrenheitWi.ps1
|
## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n\nparam([double] $Fahrenheit)\n\nSet-StrictMode -Version Latest\n\n## Convert Fahrenheit to Celsius\nfunction ConvertFahrenheitToCelsius([double] $fahrenheit)\n{\n $celsius = $fahrenheit - 32\n $celsius = $celsius / 1.8\n $celsius\n}\n\n$celsius = ConvertFahrenheitToCelsius $fahrenheit\n\n## Output the answer\n"$fahrenheit degrees Fahrenheit is $celsius degrees Celsius."
|
combined_dataset/train/non-malicious/Get-PDC09Videos_2.ps1
|
Get-PDC09Videos_2.ps1
|
#requires -version 2.0
PARAM (
[Parameter(Position=1, Mandatory=$true)]
[ValidateSet("wmv","wmvhigh","ppt")] # the "mp4" files aren't there yet
[String]$MediaType,
[string]$Destination = $PWD
)
if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and -not ( # Vista and ...
new-object Security.Principal.WindowsPrincipal (
[Security.Principal.WindowsIdentity]::GetCurrent()) # current user is admin
).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) {
Write-Warning @"
On VISTA and above, BITS limits the number of jobs in the queue to 300 jobs and the number of jobs that a non-administrator user can create to 60 jobs.
You MUST run this script from an elevated host if you're on Vista, Windows 7, or Server 2008
"@
}
Import-Module BitsTransfer
Push-Location $Destination
$Extension = $(switch -wildcard($MediaType){"wmv*"{"wmv"} "mp4"{"mp4"} "ppt"{"pptx"}})
$BaseUrl = "http://ecn.channel9.msdn.com/o9/pdc09/{0}/{2}.{1}"
"CL09","CL18","FT02","FT06","FT11","PR05","SVC01","SVC10","SVC20","SVR03","CL30","CL33","FT30",
"FT31","PR31","SVC30","SVC37","SVR33","VTL30","VTL32","CL04","CL14","CL25","FT18","FT19","FT25",
"PR02","SVC13","SVR01","SVR14","CL13","CL29","FT10","FT28","FT57","PR11","SVC52","SVR15","SVR17",
"CL11","CL17","CL23","FT03","FT08","PR10","SVR16","VTL01","CL01","FT50","FT52","FT55","FT59","PR13",
"SVC02","SVC03","SVC15","CL31","CL34","FT32","FT34","FT36","SVC31","SVC32","SVR31","VTL31","CL15",
"FT12","FT17","FT58","SVC16","SVC28","SVC53","SVR11","VTL05","CL06","FT04","FT07","FT29","PR06",
"SVC09","SVC17","SVR13","VTL04","CL12","CL22","FT22","FT23","FT26","SVC04","SVC14","SVC19","SVC54",
"SVR12","CL02","CL05","CL16","FT21","FT56","PR03","SVC08","SVC18","SVR10","VTL03","CL10","FT13",
"FT53","FT60","PR07","SVC06","SVC25","SVR07","SVR18","VTL02","CL03","CL21","CL27","FT14","FT20",
"FT24","PR09","SVC12","SVR09","SVR19","CL32","CL35","CL36","FT33","FT35","PR30","PR33","SVC33",
"SVC36","SVR32","CL07","CL24","CL28","FT09","FT16","FT27","PR12","SVC27","SVR02","SVR06","CL26",
"FT05","FT54","PR01","PR14","SVC23","SVC26","SVR08","KYN01-PGM","KYN02-PGM" |
ForEach { Start-BitsTransfer -Source $($BaseUrl -f $MediaType, $Extension, $_) -Async }
Pop-Location
Write-Host "You may now use Get-BitsTransfer to check on the status of the downloads. By default, failed transfers will be retried every 10 minutes for two weeks."
# SIG # Begin signature block
# MIIRDAYJKoZIhvcNAQcCoIIQ/TCCEPkCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU5g0RdBrlScbfFYcyJUxEORi9
# Kg6ggg5CMIIHBjCCBO6gAwIBAgIBFTANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQG
# EwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERp
# Z2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2Vy
# dGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDcxMDI0MjIwMTQ1WhcNMTIxMDI0MjIw
# MTQ1WjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzAp
# BgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNV
# BAMTL1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJbnRlcm1lZGlhdGUgT2JqZWN0
# IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyiOLIjUemqAbPJ1J
# 0D8MlzgWKbr4fYlbRVjvhHDtfhFN6RQxq0PjTQxRgWzwFQNKJCdU5ftKoM5N4YSj
# Id6ZNavcSa6/McVnhDAQm+8H3HWoD030NVOxbjgD/Ih3HaV3/z9159nnvyxQEckR
# ZfpJB2Kfk6aHqW3JnSvRe+XVZSufDVCe/vtxGSEwKCaNrsLc9pboUoYIC3oyzWoU
# TZ65+c0H4paR8c8eK/mC914mBo6N0dQ512/bkSdaeY9YaQpGtW/h/W/FkbQRT3sC
# pttLVlIjnkuY4r9+zvqhToPjxcfDYEf+XD8VGkAqle8Aa8hQ+M1qGdQjAye8OzbV
# uUOw7wIDAQABo4ICfzCCAnswDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAQYwHQYD
# VR0OBBYEFNBOD0CZbLhLGW87KLjg44gHNKq3MIGoBgNVHSMEgaAwgZ2AFE4L7xqk
# QFulF2mHMMo0aEPQQa7yoYGBpH8wfTELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0
# YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRl
# IFNpZ25pbmcxKTAnBgNVBAMTIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9y
# aXR5ggEBMAkGA1UdEgQCMAAwPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzAChiFo
# dHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9zZnNjYS5jcnQwYAYDVR0fBFkwVzAsoCqg
# KIYmaHR0cDovL2NlcnQuc3RhcnRjb20ub3JnL3Nmc2NhLWNybC5jcmwwJ6AloCOG
# IWh0dHA6Ly9jcmwuc3RhcnRzc2wuY29tL3Nmc2NhLmNybDCBggYDVR0gBHsweTB3
# BgsrBgEEAYG1NwEBBTBoMC8GCCsGAQUFBwIBFiNodHRwOi8vY2VydC5zdGFydGNv
# bS5vcmcvcG9saWN5LnBkZjA1BggrBgEFBQcCARYpaHR0cDovL2NlcnQuc3RhcnRj
# b20ub3JnL2ludGVybWVkaWF0ZS5wZGYwEQYJYIZIAYb4QgEBBAQDAgABMFAGCWCG
# SAGG+EIBDQRDFkFTdGFydENvbSBDbGFzcyAyIFByaW1hcnkgSW50ZXJtZWRpYXRl
# IE9iamVjdCBTaWduaW5nIENlcnRpZmljYXRlczANBgkqhkiG9w0BAQUFAAOCAgEA
# UKLQmPRwQHAAtm7slo01fXugNxp/gTJY3+aIhhs8Gog+IwIsT75Q1kLsnnfUQfbF
# pl/UrlB02FQSOZ+4Dn2S9l7ewXQhIXwtuwKiQg3NdD9tuA8Ohu3eY1cPl7eOaY4Q
# qvqSj8+Ol7f0Zp6qTGiRZxCv/aNPIbp0v3rD9GdhGtPvKLRS0CqKgsH2nweovk4h
# fXjRQjp5N5PnfBW1X2DCSTqmjweWhlleQ2KDg93W61Tw6M6yGJAGG3GnzbwadF9B
# UW88WcRsnOWHIu1473bNKBnf1OKxxAQ1/3WwJGZWJ5UxhCpA+wr+l+NbHP5x5XZ5
# 8xhhxu7WQ7rwIDj8d/lGU9A6EaeXv3NwwcbIo/aou5v9y94+leAYqr8bbBNAFTX1
# pTxQJylfsKrkB8EOIx+Zrlwa0WE32AgxaKhWAGho/Ph7d6UXUSn5bw2+usvhdkW4
# npUoxAk3RhT3+nupi1fic4NG7iQG84PZ2bbS5YxOmaIIsIAxclf25FwssWjieMwV
# 0k91nlzUFB1HQMuE6TurAakS7tnIKTJ+ZWJBDduUbcD1094X38OvMO/++H5S45Ki
# 3r/13YTm0AWGOvMFkEAF8LbuEyecKTaJMTiNRfBGMgnqGBfqiOnzxxRVNOw2hSQp
# 0B+C9Ij/q375z3iAIYCbKUd/5SSELcmlLl+BuNknXE0wggc0MIIGHKADAgECAgFR
# MA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRD
# b20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2ln
# bmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMiBQcmltYXJ5IEludGVybWVk
# aWF0ZSBPYmplY3QgQ0EwHhcNMDkxMTExMDAwMDAxWhcNMTExMTExMDYyODQzWjCB
# qDELMAkGA1UEBhMCVVMxETAPBgNVBAgTCE5ldyBZb3JrMRcwFQYDVQQHEw5XZXN0
# IEhlbnJpZXR0YTEtMCsGA1UECxMkU3RhcnRDb20gVmVyaWZpZWQgQ2VydGlmaWNh
# dGUgTWVtYmVyMRUwEwYDVQQDEwxKb2VsIEJlbm5ldHQxJzAlBgkqhkiG9w0BCQEW
# GEpheWt1bEBIdWRkbGVkTWFzc2VzLm9yZzCCASIwDQYJKoZIhvcNAQEBBQADggEP
# ADCCAQoCggEBAMfjItJjMWVaQTECvnV/swHQP0FTYUvRizKzUubGNDNaj7v2dAWC
# rAA+XE0lt9JBNFtCCcweDzphbWU/AAY0sEPuKobV5UGOLJvW/DcHAWdNB/wRrrUD
# dpcsapQ0IxxKqpRTrbu5UGt442+6hJReGTnHzQbX8FoGMjt7sLrHc3a4wTH3nMc0
# U/TznE13azfdtPOfrGzhyBFJw2H1g5Ag2cmWkwsQrOBU+kFbD4UjxIyus/Z9UQT2
# R7bI2R4L/vWM3UiNj4M8LIuN6UaIrh5SA8q/UvDumvMzjkxGHNpPZsAPaOS+RNmU
# Go6X83jijjbL39PJtMX+doCjS/lnclws5lUCAwEAAaOCA4EwggN9MAkGA1UdEwQC
# MAAwDgYDVR0PAQH/BAQDAgeAMDoGA1UdJQEB/wQwMC4GCCsGAQUFBwMDBgorBgEE
# AYI3AgEVBgorBgEEAYI3AgEWBgorBgEEAYI3CgMNMB0GA1UdDgQWBBR5tWPGCLNQ
# yCXI5fY5ViayKj6xATCBqAYDVR0jBIGgMIGdgBTQTg9AmWy4SxlvOyi44OOIBzSq
# t6GBgaR/MH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSsw
# KQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYD
# VQQDEyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eYIBFTCCAUIGA1Ud
# IASCATkwggE1MIIBMQYLKwYBBAGBtTcBAgEwggEgMC4GCCsGAQUFBwIBFiJodHRw
# Oi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMDQGCCsGAQUFBwIBFihodHRw
# Oi8vd3d3LnN0YXJ0c3NsLmNvbS9pbnRlcm1lZGlhdGUucGRmMIG3BggrBgEFBQcC
# AjCBqjAUFg1TdGFydENvbSBMdGQuMAMCAQEagZFMaW1pdGVkIExpYWJpbGl0eSwg
# c2VlIHNlY3Rpb24gKkxlZ2FsIExpbWl0YXRpb25zKiBvZiB0aGUgU3RhcnRDb20g
# Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUG9saWN5IGF2YWlsYWJsZSBhdCBodHRw
# Oi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMGMGA1UdHwRcMFowK6ApoCeG
# JWh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL2NydGMyLWNybC5jcmwwK6ApoCeGJWh0
# dHA6Ly9jcmwuc3RhcnRzc2wuY29tL2NydGMyLWNybC5jcmwwgYkGCCsGAQUFBwEB
# BH0wezA3BggrBgEFBQcwAYYraHR0cDovL29jc3Auc3RhcnRzc2wuY29tL3N1Yi9j
# bGFzczIvY29kZS9jYTBABggrBgEFBQcwAoY0aHR0cDovL3d3dy5zdGFydHNzbC5j
# b20vY2VydHMvc3ViLmNsYXNzMi5jb2RlLmNhLmNydDAjBgNVHRIEHDAahhhodHRw
# Oi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEFBQADggEBACY+J88ZYr5A
# 6lYz/L4OGILS7b6VQQYn2w9Wl0OEQEwlTq3bMYinNoExqCxXhFCHOi58X6r8wdHb
# E6mU8h40vNYBI9KpvLjAn6Dy1nQEwfvAfYAL8WMwyZykPYIS/y2Dq3SB2XvzFy27
# zpIdla8qIShuNlX22FQL6/FKBriy96jcdGEYF9rbsuWku04NqSLjNM47wCAzLs/n
# FXpdcBL1R6QEK4MRhcEL9Ho4hGbVvmJES64IY+P3xlV2vlEJkk3etB/FpNDOQf8j
# RTXrrBUYFvOCv20uHsRpc3kFduXt3HRV2QnAlRpG26YpZN4xvgqSGXUeqRceef7D
# dm4iTdHK5tIxggI0MIICMAIBATCBkjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoT
# DVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmlj
# YXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJ
# bnRlcm1lZGlhdGUgT2JqZWN0IENBAgFRMAkGBSsOAwIaBQCgeDAYBgorBgEEAYI3
# AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
# AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEWMCMGCSqGSIb3DQEJBDEWBBQxeu1KNRTP
# MV/u5qrVao2hnEIvgjANBgkqhkiG9w0BAQEFAASCAQCn8i14g3OVAd4hrt0bSpY0
# wR2IPwwRJpBMrh9wBffYNvIPTv41FT3rFHmTDoxLNAdqiY1SD5ulj16sBV7N+8ST
# 59h7xp5cjVssVSck8xzJs2XKCErnZ+vSP7BoUbaEObX/bLhv5X+uzd+S5AxxA0AN
# KWnlQ2T8Ri5hl2meswc/MSy0YEtLjQf6ci73uCRmUE4b/ckVD9dgCGaLLejvgAPD
# v8XBnc4Zj60ymGpY3wX5pxHD8Jgxhx87E5eEdAGaYg2XCLHdlhnOpqC8sJbDY70I
# a5TTqQZiT/HLVC9F2NEr/MiNMK1HUGkMxLRu4LRucpQu90f+xitvDJHAUvhzwQKr
# SIG # End signature block
|
combined_dataset/train/non-malicious/1175.ps1
|
1175.ps1
|
Set-StrictMode -Version 'Latest'
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
$rootDir = $null
$childDir = $null
$grandchildFile = $null
$childFile = $null
function Assert-EverythingCompressed
{
Assert-Compressed -Path $rootDir
Assert-Compressed -Path $childDir
Assert-Compressed -Path $grandchildFile
Assert-Compressed -Path $childFile
}
function Assert-NothingCompressed
{
Assert-NotCompressed -Path $rootDir
Assert-NotCompressed -Path $childDir
Assert-NotCompressed -Path $grandchildFile
Assert-NotCompressed -Path $childFile
}
function Assert-Compressed
{
param(
$Path
)
(Test-NtfsCompression -Path $Path) | Should -BeTrue
}
function Assert-NotCompressed
{
param(
$Path
)
(Test-NtfsCompression -Path $Path) | Should -BeFalse
}
Describe 'Enable-NtfsCompression' {
BeforeEach {
$Global:Error.Clear()
$script:rootDir = Join-Path -Path $TestDrive.FullName -ChildPath ([IO.Path]::GetRandomFileName())
$script:childDir = Join-Path $rootDir -ChildPath 'ChildDir'
$script:grandchildFile = Join-Path $rootDir -ChildPath 'ChildDir\GrandchildFile'
$script:childFile = Join-Path $rootDir -ChildPath 'ChildFile'
New-Item -Path $grandchildFile -ItemType 'File' -Force
New-Item -Path $childFile -ItemType 'File' -Force
}
It 'should enable compression on directory only' {
Assert-NothingCompressed
Enable-NtfsCompression -Path $rootDir
Assert-Compressed -Path $rootDir
Assert-NotCompressed -Path $childDir
Assert-NotCompressed -path $grandchildFile
Assert-NotCompressed -Path $childFile
$newFile = Join-Path $rootDir 'newfile'
'' > $newFile
Assert-Compressed -Path $newFile
$newDir = Join-Path $rootDir 'newDir'
$null = New-Item -Path $newDir -ItemType Directory
Assert-Compressed -Path $newDir
}
It 'should fail if path does not exist' {
Assert-NothingCompressed
Enable-NtfsCompression -Path 'C:\I\Do\Not\Exist' -ErrorAction SilentlyContinue
$Global:Error.Count | Should -Be 1
($Global:Error[0].Exception.Message -like '*not found*') | Should -BeTrue
Assert-NothingCompressed
}
It 'should enable compression recursively' {
Assert-NothingCompressed
Enable-NtfsCompression -Path $rootDir -Recurse
Assert-EverythingCompressed
}
It 'should support piping items' {
Assert-NothingCompressed
Get-ChildItem $rootDir | Enable-NtfsCompression
Assert-NotCompressed $rootDir
Assert-Compressed $childDir
Assert-NotCompressed $grandchildFile
Assert-Compressed $childFile
}
It 'should support piping strings' {
($childFile,$grandchildFile) | Enable-NtfsCompression
Assert-NotCompressed $rootDir
Assert-NotCompressed $childDir
Assert-Compressed $grandchildFile
Assert-Compressed $childFile
}
It 'should compress array of items' {
Enable-NtfsCompression -Path $childFile,$grandchildFile
Assert-NotCompressed $rootDir
Assert-NotCompressed $childDir
Assert-Compressed $grandchildFile
Assert-Compressed $childFile
}
It 'should compress already compressed item' {
Enable-NtfsCompression $rootDir -Recurse
Assert-EverythingCompressed
Enable-NtfsCompression $rootDir -Recurse
$LASTEXITCODE | Should -Be 0
Assert-EverythingCompressed
}
It 'should support what if' {
Enable-NtfsCompression -Path $childFile -WhatIf
Assert-NotCompressed $childFile
}
It 'should not compress if already compressed' {
Enable-CNtfsCompression -Path $rootDir
Assert-Compressed $rootDir
Mock -CommandName 'Invoke-ConsoleCommand' -ModuleName 'Carbon'
Enable-CNtfsCompression -Path $rootDir
Assert-MockCalled 'Invoke-ConsoleCommand' -ModuleName 'Carbon' -Times 0
Enable-CNtfsCompression -Path $rootDir -Force
Assert-MockCalled 'Invoke-ConsoleCommand' -ModuleName 'Carbon' -Times 1
}
}
|
combined_dataset/train/non-malicious/4295.ps1
|
4295.ps1
|
function SuiteSetup {
Import-Module "$PSScriptRoot\PSGetTestUtils.psm1" -WarningAction SilentlyContinue
Import-Module "$PSScriptRoot\Asserts.psm1" -WarningAction SilentlyContinue
$script:IsWindowsOS = (-not (Get-Variable -Name IsWindows -ErrorAction Ignore)) -or $IsWindows
$script:ProgramFilesScriptsPath = Get-AllUsersScriptsPath
$script:MyDocumentsScriptsPath = Get-CurrentUserScriptsPath
$script:PSGetLocalAppDataPath = Get-PSGetLocalAppDataPath
$script:TempPath = Get-TempPath
New-Item -Path $script:MyDocumentsScriptsPath -ItemType Directory -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
Install-NuGetBinaries
$script:psgetModuleInfo = Import-Module PowerShellGet -Global -Force -Passthru
Import-LocalizedData script:LocalizedData -filename PSGet.Resource.psd1 -BaseDirectory $script:psgetModuleInfo.ModuleBase
$script:moduleSourcesFilePath = Join-Path $script:PSGetLocalAppDataPath "PSRepositories.xml"
$script:moduleSourcesBackupFilePath = Join-Path $script:PSGetLocalAppDataPath "PSRepositories.xml_$(get-random)_backup"
if (Test-Path $script:moduleSourcesFilePath) {
Rename-Item $script:moduleSourcesFilePath $script:moduleSourcesBackupFilePath -Force
}
$Global:PSGallerySourceUri = ''
GetAndSet-PSGetTestGalleryDetails -IsScriptSuite -SetPSGallery -PSGallerySourceUri ([REF]$Global:PSGallerySourceUri)
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
Get-InstalledScript -Name Fabrikam-ClientScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
if ($script:IsWindowsOS) {
$script:userName = "PSGetUser"
$password = "Password1"
$null = net user $script:userName $password /add
$secstr = ConvertTo-SecureString $password -AsPlainText -Force
$script:credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $script:userName, $secstr
}
$script:assertTimeOutms = 20000
$script:UntrustedRepoSourceLocation = 'https://powershell.myget.org/F/powershellget-test-items/api/v2/'
$script:UntrustedRepoPublishLocation = 'https://powershell.myget.org/F/powershellget-test-items/api/v2/package'
$script:TempSavePath = Join-Path -Path $script:TempPath -ChildPath "PSGet_$(Get-Random)"
$null = New-Item -Path $script:TempSavePath -ItemType Directory -Force
$script:AddedAllUsersInstallPath = Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
$script:AddedCurrentUserInstallPath = Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
$script:PSGetSettingsFilePath = Join-Path $script:PSGetLocalAppDataPath 'PowerShellGetSettings.xml'
$script:PSGetSettingsBackupFilePath = Join-Path $script:PSGetLocalAppDataPath "PowerShellGetSettings.xml_$(get-random)_backup"
if (Test-Path $script:PSGetSettingsFilePath) {
Rename-Item $script:PSGetSettingsFilePath $script:PSGetSettingsBackupFilePath -Force
}
$script:EnvironmentVariableTarget = @{ Process = 0; User = 1; Machine = 2 }
}
function SuiteCleanup {
if (Test-Path $script:moduleSourcesBackupFilePath) {
Move-Item $script:moduleSourcesBackupFilePath $script:moduleSourcesFilePath -Force
}
else {
RemoveItem $script:moduleSourcesFilePath
}
$null = Import-PackageProvider -Name PowerShellGet -Force
if ($script:IsWindowsOS) {
net user $script:UserName /delete | Out-Null
if (Get-Command -Name Get-WmiObject -ErrorAction SilentlyContinue) {
$userProfile = (Get-WmiObject -Class Win32_UserProfile | Where-Object { $_.LocalPath -match $script:UserName })
if ($userProfile) {
RemoveItem $userProfile.LocalPath
}
}
}
RemoveItem $script:TempSavePath
if ($script:AddedAllUsersInstallPath) {
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
}
if ($script:AddedCurrentUserInstallPath) {
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
}
if (Test-Path $script:PSGetSettingsBackupFilePath) {
Move-Item $script:PSGetSettingsBackupFilePath $script:PSGetSettingsFilePath -Force
}
else {
RemoveItem $script:PSGetSettingsFilePath
}
}
Describe PowerShell.PSGet.InstallScriptTests -Tags 'BVT', 'InnerLoop' {
BeforeAll {
SuiteSetup
}
AfterAll {
SuiteCleanup
}
AfterEach {
Get-InstalledScript -Name Fabrikam-Script -ErrorAction SilentlyContinue | Uninstall-Script -Force
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
Get-InstalledScript -Name Fabrikam-ClientScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
It "Install-Script Fabrikam-ServerScript should be silent" {
$result = Install-Script -Name "Fabrikam-ServerScript"
$result | Should -BeNullOrEmpty
}
It "Install-Script Fabrikam-ServerScript -PassThru should return output" {
$result = Install-Script -Name "Fabrikam-ServerScript" -PassThru
$result | Should -Not -BeNullOrEmpty
}
It "InstallScriptWithRangeWildCards" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script 'Fab[rR]ikam?Ser[a-z]erScr?pt', 'TempName' } `
-expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script'
}
It "InstallNotAvailableScriptWithWildCard" {
Install-Script -Name "Fabrikam-ServerScriptW" -ErrorAction SilentlyContinue
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript Fabrikam-ServerScript } `
-expectedFullyQualifiedErrorId 'NoMatchFound,Microsoft.PowerShell.PackageManagement.Cmdlets.GetPackage'
}
It "InstallMultipleScripts" {
Install-Script Fabrikam-ClientScript, Fabrikam-ServerScript
$res = Get-InstalledScript Fabrikam-ClientScript, Fabrikam-ServerScript
Assert ($res.Count -eq 2) "Install-Script with multiple names should not fail"
}
It "InstallSingleScript" {
$scriptName = 'Fabrikam-ServerScript'
$findScriptOutput = Find-Script $scriptName
$DateTimeBeforeInstall = Get-Date
Install-Script $scriptName -scope CurrentUser
$res = Get-InstalledScript $scriptName
AssertEquals $res.Name $scriptName "Install-Script failed to install $scriptName, $res"
Assert ($res.Version -ge '2.5') "Invalid Version value in Get-InstalledScript metadata, $res"
AssertEquals $res.Type 'Script' "Invalid Type value in Get-InstalledScript metadata, $res"
AssertEquals $res.Description $findScriptOutput.Description "Invalid Description value in Get-InstalledScript metadata, $res"
AssertEquals $res.Author $findScriptOutput.Author "Invalid Author value in Get-InstalledScript metadata, $res"
AssertEquals $res.CompanyName $findScriptOutput.CompanyName "Invalid CompanyName value in Get-InstalledScript metadata, $res"
AssertEquals $res.Copyright $findScriptOutput.Copyright "Invalid Copyright value in Get-InstalledScript metadata, $res"
AssertEquals $res.PublishedDate $findScriptOutput.PublishedDate "Invalid PublishedDate value in Get-InstalledScript metadata, $res"
AssertEquals $res.LicenseUri $findScriptOutput.LicenseUri "Invalid LicenseUri value in Get-InstalledScript metadata, $res"
AssertEquals $res.ProjectUri $findScriptOutput.ProjectUri "Invalid ProjectUri value in Get-InstalledScript metadata, $res"
AssertEquals $res.IconUri $findScriptOutput.IconUri "Invalid IconUri value in Get-InstalledScript metadata, $res"
AssertEquals $res.ReleaseNotes $findScriptOutput.ReleaseNotes "Invalid ReleaseNotes value in Get-InstalledScript metadata, $res"
AssertEquals $res.Repository $findScriptOutput.Repository "Invalid Repository value in Get-InstalledScript metadata, $res"
AssertEquals $res.RepositorySourceLocation $findScriptOutput.RepositorySourceLocation "Invalid RepositorySourceLocation value in Get-InstalledScript metadata, $res"
AssertEquals $res.PackageManagementProvider $findScriptOutput.PackageManagementProvider "Invalid PackageManagementProvider value in Get-InstalledScript metadata, $res"
AssertEquals $res.InstalledLocation $script:MyDocumentsScriptsPath "Invalid InstalledLocation value in Get-InstalledScript metadata, $res"
AssertEquals $res.PowerShellGetFormatVersion $findScriptOutput.PowerShellGetFormatVersion "Invalid PowerShellGetFormatVersion value in Get-InstalledScript metadata, $res"
AssertNotNull $res.InstalledDate "Get-InstalledScript results are not expected, InstalledDate should not be null, $res"
Assert ($res.InstalledDate.AddSeconds(1) -ge $DateTimeBeforeInstall) "Get-InstalledScript results are not expected, InstalledDate $($res.InstalledDate.Ticks) should be after $($DateTimeBeforeInstall.Ticks)"
AssertNull $res.UpdatedDate "Get-InstalledScript results are not expected, UpdateDate should be null, $res"
$findScriptOutput.Tags | ForEach-Object {
Assert ($res.Tags -contains $_) "Invalid Tags value, missing $_ in Tags from Get-InstalledScript metadata, $($res.Tags)"
}
}
It "InstallAScriptWithMinVersion" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.0'
Install-Script $scriptName -MinimumVersion $version
$res = Get-InstalledScript $scriptName -MinimumVersion $version
AssertEquals $res.Name $scriptName
Assert ($res.Version -ge [Version]$version) "Install-Script failed to install with Version"
}
It "InstallAScriptWithReqVersion" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.5'
Install-Script $scriptName -RequiredVersion $version
$res = Get-InstalledScript $scriptName -RequiredVersion $version
AssertEquals $res.Name $scriptName
AssertEquals $res.Version $version "Install-Script failed to install with RequiredVersion"
}
It "InstallScriptShouldNotFailIfReqVersionAlreadyInstalled" {
Install-Script Fabrikam-ServerScript -RequiredVersion 2.0
$MyError = $null
Install-Script Fabrikam-ServerScript -RequiredVersion 2.0 -ErrorVariable MyError
Assert ((-not $MyError) -or -not ($MyError | ? { -not (($_.Message -match 'StopUpstreamCommandsException') -or ($_.Message -eq 'System error.')) })) "There should not be any error from second install with required, $MyError"
} `
-Skip:$($PSCulture -ne 'en-US')
It "InstallScriptShouldNotFailIfMinVersionAlreadyInstalled" {
Install-Script Fabrikam-ServerScript -RequiredVersion 2.5
$MyError = $null
Install-Script Fabrikam-ServerScript -MinimumVersion 2.0 -ErrorVariable MyError
Assert ((-not $MyError) -or -not ($MyError | ? { -not (($_.Message -match 'StopUpstreamCommandsException') -or ($_.Message -eq 'System error.')) })) "There should not be any error from second install with min version, $MyError"
} `
-Skip:$($PSCulture -ne 'en-US')
It InstallScriptWithForce {
$scriptName = 'Fabrikam-ServerScript'
Install-Script $scriptName -RequiredVersion 1.0
$MyError = $null
Install-Script $scriptName -RequiredVersion 1.5 -Force -ErrorVariable MyError
Assert ($MyError.Count -eq 0) "There should not be any error from force install, $MyError"
$res = Get-InstalledScript $scriptName
AssertEquals $res.Name $scriptName "Install-Script with existing script should be overwritten if force is specified, $res"
AssertEquals $res.Version '1.5' "Install-Script with existing script should be overwritten if force is specified, $res"
}
It InstallScriptSameVersionWithForce {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.5'
Install-Script $scriptName -RequiredVersion $version
$MyError = $null
Install-Script $scriptName -RequiredVersion $version -Force -ErrorVariable MyError
Assert ($MyError.Count -eq 0) "There should not be any error from force install, $MyError"
$res = Get-InstalledScript $scriptName
AssertEquals $res.Name $scriptName "Install-Script with existing script version should be overwritten if force is specified, $res"
AssertEquals $res.Version '1.5' "Install-Script with existing script should be overwritten if force is specified, $res"
}
It "InstallScriptWithNotAvailableMinVersion" {
$expectedFullyQualifiedErrorId = 'NoMatchFoundForCriteria,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScript -MinimumVersion 10.0 } `
-expectedFullyQualifiedErrorId $expectedFullyQualifiedErrorId
}
It "InstallScriptWithNotAvailableReqVersion" {
$expectedFullyQualifiedErrorId = 'NoMatchFoundForCriteria,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScript -RequiredVersion 1.44 } `
-expectedFullyQualifiedErrorId $expectedFullyQualifiedErrorId
}
It "InstallScriptWithReqVersion" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.5'
Install-Script $scriptName -RequiredVersion $version -Confirm:$false
$res = Get-InstalledScript $scriptName
AssertEquals $res.Name $scriptName "Install-Script failed to install with RequiredVersion"
AssertEquals $res.Version $version "Install-Script failed to install with RequiredVersion"
}
It "InstallScriptWithMinVersion" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.5'
Install-Script $scriptName -MinimumVersion $version
$res = Get-InstalledScript $scriptName
AssertEquals $res.Name $scriptName "Install-Script failed to install with MinimumVersion"
Assert ($res.Version -ge $version) "Install-Script failed to install with MinimumVersion"
}
It "InstallNotAvailableScript" {
$expectedFullyQualifiedErrorId = 'NoMatchFoundForCriteria,Microsoft.PowerShell.PackageManagement.Cmdlets.InstallPackage'
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script NonExistentScript } `
-expectedFullyQualifiedErrorId $expectedFullyQualifiedErrorId
}
It "InstallScriptWithPipelineInput" {
$scriptName = 'Fabrikam-ServerScript'
Find-Script $scriptName | Install-Script
$res = Get-InstalledScript $scriptName
AssertEquals $res.Name $scriptName "Install-Script failed to install Fabrikam-ServerScript with pipeline input"
}
It "InstallMultipleScriptsWithPipelineInput" {
Find-Script Fabrikam-ClientScript, Fabrikam-ServerScript | Install-Script
$res = Get-InstalledScript Fabrikam-ClientScript, Fabrikam-ServerScript
Assert ($res.Count -eq 2) "Install-Script failed to install multiple scripts from Find-Script output"
}
It "InstallMultipleScriptsUsingInputObjectParam" {
$items = Find-Script Fabrikam-ClientScript, Fabrikam-ServerScript
Install-Script -InputObject $items
$res = Get-InstalledScript Fabrikam-ClientScript, Fabrikam-ServerScript
Assert ($res.Count -eq 2) "Install-Script failed to install multiple scripts with -InputObject parameter"
}
It "InstallToAllUsersScopeWithPipelineInput" {
$scriptName = 'Fabrikam-ServerScript'
Find-Script $scriptName | Install-Script -Scope AllUsers
$res = Get-InstalledScript $scriptName
AssertEquals $res.InstalledLocation $script:ProgramFilesScriptsPath "Install-Script with AllUsers scope did not install Fabrikam-ServerScript to program files scripts folder, $script:ProgramFilesScriptsPath"
if ($IsWindows -ne $False) {
$cmdInfo = Get-Command -Name $scriptName
AssertNotNull $cmdInfo "Script installed to the current user scope is not found by the Get-Command cmdlet"
AssertEquals $cmdInfo.Name "$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $cmdlInfo"
if ($PSVersionTable.PSVersion -ge '5.0.0') {
AssertEquals $cmdInfo.Source "$($res.InstalledLocation)\$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $($cmdlInfo.Source)"
}
}
}
It "InstallToCurrentUserScope" {
$scriptName = 'Fabrikam-ServerScript'
Install-Script $scriptName -Scope CurrentUser
$res = Get-InstalledScript $scriptName
AssertEquals $res.InstalledLocation $script:MyDocumentsScriptsPath "Install-Script with CurrentUser scope did not install Fabrikam-ServerScript to user documents folder, $script:MyDocumentsScriptsPath"
if ($IsWindows -ne $False) {
$cmdInfo = Get-Command -Name $scriptName
AssertNotNull $cmdInfo "Script installed to the current user scope is not found by the Get-Command cmdlet"
AssertEquals $cmdInfo.Name "$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $cmdlInfo"
if ($PSVersionTable.PSVersion -ge '5.0.0') {
AssertEquals $cmdInfo.Source "$($res.InstalledLocation)\$scriptName.ps1" "Script installed to the current user scope is not found by the Get-Command cmdlet, $($cmdlInfo.Source)"
}
}
}
It "InstallScriptWithForceAndDifferentScope" {
$scriptName = 'Fabrikam-ServerScript'
Install-Script $scriptName -Scope 'CurrentUser'
$res1 = Get-InstalledScript $scriptName
AssertEquals $res1.InstalledLocation $script:MyDocumentsScriptsPath "Install-Script with CurrentUser scope did not install Fabrikam-ServerScript to user documents folder, $script:MyDocumentsScriptsPath"
Install-Script $scriptName -Scope AllUsers -Force
$res2 = Get-InstalledScript $scriptName
AssertEquals $res2.Name $scriptName "Only one script should be available after changing the -Scope with -Force on Install-Script cmdlet, $res2"
AssertEquals $res2.InstalledLocation $script:ProgramFilesScriptsPath "Install-Script with AllUsers scope and -Force did not install Fabrikam-ServerScript to program files scripts folder, $res2"
}
It "InstallScriptWithAllUsersScopeParameterForNonAdminUser" {
$NonAdminConsoleOutput = Join-Path ([System.IO.Path]::GetTempPath()) 'nonadminconsole-out.txt'
$psProcess = "PowerShell.exe"
if ($script:IsCoreCLR) {
$psProcess = "pwsh.exe"
}
Start-Process $psProcess -ArgumentList '-command if(-not (Get-PSRepository -Name PoshTest -ErrorAction SilentlyContinue)) {
Register-PSRepository -Name PoshTest -SourceLocation https://www.poshtestgallery.com/api/v2/ -InstallationPolicy Trusted
}
Install-Script -Name Fabrikam-Script -NoPathUpdate -Scope AllUsers -ErrorVariable ev -ErrorAction SilentlyContinue;
Write-Output "$ev"' `
-Credential $script:credential `
-Wait `
-WorkingDirectory $PSHOME `
-RedirectStandardOutput $NonAdminConsoleOutput
waitFor { Test-Path $NonAdminConsoleOutput } -timeoutInMilliseconds $script:assertTimeOutms -exceptionMessage "Install-Script on non-admin console failed to complete"
$content = Get-Content $NonAdminConsoleOutput
RemoveItem $NonAdminConsoleOutput
AssertNotNull ($content) "Install-Script with AllUsers scope on non-admin user console should not succeed"
Assert ($content -match "Administrator rights are required to install" ) "Install script with AllUsers scope on non-admin user console should fail, $content"
} `
-Skip:$(
$whoamiValue = (whoami)
($whoamiValue -eq "NT AUTHORITY\SYSTEM") -or
($whoamiValue -eq "NT AUTHORITY\LOCAL SERVICE") -or
($whoamiValue -eq "NT AUTHORITY\NETWORK SERVICE") -or
($PSVersionTable.PSVersion -lt '4.0.0') -or
(-not $script:IsWindowsOS) -or
($script:IsCoreCLR)
)
It "InstallScriptDefaultUserScopeParameterForNonAdminUser" {
$NonAdminConsoleOutput = Join-Path ([System.IO.Path]::GetTempPath()) 'nonadminconsole-out.txt'
$psProcess = "PowerShell.exe"
if ($script:IsCoreCLR) {
$psProcess = "pwsh.exe"
}
Start-Process $psProcess -ArgumentList '-command Install-Script -Name Fabrikam-ServerScript -NoPathUpdate;
Get-InstalledScript Fabrikam-ServerScript | Format-List Name, InstalledLocation' `
-Credential $script:credential `
-Wait `
-WorkingDirectory $PSHOME `
-RedirectStandardOutput $NonAdminConsoleOutput
waitFor { Test-Path $NonAdminConsoleOutput } -timeoutInMilliseconds $script:assertTimeOutms -exceptionMessage "Install-Script on non-admin console failed to complete"
$content = Get-Content $NonAdminConsoleOutput
RemoveItem $NonAdminConsoleOutput
AssertNotNull ($content) "Install-Script with default current user scope on non-admin user console should succeed"
Assert ($content -match "Fabrikam-ServerScript") "Script did not install correctly"
Assert ($content -match "Documents") "Script did not install to the correct location"
} `
-Skip:$(
$whoamiValue = (whoami)
($whoamiValue -eq "NT AUTHORITY\SYSTEM") -or
($whoamiValue -eq "NT AUTHORITY\LOCAL SERVICE") -or
($whoamiValue -eq "NT AUTHORITY\NETWORK SERVICE") -or
($PSVersionTable.PSVersion -lt '4.0.0') -or
(-not $script:IsWindowsOS) -or
($script:IsCoreCLR)
)
It "InstallScript_AllUsers_NO_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 1
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallScript_AllUsers_YES_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 0
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
Assert (($env:PATH -split ';') -contains $script:ProgramFilesScriptsPath) "Install-Script should add AllUsers scope path to PATH environment variable."
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallScript_CurrentUser_NoPathUpdate_NoPromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Assert (($env:PATH -split ';') -notcontains $script:MyDocumentsScriptsPath) "PATH environment variable is not reset properly. $env:PATH"
Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser -NoPathUpdate -Force
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res"
Assert (($env:PATH -split ';') -notcontains $script:MyDocumentsScriptsPath) "Install-Package should not add CurrentUser scope path to PATH environment variable."
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$($IsWindows -eq $false)
It "InstallScript_CurrentUser_Force_NoPromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
$script:psgetModuleInfo = Import-Module -Name PowerShellGet -Force -PassThru
Assert (($env:PATH -split ';') -notcontains $script:MyDocumentsScriptsPath) "PATH environment variable is not reset properly. $env:PATH"
$currentPATHValue = & $script:psgetModuleInfo Get-EnvironmentVariable -Name 'PATH' -Target $script:EnvironmentVariableTarget.User
Assert (($currentPATHValue -split ';') -notcontains $script:MyDocumentsScriptsPath) "PATH environment variable is not reset properly. $currentPATHValue"
Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser -Force
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res"
Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Package should add CurrentUser scope path to PATH environment variable."
$currentPATHValue = & $script:psgetModuleInfo Get-EnvironmentVariable -Name 'PATH' -Target $script:EnvironmentVariableTarget.User
Assert (($currentPATHValue -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Package should add CurrentUser scope path to PATH environment variable. $currentPATHValue"
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
$script:psgetModuleInfo = Import-Module -Name PowerShellGet -Force -PassThru
}
} `
-Skip:$($IsWindows -eq $false)
It "InstallScript_CurrentUser_NO_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 1
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallScript_CurrentUser_YES_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 0
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery -Scope CurrentUser'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Script should add CurrentUser scope path to PATH environment variable."
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallScriptWithWhatIf" {
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Script -Name Fabrikam-ServerScript -WhatIf'
}
finally {
$fileName = "WriteLine-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$itemInfo = Find-Script Fabrikam-ServerScript -Repository PSGallery
$installShouldProcessMessage = $script:LocalizedData.InstallScriptwhatIfMessage -f ($itemInfo.Name, $itemInfo.Version)
Assert ($content -and ($content -match $installShouldProcessMessage)) "Install script whatif message is missing, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
Assert (-not $res) "Install-Script should not install the script with -WhatIf option"
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallScriptWithConfirmAndNoToPrompt" {
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 2
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Script Fabrikam-ServerScript -Repository PSGallery -Confirm'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$itemInfo = Find-Script Fabrikam-ServerScript -Repository PSGallery
$installShouldProcessMessage = $script:LocalizedData.InstallScriptwhatIfMessage -f ($itemInfo.Name, $itemInfo.Version)
Assert ($content -and ($content -match $installShouldProcessMessage)) "Install script confirm prompt is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
AssertNull $res "Install-Script should not install a script if Confirm is not accepted"
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallScriptWithConfirmAndYesToPrompt" {
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 0
$content = $null
try {
$result = ExecuteCommand $runspace 'Find-Script Fabrikam-ServerScript | Install-Script -Confirm'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$itemInfo = Find-Script Fabrikam-ServerScript -Repository PSGallery
$installShouldProcessMessage = $script:LocalizedData.InstallScriptwhatIfMessage -f ($itemInfo.Name, $itemInfo.Version)
Assert ($content -and ($content -match $installShouldProcessMessage)) "Install script confirm prompt is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script if Confirm is accepted, $res"
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It ValidateGetInstalledScriptCmdlet {
$serverScriptName = 'Fabrikam-ServerScript'
$clientScriptName = 'Fabrikam-ClientScript'
Install-Script -Name $clientScriptName
$res = Get-InstalledScript -Name $clientScriptName
AssertEquals $res.Name $clientScriptName "Get-InstalledScript results are not expected, $res"
Install-Script -Name $serverScriptName -RequiredVersion 1.0 -Force
$scripts1 = Get-InstalledScript
Assert ($scripts1.Count -ge 2) "Get-InstalledScript is not working properly"
$res = Get-InstalledScript -Name $serverScriptName
AssertEquals $res.Name $serverScriptName "Get-InstalledScript returned wrong script, $res"
AssertEquals $res.Version "1.0" "Get-InstalledScript returned wrong script version, $res"
Update-Script -Name $serverScriptName -RequiredVersion 2.0
$res2 = Get-InstalledScript -Name $serverScriptName -RequiredVersion "2.0"
AssertEquals $res2.Name $serverScriptName "Get-InstalledScript returned wrong script after Update-Script, $res2"
AssertEquals $res2.Version "2.0" "Get-InstalledScript returned wrong script version after Update-Script, $res2"
$scripts2 = Get-InstalledScript
AssertEquals $scripts1.count $scripts2.count "script count should be same before and after updating a script, before: $($scripts1.count), after: $($scripts2.count)"
}
}
Describe PowerShell.PSGet.InstallScriptTests.P1 -Tags 'P1', 'OuterLoop' {
if ($IsMacOS) {
return
}
BeforeAll {
SuiteSetup
}
AfterAll {
SuiteCleanup
}
AfterEach {
Get-InstalledScript -Name Fabrikam-Script -ErrorAction SilentlyContinue | Uninstall-Script -Force
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
Get-InstalledScript -Name Fabrikam-ClientScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
It "InstallScriptWithPrefixWildCard" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script *kam-ServerScript } `
-expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script'
}
It "InstallScriptWithPostfixWildCard" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScri* } `
-expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script'
}
It "InstallScriptWithWildCards" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script *abrikam-ServerScrip* } `
-expectedFullyQualifiedErrorId 'NameShouldNotContainWildcardCharacters,Install-Script'
}
It "InstallScriptWithVersionParams" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ServerScript -MinimumVersion 1.0 -RequiredVersion 5.0 } `
-expectedFullyQualifiedErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether,Install-Script"
}
It "InstallMultipleNamesWithReqVersion" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ClientScript, Fabrikam-ServerScript -RequiredVersion 2.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Install-Script"
}
It "InstallMultipleNamesWithMinVersion" {
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script Fabrikam-ClientScript, Fabrikam-ServerScript -MinimumVersion 2.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Install-Script"
}
It "InstallScriptShouldFailIfReqVersionNotAlreadyInstalled" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.5'
Install-Script $scriptName -RequiredVersion $version
$InstalledScriptInfo = Get-InstalledScript -Name $scriptName -RequiredVersion $version
$wv = $null
Install-Script $scriptName -RequiredVersion 2.0 -WarningAction SilentlyContinue -WarningVariable wv
$message = $script:LocalizedData.ScriptAlreadyInstalled -f ($InstalledScriptInfo.Version,
$InstalledScriptInfo.Name,
$InstalledScriptInfo.InstalledLocation,
$InstalledScriptInfo.Version,
'2.0')
if ($PSVersionTable.PSVersion -ge '5.0.0') {
AssertEqualsCaseInsensitive $wv.Message $message "Install-Script should not re-install a script if it is already installed"
}
} `
-Skip:$($PSCulture -ne 'en-US')
It "InstallScriptShouldFailIfMinVersionNotAlreadyInstalled" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.5'
Install-Script $scriptName -RequiredVersion $version
$InstalledScriptInfo = Get-InstalledScript -Name $scriptName -RequiredVersion $version
$wv = $null
Install-Script $scriptName -MinimumVersion 2.0 -WarningAction SilentlyContinue -WarningVariable wv
$message = $script:LocalizedData.ScriptAlreadyInstalled -f ($InstalledScriptInfo.Version,
$InstalledScriptInfo.Name,
$InstalledScriptInfo.InstalledLocation,
$InstalledScriptInfo.Version,
'2.0')
Assert ($message -match $scriptName) "Install-Script should not re-install a script if it is already installed, $($wv.Message)"
} `
-Skip:$($PSCulture -ne 'en-US')
It "InstallPackage_Script_AllUsers_NO_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
$null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 1
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallPackage_Script_AllUsers_YES_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
$null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 0
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:ProgramFilesScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
Assert (($env:PATH -split ';') -contains $script:ProgramFilesScriptsPath) "Install-Package should add AllUsers scope path to PATH environment variable."
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallPackage_Script_AllUsers_NoPathUpdate_NoPromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
$null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force
Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -NoPathUpdate -Force
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res"
Assert (($env:PATH -split ';') -notcontains $script:ProgramFilesScriptsPath) "Install-Package should add AllUsers scope path to PATH environment variable."
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$($IsWindows -eq $false)
It "InstallPackage_Script_Default_User_Force_NoPromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope AllUsers
$null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force
Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -Force
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script, $res"
if ($script:IsCoreCLR) {
Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Package should add CurrentUser scope path to PATH environment variable."
}
else {
Assert (($env:PATH -split ';') -contains $script:ProgramFilesScriptsPath) "Install-Package should add AllUsers scope path to PATH environment variable."
}
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope AllUsers
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$($IsWindows -eq $false)
It "InstallPackage_Script_CurrentUser_NO_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
$null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 1
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -Scope CurrentUser'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It "InstallPackage_Script_CurrentUser_YES_toThePromptForAddingtoPATHVariable" {
try {
RemoveItem -Path $script:PSGetSettingsFilePath
Reset-PATHVariableForScriptsInstallLocation -Scope CurrentUser
$null = PackageManagement\Import-PackageProvider -Name PowerShellGet -Force
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 0
$content = $null
try {
$result = ExecuteCommand $runspace 'Install-Package -Provider PowerShellGet -Type Script -Name Fabrikam-ServerScript -Source PSGallery -Scope CurrentUser'
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$installShouldProcessMessage = $script:LocalizedData.ScriptPATHPromptQuery -f ($script:MyDocumentsScriptsPath)
Assert ($content -and ($content -eq $installShouldProcessMessage)) "Install script prompt for adding to PATH variable is not working, Expected:$installShouldProcessMessage, Actual:$content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script even when prompt is not accepted, $res"
Assert (($env:PATH -split ';') -contains $script:MyDocumentsScriptsPath) "Install-Script should add CurrentUser scope path to PATH environment variable."
}
finally {
Set-PATHVariableForScriptsInstallLocation -Scope CurrentUser
Get-InstalledScript -Name Fabrikam-ServerScript -ErrorAction SilentlyContinue | Uninstall-Script -Force
}
} `
-Skip:$(($PSEdition -eq 'Core') -or ([System.Environment]::OSVersion.Version -lt "6.2.9200.0") -or ($PSCulture -ne 'en-US'))
It InstallAScriptFromUntrustedRepositoryAndNoToPrompt {
try {
Register-PSRepository -Name UntrustedTestRepo -SourceLocation $script:TempPath -ScriptSourceLocation $script:UntrustedRepoSourceLocation
$scriptRepo = Get-PSRepository -Name UntrustedTestRepo
AssertEqualsCaseInsensitive $scriptRepo.ScriptSourceLocation $script:UntrustedRepoSourceLocation "Test repository 'UntrustedTestRepo' is not registered properly"
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
if ($PSVersionTable.PSVersion -ge '4.0.0') {
$Global:proxy.UI.ChoiceToMake = 2
}
else {
$Global:proxy.UI.ChoiceToMake = 1
}
$content = $null
try {
$result = ExecuteCommand $runspace "Install-Script Fabrikam-ServerScript -Repository UntrustedTestRepo"
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$itemInfo = Find-Script Fabrikam-ServerScript
$acceptPromptMessage = "Are you sure you want to install the scripts from"
Assert ($content -and $content.Contains($acceptPromptMessage)) "Prompt for installing a script from an untrusted repository is not working, $content"
$res = Get-InstalledScript Fabrikam-ServerScript -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
Assert (-not $res) "Install-Script should not install a script if prompt is not accepted"
}
finally {
Get-PSRepository -Name UntrustedTestRepo -ErrorAction SilentlyContinue | Unregister-PSRepository -ErrorAction SilentlyContinue
}
} `
-Skip:$(($PSCulture -ne 'en-US') -or ($PSVersionTable.PSVersion -lt '4.0.0') -or ($PSEdition -eq 'Core'))
It InstallAScriptFromUntrustedRepositoryAndYesToPrompt {
try {
Register-PSRepository -Name UntrustedTestRepo -SourceLocation $script:TempPath -ScriptSourceLocation $script:UntrustedRepoSourceLocation
$scriptRepo = Get-PSRepository -Name UntrustedTestRepo
AssertEqualsCaseInsensitive $scriptRepo.ScriptSourceLocation $script:UntrustedRepoSourceLocation "Test repository 'UntrustedTestRepo' is not registered properly"
$outputPath = $script:TempPath
$guid = [system.guid]::newguid().tostring()
$outputFilePath = Join-Path $outputPath "$guid"
$runspace = CreateRunSpace $outputFilePath 1
$Global:proxy.UI.ChoiceToMake = 0
$content = $null
try {
$result = ExecuteCommand $runspace "Install-Script Fabrikam-ServerScript -Repository UntrustedTestRepo"
}
finally {
$fileName = "PromptForChoice-0.txt"
$path = join-path $outputFilePath $fileName
if (Test-Path $path) {
$content = get-content $path
}
CloseRunSpace $runspace
RemoveItem $outputFilePath
}
$acceptPromptMessage = "Are you sure you want to install the scripts from"
Assert ($content -and $content.Contains($acceptPromptMessage)) "Prompt for installing a script from an untrusted repository is not working, $content"
$res = Get-InstalledScript Fabrikam-ServerScript
AssertEquals $res.Name 'Fabrikam-ServerScript' "Install-Script should install a script if prompt is accepted, $res"
}
finally {
Get-PSRepository -Name UntrustedTestRepo -ErrorAction SilentlyContinue | Unregister-PSRepository -ErrorAction SilentlyContinue
}
} `
-Skip:$(($PSCulture -ne 'en-US') -or ($PSVersionTable.PSVersion -lt '4.0.0') -or ($PSEdition -eq 'Core'))
It ValidateGetInstalledScriptWithMultiNamesAndRequiredVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript, Fabrikam-ServerScript -RequiredVersion 3.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithMultiNamesAndMinVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript, Fabrikam-ServerScript -MinimumVersion 3.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithMultiNamesAndMaxVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript, Fabrikam-ServerScript -MaximumVersion 3.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithSingleWildcardNameAndRequiredVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-Client*ipt -RequiredVersion 3.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithSingleWildcardNameAndMinVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-Client*ipt -MinimumVersion 3.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithSingleWildcardNameAndMaxVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-Client*ipt -MaximumVersion 3.0 } `
-expectedFullyQualifiedErrorId "VersionParametersAreAllowedOnlyWithSingleName,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithSingleNameRequiredandMinVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript -RequiredVersion 3.0 -MinimumVersion 1.0 } `
-expectedFullyQualifiedErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithSingleNameRequiredandMaxVersion {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript -RequiredVersion 3.0 -MaximumVersion 1.0 } `
-expectedFullyQualifiedErrorId "VersionRangeAndRequiredVersionCannotBeSpecifiedTogether,Get-InstalledScript"
}
It ValidateGetInstalledScriptWithSingleNameInvalidMinMaxRange {
AssertFullyQualifiedErrorIdEquals -scriptblock { Get-InstalledScript -Name Fabrikam-ClientScript -MinimumVersion 3.0 -MaximumVersion 1.0 } `
-expectedFullyQualifiedErrorId "MinimumVersionIsGreaterThanMaximumVersion,Get-InstalledScript"
}
It InstallScriptWithIncludeDependencies {
$ScriptName = 'Script-WithDependencies1'
$DepencyNames = @()
$DepScriptDetails = $null
$DepModuleDetails = $null
try {
$res1 = Find-Script -Name $ScriptName -MaximumVersion "1.0" -MinimumVersion "0.1"
AssertEquals $res1.Name $ScriptName "Find-Script didn't find the exact script which has dependencies, $res1"
$DepencyNames = $res1.Dependencies.Name
$res2 = Find-Script -Name $ScriptName -IncludeDependencies -MaximumVersion "1.0" -MinimumVersion "0.1"
Assert ($res2.Count -ge ($DepencyNames.Count + 1)) "Find-Script with -IncludeDependencies returned wrong results, $res2"
Install-Script -Name $ScriptName -MaximumVersion "1.0" -MinimumVersion "0.1"
$ActualScriptDetails = Get-InstalledScript -Name $ScriptName -RequiredVersion $res1.Version
AssertNotNull $ActualScriptDetails "$ScriptName script with dependencies is not installed properly"
$DepScriptDetails = Get-InstalledScript -Name $DepencyNames -ErrorAction SilentlyContinue
$DepModuleDetails = Get-InstalledModule -Name $DepencyNames -ErrorAction SilentlyContinue
$DepencyNames | ForEach-Object {
if ((-not $DepScriptDetails -or $DepScriptDetails.Name -notcontains $_) -and
(-not $DepModuleDetails -or $DepModuleDetails.Name -notcontains $_)) {
Assert $false "Script dependency $_ is not installed"
}
}
}
finally {
Uninstall-Script -ErrorAction SilentlyContinue $ScriptName
$DepScriptDetails | ForEach-Object { Uninstall-Script $_.Name -Force -ErrorAction SilentlyContinue }
$DepModuleDetails | ForEach-Object { PowerShellGet\Uninstall-Module $_.Name -Force -ErrorAction SilentlyContinue }
}
} `
-Skip:$($PSVersionTable.PSVersion -lt '5.0.0')
It SaveScriptNameWithDependencies {
try {
$ScriptName = 'Script-WithDependencies1'
$res1 = Find-Script -Name $ScriptName -RequiredVersion '1.0' -IncludeDependencies
Save-Script -Name $ScriptName -MaximumVersion '1.0' -MinimumVersion '0.1' $script:TempSavePath
$res1.Name | ForEach-Object {
$artifactPath = Join-Path -Path $script:TempSavePath -ChildPath $_
if (-not (Test-Path -Path $artifactPath -PathType Container) -and
-not (Test-Path -Path "$artifactPath.ps1" -PathType Leaf)) {
Assert $false "$_ is not saved with the Save-Script -Name $ScriptName"
}
}
}
finally {
Remove-Item -Path "$script:TempSavePath\*" -Recurse -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
}
}
It SaveScriptWithFindScriptOutput {
try {
$ScriptName = "Script-WithDependencies1"
$res1 = Find-Script -Name $ScriptName -RequiredVersion '2.0' -IncludeDependencies
Find-Script -Name $ScriptName -RequiredVersion '2.0' | Save-Script -LiteralPath $script:TempSavePath
$res1.Name | ForEach-Object {
$artifactPath = Join-Path -Path $script:TempSavePath -ChildPath $_
if (-not (Test-Path -Path $artifactPath -PathType Container) -and
-not (Test-Path -Path "$artifactPath.ps1" -PathType Leaf)) {
Assert $false "$_ is not saved with the Save-Script -Name $ScriptName"
}
}
}
finally {
Remove-Item -Path "$script:TempSavePath\*" -Recurse -Force -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
}
}
It GetInstalledScriptWithWildcard {
$ScriptNames = 'Fabrikam-Script', 'Fabrikam-ServerScript', 'Fabrikam-ClientScript'
Install-Script -Name $ScriptNames
$res1 = Get-InstalledScript -Name $ScriptNames[0]
AssertEquals $res1.Name $ScriptNames[0] "Get-InstalledScript didn't return the exact script, $res1"
$res2 = Get-InstalledScript -Name "Fabrikam*"
AssertEquals $res2.count $ScriptNames.Count "Get-InstalledScript didn't return the $ScriptNames scripts, $res2"
}
It InstallScriptWithSameLocationRegisteredWithNuGetProvider {
$ScriptName = 'Fabrikam-ServerScript'
$TempNuGetSourceName = "$(Get-Random)"
$RepositoryName = "PSGallery"
Register-PackageSource -Provider nuget -Name $TempNuGetSourceName -Location $Global:PSGallerySourceUri -Trusted
try {
Install-Script -Name $ScriptName -Repository $RepositoryName
$res1 = Get-InstalledScript -Name $ScriptName
AssertEquals $res1.Name $ScriptName "Get-InstalledScript didn't return the exact script, $res1"
AssertEquals $res1.RepositorySourceLocation $Global:PSGallerySourceUri "PSGetItemInfo object was created with wrong RepositorySourceLocation"
AssertEquals $res1.Repository $RepositoryName "PSGetItemInfo object was created with wrong repository name"
$expectedInstalledLocation = $script:ProgramFilesScriptsPath
if ($script:IsCoreCLR) {
$expectedInstalledLocation = $script:MyDocumentsScriptsPath
}
AssertEquals $res1.InstalledLocation $expectedInstalledLocation "Invalid InstalledLocation value on PSGetItemInfo object"
}
finally {
Unregister-PackageSource -ProviderName NuGet -Name $TempNuGetSourceName -Force
}
}
It ScriptCmdletsWithoutScriptSourceLocation {
try {
Register-PSRepository -Name TestRepo -SourceLocation https://www.nuget.org/api/v2
$scriptRepo = Get-PSRepository -Name TestRepo
Assert (-not $scriptRepo.ScriptSourceLocation) "Test repository 'TestRepo' is not registered properly"
Assert (-not $scriptRepo.ScriptPublishLocation) "Test repository 'TestRepo' is not registered properly"
$repoName = 'TestRepo'
AssertFullyQualifiedErrorIdEquals -scriptblock { Find-Script -Name TestScriptName -Repository $repoName } `
-expectedFullyQualifiedErrorId 'ScriptSourceLocationIsMissing,Find-Script'
AssertFullyQualifiedErrorIdEquals -scriptblock { Install-Script -Name TestScriptName -Repository $repoName } `
-expectedFullyQualifiedErrorId 'ScriptSourceLocationIsMissing,Install-Script'
AssertFullyQualifiedErrorIdEquals -scriptblock { Save-Script -Name TestScriptName -Repository $repoName -Path $script:TempPath } `
-expectedFullyQualifiedErrorId 'ScriptSourceLocationIsMissing,Save-Script'
$wv = $null
Find-Package -Name TestScriptName -Source $repoName -ProviderName PowerShellGet -Type Script -WarningVariable wv -ErrorAction SilentlyContinue -WarningAction SilentlyContinue
$message = $script:LocalizedData.ScriptSourceLocationIsMissing -f ($repoName)
AssertEquals $wv.Message $message "Find-Package should throw a warning message when the specified source doesnt have a valid ScriptSourceLocation"
}
finally {
Get-PSRepository -Name TestRepo -ErrorAction SilentlyContinue | Unregister-PSRepository -ErrorAction SilentlyContinue
}
} `
-Skip:$($PSCulture -ne 'en-US')
It "Get-InstalledScript cmdlet with leading zeros in RequiredVersion value" {
$scriptName = 'Fabrikam-ServerScript'
$version = '1.2'
Install-Script $scriptName -RequiredVersion $version
$res = Get-InstalledScript $scriptName -RequiredVersion '1.02'
$res.Name | Should Be $scriptName
$res.Version | Should Be $version
$res = Get-InstalledScript $scriptName -RequiredVersion $version
$res.Version | Should Be $version
}
}
|
combined_dataset/train/non-malicious/sample_23_21.ps1
|
sample_23_21.ps1
|
# region Generated
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
# Load required Az.Accounts module
$accountsName = 'Az.Accounts'
$accountsModule = Get-Module -Name $accountsName
if(-not $accountsModule) {
$localAccountsPath = Join-Path $PSScriptRoot 'generated\modules'
if(Test-Path -Path $localAccountsPath) {
$localAccounts = Get-ChildItem -Path $localAccountsPath -Recurse -Include 'Az.Accounts.psd1' | Select-Object -Last 1
if($localAccounts) {
$accountsModule = Import-Module -Name ($localAccounts.FullName) -Scope Global -PassThru
}
}
if(-not $accountsModule) {
$hasAdequateVersion = (Get-Module -Name $accountsName -ListAvailable | Where-Object { $_.Version -ge [System.Version]'2.7.5' } | Measure-Object).Count -gt 0
if($hasAdequateVersion) {
$accountsModule = Import-Module -Name $accountsName -MinimumVersion 2.7.5 -Scope Global -PassThru
}
}
}
if(-not $accountsModule) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. For installation instructions, please see: https://learn.microsoft.com/powershell/azure/install-az-ps" -ErrorAction Stop
} elseif (($accountsModule.Version -lt [System.Version]'2.7.5') -and (-not $localAccounts)) {
Write-Error "`nThis module requires $accountsName version 2.7.5 or greater. An earlier version of Az.Accounts is imported in the current PowerShell session. If you are running test, please try to add the switch '-RegenerateSupportModule' when executing 'test-module.ps1'. Otherwise please open a new PowerShell session and import this module again.`nAdditionally, this error could indicate that multiple incompatible versions of Azure PowerShell modules are installed on your system. For troubleshooting information, please see: https://aka.ms/azps-version-error" -ErrorAction Stop
}
Write-Information "Loaded Module '$($accountsModule.Name)'"
# Load the private module dll
$null = Import-Module -Name (Join-Path $PSScriptRoot './bin/Az.ResourceMover.private.dll')
# Get the private module's instance
$instance = [Microsoft.Azure.PowerShell.Cmdlets.ResourceMover.Module]::Instance
# Ask for the shared functionality table
$VTable = Register-AzModule
# Tweaks the pipeline on module load
$instance.OnModuleLoad = $VTable.OnModuleLoad
# Following two delegates are added for telemetry
$instance.GetTelemetryId = $VTable.GetTelemetryId
$instance.Telemetry = $VTable.Telemetry
# Delegate to sanitize the output object
$instance.SanitizeOutput = $VTable.SanitizerHandler
# Delegate to get the telemetry info
$instance.GetTelemetryInfo = $VTable.GetTelemetryInfo
# Tweaks the pipeline per call
$instance.OnNewRequest = $VTable.OnNewRequest
# Gets shared parameter values
$instance.GetParameterValue = $VTable.GetParameterValue
# Allows shared module to listen to events from this module
$instance.EventListener = $VTable.EventListener
# Gets shared argument completers
$instance.ArgumentCompleter = $VTable.ArgumentCompleter
# The name of the currently selected Azure profile
$instance.ProfileName = $VTable.ProfileName
# Load the custom module
$customModulePath = Join-Path $PSScriptRoot './custom/Az.ResourceMover.custom.psm1'
if(Test-Path $customModulePath) {
$null = Import-Module -Name $customModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export proxy cmdlet scripts
$exportsPath = Join-Path $PSScriptRoot './exports'
$directories = Get-ChildItem -Directory -Path $exportsPath
$profileDirectory = $null
if($instance.ProfileName) {
if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) {
$profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName }
} else {
# Don't export anything if the profile doesn't exist for the module
$exportsPath = $null
Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded."
}
} elseif(($directories | Measure-Object).Count -gt 0) {
# Load the last folder if no profile is selected
$profileDirectory = $directories | Select-Object -Last 1
}
if($profileDirectory) {
Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'"
$exportsPath = $profileDirectory.FullName
}
if($exportsPath) {
Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
$cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath
Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias)
}
# Finalize initialization of this module
$instance.Init();
Write-Information "Loaded Module '$($instance.Name)'"
# endregion
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCz6r4dgXAhEeoy
# Hk+5l0PkrW+RjeVQBxheEB8tp8earaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDZP2xkIuVcsjfsgMhn+B9uB
# nVtmxTTL1NB5eOV6uE/PMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAeyiTpNA38oWkGIPQkLbSUaPM0c2XAGE4GiqtS3i1e0xEjYfPZqoUegKW
# nahhm9Fb/yzgcyO5vljoUkxZFlk8or0sHsJiret31KarjZqXu96Qp7vizVG6wySE
# BvbmsjO47tTcJlq9MIeshXXR441bMnbsCksEGGlXZTvwu921UP6NXgkQk7ZCFy6s
# jOSjMxxcVxSQ28rPzP5a9hDn16yDxge1NI+GGEWR8pukBW/X0zWTY6BVueuM4T4I
# DAtmfrYVDRUQ71WU6gsud3L14uY9k2gAWu6R6IdH49kSIc3FFqRIkcex9e2v2B/3
# L/per+7hjion7DgUsBrHuFFqWxXLCKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBmetiisBDNOBONByTMz+7PK08RRdrce0D+X48wN5U9lAIGZh+4i4lN
# GBMyMDI0MDQyMzEzMTUyMy44OThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQyNDE5NTIzNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU6jAHAgEAAgIRVDAKAgUA
# 6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACaiRtshc9G8WfVMjQ9x
# gEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3MxkStXHAb2esRYvBMPDXsgq
# +NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/PkN2nsimpupdSo/lnOZCf
# y706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQglNHrYCI5tlg2/+DRuAEtsUCsipPnAo3rlUiszmUvwSYwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azXdqy22buGhS1oKaTDDm+J
# MA0GCSqGSIb3DQEBCwUABIICACUoe4Fkokbefvz4lpkVTFoKCLKLirUTmNoYHYJj
# xV1djwwcWq2v+wHU8DffwX3k//r4wvgb1S98DhaUCtKoUxkXVEhVcVizY6MBDUpC
# djxriSZIDqnDOctF2SGwBFkmRDowW4fzUvMMbIvNOAaDWQss1kcTAswF/CFcInr5
# 1y7ktnrMVoElPyijSdZZvWkBDBoZNdpVVZqZtF9ZRo+/zi0ZUDjsJeS1PMB1qX/M
# /N1p2doHUFqqB6EF75yvNGmRQSTPiH0UF7ZXKjFsWExuG7C0aH+wiPYLeBPDwuBT
# x34prOFW37kACgXTcEJDZvUChJ2mCRGZ6+3HX2WPU9flDFfFCaoWTRtkOAUwLnju
# XJd/tX7GXnpQANc2Cmc1jPO1sM50/lhqJuO0mh+JY1Zq5B0bEfHCrhMqakqnfBpw
# jFB5oKzOLJAr05/em2xRhdEHBbZ/3OKWc9k24Pl/XmVX/zw/SqHEdTdzxsOO4Xrt
# OiB6NePrw8RArxqtkjbibHPQGgNch6DJ3XdboBicRMyAK4Nc8vmK4MKMCEggj/5i
# AeV/CVvHrLTOzbryP5kRecZHuakJ4l1ADEr+HwqcJvsdO77klvlj9bvORHyLn23h
# PSHzoWgzcWhXNybDMWE2aIlvLS6Dv37cs8LYChnIdFPqLjloM/sIkd006lSVvGDk
# 7/tO
# SIG # End signature block
|
combined_dataset/train/non-malicious/Read-Choice_3.ps1
|
Read-Choice_3.ps1
|
# function Read-Choice {
#.Synopsis
# Prompt the user for a choice, and return the (0-based) index of the selected item
#.Parameter Message
# This is the prompt that will be presented to the user. Basically, the question you're asking.
#.Parameter Choices
# An array of strings representing the choices (or menu items), with optional ampersands (&) in them to mark (unique) characters which can be used to select each item.
#.Parameter ChoicesWithHelp
# A Hashtable where the keys represent the choices (or menu items), with optional ampersands (&) in them to mark (unique) characters which can be used to select each item, and the values represent help text to be displayed to the user when they ask for help making their decision.
#.Parameter Default
# The (0-based) index of the menu item to select by default (defaults to zero).
#.Parameter MultipleChoice
# Prompt the user to select more than one option. This changes the prompt display for the default PowerShell.exe host to show the options in a column and allows them to choose multiple times.
# Note: when you specify MultipleChoice you may also specify multiple options as the default!
#.Parameter Caption
# An additional caption that can be displayed (usually above the Message) as part of the prompt
#.Parameter Passthru
# Causes the Choices objects to be output instead of just the indexes
#.Example
# Read-Choice "WEBPAGE BUILDER MENU" "&Create Webpage","&View HTML code","&Publish Webpage","&Remove Webpage","E&xit"
#.Example
# [bool](Read-Choice "Do you really want to do this?" "&No","&Yes" -Default 1)
#
# This example takes advantage of the 0-based index to convert No (0) to False, and Yes (1) to True. It also specifies YES as the default, since that's the norm in PowerShell.
#.Example
# Read-Choice "Do you really want to delete them all?" @{"&No"="Do not delete all files. You will be prompted to delete each file individually."; "&Yes"="Confirm that you want to delete all of the files"}
#
# Note that with hashtables, order is not guaranteed, so "Yes" will probably be the first item in the prompt, and thus will output as index 0. Because of thise, when a hashtable is passed in, we default to Passthru output.
[CmdletBinding(DefaultParameterSetName="HashtableWithHelp")]
param(
[Parameter(Mandatory=$true, Position = 10, ParameterSetName="HashtableWithHelp")]
[Hashtable]$ChoicesWithHelp
,
[Parameter(Mandatory=$true, Position = 10, ParameterSetName="StringArray")]
[String[]]$Choices
,
[Parameter(Mandatory=$False)]
[string]$Caption = "Please choose!"
,
[Parameter(Mandatory=$False, Position=0)]
[string]$Message = "Choose one of the following options:"
,
[Parameter(Mandatory=$False)]
[int[]]$Default = 0
,
[Switch]$MultipleChoice
,
[Switch]$Passthru
)
begin {
if($ChoicesWithHelp) {
[System.Collections.DictionaryEntry[]]$choices = $ChoicesWithHelp.GetEnumerator() | %{$_}
}
}
process {
$Descriptions = [System.Management.Automation.Host.ChoiceDescription[]]( $(
if($choices -is [String[]]) {
foreach($choice in $choices) {
New-Object System.Management.Automation.Host.ChoiceDescription $choice
}
} else {
foreach($choice in $choices) {
New-Object System.Management.Automation.Host.ChoiceDescription $choice.Key, $choice.Value
}
}
) )
# Passing an array as the $Default triggers multiple choice prompting.
if(!$MultipleChoice) { [int]$Default = $Default[0] }
[int[]]$Answer = $Host.UI.PromptForChoice($Caption,$Message,$Descriptions,$Default)
if($Passthru -or !($choices -is [String[]])) {
Write-Verbose "$Answer"
Write-Output $Descriptions[$Answer]
} else {
Write-Output $Answer
}
}
# }
|
combined_dataset/train/non-malicious/3407.ps1
|
3407.ps1
|
function Test-VirtualMachineBootDiagnostics
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
Wait-Seconds 600;
$localpath = (Get-Item -Path ".\" -Verbose).FullName
Get-AzureRmVMBootDiagnosticsData -Windows -ResourceGroupName $rgname -Name $vmname -LocalPath $localpath;
Remove-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Force;
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/linuxos.vhd";
$osDiskName = 'linuxOsDisk';
$p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize;
$p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId;
$p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$imgRef = Get-DefaultCRPLinuxImageOffline;
$p = Set-AzureRMVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred
$p = ($imgRef | Set-AzureRMVMSourceImage -VM $p);
New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
Wait-Seconds 600;
$bddata = Get-AzureRmVMBootDiagnosticsData -Linux -ResourceGroupName $rgname -Name $vmname | Out-String;
Write-Output("BootDiagnosticsData:");
Write-Output($bddata);
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineBootDiagnosticsPremium
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRMResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_DS1';
$vmname = 'vm' + $rgname;
$p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRMVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRMVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRMVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRMPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRMPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRMNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRMNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Premium_LRS';
New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'None';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRMVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRMVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreNotEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LinuxVirtualMachineBootDiagnostics
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRMResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRMVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRMVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRMVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRMPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRMPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRMNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRMNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$imgRef = Get-DefaultCRPLinuxImageOffline;
$p = Set-AzureRMVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred
$p = ($imgRef | Set-AzureRMVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
Remove-AzureRMVM -Name $vmname -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineBootDiagnosticsSet
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRMResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRMVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRMVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRMVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRMVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRMPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRMPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRMNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRMNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRMVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname;
$stoname2 = $stoname + 'add';
$stotype2 = 'Standard_GRS';
New-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname2 -Location $loc -Type $stotype2;
$stoaccount2 = Get-AzureRMStorageAccount -ResourceGroupName $rgname -Name $stoname2;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRMVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRMVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRMVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
$p = Set-AzureRMVMBootDiagnostics -VM $p -Enable -ResourceGroupName $rgname -StorageAccountName $stoname2;
New-AzureRMVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount2.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
$vm1 | Set-AzureRMVMBootDiagnostics -Disable | Update-AzureRMVM
$vm1 = Get-AzureRMVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $false $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount2.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_2_71.ps1
|
sample_2_71.ps1
|
ConvertFrom-StringData @'
id_printerkb2457866check=Checking for KB 2457866
id_printerkb2457866checkdesc=Checking for Event 602 on Microsoft-Windows-PrintService/Admin Event Log
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD4z38Odo/5fC0S
# +L8lJFf/TG06dJX9A8ccGfeayvYnTqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJZovBLz5ME42R+Lye+L/KDs
# qOBh9PyTmo03LVOnzTdUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAMSPtAbzvKeMIeyNvQMmmlDjPBalrieAuL145Sk9ajR6/f1v9XdJr1OM0
# kuPmUkFFbVgXRIrIHZBv1fPmxVXsNtwLNtg0dkVFWVUCPYj2luQjtfTrb5H1KNVP
# bNfLtp9e5hpAe3we18pVpKC42i2lio+VkBtjMHKsrT3lLsq4hdehiGHAIih9rGwV
# Cz5cd0xsrR1orEwU/YcfSJ/6I8jjDIxB5Ag3l9ajh1v2Rlb2NlgQgYa50uMPYPyY
# gSwj2W3JHPTi+FNZPNKQ7GHjHYEiGESUfdFKra++X41UMqu9XOF9yiu/1/wbBmcw
# ik3Hp6rnLDNDFKKJx7a4e+/QC6zsWKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDKk295sbBHHVAOczb44OxpNp7sfKlm0iRS2uqeNC7ftwIGZuto66JQ
# GBMyMDI0MTAyODExNDA0MS45NjFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0
# Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx
# guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv
# qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD
# eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8
# ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p
# 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa
# HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD
# PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd
# uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D
# kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV
# oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3
# RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj
# fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ
# 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj
# ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX
# pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T
# ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw
# HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57
# rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf
# 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v
# DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2
# BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh
# uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU
# vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk
# 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7
# nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR
# jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY
# dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu
# nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608
# ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgCH/G9vot
# 9a51G7xCN1d6LfLOBAne4yXtRV5xjC9QNNIwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA
# AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3
# DQEBCwUABIICAFCaTdJUyGbXA7guzKDgNsYNyMdo+GdCM4c+gWtVI6MCQsy5v3s4
# EwHXubRxMKPY6ZxE0Zsc+HxWqwQoppvWvGOjaqEOhnoUmSSYRzf8nK59OwYiJCZU
# Ug7yAjNk7+Wj3suxS5mobQjPgOkaY/m0/BzbI0z0zz2c8s2D9HfnvsKbdwfwiYvQ
# iGvcPBx+UGPhWGUiaJpwtuXBvmh6FDUQxxfSZ2l/7hNE0DfdpYhfXJCSQU1/qT24
# 0pi2AEcqzLT2RQJzoC7jISU5BhqJSEFBgInwpMWaMBRdc2d7rNuH37ZJNsWuP0Vw
# /rJ+mycjXxmBA3+r2lWVFYAcCTjJ08u4VcATI3fhmJ7ahqpUQf++NPu7BYzfJpUs
# HGTlOJWUU/WgvDbOrxjE3yqPdkYJu+p8+ni5Ez5XacC776EIH6wYiCfYFiAoH7Mv
# D1fxaVJnwNDWIjR/5qM5nrnugIaVnoNddvH8uyaaldIFKGfdWqnguj9IieZw41ur
# fdkfiUWVf32IQNYX+0Q9A+A2FplCz5fS/wp+PSUG7ZuGrBWLJSPvQf87QID8XgLh
# M1pPTJ8ebVnC0QbQcf96vgqfZ4AwcfrfTz6XDWARZOO9CgQf6+jOgeIAgLRtiNqu
# OYw+UK+J0KEkKjjGx8d3pRMouR53Uv/XocPwTEjCQTmrTo9vb0nJoWhf
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_16_3.ps1
|
sample_16_3.ps1
|
/*
Language: PowerShell
Description: PowerShell is a task-based command-line shell and scripting language built on .NET.
Author: David Mohundro <david@mohundro.com>
Contributors: Nicholas Blumhardt <nblumhardt@nblumhardt.com>, Victor Zhou <OiCMudkips@users.noreply.github.com>, Nicolas Le Gall <contact@nlegall.fr>
Website: https://docs.microsoft.com/en-us/powershell/
Category: scripting
*/
function powershell(hljs) {
const TYPES = [
"string",
"char",
"byte",
"int",
"long",
"bool",
"decimal",
"single",
"double",
"DateTime",
"xml",
"array",
"hashtable",
"void"
];
// https://docs.microsoft.com/en-us/powershell/scripting/developer/cmdlet/approved-verbs-for-windows-powershell-commands
const VALID_VERBS =
'Add|Clear|Close|Copy|Enter|Exit|Find|Format|Get|Hide|Join|Lock|'
+ 'Move|New|Open|Optimize|Pop|Push|Redo|Remove|Rename|Reset|Resize|'
+ 'Search|Select|Set|Show|Skip|Split|Step|Switch|Undo|Unlock|'
+ 'Watch|Backup|Checkpoint|Compare|Compress|Convert|ConvertFrom|'
+ 'ConvertTo|Dismount|Edit|Expand|Export|Group|Import|Initialize|'
+ 'Limit|Merge|Mount|Out|Publish|Restore|Save|Sync|Unpublish|Update|'
+ 'Approve|Assert|Build|Complete|Confirm|Deny|Deploy|Disable|Enable|Install|Invoke|'
+ 'Register|Request|Restart|Resume|Start|Stop|Submit|Suspend|Uninstall|'
+ 'Unregister|Wait|Debug|Measure|Ping|Repair|Resolve|Test|Trace|Connect|'
+ 'Disconnect|Read|Receive|Send|Write|Block|Grant|Protect|Revoke|Unblock|'
+ 'Unprotect|Use|ForEach|Sort|Tee|Where';
const COMPARISON_OPERATORS =
'-and|-as|-band|-bnot|-bor|-bxor|-casesensitive|-ccontains|-ceq|-cge|-cgt|'
+ '-cle|-clike|-clt|-cmatch|-cne|-cnotcontains|-cnotlike|-cnotmatch|-contains|'
+ '-creplace|-csplit|-eq|-exact|-f|-file|-ge|-gt|-icontains|-ieq|-ige|-igt|'
+ '-ile|-ilike|-ilt|-imatch|-in|-ine|-inotcontains|-inotlike|-inotmatch|'
+ '-ireplace|-is|-isnot|-isplit|-join|-le|-like|-lt|-match|-ne|-not|'
+ '-notcontains|-notin|-notlike|-notmatch|-or|-regex|-replace|-shl|-shr|'
+ '-split|-wildcard|-xor';
const KEYWORDS = {
$pattern: /-?[A-z\.\-]+\b/,
keyword:
'if else foreach return do while until elseif begin for trap data dynamicparam '
+ 'end break throw param continue finally in switch exit filter try process catch '
+ 'hidden static parameter',
// "echo" relevance has been set to 0 to avoid auto-detect conflicts with shell transcripts
built_in:
'ac asnp cat cd CFS chdir clc clear clhy cli clp cls clv cnsn compare copy cp '
+ 'cpi cpp curl cvpa dbp del diff dir dnsn ebp echo|0 epal epcsv epsn erase etsn exsn fc fhx '
+ 'fl ft fw gal gbp gc gcb gci gcm gcs gdr gerr ghy gi gin gjb gl gm gmo gp gps gpv group '
+ 'gsn gsnp gsv gtz gu gv gwmi h history icm iex ihy ii ipal ipcsv ipmo ipsn irm ise iwmi '
+ 'iwr kill lp ls man md measure mi mount move mp mv nal ndr ni nmo npssc nsn nv ogv oh '
+ 'popd ps pushd pwd r rbp rcjb rcsn rd rdr ren ri rjb rm rmdir rmo rni rnp rp rsn rsnp '
+ 'rujb rv rvpa rwmi sajb sal saps sasv sbp sc scb select set shcm si sl sleep sls sort sp '
+ 'spjb spps spsv start stz sujb sv swmi tee trcm type wget where wjb write'
// TODO: 'validate[A-Z]+' can't work in keywords
};
const TITLE_NAME_RE = /\w[\w\d]*((-)[\w\d]+)*/;
const BACKTICK_ESCAPE = {
begin: '`[\\s\\S]',
relevance: 0
};
const VAR = {
className: 'variable',
variants: [
{ begin: /\$\B/ },
{
className: 'keyword',
begin: /\$this/
},
{ begin: /\$[\w\d][\w\d_:]*/ }
]
};
const LITERAL = {
className: 'literal',
begin: /\$(null|true|false)\b/
};
const QUOTE_STRING = {
className: "string",
variants: [
{
begin: /"/,
end: /"/
},
{
begin: /@"/,
end: /^"@/
}
],
contains: [
BACKTICK_ESCAPE,
VAR,
{
className: 'variable',
begin: /\$[A-z]/,
end: /[^A-z]/
}
]
};
const APOS_STRING = {
className: 'string',
variants: [
{
begin: /'/,
end: /'/
},
{
begin: /@'/,
end: /^'@/
}
]
};
const PS_HELPTAGS = {
className: "doctag",
variants: [
/* no paramater help tags */
{ begin: /\.(synopsis|description|example|inputs|outputs|notes|link|component|role|functionality)/ },
/* one parameter help tags */
{ begin: /\.(parameter|forwardhelptargetname|forwardhelpcategory|remotehelprunspace|externalhelp)\s+\S+/ }
]
};
const PS_COMMENT = hljs.inherit(
hljs.COMMENT(null, null),
{
variants: [
/* single-line comment */
{
begin: /#/,
end: /$/
},
/* multi-line comment */
{
begin: /<#/,
end: /#>/
}
],
contains: [ PS_HELPTAGS ]
}
);
const CMDLETS = {
className: 'built_in',
variants: [ { begin: '('.concat(VALID_VERBS, ')+(-)[\\w\\d]+') } ]
};
const PS_CLASS = {
className: 'class',
beginKeywords: 'class enum',
end: /\s*[{]/,
excludeEnd: true,
relevance: 0,
contains: [ hljs.TITLE_MODE ]
};
const PS_FUNCTION = {
className: 'function',
begin: /function\s+/,
end: /\s*\{|$/,
excludeEnd: true,
returnBegin: true,
relevance: 0,
contains: [
{
begin: "function",
relevance: 0,
className: "keyword"
},
{
className: "title",
begin: TITLE_NAME_RE,
relevance: 0
},
{
begin: /\(/,
end: /\)/,
className: "params",
relevance: 0,
contains: [ VAR ]
}
// CMDLETS
]
};
// Using statment, plus type, plus assembly name.
const PS_USING = {
begin: /using\s/,
end: /$/,
returnBegin: true,
contains: [
QUOTE_STRING,
APOS_STRING,
{
className: 'keyword',
begin: /(using|assembly|command|module|namespace|type)/
}
]
};
// Comperison operators & function named parameters.
const PS_ARGUMENTS = { variants: [
// PS literals are pretty verbose so it's a good idea to accent them a bit.
{
className: 'operator',
begin: '('.concat(COMPARISON_OPERATORS, ')\\b')
},
{
className: 'literal',
begin: /(-){1,2}[\w\d-]+/,
relevance: 0
}
] };
const HASH_SIGNS = {
className: 'selector-tag',
begin: /@\B/,
relevance: 0
};
// It's a very general rule so I'll narrow it a bit with some strict boundaries
// to avoid any possible false-positive collisions!
const PS_METHODS = {
className: 'function',
begin: /\[.*\]\s*[\w]+[ ]??\(/,
end: /$/,
returnBegin: true,
relevance: 0,
contains: [
{
className: 'keyword',
begin: '('.concat(
KEYWORDS.keyword.toString().replace(/\s/g, '|'
), ')\\b'),
endsParent: true,
relevance: 0
},
hljs.inherit(hljs.TITLE_MODE, { endsParent: true })
]
};
const GENTLEMANS_SET = [
// STATIC_MEMBER,
PS_METHODS,
PS_COMMENT,
BACKTICK_ESCAPE,
hljs.NUMBER_MODE,
QUOTE_STRING,
APOS_STRING,
// PS_NEW_OBJECT_TYPE,
CMDLETS,
VAR,
LITERAL,
HASH_SIGNS
];
const PS_TYPE = {
begin: /\[/,
end: /\]/,
excludeBegin: true,
excludeEnd: true,
relevance: 0,
contains: [].concat(
'self',
GENTLEMANS_SET,
{
begin: "(" + TYPES.join("|") + ")",
className: "built_in",
relevance: 0
},
{
className: 'type',
begin: /[\.\w\d]+/,
relevance: 0
}
)
};
PS_METHODS.contains.unshift(PS_TYPE);
return {
name: 'PowerShell',
aliases: [
"pwsh",
"ps",
"ps1"
],
case_insensitive: true,
keywords: KEYWORDS,
contains: GENTLEMANS_SET.concat(
PS_CLASS,
PS_FUNCTION,
PS_USING,
PS_ARGUMENTS,
PS_TYPE
)
};
}
module.exports = powershell;
|
combined_dataset/train/non-malicious/sample_26_65.ps1
|
sample_26_65.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Get-AMTAccessMonitor {
<#
.Synopsis
Returns Intel Active Management Technology access events
.Description
This Cmdlet returns the Intel Active Management Technology (AMT) access events from clients that have Intel Active Management Technology firmware version 3.2 or higher.
.Notes
Supported AMT Firmware Versions:
This Cmdlet supports AMT firmware version 3.2 or higher.
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Get-AMTAccessMonitor -computername:vProClient
ComputerName : vProClient
TimeStamp : 1/01/2011 11:46:55 PM
Message : AMT Provisioning Started
Location :
User :
.Example
Get-AMTAccessMonitor vProClient -Credential $amtcred - TLS -CertificateName "myCertificate" | Format-Table
ComputerName TimeStamp Message Location User
------------ --------- ------- -------- ----
vProClient 1/01/2011 11:46:55 PM AMT Provisioning Sta...
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=1, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential
)
PROCESS {
if ($Credential.username.Length -gt 0)
{} elseif ($Username.length -gt 0) {
if ($Password.length -gt 0) {
$passwd = ConvertTo-SecureString $Password -AsPlainText –Force
$Credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $Username,$passwd
} else {
$Credential = Get-Credential $Username
}
}
$tlsstring = ""
if ($TLS.IsPresent)
{
$tlsstring = "-TLS"
}
if ($Port -eq "16993")
{
$tlsstring = "-TLS"
}
if($CertificateName.Length -gt 0)
{
$Connection.Options.SetClientCertificateByCertificateName($CertificateName)
}
$Results = @()
$rand = New-Object System.Random
ForEach ($Comp in $ComputerName) {
$tempAMTPSDrive = "AMTDrive"+$rand.next()
$CannotConnect = $False
if ($Credential.username.Length -gt 0){
$expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp -Credential `$Credential $tlsstring -ea Stop"
} else {
$expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp $tlsstring -ea Stop"
}
try{
$null = invoke-expression $expression
Get-Content $tempAMTPSDrive":\Logs\AccessMonitor" | ForEach-Object {
$obj = New-Object PSObject
$obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$obj | Add-Member -MemberType noteproperty -Name TimeStamp -value $_.TimeStamp
$obj | Add-Member -MemberType noteproperty -Name Message -value $_.Message
$obj | Add-Member -MemberType noteproperty -Name Location -value $_.Location
$obj | Add-Member -MemberType noteproperty -Name User -value $_.User
$Results += $obj
}
Remove-PSDrive $tempAMTPSDrive
}
catch {
if($_.ToString().Contains("Unauthorized"))
{
$obj = New-Object PSObject
$obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$obj | Add-Member -MemberType noteproperty -Name TimeStamp -value ""
$obj | Add-Member -MemberType noteproperty -Name Message -value "Error"
$obj | Add-Member -MemberType noteproperty -Name Location -value ""
$obj | Add-Member -MemberType noteproperty -Name User -value "Unauthorized"
}
if($_.ToString().Contains("The operation is not allowed on non-connected sockets."))
{
$obj = New-Object PSObject
$obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$obj | Add-Member -MemberType noteproperty -Name TimeStamp -value ""
$obj | Add-Member -MemberType noteproperty -Name Message -value "Error"
$obj | Add-Member -MemberType noteproperty -Name Location -value ""
$obj | Add-Member -MemberType noteproperty -Name User -value "Cannot connect"
}
else
{
$obj = New-Object PSObject
$obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$obj | Add-Member -MemberType noteproperty -Name Message -value "Error"
$obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect"
$obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message
}
$Results += $obj
}
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQXkiSVr1+UI/W
# bs+pAOiayQjtnR4BkVsozZlIUlFAraCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgKVa8VkdjwDFiVgwx
# B6UsfSRP4UK8RjSBwVhZ8ndjb4UwDQYJKoZIhvcNAQEBBQAEggGAVhrj2XoCVj/O
# PlYALidO/BxqZBCbHptXEPeOSa6dJdgfYKOWGsu6VGqYD8bschtEu6q14MWddPnN
# 2BYi6C+9G6hElJiQiH8GyaPBZlGpxDikPrBySPyDHq2owcDb/PIhLIsvE+Szx7RV
# EeBOq0ELEFnkeRiDHFK2O/nK5ykUY0weNppCeqJIIruWee/UDb8U9+HN9PszL4MI
# sroMW75N/ihZ/pQ7ODamntixV5DKD+WYFy4Rqege/qVBQIrxkFoBc1zCSVeiClkv
# O14g/74aiFx99XBGPBegRJ4w/QEPsbgBZrzncBmIl1/u5Y3i/6kiClXpNPfSPjxq
# 5jw1d0iNa9suozCxo5y+s5JLU9MWXrcbo8vrfwY1pbwWf5tAFEUd8DUyy2GYbC/+
# ztBbGJipg8CRCq/GrX7/dG0Hvtyca+8GETvr5Vgodmo/xik8+BpU6vgMK1zw+Shc
# /oKxoayZr2UzEP5lcUxY8eAlRX+uEQ67NTZmnH2XcPmYLufqQHKfoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIFf8n9JEHHjueqTAbIYxgGmlQkZHEH8TtZn2
# 4WJgs+BDAhUAsCsypYH+OWme810QJV/KAcQIIV4YDzIwMjExMDI3MTIxMDI3WqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMTAyNzEyMTAyN1owPwYJKoZIhvcNAQkEMTIEMJsmje5/Rj4j
# SOaLR+TzCiLuMeWQFFXO7bj1zjrnKbYukRVLYgklyXyNSS2G/Aw+UTCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgAmdhK90qRzcKvwVuZNLmj0ytGMuzJ1cmIUPvL63wFCyJA39IDh
# P/6sSoQ2D/qzE7UKluLH4XyYCHDgWg4uj9U7MGXGlZ/Slnion9Pl0M6tE3zZVfR+
# jdLQuxx8E3RsNlzw08BwA96YtW96p/JZloR1LAwt1D65o3RrmNWRQJcksb3LG5VW
# IUg7Xq3kGBXun14VxPUT3urN4E2sEPSLYKksg2lo//W+Ue7kho/RpRUqEZRy/BOG
# Bt0v9QT//yCkoCcFm/x59neOtmlMja8vqSKG4h4EIAhgszwvLeLCzHamRxsUGFUi
# pZKY++UeV2JzTfI2+cVmHvJEGPfoBB4xHU1EdAa1//dYxoDFtqMO7DCRS9V+b+Iv
# aoEMlGyz9CXJwaSMEofpu4m4M+9mYcSLXNYEcu5d166abXTI58/BWsmnvFFxqR9R
# UZ8eNPKpQeFZqeo2TqNQPxk1jW2VZbDPwqR4Zk/I+bQv7uNh1LmSzllHAQ13PqE8
# fIU0MIgLZURq+aKkReHr5WwXSJps/nCk8P76ExHaNkRH2QbL/2FnUqA3BdfWkUEC
# yiIVD0J9KWpW/+vbZClYS9gvChlYw+HC/k1ikc2RGvwW19ix4z5dMg42w9eIA6Yc
# Vq9/GiLdrtDPsweog0W5Ji2+5TIpB7+ESIOl12hQPif9FFzFwWNFRWTGMg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/Hardware Inventory.ps1
|
Hardware Inventory.ps1
|
# Synopsis:
# Windows Script to collect Hardware information on a local system
# And Convert it to a JSON String and Upload that to a CouchDB
# Database
# Requirements:
# -Local Admin Access in Powershell v2
# -SSL(443/TCP) allowed to CouchDB Host
# -Proxy verified and communication to it
Write-Host "
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_ _ _____ _ _
| \\ | |_ _| / \\ ___ ___ ___| |_
| \\| | | | / _ \\ / __/ __|/ _ \\ __|
| |\\ | | | / ___ \\\\__ \\__ \\ __/ |_
|_| \\_| |_| /_/ \\_\\___/___/\\___|\\__|
___ _
|_ _|_ ____ _____ _ __ | |_ ___ _ __ _ _
| || '_ \\ \\ / / _ \\ '_ \\| __/ _ \\| '__| | | |
| || | | \\ V / __/ | | | || (_) | | | |_| |
|___|_| |_|\\_/ \\___|_| |_|\\__\\___/|_| \\__, |
|___/
by VulcanX
2011-09-29
v1.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"
#Adding ConvertTo-JSON function for use later on in script
Filter ConvertTo-JSON {
Function New-JSONProperty ($name, $value) {
@"
"$name": $value
"@
}
$targetObject = $_
$jsonProperties = @()
$properties = $_ | Get-Member -MemberType *property
ForEach ($property in $properties) {
#"$($property.Name)=$($targetObject.$($property.Name)) [$($($targetObject.$($property.Name)).GetType())]"
#(($targetObject.($property.Name)).GetType()).Name
$value = $targetObject.($property.Name)
$dataType = (($targetObject.($property.Name)).GetType()).Name
switch -regex ($dataType) {
'String' {$jsonProperties += New-JSONProperty $property.Name "`"$value`""}
'Int32|Double' {$jsonProperties += New-JSONProperty $property.Name $value}
'Object\\[\\]' {
#$jsonProperties += "`t`"$($property.Name)`": [$($($targetObject.($property.Name)) -join ',')]"
$str = "`t`"$($property.Name)`": ["
$count = $targetObject.($property.Name).Count
For($idx=0; $idx -lt $count; $idx++) {
$v = $targetObject.($property.Name)[$idx]
switch -regex ($v.GetType()) {
'String' {$v="`"$v`""}
}
if($idx+1 -lt $count) {
$comma = ","
} else {
$comma = ""
}
$str += "$v$($comma)"
}
$jsonProperties += "$str]"
}
default {$_}
}
}
"{`r`n $($jsonProperties -join ",`r`n") `r`n}"
}
#Get WMI Info
#Declaring all variables for use later in JSON
$HOSTNAME1 = Get-WmiObject win32_computersystem | Select-Object -ExpandProperty Name
$HOSTNAME2 = Get-WmiObject win32_computersystem | Select-Object -ExpandProperty Domain
$HOSTNAME = "$HOSTNAME1.$HOSTNAME2"
$OS = Get-WmiObject win32_operatingsystem | Select-Object -ExpandProperty Caption
$OS_RELEASE = Get-WmiObject win32_operatingsystem | Select-Object -ExpandProperty Version
$IP_ADDRESS_1 = Get-WmiObject win32_NetworkAdapterConfiguration | Where { $_.IPAddress -and $_.IPAddress -notlike ':' } | Select -ExpandProperty IPAddress
$IP_ADDRESS = $IP_ADDRESS_1 -join ' ' # Adding multiple address onto one line
$MAC_ADDRESS_1 = Get-WmiObject win32_networkadapter | Where { $_.PhysicalAdapter -eq $TRUE -and $_.MacAddress -ne $null } | Select-Object -ExpandProperty MACAddress
$MAC_ADDRESS = $MAC_ADDRESS_1 -join ' ' #Adding multiple addresses onto one line
$MEMORY = Get-WmiObject win32_computersystem | Select-Object -ExpandProperty TotalPhysicalMemory
$BIOS_VENDOR = Get-WmiObject win32_bios | Select-Object -ExpandProperty Manufacturer
$BIOS_VERSION = Get-WmiObject win32_bios | Select-Object -ExpandProperty SMBIOSBIOSVersion
$BIOS_RELEASE_DATE = Get-WmiObject win32_bios | Select-Object @{label='Release Date';expression={$_.ConvertToDateTime($_.releasedate).ToShortDateString()}} | Select-Object -ExpandProperty 'Release Date'
$SYSTEM_MANUFACTURER = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty Vendor
$SYSTEM_PRODUCT_NAME = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty Name
$SYSTEM_VERSION = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty Version
$SYSTEM_SERIAL_NUMBER = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty IdentifyingNumber
$SYSTEM_UUID = Get-WmiObject win32_computersystemproduct | Select-Object -ExpandProperty UUID
$BASEBOARD_MANUFACTURER = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Manufacturer
$BASEBOARD_PRODUCT_NAME = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Product
$BASEBOARD_VERSION = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Version
$BASEBOARD_SERIAL_NUMBER = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty SerialNumber
$BASEBOARD_ASSET_TAG = Get-WmiObject win32_baseboard | Select-Object -ExpandProperty Tag
$CHASSIS_MANUFACTURER = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty Manufacturer
$CHASSIS_TYPE = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty ChassisTypes
$CHASSIS_VERSION = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty Version
$CHASSIS_SERIAL_NUMBER = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty SerialNumber
$CHASSIS_ASSET_TAG = Get-WmiObject win32_systemenclosure | Select-Object -ExpandProperty SMBIOSAssetTag
$PROCESSOR_FAMILY = Get-WmiObject win32_processor | Select-Object -ExpandProperty Family
$PROCESSOR_MANUFACTURER = Get-WmiObject win32_processor | Select-Object -ExpandProperty Manufacturer
$PROCESSOR_VERSION = Get-WmiObject win32_processor | Select-Object -ExpandProperty Name
$PROCESSOR_ARCH = Get-WmiObject win32_processor | Select-Object -ExpandProperty Architecture
$PROCESSOR_FREQUENCY = Get-WmiObject win32_processor | Select-Object -ExpandProperty MaxClockSpeed
# Storing all the information in a variable to convert to JSON Later
$RESULTS = (New-Object PSObject |
add-member -pass noteproperty HOSTNAME "$HOSTNAME" |
add-member -pass noteproperty OS "$OS" |
add-member -pass noteproperty OS-RELEASE "$OS_RELEASE" |
add-member -pass noteproperty IP-ADDRESS "$IP_ADDRESS" |
add-member -pass noteproperty MAC-ADDRESS "$MAC_ADDRESS" |
add-member -pass noteproperty MEMORY "$MEMORY" |
add-member -pass noteproperty BIOS-VENDOR "$BIOS_VENDOR" |
add-member -pass noteproperty BIOS-VERSION "$BIOS_VERSION" |
add-member -pass noteproperty BIOS-RELEASE-DATE "$BIOS_RELEASE_DATE" |
add-member -pass noteproperty SYSTEM-MANUFACTURER "$SYSTEM_MANUFACTURER" |
add-member -pass noteproperty SYSTEM-PRODUCT-NAME "$SYSTEM_PRODUCT_NAME" |
add-member -pass noteproperty SYSTEM-VERSION "$SYSTEM_VERSION" |
add-member -pass noteproperty SYSTEM-SERIAL-NUMBER "$SYSTEM_SERIAL_NUMBER" |
add-member -pass noteproperty SYSTEM-UUID "$SYSTEM_UUID" |
add-member -pass noteproperty BASEBOARD-MANUFACTURER "$BASEBOARD_MANUFACTURER" |
add-member -pass noteproperty BASEBOARD-PRODUCT-NAME "$BASEBOARD_PRODUCT_NAME" |
add-member -pass noteproperty BASEBOARD-VERSION "$BASEBOARD_VERSION" |
add-member -pass noteproperty BASEBOARD-SERIAL-NUMBER "$BASEBOARD_SERIAL_NUMBER" |
add-member -pass noteproperty BASEBOARD-ASSET-TAG "$BASEBOARD_ASSET_TAG" |
add-member -pass noteproperty CHASSIS-MANUFACTURER "$CHASSIS_MANUFACTURER" |
add-member -pass noteproperty CHASSIS-TYPE "$CHASSIS_TYPE" |
add-member -pass noteproperty CHASSIS-VERSION "$CHASSIS_VERSION" |
add-member -pass noteproperty CHASSIS-SERIAL-NUMBER "$CHASSIS_SERIAL_NUMBER" |
add-member -pass noteproperty CHASSIS-ASSET-TAG "$CHASSIS_ASSET_TAG" |
add-member -pass noteproperty PROCESSOR-FAMILY "$PROCESSOR_FAMILY" |
add-member -pass noteproperty PROCESSOR-MANUFACTURER "$PROCESSOR_MANUFACTURER" |
add-member -pass noteproperty PROCESSOR-VERSION "$PROCESSOR_VERSION" |
add-member -pass noteproperty PROCESSOR-ARCH "$PROCESSOR_ARCH" |
add-member -pass noteproperty PROCESSOR-FREQUENCY "$PROCESSOR_FREQUENCY" ) | ConvertTo-Json # Converting $RESULTS to JSON Format
# Double check the structure and layout is all correct
echo $RESULTS
# CouchDB Credentials
$username = Read-Host "CouchDB Username"
$password = Read-Host "CouchDB Password"
# Creating the document on the CouchDB Database
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} ; # Accepts all certificates from the host
$request = [System.Net.WebRequest]::Create("https://couchdb-host/database/$HOSTNAME1")
# Converting the Header and adding the username and password to it in base64 encoding
$auth = [System.Text.Encoding]::UTF8.GetBytes("$username" + ":" + "$password")
$base64 = [System.Convert]::ToBase64String($auth)
$authorization = "Authorization: Basic " + $base64
$request.Headers.Add($authorization)
# Adding credentials for the webrequest and address of the proxy
$request.Credentials = New-Object System.Net.NetworkCredential($username, $password)
$request.Proxy = New-Object -TypeName System.Net.WebProxy -ArgumentList "http://randomproxy:8080" # http://*hostname*:*port* format
$data = [Text.Encoding]::UTF8.GetBytes($RESULTS)
# Specifying what method to use
$request.ContentLength = $data.Length
$request.Method = "PUT"
# Be careful to set your content type appropriately...
# This is what you're going to SEND THEM
$request.ContentType = "application/json"; # 'text/xml;charset="utf-8"'; "application/x-www-form-urlencoded"
# This is what you expect back
$request.Accept = "application/json"; # "text/xml"
# Executing the PUT request
$put = new-object IO.StreamWriter $request.GetRequestStream()
$put.Write($data,0,$data.Length)
$put.Flush()
$put.Close()
|
combined_dataset/train/non-malicious/ConvertTo-CliXml_1.ps1
|
ConvertTo-CliXml_1.ps1
|
function ConvertTo-CliXml {
param(
[parameter(position=0,mandatory=$true,valuefrompipeline=$true)]
[validatenotnull()]
[psobject]$object
)
begin {
$type = [type]::gettype("System.Management.Automation.Serializer")
$ctor = $type.getconstructor("instance,nonpublic", $null, @([xml.xmlwriter]), $null)
$sw = new-object io.stringwriter
$xw = new-object xml.xmltextwriter $sw
$serializer = $ctor.invoke($xw)
$method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null)
$done = $type.getmethod("Done", [reflection.bindingflags]"nonpublic,instance")
}
process {
try {
[void]$method.invoke($serializer, $object)
} catch {
write-warning "Could not serialize $($object.gettype()): $_"
}
}
end {
[void]$done.invoke($serializer, @())
$sw.ToString()
}
}
|
combined_dataset/train/non-malicious/2559.ps1
|
2559.ps1
|
param(
[String[]] $DatabaseList
)
"The number of parameters passed in DatabaseList is $($DatabaseList.Count)"
$i = 0
foreach ($arg in $DatabaseList) { echo "The $i parameter in DatabaseList is $arg"; $i++ }
|
combined_dataset/train/non-malicious/sample_0_12.ps1
|
sample_0_12.ps1
|
#
#
# Rule to look for organizations that are newer than the deployment
#
# Created: 5/24/2012
# Author: Jonathan Randall
#******************************************************************************************************************
#region Functions
function GetOrganizationData([string] $conn_string)
{
$SqlConnection = New-Object System.Data.SqlClient.SqlConnection
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand
$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter
$DataSet = New-Object System.Data.DataSet
$SqlConnection.ConnectionString = $conn_string
$SqlCmd.CommandText = "set nocount on
SELECT o.FriendlyName,op.IntColumn as Revision,o.Id From Organization o
JOIN OrganizationProperties op ON o.Id=op.Id
WHERE op.ColumnName='Revision'"
$SqlCmd.Connection = $SqlConnection
$SqlAdapter.SelectCommand = $SqlCmd
$SqlAdapter.Fill($DataSet)
$SqlConnection.Close()
$DataSet.Tables[0]
}
#endregion Functions
Import-LocalizedData -BindingVariable LocalizedMessages
Write-DiagProgress -Activity $LocalizedMessages.PROGRESSBAR_ID_CRM_ORG_Version_Deployment_CHECK -Status $LocalizedMessages.PROGRESSBAR_ID_CRM_ORG_Version_Deployment_CHECKDesc
"Entered TS_CRM_ORG_Version_Depoyment_CHECK.ps1" | WriteTo-StdOut
$RootCauseDetected = $false
if (Test-Path HKLM:\Software\Microsoft\MSCRM)
{
$MSCRMKey = Get-Item HKLM:\Software\Microsoft\MSCRM
if ($MSCRMKey -ne $null){
$server_version = $MSCRMKey.GetValue("CRM_Server_Version").Substring(0,1)
if ($server_version -ne '4'){
$cnn = $MSCRMKey.GetValue("configdb")
$revision = $MSCRMKey.GetValue("CRM_Server_Serviceability_Revision")
#Get organization data
$crm_organization_versions = GetOrganizationData $cnn
foreach ($dr in $crm_organization_versions)
{
if ($dr.GetType() -ne [System.Int32] -and [System.Data.DataRow]$dr){
if ($dr.Revision -gt [System.Convert]::ToInt32($revision)){
Write-GenericMessage -RootCauseID "RC_CRMOrganization_Deployment_Mismatch" -Verbosity "Warning" -SolutionTitle ([System.String]::Format("The Microsoft CRM Organization {0} has a Revision of {1}. The deployment should be updated to {2} as organizations based on later versions may not operate correctly.",$dr.FriendlyName,$dr.Revision,$revision)) -ProcessName "W3WP.exe"
$RootCauseDetected=$true
}
}
}
}
}
}
if ($RootCauseDetected -eq $true){
Update-DiagRootCause -Id "RC_CRMOrganization_Deployment_Mismatch" -Detected $true
if ($Error.Count -gt 0) {
("ERROR=" + $Error) | WriteTo-StdOut
}
}
else{
Update-DiagRootCause -Id "RC_CRMOrganization_Deployment_Mismatch" -Detected $false
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCBChkf6TmYauM7
# NIWAKB6PnfTgkM8frZTiOIy2A9rNq6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIONXQr2xCbWZEH8+P0xkpiyR
# Se4KjIVUwa7kpV3nBWlPMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEApkjg/ZGPCeMoeXDZ3VGp+iwtnFV675dvoi5y2bRNwjZF869zHysp61Ql
# B7ONmv2by70K4boAwKF8V+Lc2kMGBhdxtJpU5Vd3aA3cLUlVKJPa2SW0tOoGZXz/
# cAa5qpkUh+nHKEdLXKbPyBfhR1BOFDyo4SiW4RcDuuLvD9+PzhK9AAwFoiYvFxHK
# ZnTqmrgIfA2sXPQj4KlGI9I5dbuFSpzLtLWM6cVVtCPCboG/mW/lqKQQb0JuAsUB
# 8DUPeIdXjfKrvDo9giS5tPbwV9QcdSABJ8PJVfqgKI1t6ec67L0TG/n2/5QwzCx8
# 5iJvE1JSArURYMruO2ngdjevJ2JnwaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDpsf9OXegHQavaYAHGN7vTlBTOGD1J6UJi9JQE2joxlQIGZxqDjw9g
# GBMyMDI0MTAyODExNDA0MC43MTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz
# OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P
# AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR
# rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C
# Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm
# xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy
# fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo
# 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBuydJlYGSCfmnKkCMpq7RLO1BOYN5CA0PLN9uX2YoS
# WTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy
# SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIAI23SWJiA0XXlOwh3P7GY
# QfIywaskzPg1DuQfIIqs9smvCGc8ZKlT9zRZHDU8zr21iIKLZzRPMyKvqx31WJcX
# B4GZQr5hN0E+hwC8YbPuvQe98GUaywCxP5i6Vhemd3kRAVCUpFuIdsAVQaaAEOM1
# KoW35RrdI6JOlpy81TNOPARGolkTyxLFHK8u5REHKgQfAPdg8C1YuhQ1PVyMv6vS
# V44DojQJb4kS8crVnBwwtvvCbNE9QuuyLCM/VdNsfrYUlgLTuY80TGaE68GzZcrW
# Ln3OpIk8oRzCCSfPpXawSdeeHFW2x4XBWBuLoFU9Ii1sFSabdeu9wQUT2FzmW3Sg
# z55TUKx6djRGsB56Vs4VCCFKNAG55W7H0ObuuC9cp1rozATqH0UCWZKMIqz/02df
# HP5KhArIalp78+KjD/9XmvjBEgYwxb3FiH7yNXCMjfTMuGgmm6Tcff2F8x5oy5jh
# YSC3MDz4WL22qqX1W6eMbXp/5y3mxEcjdr9DhFBLIMuxu/JaxMvE5KvbqTGAVmxi
# DYYMzD4gMAibJL9QFQFq6HWTfGig9WyhTN+Kx9Y+kCADFfktfroT9EaGxDn7XhZk
# +U4Blxf8yXMcZwEp2wx2lUiSWN+oIJWyXRTQOgr50OJRdoBoGG9i62rBHlgWB4/s
# oBpTPNuJPXhAXEfY13aqRRg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_18_47.ps1
|
sample_18_47.ps1
|
@{
GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59"
Author = "PowerShell"
CompanyName = "Microsoft Corporation"
Copyright = "Copyright (c) Microsoft Corporation."
ModuleVersion = "7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion = "3.0"
CmdletsToExport = @(
'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml',
'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv',
'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger',
'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event',
'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Get-FileHash', 'Export-FormatData',
'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host',
'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List',
'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption',
'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object',
'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output',
'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint',
'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession',
'Import-PSSession', 'Get-Random', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace',
'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'Start-Sleep', 'Join-String',
'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan',
'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData',
'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable',
'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest',
'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Unblock-File'
)
FunctionsToExport = @()
AliasesToExport = @('fhx')
NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll")
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBDLy8cuBKbodtC
# NmoItuifgQ/o9EygYihmiHbOdTTdE6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHbROJ5XEpIAi8a8uENwQoVd
# lwSV4zcT+W3Q7IeGDPFUMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEArPtJOGTCI2ICkpeNDAHlXiCOF0D0SVlPH/ipbN09RXGAEYgraOIWZWPs
# v26ypFIbOyHG9u9i56tDKyBVEc+p0AQwEpaJK6cwnKkWxyszCC8fzuGcB27497pG
# Lz4GjAfQ2t47JWcQtIBPEYcrrXR4WGTUXSrn2HeEhj2ZYl5YVVARQ+IyJlKYrhL+
# 9sCszWn3CeiHPHYMBYXpLOPdByafn3BB26AqyuxAzHuHPJon3k8W2pcezZBZM5ZF
# flXQ3qWTj2A4HjbPjHOr5X0PRaHCzenAb5pyf2HjCEpa9i6wZgK7l50tnpUFDvkM
# xh+ntRNwgGSCtHgxJaPpuHoyDbZFXaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCANIGNoOx/3rpmYWM5t6fFwl/zOEGmeeCboC2qF8ohDQgIGZfxw4dt9
# GBMyMDI0MDQwOTIzMDYzOS45NTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOm/UNswIhgPMjAyNDA0MDkxMzMwMDNaGA8yMDI0MDQxMDEzMzAwM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6b9Q2wIBADAHAgEAAgIafjAHAgEAAgIRMzAKAgUA
# 6cCiWwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF1TLo09RllJVBPdJAmY
# hDxMj4u4iKFfvBfxZ5CdZ0cZT2ecwVvGjvsitRLgMp24VNJjfO0krTY2lI5tIGv9
# 5MgYhVcaaSiQ3zq7UZfYXNKkHbFk/zmz3ds/Tb1uKnxjFxxyOMsKsC2rwCXgTIYp
# crItCpqbnJClYmSe6q/zgV6bMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgneZtislvKgz6XRdzgFCu2c7M2Ni55cZtoG4N2/WO/YMwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIGp7S/NCvSBFp5jvm90RMPGYMAgx20Oc3b9Hsk0n2AWM
# MA0GCSqGSIb3DQEBCwUABIICABp4ONBoQgGPCM3W2B17eKbULwr05Q4ggeNlaaHw
# eZ3KcvuKhWZGkQLo2Hc3Bm4etQJioLpT7+zEa0VTiQkz+4QOT6HQmFU3ITgIp/DA
# yGHsWdqNw/6h1nCrhNodr4oVBlKKrJAFqjvKlL+worY1pa71cIdsBLW37gPEAFNR
# rOs0HlCwUUrdivSXJ8xC/ffaRSm/W37BuYEM6302frEkuQyslqm6IEuMIGbAeEAV
# GntF8DDC3aG9JT99lmmUNGGsgPvVf8wxzV/Jw4SAqynlyQNZqgbfYhveqXTRaryY
# yLlGmTgjezdV9S9Ypb146w5CxpbXwQS6zDTtDqDeGetHyMpgU5p/0sCG+X3qN/Gy
# DM1unJkIdGbnZR0iswfJjWtVbILGb4Mfweprje3AM7+NvUMXlEjEvF3Izszh+HZi
# 3T87n1zcc2zC9CBEzsTFKz+iRhUTHOpzL6EEZLlqOrTuZG6U2FNH3vNdkBP3LbHl
# I9nVt7g8o/a3XSMsVyDsbqRqu70R1o271PvMsyGI03RV+gR3pM/nt4yUpS44k1B+
# M2EQy5CB4GVZtso68Blf66IHEeryoNEMWXxzrvqvplNfzD9xMOnrvYAssq3CMk7i
# aaxxK81q2JczD+mTwY1ZdShm0OKA1/uVvF9x3r8+u4Z+pO8qjzvs+KoYLrCrxplF
# wKRW
# SIG # End signature block
|
combined_dataset/train/non-malicious/3317.ps1
|
3317.ps1
|
function New-Group {
[PoshBot.BotCommand(
Aliases = ('ng', 'newgroup'),
Permissions = 'manage-groups'
)]
[cmdletbinding()]
param(
[parameter(Mandatory)]
$Bot,
[parameter(Mandatory, Position = 0)]
[string[]]$Name,
[parameter(Position = 1)]
[string]$Description
)
$notCreated = @()
foreach ($groupName in $Name) {
if (-not ($Bot.RoleManager.GetGroup($groupName))) {
$group = [Group]::new($groupName, $Bot.Logger)
if ($PSBoundParameters.ContainsKey('Description')) {
$group.Description = $Description
}
$Bot.RoleManager.AddGroup($group)
if (-not ($Bot.RoleManager.GetGroup($groupName))) {
$notCreated += $groupName
}
} else {
New-PoshBotCardResponse -Type Warning -Text "Group [$groupName] already exists" -ThumbnailUrl $thumb.warning
}
}
if ($notCreated.Count -eq 0) {
if ($Name.Count -gt 1) {
$successMessage = 'Groups [{0}] created.' -f ($Name -join ', ')
} else {
$successMessage = "Group [$Name] created"
}
New-PoshBotCardResponse -Type Normal -Text $successMessage -ThumbnailUrl $thumb.success
} else {
if ($notCreated.Count -gt 1) {
$errMsg = "Groups [{0}] could not be created. Check logs for more information." -f ($notCreated -join ', ')
} else {
$errMsg = "Group [$notCreated] could not be created. Check logs for more information."
}
New-PoshBotCardResponse -Type Warning -Text $errMsg -ThumbnailUrl $thumb.warning
}
}
|
combined_dataset/train/non-malicious/sample_28_66.ps1
|
sample_28_66.ps1
|
[CmdletBinding(PositionalBinding=$false)]
Param(
[switch][Alias('h')]$help,
[switch][Alias('t')]$test,
[ValidateSet("Debug","Release")][string[]][Alias('c')]$configuration = @("Debug"),
[string][Alias('v')]$verbosity = "minimal",
[switch]$vs,
[ValidateSet("windows","linux","osx")][string]$os,
[switch]$testnobuild,
[ValidateSet("x86","x64","arm","arm64")][string[]][Alias('a')]$arch = @([System.Runtime.InteropServices.RuntimeInformation]::ProcessArchitecture.ToString().ToLowerInvariant()),
[Parameter(ValueFromRemainingArguments=$true)][String[]]$properties
)
function Get-Help() {
Write-Host "Common settings:"
Write-Host " -arch (-a) Target platform: x86, x64, arm or arm64."
Write-Host " [Default: Your machine's architecture.]"
Write-Host " -binaryLog (-bl) Output binary log."
Write-Host " -configuration (-c) Build configuration: Debug or Release."
Write-Host " [Default: Debug]"
Write-Host " -help (-h) Print help and exit."
Write-Host " -os Target operating system: windows, linux or osx."
Write-Host " [Default: Your machine's OS.]"
Write-Host " -verbosity (-v) MSBuild verbosity: q[uiet], m[inimal], n[ormal], d[etailed], and diag[nostic]."
Write-Host " [Default: Minimal]"
Write-Host " -vs Open the solution with Visual Studio using the locally acquired SDK."
Write-Host ""
Write-Host "Actions (defaults to -restore -build):"
Write-Host " -build (-b) Build all source projects."
Write-Host " This assumes -restore has been run already."
Write-Host " -clean Clean the solution."
Write-Host " -pack Package build outputs into NuGet packages."
Write-Host " -publish Publish artifacts (e.g. symbols)."
Write-Host " This assumes -build has been run already."
Write-Host " -rebuild Rebuild all source projects."
Write-Host " -restore Restore dependencies."
Write-Host " -sign Sign build outputs."
Write-Host " -test (-t) Incrementally builds and runs tests."
Write-Host " Use in conjunction with -testnobuild to only run tests."
Write-Host ""
Write-Host "Libraries settings:"
Write-Host " -testnobuild Skip building tests when invoking -test."
Write-Host ""
Write-Host "Command-line arguments not listed above are passed through to MSBuild."
Write-Host "The above arguments can be shortened as much as to be unambiguous."
Write-Host "(Example: -con for configuration, -t for test, etc.)."
Write-Host ""
}
if ($help) {
Get-Help
exit 0
}
if ($vs) {
$solution = Split-Path $PSScriptRoot -Parent | Join-Path -ChildPath "Aspire.sln"
. $PSScriptRoot\common\tools.ps1
# This tells .NET Core to use the bootstrapped runtime
$env:DOTNET_ROOT=InitializeDotNetCli -install:$true -createSdkLocationFile:$true
# This tells MSBuild to load the SDK from the directory of the bootstrapped SDK
$env:DOTNET_MSBUILD_SDK_RESOLVER_CLI_DIR=$env:DOTNET_ROOT
# Put our local dotnet.exe on PATH first so Visual Studio knows which one to use
$env:PATH=($env:DOTNET_ROOT + ";" + $env:PATH);
# Launch Visual Studio with the locally defined environment variables
."$solution"
exit 0
}
# Check if an action is passed in
$actions = "b","build","r","restore","rebuild","sign","testnobuild","publish","clean"
$actionPassedIn = @(Compare-Object -ReferenceObject @($PSBoundParameters.Keys) -DifferenceObject $actions -ExcludeDifferent -IncludeEqual).Length -ne 0
if ($null -ne $properties -and $actionPassedIn -ne $true) {
$actionPassedIn = @(Compare-Object -ReferenceObject $properties -DifferenceObject $actions.ForEach({ "-" + $_ }) -ExcludeDifferent -IncludeEqual).Length -ne 0
}
if (!$actionPassedIn) {
$arguments = "-restore -build"
}
foreach ($argument in $PSBoundParameters.Keys)
{
switch($argument)
{
"os" { $arguments += " /p:TargetOS=$($PSBoundParameters[$argument])" }
"properties" { $arguments += " " + $properties }
"verbosity" { $arguments += " -$argument " + $($PSBoundParameters[$argument]) }
"configuration" { $configuration = (Get-Culture).TextInfo.ToTitleCase($($PSBoundParameters[$argument])); $arguments += " -configuration $configuration" }
"arch" { $arguments += " /p:TargetArchitecture=$($PSBoundParameters[$argument])" }
default { $arguments += " /p:$argument=$($PSBoundParameters[$argument])" }
}
}
if ($env:TreatWarningsAsErrors -eq 'false') {
$arguments += " -warnAsError 0"
}
Invoke-Expression "& `"$PSScriptRoot/common/build.ps1`" $arguments"
exit 0
|
combined_dataset/train/non-malicious/sample_13_5.ps1
|
sample_13_5.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Exports a database file from target database.
.Description
Exports a database file from target database.
.Example
PS C:\> Export-AzRedisEnterpriseCache -Name "MyCache" -ResourceGroupName "MyGroup" -SasUri "https://mystorageaccount.blob.core.windows.net/mycontainer?sp=signedPermissions&se=signedExpiry&sv=signedVersion&sr=signedResource&sig=signature;mystoragekey"
.Outputs
System.Boolean
.Link
https://learn.microsoft.com/powershell/module/az.redisenterprisecache/export-azredisenterprisecache
#>
function Export-AzRedisEnterpriseCache {
[Alias('Export-AzRedisEnterpriseCacheDatabase')]
[OutputType([System.Boolean])]
[CmdletBinding(DefaultParameterSetName='ExportExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Alias('Name')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the Redis Enterprise cluster.
${ClusterName},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[System.String]
# SAS URI for the target directory to export to
${SasUri},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Returns true when the command succeeds
${PassThru},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$null = $PSBoundParameters.Add("DatabaseName", "default")
Az.RedisEnterpriseCache.internal\Export-AzRedisEnterpriseCache @PSBoundParameters
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5Cz42nhol3822
# W+J5eHzen00P4d0rYAAcdAV6QDMSBaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINqnAOu3EMZZXdvh9+WbiaxC
# 0EE0VLPiGE+GGuq/E2ErMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAl3x/sSn4/Jcx5MXw1vaIW5Usc/+QsCKiQC5ZvQzCYnlx0h6l+LXXO9sZ
# 2ZqTt6OUzkY5U4FUt1lWbp5w30vtyOYrM03zEkL4MfoJA0MbEWSM0Wam8Wrql3/v
# 48mu2g3XAlV6FVuM+WVtOfyQhl+oYUgZe00XBwSyMENfnaNhGVSjWHZMeEO22NlE
# SKf6CMMe29lLLcZmzChHKnCvFhDhHzFU+P47qnjLhyzfmrQaIPifIp7jGCiQnpHk
# oye1b5+KtBhUpCI0+AfL6BDRvNvFs0sI4opea/86yWcG7w52YCknsU1OR+efwwGH
# wBr8mtIyS7sx/lXPKNz0ptF9i/LwxKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD3Fg++UiBHDIQrYXNDX1PqClArNqZMcwsnTVyQzHV3awIGZhfWS4aH
# GBMyMDI0MDQyMzEzMTUxMS41ODNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAiGA8yMDI0MDQyMzEyMTQy
# MFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0iSc
# AgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03YcAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGmKRxZss6LPFkY42ZOWnXs
# VX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W58hCrRegPfWwTzs8g1aOM
# YXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6EQMGwD/BAq7tdePiGcew
# KasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkCEnw9OPR+IbvMfWkyCTqp
# PJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Qa4zlmb79kpVqf6nLoXJr
# 9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCA27ZxmTUpsqt6kIMTyDcKkfCI8lrvNGKfcBWYtgMrK
# 5DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W10UOl24tqW0PGjrhbdiG
# 0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIAdgRTEzhWswXI+q8KICWf
# fFs6kvPYmPKq3X6Fq3CSR6OmM07FVRQje3Ac8MA2U6tVUcadgR2oauEtfQAr4WZP
# Dy1g/E325OHqXurrxSv7YhoDImVNnSMlABxhPmNR/v6GJRgfxZnhOmmVUp5vPyMK
# Ik1jkMrxl5cQxyk0rJeoAkCDF6jWqITCHdHUScytii+coO0PlNSw9GeNa+BmbtDH
# 4x5tk2DHVWEApTNJlmc7RMXFKBwN4H0f5RllLEjp3luTsYEpuy11P2WCpuhyd/Pi
# pmUNOX2L+f2smaCT3lCEwhR9+NeQ+Q+AsBTB30S/qJjNujaNtm8gf2Zgh6zusuBD
# h8f+BLrrxZq881u3cDbUxlYk7nlvm1EIs6t2MGj6zrX9wq3/+IbEFOJwpRAGw+9f
# 4P19n1IMymaJa2JyI7AnhB63A05BifbQiu9Dx8/6bV9QHlcFXiDBDS4U/RfUdi3M
# wuw13TpmLYQWXr/4L4PqrDarqbrKKiYnDfJGAtm4HkZ4baNgNuSvv77aPmuLZhaJ
# /0jOU8nEGe3uweOddRtC++W7j6hH44mc6wnJzrLsFPn/UQ1gIxKkYy4KRx2DLMZG
# R8YXKT2XHqCmKMxP/EaTDt8f3vNNRr34cQpndOV0T3ft8fQ2HLoki2LpxlBSWLoY
# vyp+wJHYIhctbaIu5RIkGTM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_46_26.ps1
|
sample_46_26.ps1
|
#See https://aka.ms/customizecontainer to learn how to customize your debug container and how Visual Studio uses this Dockerfile to build your images for faster debugging.
#Depending on the operating system of the host machines(s) that will build or run the containers, the image specified in the FROM statement may need to be changed.
#For more information, please see https://aka.ms/containercompat
FROM $base_image_name$ AS base
WORKDIR /app
$expose_statements$
FROM $sdk_image_name$ AS build
# Install Visual Studio Build Tools, they are required for aot publish
# Note: Use of the Visual Studio Build Tools requires a valid Visual Studio license.
RUN curl -SL --output vs_buildtools.exe https://aka.ms/vs/17/release/vs_buildtools.exe
RUN vs_buildtools.exe --installPath C:\BuildTools --add Microsoft.VisualStudio.Component.VC.Tools.x86.x64 Microsoft.VisualStudio.Component.Windows10SDK.19041 --quiet --wait --norestart --nocache
ARG BUILD_CONFIGURATION=Release
WORKDIR /src
$copy_build_file_commands$$copy_project_commands$
RUN dotnet restore "$project_relative_path$"
COPY . .
WORKDIR "/src/$container_project_directory$"
RUN dotnet build "$relative_project_file_name$" -c %BUILD_CONFIGURATION% -o /app/build
FROM build AS publish
ARG BUILD_CONFIGURATION=Release
RUN dotnet publish "$relative_project_file_name$" -c %BUILD_CONFIGURATION% -o /app/publish /p:UseAppHost=true
FROM $final_base_image_name$ AS final
WORKDIR /app
$expose_statements$
COPY --from=publish /app/publish .
ENTRYPOINT ["$assembly_name$.exe"]
|
combined_dataset/train/non-malicious/1741.ps1
|
1741.ps1
|
param(
[Parameter(HelpMessage="Artifact folder to find compliance files in.")]
[string[]]
$ArtifactFolder,
[Parameter(HelpMessage="VSTS Variable to set path to complinance Files.")]
[string]
$VSTSVariableName
)
$compliancePath = $null
foreach($folder in $ArtifactFolder)
{
Write-Host "ArtifactFolder: $folder"
$filename = Join-Path -Path $folder -ChildPath 'symbols.zip'
$parentName = Split-Path -Path $folder -Leaf
if ($parentName -match 'x64' -or $parentName -match 'amd64')
{
$name = 'x64'
}
elseif ($parentName -match 'x86') {
$name = 'x86'
}
elseif ($parentName -match 'fxdependent') {
$name = 'fxd'
}
else
{
throw "$parentName could not be classified as x86 or x64"
}
if (!(Test-Path $filename))
{
throw "symbols.zip for $VSTSVariableName does not exist"
}
if (!$compliancePath)
{
$parent = Split-Path -Path $folder
$compliancePath = Join-Path -Path $parent -ChildPath 'compliance'
}
$unzipPath = Join-Path -Path $compliancePath -ChildPath $name
Write-Host "Symbols-zip: $filename ; unzipPath: $unzipPath"
Expand-Archive -Path $fileName -DestinationPath $unzipPath
}
Write-Host "
|
combined_dataset/train/non-malicious/67.ps1
|
67.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-ApplicationCategory(){
[cmdletbinding()]
param
(
$Name
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileAppCategories"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Remove-ApplicationCategory(){
[cmdletbinding()]
param
(
$id
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileAppCategories"
try {
if($id -eq "" -or $id -eq $null){
write-host "No id specified for application category, can't remove application category..." -f Red
write-host "Please specify id for application category..." -f Red
break
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Delete
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$App = Get-ApplicationCategory -Name "LOB Apps 2" | Where-Object { $_.lastModifiedDateTime -ne "0001-01-01T00:00:00Z" }
if($App){
if(@($App).count -gt 1){
Write-Host "More than one Application Categrory has been found, please specify a single Application Category..." -ForegroundColor Red
Write-Host
}
elseif(@($App).count -eq 1){
Write-Host "Removing Application Category" $App.displayName -ForegroundColor Yellow
Remove-ApplicationCategory -id $App.id
}
}
else {
Write-Host "Application Category can't be found or its an inbuilt category name that can't be removed..." -ForegroundColor Yellow
Write-Host
}
|
combined_dataset/train/non-malicious/3710.ps1
|
3710.ps1
|
function Test-NewAzureRmCognitiveServicesAccount
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc;
Assert-NotNull $createdAccount;
$createdAccountAgain = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
Assert-NotNull $createdAccountAgain
Assert-AreEqual $createdAccount.Name $createdAccountAgain.Name;
Assert-AreEqual $createdAccount.Endpoint $createdAccountAgain.Endpoint;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-NewAzureRmCognitiveServicesAccountInvalidName
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname + ".invalid";
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
Assert-ThrowsContains { New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc;
Assert-NotNull $createdAccount; } 'Failed to create Cognitive Services account.'
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-NewAzureRmAllKindsOfCognitiveServicesAccounts
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
$locWU = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
$locGBL = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "Global";
try
{
New-AzResourceGroup -Name $rgname -Location 'West US';
Test-CreateCognitiveServicesAccount $rgname 'BingSearchTest' 'Bing.Search.v7' 'S1' $locGBL
Test-CreateCognitiveServicesAccount $rgname 'BingSpeechTest' 'SpeechServices' 'S0' $locWU
Test-CreateCognitiveServicesAccount $rgname 'BingSpellCheckTest' 'Bing.SpellCheck.v7' 'S1' $locGBL
Test-CreateCognitiveServicesAccount $rgname 'ComputerVisionTest' 'ComputerVision' 'S0' $locWU
Test-CreateCognitiveServicesAccount $rgname 'ContentModeratorTest' 'ContentModerator' 'S0' $locWU
Test-CreateCognitiveServicesAccount $rgname 'FaceTest' 'Face' 'S0' $locWU
Test-CreateCognitiveServicesAccount $rgname 'LUISTest' 'LUIS' 'S0' $locWU
Test-CreateCognitiveServicesAccount $rgname 'SpeakerRecognitionTest' 'SpeakerRecognition' 'S0' $locWU
Test-CreateCognitiveServicesAccount $rgname 'TextAnalyticsTest' 'TextAnalytics' 'S1' $locWU
Test-CreateCognitiveServicesAccount $rgname 'TextTranslationTest' 'TextTranslation' 'S1' $locGBL
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-RemoveAzureRmCognitiveServicesAccount
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S1';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force;
Assert-Throws { $accountGotten = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname; }
Assert-Null $accountGotten;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-GetAzureCognitiveServiceAccount
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$account = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname;
Assert-AreEqual $accountname $account.AccountName;
Assert-AreEqual $accounttype $account.AccountType;
Assert-AreEqual $loc $account.Location;
Assert-AreEqual $skuname $account.Sku.Name;
$accounts = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname;
$numberOfAccountsInRG = ($accounts | measure).Count;
Assert-AreEqual $accountname $accounts[0].AccountName;
Assert-AreEqual $accounttype $accounts[0].AccountType;
Assert-AreEqual $loc $accounts[0].Location;
Assert-AreEqual $skuname $accounts[0].Sku.Name;
$allAccountsInSubscription = Get-AzCognitiveServicesAccount;
$numberOfAccountsInSubscription = ($allAccountsInSubscription | measure).Count;
Assert-True { $numberOfAccountsInSubscription -ge $numberOfAccountsInRG }
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-SetAzureRmCognitiveServicesAccount
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$originalAccount = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname;
$changedAccount = Set-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -SkuName S3 -Tags @{Name = "testtag"; Value = "testval"} -Force;
Assert-AreEqual $originalAccount.Location $changedAccount.Location;
Assert-AreEqual $originalAccount.Endpoint $changedAccount.Endpoint;
Assert-AreEqual $originalAccount.Kind $changedAccount.Kind;
$gottenAccount = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname;
Assert-AreEqual $originalAccount.Location $gottenAccount.Location;
Assert-AreEqual $originalAccount.Endpoint $gottenAccount.Endpoint;
Assert-AreEqual $originalAccount.Kind $gottenAccount.Kind;
Assert-AreEqual 'S3' $gottenAccount.Sku.Name;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-GetAzureRmCognitiveServicesAccountKey
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$keys = Get-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname;
Assert-AreNotEqual $keys.Key1 $keys.Key2;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-NewAzureRmCognitiveServicesAccountKey
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$originalKeys = Get-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname;
$updatedKeys = New-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname -KeyName Key1 -Force;
Assert-AreNotEqual $originalKeys.Key1 $updatedKeys.Key1;
Assert-AreEqual $originalKeys.Key2 $updatedKeys.Key2;
$reupdatedKeys = New-AzCognitiveServicesAccountKey -ResourceGroupName $rgname -Name $accountname -KeyName Key2 -Force;
Assert-AreEqual $updatedKeys.Key1 $reupdatedKeys.Key1;
Assert-AreNotEqual $originalKeys.Key2 $reupdatedKeys.Key2;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-NewAzureRmCognitiveServicesAccountWithCustomDomain
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West Central US";
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force;
Assert-NotNull $createdAccount;
$createdAccountAgain = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force;
Assert-NotNull $createdAccountAgain
Assert-AreEqual $createdAccount.Name $createdAccountAgain.Name;
Assert-AreEqual $createdAccount.Endpoint $createdAccountAgain.Endpoint;
Assert-True {$createdAccount.Endpoint.Contains('cognitiveservices.azure.com')}
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-NewAzureRmCognitiveServicesAccountWithVnet
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$vnetname = 'vnet' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West Central US";
New-AzResourceGroup -Name $rgname -Location $loc;
$vnet = CreateAndGetVirtualNetwork $rgname $vnetname
$networkRuleSet = [Microsoft.Azure.Commands.Management.CognitiveServices.Models.PSNetworkRuleSet]::New()
$networkRuleSet.AddIpRule("200.0.0.0")
$networkRuleSet.AddVirtualNetworkRule($vnet.Subnets[0].Id)
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force -NetworkRuleSet $networkRuleSet;
Assert-NotNull $createdAccount;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-SetAzureRmCognitiveServicesAccountWithCustomDomain
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West Central US";
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
Assert-NotNull $createdAccount;
$changedAccount = Set-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -CustomSubdomainName $accountname -Force;
Assert-NotNull $changedAccount;
Assert-True {$changedAccount.Endpoint.Contains('cognitiveservices.azure.com')}
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-SetAzureRmCognitiveServicesAccountWithVnet
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$vnetname = 'vnet' + $rgname;
$skuname = 'S0';
$accounttype = 'Face';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "Central US EUAP";
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force;
Assert-NotNull $createdAccount;
$vnet = CreateAndGetVirtualNetwork $rgname $vnetname
$networkRuleSet = [Microsoft.Azure.Commands.Management.CognitiveServices.Models.PSNetworkRuleSet]::New()
$networkRuleSet.AddIpRule("200.0.0.0")
$networkRuleSet.AddVirtualNetworkRule($vnet.Subnets[0].Id)
$changedAccount = Set-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -NetworkRuleSet $networkRuleSet -Force;
Assert-NotNull $changedAccount;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-NetworkRuleSet
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$vnetname = 'vnet' + $rgname;
$skuname = 'S0';
$accounttype = 'Face';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "Central US EUAP";
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -CustomSubdomainName $accountname -Force;
Assert-NotNull $createdAccount;
$vnet = CreateAndGetVirtualNetwork $rgname $vnetname
$vnetid = $vnet.Subnets[0].Id
$vnetid2 = $vnet.Subnets[1].Id
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-Null $ruleSet
Update-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname -DefaultAction Deny
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 0 $ruleSet.IpRules.Count
Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count
Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 0 $ruleSet.IpRules.Count
Assert-AreEqual 1 $ruleSet.VirtualNetworkRules.Count
Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid2
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 0 $ruleSet.IpRules.Count
Assert-AreEqual 2 $ruleSet.VirtualNetworkRules.Count
Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 0 $ruleSet.IpRules.Count
Assert-AreEqual 1 $ruleSet.VirtualNetworkRules.Count
Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -VirtualNetworkResourceId $vnetid2
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 0 $ruleSet.IpRules.Count
Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count
Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -AccountName $accountname -IpAddressOrRange "16.17.18.0"
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 1 $ruleSet.IpRules.Count
Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count
Add-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -AccountName $accountname -IpAddressOrRange "16.17.18.1"
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 2 $ruleSet.IpRules.Count
Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count
Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -IpAddressOrRange "16.17.18.0"
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 1 $ruleSet.IpRules.Count
Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count
Remove-AzCognitiveServicesAccountNetworkRule -ResourceGroupName $rgname -Name $accountname -IpAddressOrRange "16.17.18.1"
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Deny' $ruleSet.DefaultAction
Assert-AreEqual 0 $ruleSet.IpRules.Count
Assert-AreEqual 0 $ruleSet.VirtualNetworkRules.Count
Update-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -AccountName $accountname -DefaultAction Allow -IPRule (@{IpAddress="200.0.0.0"},@{IpAddress="28.2.0.0/16"}) -VirtualNetworkRule (@{Id=$vnetid},@{Id=$vnetid2})
$ruleSet = Get-AzCognitiveServicesAccountNetworkRuleSet -ResourceGroupName $rgname -Name $accountname
Assert-NotNull $ruleSet
Assert-AreEqual 'Allow' $ruleSet.DefaultAction
Assert-AreEqual 2 $ruleSet.IpRules.Count
Assert-AreEqual 2 $ruleSet.VirtualNetworkRules.Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-GetAzureRmCognitiveServicesAccountSkus
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$skus = (Get-AzCognitiveServicesAccountSkus -Type 'TextAnalytics');
$skuNames = $skus | Select-Object -ExpandProperty Name | Sort-Object | Get-Unique
$expectedSkus = "F0", "S", "S0","S1", "S2", "S3", "S4"
Assert-AreEqualArray $expectedSkus $skuNames
$skus = (Get-AzCognitiveServicesAccountSkus -Type 'TextAnalytics' -Location 'westus');
$skuNames = $skus | Select-Object -ExpandProperty Name | Sort-Object | Get-Unique
$expectedSkus = "F0", "S", "S0","S1", "S2", "S3", "S4"
Assert-AreEqualArray $expectedSkus $skuNames
$skus = (Get-AzCognitiveServicesAccountSkus -Type 'QnAMaker' -Location 'global');
$skuNames = $skus | Select-Object -ExpandProperty Name | Sort-Object | Get-Unique
Assert-AreEqual 0 $skuNames.Count
}
finally
{
}
}
function Test-GetAzureRmCognitiveServicesAccountType
{
try
{
$typeName = (Get-AzCognitiveServicesAccountType -TypeName 'Face');
Assert-AreEqual 'Face' $typeName
$typeName = (Get-AzCognitiveServicesAccountType -TypeName 'InvalidKind');
Assert-Null $typeName
$typeNames = (Get-AzCognitiveServicesAccountType -Location 'westus');
Assert-True {$typeNames.Contains('Face')}
$typeNames = (Get-AzCognitiveServicesAccountType);
Assert-True {$typeNames.Contains('Face')}
$typeNames = (Get-AzCognitiveServicesAccountType -Location 'global');
Assert-False {$typeNames.Contains('Face')}
Assert-True {$typeNames.Contains('Bing.Search.v7')}
}
finally
{
}
}
function Test-PipingGetAccountToGetKey
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$keys = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname | Get-AzCognitiveServicesAccountKey;
Assert-AreNotEqual $keys.Key1 $keys.Key2;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-PipingToSetAzureAccount
{
$rgname = Get-CognitiveServicesManagementTestResourceName
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$account = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname;
$account | Set-AzCognitiveServicesAccount -SkuName S3 -Force;
$updatedAccount = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname;
Assert-AreEqual 'S3' $updatedAccount.Sku.Name;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-MinMaxAccountName
{
$rgname = Get-CognitiveServicesManagementTestResourceName
try
{
$shortname = 'aa';
$longname = 'testtesttesttesttesttesttesttesttesttesttesttesttesttesttesttest';
$skuname = 'S2';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US";
New-AzResourceGroup -Name $rgname -Location $loc;
$shortaccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $shortname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$longaccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $longname -Type $accounttype -SkuName $skuname -Location $loc -Force;
Assert-AreEqual $shortname $shortaccount.AccountName;
Assert-AreEqual $longname $longaccount.AccountName;
Retry-IfException { Remove-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Force; }
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-GetWithPaging
{
$rgname = Get-CognitiveServicesManagementTestResourceName
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"
try
{
$TotalCount = 100
New-AzResourceGroup -Name $rgname -Location $loc
For($i = 0; $i -lt $TotalCount ; $i++)
{
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name "facepaging_wu_$i" -Type 'Face' -SkuName 'S0' -Location $loc -Force;
}
For($i = 0; $i -lt $TotalCount ; $i++)
{
New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name "cvpaging_wu_$i" -Type 'ComputerVision' -SkuName 'S0' -Location $loc -Force;
}
$accounts = Get-AzCognitiveServicesAccount
Assert-AreEqual 200 $accounts.Count
$accounts = Get-AzCognitiveServicesAccount -ResourceGroupName $rgname
Assert-AreEqual 200 $accounts.Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-GetUsages
{
$rgname = Get-CognitiveServicesManagementTestResourceName;
try
{
$accountname = 'csa' + $rgname;
$skuname = 'S1';
$accounttype = 'TextAnalytics';
$loc = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"
New-AzResourceGroup -Name $rgname -Location $loc;
$createdAccount = New-AzCognitiveServicesAccount -ResourceGroupName $rgname -Name $accountname -Type $accounttype -SkuName $skuname -Location $loc -Force;
$usages1 = Get-AzCognitiveServicesAccountUsage -ResourceGroupName $rgname -Name $accountname
$usages2 = Get-AzCognitiveServicesAccountUsage -InputObject $createdAccount
$usages3 = Get-AzCognitiveServicesAccountUsage -ResourceId $createdAccount.Id
Assert-True {$usages1.Count -gt 0}
Assert-AreEqual 0.0 $usages1[0].CurrentValue
Assert-True {$usages1[0].Limit -gt 0}
Assert-AreEqual $usages1.Count $usages2.Count
Assert-AreEqual $usages2.Count $usages3.Count
Assert-AreEqual $usages1[0].CurrentValue $usages2[0].CurrentValue
Assert-AreEqual $usages2[0].CurrentValue $usages3[0].CurrentValue
Assert-AreEqual $usages1[0].Limit $usages2[0].Limit
Assert-AreEqual $usages2[0].Limit $usages3[0].Limit
}
finally
{
Clean-ResourceGroup $rgname
}
}
function CreateAndGetVirtualNetwork ($resourceGroupName, $vnetName, $location = "centraluseuap")
{
$subnet1 = New-AzVirtualNetworkSubnetConfig -Name "default" -AddressPrefix "200.0.0.0/24"
$subnet2 = New-AzVirtualNetworkSubnetConfig -Name "subnet" -AddressPrefix "200.0.1.0/24"
$vnet = New-AzvirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName -Location $location -AddressPrefix "200.0.0.0/16" -Subnet $subnet1,$subnet2
$getVnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName
return $getVnet
}
|
combined_dataset/train/non-malicious/sample_19_59.ps1
|
sample_19_59.ps1
|
ConvertFrom-StringData @'
id_sccm_activity_cm07serverinfo=Gathering Site Server Information
id_sccm_cmserverinfo_boundary=Obtaining Boundaries
id_sccm_cmserverinfo_cloud=Obtaining Cloud Services information
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEz70OyP3ct37m
# CjhXYIbm+w5jAZPhH90vUblZZ+dvqaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKKbRtTWtCihFbvVwIrzbs/w
# ALly6I/+m3HvjNQQbovCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAawMfM79gezURsw2Tv4sJ2dCXWlh/zjAoolpe5QjgWWF82rFMC/g8MIpR
# 2vM26l/wyxYU3IPnzCHb9Gl8WLGJUgJrCWDrj9wZkhHfw8RTRwEB8ZjvYu3PgvTK
# lMfZm/QdcxbpVQshcuZIzPmSFNUB0sheY+5nTHfeA01viIDtmkf/p2A0JhzLWat2
# h6DtniSnrm2vKMMnSamNJZmR+y+hnR4Ney9XAVoTTCgo748zQiIFCleM/2+CJ8gi
# jfT1yFdaMoFTGi8fqrW+L2qviA1O+m0YAuhcJpRO1bhr6giwxBmTa3SZ+acWg3Pd
# GkpBj0RVUkD0yL+KnGREscAKvH/kf6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCADnqf3kaXnmhNkxrhhGtNWtndzznZSusZXeJgeHaUSWwIGZusyQ1de
# GBMyMDI0MTAyODExNDA0MS44NTZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu
# 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6
# FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B
# EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b
# tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ
# X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP
# 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP
# 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp
# 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2
# uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG
# cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d
# OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8
# +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr
# YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ
# 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE
# DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9
# uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp
# Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n
# +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath
# RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX
# XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4
# CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE
# rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD
# hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK
# AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y
# M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7
# RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j
# /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty
# l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1
# Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP
# 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgdOMTtBxIpG3z
# xpUDxEOIxXkadRY8pr0JgfULle5yllIwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9
# MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB
# CwUABIICADYQ6DtDHxbQ9UAbxdZMFvhPjQm8UUWb6Li8Aj4NyjRv54hHSDh0p5t3
# j1WmKu5crcRt3BvrxcwvjEEYh7gCfw8ZdMnSRg1uEtD68eW1zhHsua8Y2gPdzMjb
# uiUXwxe6klRaLeRzvgpeVQcMdODtrnt245wyuRYDAsM4IYSeTEt8YsJ2aGwW+iPC
# YgbI5T3V3JnM+NK0M7YFHFBjUy80peN4cNXIqo/ZLt2pwDsDGVNsIPaXoIRgo3Ei
# PeyRxwui5PUtXu9koR/AAxeBjdDuQbqfVtyDQwntq3lgZ6rtc8Ylrt2YdW8pzNmE
# diPI7Djc+irshXn0w69soPcd8jOfVitw3Re7BpgbAg5WmhAfmkIslCFdMsF/FmoA
# IlWIGe5qzRkCDkdCW8sCj6+1Hd1cIvc/tHmuMufI0DS5XDeGZZUUmYY1gbJvqcPn
# wODtF/Oeu1G38FU9tQ60HK2ptKN96son6liL3Us+LsLcIS7IjZsw8+g+5FPQRemh
# Rgq6uZVOgXIT3P6fH0xQG/WU2MTbCokE+pl/ZHcGCo1KR0PlTBqvzgWoAhx5uIZy
# LA+wNNFD0gulPoLkUfMm8sbMXHqSYV3GMeNNafb1xAjDRYbPHpNoaRVbHjcPcEeb
# mPhbtt4d+bIiTC3ELL3L1B8bJwQ0FY+89CXLT2F3giwOxn0kNA7W
# SIG # End signature block
|
combined_dataset/train/non-malicious/250.ps1
|
250.ps1
|
function New-DjoinFile
{
[Cmdletbinding()]
PARAM (
[Parameter(Mandatory = $true)]
[System.String]$Blob,
[Parameter(Mandatory = $true)]
[System.IO.FileInfo]$DestinationFile = "c:\temp\djoin.tmp"
)
PROCESS
{
TRY
{
$bytechain = New-Object -TypeName byte[] -ArgumentList 2
$bytechain[0] = 255
$bytechain[1] = 254
$FileStream = $DestinationFile.Openwrite()
$bytechain += [System.Text.Encoding]::unicode.GetBytes($Blob)
$bytechain += 0
$bytechain += 0
$FileStream.write($bytechain, 0, $bytechain.Length)
$FileStream.Close()
}
CATCH
{
$Error[0]
}
}
}
|
combined_dataset/train/non-malicious/1694.ps1
|
1694.ps1
|
function Expand-OU ($searchroot) {
$searchrootarray = $searchroot.split('/') | ? {$_ -and $_ -notmatch '^(?:\s+)?$'}
$dn = ([adsi]"LDAP://$($searchrootarray[0])").distinguishedname.ToString()
$searchrootarray = $searchrootarray | select -Skip 1
foreach ($obj in $searchrootarray) {
$query = Get-ADObject -Filter * -SearchBase $dn -SearchScope OneLevel | select name, distinguishedname
if ($obj -in $query.name) {
$dn = ($query | ? name -eq $obj).distinguishedname
} else {
throw "could not find '$obj' in '$dn'"
}
}
Write-Output $dn
}
|
combined_dataset/train/non-malicious/sample_54_19.ps1
|
sample_54_19.ps1
|
param (
[string]$Workspace,
# [bool]$ModifyAllCaptions = $true
[string]$strModifyAllCaptions = "false"
)
if ($strModifyAllCaptions -eq "true") {
$ModifyAllCaptions = $true
}
else {
$ModifyAllCaptions = $false
}
$CreateJson = $PSScriptRoot + "\Create-Json.ps1"
$ProjectDir = Split-Path $Workspace -Parent
$AlcDir = Join-Path $ProjectDir "Compiler\"
$CacheDir = Join-Path $AlcDir ".alpackages"
$ALFiles = Get-ChildItem -Path $Workspace -Recurse -Filter "*.al"
$TranslationJson = Join-Path $Workspace "Translations\Translation.json"
$jsonData = Get-Content -Raw -Path $TranslationJson -Encoding UTF8 | ConvertFrom-Json -AsHashtable
$LineCount = 0
$ModifiedFiles = 0
$ModifiedLines = 0
$AllApps = $true
foreach ($ALFile in $ALFiles) {
$Modified = $false
$FileContent = Get-Content $ALFile -Encoding UTF8
for ($i = 0; $i -lt $FileContent.Length; $i++) {
$LineCount++
$Comment = ""
$Edited = $false
if ($null -eq $FileContent[$i]) {
continue
}
if ($FileContent[$i].ToLower() -match "(caption\s*=\s*'|label\s*'|tooltip\s*=\s*')") {
# filter Captions and Labels
if ($FileContent[$i].ToLower() -match "locked\s*=\s*true") {
continue
}
if (!$ModifyAllCaptions) {
if ($FileContent[$i].ToLower() -match "comment\s*=\s*'") {
continue
}
}
if ($FileContent[$i].ToString().Trim().Split(' ')[0].Contains("//")) {
continue
}
# determine Source Type
if ($FileContent[$i].ToLower().IndexOf("tooltip") -ne -1) {
$Source = "ToolTip = '"
}
elseif ($FileContent[$i].ToLower().IndexOf("optioncaption") -ne -1) {
$Source = "OptionCaption = '"
}
elseif ($FileContent[$i].ToLower().IndexOf("caption") -ne -1) {
$Source = "Caption = '"
}
elseif ($FileContent[$i].ToLower().IndexOf("label") -ne -1) {
$Source = "Label '"
}
# get Caption
if ($FileContent[$i].Contains("',")) {
$Caption = $FileContent[$i][($FileContent[$i].IndexOf("'") + 1)..($FileContent[$i].IndexOf("',") - 1)] -join ""
if ([string]::IsNullOrEmpty($FileContent[$i][($FileContent[$i].IndexOf("',") + 2)..$FileContent[$i].Length] -join "")) {
$FileContent[$i + 1] = $null
}
}
else {
$Caption = $FileContent[$i][($FileContent[$i].IndexOf("'") + 1)..($FileContent[$i].IndexOf("';") - 1)] -join ""
}
# check if Comment is in Translation.json
if (($jsonData[$Caption].DES -ne $Caption) -and (![string]::IsNullOrEmpty($jsonData[$Caption].DES))) {
$Comment = "Comment = '"+ $jsonData[$Caption].DES.Replace("'","''") + "'"
}
# check if Caption and Comment are identical
elseif ($jsonData[$Caption].DES -eq $Caption) {
$Comment = "Locked = true"
}
# check if Caption is a Comment in Translation.json
else {
foreach ($jsonObject in $jsonData.Keys) {
if (($jsonData[$jsonObject].DES -eq $Caption) -and ($jsonData[$jsonObject].ENU -ne $Caption)) {
$Comment = "Comment = `'"+ $Caption + "'"
$Caption = $jsonData[$jsonObject].ENU
$Edited = $true
break
}
}
if (!$Edited) {
$Comment = "Comment = ''"
}
}
if (($FileContent[$i].LastIndexOf(";") -ne -1) -and ($FileContent[$i].LastIndexOf(";") -gt ($FileContent[$i].LastIndexOf("',")))) {
$UpdatedLine = $FileContent[$i].Substring(0, ($FileContent[$i].ToLower().IndexOf($Source.ToLower()))) + $Source + $Caption + "', " + $Comment + $FileContent[$i].Substring($FileContent[$i].LastIndexOf(";"))
}
else {
$UpdatedLine = $FileContent[$i].Substring(0, ($FileContent[$i].ToLower().IndexOf($Source.ToLower()))) + $Source + $Caption + "', " + $Comment + ";"
}
if ($FileContent[$i] -ne $UpdatedLine) {
$Modified = $true
$ModifiedLines++
$FileContent[$i] = $UpdatedLine
if ($Comment -eq "Comment = ''") {
$FileContent[$i] += " //TODO Empty Translation"
}
}
}
}
if ($Modified) {
Set-Content $ALFile $FileContent -Encoding UTF8
$ModifiedFiles++
}
}
Write-Output "A total of $($ALFiles.Count) files with $($LineCount) lines were checked. `n $($ModifiedLines) lines in $($ModifiedFiles) files were modified."
Start-Sleep -Seconds 3
Set-Location $ProjectDir\RequiredApps
$BuildApps = Get-Content .\InstallOrder.json | ConvertFrom-Json
Set-Location $Workspace
$DependencyApps = (Get-Content .\app.json | ConvertFrom-Json).Dependencies.Name
# update Required Apps in Compiler\.alpackages
$RequiredApps = Join-Path $ProjectDir 'RequiredApps\*.app'
if (-not (Test-Path ($CacheDir))) {
New-Item $CacheDir -ItemType Directory | Out-Null
}
Copy-Item $RequiredApps $CacheDir
$Apps = [ordered]@{}
Set-Location $ProjectDir
$Folders = Get-ChildItem $ProjectDir -Directory
$BuildAppsList = $BuildApps.Apps | ForEach-Object { $_.Name }
foreach ($App in $BuildAppsList) {
foreach ($Folder in $Folders) {
Set-Location $Folder.Name
if (Test-Path "app.json") {
$AppInfo = Get-Content "app.json" -Encoding UTF8 -Raw | ConvertFrom-Json
if ($App -eq $AppInfo.Name) {
$AppValues = @{"DirectoryName" = $Folder.Name; "Name" = $AppInfo.Name}
$Apps.Add($AppInfo.Name, $AppValues)
}
}
Set-Location ..
}
}
foreach ($App in $Apps.Keys) {
if ($Apps[$App].DirectoryName -eq (Split-Path $Workspace -Leaf) -or $Apps[$App].Name -in $DependencyApps) {
Set-Location $ProjectDir
Remove-Item .\$($Apps[$App].DirectoryName)\Translations\*.g.xlf
Write-Output "Compilation of $($Apps[$App].Name)"
# define variables
$TempProjectDir = Join-Path $ProjectDir $Apps[$App].DirectoryName
$TranslationDir = Join-Path $TempProjectDir "Translations\"
$AppName = $Apps[$App].Name
$DirectoryName = $Apps[$App].DirectoryName
# compiler
Set-Location $AlcDir
$null = .\alc.exe /project:.\..\$DirectoryName /packagecachepath:$CacheDir
$AppValues = @{"DirectoryName" = $DirectoryName; "Name" = $AppName}
Set-Location $TranslationDir
if (Test-Path .\*.g.xlf) {
Write-Output "Compilation successful"
Set-Location $TempProjectDir
.$CreateJson $TempProjectDir
}
else {
Write-Output "$($AppName) could not be compiled`n"
}
Set-Location $TempProjectDir
Copy-Item .\*$AppName*.app (Join-Path $ProjectDir 'Compiler\.alpackages')
Set-Location $ProjectDir
}
}
# remove Project Apps from Compiler\.alpackages
Set-Location $CacheDir
$Apps.Keys | ForEach-Object {
$AppKey = $_
Get-ChildItem -Recurse -Filter "*.app" | Where-Object { $_.Name -like "*$AppKey*" } | Remove-Item
}
$null = $AllApps # suppress Warning
|
combined_dataset/train/non-malicious/sample_22_55.ps1
|
sample_22_55.ps1
|
#
# Module manifest for module 'OCI.PSModules.Cloudbridge'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '23fab747-5070-4685-94b0-d91859b2fd98'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudbridge Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent',
'Get-OCICloudbridgeAgentDependenciesList',
'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList',
'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset',
'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource',
'Get-OCICloudbridgeAssetSourceConnectionsList',
'Get-OCICloudbridgeAssetSourcesList',
'Get-OCICloudbridgeDiscoverySchedule',
'Get-OCICloudbridgeDiscoverySchedulesList',
'Get-OCICloudbridgeEnvironment',
'Get-OCICloudbridgeEnvironmentsList',
'Get-OCICloudbridgeHistoricalMetricsList',
'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory',
'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest',
'Get-OCICloudbridgeWorkRequestErrorsList',
'Get-OCICloudbridgeWorkRequestLogsList',
'Get-OCICloudbridgeWorkRequestsList',
'Import-OCICloudbridgeInventory',
'Invoke-OCICloudbridgeAnalyzeAssets',
'Invoke-OCICloudbridgeRefreshAssetSource',
'Invoke-OCICloudbridgeSubmitHistoricalMetrics',
'Move-OCICloudbridgeAgentCompartment',
'Move-OCICloudbridgeAgentDependencyCompartment',
'Move-OCICloudbridgeAssetCompartment',
'Move-OCICloudbridgeAssetSourceCompartment',
'Move-OCICloudbridgeAssetTags',
'Move-OCICloudbridgeDiscoveryScheduleCompartment',
'Move-OCICloudbridgeEnvironmentCompartment',
'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency',
'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource',
'New-OCICloudbridgeDiscoverySchedule',
'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory',
'Remove-OCICloudbridgeAgent',
'Remove-OCICloudbridgeAgentDependency',
'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource',
'Remove-OCICloudbridgeDiscoverySchedule',
'Remove-OCICloudbridgeEnvironment',
'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest',
'Update-OCICloudbridgeAgent',
'Update-OCICloudbridgeAgentDependency',
'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource',
'Update-OCICloudbridgeDiscoverySchedule',
'Update-OCICloudbridgeEnvironment',
'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_38_29.ps1
|
sample_38_29.ps1
|
const lang = Object.freeze({ "displayName": "CUE", "fileTypes": ["cue"], "name": "cue", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "captures": { "1": { "name": "keyword.other.package" }, "2": { "name": "entity.name.namespace" } }, "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(package)[ \\t]+([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)(?![\\p{L}\\p{Nd}_\\$\\#])" }, { "patterns": [{ "begin": "(?<![\\p{L}\\p{Nd}_\\$\\#])(import)[ \\t]+(\\()", "beginCaptures": { "1": { "name": "keyword.other.import" }, "2": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.imports", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "captures": { "1": { "name": "entity.name.namespace" }, "2": { "name": "punctuation.definition.string.begin" }, "3": { "name": "string.quoted.double-import" }, "4": { "name": "punctuation.colon" }, "5": { "name": "entity.name" }, "6": { "name": "punctuation.definition.string.end" } }, "match": '(?:([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)[ \\t]+)?(")([^:"]+)(?:(:)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*))?(")', "name": "meta.import-spec" }, { "match": ";", "name": "punctuation.separator" }, { "include": "#invalid_in_parens" }] }, { "captures": { "1": { "name": "keyword.other.import" }, "2": { "name": "entity.name.namespace" }, "3": { "name": "punctuation.definition.string.begin" }, "4": { "name": "string.quoted.double-import" }, "5": { "name": "punctuation.colon" }, "6": { "name": "entity.name" }, "7": { "name": "punctuation.definition.string.end" } }, "match": '(?<![\\p{L}\\p{Nd}_\\$\\#])(import)[ \\t]+(?:([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)[ \\t]+)?(")([^:"]+)(?:(:)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*))?(")', "name": "meta.import" }] }, { "include": "#punctuation_comma" }, { "include": "#declaration" }, { "include": "#invalid_in_braces" }], "repository": { "attribute_element": { "patterns": [{ "begin": "([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(=)", "beginCaptures": { "1": { "name": "variable.other" }, "2": { "name": "punctuation.bind" } }, "end": "(?=[,\\)])", "patterns": [{ "include": "#attribute_string" }] }, { "begin": "([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(\\()", "beginCaptures": { "1": { "name": "variable.other" }, "2": { "name": "punctuation.attribute-elements.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.attribute-elements.end" } }, "patterns": [{ "include": "#punctuation_comma" }, { "include": "#attribute_element" }] }, { "include": "#attribute_string" }] }, "attribute_string": { "patterns": [{ "include": "#string" }, { "match": `[^\\n,"'#=\\(\\)]+`, "name": "string.unquoted" }, { "match": "[^,\\)]+", "name": "invalid" }] }, "comment": { "patterns": [{ "captures": { "1": { "name": "punctuation.definition.comment" } }, "match": "(//).*$\\n?", "name": "comment.line" }, { "begin": "/\\*", "captures": { "0": { "name": "punctuation.definition.comment" } }, "end": "\\*/", "name": "comment.block" }] }, "declaration": { "patterns": [{ "begin": "(@)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(\\()", "beginCaptures": { "1": { "name": "punctuation.definition.annotation" }, "2": { "name": "variable.annotation" }, "3": { "name": "punctuation.attribute-elements.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.attribute-elements.end" } }, "name": "meta.annotation", "patterns": [{ "include": "#punctuation_comma" }, { "include": "#attribute_element" }] }, { "match": "(?<!:)::(?!:)", "name": "punctuation.isa" }, { "include": "#punctuation_colon" }, { "match": "\\?", "name": "punctuation.option" }, { "match": "(?<![=!><])=(?![=~])", "name": "punctuation.bind" }, { "match": "<-", "name": "punctuation.arrow" }, { "include": "#expression" }] }, "expression": { "patterns": [{ "patterns": [{ "captures": { "1": { "name": "keyword.control.for" }, "2": { "name": "variable.other" }, "3": { "name": "punctuation.separator" }, "4": { "name": "variable.other" }, "5": { "name": "keyword.control.in" } }, "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(for)[ \\t]+([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(?:[ \\t]*(,)[ \\t]*([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+))?[ \\t]+(in)(?![\\p{L}\\p{Nd}_\\$\\#])" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])if(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "keyword.control.conditional" }, { "captures": { "1": { "name": "keyword.control.let" }, "2": { "name": "variable.other" }, "3": { "name": "punctuation.bind" } }, "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(let)[ \\t]+([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)[ \\t]*(=)(?![=])" }] }, { "patterns": [{ "match": "[\\+\\-\\*]|/(?![/*])", "name": "keyword.operator" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:div|mod|quo|rem)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "keyword.operator.word" }, { "match": "=[=~]|![=~]|<=|>=|[<](?![-=])|[>](?![=])", "name": "keyword.operator.comparison" }, { "match": "&{2}|\\|{2}|!(?![=~])", "name": "keyword.operator.logical" }, { "match": "&(?!&)|\\|(?!\\|)", "name": "keyword.operator.set" }] }, { "captures": { "1": { "name": "punctuation.accessor" }, "2": { "name": "variable.other.member" } }, "match": "(?<!\\.)(\\.)([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(?![\\p{L}\\p{Nd}_\\$\\#])" }, { "patterns": [{ "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])_(?!\\|)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.top" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])_\\|_(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.bottom" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])null(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.null" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:true|false)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "constant.language.bool" }, { "patterns": [{ "patterns": [{ "match": "(?<![\\p{L}\\p{Nd}_\\.])[0-9](?:_?[0-9])*\\.(?:[0-9](?:_?[0-9])*)?(?:[eE][\\+\\-]?[0-9](?:_?[0-9])*)?(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.float.decimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])[0-9](?:_?[0-9])*[eE][\\+\\-]?[0-9](?:_?[0-9])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.float.decimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])\\.[0-9](?:_?[0-9])*(?:[eE][\\+\\-]?[0-9](?:_?[0-9])*)?(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.float.decimal" }] }, { "patterns": [{ "patterns": [{ "match": "(?<![\\p{L}\\p{Nd}_\\.])(?:0|[1-9](?:_?[0-9])*)(?:\\.[0-9](?:_?[0-9])*)?(?:[KMGTPEYZ]i?)(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.other" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])\\.[0-9](?:_?[0-9])*(?:[KMGTPEYZ]i?)(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.other" }] }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])(?:0|[1-9](?:_?[0-9])*)(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.decimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])0b[0-1](?:_?[0-1])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.binary" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])0[xX][0-9a-fA-F](?:_?[0-9a-fA-F])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.hexadecimal" }, { "match": "(?<![\\p{L}\\p{Nd}_\\.])0o?[0-7](?:_?[0-7])*(?![\\p{L}\\p{Nd}_\\.])", "name": "constant.numeric.integer.octal" }] }] }, { "include": "#string" }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:bool|u?int(?:8|16|32|64|128)?|float(?:32|64)?|string|bytes|number|rune)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "support.type" }, { "patterns": [{ "begin": "(?<![\\p{L}\\p{Nd}_\\$\\#])(len|close|and|or)(\\()", "beginCaptures": { "1": { "name": "support.function" }, "2": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.function-call", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "begin": "(?<![\\p{L}\\p{Nd}_\\$\\#])([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*)(\\.)(\\p{Lu}[\\p{L}\\p{Nd}_\\$\\#]*)(\\()", "beginCaptures": { "1": { "name": "support.module" }, "2": { "name": "punctuation" }, "3": { "name": "support.function" }, "4": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.function-call", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }] }, { "match": "(?<![\\p{L}\\p{Nd}_\\$\\#])(?:[\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)(?![\\p{L}\\p{Nd}_\\$\\#])", "name": "variable.other" }, { "begin": "\\{", "beginCaptures": { "0": { "name": "punctuation.definition.struct.begin" } }, "end": "\\}", "endCaptures": { "0": { "name": "punctuation.definition.struct.end" } }, "name": "meta.struct", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#punctuation_ellipsis" }, { "include": "#declaration" }, { "include": "#invalid_in_braces" }] }, { "begin": "\\[", "beginCaptures": { "0": { "name": "punctuation.section.brackets.begin" } }, "end": "\\]", "endCaptures": { "0": { "name": "punctuation.section.brackets.end" } }, "name": "meta.brackets", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_colon" }, { "include": "#punctuation_comma" }, { "include": "#punctuation_ellipsis" }, { "captures": { "1": { "name": "variable.other" }, "2": { "name": "punctuation.alias" } }, "match": "([\\p{L}\\$\\#][\\p{L}\\p{Nd}_\\$\\#]*|_[\\p{L}\\p{Nd}_\\$\\#]+)[ \\t]*(=)" }, { "include": "#expression" }, { "match": "[^\\]]+", "name": "invalid" }] }, { "begin": "\\(", "beginCaptures": { "0": { "name": "punctuation.section.parens.begin" } }, "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.parens.end" } }, "name": "meta.parens", "patterns": [{ "include": "#whitespace" }, { "include": "#comment" }, { "include": "#punctuation_comma" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }] }] }, "invalid_in_braces": { "match": "[^\\}]+", "name": "invalid" }, "invalid_in_parens": { "match": "[^\\)]+", "name": "invalid" }, "punctuation_colon": { "match": "(?<!:):(?!:)", "name": "punctuation.colon" }, "punctuation_comma": { "match": ",", "name": "punctuation.separator" }, "punctuation_ellipsis": { "match": "(?<!\\.)\\.{3}(?!\\.)", "name": "punctuation.ellipsis" }, "string": { "patterns": [{ "begin": '#"""', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double-multiline", "end": '"""#', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\#(?:"""|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": '#"', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double", "end": '"#', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\#(?:"|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": "#'''", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single-multiline", "end": "'''#", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\#(?:'''|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": "#'", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single", "end": "'#", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\#(?:'|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\#(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\#\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\#.", "name": "invalid.illegal" }] }, { "begin": '"""', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double-multiline", "end": '"""', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\(?:"""|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": '"', "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.double", "end": '"', "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": '\\\\(?:"|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})', "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "invalid.illegal" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": "'''", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single-multiline", "end": "'''", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\(?:'''|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": "'", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.single", "end": "'", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string", "patterns": [{ "match": "\\\\(?:'|/|\\\\|[abfnrtv]|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})", "name": "constant.character.escape" }, { "match": "\\\\(?:[0-7]{3}|x[0-9A-Fa-f]{2})", "name": "constant.character.escape" }, { "begin": "\\\\\\(", "beginCaptures": { "0": { "name": "punctuation.section.interpolation.begin" } }, "contentName": "source.cue.embedded", "end": "\\)", "endCaptures": { "0": { "name": "punctuation.section.interpolation.end" } }, "name": "meta.interpolation", "patterns": [{ "include": "#whitespace" }, { "include": "#expression" }, { "include": "#invalid_in_parens" }] }, { "match": "\\\\.", "name": "invalid.illegal" }] }, { "begin": "`", "beginCaptures": { "0": { "name": "punctuation.definition.string.begin" } }, "contentName": "string.quoted.backtick", "end": "`", "endCaptures": { "0": { "name": "punctuation.definition.string.end" } }, "name": "meta.string" }] }, "whitespace": { "match": "[ \\t\\r\\n]+" } }, "scopeName": "source.cue" });
var cue = [
lang
];
export {
cue as default
};
|
combined_dataset/train/non-malicious/sample_58_97.ps1
|
sample_58_97.ps1
|
<#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
$MetaData = @{
"OperationType" = @("Deployment")
"UIName" = 'Azure Stack HCI SBE Health'
"UIDescription" = 'Check SBE Health requirements'
}
function Test-AzStackHciSBEHealth
{
param (
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
$Parameters,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
$OperationType,
[parameter(Mandatory = $false)]
[switch]
$FailFast
)
try
{
$env:EnvChkrOp = $OperationType
Trace-Execution "Starting SBE Health validation for $OperationType"
if ($OperationType -eq 'Deployment')
{
Trace-Execution "Checking SBE Configuration"
$sbeConfigNuget = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.SBEConfiguration"
# Only run tests if the SBE Package is 4.1.x.x or later
$sbeVerMatch = "[4-9]\.[1-9]\."
if ($sbeConfigNuget -notmatch $sbeVerMatch)
{
$detailedMessage = "SBE Configuration nuget '$($sbeConfigNuget)' does not support this test. Must be version 4.1.x.x or later."
Trace-Execution $detailedMessage
return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = $detailedMessage})
}
$sbeMetadataPath = Join-Path -Path $sbeConfigNuget -ChildPath "content"
Trace-Execution "Getting SBE Package source local path"
$sbeSourcePath = $Parameters.Roles["SBE"].PublicConfiguration.PublicInfo.SBEContentPaths.SBESeedNodePath
if ($null -eq $sbeSourcePath)
{
$detailedMessage = "SBE Seed Node Path property did not get populated. Please retry the deployment."
Trace-Execution $detailedMessage
throw $detailedMessage
}
Trace-Execution "Getting PSSessions for all hosts"
$psSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters)
$params = @{
PsSession = $psSession
PassThru = $true
OutputPath = "$($env:LocalRootFolderPath)\MASLogs\"
Tag = $OperationType
SBESourcePath = $sbeSourcePath
SBEMetadataPath = $sbeMetadataPath
ECEParameters = $Parameters
}
# Run SBE Health Check
[array]$sbeResult = Invoke-AzStackHciSBEHealthValidation @params
return [EnvironmentValidator]::ParseResult($sbeResult, 'SBEHealth', $FailFast)
}
elseif ($OperationType -eq 'AddNode')
{
# TODO : Future placeholder for when AddNode tests are implemented
Trace-Execution "SBE Health validation for $OperationType has not been implemented yet"
return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'SBE Health validation has been skipped as this OperationType is not yet supported.'})
<#
$sbeSourcePath = # TODO : need to use path that exists after deployment
$sbeMetadataPath = # TODO : need to use path that exists after deployment
$addNode = [EnvironmentValidator]::GetNodeContext($Parameters)
$psSession = [EnvironmentValidator]::NewPsSessionByHost($Parameters, $addNode, $true)
$params = @{
PsSession = $psSession
PassThru = $true
OutputPath = "$($env:LocalRootFolderPath)\MASLogs\"
Tag = $OperationType
SBESourcePath = $sbeSourcePath
SBEMetadataPath = $sbeMetadataPath
}
# Run SBE Health Check
[array]$sbeResult = Invoke-AzStackHciSBEHealthValidation @params
return [EnvironmentValidator]::ParseResult($sbeResult, 'SBEHealth', $FailFast)
#>
}
else
{
Trace-Execution "OperationType $OperationType is not implemented"
return (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'SBE Health validation has been skipped as this OperationType is not yet supported.'})
}
}
catch
{
Trace-Execution "Validator failed. $PSItem"
Trace-Execution "$($PSItem.ScriptStackTrace)"
throw $PSItem
}
finally
{
if ($psSession)
{
$psSession | Microsoft.PowerShell.Core\Remove-PSSession
}
}
}
Export-ModuleMember -Function Test-AzStackHciSBEHealth -Variable MetaData
# SIG # Begin signature block
# MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDtyRK7oLrK7Dl
# Z46ND3ewz/pg9Twqefy2C46qemDDDKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGggwghoEAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINo+gAQshbfLNNdxA/dLx5xK
# G88hsZCVQ2EG79G3HB56MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAm/osx7prw7EaoB63YfmIwF2qszkaoUbS6j9sOB7Zm7Stp+KGM/Hfx6yw
# 5H6GEvVY1WUh6gtmRGG+jmd+p9ppHcodsnw4AESAN3bLPD4EtfnUktX8DuOSAN8r
# lqIkmCTDdH9KfXmCXeJgNaPXvhCttETLzeDZZvNzy+WpoXe6YsuFtierAnGXlM0z
# u4Vl8fO7CLCDHFWf7CZOZAY6SB1kNQdIT/t2WSD15G8XNvZqOwnb6EsrJ/vvmPNu
# a86R2S+mWUVwYOw5W3EWDPPcWk/6M4RosXg9WndN24EeUsiqIK514SgTihTizMhU
# Rr4aJxRJ2p7wHzF7RqnBK0OMcHy2+aGCF5IwgheOBgorBgEEAYI3AwMBMYIXfjCC
# F3oGCSqGSIb3DQEHAqCCF2swghdnAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCnrPRjEe0vNdFsUsRclgjvjiF0MS5aQ4UA4n2ysTwv+QIGZkYZ0Mu1
# GBIyMDI0MDUxNjE4NDQyNi4zNVowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# EekwggcgMIIFCKADAgECAhMzAAAB6FCwgM8rcplNAAEAAAHoMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUy
# MloXDTI1MDMwNTE4NDUyMlowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpEQzAwLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOFBd0TRbNcbvDN4L1IZ0fp5XB0aUXpiClTvB44UGSlb
# 3K4SYlIMTUAMHH/QNO5EFqmVIPwJHVCrJCbFEMP8J28PJ5kUBxnqXb6eUyyyZnIL
# xM+3UZNYBS3cZdRTqDQXS0isU0uCh8KM6+bcbSPjzZW60pLjBlPps1WcFWwKGvYC
# OZVsYM3/pCz8SpqQvlzCkZ6XW17tQ7Xd1TBo+M7LRaLWpg2ZHyLtPWW6PYl0V19m
# Ew/KrKr80Odm441JuPwUznEoGhqvXatqALz/UJdovU4xcHAZpGglNi2SyL2eO6rj
# AORwDCK0JnkG1DY2o9nSUuJAHs7XQGb3Okdaf3HX8eZ0CfiSgxYpQPAfmx3/MO7i
# +LzzsVbGbniSRY2+TwV5DtlnRDmCoYpbiDqt69XYh0DEGhtZ2iurC/OovvRZ2yAN
# T8/lzQvy9giyRQll50IYczaEciw1HLD0QWhKiUMz7IJ52TPr3vzuzycinnmJwt8O
# grDmFqTkboxYXp3vW1w3NX36/1FAoxrpTB/Kq6t513mypdYJe/76F6TgDXlbJshz
# q59PSKVrMphm8O+hqzCCM/RJ4tbua+ZzDQUQvMXX+5ZpcSUsc5ciWJ4oXaL9jNDp
# TnQr11uGcxoNwlKwbSFctFPL8tBuw4PSHDsW4rSebOi1LH/l+j2Dt8LOgWOTe0MT
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU+jlbyj3zSQx9FVBtrpPfgfB6UtowHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAJZ9wmbavBe0+LviSbo8oCSeL34Fai2r5C0M
# aB5PkXeujs+whQ0pGRTK24aojy2EvclytvTfHoM6mlgkQD6lvqjao+MV107VMuq9
# Jetib46AIsv7v7cWZGZ+RG7yse+mtpvQ7X3ANu6SA7wjk6LVF6AwmXy3mT9S0TRZ
# vfMCU4ecKMsZLM/8Ojem3CFeiSTTYi8PtJkQFs9ugZu3DgsIexPakVqSkY4GH4hJ
# QxcF/zfkK5U1913DGbIa81LPITISTmHVWHu2nA/vPusn4eyI/ix2oGOPoC+im5/i
# vFQB+sRtXpqPy3AWztZUc2IiCsc2dr/nmTKsAb1i3X0I++RTDFgrS5m8+XZYLf2d
# 9zSM5OOK8Luz8hSjMTi1/Lck2TJDVw229l+2JfePkO354s564YOO+Em9gwgSSmRX
# rxcs0fv5kF9hr4+Z9FhqgUUcIkoShFJnc9sMk8GISFn3K7Ex12gwxDX1OTJ+2i3o
# TPReFKbCNgGrf0O8EVaGXIMYGGtTca14NaJV31gZIHZafG4UzLl9sArqjw9bPxBE
# yKm1ccrccMGvbBZYRyuuBxO4dkglOp6k2hiXH1VEW+P+8JdoAVyaRbWeTtUT6jBp
# evlEmOvIOr25uTIOrWZ2sX+B5pEAtdw1lt81ciSFfNcDprwKJqZxBb8OCYsmmJVA
# 2uJlgIcgMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA0ww
# ggI0AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAIwk
# bi+DSO4w5WfYG4oAJS8/zQW6oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp8JhPMCIYDzIwMjQwNTE2MTQzNTU5
# WhgPMjAyNDA1MTcxNDM1NTlaMHMwOQYKKwYBBAGEWQoEATErMCkwCgIFAOnwmE8C
# AQAwBgIBAAIBIDAHAgEAAgISVzAKAgUA6fHpzwIBADA2BgorBgEEAYRZCgQCMSgw
# JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
# DQEBCwUAA4IBAQCOT5bRicuEqnRI5E0caLgnNSQ7Vi72RryEXQqyd5cZj/DtxVdL
# seJ4w3rO7G+NiRtp+rg25NiOe+/8cFb3vd3x4N/brf4W902cvPzG7ZpXlqVcTJAk
# FBQNiUykGRJVQn5FCV742dRskYN02/8zJUxYydjDVR2SyVJnPXXD24DJO7LXXoHS
# EBpXWeyD0hsHEjp7RpNpfO+6mrK2UXQ6ES4gA9m1CwNTM/yLrLcbsgL03b0BmsPj
# YLEAjvOC0pq46Ot/I8Nij4P4peKn4jUwxtgZB4n0ndlTvFMlMl5UpN8gq5Zv6wc6
# tAAOVUZ35JmqFwnktcn+5tMSzIQWg+g4M9h3MYIEDTCCBAkCAQEwgZMwfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwDQYJ
# YIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkq
# hkiG9w0BCQQxIgQgci20c3sgYGsZipLHxd80IojV9FN2rotm+dkCLjny31EwgfoG
# CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAq0trE1QKEIIJB0efaTaooHtMXyU9i
# d1PFtUnPB/jrHTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# AhMzAAAB6FCwgM8rcplNAAEAAAHoMCIEIKfQhif/JIYIV+HN3IDTHOvgwatUZFsm
# t3B7KGyU0gQ2MA0GCSqGSIb3DQEBCwUABIICAIrgNlthZRhwEOrAt+13Th8uz13Z
# 4pzCls51LiJGw1xX1X20auHbnYnbjMaEVEjbBS2+zSixrJHkGiyRCBxbn3Zzzs+A
# nPe5jPzX6pPPUGnzkPf031En+yDyaGTDeV/yLrAz+R55QVpSjVq3mb4/aXnAEyE2
# ntIH1pZl6f2R2Y+d6kuxA6lb5lnAvDdqDdww2Z2bw4sFdzz9NiZB9iEW0nujxP60
# 1sJSqVe9i0e0ds3g2BnY4YX1iyJMhs2o17w4Qwg4ZOQU3LAs+pSwJXs7amp+J/sW
# icB6YyOAZQjtSptQofTCINflI9Ol7gIf3WGytxAd7LudzsyYipdUvUg7L6tkQih5
# fdpZLF914oGwzL/Bz7x/q+mMmSF4pCa4N82WQUTbr+Rd95HD6Ny50pElwbtmCvW8
# c0R/oSh0JxE2ljdak4F3zKGjRZbPu1WFSKlvg67+2IgDBoeS5DT3NWfqwvMkXIx8
# TrKEzGxcVYrNLaUNj4vce7H4cSmcyr+5o/ay0j9shBkUUsohywyo+XmTw0HVmKWU
# mYfGJExHlXQj/7CKvoiQA3b5xiU1vLOgJsTpbRJV6sKKEJOUlzLu1USHifNhQg8O
# J/WK8dh5Z1kafdnyjkzNvAoAzqCktTQPMWiTopVZxITtK/pcKXeaqqyqTMZG0Goq
# IrR4ZCJohJ8Hdhsu
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_16_44.ps1
|
sample_16_44.ps1
|
#
# Module manifest for module 'OCI.PSModules.Aidocument'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aidocument.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '48b9296a-b4a7-43bb-8d59-3eaf832baf2a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aidocument Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aidocument.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAidocumentModel', 'Get-OCIAidocumentModelsList',
'Get-OCIAidocumentProcessorJob', 'Get-OCIAidocumentProject',
'Get-OCIAidocumentProjectsList', 'Get-OCIAidocumentWorkRequest',
'Get-OCIAidocumentWorkRequestErrorsList',
'Get-OCIAidocumentWorkRequestLogsList',
'Get-OCIAidocumentWorkRequestsList',
'Invoke-OCIAidocumentAnalyzeDocument',
'Invoke-OCIAidocumentPatchModel',
'Move-OCIAidocumentModelCompartment',
'Move-OCIAidocumentProjectCompartment', 'New-OCIAidocumentModel',
'New-OCIAidocumentProcessorJob', 'New-OCIAidocumentProject',
'Remove-OCIAidocumentModel', 'Remove-OCIAidocumentProject',
'Stop-OCIAidocumentProcessorJob', 'Stop-OCIAidocumentWorkRequest',
'Update-OCIAidocumentModel', 'Update-OCIAidocumentProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aidocument'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_37_99.ps1
|
sample_37_99.ps1
|
#
# Module manifest for module 'OCI.PSModules.Generativeaiinference'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Generativeaiinference.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '59f586b4-fbb6-47fb-9d66-75ada44be30d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Generativeaiinference Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeaiinference.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Invoke-OCIGenerativeaiinferenceEmbedText',
'Invoke-OCIGenerativeaiinferenceSummarizeText',
'New-OCIGenerativeaiinferenceText'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeaiinference'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/150.ps1
|
150.ps1
|
function Remove-PSObjectProperty
{
PARAM (
$PSObject,
[String[]]$Property)
PROCESS
{
Foreach ($item in $Property)
{
$PSObject.psobject.Properties.Remove("$item")
}
}
}
|
combined_dataset/train/non-malicious/Add new smtp_set prmary.ps1
|
Add new smtp_set prmary.ps1
|
#alias,addnewemailaddress
import-csv .\\source.csv | foreach {
$user = Get-Mailbox $_.alias
$user.emailAddresses+= $_.addnewemailaddress
$user.primarysmtpaddress = $_.addnewemailaddress
Set-Mailbox $user -emailAddresses $user.emailAddresses
set-Mailbox $user -PrimarySmtpAddress $user.primarysmtpaddress
}
|
combined_dataset/train/non-malicious/Hack ESXi_2.ps1
|
Hack ESXi_2.ps1
|
$screen = " You see here a virtual switch. ------------ ------
#...........| |....|
--------------- ###------------ |...(|
|..%...........|########## ###-@...|
|...%...........### # ## |....|
+.......<......| ### ### |..!.|
--------------- ### ### ------
---.----- ###
|.......|####
---------
.
Clyde the Sysadmin St:7 Dx:9 Co:10 In:18 Wi:18 Ch:6 Chaotic Evil
Dlvl:3 $:120 HP:39(41) Pw:36(36) AC:6 Exp:5 T:1073
"
Set-VMHostAdvancedConfiguration -name Annotations.WelcomeMessage -value $screen
|
combined_dataset/train/non-malicious/2124.ps1
|
2124.ps1
|
Describe "Scripting.Followup.Tests" -Tags "CI" {
It "'[void](New-Item) | <Cmdlet>' should work and behave like passing AutomationNull to the pipe" {
try {
$testFile = Join-Path $TestDrive (New-Guid)
[void](New-Item $testFile -ItemType File) | ForEach-Object { "YES" } | Should -BeNullOrEmpty
$testFile | Should -Exist
} finally {
Remove-Item $testFile -Force -ErrorAction SilentlyContinue
}
}
It "'[void]`$arraylist.Add(1) | <Cmdlet>' should work and behave like passing AutomationNull to the pipe" {
$arraylist = [System.Collections.ArrayList]::new()
[void]$arraylist.Add(1) | ForEach-Object { "YES" } | Should -BeNullOrEmpty
$arraylist.Count | Should -Be 1
$arraylist[0] | Should -Be 1
}
It "'`$arraylist2.Clear() | <Cmdlet>' should work and behave like passing AutomationNull to the pipe" {
$arraylist = [System.Collections.ArrayList]::new()
$arraylist.Add(1) > $null
$arraylist.Clear() | ForEach-Object { "YES" } | Should -BeNullOrEmpty
$arraylist.Count | Should -Be 0
}
}
|
combined_dataset/train/non-malicious/sample_29_61.ps1
|
sample_29_61.ps1
|
#
# Module manifest for module 'OCI.PSModules.Governancerulescontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Governancerulescontrolplane.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '96ae80bb-9cf9-48b1-b722-28d177d3da7a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Governancerulescontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Governancerulescontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRule',
'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRulesList',
'Get-OCIGovernancerulescontrolplaneGovernanceRule',
'Get-OCIGovernancerulescontrolplaneGovernanceRulesList',
'Get-OCIGovernancerulescontrolplaneInclusionCriteriaList',
'Get-OCIGovernancerulescontrolplaneInclusionCriterion',
'Get-OCIGovernancerulescontrolplaneTenancyAttachment',
'Get-OCIGovernancerulescontrolplaneTenancyAttachmentsList',
'Get-OCIGovernancerulescontrolplaneWorkRequest',
'Get-OCIGovernancerulescontrolplaneWorkRequestErrorsList',
'Get-OCIGovernancerulescontrolplaneWorkRequestLogsList',
'Get-OCIGovernancerulescontrolplaneWorkRequestsList',
'Invoke-OCIGovernancerulescontrolplaneRetryGovernanceRule',
'Invoke-OCIGovernancerulescontrolplaneRetryTenancyAttachment',
'New-OCIGovernancerulescontrolplaneGovernanceRule',
'New-OCIGovernancerulescontrolplaneInclusionCriterion',
'Remove-OCIGovernancerulescontrolplaneGovernanceRule',
'Remove-OCIGovernancerulescontrolplaneInclusionCriterion',
'Stop-OCIGovernancerulescontrolplaneWorkRequest',
'Update-OCIGovernancerulescontrolplaneGovernanceRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Governancerulescontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_12_81.ps1
|
sample_12_81.ps1
|
# Rule ID 4628
# ---------
# http://sharepoint/sites/rules/Rule%20Submissions/Dynamics-CRM_ehagen_2012-06-11-03-02-42.xml
#
# Description: This checks to see if the data types on each CRM registry key is correct.
#
# Related KB
#-----------
# Script Author: jrandall
#
PARAM($RegistryPath=$null)
#region function
function Get-MSCRMRegistryKeys{
param ([string] $RegKeyPath)
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;
}
$RegInfoObjs = @()
if (Test-Path $RegKeyPath){
$MSCRMKey = Get-Item $RegKeyPath
if ($MSCRMKey -ne $null){
$regInfo = GetRegistryProperties $MSCRMKey
}
$RegInfoObjs += $regInfo
#Handle the subkeys
$childItems = Get-ChildItem -Path $MSCRMKey.PSPath -Recurse
foreach ($item in $childItems){
if ($item.ValueCount -gt 0){
$childRegInfo = GetRegistryProperties $item
}
$RegInfoObjs += $childRegInfo
}
#finally return the collection
return $RegInfoObjs
}
}
function GetRegistryDataType([string] $type){
switch ($type){
"Binary" {return "REG_BINARY"}
"Dword" {return "REG_DWORD"}
"String" {return "REG_SZ"}
"Qword" {return "REG_QWORD"}
"ExpandString" {return "REG_EXPAND_SZ"}
"MultiString" {return "REG_MULTI_SZ"}
default {return $type}
}
}
function GetRegistryProperties{
param ([Object]$key )
$PropertiesCollected=@()
$valueNames = $key.GetValueNames()
foreach ($valueName in $valueNames){
$RegistryValueObj = new-object PSObject
$RegistryValueObj | add-member -membertype noteproperty -name "Name" -value $valueName
$RegistryValueObj | Add-Member -MemberType NoteProperty -Name "DataType" -Value (GetRegistryDataType $key.GetValueKind($valueName).ToString())
$RegistryValueObj | Add-Member -MemberType NoteProperty -Name "Value" -Value $key.GetValue($valueName)
$PropertiesCollected += $RegistryValueObj
}
return $PropertiesCollected
}
function ValidateDataTypes{
param([Object] $registryObjectCollection,
[Object] $InformationCollected)
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;
}
$detectedObjs = @()
$detectedObjs = $registryObjectCollection | Where-Object {($_.DataType -ne "REG_DWORD") -and ($_.DataType -ne "REG_SZ") -and ($_ -ne $null)}
if ($detectedObjs -ne $null -or $detectedObjs.Count -gt 0){
#found issues, loop through and add them to the Information Collected object
foreach ($detectedObj in $detectedObjs){
$InformationCollected | add-member -membertype noteproperty -name "The Microsoft CRM Registry Key $($detectedObj.Name) has an incorrect Data Type :" -value "Current Data Type is $($detectedObj.DataType)"
}
return $true
}else{
return $false
}
}
#endregion function
Import-LocalizedData -BindingVariable LocalizedMessages
Write-DiagProgress -Activity $LocalizedMessages.PROGRESSBAR_ID_REGISTRYDATATYPECHECK -Status $LocalizedMessages.PROGRESSBAR_ID_REGISTRYDATATYPECHECKDesc
"--> Entered TS_REGISTRYDATATYPECHECK.ps1" | WriteTo-StdOut
$Error.Clear()
$RootCauseDetected = $false
$RuleApplicable = $true
$RootCauseName = "RC_REGISTRYDATATYPEINCORRECT"
$InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=MSS;EN-US;113012110154455"
$PublicContentURL=""
$SolutionTitle="The data type on one or more the Microsoft Dynamics CRM Registry Keys is incorrect"
$Verbosity = "Error"
$Visibility = "3"
$SupportTopicsID = "11953"
$InformationCollected = new-object PSObject
$arrRegInfoObjs = Get-MSCRMRegistryKeys -RegKeyPath $RegistryPath
$RootCauseDetected = ValidateDataTypes $arrRegInfoObjs $InformationCollected
if ($RootCauseDetected){
# Red/ Yellow Light
Update-DiagRootCause -Id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -Verbosity $Verbosity -SolutionTitle $SolutionTitle -PublicContentURL $PublicContentURL -SupportTopicsID $SupportTopicsID -InformationCollected $InformationCollected
}else{
# Green Light
Update-DiagRootCause -Id $RootCauseName -Detected $false
}
"<-- Exited TS_REGISTRYDATATYPECHECK.ps1" | WriteTo-StdOut
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBVaIQBtDQv8wK9
# pxWD95UygAKfna/qfCfUZ5+WhZgEnaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPz5
# gJAgc8WjgNIBgV81TXwqcaYCh/poAaQZBq8iix1uMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAJcfSFFfi7rD+t7hDrj+XClrrXNHmR/JUmbMN
# M+xrIeapPZRMAxkakyufrYXWATEBBlotjvChUJK8NCjeTcg82sPFYcHLBXUz30Ho
# 9rgZCfnTrISh0KOQR/+DTKpbSMJ7aEPWqPkUPtKxE7UDcrpCGmV0OzCy1kuIaWjM
# ZSW+BBKfzDMJIHF+6Fqx3SevSjsoimkq6ss7gVCQNUiYJyG3dwv2JAasb+UPi/zj
# 6wp7AU2fuQPxAmDOK1ZOYuNerIJrxABMvZj+lJkCXNZoyooEvX+vq/138Uu5ZQro
# mBQ9THJDZ9+PbdgHpEkMqa0dqaelb1aDX8HkCzrjjo54hypSTKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAv//0sWrmsKeGIiCeb6KbwBAq9uuNzEniz
# xyfFQsaccAIGZut4BYxTGBMyMDI0MTAyODExNDAzOS45ODRaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ
# lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38
# 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC
# fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D
# cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA
# ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT
# M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB
# Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo
# u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0
# PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88
# 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv
# eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/
# 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4
# Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6
# I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa
# QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV
# 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS
# s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5
# WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q
# 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK
# CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi
# TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y
# Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0
# MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA
# AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3
# UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS
# TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3
# FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO
# RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB
# NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgcpTSuAf8G2DYiAqNyxZ4zlSf6fZ2RS01zBB6dmS0bpUwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT
# hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1
# KYILMA0GCSqGSIb3DQEBCwUABIICAEiL6N0RzUyis7YICiKFp7KtYbY9YvpYz2GQ
# i1icubtG5A+zLuc7iXURtluH06A1tqIUPLrmw2wOPmUnvfbIIIVm1gPDdpPUWKY0
# 18/AhoZHZGNC1cAywf0hztOCnQ4w412OiY0cYpzHMB/vo6viUgUwxY+ilmhG8yI+
# GBvdpXg2TJafJiVGEPKCZrVm9yUTXG2WBELzZvvl+xNjJlHnSei+S189d3PSgvcX
# SpneXRjjQu0DFY0o/DeELUmpwRmr95dZmKpQVLd1TQR3X2XL/Jby/h3edOFSLdSP
# iYeKpARB5ObXeWGUxtBYw1PVP/9jpVb57gMQk3BIzpgy8UkBSRRVYnN5CkD/WagU
# P77sVdCm0BkJW9ZcfEXw7FVPpX8oyTaqfB7VUQ8g5XT2uLQmTwgwIXW7yvav6gvk
# /FSHO/DauxkPwhflLNKZtVz+vBQ/hmah6ovsHmE9xbFJ8iYFobPOALrXhyJ4nGyb
# rwxXsPiwJCpFnJD7vw0G+yEQPBvhAer/4e0vEwgwNGbAshh08Ym3E3ioEvPgoAlC
# 7P/pZNOI6pxj4NNZiLX8Sgrid2kUAj+nkcehfpwPQDPWtbZWU8ZU6WJmqL+Z4A1T
# UQ7u/hMaWR/alFaNBP/mIxFWr3y71xHO3sHrIA0gh8pwceZYjtuLJvJQWOurE0oR
# ABgr80jF
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-RemoteRegistry.ps1
|
Get-RemoteRegistry.ps1
|
# Get-RemoteRegistry
# NOTE: you have to have access, and the remote registry service has to be running
param(
[string]$computer = $(Read-Host "Remote Computer Name")
,[string]$Path = $(Read-Host "Remote Registry Path (must start with HKLM,HKCU,etc)")
,[switch]$Verbose
)
if ($Verbose) { $VerbosePreference = 2 } # Only affects this script.
$root, $last = $Path.Split("\\")
$last = $last[-1]
$Path = $Path.Substring($root.Length + 1,$Path.Length - ( $last.Length + $root.Length + 2))
#split the path to get a list of subkeys that we will need to access
# ClassesRoot, CurrentUser, LocalMachine, Users, PerformanceData, CurrentConfig, DynData
switch($root) {
"HKCR" { $root = "ClassesRoot"}
"HKCU" { $root = "CurrentUser" }
"HKLM" { $root = "LocalMachine" }
"HKU" { $root = "Users" }
"HKPD" { $root = "PerformanceData"}
"HKCC" { $root = "CurrentConfig"}
"HKDD" { $root = "DynData"}
default { return "Path argument is not valid" }
}
#Access Remote Registry Key using the static OpenRemoteBaseKey method.
Write-Verbose "Accessing $root from $computer"
$rootkey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($root,$computer)
if(-not $rootkey) { Write-Error "Can't open the remote $root registry hive" }
Write-Verbose "Opening $Path"
$key = $rootkey.OpenSubKey( $Path )
if(-not $key) { Write-Error "Can't open $($root + '\\' + $Path) on $computer" }
$subkey = $key.OpenSubKey( $last )
if($subkey) {
$subkey.GetSubKeyNames() | foreach { "{0}\\" -f $_ }
$subkey.GetValueNames() | foreach { "({3}) {0} = {1}" -f $_, $subkey.GetValue($_), $subkey.GetValueKind($_) }
}
else
{
$key.GetValue($last)
}
|
combined_dataset/train/non-malicious/Highlight syntax_1.ps1
|
Highlight syntax_1.ps1
|
#code which need highlight
$code = @'
#just example
Get-Process | % {
try {
"{0, 7} {1}" -f $_.Id, $_.MainModule.ModuleName
}
catch [System.ComponentModel.Win32Exception] {}
}
'@
function frmMain_Show {
Add-Type -AssemblyName System.Windows.Forms
#keywords
$type = New-Object "Collections.Generic.Dictionary[String, [Drawing.Color]]"
$type["Command"] = [Drawing.Color]::Cyan
$type["Comment"] = [Drawing.Color]::Gray
$type["GroupStart"] = [Drawing.Color]::Orange
$type["GroupEnd"] = [Drawing.Color]::Orange
$type["Keyword"] = [Drawing.Color]::FromArgb(0, 255, 0)
$type["Member"] = [Drawing.Color]::Tomato
$type["Operator"] = [Drawing.Color]::Linen
$type["String"] = [Drawing.Color]::Yellow
$type["Type"] = [Drawing.Color]::Silver
$type["Variable"] = [Drawing.Color]::Crimson
#main form
$frmMain = New-Object Windows.Forms.Form
$txtEdit = New-Object Windows.Forms.RichTextBox
#
#txtEdit
#
$txtEdit.BackColor = [Drawing.Color]::FromArgb(1, 36, 86)
$txtEdit.Dock = "Fill"
$txtEdit.Font = New-Object Drawing.Font("Courier New", 10, [Drawing.FontStyle]::Bold)
$txtEdit.Text = $code
#
#frmMain
#
$frmMain.ClientSize = New-Object Drawing.Size(490, 190)
$frmMain.Controls.Add($txtEdit)
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.MaximizeBox = $false
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "gregzakh@gmail.com"
#counter
$i = 0
#highlight code
[Management.Automation.PSParser]::Tokenize(
$txtEdit.Text,
[ref](New-Object "Collections.ObjectModel.Collection[Management.Automation.PSParseError]")
) | % {
$txtEdit.SelectionStart = $_.Start - $i
$txtEdit.SelectionLength = $_.Length
#skip unnecessary types
if ($_.Type -eq "LineContinuation" -or $_.Type -eq "NewLine") {
$i++
}
else {
$txtEdit.SelectionColor = $type[$_.Type.ToString()]
}
}
#when done
$txtEdit.DeselectAll()
#show form
[void]$frmMain.ShowDialog()
}
frmMain_Show
|
combined_dataset/train/non-malicious/vibackup-lx_1.ps1
|
vibackup-lx_1.ps1
|
Param (
$viServer,
$bakVM,
$lxDest
)
#region check
if (!$viServer) { $viServer = Read-Host -Prompt "VI Server " }
if (!$bakVM) { $bakVM = Read-Host -Prompt "VM to Backup " }
if (!$lxDest) { $lxDest = Read-Host -Prompt "Backup Path (ex. /srv/backup) " }
#endregion
#region globalvars
$encoding = "OEM"
$version = "0.7"
$scriptout = @()
[regex]$curlpat = "(\\s{1})+(.*vmdk$)"
#endregion
#region stkmvars
$viUser = "vmware"
$viPass = "vmware"
#endregion
Write-Host "viBackup Script Generator - " $version
Write-Host "--------------------------------------------"
if (($vmCon = Connect-VIServer -Protocol https $viServer) -eq "") { exit }
$vm = Get-VM $bakVM -Server $vmCon -ErrorAction SilentlyContinue
if (!$vm) {
Write-Host "No VM found."
Write-Host "Enter the Display Name from the VI Center:" -NoNewline
$tvm = Read-Host
if (!($vm=Get-VM $tvm -ErrorAction SilentlyContinue)) {
return $false
exit
}
Write-Host "You have entered 2 different Names. Please check that the VMX and the VM Name are the same!"
Write-Host -ForegroundColor yellow "Entered VMX Name: {$bakVM}"
Write-Host -ForegroundColor yellow "Entered VM Name: {$tvm}"
Write-Host -ForegroundColor yellow "Returned VM Name: {$vm}"
Write-Host -ForegroundColor yellow "IS THIS CORRECT (Yes/No)?:" -NoNewline
$sure = Read-Host
if ($sure -ne "yes") { exit }
}
#check Snapshots
if ((Get-Snapshot -VM $vm -Server $vmCon)) {
Write-Host "VM has Snapshots. No Backup possible."
return $false
exit
}
#check HardDisk Mode
foreach ($hd in $vm.harddisks) {
if ($hd.Persistence -ne "Persistent") {
write-host "Hard Disk is not Persistent - no Snapshot allowed."
return $false
exit
}
}
#write script
$scriptname = $vm.name + ".sh"
$vmname = $vm.name
$vmhost = $vm.Host
$vmview= Get-View $vm.id
$vmvname = $vmview.config.files.vmpathname
#generate Text
$header = "#!/bin/bash"
$user = "USER=`"${viUser}`""
$pass = "PASS=`"${viPass}`""
$dest = "DEST=`"${lxDest}`""
$lxVM = "VM=`"${vmname}`""
$dcPath = $vm | Get-Datacenter
#region writefile
$scriptout += $header
$scriptout += $user
$scriptout += $pass
$scriptout += $dest
$scriptout += $lxvm
$scriptout += ""
$scriptout += "BKUP=`"${vmvname}`""
$scriptout += "SNAPCHECK=``vmware-cmd -H ${viserver} -T ${vmhost} -U `${USER} -P `${PASS} `"`${BKUP}`" hassnapshot`` "
$scriptout += "if [ `"`$SNAPCHECK`" != `"hassnapshot () =`" ]; then `n echo 'VM has a Snapshot. Aborting...' `n exit `n fi"
$scriptout += "vmrun -T esx -h https://${viserver}/sdk -u `${USER} -p `${PASS} snapshot `"`${BKUP}`" vmBackup"
# Hard Disk
foreach ($hd in $vm.Harddisks) {
$hdname = $hd.Filename
$patstr = $curlpat.split($hdname)
#dirty hack
$patstr[0] = $patstr[0].replace("[","")
$patstr[0] = $patstr[0].replace("]","")
$dsPath = $patstr[0].replace(" ","%20")
$vmdkpath = $patstr[2].replace(" ","%20")
$vmdkflatpath = $patstr[2].replace(".vmdk","-flat.vmdk")
#curl options
$vmdk = "curl --user `${USER}:`${PASS} -o `${DEST}/`${VM}.vmdk `"https://${viserver}/folder/${vmdkpath}?dcPath=${dcPath}&dsName=${dsPath}`" --insecure "
$vmdkflat = "curl --user `${USER}:`${PASS} -o `${DEST}/`${VM}.vmdk `"https://${viserver}/folder/${vmdkflatpath}?dcPath=${dcPath}&dsName=${dsPath}`" --insecure"
#$vmdk = "vifs --server ${viserver} --dc 'KM' --username `${USER} --password `${PASS} --get `"``echo $hdname```" `${DEST}/`${VM}.vmdk "
#$vmdkflat = "vifs --server ${viserver} --dc 'KM' --username `${USER} --password `${PASS} --get `"``echo $hdname | sed 's/.vmdk/-flat.vmdk/g'```" `${DEST}/`${VM}-flat.vmdk "
$scriptout += $vmdk
$scriptout += $vmdkflat
}
$scriptout += "vmrun -T esx -h https://${viserver}/sdk -u `${USER} -p `${PASS} deleteSnapshot `"`${BKUP}`" vmBackup"
$scriptout | Out-File $scriptname -Encoding $encoding
#endregion
Write-Host "Finished"
Write-Host "Don't forget to convert the script under *nix/Linux with dos2unix!"
|
combined_dataset/train/non-malicious/3729.ps1
|
3729.ps1
|
function Test-GetActionRulesFilteredByParameters
{
$severityFilter = "Sev3"
$monitorService = "Platform"
$actionRules = Get-AzActionRule -Severity $severityFilter -MonitorService $monitorService
Assert-NotNull $actionRules.Count
}
function Test-CreateUpdateAndDeleteSuppressionRule
{
try
{
$resourceGroupName = Get-TestResourceGroupName "suppression"
$location = Get-ProviderLocation ResourceManagement
$actionRuleName = Get-TestActionRuleName "suppression"
New-AzResourceGroup -Name $resourceGroupName -Location $location -Force
$createdActionRule = Set-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Scope "/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/alertslab","/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/Test-VMs" -SeverityCondition "Equals:Sev0,Sev1" -MonitorCondition "NotEquals:Resolved" -Description "Test description" -Status "Enabled" -ActionRuleType "Suppression" -ReccurenceType "Weekly" -SuppressionStartTime "06/26/2018 06:00:00" -SuppressionEndTime "07/27/2018 06:00:00" -ReccurentValue 1,4,6
Assert-NotNull $createdActionRule
$updatedActionRule = Update-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Status "Disabled"
Assert-NotNull $updatedActionRule
Assert-AreEqual "Disabled" $updatedActionRule.Status
}
finally
{
CleanUp $resourceGroupName $actionRuleName
}
}
function Test-CreateUpdateAndDeleteActionGroupRule
{
try
{
$resourceGroupName = Get-TestResourceGroupName "actiongroup"
$location = Get-ProviderLocation ResourceManagement
$actionRuleName = Get-TestActionRuleName "actiongroup"
New-AzResourceGroup -Name $resourceGroupName -Location $location -Force
$createdActionRule = Set-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Scope "/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/alertslab","/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/Test-VMs" -SeverityCondition "Equals:Sev0,Sev1" -MonitorCondition "NotEquals:Resolved" -Description "Test description" -Status "Enabled" -ActionRuleType "ActionGroup" -ActionGroupId "/subscriptions/1e3ff1c0-771a-4119-a03b-be82a51e232d/resourceGroups/alertscorrelationrg/providers/Microsoft.insights/actiongroups/testAG"
Assert-NotNull $createdActionRule
$updatedActionRule = Update-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Status "Disabled"
Assert-NotNull $updatedActionRule
Assert-AreEqual "Disabled" $updatedActionRule.Status
}
finally
{
CleanUp $resourceGroupName $actionRuleName
}
}
function Test-CreateUpdateAndDeleteDiagnosticsRule
{
try
{
$resourceGroupName = Get-TestResourceGroupName "diag"
$location = Get-ProviderLocation ResourceManagement
$actionRuleName = Get-TestActionRuleName "diag"
New-AzResourceGroup -Name $resourceGroupName -Location $location -Force
$createdActionRule = Set-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Scope "/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/alertslab","/subscriptions/dd91de05-d791-4ceb-b6dc-988682dc7d72/resourceGroups/Test-VMs" -SeverityCondition "Equals:Sev0,Sev1" -MonitorCondition "NotEquals:Resolved" -Description "Test description" -Status "Enabled" -ActionRuleType "Diagnostics"
Assert-NotNull $createdActionRule
$updatedActionRule = Update-AzActionRule -ResourceGroupName $resourceGroupName -Name $actionRuleName -Status "Disabled"
Assert-NotNull $updatedActionRule
Assert-AreEqual "Disabled" $updatedActionRule.Status
}
finally
{
CleanUp $resourceGroupName $actionRuleName
}
}
|
combined_dataset/train/non-malicious/sample_19_52.ps1
|
sample_19_52.ps1
|
parameters:
- name: PAT
type: string
- name: isPreRelease
type: string
- name: ghCreateRelease
type: boolean
- name: ghReleaseAddChangeLog
type: boolean
steps:
- pwsh: |
$vsixFileName = (Get-ChildItem -File | Select-Object -First 1).Name
Write-Host "##vso[task.setvariable variable=VSIX;isOutput=true]$vsixFileName"
name: GetExtensionName
displayName: 🗄 Get VSIX file name
workingDirectory: $(Pipeline.Workspace)/extension
- pwsh: |
$isPreRelease = "${{ parameters.isPreRelease }}"
Write-Host "Package path is: $(Pipeline.Workspace)/extension"
if ($isPreRelease -eq "false") {
npx @vscode/vsce publish --packagePath "$(Pipeline.Workspace)/extension/$(GetExtensionName.VSIX)"
} elseif ($isPreRelease -eq "true") {
npx @vscode/vsce publish --packagePath "$(Pipeline.Workspace)/extension/$(GetExtensionName.VSIX)" --pre-release
} else {
Write-Host "The value of isPreRelease parameter must be 'true' or 'false'."
exit 1
}
displayName: 🚀 Publish extension
env:
VSCE_PAT: ${{ parameters.PAT }}
- ${{ if eq(parameters.ghCreateRelease, true) }}:
- checkout: self
displayName: 🔖 Checkout repo for tag
- bash: |
TAG=$(git tag --sort=-creatordate | head -n 1)
echo "Git tag is $TAG"
echo "##vso[task.setvariable variable=TAG;isOutput=true]$TAG"
name: CaptureGitTag
displayName: 🔖 Capture git tag
workingDirectory: $(Build.SourcesDirectory)
- task: GitHubRelease@0
displayName: 🐙 Github release
inputs:
gitHubConnection: microsoft
addChangelog: ${{ parameters.ghReleaseAddChangeLog }}
tagSource: manual
tag: $(CaptureGitTag.TAG)
assets: $(Pipeline.Workspace)/extension/$(GetExtensionName.VSIX)
isPreRelease: ${{ parameters.isPreRelease }}
|
combined_dataset/train/non-malicious/sample_52_92.ps1
|
sample_52_92.ps1
|
#
# Module manifest for module 'OCI.PSModules.Fusionapps'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Fusionapps.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c9914632-5a3e-4af3-a2ca-7e0a4764c70c'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Fusionapps Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Fusionapps.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIFusionappsAdminUsersList',
'Get-OCIFusionappsDataMaskingActivitiesList',
'Get-OCIFusionappsDataMaskingActivity',
'Get-OCIFusionappsFusionEnvironment',
'Get-OCIFusionappsFusionEnvironmentFamiliesList',
'Get-OCIFusionappsFusionEnvironmentFamily',
'Get-OCIFusionappsFusionEnvironmentFamilyLimitsAndUsage',
'Get-OCIFusionappsFusionEnvironmentFamilySubscriptionDetail',
'Get-OCIFusionappsFusionEnvironmentsList',
'Get-OCIFusionappsFusionEnvironmentStatus',
'Get-OCIFusionappsRefreshActivitiesList',
'Get-OCIFusionappsRefreshActivity',
'Get-OCIFusionappsScheduledActivitiesList',
'Get-OCIFusionappsScheduledActivity',
'Get-OCIFusionappsServiceAttachment',
'Get-OCIFusionappsServiceAttachmentsList',
'Get-OCIFusionappsTimeAvailableForRefreshesList',
'Get-OCIFusionappsWorkRequest',
'Get-OCIFusionappsWorkRequestErrorsList',
'Get-OCIFusionappsWorkRequestLogsList',
'Get-OCIFusionappsWorkRequestsList',
'Invoke-OCIFusionappsVerifyServiceAttachment',
'Move-OCIFusionappsFusionEnvironmentCompartment',
'Move-OCIFusionappsFusionEnvironmentFamilyCompartment',
'New-OCIFusionappsDataMaskingActivity',
'New-OCIFusionappsFusionEnvironment',
'New-OCIFusionappsFusionEnvironmentAdminUser',
'New-OCIFusionappsFusionEnvironmentFamily',
'New-OCIFusionappsRefreshActivity',
'New-OCIFusionappsServiceAttachment',
'Remove-OCIFusionappsFusionEnvironment',
'Remove-OCIFusionappsFusionEnvironmentAdminUser',
'Remove-OCIFusionappsFusionEnvironmentFamily',
'Remove-OCIFusionappsRefreshActivity',
'Remove-OCIFusionappsServiceAttachment',
'Reset-OCIFusionappsFusionEnvironmentPassword',
'Update-OCIFusionappsFusionEnvironment',
'Update-OCIFusionappsFusionEnvironmentFamily',
'Update-OCIFusionappsRefreshActivity'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Fusionapps'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3759.ps1
|
3759.ps1
|
function Test-CreateIntegrationAccountCertificate
{
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountCertificateName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer"
$integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-CreateIntegrationAccountCertificatePrivateKey
{
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountCertificateName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1"
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-CreateIntegrationAccountCertificatePublicKey
{
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountCertificateName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer"
$integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1"
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-UpdateIntegrationAccountCertificate
{
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountCertificateName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer"
$integrationAccountCertificate = New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificate.Name
$integrationAccountCertificateUpdated = Set-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -Force
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificateUpdated.Name
Assert-AreEqual "PRIVATEKEY" $integrationAccountCertificateUpdated.Key.KeyName
$integrationAccountCertificateUpdated = Set-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyVersion "273ab4059bd84b81bbb8308df706379a" -Force
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificateUpdated.Name
Assert-AreEqual "273ab4059bd84b81bbb8308df706379a" $integrationAccountCertificateUpdated.Key.KeyVersion
$integrationAccountCertificateUpdated = Set-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -Force
Assert-AreEqual $integrationAccountCertificateName $integrationAccountCertificateUpdated.Name
Assert-AreEqual "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" $integrationAccountCertificateUpdated.Key.KeyVault.Id
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-GetIntegrationAccountCertificate
{
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountCertificateName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer"
New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath
$result = Get-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName
Assert-AreEqual $integrationAccountCertificateName $result.Name
$result1 = Get-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName
Assert-True { $result1.Count -gt 0 }
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
function Test-RemoveIntegrationAccountCertificate
{
$resourceGroup = TestSetup-CreateResourceGroup
$integrationAccountName = "IA-" + (getAssetname)
$integrationAccountCertificateName = getAssetname
$integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName
$certFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "IntegrationAccountCertificate.cer"
New-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -KeyName "PRIVATEKEY" -KeyVersion "273ab4059bd84b81bbb8308df706379a" -KeyVaultId "/subscriptions/f34b22a3-2202-4fb1-b040-1332bd928c84/resourcegroups/DONOTDELETE-IntegrationAccountPsCmdletTest/providers/microsoft.keyvault/vaults/IntegrationAccountVault1" -PublicCertificateFilePath $certFilePath
Remove-AzIntegrationAccountCertificate -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -CertificateName $integrationAccountCertificateName -Force
Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force
}
|
combined_dataset/train/non-malicious/Compare-AD.ps1
|
Compare-AD.ps1
|
###############################################################################
# Compare-AD - a set of functions (and sample code using them) to create
# snapshots of user accounts in the current Active Directory domain
# save them in an xml file, and then compare live AD environment
# against that XML
#
# (C) Dmitry Sotnikov
# http://dmitrysotnikov.wordpress.com/2008/10/14/compare-ad-against-snapshotscompare-ad-against-snapshots
#
###############################################################################
# Requires QAD cmdlets
if ((Get-PSSnapin "Quest.ActiveRoles.ADManagement" `
-ErrorAction SilentlyContinue) -eq $null) {
Add-PSSnapin "Quest.ActiveRoles.ADManagement"
}
###############################################################################
# Functions
###############################################################################
# Retrives all AD users from the current domain and stores the selected
# set of properties (passed as an array of strings in the $properties parameter)
# as an xml file by the path passed as $path
# See sample use below
function New-Snapshot {
param($path, $properties)
Get-QADUser -SizeLimit 0 -DontUseDefaultIncludedProperties `
-IncludedProperties $properties |
Select $properties | Export-Clixml $path
}
# Load the snapshot and compare it against current AD domain
function Compare-ActiveDirectory {
param($path, $properties)
# $old is the snapshot, $new is the current environment data
$old = Import-Clixml $path
$new = Get-QADUser -SizeLimit 0 -DontUseDefaultIncludedProperties `
-IncludedProperties $properties |
Select $properties
# First lets report the ones which got created or deleted
$diff = Compare-Object $old $new -Property Name
$created = , ($diff | where { $_.SideIndicator -eq "=>" })
$deleted = , ($diff | where { $_.SideIndicator -eq "<=" })
if ( $created.Count -gt 0 ) {
"New accounts:"
$created | Format-Table Name
}
if ( $deleted.Count -gt 0 ) {
"Deleted accounts:"
$deleted | Format-Table Name
}
# Now let's load the accounts in a hash-table so it is easier to locate them
$hash = @{}
$new | ForEach-Object { $hash[$_.DistinguishedName] = $_ }
# Let's enumerate the accounts and their properties and report any changes
"Modified objects:"
foreach ( $snapshot in $old ) {
$current = $hash[$snapshot.DistinguishedName]
if ( $current -and
($current.ModificationDate -ne $snapshot.ModificationDate )) {
@"
Object $($snapshot.distinguishedname)
Modified at $($current.ModificationDate)
Property`tOld Value`tNew Value
========`t=========`t=========
"@
foreach ($property in $properties) {
if ( ($property -ne "ModificationDate") -and
($snapshot.$property -ne $current.$property )) {
"$property`t$($snapshot.$property)`t$($current.$property)"
}
}
}
}
}
###############################################################################
# Common parameters
###############################################################################
# These are the properties to be compared
# Make sure they include Name, DistinguishedName, and ModificationDate
# Remove the TS attributes if your system requirements for retrieving those
# are not met:
# http://dmitrysotnikov.wordpress.com/2008/07/23/system-requirements-for-powershell-terminal-services-management/
$Members_to_Compare = @( "Name", "DistinguishedName", "ModificationDate",
"AccountIsDisabled", "AccountIsLockedOut", "AccountName",
"CanonicalName", "City", "Company", "Department", "Description",
"DisplayName", "Email", "Fax",
"FirstName", "HomeDirectory", "HomeDrive", "HomePhone", "Initials",
"LastName", "LdapDisplayName", "LogonName", "LogonScript", "Manager",
"MobilePhone", "Notes", "Office", "Pager",
"ParentContainerDN", "PasswordNeverExpires",
"PhoneNumber", "PostalCode", "PostOfficeBox", "ProfilePath",
"SamAccountName", "StateOrProvince", "StreetAddress", "Title",
"TsAllowLogon", "TsBrokenConnectionAction", "TsConnectClientDrives",
"TsConnectPrinterDrives", "TsDefaultToMainPrinter", "TsHomeDirectory",
"TsHomeDrive", "TsInitialProgram", "TsMaxConnectionTime",
"TsMaxDisconnectionTime", "TsMaxIdleTime", "TsProfilePath",
"TsReconnectionAction", "TsRemoteControl", "TsWorkDirectory",
"UserPrincipalName", "WebPage" )
# Path to the snapshot file
$SnapshotPath = "c:\\snapshot.xml"
###############################################################################
# Sample usage
###############################################################################
# Create a snapshot
New-Snapshot -Path $SnapshotPath -Properties $Members_to_Compare
# Make some changes
New-QADUser -Name "Lawrence Alford" -ParentContainer mydomain.local/test
Set-QADUser "Jennifer Clarke" -PhoneNumber "(249) 111-22-33"
Set-QADUser "Ernest Cantrell" -City "San Francisco"
Remove-QADObject "Andreas Bold" -Force
# Let's see if we find them
Compare-ActiveDirectory -Path $SnapshotPath -Properties $Members_to_Compare
|
combined_dataset/train/non-malicious/3139.ps1
|
3139.ps1
|
$Title = "Continue"
$Info = "Would you like to continue?"
$Options = [System.Management.Automation.Host.ChoiceDescription[]] @("&Yes", "&No")
[int]$DefaultChoice = 0
$Opt = $host.UI.PromptForChoice($Title , $Info, $Options, $DefaultChoice)
switch($Opt)
{
0 {
Write-Verbose -Message "Yes"
}
1 {
Write-Verbose -Message "No"
}
}
|
combined_dataset/train/non-malicious/sample_57_32.ps1
|
sample_57_32.ps1
|
<#
.SYNOPSIS
Script to run the tests
.DESCRIPTION
This script activates the venv and launches pytest
.EXAMPLE
test.ps1
#>
param(
[Parameter(Mandatory=$false)]
[Alias("c")]
# Don't pretify the output of the Write-Result
[Switch] $CICD=$false,
[Parameter(Mandatory=$false, ValueFromRemainingArguments=$true)]
# Don't pretify the output of the Write-Result
[String]$Tests
)
#-------------------------------------------------------------------------------
# Script Preferences
#-------------------------------------------------------------------------------
$ProgressPreference = "SilentlyContinue"
$ErrorActionPreference = "Stop"
#-------------------------------------------------------------------------------
# Script Functions
#-------------------------------------------------------------------------------
function Write-Result($result, $ForegroundColor="Green") {
if ( $CICD ) {
Write-Host $result -ForegroundColor $ForegroundColor
} else {
$position = 80 - $result.Length - [System.Console]::CursorLeft
Write-Host -ForegroundColor $ForegroundColor ("{0,$position}$result" -f "")
}
}
#-------------------------------------------------------------------------------
# Script Variables
#-------------------------------------------------------------------------------
$SCRIPT_DIR = (Get-ChildItem "$($myInvocation.MyCommand.Definition)").DirectoryName
#-------------------------------------------------------------------------------
# Script Start
#-------------------------------------------------------------------------------
Write-Host $("=" * 80)
Write-Host "Run Tests" -ForegroundColor Cyan
Write-Host $("-" * 80)
#-------------------------------------------------------------------------------
# Activating venv
#-------------------------------------------------------------------------------
if ( !(Test-Path -Path "$SCRIPT_DIR\venv\Scripts\activate.ps1") ) {
Write-Host "Could not find virtual environment"
Write-Host "You must run setup.cmd before running this script"
}
Write-Host "Activating venv: " -NoNewline
& $SCRIPT_DIR\venv\Scripts\activate.ps1
if ( "$env:VIRTUAL_ENV" ) {
Write-Result "Success"
} else {
Write-Result "Failed" -ForegroundColor Red
exit 1
}
Write-Host "Setting working directory: " -NoNewline
Set-Location -Path $SCRIPT_DIR
if ( $(Get-Location).Path -eq $SCRIPT_DIR ) {
Write-Result "Success"
} else {
Write-Result "Failed" -ForegroundColor Red
exit 1
}
Write-Host $("-" * 80)
Write-Host ""
Write-Host "Running pytest..."
Write-Host ""
if ($Tests) {
$pytest_args = -join $Tests
} else {
$pytest_args = ".\config_tests\"
}
pytest -vvv -rPx --showlocals -- $pytest_args
#-------------------------------------------------------------------------------
# Script Complete
#-------------------------------------------------------------------------------
Write-Host $("-" * 80)
Write-Host "Run Tests" -ForegroundColor Cyan
Write-Host $("=" * 80)
|
combined_dataset/train/non-malicious/564.ps1
|
564.ps1
|
function Add-SPOCalculatedFieldtoList
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[string] $listTitle,
[Parameter(Mandatory=$true, Position=2)]
[string] $fieldName,
[Parameter(Mandatory=$true, Position=3)]
[string] $value
)
$refField = $value.Split(";")[1]
$formula = $value.Split(";")[0]
$internalName = Find-SPOFieldName $listTitle $refField
$newField = '<Field Type="Calculated" DisplayName="$fieldName" ResultType="DateTime" ReadOnly="TRUE" Name="$fieldName"><Formula>$formula</Formula><FieldRefs><FieldRef Name="$internalName" /></FieldRefs></Field>'
Add-SPOField $listTitle $fieldName $newField
}
|
combined_dataset/train/non-malicious/453.ps1
|
453.ps1
|
Register-PSFConfigValidation -Name "long" -ScriptBlock {
Param (
$Value
)
$Result = New-Object PSOBject -Property @{
Success = $True
Value = $null
Message = ""
}
try { [long]$number = $Value }
catch
{
$Result.Message = "Not a long: $Value"
$Result.Success = $False
return $Result
}
$Result.Value = $number
return $Result
}
|
combined_dataset/train/non-malicious/SuperMario PowerShell.ps1
|
SuperMario PowerShell.ps1
|
[System.Console]::Beep(659, 125)
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(523, 125)
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(784, 125)
Start-Sleep -Milliseconds 375
[System.Console]::Beep(392, 125)
Start-Sleep -Milliseconds 375
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(392, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(330, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(440, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(494, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(466, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(440, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(392, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(784, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(880, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(698, 125)
[System.Console]::Beep(784, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(587, 125)
[System.Console]::Beep(494, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(392, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(330, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(440, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(494, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(466, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(440, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(392, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(784, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(880, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(698, 125)
[System.Console]::Beep(784, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(587, 125)
[System.Console]::Beep(494, 125)
Start-Sleep -Milliseconds 375
[System.Console]::Beep(784, 125)
[System.Console]::Beep(740, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(415, 125)
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
[System.Console]::Beep(587, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(784, 125)
[System.Console]::Beep(740, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(698, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 625
[System.Console]::Beep(784, 125)
[System.Console]::Beep(740, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(415, 125)
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
[System.Console]::Beep(587, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(587, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 1125
[System.Console]::Beep(784, 125)
[System.Console]::Beep(740, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(415, 125)
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
[System.Console]::Beep(587, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(784, 125)
[System.Console]::Beep(740, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(698, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 625
[System.Console]::Beep(784, 125)
[System.Console]::Beep(740, 125)
[System.Console]::Beep(698, 125)
Start-Sleep -Milliseconds 42
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(659, 125)
Start-Sleep -Milliseconds 167
[System.Console]::Beep(415, 125)
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 125
[System.Console]::Beep(440, 125)
[System.Console]::Beep(523, 125)
[System.Console]::Beep(587, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(622, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(587, 125)
Start-Sleep -Milliseconds 250
[System.Console]::Beep(523, 125)
Start-Sleep -Milliseconds 625
|
combined_dataset/train/non-malicious/sample_2_18.ps1
|
sample_2_18.ps1
|
# make sure we stop on exceptions
$ErrorActionPreference = "Stop"
# This object reprents the result value for tab expansion functions when no result is returned.
# This is so that we can distinguish it from $null, which has different semantics
$NoResultValue = New-Object PSObject -Property @{ NoResult = $true }
# Hashtable that stores tab expansion definitions
$TabExpansionCommands = New-Object 'System.Collections.Hashtable' -ArgumentList @([System.StringComparer]::InvariantCultureIgnoreCase)
function Register-TabExpansion {
<#
.SYNOPSIS
Registers a tab expansion for the parameters of the specified command.
.DESCRIPTION
Registers a tab expansion for the parameters of the specified command.
.PARAMETER Name
Name of the command the expansion is for.
.EXAMPLE
PS> Register-TabExpansion 'Set-Color', @{'color' = {'blue', 'green', 'red'}}
This adds a tab expansion to the Set-Color command. Set-Color contains a single
parameter, color, with three possible expansion values.
#>
[CmdletBinding()]
param(
[parameter(Mandatory = $true)]
[string]$Name,
[parameter(Mandatory = $true)]
$Definition
)
# transfer $definition data into a new hashtable that compare values using InvariantCultureIgnoreCase
$normalizedDefinition = New-Object 'System.Collections.Hashtable' -ArgumentList @([System.StringComparer]::InvariantCultureIgnoreCase)
$definition.GetEnumerator() | % { $normalizedDefinition[$_.Name] = $_.Value }
$TabExpansionCommands[$Name] = $normalizedDefinition
}
Register-TabExpansion 'Get-Package' @{
'Source' = {
GetPackageSources
}
'ProjectName' = {
GetProjectNames
}
}
Register-TabExpansion 'Install-Package' @{
'Id' = {
param($context)
GetRemotePackageIds $context
}
'ProjectName' = {
GetProjectNames
}
'Version' = {
param($context)
GetRemotePackageVersions $context
}
'Source' = {
GetPackageSources
}
'DependencyVersion' = {
GetEnumNames 'NuGet.Resolver.DependencyBehavior'
}
'FileConflictAction' = {
GetEnumNames 'NuGet.ProjectManagement.FileConflictAction'
}
}
Register-TabExpansion 'Uninstall-Package' @{
'Id' = {
param($context)
GetInstalledPackageIds $context
}
'ProjectName' = {
GetProjectNames
}
'Version' = {
GetInstalledPackageVersions $context
}
}
Register-TabExpansion 'Update-Package' @{
'Id' = {
param($context)
GetInstalledPackageIds $context
}
'ProjectName' = {
GetProjectNames
}
'Version' = {
param($context)
# Only show available versions if an id was specified
if ($context.id) {
# Find the installed package (this might be nothing since we could have a partial id)
$versions = @()
$packages = @(Get-Package $context.id | ? { $_.Id -eq $context.id })
if($packages.Count) {
$package = @($packages | Sort-Object Version)[0]
$versions = GetRemotePackageUpdateVersions $context
}
$versions
}
}
'Source' = {
GetPackageSources
}
'FileConflictAction' = {
GetEnumNames 'NuGet.ProjectManagement.FileConflictAction'
}
}
Register-TabExpansion 'Add-BindingRedirect' @{ 'ProjectName' = { GetProjectNames } }
Register-TabExpansion 'Get-Project' @{ 'Name' = { GetProjectNames } }
function HasProperty($context, $name) {
return $context.psobject.properties | ? { $_.Name -eq $name }
}
function IsPrereleaseSet($context) {
# Need to figure out a better way to do this.
return (HasProperty $context 'IncludePreRelease') -or (HasProperty $context 'PreRelease') -or (HasProperty $context 'Pre')
}
function GetPackages($context) {
$parameters = @{}
if ($context.Id) { $parameters.Id = $context.Id }
if ($context.Source) { $parameters.source = $context.Source }
if (IsPrereleaseSet $context) {
$parameters.IncludePreRelease = $true
}
# StartWith switch is implicity set for TabExpansion command
return TabExpansion-Package @parameters -ExcludeVersionInfo
}
function GetProjectNames {
$uniqueNames = @(Get-Project -All | Select-Object -ExpandProperty ProjectName)
$simpleNames = Get-Project -All | Select-Object -ExpandProperty Name
$safeNames = @($simpleNames | Group-Object | Where-Object { $_.Count -eq 1 } | Select-Object -ExpandProperty Name)
($uniqueNames + $safeNames) | Select-Object -Unique | Sort-Object
}
function GetInstalledPackageIds($context) {
$parameters = @{}
if ($context.Id) { $parameters.filter = $context.id }
Get-Package @parameters -ErrorAction SilentlyContinue | Select-Object -ExpandProperty Id -Unique
}
function GetRemotePackageIds($context) {
$parameters = @{}
if ($context.Id) { $parameters.filter = $context.Id }
if ($context.Source) { $parameters.source = $context.Source }
if (IsPrereleaseSet $context) {
$parameters.IncludePrerelease = $true
}
try {
return Get-RemotePackageId @parameters
}
catch {
# If the server doesn't have the JSON API endpoints, get the remote package IDs the old way.
return GetPackages $context | Select-Object -ExpandProperty Id -Unique
}
}
function GetPackageSources() {
$componentModel = Get-VSComponentModel
$repositoryProvider = $componentModel.GetService([NuGet.Protocol.Core.Types.ISourceRepositoryProvider])
$allSources = $repositoryProvider.PackageSourceProvider.LoadPackageSources()
$allSources | Select-Object -ExpandProperty Name
}
function GetEnumNames($typeName) {
# Sort the enumerations in alphabetical order to make it consistent with TabExpansion2
return [System.Enum]::GetNames($typeName) | Sort-Object
}
function GetInstalledPackageVersions($context) {
$parameters = @{}
if ($context.id) { $parameters.Filter = $context.id }
GetAndSortVersions (Get-Package @parameters -ErrorAction SilentlyContinue)
}
function GetRemotePackageVersions($context) {
$parameters = @{}
if ($context.Id -eq $null) {
return @()
}
if ($context.Id) { $parameters.id = $context.Id }
if ($context.Source) { $parameters.source = $context.Source }
if (IsPrereleaseSet $context) {
$parameters.IncludePreRelease = $true
}
try {
return Get-RemotePackageVersion @parameters | %{ [NuGet.SemanticVersion]::Parse($_) } | Sort-Object -Descending
}
catch {
# If the server doesn't have the JSON API endpoints, get the remote package versions the old way.
$parameters = @{}
if ($context.Id) { $parameters.Id = $context.Id }
if ($context.Source) { $parameters.source = $context.Source }
if (IsPrereleaseSet $context) {
$parameters.IncludePreRelease = $true
}
$parameters.AllVersions = $true
# StartWith switch is implicity set for TabExpansion command
GetAndSortVersions(TabExpansion-Package @parameters -ExactMatch -ErrorAction SilentlyContinue)
}
}
function GetRemotePackageUpdateVersions($context) {
$parameters = @{}
if ($context.Id -eq $null) {
return @()
}
if ($context.Id) { $parameters.id = $context.Id }
if ($context.Source) { $parameters.source = $context.Source }
if (IsPrereleaseSet $context) {
$parameters.IncludePreRelease = $true
}
try {
return Get-RemotePackageVersion @parameters | %{ [NuGet.SemanticVersion]::Parse($_) } | Sort-Object -Descending
}
catch {
# If the server doesn't have the JSON API endpoints, get the remote package versions the old way.
$parameters = @{}
if ($context.Id) { $parameters.Filter = $context.Id }
if ($context.Source) { $parameters.source = $context.Source }
if (IsPrereleaseSet $context) {
$parameters.IncludePreRelease = $true
}
$parameters.Updates = $true
GetAndSortVersions(Get-Package @parameters -AllVersions -ErrorAction SilentlyContinue)
}
}
function GetAndSortVersions($packages) {
$packages | Select -Unique -ExpandProperty Versions | %{
if($_ -is [string]) {
[NuGet.SemanticVersion]::Parse($_)
} else {
$_
}
} | Sort-Object -Descending
}
function NugetTabExpansion($line, $lastWord) {
# Parse the command
$parsedCommand = [NuGetConsole.Host.PowerShell.CommandParser]::Parse($line)
# Get the command definition
$definition = $TabExpansionCommands[$parsedCommand.CommandName]
# See if we've registered a command for intellisense
if($definition) {
# Get the command that we're trying to show intellisense for
$command = Get-Command $parsedCommand.CommandName -ErrorAction SilentlyContinue
if($command) {
# We're trying to find out what parameter we're trying to show intellisense for based on
# either the name of the an argument or index e.g. "Install-Package -Id " "Install-Package "
$argument = $parsedCommand.CompletionArgument
$index = $parsedCommand.CompletionIndex
if(!$argument -and $index -ne $null) {
do {
# Get the argument name for this index
$argument = GetArgumentName $command $index
if(!$argument) {
break
}
# If there is already a value for this argument, then check the next one index.
# This is so we don't show duplicate intellisense e.g. "Install-Package -Id elmah {tab}".
# The above statement shouldn't show intellisense for id since it already has a value
if($parsedCommand.Arguments[$argument] -eq $null) {
$value = $parsedCommand.Arguments[$index]
if(!$value) {
$value = ''
}
$parsedCommand.Arguments[$argument] = $value
break
}
else {
$index++
}
} while($true);
}
if($argument) {
# Populate the arguments dictionary with the name and value of the
# associated index. i.e. for the command "Install-Package elmah" arguments should have
# an entries with { 0, "elmah" } and { "Id", "elmah" }
$arguments = New-Object 'System.Collections.Hashtable' -ArgumentList @([System.StringComparer]::InvariantCultureIgnoreCase)
$parsedCommand.Arguments.Keys | Where-Object { $_ -is [int] } | %{
$argName = GetArgumentName $command $_
$arguments[$argName] = $parsedCommand.Arguments[$_]
}
# Copy the arguments over to the parsed command arguments
$arguments.Keys | %{
$parsedCommand.Arguments[$_] = $arguments[$_]
}
# If the argument is a true argument of this command and not a partial argument
# and there is a non null value (empty is valid), then we execute the script block
# for this parameter (if specified)
$action = $definition[$argument]
$argumentValue = $parsedCommand.Arguments[$argument]
if($command.Parameters[$argument] -and
$argumentValue -ne $null -and
$action) {
$context = New-Object PSObject -Property $parsedCommand.Arguments
$results = @(& $action $context)
if($results.Count -eq 0) {
return $null
}
# Use the argument value to filter results
$results = $results | %{ $_.ToString() } | Where-Object { $_.StartsWith($argumentValue, "OrdinalIgnoreCase") }
return NormalizeResults $results
}
}
}
}
return $NoResultValue
}
function NormalizeResults($results) {
$results | %{
$result = $_
# Add quotes to a result if it contains whitespace or a quote
$addQuotes = $result.Contains(" ") -or $result.Contains("'") -or $result.Contains("`t")
if($addQuotes) {
$result = "'" + $result.Replace("'", "''") + "'"
}
return $result
}
}
function GetArgumentName($command, $index) {
# Next we try to find the parameter name for the parameter index (in the default parameter set)
$parameterSet = $Command.DefaultParameterSet
if(!$parameterSet) {
$parameterSet = '__AllParameterSets'
}
return $command.Parameters.Values | ?{ $_.ParameterSets[$parameterSet].Position -eq $index } | Select -ExpandProperty Name
}
function Format-ProjectName {
param(
[parameter(position=0, mandatory=$true)]
[validatenotnull()]
$Project,
[parameter(position=1, mandatory=$true)]
[validaterange(6, 1000)]
[int]$ColWidth
)
return $project.name
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD47awHpIPi6xj7
# Np/7UqvNKSkODuicNzWQJ6r3QBaJFaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKXm
# tXs/wfix2aWtcYeygUfY0R9fHnxiotoIvIUKZHaNMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAVlOyQ6quldB4arz2UOLM0sgOIcN1OJzN6Z4J
# fUuAk0UegmBzdqCfmFJ9WmkeT/NCvFD4X4kZKcwVRL4cf4ehS4o19aoqznic6i4U
# SDAuNx1/+lY38RMKaA5K+z5ZgMGg/2MQdIfwul9zcp5ZjP6oRFOK5MLxqi8nrbWz
# QdKx7reD7xCynY2imZ0cNz/HTaiqZSqp88No98lH2RRnoVGDIzMHoOqs0GzLUOXZ
# CHGxWibsCTcDsyzjnOG8iD2b/Drts6QjO88bz+ohWv21k/E97+F7l4AnIMBHTXsa
# 5W+k30vqmEmMLhBaeSofafzKi0vB5Ygd6pcMKplsebiakJ8TgqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDERMF2gZwder6VQxnpa3Lc9oxuDQmIbqEU
# l6O9Lv3wBQIGZwfkEzb+GBMyMDI0MTAxNzIzMzQ1My44MjRaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB
# AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6
# eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv
# DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V
# utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi
# 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O
# MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm
# dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA
# xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC
# edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5
# sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW
# aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo
# tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM
# fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7
# 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY
# JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8
# I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb
# tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r
# J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19
# CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt
# +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ
# 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2
# WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj
# /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX
# A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rucYTAi
# GA8yMDI0MTAxNzE0MjMyOVoYDzIwMjQxMDE4MTQyMzI5WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqu5xhAgEAMAcCAQACAgclMAcCAQACAhNLMAoCBQDqvO3hAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEoXFkOVJN3ywrCv8XKF1vOp8CQ3
# /vnMccl3aT5X16xumED/WBVibxLr10bveu2U1nyKUCuouUARtp9D7VkSIvlKvnMe
# FQbe1mQi5vt91K7/AD0s4I8N7LWnFisIKC4PhOABCtjnMFCID+XqPIhlF83+nmlH
# d1h1xG5cQyjufcciFvB0cqr3sCcj4tQ1+NSN7IpHh/jWJ+CnjboaEzsmq64kdXLz
# YeTbrrqQFeEIEhqBMiRP2iC69st+8rsmY+S1D+2/f1yiOOfAtcP7oToJaOdC3FLu
# xIgAhH9BnzJZM5mNwRwLVWdgCy5hDKXuu1DF6WOCgSdpXc4kkQGAxG9zKtgxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQ
# sIDPK3KZTQABAAAB6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDSt5pgu8iL7tDsBDgTBR8PESjC
# y8bn3OXnhX2/SfEO2TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTV
# AoQggkHR59pNqige0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQg/OuZ3m+/
# tMEL160w5XLppDEZ+Xeo2KFUWQIDmd1WF1kwDQYJKoZIhvcNAQELBQAEggIAWpmi
# u2xlfqS6YH21C/TZ7AHNF44hp1c43REbE/BMksAxPZQhYlUc0fXlmPIRpcBFDSud
# Tu1BuHboECEYFW981yYHOoXrT7x+jlAsdqqUeev+LH9pIeV75T7z+czbIBge02dE
# 3MBSxly130PNANMwQVv+NFbDPLWjIyU0dxwayO+oikcmX8QWdcF4DssF2ljDcQD4
# IkYL4am3sf/6ZfIH2vpzWwhrLq5wODTTUyHlUVB3hMklO6wVk1ORGdQqLC14lFRj
# QzJV6j6fYQ0PUPrlNDyhJVMyN26HqXSbhTDO0zzpsdbYOEQEtJnVSWcb7e2DD6xy
# 4uGejMEBK6b7kcgtV/j8euyogyrT2aBbD0RkuZoHRkmR/eUBuxTOjfPHRLPzkfVb
# o3xEMAyH2lHOVmBbGxxeTnV3hKIiRyATv0SfLT0pHhqAWng70iYvMKC6+tOJ1QfJ
# QU/Hx1CQrM+HHRCe6iqLtQL+Xba2N2WjQ9olmSCwVAObgK7kDxabbGESb/zgyw0Q
# CCMxccrg4+kWcuSFLkJGiOhIdUwM8nM4U5e6BqVerukG/wo06rqUwI6v3z1Nwd6h
# A2fR4JL/ymqNrH0OnD/iZFbt8zDriZ65zqcFj++7PDOpsvmF/aEiEomXr7FpYhyj
# vqDvBdDMqTIogLTo+6I5fm/sDxUEG0s8occNgYk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_63_18.ps1
|
sample_63_18.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dataintegration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataintegration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataintegrationApplication',
'Get-OCIDataintegrationApplicationDetailedDescription',
'Get-OCIDataintegrationApplicationsList',
'Get-OCIDataintegrationCompositeState',
'Get-OCIDataintegrationConnection',
'Get-OCIDataintegrationConnectionsList',
'Get-OCIDataintegrationConnectionValidation',
'Get-OCIDataintegrationConnectionValidationsList',
'Get-OCIDataintegrationCopyObjectRequest',
'Get-OCIDataintegrationCopyObjectRequestsList',
'Get-OCIDataintegrationCountStatistic',
'Get-OCIDataintegrationDataAsset',
'Get-OCIDataintegrationDataAssetsList',
'Get-OCIDataintegrationDataEntitiesList',
'Get-OCIDataintegrationDataEntity',
'Get-OCIDataintegrationDataFlow',
'Get-OCIDataintegrationDataFlowsList',
'Get-OCIDataintegrationDataFlowValidation',
'Get-OCIDataintegrationDataFlowValidationsList',
'Get-OCIDataintegrationDependentObject',
'Get-OCIDataintegrationDependentObjectsList',
'Get-OCIDataintegrationDisApplication',
'Get-OCIDataintegrationDisApplicationDetailedDescription',
'Get-OCIDataintegrationDisApplicationsList',
'Get-OCIDataintegrationDisApplicationTaskRunLineagesList',
'Get-OCIDataintegrationExportRequest',
'Get-OCIDataintegrationExportRequestsList',
'Get-OCIDataintegrationExternalPublication',
'Get-OCIDataintegrationExternalPublicationsList',
'Get-OCIDataintegrationExternalPublicationValidation',
'Get-OCIDataintegrationExternalPublicationValidationsList',
'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList',
'Get-OCIDataintegrationFunctionLibrariesList',
'Get-OCIDataintegrationFunctionLibrary',
'Get-OCIDataintegrationImportRequest',
'Get-OCIDataintegrationImportRequestsList',
'Get-OCIDataintegrationPatch',
'Get-OCIDataintegrationPatchChangesList',
'Get-OCIDataintegrationPatchesList',
'Get-OCIDataintegrationPipeline',
'Get-OCIDataintegrationPipelinesList',
'Get-OCIDataintegrationPipelineValidation',
'Get-OCIDataintegrationPipelineValidationsList',
'Get-OCIDataintegrationProject',
'Get-OCIDataintegrationProjectsList',
'Get-OCIDataintegrationPublishedObject',
'Get-OCIDataintegrationPublishedObjectsList',
'Get-OCIDataintegrationReference',
'Get-OCIDataintegrationReferencesList',
'Get-OCIDataintegrationRuntimeOperator',
'Get-OCIDataintegrationRuntimeOperatorsList',
'Get-OCIDataintegrationRuntimePipeline',
'Get-OCIDataintegrationRuntimePipelinesList',
'Get-OCIDataintegrationSchedule',
'Get-OCIDataintegrationSchedulesList',
'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList',
'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun',
'Get-OCIDataintegrationTaskRunLineagesList',
'Get-OCIDataintegrationTaskRunLogsList',
'Get-OCIDataintegrationTaskRunsList',
'Get-OCIDataintegrationTaskSchedule',
'Get-OCIDataintegrationTaskSchedulesList',
'Get-OCIDataintegrationTasksList',
'Get-OCIDataintegrationTaskValidation',
'Get-OCIDataintegrationTaskValidationsList',
'Get-OCIDataintegrationTemplate',
'Get-OCIDataintegrationTemplatesList',
'Get-OCIDataintegrationUserDefinedFunction',
'Get-OCIDataintegrationUserDefinedFunctionsList',
'Get-OCIDataintegrationUserDefinedFunctionValidation',
'Get-OCIDataintegrationUserDefinedFunctionValidationsList',
'Get-OCIDataintegrationWorkRequest',
'Get-OCIDataintegrationWorkRequestErrorsList',
'Get-OCIDataintegrationWorkRequestLogsList',
'Get-OCIDataintegrationWorkRequestsList',
'Get-OCIDataintegrationWorkspace',
'Get-OCIDataintegrationWorkspacesList',
'Move-OCIDataintegrationCompartment',
'Move-OCIDataintegrationDisApplicationCompartment',
'New-OCIDataintegrationApplication',
'New-OCIDataintegrationApplicationDetailedDescription',
'New-OCIDataintegrationConnection',
'New-OCIDataintegrationConnectionValidation',
'New-OCIDataintegrationCopyObjectRequest',
'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow',
'New-OCIDataintegrationDataFlowValidation',
'New-OCIDataintegrationDisApplication',
'New-OCIDataintegrationDisApplicationDetailedDescription',
'New-OCIDataintegrationEntityShape',
'New-OCIDataintegrationExportRequest',
'New-OCIDataintegrationExternalPublication',
'New-OCIDataintegrationExternalPublicationValidation',
'New-OCIDataintegrationFolder',
'New-OCIDataintegrationFunctionLibrary',
'New-OCIDataintegrationImportRequest',
'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline',
'New-OCIDataintegrationPipelineValidation',
'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule',
'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun',
'New-OCIDataintegrationTaskSchedule',
'New-OCIDataintegrationTaskValidation',
'New-OCIDataintegrationUserDefinedFunction',
'New-OCIDataintegrationUserDefinedFunctionValidation',
'New-OCIDataintegrationWorkspace',
'Remove-OCIDataintegrationApplication',
'Remove-OCIDataintegrationApplicationDetailedDescription',
'Remove-OCIDataintegrationConnection',
'Remove-OCIDataintegrationConnectionValidation',
'Remove-OCIDataintegrationCopyObjectRequest',
'Remove-OCIDataintegrationDataAsset',
'Remove-OCIDataintegrationDataFlow',
'Remove-OCIDataintegrationDataFlowValidation',
'Remove-OCIDataintegrationDisApplication',
'Remove-OCIDataintegrationDisApplicationDetailedDescription',
'Remove-OCIDataintegrationExportRequest',
'Remove-OCIDataintegrationExternalPublication',
'Remove-OCIDataintegrationExternalPublicationValidation',
'Remove-OCIDataintegrationFolder',
'Remove-OCIDataintegrationFunctionLibrary',
'Remove-OCIDataintegrationImportRequest',
'Remove-OCIDataintegrationPatch',
'Remove-OCIDataintegrationPipeline',
'Remove-OCIDataintegrationPipelineValidation',
'Remove-OCIDataintegrationProject',
'Remove-OCIDataintegrationSchedule',
'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun',
'Remove-OCIDataintegrationTaskSchedule',
'Remove-OCIDataintegrationTaskValidation',
'Remove-OCIDataintegrationUserDefinedFunction',
'Remove-OCIDataintegrationUserDefinedFunctionValidation',
'Remove-OCIDataintegrationWorkspace',
'Start-OCIDataintegrationWorkspace',
'Stop-OCIDataintegrationWorkspace',
'Update-OCIDataintegrationApplication',
'Update-OCIDataintegrationApplicationDetailedDescription',
'Update-OCIDataintegrationConnection',
'Update-OCIDataintegrationCopyObjectRequest',
'Update-OCIDataintegrationDataAsset',
'Update-OCIDataintegrationDataFlow',
'Update-OCIDataintegrationDisApplication',
'Update-OCIDataintegrationDisApplicationDetailedDescription',
'Update-OCIDataintegrationExportRequest',
'Update-OCIDataintegrationExternalPublication',
'Update-OCIDataintegrationFolder',
'Update-OCIDataintegrationFunctionLibrary',
'Update-OCIDataintegrationImportRequest',
'Update-OCIDataintegrationPipeline',
'Update-OCIDataintegrationProject',
'Update-OCIDataintegrationReference',
'Update-OCIDataintegrationSchedule',
'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun',
'Update-OCIDataintegrationTaskSchedule',
'Update-OCIDataintegrationUserDefinedFunction',
'Update-OCIDataintegrationWorkspace'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Send-MailMessage_1.ps1
|
Send-MailMessage_1.ps1
|
##############################################################################
##
## Send-MailMessage
##
## From Windows PowerShell Cookbook (O'Reilly)
## by Lee Holmes (http://www.leeholmes.com/guide)
##
## Illustrate the techniques used to send an email in PowerShell.
## In version two, use the Send-MailMessage cmdlet.
##
## Example:
##
## PS >$body = @"
## >> Hi from another satisfied customer of The PowerShell Cookbook!
## >> "@
## >>
## PS >$to = "guide_feedback@leeholmes.com"
## PS >$subject = "Thanks for all of the scripts."
## PS >$mailHost = "mail.leeholmes.com"
## PS >Send-MailMessage $to $subject $body $mailHost
##
##############################################################################
param(
## The recipient of the mail message
[string[]] $To = $(throw "Please specify the destination mail address"),
## The subjecty of the message
[string] $Subject = "<No Subject>",
## The body of the message
[string] $Body = $(throw "Please specify the message content"),
## The SMTP host that will transmit the message
[string] $SmtpHost = $(throw "Please specify a mail server."),
## The sender of the message
[string] $From = "$($env:UserName)@example.com"
)
## Create the mail message
$email = New-Object System.Net.Mail.MailMessage
## Populate its fields
foreach($mailTo in $to)
{
$email.To.Add($mailTo)
}
$email.From = $from
$email.Subject = $subject
$email.Body = $body
## Send the mail
$client = New-Object System.Net.Mail.SmtpClient $smtpHost
$client.UseDefaultCredentials = $true
$client.Send($email)
|
combined_dataset/train/non-malicious/sample_16_74.ps1
|
sample_16_74.ps1
|
#
# Module manifest for module 'PowerShellEditorServices.VSCode'
#
# Generated by: daviwil
#
# Generated on: 6/16/2017
#
@{
# Script module or binary module file associated with this manifest.
RootModule = "$PSScriptRoot/bin/Microsoft.PowerShell.EditorServices.VSCode.dll"
# Version number of this module.
ModuleVersion = '0.2.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '8794484f-cfc3-40f1-b88f-a934f403e679'
# Author of this module
Author = 'Microsoft'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2021 Microsoft Corporation.'
# Description of the functionality provided by this module
Description = 'Provides added functionality to PowerShell Editor Services for the Visual Studio Code editor.'
# Minimum version of the Windows PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @('New-VSCodeHtmlContentView',
'Show-VSCodeHtmlContentView',
'Close-VSCodeHtmlContentView',
'Set-VSCodeHtmlContentView',
'Write-VSCodeHtmlContentView')
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
LicenseUri = 'https://github.com/PowerShell/PowerShellEditorServices/blob/main/LICENSE'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/PowerShell/PowerShellEditorServices'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZYzJwiKGoPH8G
# 4gy5sE6SRw6pqdLufHA954XC9mqX+6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC3yPL0IYUcoPyEIDxoBXKJH
# 3Ols3qpDNQr76nolRf2yMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAKP2lrIQV9IVZpieenTzHpSmeGIUyVOMoP5bn3T2eeocF0eqzrYjsdo4s
# nf52Zr5xiFHI6XHOW+iHr0j03tCkLN+SD9rzVDnERndlniaPpU8WgNyzKJ+iiuqX
# J5oGQxDk76MZSxp4YObnc3jhohMZvCgn0z/y4WfTPgxU0fprk/QrNCzi8CcOJKzB
# 4wpAwXdzkniG0wISx7A+UkpBBxu7muCtm9NLba96Iy8KqXsuByOIGFD1w193S6BU
# Hx4x7d2BkKKo/WpqksVOiC77A9/QDKsnMA7u9ogizDAJ1grQoAE4XiArdgF266t8
# aYYAJpOOF3kMRUevbFK0kmchlhJcDqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAfkJ+SGZ21u8Dv3++EfQVn1xz5abfYJatSD9YTNn6iSAIGZXrphEv3
# GBMyMDI0MDEwNDAyMDg1Mi42OTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAdGyW0AobC7SRQABAAAB0TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MThaFw0yNDAyMDExOTEyMThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCZTNo0OeGz2XFd2gLg5nTlBm8XOpuwJIiXsMU61rwq
# 1ZKDpa443RrSG/pH8Gz6XNnFQKGnCqNCtmvoKULApwrT/s7/e1X0lNFKmj7U7X4p
# 00S0uQbW6LwSn/zWHaG2c54ZXsGY+BYfhWDgbFpCTxRzTnRCG62bkWPp6ZHbZPg4
# Ht1CRCAMhhOGTR8wI4G7wwWZwdMc6UvUUlq0ql9AxAfzkYRpi2tRvDHMdmZ3vyXp
# qhFwvRG8cgCH/TTCjW5q6aNbdqKL3BFDPzUtuCNsPXL3/E0dR2bDMqa0aNH+iIfh
# GC4/vcwuteOMCPUIDVSqDCNfIaPDEwYci1fd9gu1zVw+HEhDZM7Ea3nxIUrzt+Rf
# p5ToMMj4QAmJ6Uadm+TPbDbo8kFIK70ShmW8wn8fJk9ReQQEpTtIN43eRv9QmXy3
# Ued80osOBE+WkdMvSCFh+qgCsKdzQxQJG62cTeoU2eqNhH3oppXmyfVUwbsefQzM
# PtbinCZd0FUlmlM/dH+4OniqQyaHvrtYy3wqIafY3zeFITlVAoP9q9vF4W7KHR/u
# F0mvTpAL5NaTDN1plQS0MdjMkgzZK5gtwqOe/3rTlqBzxwa7YYp3urP5yWkTzISG
# nhNWIZOxOyQIOxZfbiIbAHbm3M8hj73KQWcCR5JavgkwUmncFHESaQf4Drqs+/1L
# 1QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFAuO8UzF7DcH0mmsF4XQxxHQvS2jMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCbu9rTAHV24mY0qoG5eEnImz5akGXTviBw
# Kp2Y51s26w8oDrWor+m00R4/3BcDmYlUK8Nrx/auYFYidZddcUjw42QxSStmv/qW
# nCQi/2OnH32KVHQ+kMOZPABQTG1XkcnYPUOOEEor6f/3Js1uj4wjHzE4V4aumYXB
# Asr4L5KR8vKes5tFxhMkWND/O7W/RaHYwJMjMkxVosBok7V21sJAlxScEXxfJa+/
# qkqUr7CZgw3R4jCHRkPqQhMWibXPMYar/iF0ZuLB9O89DMJNhjK9BSf6iqgZoMuz
# IVt+EBoTzpv/9p4wQ6xoBCs29mkj/EIWFdc+5a30kuCQOSEOj07+WI29A4k6QIRB
# 5w+eMmZ0Jec0sSyeQB5KjxE51iYMhtlMrUKcr06nBqCsSKPYsSAITAzgssJD+Z/c
# TS7Cu35fJrWhM9NYX24uAxYLAW0ipNtWptIeV6akuZEeEV6BNtM3VTk+mAlV5/eC
# /0Y17aVSjK5/gyDoLNmrgVwv5TAaBmq/wgRRFHmW9UJ3zv8Lmk6mIoAyTpqBbuUj
# MLyrtajuSsA/m2DnKMO0Qiz1v+FSVbqM38J/PTlhCTUbFOx0kLT7Y/7+ZyrilVCz
# yAYfFIinDIjWlM85tDeU8ZfJCjFKwq3DsRxV4JY18xww8TTmod3lkr9NqGQ54Lmy
# PVc+5ibNrjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBH
# JY2Fv+GhLQtRDR2vIzBaSv/7LKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6UBucTAiGA8yMDI0MDEwMzIzMzgy
# NVoYDzIwMjQwMTA0MjMzODI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpQG5x
# AgEAMAoCAQACAjUmAgH/MAcCAQACAhNLMAoCBQDpQb/xAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBALnK2RA1D4bns8CeaxFGhsQGMOfOJtCcinex3YRoi3GQ
# eIBurD1V9aE1q8FTJ+ZMCiV+wv+zl+Kkt6hL2CMV23kVT4CEQncBoTCjXuSoAfKC
# fU013IhMXv3AswCfEBF/oUIRsKNa4lO5soO4JTwQXK6yvMj/S9DaGws7HWBpQGsM
# AaShqbydWwIV29tA4EqguuR6TgQRyZxbkBuU1n73qOtEXSt9+eod+EyEH+m7UWv7
# +8QYFyuolJoATXLkM/P9UntIT6B8qo4yEs1Rp1VdB6aPdbK9z4I7Q1hp7Kd/5SXP
# p3+47om/Pj47Vf5hweAJyH0d4CmJEB5366jZrJPGX2UxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdGyW0AobC7SRQABAAAB
# 0TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDakGmJ6i8lbtrb7MwZlcp9gt/ItlWN34kGb7EN+VGw
# 0TCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMy8YXkCALv57c5sRhrPTub1
# q4TwJ6oVA36k8IiI/AcMMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHRsltAKGwu0kUAAQAAAdEwIgQgYkO29UwQ58By4FNjfYbcFlyi
# ifr+Eg+8J7F5a2uQnJ4wDQYJKoZIhvcNAQELBQAEggIALrDLVVqWwtmpivPb2Xl9
# /WZJwVXGPQ+WsE67Qn6BtL+8xv4Ni1rHo8W8QTzghgiCxBGf70mCA6PyYEKW5kAJ
# qUSx3HcIXBSpY4wnlKEb3Pz0rgXzV6Kwqxv/IjiZHUcPwmpB6v5lQbQLE5FnD1Sm
# GU9Hm8QKUv/IKVxVLt7QOmWaZ60iypV5euw5sDRgdnqjwd7e51Rj/1DRiJhJHZLO
# uvzhgZgJ+bZb4qzQLTNLrw3/LMlLaz52kJkUz2hkzN/79VIOmcjAEnW++5bXQCz1
# g8lni5mpJMaRjpW6+I4Mozt8muZat6jsepnrCmo9zdK0J80kIJZCEmjDAraWwwHc
# eE1h5GYce77ljw7blPKLWzhXHenSj+irajaSbELKrRZus+oIiBlgGDBjZR9Bu7WV
# /wvcvyHHSxEvXaGSSwUPbFGS7D9utHIkcceI4CnTyMS0SmGWxA7JUwGZlyLauGe0
# Ulx6KIRg92BvRpTpjlVZZzuJGJKxssFk3A9MH1FhxUafWRiubivLPDDNk5XaJQQT
# mZLe8Z71p7RWI6X4pLsxU4tiZSYksFVo2zC8cal8kVFi4eOME1zcHU+gh6sRYWkO
# JXqE8+k639ipVW9fVuDhFEaH+pWjJRl9uWsaxVraXFLTCvYafvsMPZy9bg3XHFY0
# 8Jc9EV+P+cB+gwQAveZU2H0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_37_1.ps1
|
sample_37_1.ps1
|
Function Test-Empty
{
[CmdletBinding()]
[OutputType([boolean])]
param
(
[Parameter(Mandatory=$true)]
[AllowNull()]
[AllowEmptyString()]
[string]$content
)
return [string]::IsNullOrEmpty($content) -or [string]::IsNullOrWhiteSpace($content)
}
function Get-PatchHistory
{
[CmdletBinding()]
param
(
[Parameter(Mandatory, ValueFromPipeline)]
[string]$Path,
[Parameter()]
[string]$After
)
process {
if (!(Test-Empty $After)) {
$fileLog = $(git log -p -U10000 --output-indicator-new=~ --output-indicator-old=^ --reverse "$After..HEAD" -- $path)
}
else {
$fileLog = $(git log -p --output-indicator-new=~ --output-indicator-old=^ --reverse -- $path)
}
$fileLog = $fileLog -join "`r`n"
return $fileLog
}
}
function Get-Matches {
param(
[Parameter(Mandatory=$true)]
$Pattern,
[Parameter(ValueFromPipeline=$true)]
$InputObject,
[Parameter()]
[int]$Timeout=$(5 * 60)
)
begin {
try {
$regex = New-Object Regex($pattern, [System.Text.RegularExpressions.RegexOptions]::None ,[System.TimeSpan]::FromSeconds($Timeout))
}
catch {
Throw "Get-Matches: Pattern not correct. $_"
}
$groups = @($regex.GetGroupNames() |
Where-Object { ($_ -as [Int32]) -eq $null } |
ForEach-Object { $_.toString() })
}
process {
foreach ($line in $InputObject) {
foreach ($match in ($regex.Matches($line))) {
if ($groups.Count -eq 0) {
([Object[]]$match.Groups)[-1].Value
} else {
$rv = 1 | Select-Object -Property $groups
$groups | ForEach-Object {
$rv.$_ = $match.Groups[$_].Value
}
$rv
}
}
}
}
}
class IndexedMatch
{
[string]$Text;
[int]$StartIndex;
[int]$EndIndex;
[int]$Length;
IndexedMatch() {
}
}
function ConvertTo-DateTime
{
[CmdletBinding()]
param (
[Parameter(Mandatory, ValueFromPipeline)]
[string]
$DateTimeString
)
process {
if (![String]::IsNullOrEmpty($DateTimeString)) {
if ($DateTimeString -match "(?mi)^[A-Z]{3} (?<month>[A-Z]{3}) (?<day>\d+) (?<hour>\d+):(?<minute>\d+):(?<second>\d+) (?<year>\d+)") {
return $("$($matches.month) $($matches.day) $($matches.year) $($matches.hour):$($matches.minute):$($matches.second)")
}
else {
return $DateTimeString
}
}
else {
return $DateTimeString
}
}
}
function Get-ContentIndexedMatches {
[CmdletBinding()]
param (
[Parameter()]
[string]
$Pattern,
[Parameter(Mandatory, ValueFromPipeline)]
[AllowNull()]
[AllowEmptyString()]
[string]$InputObject
)
process {
$startingElement = 1
$keyedMatches = @()
try
{
$options = [System.Text.RegularExpressions.RegexOptions]::IgnoreCase -bor [System.Text.RegularExpressions.RegexOptions]::Multiline
$RE = New-Object Regex -ArgumentList $Pattern, $options
[System.Text.RegularExpressions.MatchCollection]$theMatches = [Regex]::Matches($InputObject, $Pattern, $options);
foreach ($m in $theMatches)
{
$match = [IndexedMatch]::New()
$match.StartIndex = [int32]$m.Index;
$match.Length = [int32]$m.Length;
$match.EndIndex = [int32]$m.Index + [int32]$m.Length;
for ($counter = $startingElement; $counter -lt $m.Groups.Count; $counter++)
{
if ($m.Groups[$counter].Success) {
$match | Add-Member -MemberType NoteProperty -Name $RE.GroupNameFromNumber($counter) -Value $m.Groups[$counter].Value -Force
}
}
$match | Add-Member -MemberType NoteProperty -Name "0" -Value $m.Groups[0].Value -Force
$keyedMatches += $match;
}
}
catch
{
}
return @($keyedMatches);
}
}
Export-ModuleMember -Function * -Cmdlet * -Variable *
|
combined_dataset/train/non-malicious/937.ps1
|
937.ps1
|
$apiVersion = "2015-04-08"
$resourceGroupName = "myResourceGroup"
$accountName = "mycosmosaccount"
$databaseName = "database1"
$databaseThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/throughput"
$databaseThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/settings"
$graphName = "graph1"
$graphThroughputResourceName = $accountName + "/gremlin/" + $databaseName + "/" + $graphName + "/throughput"
$graphThroughputResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/databases/graphs/settings"
Get-AzResource -ResourceType $databaseThroughputResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName `
-Name $databaseThroughputResourceName | Select-Object Properties
Get-AzResource -ResourceType $graphThroughputResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName `
-Name $graphThroughputResourceName | Select-Object Properties
|
combined_dataset/train/non-malicious/590.ps1
|
590.ps1
|
function Get-TrueCryptContainer{
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[String]
$Name,
[Switch]
$Mounted
)
$MountedContainers = Get-PPConfiguration $PSconfigs.TrueCryptContainer.DataFile | %{$_.Content.MountedContainer}
Get-PPConfiguration $PSconfigs.TrueCryptContainer.Filter | %{$_.Content.TrueCryptContainer} | %{
$(if(-not $Name){
$_ | select Key, Name, @{L="Path";E={Get-Path $_.Path}}, FavoriteDriveLetter
}elseif($Name){
$_ | where{$_.Name -like $Name -or $_.Key -like $Name} | select Key, Name, @{L="Path";E={Get-Path $_.Path}}, FavoriteDriveLetter
}) | %{
if($Mounted){
$TrueCryptContainer = $_
$MountedContainer = $MountedContainers | where{$_.Name -eq $TrueCryptContainer.Name}
if($MountedContainer){$_ | select Key, Name, Path, FavoriteDriveLetter, @{L="Drive";E={$MountedContainer.Drive}}}
}else{
$_
}
}
}
}
|
combined_dataset/train/non-malicious/2631.ps1
|
2631.ps1
|
Function
Convert-WindowsImage
{
[CmdletBinding(DefaultParameterSetName="SRC",
HelpURI="http://gallery.technet.microsoft.com/scriptcenter/Convert-WindowsImageps1-0fe23a8f")]
param(
[Parameter(ParameterSetName="SRC", Mandatory=$true, ValueFromPipeline=$true)]
[Alias("WIM")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path $(Resolve-Path $_) })]
$SourcePath,
[Parameter(ParameterSetName="SRC")]
[Alias("VHD")]
[string]
[ValidateNotNullOrEmpty()]
$VHDPath,
[Parameter(ParameterSetName="SRC")]
[Alias("WorkDir")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path $_ })]
$WorkingDirectory = $pwd,
[Parameter(ParameterSetName="SRC")]
[Alias("Size")]
[UInt64]
[ValidateNotNullOrEmpty()]
[ValidateRange(512MB, 64TB)]
$SizeBytes = 40GB,
[Parameter(ParameterSetName="SRC")]
[Alias("Format")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateSet("VHD", "VHDX")]
$VHDFormat = "VHD",
[Parameter(ParameterSetName="SRC")]
[Alias("DiskType")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateSet("Dynamic", "Fixed")]
$VHDType = "Dynamic",
[Parameter(ParameterSetName="SRC")]
[Alias("Unattend")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path $(Resolve-Path $_) })]
$UnattendPath,
[Parameter(ParameterSetName="SRC")]
[string]
[ValidateNotNullOrEmpty()]
$Feature,
[Parameter(ParameterSetName="SRC")]
[Alias("SKU")]
[string]
[ValidateNotNullOrEmpty()]
$Edition,
[Parameter(ParameterSetName="SRC")]
[Parameter(ParameterSetName="UI")]
[string]
$BCDBoot = "bcdboot.exe",
[Parameter(ParameterSetName="SRC")]
[Parameter(ParameterSetName="UI")]
[switch]
$Passthru,
[Parameter(ParameterSetName="UI")]
[switch]
$ShowUI,
[Parameter(ParameterSetName="SRC")]
[Parameter(ParameterSetName="UI")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateSet("None", "Serial", "1394", "USB", "Local", "Network")]
$EnableDebugger = "None",
[Parameter(ParameterSetName="SRC")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateSet("MBR", "GPT")]
$VHDPartitionStyle = "MBR",
[Parameter(ParameterSetName="SRC")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateSet("NativeBoot", "VirtualMachine")]
$BCDinVHD = "VirtualMachine",
[Parameter(ParameterSetName="SRC")]
[Switch]
$ExpandOnNativeBoot = $True,
[Parameter(ParameterSetName="SRC")]
[Switch]
$RemoteDesktopEnable = $False,
[Parameter(ParameterSetName="SRC")]
[string]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path $(Resolve-Path $_) })]
$Driver
)
DynamicParam {
$parameterDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary
switch ($EnableDebugger) {
"Serial" {
$ComPortAttr = New-Object System.Management.Automation.ParameterAttribute
$ComPortAttr.ParameterSetName = "__AllParameterSets"
$ComPortAttr.Mandatory = $false
$ComPortValidator = New-Object System.Management.Automation.ValidateRangeAttribute(
1,
10
)
$ComPortNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$ComPortAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$ComPortAttrCollection.Add($ComPortAttr)
$ComPortAttrCollection.Add($ComPortValidator)
$ComPortAttrCollection.Add($ComPortNotNull)
$ComPort = New-Object System.Management.Automation.RuntimeDefinedParameter(
"ComPort",
[UInt16],
$ComPortAttrCollection
)
$ComPort.Value = 1
$parameterDictionary.Add("ComPort", $ComPort)
$BaudRateAttr = New-Object System.Management.Automation.ParameterAttribute
$BaudRateAttr.ParameterSetName = "__AllParameterSets"
$BaudRateAttr.Mandatory = $false
$BaudRateValidator = New-Object System.Management.Automation.ValidateSetAttribute(
9600, 19200,38400, 57600, 115200
)
$BaudRateNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$BaudRateAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$BaudRateAttrCollection.Add($BaudRateAttr)
$BaudRateAttrCollection.Add($BaudRateValidator)
$BaudRateAttrCollection.Add($BaudRateNotNull)
$BaudRate = New-Object System.Management.Automation.RuntimeDefinedParameter(
"BaudRate",
[UInt32],
$BaudRateAttrCollection
)
$BaudRate.Value = 115200
$parameterDictionary.Add("BaudRate", $BaudRate)
break
}
"1394" {
$ChannelAttr = New-Object System.Management.Automation.ParameterAttribute
$ChannelAttr.ParameterSetName = "__AllParameterSets"
$ChannelAttr.Mandatory = $false
$ChannelValidator = New-Object System.Management.Automation.ValidateRangeAttribute(
0,
62
)
$ChannelNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$ChannelAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$ChannelAttrCollection.Add($ChannelAttr)
$ChannelAttrCollection.Add($ChannelValidator)
$ChannelAttrCollection.Add($ChannelNotNull)
$Channel = New-Object System.Management.Automation.RuntimeDefinedParameter(
"Channel",
[UInt16],
$ChannelAttrCollection
)
$Channel.Value = 10
$parameterDictionary.Add("Channel", $Channel)
break
}
"USB" {
$TargetAttr = New-Object System.Management.Automation.ParameterAttribute
$TargetAttr.ParameterSetName = "__AllParameterSets"
$TargetAttr.Mandatory = $false
$TargetNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$TargetAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$TargetAttrCollection.Add($TargetAttr)
$TargetAttrCollection.Add($TargetNotNull)
$Target = New-Object System.Management.Automation.RuntimeDefinedParameter(
"Target",
[string],
$TargetAttrCollection
)
$Target.Value = "Debugging"
$parameterDictionary.Add("Target", $Target)
break
}
"Network" {
$IpAttr = New-Object System.Management.Automation.ParameterAttribute
$IpAttr.ParameterSetName = "__AllParameterSets"
$IpAttr.Mandatory = $true
$IpValidator = New-Object System.Management.Automation.ValidatePatternAttribute(
"\b(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\b"
)
$IpNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$IpAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$IpAttrCollection.Add($IpAttr)
$IpAttrCollection.Add($IpValidator)
$IpAttrCollection.Add($IpNotNull)
$IP = New-Object System.Management.Automation.RuntimeDefinedParameter(
"IPAddress",
[string],
$IpAttrCollection
)
$parameterDictionary.Add("IPAddress", $IP)
$PortAttr = New-Object System.Management.Automation.ParameterAttribute
$PortAttr.ParameterSetName = "__AllParameterSets"
$PortAttr.Mandatory = $false
$PortValidator = New-Object System.Management.Automation.ValidateRangeAttribute(
49152,
50039
)
$PortNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$PortAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$PortAttrCollection.Add($PortAttr)
$PortAttrCollection.Add($PortValidator)
$PortAttrCollection.Add($PortNotNull)
$Port = New-Object System.Management.Automation.RuntimeDefinedParameter(
"Port",
[UInt16],
$PortAttrCollection
)
$Port.Value = 50000
$parameterDictionary.Add("Port", $Port)
$KeyAttr = New-Object System.Management.Automation.ParameterAttribute
$KeyAttr.ParameterSetName = "__AllParameterSets"
$KeyAttr.Mandatory = $true
$KeyValidator = New-Object System.Management.Automation.ValidatePatternAttribute(
"\b([A-Z0-9]+).([A-Z0-9]+).([A-Z0-9]+).([A-Z0-9]+)\b"
)
$KeyNotNull = New-Object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$KeyAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$KeyAttrCollection.Add($KeyAttr)
$KeyAttrCollection.Add($KeyValidator)
$KeyAttrCollection.Add($KeyNotNull)
$Key = New-Object System.Management.Automation.RuntimeDefinedParameter(
"Key",
[string],
$KeyAttrCollection
)
$parameterDictionary.Add("Key", $Key)
$NoDHCPAttr = New-Object System.Management.Automation.ParameterAttribute
$NoDHCPAttr.ParameterSetName = "__AllParameterSets"
$NoDHCPAttr.Mandatory = $false
$NoDHCPAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$NoDHCPAttrCollection.Add($NoDHCPAttr)
$NoDHCP = New-Object System.Management.Automation.RuntimeDefinedParameter(
"NoDHCP",
[switch],
$NoDHCPAttrCollection
)
$parameterDictionary.Add("NoDHCP", $NoDHCP)
$NewKeyAttr = New-Object System.Management.Automation.ParameterAttribute
$NewKeyAttr.ParameterSetName = "__AllParameterSets"
$NewKeyAttr.Mandatory = $false
$NewKeyAttrCollection = New-Object System.Collections.ObjectModel.Collection[System.Attribute]
$NewKeyAttrCollection.Add($NewKeyAttr)
$NewKey = New-Object System.Management.Automation.RuntimeDefinedParameter(
"NewKey",
[switch],
$NewKeyAttrCollection
)
$parameterDictionary.Add("NewKey", $NewKey)
break
}
default {
break
}
}
return $parameterDictionary
}
Begin {
$PARTITION_STYLE_MBR = 0x00000000
$PARTITION_STYLE_GPT = 0x00000001
$ScriptVersion = DATA {
ConvertFrom-StringData -StringData @"
Major = 6
Minor = 3
Build = 9600
QFE = 7
Branch = fbl_core1_hyp_dev(mikekol)
Timestamp = 140217-3000
Flavor = amd64fre
"@
}
$vQuality = "Release to Web"
$myVersion = "$($ScriptVersion.Major).$($ScriptVersion.Minor).$($ScriptVersion.Build).$($ScriptVersion.QFE).$($ScriptVersion.Flavor).$($ScriptVersion.Branch).$($ScriptVersion.Timestamp)"
$scriptName = "Convert-WindowsImage"
$sessionKey = [Guid]::NewGuid().ToString()
$logFolder = "$($env:Temp)\$($scriptName)\$($sessionKey)"
$vhdMaxSize = 2040GB
$vhdxMaxSize = 64TB
$lowestSupportedVersion = New-Object Version "6.1"
$lowestSupportedBuild = 8250
$transcripting = $false
$VHDFormat = $VHDFormat.ToUpper()
$flagText = @"
This $VHDFormat was created by Convert-WindowsImage.ps1 $myVersion $vQuality
on $([DateTime]::Now).
"@
$header = @"
Windows(R) Image to Virtual Hard Disk Converter for Windows(R) 8
Copyright (C) Microsoft Corporation. All rights reserved.
Version $myVersion $vQuality
"@
$uiHeader = @"
You can use the fields below to configure the VHD or VHDX that you want to create!
"@
$code = @"
using System;
using System.Collections.Generic;
using System.Collections.ObjectModel;
using System.ComponentModel;
using System.Globalization;
using System.IO;
using System.Linq;
using System.Runtime.InteropServices;
using System.Security;
using System.Text;
using System.Text.RegularExpressions;
using System.Threading;
using System.Xml.Linq;
using System.Xml.XPath;
using Microsoft.Win32.SafeHandles;
namespace WIM2VHD {
/// <summary>
/// P/Invoke methods and associated enums, flags, and structs.
/// </summary>
public class
NativeMethods {
///<summary>
///User-defined function used with the RegisterMessageCallback or UnregisterMessageCallback function.
///</summary>
///<param name="MessageId">Specifies the message being sent.</param>
///<param name="wParam">Specifies additional message information. The contents of this parameter depend on the value of the
///MessageId parameter.</param>
///<param name="lParam">Specifies additional message information. The contents of this parameter depend on the value of the
///MessageId parameter.</param>
///<param name="UserData">Specifies the user-defined value passed to RegisterCallback.</param>
///<returns>
///To indicate success and to enable other subscribers to process the message return WIM_MSG_SUCCESS.
///To prevent other subscribers from receiving the message, return WIM_MSG_DONE.
///To cancel an image apply or capture, return WIM_MSG_ABORT_IMAGE when handling the WIM_MSG_PROCESS message.
///</returns>
public delegate uint
WimMessageCallback(
uint MessageId,
IntPtr wParam,
IntPtr lParam,
IntPtr UserData
);
public static void
RegisterMessageCallback(
WimFileHandle hWim,
WimMessageCallback callback) {
uint _callback = NativeMethods.WimRegisterMessageCallback(hWim, callback, IntPtr.Zero);
int rc = Marshal.GetLastWin32Error();
if (0 != rc) {
// Throw an exception if something bad happened on the Win32 end.
throw
new InvalidOperationException(
string.Format(
CultureInfo.CurrentCulture,
"Unable to register message callback."
));
}
}
public static void
UnregisterMessageCallback(
WimFileHandle hWim,
WimMessageCallback registeredCallback) {
bool status = NativeMethods.WimUnregisterMessageCallback(hWim, registeredCallback);
int rc = Marshal.GetLastWin32Error();
if (!status) {
throw
new InvalidOperationException(
string.Format(
CultureInfo.CurrentCulture,
"Unable to unregister message callback."
));
}
}
/// <summary>
/// The default depth in a VHD parent chain that this library will search through.
/// If you want to go more than one disk deep into the parent chain, provide a different value.
/// </summary>
public const uint OPEN_VIRTUAL_DISK_RW_DEFAULT_DEPTH = 0x00000001;
public const uint DEFAULT_BLOCK_SIZE = 0x00080000;
public const uint DISK_SECTOR_SIZE = 0x00000200;
internal const uint ERROR_VIRTDISK_NOT_VIRTUAL_DISK = 0xC03A0015;
internal const uint ERROR_NOT_FOUND = 0x00000490;
internal const uint ERROR_IO_PENDING = 0x000003E5;
internal const uint ERROR_INSUFFICIENT_BUFFER = 0x0000007A;
internal const uint ERROR_ERROR_DEV_NOT_EXIST = 0x00000037;
internal const uint ERROR_BAD_COMMAND = 0x00000016;
internal const uint ERROR_SUCCESS = 0x00000000;
public const uint GENERIC_READ = 0x80000000;
public const uint GENERIC_WRITE = 0x40000000;
public const short FILE_ATTRIBUTE_NORMAL = 0x00000080;
public const uint CREATE_NEW = 0x00000001;
public const uint CREATE_ALWAYS = 0x00000002;
public const uint OPEN_EXISTING = 0x00000003;
public const short INVALID_HANDLE_VALUE = -1;
internal static Guid VirtualStorageTypeVendorUnknown = new Guid("00000000-0000-0000-0000-000000000000");
internal static Guid VirtualStorageTypeVendorMicrosoft = new Guid("EC984AEC-A0F9-47e9-901F-71415A66345B");
public const uint WIM_FLAG_VERIFY = 0x00000002;
public const uint WIM_FLAG_INDEX = 0x00000004;
public const uint WM_APP = 0x00008000;
/// <summary>
/// Indicates the version of the virtual disk to create.
/// </summary>
public enum CreateVirtualDiskVersion : int {
VersionUnspecified = 0x00000000,
Version1 = 0x00000001,
Version2 = 0x00000002
}
public enum OpenVirtualDiskVersion : int {
VersionUnspecified = 0x00000000,
Version1 = 0x00000001,
Version2 = 0x00000002
}
/// <summary>
/// Contains the version of the virtual hard disk (VHD) ATTACH_VIRTUAL_DISK_PARAMETERS structure to use in calls to VHD functions.
/// </summary>
public enum AttachVirtualDiskVersion : int {
VersionUnspecified = 0x00000000,
Version1 = 0x00000001,
Version2 = 0x00000002
}
public enum CompactVirtualDiskVersion : int {
VersionUnspecified = 0x00000000,
Version1 = 0x00000001
}
/// <summary>
/// Contains the type and provider (vendor) of the virtual storage device.
/// </summary>
public enum VirtualStorageDeviceType : int {
/// <summary>
/// The storage type is unknown or not valid.
/// </summary>
Unknown = 0x00000000,
/// <summary>
/// For internal use only. This type is not supported.
/// </summary>
ISO = 0x00000001,
/// <summary>
/// Virtual Hard Disk device type.
/// </summary>
VHD = 0x00000002,
/// <summary>
/// Virtual Hard Disk v2 device type.
/// </summary>
VHDX = 0x00000003
}
/// <summary>
/// Contains virtual hard disk (VHD) open request flags.
/// </summary>
[Flags]
public enum OpenVirtualDiskFlags {
/// <summary>
/// No flags. Use system defaults.
/// </summary>
None = 0x00000000,
/// <summary>
/// Open the VHD file (backing store) without opening any differencing-chain parents. Used to correct broken parent links.
/// </summary>
NoParents = 0x00000001,
/// <summary>
/// Reserved.
/// </summary>
BlankFile = 0x00000002,
/// <summary>
/// Reserved.
/// </summary>
BootDrive = 0x00000004,
}
/// <summary>
/// Contains the bit mask for specifying access rights to a virtual hard disk (VHD).
/// </summary>
[Flags]
public enum VirtualDiskAccessMask {
/// <summary>
/// Only Version2 of OpenVirtualDisk API accepts this parameter
/// </summary>
None = 0x00000000,
/// <summary>
/// Open the virtual disk for read-only attach access. The caller must have READ access to the virtual disk image file.
/// </summary>
/// <remarks>
/// If used in a request to open a virtual disk that is already open, the other handles must be limited to either
/// VIRTUAL_DISK_ACCESS_DETACH or VIRTUAL_DISK_ACCESS_GET_INFO access, otherwise the open request with this flag will fail.
/// </remarks>
AttachReadOnly = 0x00010000,
/// <summary>
/// Open the virtual disk for read-write attaching access. The caller must have (READ | WRITE) access to the virtual disk image file.
/// </summary>
/// <remarks>
/// If used in a request to open a virtual disk that is already open, the other handles must be limited to either
/// VIRTUAL_DISK_ACCESS_DETACH or VIRTUAL_DISK_ACCESS_GET_INFO access, otherwise the open request with this flag will fail.
/// If the virtual disk is part of a differencing chain, the disk for this request cannot be less than the readWriteDepth specified
/// during the prior open request for that differencing chain.
/// </remarks>
AttachReadWrite = 0x00020000,
/// <summary>
/// Open the virtual disk to allow detaching of an attached virtual disk. The caller must have
/// (FILE_READ_ATTRIBUTES | FILE_READ_DATA) access to the virtual disk image file.
/// </summary>
Detach = 0x00040000,
/// <summary>
/// Information retrieval access to the virtual disk. The caller must have READ access to the virtual disk image file.
/// </summary>
GetInfo = 0x00080000,
/// <summary>
/// Virtual disk creation access.
/// </summary>
Create = 0x00100000,
/// <summary>
/// Open the virtual disk to perform offline meta-operations. The caller must have (READ | WRITE) access to the virtual
/// disk image file, up to readWriteDepth if working with a differencing chain.
/// </summary>
/// <remarks>
/// If the virtual disk is part of a differencing chain, the backing store (host volume) is opened in RW exclusive mode up to readWriteDepth.
/// </remarks>
MetaOperations = 0x00200000,
/// <summary>
/// Reserved.
/// </summary>
Read = 0x000D0000,
/// <summary>
/// Allows unrestricted access to the virtual disk. The caller must have unrestricted access rights to the virtual disk image file.
/// </summary>
All = 0x003F0000,
/// <summary>
/// Reserved.
/// </summary>
Writable = 0x00320000
}
/// <summary>
/// Contains virtual hard disk (VHD) creation flags.
/// </summary>
[Flags]
public enum CreateVirtualDiskFlags {
/// <summary>
/// Contains virtual hard disk (VHD) creation flags.
/// </summary>
None = 0x00000000,
/// <summary>
/// Pre-allocate all physical space necessary for the size of the virtual disk.
/// </summary>
/// <remarks>
/// The CREATE_VIRTUAL_DISK_FLAG_FULL_PHYSICAL_ALLOCATION flag is used for the creation of a fixed VHD.
/// </remarks>
FullPhysicalAllocation = 0x00000001
}
/// <summary>
/// Contains virtual disk attach request flags.
/// </summary>
[Flags]
public enum AttachVirtualDiskFlags {
/// <summary>
/// No flags. Use system defaults.
/// </summary>
None = 0x00000000,
/// <summary>
/// Attach the virtual disk as read-only.
/// </summary>
ReadOnly = 0x00000001,
/// <summary>
/// No drive letters are assigned to the disk's volumes.
/// </summary>
/// <remarks>Oddly enough, this doesn't apply to NTFS mount points.</remarks>
NoDriveLetter = 0x00000002,
/// <summary>
/// Will decouple the virtual disk lifetime from that of the VirtualDiskHandle.
/// The virtual disk will be attached until the Detach() function is called, even if all open handles to the virtual disk are closed.
/// </summary>
PermanentLifetime = 0x00000004,
/// <summary>
/// Reserved.
/// </summary>
NoLocalHost = 0x00000008
}
[Flags]
public enum DetachVirtualDiskFlag {
None = 0x00000000
}
[Flags]
public enum CompactVirtualDiskFlags {
None = 0x00000000,
NoZeroScan = 0x00000001,
NoBlockMoves = 0x00000002
}
[FlagsAttribute]
internal enum
WimCreateFileDesiredAccess
: uint {
WimQuery = 0x00000000,
WimGenericRead = 0x80000000
}
/// <summary>
/// Specifies how the file is to be treated and what features are to be used.
/// </summary>
[FlagsAttribute]
internal enum
WimApplyFlags
: uint {
/// <summary>
/// No flags.
/// </summary>
WimApplyFlagsNone = 0x00000000,
/// <summary>
/// Reserved.
/// </summary>
WimApplyFlagsReserved = 0x00000001,
/// <summary>
/// Verifies that files match original data.
/// </summary>
WimApplyFlagsVerify = 0x00000002,
/// <summary>
/// Specifies that the image is to be sequentially read for caching or performance purposes.
/// </summary>
WimApplyFlagsIndex = 0x00000004,
/// <summary>
/// Applies the image without physically creating directories or files. Useful for obtaining a list of files and directories in the image.
/// </summary>
WimApplyFlagsNoApply = 0x00000008,
/// <summary>
/// Disables restoring security information for directories.
/// </summary>
WimApplyFlagsNoDirAcl = 0x00000010,
/// <summary>
/// Disables restoring security information for files
/// </summary>
WimApplyFlagsNoFileAcl = 0x00000020,
/// <summary>
/// The .wim file is opened in a mode that enables simultaneous reading and writing.
/// </summary>
WimApplyFlagsShareWrite = 0x00000040,
/// <summary>
/// Sends a WIM_MSG_FILEINFO message during the apply operation.
/// </summary>
WimApplyFlagsFileInfo = 0x00000080,
/// <summary>
/// Disables automatic path fixups for junctions and symbolic links.
/// </summary>
WimApplyFlagsNoRpFix = 0x00000100,
/// <summary>
/// Returns a handle that cannot commit changes, regardless of the access level requested at mount time.
/// </summary>
WimApplyFlagsMountReadOnly = 0x00000200,
/// <summary>
/// Reserved.
/// </summary>
WimApplyFlagsMountFast = 0x00000400,
/// <summary>
/// Reserved.
/// </summary>
WimApplyFlagsMountLegacy = 0x00000800
}
public enum WimMessage : uint {
WIM_MSG = WM_APP + 0x1476,
WIM_MSG_TEXT,
///<summary>
///Indicates an update in the progress of an image application.
///</summary>
WIM_MSG_PROGRESS,
///<summary>
///Enables the caller to prevent a file or a directory from being captured or applied.
///</summary>
WIM_MSG_PROCESS,
///<summary>
///Indicates that volume information is being gathered during an image capture.
///</summary>
WIM_MSG_SCANNING,
///<summary>
///Indicates the number of files that will be captured or applied.
///</summary>
WIM_MSG_SETRANGE,
///<summary>
///Indicates the number of files that have been captured or applied.
///</summary>
WIM_MSG_SETPOS,
///<summary>
///Indicates that a file has been either captured or applied.
///</summary>
WIM_MSG_STEPIT,
///<summary>
///Enables the caller to prevent a file resource from being compressed during a capture.
///</summary>
WIM_MSG_COMPRESS,
///<summary>
///Alerts the caller that an error has occurred while capturing or applying an image.
///</summary>
WIM_MSG_ERROR,
///<summary>
///Enables the caller to align a file resource on a particular alignment boundary.
///</summary>
WIM_MSG_ALIGNMENT,
WIM_MSG_RETRY,
///<summary>
///Enables the caller to align a file resource on a particular alignment boundary.
///</summary>
WIM_MSG_SPLIT,
WIM_MSG_SUCCESS = 0x00000000,
WIM_MSG_ABORT_IMAGE = 0xFFFFFFFF
}
internal enum
WimCreationDisposition
: uint {
WimOpenExisting = 0x00000003,
}
internal enum
WimActionFlags
: uint {
WimIgnored = 0x00000000
}
internal enum
WimCompressionType
: uint {
WimIgnored = 0x00000000
}
internal enum
WimCreationResult
: uint {
WimCreatedNew = 0x00000000,
WimOpenedExisting = 0x00000001
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct CreateVirtualDiskParameters {
/// <summary>
/// A CREATE_VIRTUAL_DISK_VERSION enumeration that specifies the version of the CREATE_VIRTUAL_DISK_PARAMETERS structure being passed to or from the virtual hard disk (VHD) functions.
/// </summary>
public CreateVirtualDiskVersion Version;
/// <summary>
/// Unique identifier to assign to the virtual disk object. If this member is set to zero, a unique identifier is created by the system.
/// </summary>
public Guid UniqueId;
/// <summary>
/// The maximum virtual size of the virtual disk object. Must be a multiple of 512.
/// If a ParentPath is specified, this value must be zero.
/// If a SourcePath is specified, this value can be zero to specify the size of the source VHD to be used, otherwise the size specified must be greater than or equal to the size of the source disk.
/// </summary>
public ulong MaximumSize;
/// <summary>
/// Internal size of the virtual disk object blocks.
/// The following are predefined block sizes and their behaviors. For a fixed VHD type, this parameter must be zero.
/// </summary>
public uint BlockSizeInBytes;
/// <summary>
/// Internal size of the virtual disk object sectors. Must be set to 512.
/// </summary>
public uint SectorSizeInBytes;
/// <summary>
/// Optional path to a parent virtual disk object. Associates the new virtual disk with an existing virtual disk.
/// If this parameter is not NULL, SourcePath must be NULL.
/// </summary>
public string ParentPath;
/// <summary>
/// Optional path to pre-populate the new virtual disk object with block data from an existing disk. This path may refer to a VHD or a physical disk.
/// If this parameter is not NULL, ParentPath must be NULL.
/// </summary>
public string SourcePath;
/// <summary>
/// Flags for opening the VHD
/// </summary>
public OpenVirtualDiskFlags OpenFlags;
/// <summary>
/// GetInfoOnly flag for V2 handles
/// </summary>
public bool GetInfoOnly;
/// <summary>
/// Virtual Storage Type of the parent disk
/// </summary>
public VirtualStorageType ParentVirtualStorageType;
/// <summary>
/// Virtual Storage Type of the source disk
/// </summary>
public VirtualStorageType SourceVirtualStorageType;
/// <summary>
/// A GUID to use for fallback resiliency over SMB.
/// </summary>
public Guid ResiliencyGuid;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct VirtualStorageType {
public VirtualStorageDeviceType DeviceId;
public Guid VendorId;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct SecurityDescriptor {
public byte revision;
public byte size;
public short control;
public IntPtr owner;
public IntPtr group;
public IntPtr sacl;
public IntPtr dacl;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct
OpenVirtualDiskParameters {
public OpenVirtualDiskVersion Version;
public bool GetInfoOnly;
public Guid ResiliencyGuid;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct VirtualDiskProgress {
public int OperationStatus;
public ulong CurrentValue;
public ulong CompletionValue;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct AttachVirtualDiskParameters {
public AttachVirtualDiskVersion Version;
public int Reserved;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
public struct CompactVirtualDiskParameters {
public CompactVirtualDiskVersion Version;
public uint Reserved;
}
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
public static extern uint
CreateVirtualDisk(
[In, Out] ref VirtualStorageType VirtualStorageType,
[In] string Path,
[In] VirtualDiskAccessMask VirtualDiskAccessMask,
[In, Out] ref SecurityDescriptor SecurityDescriptor,
[In] CreateVirtualDiskFlags Flags,
[In] uint ProviderSpecificFlags,
[In, Out] ref CreateVirtualDiskParameters Parameters,
[In] IntPtr Overlapped,
[Out] out SafeFileHandle Handle);
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
internal static extern uint
OpenVirtualDisk(
[In, Out] ref VirtualStorageType VirtualStorageType,
[In] string Path,
[In] VirtualDiskAccessMask VirtualDiskAccessMask,
[In] OpenVirtualDiskFlags Flags,
[In, Out] ref OpenVirtualDiskParameters Parameters,
[Out] out SafeFileHandle Handle);
/// <summary>
/// GetVirtualDiskOperationProgress API allows getting progress info for the async virtual disk operations (ie. Online Mirror)
/// </summary>
/// <param name="VirtualDiskHandle"></param>
/// <param name="Overlapped"></param>
/// <param name="Progress"></param>
/// <returns></returns>
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
internal static extern uint
GetVirtualDiskOperationProgress(
[In] SafeFileHandle VirtualDiskHandle,
[In] IntPtr Overlapped,
[In, Out] ref VirtualDiskProgress Progress);
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
public static extern uint
AttachVirtualDisk(
[In] SafeFileHandle VirtualDiskHandle,
[In, Out] ref SecurityDescriptor SecurityDescriptor,
[In] AttachVirtualDiskFlags Flags,
[In] uint ProviderSpecificFlags,
[In, Out] ref AttachVirtualDiskParameters Parameters,
[In] IntPtr Overlapped);
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
public static extern uint
DetachVirtualDisk(
[In] SafeFileHandle VirtualDiskHandle,
[In] NativeMethods.DetachVirtualDiskFlag Flags,
[In] uint ProviderSpecificFlags);
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
public static extern uint
CompactVirtualDisk(
[In] SafeFileHandle VirtualDiskHandle,
[In] CompactVirtualDiskFlags Flags,
[In, Out] ref CompactVirtualDiskParameters Parameters,
[In] IntPtr Overlapped);
[DllImport("virtdisk.dll", CharSet = CharSet.Unicode)]
public static extern uint
GetVirtualDiskPhysicalPath(
[In] SafeFileHandle VirtualDiskHandle,
[In, Out] ref uint DiskPathSizeInBytes,
[Out] StringBuilder DiskPath);
[DllImport("advapi32", SetLastError = true)]
public static extern bool InitializeSecurityDescriptor(
[Out] out SecurityDescriptor pSecurityDescriptor,
[In] uint dwRevision);
/// <summary>
/// CreateEvent API is used while calling async Online Mirror API
/// </summary>
/// <param name="lpEventAttributes"></param>
/// <param name="bManualReset"></param>
/// <param name="bInitialState"></param>
/// <param name="lpName"></param>
/// <returns></returns>
[DllImport("kernel32.dll", CharSet = CharSet.Unicode)]
internal static extern IntPtr
CreateEvent(
[In, Optional] IntPtr lpEventAttributes,
[In] bool bManualReset,
[In] bool bInitialState,
[In, Optional] string lpName);
public sealed class WimFileHandle : SafeHandle {
public WimFileHandle(
string wimPath)
: base(IntPtr.Zero, true) {
if (String.IsNullOrEmpty(wimPath)) {
throw new ArgumentNullException("wimPath");
}
if (!File.Exists(Path.GetFullPath(wimPath))) {
throw new FileNotFoundException((new FileNotFoundException()).Message, wimPath);
}
NativeMethods.WimCreationResult creationResult;
this.handle = NativeMethods.WimCreateFile(
wimPath,
NativeMethods.WimCreateFileDesiredAccess.WimGenericRead,
NativeMethods.WimCreationDisposition.WimOpenExisting,
NativeMethods.WimActionFlags.WimIgnored,
NativeMethods.WimCompressionType.WimIgnored,
out creationResult
);
// Check results.
if (creationResult != NativeMethods.WimCreationResult.WimOpenedExisting) {
throw new Win32Exception();
}
if (this.handle == IntPtr.Zero) {
throw new Win32Exception();
}
// Set the temporary path.
NativeMethods.WimSetTemporaryPath(
this,
Environment.ExpandEnvironmentVariables("%TEMP%")
);
}
protected override bool ReleaseHandle() {
return NativeMethods.WimCloseHandle(this.handle);
}
public override bool IsInvalid {
get { return this.handle == IntPtr.Zero; }
}
}
public sealed class WimImageHandle : SafeHandle {
public WimImageHandle(
WimFile Container,
uint ImageIndex)
: base(IntPtr.Zero, true) {
if (null == Container) {
throw new ArgumentNullException("Container");
}
if ((Container.Handle.IsClosed) || (Container.Handle.IsInvalid)) {
throw new ArgumentNullException("The handle to the WIM file has already been closed, or is invalid.", "Container");
}
if (ImageIndex > Container.ImageCount) {
throw new ArgumentOutOfRangeException("ImageIndex", "The index does not exist in the specified WIM file.");
}
this.handle = NativeMethods.WimLoadImage(
Container.Handle.DangerousGetHandle(),
ImageIndex);
}
protected override bool ReleaseHandle() {
return NativeMethods.WimCloseHandle(this.handle);
}
public override bool IsInvalid {
get { return this.handle == IntPtr.Zero; }
}
}
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMCreateFile")]
internal static extern IntPtr
WimCreateFile(
[In, MarshalAs(UnmanagedType.LPWStr)] string WimPath,
[In] WimCreateFileDesiredAccess DesiredAccess,
[In] WimCreationDisposition CreationDisposition,
[In] WimActionFlags FlagsAndAttributes,
[In] WimCompressionType CompressionType,
[Out, Optional] out WimCreationResult CreationResult
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMCloseHandle")]
[return: MarshalAs(UnmanagedType.Bool)]
internal static extern bool
WimCloseHandle(
[In] IntPtr Handle
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMLoadImage")]
internal static extern IntPtr
WimLoadImage(
[In] IntPtr Handle,
[In] uint ImageIndex
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMGetImageCount")]
internal static extern uint
WimGetImageCount(
[In] WimFileHandle Handle
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMApplyImage")]
internal static extern bool
WimApplyImage(
[In] WimImageHandle Handle,
[In, Optional, MarshalAs(UnmanagedType.LPWStr)] string Path,
[In] WimApplyFlags Flags
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMGetImageInformation")]
[return: MarshalAs(UnmanagedType.Bool)]
internal static extern bool
WimGetImageInformation(
[In] SafeHandle Handle,
[Out] out StringBuilder ImageInfo,
[Out] out uint SizeOfImageInfo
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMSetTemporaryPath")]
[return: MarshalAs(UnmanagedType.Bool)]
internal static extern bool
WimSetTemporaryPath(
[In] WimFileHandle Handle,
[In] string TempPath
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMRegisterMessageCallback", CallingConvention = CallingConvention.StdCall)]
internal static extern uint
WimRegisterMessageCallback(
[In, Optional] WimFileHandle hWim,
[In] WimMessageCallback MessageProc,
[In, Optional] IntPtr ImageInfo
);
[DllImport("Wimgapi.dll", CharSet = CharSet.Unicode, SetLastError = true, EntryPoint = "WIMUnregisterMessageCallback", CallingConvention = CallingConvention.StdCall)]
[return: MarshalAs(UnmanagedType.Bool)]
internal static extern bool
WimUnregisterMessageCallback(
[In, Optional] WimFileHandle hWim,
[In] WimMessageCallback MessageProc
);
}
public class WimFile {
internal XDocument m_xmlInfo;
internal List<WimImage> m_imageList;
private static NativeMethods.WimMessageCallback wimMessageCallback;
/// <summary>
/// DefaultImageEvent handler
/// </summary>
public delegate void DefaultImageEventHandler(object sender, DefaultImageEventArgs e);
///<summary>
///ProcessFileEvent handler
///</summary>
public delegate void ProcessFileEventHandler(object sender, ProcessFileEventArgs e);
///<summary>
///Enable the caller to prevent a file resource from being compressed during a capture.
///</summary>
public event ProcessFileEventHandler ProcessFileEvent;
///<summary>
///Indicate an update in the progress of an image application.
///</summary>
public event DefaultImageEventHandler ProgressEvent;
///<summary>
///Alert the caller that an error has occurred while capturing or applying an image.
///</summary>
public event DefaultImageEventHandler ErrorEvent;
///<summary>
///Indicate that a file has been either captured or applied.
///</summary>
public event DefaultImageEventHandler StepItEvent;
///<summary>
///Indicate the number of files that will be captured or applied.
///</summary>
public event DefaultImageEventHandler SetRangeEvent;
///<summary>
///Indicate the number of files that have been captured or applied.
///</summary>
public event DefaultImageEventHandler SetPosEvent;
private
enum
ImageEventMessage : uint {
///<summary>
///Enables the caller to prevent a file or a directory from being captured or applied.
///</summary>
Progress = NativeMethods.WimMessage.WIM_MSG_PROGRESS,
///<summary>
///Notification sent to enable the caller to prevent a file or a directory from being captured or applied.
///To prevent a file or a directory from being captured or applied, call WindowsImageContainer.SkipFile().
///</summary>
Process = NativeMethods.WimMessage.WIM_MSG_PROCESS,
///<summary>
///Enables the caller to prevent a file resource from being compressed during a capture.
///</summary>
Compress = NativeMethods.WimMessage.WIM_MSG_COMPRESS,
///<summary>
///Alerts the caller that an error has occurred while capturing or applying an image.
///</summary>
Error = NativeMethods.WimMessage.WIM_MSG_ERROR,
///<summary>
///Enables the caller to align a file resource on a particular alignment boundary.
///</summary>
Alignment = NativeMethods.WimMessage.WIM_MSG_ALIGNMENT,
///<summary>
///Enables the caller to align a file resource on a particular alignment boundary.
///</summary>
Split = NativeMethods.WimMessage.WIM_MSG_SPLIT,
///<summary>
///Indicates that volume information is being gathered during an image capture.
///</summary>
Scanning = NativeMethods.WimMessage.WIM_MSG_SCANNING,
///<summary>
///Indicates the number of files that will be captured or applied.
///</summary>
SetRange = NativeMethods.WimMessage.WIM_MSG_SETRANGE,
///<summary>
///Indicates the number of files that have been captured or applied.
/// </summary>
SetPos = NativeMethods.WimMessage.WIM_MSG_SETPOS,
///<summary>
///Indicates that a file has been either captured or applied.
///</summary>
StepIt = NativeMethods.WimMessage.WIM_MSG_STEPIT,
///<summary>
///Success.
///</summary>
Success = NativeMethods.WimMessage.WIM_MSG_SUCCESS,
///<summary>
///Abort.
///</summary>
Abort = NativeMethods.WimMessage.WIM_MSG_ABORT_IMAGE
}
///<summary>
///Event callback to the Wimgapi events
///</summary>
private
uint
ImageEventMessagePump(
uint MessageId,
IntPtr wParam,
IntPtr lParam,
IntPtr UserData) {
uint status = (uint) NativeMethods.WimMessage.WIM_MSG_SUCCESS;
DefaultImageEventArgs eventArgs = new DefaultImageEventArgs(wParam, lParam, UserData);
switch ((ImageEventMessage)MessageId) {
case ImageEventMessage.Progress:
ProgressEvent(this, eventArgs);
break;
case ImageEventMessage.Process:
if (null != ProcessFileEvent) {
string fileToImage = Marshal.PtrToStringUni(wParam);
ProcessFileEventArgs fileToProcess = new ProcessFileEventArgs(fileToImage, lParam);
ProcessFileEvent(this, fileToProcess);
if (fileToProcess.Abort == true) {
status = (uint)ImageEventMessage.Abort;
}
}
break;
case ImageEventMessage.Error:
if (null != ErrorEvent) {
ErrorEvent(this, eventArgs);
}
break;
case ImageEventMessage.SetRange:
if (null != SetRangeEvent) {
SetRangeEvent(this, eventArgs);
}
break;
case ImageEventMessage.SetPos:
if (null != SetPosEvent) {
SetPosEvent(this, eventArgs);
}
break;
case ImageEventMessage.StepIt:
if (null != StepItEvent) {
StepItEvent(this, eventArgs);
}
break;
default:
break;
}
return status;
}
/// <summary>
/// Constructor.
/// </summary>
/// <param name="wimPath">Path to the WIM container.</param>
public
WimFile(string wimPath) {
if (string.IsNullOrEmpty(wimPath)) {
throw new ArgumentNullException("wimPath");
}
if (!File.Exists(Path.GetFullPath(wimPath))) {
throw new FileNotFoundException((new FileNotFoundException()).Message, wimPath);
}
Handle = new NativeMethods.WimFileHandle(wimPath);
// Hook up the events before we return.
//wimMessageCallback = new NativeMethods.WimMessageCallback(ImageEventMessagePump);
//NativeMethods.RegisterMessageCallback(this.Handle, wimMessageCallback);
}
/// <summary>
/// Closes the WIM file.
/// </summary>
public void
Close() {
foreach (WimImage image in Images) {
image.Close();
}
if (null != wimMessageCallback) {
NativeMethods.UnregisterMessageCallback(this.Handle, wimMessageCallback);
wimMessageCallback = null;
}
if ((!Handle.IsClosed) && (!Handle.IsInvalid)) {
Handle.Close();
}
}
/// <summary>
/// Provides a list of WimImage objects, representing the images in the WIM container file.
/// </summary>
public List<WimImage>
Images {
get {
if (null == m_imageList) {
int imageCount = (int)ImageCount;
m_imageList = new List<WimImage>(imageCount);
for (int i = 0; i < imageCount; i++) {
// Load up each image so it's ready for us.
m_imageList.Add(
new WimImage(this, (uint)i + 1));
}
}
return m_imageList;
}
}
/// <summary>
/// Provides a list of names of the images in the specified WIM container file.
/// </summary>
public List<string>
ImageNames {
get {
List<string> nameList = new List<string>();
foreach (WimImage image in Images) {
nameList.Add(image.ImageName);
}
return nameList;
}
}
/// <summary>
/// Indexer for WIM images inside the WIM container, indexed by the image number.
/// The list of Images is 0-based, but the WIM container is 1-based, so we automatically compensate for that.
/// this[1] returns the 0th image in the WIM container.
/// </summary>
/// <param name="ImageIndex">The 1-based index of the image to retrieve.</param>
/// <returns>WinImage object.</returns>
public WimImage
this[int ImageIndex] {
get { return Images[ImageIndex - 1]; }
}
/// <summary>
/// Indexer for WIM images inside the WIM container, indexed by the image name.
/// WIMs created by different processes sometimes contain different information - including the name.
/// Some images have their name stored in the Name field, some in the Flags field, and some in the EditionID field.
/// We take all of those into account in while searching the WIM.
/// </summary>
/// <param name="ImageName"></param>
/// <returns></returns>
public WimImage
this[string ImageName] {
get {
return
Images.Where(i => (
i.ImageName.ToUpper() == ImageName.ToUpper() ||
i.ImageFlags.ToUpper() == ImageName.ToUpper() ))
.DefaultIfEmpty(null)
.FirstOrDefault<WimImage>();
}
}
/// <summary>
/// Returns the number of images in the WIM container.
/// </summary>
internal uint
ImageCount {
get { return NativeMethods.WimGetImageCount(Handle); }
}
/// <summary>
/// Returns an XDocument representation of the XML metadata for the WIM container and associated images.
/// </summary>
internal XDocument
XmlInfo {
get {
if (null == m_xmlInfo) {
StringBuilder builder;
uint bytes;
if (!NativeMethods.WimGetImageInformation(Handle, out builder, out bytes)) {
throw new Win32Exception();
}
// Ensure the length of the returned bytes to avoid garbage characters at the end.
int charCount = (int)bytes / sizeof(char);
if (null != builder) {
// Get rid of the unicode file marker at the beginning of the XML.
builder.Remove(0, 1);
builder.EnsureCapacity(charCount - 1);
builder.Length = charCount - 1;
// This isn't likely to change while we have the image open, so cache it.
m_xmlInfo = XDocument.Parse(builder.ToString().Trim());
} else {
m_xmlInfo = null;
}
}
return m_xmlInfo;
}
}
public NativeMethods.WimFileHandle Handle {
get;
private set;
}
}
public class
WimImage {
internal XDocument m_xmlInfo;
public
WimImage(
WimFile Container,
uint ImageIndex) {
if (null == Container) {
throw new ArgumentNullException("Container");
}
if ((Container.Handle.IsClosed) || (Container.Handle.IsInvalid)) {
throw new ArgumentNullException("The handle to the WIM file has already been closed, or is invalid.", "Container");
}
if (ImageIndex > Container.ImageCount) {
throw new ArgumentOutOfRangeException("ImageIndex", "The index does not exist in the specified WIM file.");
}
Handle = new NativeMethods.WimImageHandle(Container, ImageIndex);
}
public enum
Architectures : uint {
x86 = 0x0,
ARM = 0x5,
IA64 = 0x6,
AMD64 = 0x9
}
public void
Close() {
if ((!Handle.IsClosed) && (!Handle.IsInvalid)) {
Handle.Close();
}
}
public void
Apply(
string ApplyToPath) {
if (string.IsNullOrEmpty(ApplyToPath)) {
throw new ArgumentNullException("ApplyToPath");
}
ApplyToPath = Path.GetFullPath(ApplyToPath);
if (!Directory.Exists(ApplyToPath)) {
throw new DirectoryNotFoundException("The WIM cannot be applied because the specified directory was not found.");
}
if (!NativeMethods.WimApplyImage(
this.Handle,
ApplyToPath,
NativeMethods.WimApplyFlags.WimApplyFlagsNone
)) {
throw new Win32Exception();
}
}
public NativeMethods.WimImageHandle
Handle {
get;
private set;
}
internal XDocument
XmlInfo {
get {
if (null == m_xmlInfo) {
StringBuilder builder;
uint bytes;
if (!NativeMethods.WimGetImageInformation(Handle, out builder, out bytes)) {
throw new Win32Exception();
}
// Ensure the length of the returned bytes to avoid garbage characters at the end.
int charCount = (int)bytes / sizeof(char);
if (null != builder) {
// Get rid of the unicode file marker at the beginning of the XML.
builder.Remove(0, 1);
builder.EnsureCapacity(charCount - 1);
builder.Length = charCount - 1;
// This isn't likely to change while we have the image open, so cache it.
m_xmlInfo = XDocument.Parse(builder.ToString().Trim());
} else {
m_xmlInfo = null;
}
}
return m_xmlInfo;
}
}
public string
ImageIndex {
get { return XmlInfo.Element("IMAGE").Attribute("INDEX").Value; }
}
public string
ImageName {
get { return XmlInfo.XPathSelectElement("/IMAGE/NAME").Value; }
}
public string
ImageEditionId {
get { return XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/EDITIONID").Value; }
}
public string
ImageFlags {
get { return XmlInfo.XPathSelectElement("/IMAGE/FLAGS").Value; }
}
public string
ImageProductType {
get {
return XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/PRODUCTTYPE").Value;
}
}
public string
ImageInstallationType {
get { return XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/INSTALLATIONTYPE").Value; }
}
public string
ImageDescription {
get { return XmlInfo.XPathSelectElement("/IMAGE/DESCRIPTION").Value; }
}
public ulong
ImageSize {
get { return ulong.Parse(XmlInfo.XPathSelectElement("/IMAGE/TOTALBYTES").Value); }
}
public Architectures
ImageArchitecture {
get {
int arch = -1;
try {
arch = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/ARCH").Value);
} catch { }
return (Architectures)arch;
}
}
public string
ImageDefaultLanguage {
get {
string lang = null;
try {
lang = XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/LANGUAGES/DEFAULT").Value;
} catch { }
return lang;
}
}
public Version
ImageVersion {
get {
int major = 0;
int minor = 0;
int build = 0;
int revision = 0;
try {
major = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/MAJOR").Value);
minor = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/MINOR").Value);
build = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/BUILD").Value);
revision = int.Parse(XmlInfo.XPathSelectElement("/IMAGE/WINDOWS/VERSION/SPBUILD").Value);
} catch { }
return (new Version(major, minor, build, revision));
}
}
public string
ImageDisplayName {
get { return XmlInfo.XPathSelectElement("/IMAGE/DISPLAYNAME").Value; }
}
public string
ImageDisplayDescription {
get { return XmlInfo.XPathSelectElement("/IMAGE/DISPLAYDESCRIPTION").Value; }
}
}
///<summary>
///Describes the file that is being processed for the ProcessFileEvent.
///</summary>
public class
DefaultImageEventArgs : EventArgs {
///<summary>
///Default constructor.
///</summary>
public
DefaultImageEventArgs(
IntPtr wideParameter,
IntPtr leftParameter,
IntPtr userData) {
WideParameter = wideParameter;
LeftParameter = leftParameter;
UserData = userData;
}
///<summary>
///wParam
///</summary>
public IntPtr WideParameter {
get;
private set;
}
///<summary>
///lParam
///</summary>
public IntPtr LeftParameter {
get;
private set;
}
///<summary>
///UserData
///</summary>
public IntPtr UserData {
get;
private set;
}
}
///<summary>
///Describes the file that is being processed for the ProcessFileEvent.
///</summary>
public class
ProcessFileEventArgs : EventArgs {
///<summary>
///Default constructor.
///</summary>
///<param name="file">Fully qualified path and file name. For example: c:\file.sys.</param>
///<param name="skipFileFlag">Default is false - skip file and continue.
///Set to true to abort the entire image capture.</param>
public
ProcessFileEventArgs(
string file,
IntPtr skipFileFlag) {
m_FilePath = file;
m_SkipFileFlag = skipFileFlag;
}
///<summary>
///Skip file from being imaged.
///</summary>
public void
SkipFile() {
byte[] byteBuffer = {
0
};
int byteBufferSize = byteBuffer.Length;
Marshal.Copy(byteBuffer, 0, m_SkipFileFlag, byteBufferSize);
}
///<summary>
///Fully qualified path and file name.
///</summary>
public string
FilePath {
get {
string stringToReturn = "";
if (m_FilePath != null) {
stringToReturn = m_FilePath;
}
return stringToReturn;
}
}
///<summary>
///Flag to indicate if the entire image capture should be aborted.
///Default is false - skip file and continue. Setting to true will
///abort the entire image capture.
///</summary>
public bool Abort {
set { m_Abort = value; }
get { return m_Abort; }
}
private string m_FilePath;
private bool m_Abort;
private IntPtr m_SkipFileFlag;
}
// Based on code written by the Hyper-V Test team.
/// <summary>
/// The Virtual Hard Disk class provides methods for creating and manipulating Virtual Hard Disk files.
/// </summary>
public class
VirtualHardDisk : IDisposable {
private SafeFileHandle m_virtualHardDiskHandle = null;
private string m_filePath = null;
private bool m_isDisposed;
private NativeMethods.VirtualStorageDeviceType m_deviceType = NativeMethods.VirtualStorageDeviceType.Unknown;
/// <summary>
/// Disposal method for Virtual Hard Disk objects.
/// </summary>
public void
Dispose() {
this.Dispose(true);
GC.SuppressFinalize(this);
}
/// <summary>
/// Disposal method for Virtual Hard Disk objects.
/// </summary>
/// <param name="disposing"></param>
public void
Dispose(
bool disposing) {
// Check to see if Dispose has already been called.
if (!this.m_isDisposed) {
// If disposing equals true, dispose all managed
// and unmanaged resources.
if (disposing) {
// Dispose managed resources.
if (this.DiskIndex != 0) {
this.Close();
}
}
// Call the appropriate methods to clean up
// unmanaged resources here.
// If disposing is false,
// only the following code is executed.
// Note disposing has been done.
m_isDisposed = true;
}
}
private VirtualHardDisk(
SafeFileHandle Handle,
string Path,
NativeMethods.VirtualStorageDeviceType DeviceType) {
if (Handle.IsInvalid || Handle.IsClosed) {
throw new InvalidOperationException("The handle to the Virtual Hard Disk is invalid.");
}
m_virtualHardDiskHandle = Handle;
m_filePath = Path;
m_deviceType = DeviceType;
}
/// <summary>
/// Destroys a VHD object.
/// </summary>
~VirtualHardDisk() {
this.Dispose(false);
}
/// <summary>
/// Abbreviated signature of CreateSparseDisk so it's easier to use from WIM2VHD.
/// </summary>
/// <param name="virtualStorageDeviceType">The type of disk to create, VHD or VHDX.</param>
/// <param name="path">The path of the disk to create.</param>
/// <param name="size">The maximum size of the disk to create.</param>
/// <param name="overwrite">Overwrite the VHD if it already exists.</param>
/// <returns>Virtual Hard Disk object</returns>
public static VirtualHardDisk
CreateSparseDisk(
NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType,
string path,
ulong size,
bool overwrite) {
return CreateSparseDisk(
path,
size,
overwrite,
null,
IntPtr.Zero,
(virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD)
? NativeMethods.DEFAULT_BLOCK_SIZE
: 0,
virtualStorageDeviceType,
NativeMethods.DISK_SECTOR_SIZE);
}
/// <summary>
/// Creates a new sparse (dynamically expanding) virtual hard disk (.vhd). Supports both sync and async modes.
/// The VHD image file uses only as much space on the backing store as needed to store the actual data the VHD currently contains.
/// </summary>
/// <param name="path">The path and name of the VHD to create.</param>
/// <param name="size">The size of the VHD to create in bytes.
/// When creating this type of VHD, the VHD API does not test for free space on the physical backing store based on the maximum size requested,
/// therefore it is possible to successfully create a dynamic VHD with a maximum size larger than the available physical disk free space.
/// The maximum size of a dynamic VHD is 2,040 GB. The minimum size is 3 MB.</param>
/// <param name="source">Optional path to pre-populate the new virtual disk object with block data from an existing disk
/// This path may refer to a VHD or a physical disk. Use NULL if you don't want a source.</param>
/// <param name="overwrite">If the VHD exists, setting this parameter to 'True' will delete it and create a new one.</param>
/// <param name="overlapped">If not null, the operation runs in async mode</param>
/// <param name="blockSizeInBytes">Block size for the VHD.</param>
/// <param name="virtualStorageDeviceType">VHD format version (VHD1 or VHD2)</param>
/// <param name="sectorSizeInBytes">Sector size for the VHD.</param>
/// <returns>Returns a SafeFileHandle corresponding to the virtual hard disk that was created.</returns>
/// <exception cref="ArgumentOutOfRangeException">Thrown when an invalid size is specified</exception>
/// <exception cref="FileNotFoundException">Thrown when source VHD is not found.</exception>
/// <exception cref="SecurityException">Thrown when there was an error while creating the default security descriptor.</exception>
/// <exception cref="Win32Exception">Thrown when an error occurred while creating the VHD.</exception>
public static VirtualHardDisk
CreateSparseDisk(
string path,
ulong size,
bool overwrite,
string source,
IntPtr overlapped,
uint blockSizeInBytes,
NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType,
uint sectorSizeInBytes) {
// Validate the virtualStorageDeviceType
if (virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHD && virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHDX) {
throw (
new ArgumentOutOfRangeException(
"virtualStorageDeviceType",
virtualStorageDeviceType,
"VirtualStorageDeviceType must be VHD or VHDX."
));
}
// Validate size. It needs to be a multiple of DISK_SECTOR_SIZE (512)...
if ((size % NativeMethods.DISK_SECTOR_SIZE) != 0) {
throw (
new ArgumentOutOfRangeException(
"size",
size,
"The size of the virtual disk must be a multiple of 512."
));
}
if ((!String.IsNullOrEmpty(source)) && (!System.IO.File.Exists(source))) {
throw (
new System.IO.FileNotFoundException(
"Unable to find the source file.",
source
));
}
if ((overwrite) && (System.IO.File.Exists(path))) {
System.IO.File.Delete(path);
}
NativeMethods.CreateVirtualDiskParameters createParams = new NativeMethods.CreateVirtualDiskParameters();
// Select the correct version.
createParams.Version = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD)
? NativeMethods.CreateVirtualDiskVersion.Version1
: NativeMethods.CreateVirtualDiskVersion.Version2;
createParams.UniqueId = Guid.NewGuid();
createParams.MaximumSize = size;
createParams.BlockSizeInBytes = blockSizeInBytes;
createParams.SectorSizeInBytes = sectorSizeInBytes;
createParams.ParentPath = null;
createParams.SourcePath = source;
createParams.OpenFlags = NativeMethods.OpenVirtualDiskFlags.None;
createParams.GetInfoOnly = false;
createParams.ParentVirtualStorageType = new NativeMethods.VirtualStorageType();
createParams.SourceVirtualStorageType = new NativeMethods.VirtualStorageType();
//
// Create and init a security descriptor.
// Since we're creating an essentially blank SD to use with CreateVirtualDisk
// the VHD will take on the security values from the parent directory.
//
NativeMethods.SecurityDescriptor securityDescriptor;
if (!NativeMethods.InitializeSecurityDescriptor(out securityDescriptor, 1)) {
throw (
new SecurityException(
"Unable to initialize the security descriptor for the virtual disk."
));
}
NativeMethods.VirtualStorageType virtualStorageType = new NativeMethods.VirtualStorageType();
virtualStorageType.DeviceId = virtualStorageDeviceType;
virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorMicrosoft;
SafeFileHandle vhdHandle;
uint returnCode = NativeMethods.CreateVirtualDisk(
ref virtualStorageType,
path,
(virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD)
? NativeMethods.VirtualDiskAccessMask.All
: NativeMethods.VirtualDiskAccessMask.None,
ref securityDescriptor,
NativeMethods.CreateVirtualDiskFlags.None,
0,
ref createParams,
overlapped,
out vhdHandle);
if (NativeMethods.ERROR_SUCCESS != returnCode && NativeMethods.ERROR_IO_PENDING != returnCode) {
throw (
new Win32Exception(
(int)returnCode
));
}
return new VirtualHardDisk(vhdHandle, path, virtualStorageDeviceType);
}
/// <summary>
/// Abbreviated signature of CreateFixedDisk so it's easier to use from WIM2VHD.
/// </summary>
/// <param name="virtualStorageDeviceType">The type of disk to create, VHD or VHDX.</param>
/// <param name="path">The path of the disk to create.</param>
/// <param name="size">The maximum size of the disk to create.</param>
/// <param name="overwrite">Overwrite the VHD if it already exists.</param>
/// <returns>Virtual Hard Disk object</returns>
public static VirtualHardDisk
CreateFixedDisk(
NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType,
string path,
ulong size,
bool overwrite) {
return CreateFixedDisk(
path,
size,
overwrite,
null,
IntPtr.Zero,
0,
virtualStorageDeviceType,
NativeMethods.DISK_SECTOR_SIZE);
}
/// <summary>
/// Creates a fixed-size Virtual Hard Disk. Supports both sync and async modes. This methods always calls the V2 version of the
/// CreateVirtualDisk API, and creates VHD2.
/// </summary>
/// <param name="path">The path and name of the VHD to create.</param>
/// <param name="size">The size of the VHD to create in bytes.
/// The VHD image file is pre-allocated on the backing store for the maximum size requested.
/// The maximum size of a dynamic VHD is 2,040 GB. The minimum size is 3 MB.</param>
/// <param name="source">Optional path to pre-populate the new virtual disk object with block data from an existing disk
/// This path may refer to a VHD or a physical disk. Use NULL if you don't want a source.</param>
/// <param name="overwrite">If the VHD exists, setting this parameter to 'True' will delete it and create a new one.</param>
/// <param name="overlapped">If not null, the operation runs in async mode</param>
/// <param name="blockSizeInBytes">Block size for the VHD.</param>
/// <param name="virtualStorageDeviceType">Virtual storage device type: VHD1 or VHD2.</param>
/// <param name="sectorSizeInBytes">Sector size for the VHD.</param>
/// <returns>Returns a SafeFileHandle corresponding to the virtual hard disk that was created.</returns>
/// <remarks>Creating a fixed disk can be a time consuming process!</remarks>
/// <exception cref="ArgumentOutOfRangeException">Thrown when an invalid size or wrong virtual storage device type is specified.</exception>
/// <exception cref="FileNotFoundException">Thrown when source VHD is not found.</exception>
/// <exception cref="SecurityException">Thrown when there was an error while creating the default security descriptor.</exception>
/// <exception cref="Win32Exception">Thrown when an error occurred while creating the VHD.</exception>
public static VirtualHardDisk
CreateFixedDisk(
string path,
ulong size,
bool overwrite,
string source,
IntPtr overlapped,
uint blockSizeInBytes,
NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType,
uint sectorSizeInBytes) {
// Validate the virtualStorageDeviceType
if (virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHD && virtualStorageDeviceType != NativeMethods.VirtualStorageDeviceType.VHDX) {
throw (
new ArgumentOutOfRangeException(
"virtualStorageDeviceType",
virtualStorageDeviceType,
"VirtualStorageDeviceType must be VHD or VHDX."
));
}
// Validate size. It needs to be a multiple of DISK_SECTOR_SIZE (512)...
if ((size % NativeMethods.DISK_SECTOR_SIZE) != 0) {
throw (
new ArgumentOutOfRangeException(
"size",
size,
"The size of the virtual disk must be a multiple of 512."
));
}
if ((!String.IsNullOrEmpty(source)) && (!System.IO.File.Exists(source))) {
throw (
new System.IO.FileNotFoundException(
"Unable to find the source file.",
source
));
}
if ((overwrite) && (System.IO.File.Exists(path))) {
System.IO.File.Delete(path);
}
NativeMethods.CreateVirtualDiskParameters createParams = new NativeMethods.CreateVirtualDiskParameters();
// Select the correct version.
createParams.Version = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD)
? NativeMethods.CreateVirtualDiskVersion.Version1
: NativeMethods.CreateVirtualDiskVersion.Version2;
createParams.UniqueId = Guid.NewGuid();
createParams.MaximumSize = size;
createParams.BlockSizeInBytes = blockSizeInBytes;
createParams.SectorSizeInBytes = sectorSizeInBytes;
createParams.ParentPath = null;
createParams.SourcePath = source;
createParams.OpenFlags = NativeMethods.OpenVirtualDiskFlags.None;
createParams.GetInfoOnly = false;
createParams.ParentVirtualStorageType = new NativeMethods.VirtualStorageType();
createParams.SourceVirtualStorageType = new NativeMethods.VirtualStorageType();
//
// Create and init a security descriptor.
// Since we're creating an essentially blank SD to use with CreateVirtualDisk
// the VHD will take on the security values from the parent directory.
//
NativeMethods.SecurityDescriptor securityDescriptor;
if (!NativeMethods.InitializeSecurityDescriptor(out securityDescriptor, 1)) {
throw (
new SecurityException(
"Unable to initialize the security descriptor for the virtual disk."
));
}
NativeMethods.VirtualStorageType virtualStorageType = new NativeMethods.VirtualStorageType();
virtualStorageType.DeviceId = virtualStorageDeviceType;
virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorMicrosoft;
SafeFileHandle vhdHandle;
uint returnCode = NativeMethods.CreateVirtualDisk(
ref virtualStorageType,
path,
(virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD)
? NativeMethods.VirtualDiskAccessMask.All
: NativeMethods.VirtualDiskAccessMask.None,
ref securityDescriptor,
NativeMethods.CreateVirtualDiskFlags.FullPhysicalAllocation,
0,
ref createParams,
overlapped,
out vhdHandle);
if (NativeMethods.ERROR_SUCCESS != returnCode && NativeMethods.ERROR_IO_PENDING != returnCode) {
throw (
new Win32Exception(
(int)returnCode
));
}
return new VirtualHardDisk(vhdHandle, path, virtualStorageDeviceType);
}
/// <summary>
/// Opens a virtual hard disk (VHD) using the V2 of OpenVirtualDisk Win32 API for use, allowing you to explicitly specify OpenVirtualDiskFlags,
/// Read/Write depth, and Access Mask information.
/// </summary>
/// <param name="path">The path and name of the Virtual Hard Disk file to open.</param>
/// <param name="accessMask">Contains the bit mask for specifying access rights to a virtual hard disk (VHD). Default is All.</param>
/// <param name="readWriteDepth">Indicates the number of stores, beginning with the child, of the backing store chain to open as read/write.
/// The remaining stores in the differencing chain will be opened read-only. This is necessary for merge operations to succeed. Default is 0x1.</param>
/// <param name="flags">An OpenVirtualDiskFlags object to modify the way the Virtual Hard Disk is opened. Default is Unknown.</param>
/// <param name="virtualStorageDeviceType">VHD Format Version (VHD1 or VHD2)</param>
/// <returns>VirtualHardDisk object</returns>
/// <exception cref="FileNotFoundException">Thrown if the VHD at path is not found.</exception>
/// <exception cref="Win32Exception">Thrown if an error occurred while opening the VHD.</exception>
public static VirtualHardDisk
Open(
string path,
NativeMethods.VirtualDiskAccessMask accessMask,
uint readWriteDepth,
NativeMethods.OpenVirtualDiskFlags flags,
NativeMethods.VirtualStorageDeviceType virtualStorageDeviceType) {
if (!File.Exists(path)) {
throw new FileNotFoundException("The specified VHD was not found. Please check your path and try again.", path);
}
NativeMethods.OpenVirtualDiskParameters openParams = new NativeMethods.OpenVirtualDiskParameters();
// Select the correct version.
openParams.Version = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.VHD)
? NativeMethods.OpenVirtualDiskVersion.Version1
: NativeMethods.OpenVirtualDiskVersion.Version2;
openParams.GetInfoOnly = false;
NativeMethods.VirtualStorageType virtualStorageType = new NativeMethods.VirtualStorageType();
virtualStorageType.DeviceId = virtualStorageDeviceType;
virtualStorageType.VendorId = (virtualStorageDeviceType == NativeMethods.VirtualStorageDeviceType.Unknown)
? virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorUnknown
: virtualStorageType.VendorId = NativeMethods.VirtualStorageTypeVendorMicrosoft;
SafeFileHandle vhdHandle;
uint returnCode = NativeMethods.OpenVirtualDisk(
ref virtualStorageType,
path,
accessMask,
flags,
ref openParams,
out vhdHandle);
if (NativeMethods.ERROR_SUCCESS != returnCode) {
throw new Win32Exception((int)returnCode);
}
return new VirtualHardDisk(vhdHandle, path, virtualStorageDeviceType);
}
/// <summary>
/// Retrieves a collection of drive letters that are currently available on the system.
/// </summary>
/// <remarks>Drives A and B are not included in the collection, even if they are available.</remarks>
/// <returns>A collection of drive letters that are currently available on the system.</returns>
public static ReadOnlyCollection<Char>
GetAvailableDriveLetters() {
List<Char> availableDrives = new List<Char>();
for (int i = (byte)'C'; i <= (byte)'Z'; i++) {
availableDrives.Add((char)i);
}
foreach (string drive in System.Environment.GetLogicalDrives()) {
availableDrives.Remove(drive.ToUpper(CultureInfo.InvariantCulture)[0]);
}
return new ReadOnlyCollection<char>(availableDrives);
}
/// <summary>
/// Gets the first available drive letter on the current system.
/// </summary>
/// <remarks>Drives A and B will not be returned, even if they are available.</remarks>
/// <returns>Char representing the first available drive letter.</returns>
public static char
GetFirstAvailableDriveLetter() {
return GetAvailableDriveLetters()[0];
}
/// <summary>
/// Creates a NativeOverlapped object, initializes its EventHandle property, and pins the object to the memory.
/// This overlapped objects are useful when executing VHD meta-ops in async mode.
/// </summary>
/// <returns>Returns the GCHandle for the pinned overlapped structure</returns>
public static GCHandle
CreatePinnedOverlappedObject() {
NativeOverlapped overlapped = new NativeOverlapped();
overlapped.EventHandle = NativeMethods.CreateEvent(IntPtr.Zero, true, false, null);
GCHandle handleForOverllapped = GCHandle.Alloc(overlapped, GCHandleType.Pinned);
return handleForOverllapped;
}
/// <summary>
/// GetVirtualDiskOperationProgress API allows getting progress info for the async virtual disk operations (ie. Online Mirror)
/// </summary>
/// <param name="progress"></param>
/// <param name="overlapped"></param>
/// <returns></returns>
/// <exception cref="Win32Exception">Thrown when an error occurred while mirroring the VHD.</exception>
public uint
GetVirtualDiskOperationProgress(
ref NativeMethods.VirtualDiskProgress progress,
IntPtr overlapped) {
uint returnCode = NativeMethods.GetVirtualDiskOperationProgress(
this.m_virtualHardDiskHandle,
overlapped,
ref progress);
return returnCode;
}
/// <summary>
/// Closes all open handles to the Virtual Hard Disk object.
/// If the VHD is currently attached, and the PermanentLifetime was not specified, this operation will detach it.
/// </summary>
public void
Close() {
m_virtualHardDiskHandle.Close();
}
/// <summary>
/// Attaches a virtual hard disk (VHD) by locating an appropriate VHD provider to accomplish the attachment.
/// </summary>
/// <param name="attachVirtualDiskFlags">
/// A combination of values from the attachVirtualDiskFlags enumeration which will dictate how the behavior of the VHD once mounted.
/// </param>
/// <exception cref="Win32Exception">Thrown when an error occurred while attaching the VHD.</exception>
/// <exception cref="SecurityException">Thrown when an error occurred while creating the default security descriptor.</exception>
public void
Attach(
NativeMethods.AttachVirtualDiskFlags attachVirtualDiskFlags) {
if (!this.IsAttached) {
// Get the current disk index. We need it later.
int diskIndex = this.DiskIndex;
NativeMethods.AttachVirtualDiskParameters attachParameters = new NativeMethods.AttachVirtualDiskParameters();
// For attach, the correct version is always Version1 for Win7 and Win8.
attachParameters.Version = NativeMethods.AttachVirtualDiskVersion.Version1;
attachParameters.Reserved = 0;
NativeMethods.SecurityDescriptor securityDescriptor;
if (!NativeMethods.InitializeSecurityDescriptor(out securityDescriptor, 1)) {
throw (new SecurityException("Unable to initialize the security descriptor for the virtual disk."));
}
uint returnCode = NativeMethods.AttachVirtualDisk(
m_virtualHardDiskHandle,
ref securityDescriptor,
attachVirtualDiskFlags,
0,
ref attachParameters,
IntPtr.Zero);
switch (returnCode) {
case NativeMethods.ERROR_SUCCESS:
break;
default:
throw new Win32Exception((int)returnCode);
}
// There's apparently a bit of a timing issue here on some systems.
// If the disk index isn't updated, keep checking once per second for five seconds.
// If it's not updated after that, it's probably not our fault.
short attempts = 5;
while ((attempts-- >= 0) && (diskIndex == this.DiskIndex)) {
System.Threading.Thread.Sleep(1000);
}
}
}
/// <summary>
/// Attaches a virtual hard disk (VHD) by locating an appropriate VHD provider to accomplish the attachment.
/// </summary>
/// <remarks>
/// This method attaches the VHD with no flags.
/// </remarks>
/// <exception cref="Win32Exception">Thrown when an error occurred while attaching the VHD.</exception>
/// <exception cref="SecurityException">Thrown when an error occurred while creating the default security descriptor.</exception>
public void
Attach() {
this.Attach(NativeMethods.AttachVirtualDiskFlags.None);
}
/// <summary>
/// Unsurfaces (detaches) a virtual hard disk (VHD) by locating an appropriate VHD provider to accomplish the operation.
/// </summary>
public void
Detach() {
if (this.IsAttached) {
uint returnCode = NativeMethods.DetachVirtualDisk(
m_virtualHardDiskHandle,
NativeMethods.DetachVirtualDiskFlag.None,
0);
switch (returnCode) {
case NativeMethods.ERROR_NOT_FOUND:
// There's nothing to do here. The device wasn't found, which means there's a
// really good chance that it wasn't attached to begin with.
// And, since we were asked to detach it anyway, we can assume that the system
// is already in the desired state.
case NativeMethods.ERROR_SUCCESS:
break;
default:
throw new Win32Exception((int)returnCode);
}
}
}
/// <summary>
/// Reduces the size of the virtual hard disk (VHD) backing store file. Supports both sync and async modes.
/// </summary>
/// <param name="overlapped">If not null, the operation runs in async mode</param>
public uint
Compact(IntPtr overlapped) {
return this.Compact(
overlapped,
NativeMethods.CompactVirtualDiskFlags.None);
}
/// <summary>
/// Reduces the size of the virtual hard disk (VHD) backing store file. Supports both sync and async modes.
/// </summary>
/// <param name="overlapped">If not null, the operation runs in async mode</param>
/// <param name="flags">Flags for Compact operation</param>
public uint
Compact(
IntPtr overlapped,
NativeMethods.CompactVirtualDiskFlags flags) {
NativeMethods.CompactVirtualDiskParameters compactParams = new NativeMethods.CompactVirtualDiskParameters();
compactParams.Version = NativeMethods.CompactVirtualDiskVersion.Version1;
uint returnCode = NativeMethods.CompactVirtualDisk(
m_virtualHardDiskHandle,
flags,
ref compactParams,
overlapped);
if ((overlapped == IntPtr.Zero && NativeMethods.ERROR_SUCCESS != returnCode) ||
(overlapped != IntPtr.Zero && NativeMethods.ERROR_IO_PENDING != returnCode)) {
throw new Win32Exception((int)returnCode);
}
return returnCode;
}
/// <summary>
/// The SafeFileHandle object for the opened VHD.
/// </summary>
public SafeFileHandle
VirtualHardDiskHandle {
get {
return m_virtualHardDiskHandle;
}
}
/// <summary>
/// Indicates the index of the disk when attached.
/// If the virtual hard disk is not currently attached, -1 will be returned.
/// </summary>
public int
DiskIndex {
get {
string path = PhysicalPath;
if (null != path) {
Match match = Regex.Match(path, @"\d+$"); // look for the last digits in the path
return System.Convert.ToInt32(match.Value, CultureInfo.InvariantCulture);
} else {
return -1;
}
}
}
/// <summary>
/// Indicates whether the current Virtual Hard Disk is attached to the system.
/// </summary>
public bool
IsAttached {
get {
return (this.DiskIndex != -1);
}
}
/// <summary>
/// Retrieves the path to the physical device object that contains a virtual hard disk (VHD), if the VHD is attached.
/// If it is not attached, NULL will be returned.
/// </summary>
public string
PhysicalPath {
get {
uint pathSize = 1024; // Isn't MAX_PATH 255?
StringBuilder path = new StringBuilder((int)pathSize);
uint returnCode = 0;
returnCode = NativeMethods.GetVirtualDiskPhysicalPath(
m_virtualHardDiskHandle,
ref pathSize,
path);
if (NativeMethods.ERROR_ERROR_DEV_NOT_EXIST == returnCode) {
return null;
} else if (NativeMethods.ERROR_SUCCESS == returnCode) {
return path.ToString();
} else {
throw new Win32Exception((int)returnCode);
}
}
}
}
}
"@
Function Mount-RegistryHive {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)]
[System.IO.FileInfo]
[ValidateNotNullOrEmpty()]
[ValidateScript({ $_.Exists })]
$Hive
)
$mountKey = [System.Guid]::NewGuid().ToString()
$regPath = "REG.EXE"
if (Test-Path HKLM:\$mountKey) {
throw "The registry path already exists. I should just regenerate it, but I'm lazy."
}
$regArgs = (
"LOAD",
"HKLM\$mountKey",
$Hive.Fullname
)
try {
Run-Executable -Executable $regPath -Arguments $regArgs
} catch {
throw
}
$global:mountedHive = $mountKey
return $mountKey
}
Function Dismount-RegistryHive {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)]
[string]
[ValidateNotNullOrEmpty()]
$HiveMountPoint
)
$regPath = "REG.EXE"
$regArgs = (
"UNLOAD",
"HKLM\$($HiveMountPoint)"
)
Run-Executable -Executable $regPath -Arguments $regArgs
$global:mountedHive = $null
}
Function
Apply-BCDStoreChanges {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[string]
[ValidateNotNullOrEmpty()]
$BcdStoreFile,
[Parameter()]
[string]
[ValidateNotNullOrEmpty()]
[ValidateScript({ ($_ -eq $PARTITION_STYLE_MBR) -or ($_ -eq $PARTITION_STYLE_GPT) })]
$PartitionStyle = $PARTITION_STYLE_MBR,
[Parameter()]
[UInt64]
[ValidateScript({ $_ -ge 0 })]
$DiskSignature,
[Parameter()]
[UInt64]
[ValidateScript({ $_ -ge 0 })]
$PartitionOffset
)
$BOOTMGR_ID = "{9DEA862C-5CDD-4E70-ACC1-F32B344D4795}"
$DEFAULT_TYPE = 0x23000003
$APPLICATION_DEVICE_TYPE = 0x11000001
$OS_DEVICE_TYPE = 0x21000001
Write-W2VInfo "Opening $($BcdStoreFile) for configuration..."
Write-W2VTrace "Partition Style : $PartitionStyle"
Write-W2VTrace "Disk Signature : $DiskSignature"
Write-W2VTrace "Partition Offset: $PartitionOffset"
$conn = New-Object Management.ConnectionOptions
$scope = New-Object Management.ManagementScope -ArgumentList "\\.\ROOT\WMI", $conn
$scope.Connect()
$path = New-Object Management.ManagementPath `
-ArgumentList "\\.\ROOT\WMI:BCDObject.Id=`"$($BOOTMGR_ID)`",StoreFilePath=`"$($BcdStoreFile.Replace('\', '\\'))`""
$options = New-Object Management.ObjectGetOptions
$bootMgr = New-Object Management.ManagementObject -ArgumentList $scope, $path, $options
try {
$bootMgr.Get()
} catch {
throw "Could not get the BootMgr object from the Virtual Disks BCDStore."
}
Write-W2VTrace "Setting Qualified Partition Device Element for Virtual Disk boot..."
$ret = $bootMgr.SetQualifiedPartitionDeviceElement($APPLICATION_DEVICE_TYPE, $PartitionStyle, $DiskSignature, $PartitionOffset)
if (!$ret.ReturnValue) {
throw "Unable to set Qualified Partition Device Element in Virtual Disks BCDStore."
}
Write-W2VTrace "Getting the default boot entry..."
$defaultBootEntryId = ($bootMgr.GetElement($DEFAULT_TYPE)).Element.Id
Write-W2VTrace "Getting the OS Loader..."
$path = New-Object Management.ManagementPath `
-ArgumentList "\\.\ROOT\WMI:BCDObject.Id=`"$($defaultBootEntryId)`",StoreFilePath=`"$($BcdStoreFile.Replace('\', '\\'))`""
$osLoader= New-Object Management.ManagementObject -ArgumentList $scope, $path, $options
try {
$osLoader.Get()
} catch {
throw "Could not get the OS Loader..."
}
Write-W2VTrace "Setting Qualified Partition Device Element in the OS Loader Application..."
$ret = $osLoader.SetQualifiedPartitionDeviceElement($APPLICATION_DEVICE_TYPE, $PartitionStyle, $DiskSignature, $PartitionOffset)
if (!$ret.ReturnValue) {
throw "Could not set Qualified Partition Device Element in the OS Loader Application."
}
Write-W2VTrace "Setting Qualified Partition Device Element in the OS Loader Device..."
$ret = $osLoader.SetQualifiedPartitionDeviceElement($OS_DEVICE_TYPE, $PartitionStyle, $DiskSignature, $PartitionOffset)
if (!$ret.ReturnValue) {
throw "Could not set Qualified Partition Device Element in the OS Loader Device."
}
Write-W2VInfo "BCD configuration complete. Moving on..."
}
function
Test-Admin {
[CmdletBinding()]
param()
$currentUser = New-Object Security.Principal.WindowsPrincipal $([Security.Principal.WindowsIdentity]::GetCurrent())
$isAdmin = $currentUser.IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator)
Write-W2VTrace "isUserAdmin? $isAdmin"
return $isAdmin
}
function
Test-WindowsVersion {
$os = Get-WmiObject -Class Win32_OperatingSystem
$isWin8 = (($os.Version -ge 6.2) -and ($os.BuildNumber -ge $lowestSupportedBuild))
Write-W2VTrace "isWindows8? $isWin8"
return $isWin8
}
function
Write-W2VInfo {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[string]
[ValidateNotNullOrEmpty()]
$text
)
Write-Host "INFO : $($text)" -ForegroundColor White
}
function
Write-W2VTrace {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[string]
[ValidateNotNullOrEmpty()]
$text
)
Write-Verbose $text
}
function
Write-W2VError {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[string]
[ValidateNotNullOrEmpty()]
$text
)
Write-Host "ERROR : $($text)" -ForegroundColor Red
}
function
Write-W2VWarn {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[string]
[ValidateNotNullOrEmpty()]
$text
)
Write-Host "WARN : $($text)" -ForegroundColor Yellow
}
function
Run-Executable {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
[ValidateNotNullOrEmpty()]
$Executable,
[Parameter(Mandatory=$true)]
[string[]]
[ValidateNotNullOrEmpty()]
$Arguments,
[Parameter()]
[int]
[ValidateNotNullOrEmpty()]
$SuccessfulErrorCode = 0
)
Write-W2VTrace "Running $Executable $Arguments"
$ret = Start-Process `
-FilePath $Executable `
-ArgumentList $Arguments `
-NoNewWindow `
-Wait `
-RedirectStandardOutput "$($env:temp)\$($scriptName)\$($sessionKey)\$($Executable)-StandardOutput.txt" `
-RedirectStandardError "$($env:temp)\$($scriptName)\$($sessionKey)\$($Executable)-StandardError.txt" `
-Passthru
Write-W2VTrace "Return code was $($ret.ExitCode)."
if ($ret.ExitCode -ne $SuccessfulErrorCode) {
throw "$Executable failed with code $($ret.ExitCode)!"
}
}
Function Test-IsNetworkLocation {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeLine = $true)]
[string]
[ValidateNotNullOrEmpty()]
$Path
)
$result = $false
if ([bool]([URI]$Path).IsUNC) {
$result = $true
} else {
$driveInfo = [IO.DriveInfo]((Resolve-Path $Path).Path)
if ($driveInfo.DriveType -eq "Network") {
$result = $true
}
}
return $result
}
}
Process {
$openWim = $null
$openVhd = $null
$openIso = $null
$openImage = $null
$vhdFinalName = $null
$vhdFinalPath = $null
$mountedHive = $null
$isoPath = $null
Write-Host $header
try {
if (Test-Path $logFolder) {
$null = rd $logFolder -Force -Recurse
}
$null = md $logFolder -Force
try {
$null = Start-Transcript -Path (Join-Path $logFolder "Convert-WindowsImageTranscript.txt") -Force -ErrorAction SilentlyContinue
$transcripting = $true
} catch {
Write-W2VWarn "Transcription is already running. No Convert-WindowsImage-specific transcript will be created."
$transcripting = $false
}
Add-Type -TypeDefinition $code -ReferencedAssemblies "System.Xml","System.Linq","System.Xml.Linq"
if (!(Test-Admin)) {
throw "Images can only be applied by an administrator. Please launch PowerShell elevated and run this script again."
}
if (![string]::IsNullOrEmpty($UnattendPath)) {
$UnattendPath = (Resolve-Path $UnattendPath).Path
}
if ($ShowUI) {
Write-W2VInfo "Launching UI..."
Add-Type -AssemblyName System.Drawing,System.Windows.Forms
$frmMain = New-Object System.Windows.Forms.Form
$groupBox4 = New-Object System.Windows.Forms.GroupBox
$btnGo = New-Object System.Windows.Forms.Button
$groupBox3 = New-Object System.Windows.Forms.GroupBox
$txtVhdName = New-Object System.Windows.Forms.TextBox
$label6 = New-Object System.Windows.Forms.Label
$btnWrkBrowse = New-Object System.Windows.Forms.Button
$cmbVhdSizeUnit = New-Object System.Windows.Forms.ComboBox
$numVhdSize = New-Object System.Windows.Forms.NumericUpDown
$cmbVhdFormat = New-Object System.Windows.Forms.ComboBox
$label5 = New-Object System.Windows.Forms.Label
$txtWorkingDirectory = New-Object System.Windows.Forms.TextBox
$cmbVhdType = New-Object System.Windows.Forms.ComboBox
$label4 = New-Object System.Windows.Forms.Label
$label3 = New-Object System.Windows.Forms.Label
$label2 = New-Object System.Windows.Forms.Label
$label7 = New-Object System.Windows.Forms.Label
$txtUnattendFile = New-Object System.Windows.Forms.TextBox
$btnUnattendBrowse = New-Object System.Windows.Forms.Button
$groupBox2 = New-Object System.Windows.Forms.GroupBox
$cmbSkuList = New-Object System.Windows.Forms.ComboBox
$label1 = New-Object System.Windows.Forms.Label
$groupBox1 = New-Object System.Windows.Forms.GroupBox
$txtSourcePath = New-Object System.Windows.Forms.TextBox
$btnBrowseWim = New-Object System.Windows.Forms.Button
$openFileDialog1 = New-Object System.Windows.Forms.OpenFileDialog
$openFolderDialog1 = New-Object System.Windows.Forms.FolderBrowserDialog
$InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState
$btnGo_OnClick = {
$frmMain.Close()
}
$btnWrkBrowse_OnClick = {
$openFolderDialog1.RootFolder = "Desktop"
$openFolderDialog1.Description = "Select the folder you'd like your VHD(X) to be created in."
$openFolderDialog1.SelectedPath = $WorkingDirectory
$ret = $openFolderDialog1.ShowDialog()
if ($ret -ilike "ok") {
$WorkingDirectory = $txtWorkingDirectory = $openFolderDialog1.SelectedPath
Write-W2VInfo "Selected Working Directory is $WorkingDirectory..."
}
}
$btnUnattendBrowse_OnClick = {
$openFileDialog1.InitialDirectory = $pwd
$openFileDialog1.Filter = "XML files (*.xml)|*.XML|All files (*.*)|*.*"
$openFileDialog1.FilterIndex = 1
$openFileDialog1.CheckFileExists = $true
$openFileDialog1.CheckPathExists = $true
$openFileDialog1.FileName = $null
$openFileDialog1.ShowHelp = $false
$openFileDialog1.Title = "Select an unattend file..."
$ret = $openFileDialog1.ShowDialog()
if ($ret -ilike "ok") {
$UnattendPath = $txtUnattendFile.Text = $openFileDialog1.FileName
}
}
$btnBrowseWim_OnClick = {
$openFileDialog1.InitialDirectory = $pwd
$openFileDialog1.Filter = "All compatible files (*.ISO, *.WIM)|*.ISO;*.WIM|All files (*.*)|*.*"
$openFileDialog1.FilterIndex = 1
$openFileDialog1.CheckFileExists = $true
$openFileDialog1.CheckPathExists = $true
$openFileDialog1.FileName = $null
$openFileDialog1.ShowHelp = $false
$openFileDialog1.Title = "Select a source file..."
$ret = $openFileDialog1.ShowDialog()
if ($ret -ilike "ok") {
if (([IO.FileInfo]$openFileDialog1.FileName).Extension -ilike ".iso") {
if (Test-IsNetworkLocation $openFileDialog1.FileName) {
Write-W2VInfo "Copying ISO $(Split-Path $openFileDialog1.FileName -Leaf) to temp folder..."
Write-W2VWarn "The UI may become non-responsive while this copy takes place..."
Copy-Item -Path $openFileDialog1.FileName -Destination $env:Temp -Force
$openFileDialog1.FileName = "$($env:Temp)\$(Split-Path $openFileDialog1.FileName -Leaf)"
}
$txtSourcePath.Text = $isoPath = (Resolve-Path $openFileDialog1.FileName).Path
Write-W2VInfo "Opening ISO $(Split-Path $isoPath -Leaf)..."
$openIso = Mount-DiskImage -ImagePath $isoPath -StorageType ISO -PassThru
$openIso = Get-DiskImage -ImagePath $isoPath
$driveLetter = ($openIso | Get-Volume).DriveLetter
$script:SourcePath = "$($driveLetter):\sources\install.wim"
Write-W2VInfo "Looking for $($SourcePath)..."
if (!(Test-Path $SourcePath)) {
throw "The specified ISO does not appear to be valid Windows installation media."
}
} else {
$txtSourcePath.Text = $script:SourcePath = $openFileDialog1.FileName
}
if (Test-IsNetworkLocation $SourcePath) {
Write-W2VInfo "Copying WIM $(Split-Path $SourcePath -Leaf) to temp folder..."
Write-W2VWarn "The UI may become non-responsive while this copy takes place..."
Copy-Item -Path $SourcePath -Destination $env:Temp -Force
$txtSourcePath.Text = $script:SourcePath = "$($env:Temp)\$(Split-Path $SourcePath -Leaf)"
}
$script:SourcePath = (Resolve-Path $SourcePath).Path
Write-W2VInfo "Scanning WIM metadata..."
$tempOpenWim = $null
try {
$tempOpenWim = New-Object WIM2VHD.WimFile $SourcePath
if ($tempOpenWim.ImageNames.Contains("Windows Longhorn Client") -or
$tempOpenWim.ImageNames.Contains("Windows Longhorn Server") -or
$tempOpenWim.ImageNames.Contains("Windows Longhorn Server Core")) {
[Windows.Forms.MessageBox]::Show(
"Convert-WindowsImage cannot run against unstaged builds. Please try again with a staged build.",
"WIM is incompatible!",
"OK",
"Error"
)
return
} else {
$tempOpenWim.Images | %{ $cmbSkuList.Items.Add($_.ImageFlags) }
$cmbSkuList.SelectedIndex = 0
}
} catch {
throw "Unable to load WIM metadata!"
} finally {
$tempOpenWim.Close()
Write-W2VTrace "Closing WIM metadata..."
}
}
}
$OnLoadForm_StateCorrection = {
$frmMain.WindowState = $InitialFormWindowState
}
$unit = $null
switch ([Math]::Round($SizeBytes.ToString().Length / 3)) {
3 { $unit = "MB"; break }
4 { $unit = "GB"; break }
5 { $unit = "TB"; break }
default { $unit = ""; break }
}
$quantity = Invoke-Expression -Command "$($SizeBytes) / 1$($unit)"
$frmMain.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 579
$System_Drawing_Size.Width = 512
$frmMain.ClientSize = $System_Drawing_Size
$frmMain.Font = New-Object System.Drawing.Font("Segoe UI",10,0,3,1)
$frmMain.FormBorderStyle = 1
$frmMain.MaximizeBox = $False
$frmMain.MinimizeBox = $False
$frmMain.Name = "frmMain"
$frmMain.StartPosition = 1
$frmMain.Text = "Convert-WindowsImage UI"
$groupBox4.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 10
$System_Drawing_Point.Y = 498
$groupBox4.Location = $System_Drawing_Point
$groupBox4.Name = "groupBox4"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 69
$System_Drawing_Size.Width = 489
$groupBox4.Size = $System_Drawing_Size
$groupBox4.TabIndex = 8
$groupBox4.TabStop = $False
$groupBox4.Text = "4. Make the VHD!"
$frmMain.Controls.Add($groupBox4)
$btnGo.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 39
$System_Drawing_Point.Y = 24
$btnGo.Location = $System_Drawing_Point
$btnGo.Name = "btnGo"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 33
$System_Drawing_Size.Width = 415
$btnGo.Size = $System_Drawing_Size
$btnGo.TabIndex = 0
$btnGo.Text = "&Make my VHD"
$btnGo.UseVisualStyleBackColor = $True
$btnGo.DialogResult = "OK"
$btnGo.add_Click($btnGo_OnClick)
$groupBox4.Controls.Add($btnGo)
$frmMain.AcceptButton = $btnGo
$groupBox3.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 10
$System_Drawing_Point.Y = 243
$groupBox3.Location = $System_Drawing_Point
$groupBox3.Name = "groupBox3"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 245
$System_Drawing_Size.Width = 489
$groupBox3.Size = $System_Drawing_Size
$groupBox3.TabIndex = 7
$groupBox3.TabStop = $False
$groupBox3.Text = "3. Choose configuration options"
$frmMain.Controls.Add($groupBox3)
$txtVhdName.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 150
$txtVhdName.Location = $System_Drawing_Point
$txtVhdName.Name = "txtVhdName"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 418
$txtVhdName.Size = $System_Drawing_Size
$txtVhdName.TabIndex = 10
$groupBox3.Controls.Add($txtVhdName)
$txtUnattendFile.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 198
$txtUnattendFile.Location = $System_Drawing_Point
$txtUnattendFile.Name = "txtUnattendFile"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 418
$txtUnattendFile.Size = $System_Drawing_Size
$txtUnattendFile.TabIndex = 11
$groupBox3.Controls.Add($txtUnattendFile)
$label7.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 23
$System_Drawing_Point.Y = 180
$label7.Location = $System_Drawing_Point
$label7.Name = "label7"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 175
$label7.Size = $System_Drawing_Size
$label7.Text = "Unattend File (Optional)"
$groupBox3.Controls.Add($label7)
$label6.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 23
$System_Drawing_Point.Y = 132
$label6.Location = $System_Drawing_Point
$label6.Name = "label6"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 175
$label6.Size = $System_Drawing_Size
$label6.Text = "VHD Name (Optional)"
$groupBox3.Controls.Add($label6)
$btnUnattendBrowse.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 449
$System_Drawing_Point.Y = 199
$btnUnattendBrowse.Location = $System_Drawing_Point
$btnUnattendBrowse.Name = "btnUnattendBrowse"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 27
$btnUnattendBrowse.Size = $System_Drawing_Size
$btnUnattendBrowse.TabIndex = 9
$btnUnattendBrowse.Text = "..."
$btnUnattendBrowse.UseVisualStyleBackColor = $True
$btnUnattendBrowse.add_Click($btnUnattendBrowse_OnClick)
$groupBox3.Controls.Add($btnUnattendBrowse)
$btnWrkBrowse.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 449
$System_Drawing_Point.Y = 98
$btnWrkBrowse.Location = $System_Drawing_Point
$btnWrkBrowse.Name = "btnWrkBrowse"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 27
$btnWrkBrowse.Size = $System_Drawing_Size
$btnWrkBrowse.TabIndex = 9
$btnWrkBrowse.Text = "..."
$btnWrkBrowse.UseVisualStyleBackColor = $True
$btnWrkBrowse.add_Click($btnWrkBrowse_OnClick)
$groupBox3.Controls.Add($btnWrkBrowse)
$cmbVhdSizeUnit.DataBindings.DefaultDataSourceUpdateMode = 0
$cmbVhdSizeUnit.FormattingEnabled = $True
$cmbVhdSizeUnit.Items.Add("MB") | Out-Null
$cmbVhdSizeUnit.Items.Add("GB") | Out-Null
$cmbVhdSizeUnit.Items.Add("TB") | Out-Null
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 409
$System_Drawing_Point.Y = 42
$cmbVhdSizeUnit.Location = $System_Drawing_Point
$cmbVhdSizeUnit.Name = "cmbVhdSizeUnit"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 67
$cmbVhdSizeUnit.Size = $System_Drawing_Size
$cmbVhdSizeUnit.TabIndex = 5
$cmbVhdSizeUnit.Text = $unit
$groupBox3.Controls.Add($cmbVhdSizeUnit)
$numVhdSize.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 340
$System_Drawing_Point.Y = 42
$numVhdSize.Location = $System_Drawing_Point
$numVhdSize.Name = "numVhdSize"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 63
$numVhdSize.Size = $System_Drawing_Size
$numVhdSize.TabIndex = 4
$numVhdSize.Value = $quantity
$groupBox3.Controls.Add($numVhdSize)
$cmbVhdFormat.DataBindings.DefaultDataSourceUpdateMode = 0
$cmbVhdFormat.FormattingEnabled = $True
$cmbVhdFormat.Items.Add("VHD") | Out-Null
$cmbVhdFormat.Items.Add("VHDX") | Out-Null
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 42
$cmbVhdFormat.Location = $System_Drawing_Point
$cmbVhdFormat.Name = "cmbVhdFormat"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 136
$cmbVhdFormat.Size = $System_Drawing_Size
$cmbVhdFormat.TabIndex = 0
$cmbVhdFormat.Text = $VHDFormat
$groupBox3.Controls.Add($cmbVhdFormat)
$label5.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 23
$System_Drawing_Point.Y = 76
$label5.Location = $System_Drawing_Point
$label5.Name = "label5"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 264
$label5.Size = $System_Drawing_Size
$label5.TabIndex = 8
$label5.Text = "Working Directory"
$groupBox3.Controls.Add($label5)
$txtWorkingDirectory.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 99
$txtWorkingDirectory.Location = $System_Drawing_Point
$txtWorkingDirectory.Name = "txtWorkingDirectory"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 418
$txtWorkingDirectory.Size = $System_Drawing_Size
$txtWorkingDirectory.TabIndex = 7
$txtWorkingDirectory.Text = $WorkingDirectory
$groupBox3.Controls.Add($txtWorkingDirectory)
$cmbVhdType.DataBindings.DefaultDataSourceUpdateMode = 0
$cmbVhdType.FormattingEnabled = $True
$cmbVhdType.Items.Add("Dynamic") | Out-Null
$cmbVhdType.Items.Add("Fixed") | Out-Null
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 176
$System_Drawing_Point.Y = 42
$cmbVhdType.Location = $System_Drawing_Point
$cmbVhdType.Name = "cmbVhdType"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 144
$cmbVhdType.Size = $System_Drawing_Size
$cmbVhdType.TabIndex = 2
$cmbVhdType.Text = $VHDType
$groupBox3.Controls.Add($cmbVhdType)
$label4.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 340
$System_Drawing_Point.Y = 21
$label4.Location = $System_Drawing_Point
$label4.Name = "label4"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 27
$System_Drawing_Size.Width = 86
$label4.Size = $System_Drawing_Size
$label4.TabIndex = 6
$label4.Text = "VHD Size"
$groupBox3.Controls.Add($label4)
$label3.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 176
$System_Drawing_Point.Y = 21
$label3.Location = $System_Drawing_Point
$label3.Name = "label3"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 27
$System_Drawing_Size.Width = 92
$label3.Size = $System_Drawing_Size
$label3.TabIndex = 3
$label3.Text = "VHD Type"
$groupBox3.Controls.Add($label3)
$label2.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 21
$label2.Location = $System_Drawing_Point
$label2.Name = "label2"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 30
$System_Drawing_Size.Width = 118
$label2.Size = $System_Drawing_Size
$label2.TabIndex = 1
$label2.Text = "VHD Format"
$groupBox3.Controls.Add($label2)
$groupBox2.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 10
$System_Drawing_Point.Y = 169
$groupBox2.Location = $System_Drawing_Point
$groupBox2.Name = "groupBox2"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 68
$System_Drawing_Size.Width = 490
$groupBox2.Size = $System_Drawing_Size
$groupBox2.TabIndex = 6
$groupBox2.TabStop = $False
$groupBox2.Text = "2. Choose a SKU from the list"
$frmMain.Controls.Add($groupBox2)
$cmbSkuList.DataBindings.DefaultDataSourceUpdateMode = 0
$cmbSkuList.FormattingEnabled = $True
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 24
$cmbSkuList.Location = $System_Drawing_Point
$cmbSkuList.Name = "cmbSkuList"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 452
$cmbSkuList.Size = $System_Drawing_Size
$cmbSkuList.TabIndex = 2
$groupBox2.Controls.Add($cmbSkuList)
$label1.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 23
$System_Drawing_Point.Y = 21
$label1.Location = $System_Drawing_Point
$label1.Name = "label1"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 71
$System_Drawing_Size.Width = 464
$label1.Size = $System_Drawing_Size
$label1.TabIndex = 5
$label1.Text = $uiHeader
$frmMain.Controls.Add($label1)
$groupBox1.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 10
$System_Drawing_Point.Y = 95
$groupBox1.Location = $System_Drawing_Point
$groupBox1.Name = "groupBox1"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 68
$System_Drawing_Size.Width = 490
$groupBox1.Size = $System_Drawing_Size
$groupBox1.TabIndex = 4
$groupBox1.TabStop = $False
$groupBox1.Text = "1. Choose a source"
$frmMain.Controls.Add($groupBox1)
$txtSourcePath.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 25
$System_Drawing_Point.Y = 24
$txtSourcePath.Location = $System_Drawing_Point
$txtSourcePath.Name = "txtSourcePath"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 418
$txtSourcePath.Size = $System_Drawing_Size
$txtSourcePath.TabIndex = 0
$groupBox1.Controls.Add($txtSourcePath)
$btnBrowseWim.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 449
$System_Drawing_Point.Y = 24
$btnBrowseWim.Location = $System_Drawing_Point
$btnBrowseWim.Name = "btnBrowseWim"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 25
$System_Drawing_Size.Width = 28
$btnBrowseWim.Size = $System_Drawing_Size
$btnBrowseWim.TabIndex = 1
$btnBrowseWim.Text = "..."
$btnBrowseWim.UseVisualStyleBackColor = $True
$btnBrowseWim.add_Click($btnBrowseWim_OnClick)
$groupBox1.Controls.Add($btnBrowseWim)
$openFileDialog1.FileName = "openFileDialog1"
$openFileDialog1.ShowHelp = $True
$InitialFormWindowState = $frmMain.WindowState
$frmMain.add_Load($OnLoadForm_StateCorrection)
$ret = $frmMain.ShowDialog()
if (!($ret -ilike "OK")) {
throw "Form session has been cancelled."
}
if ([string]::IsNullOrEmpty($SourcePath)) {
throw "No source path specified."
}
$VHDFormat = $cmbVhdFormat.SelectedItem
$SizeBytes = Invoke-Expression "$($numVhdSize.Value)$($cmbVhdSizeUnit.SelectedItem)"
$VHDType = $cmbVhdType.SelectedItem
$WorkingDirectory = $txtWorkingDirectory.Text
if (![string]::IsNullOrEmpty($txtVhdName.Text)) {
$VHDPath = "$($WorkingDirectory)\$($txtVhdName.Text)"
}
if (![string]::IsNullOrEmpty($cmbSkuList.SelectedItem)) {
$Edition = $cmbSkuList.SelectedItem
}
$frmMain.Dispose()
}
if ("VHD" -ilike $VHDFormat) {
if ($SizeBytes -gt $vhdMaxSize) {
Write-W2VWarn "For the VHD file format, the maximum file size is ~2040GB. We're automatically setting the size to 2040GB for you."
$SizeBytes = 2040GB
}
}
if ((![String]::IsNullOrEmpty($VHDPath)) -and (![String]::IsNullOrEmpty($WorkingDirectory))) {
if ($WorkingDirectory -ne $pwd) {
Write-W2VWarn "Specifying -VHDPath and -WorkingDirectory at the same time is contradictory."
Write-W2VWarn "Ignoring the WorkingDirectory specification."
$WorkingDirectory = Split-Path $VHDPath -Parent
}
}
if ($VHDPath) {
$ext = ([IO.FileInfo]$VHDPath).Extension
if (!($ext -ilike ".$($VHDFormat)")) {
throw "There is a mismatch between the VHDPath file extension ($($ext.ToUpper())), and the VHDFormat (.$($VHDFormat)). Please ensure that these match and try again."
}
}
if ([String]::IsNullOrEmpty($VHDPath)) {
$VHDPath = Join-Path $WorkingDirectory "$($sessionKey).$($VHDFormat.ToLower())"
} else {
if (![IO.Path]::IsPathRooted($VHDPath)){
$VHDPath = Join-Path $WorkingDirectory $VHDPath
}
$vhdFinalName = Split-Path $VHDPath -Leaf
$VHDPath = Join-Path (Split-Path $VHDPath -Parent) "$($sessionKey).$($VHDFormat.ToLower())"
}
Write-W2VTrace "Temporary $VHDFormat path is : $VHDPath"
if (([IO.FileInfo]$SourcePath).Extension -ilike ".ISO") {
if (Test-IsNetworkLocation $SourcePath) {
Write-W2VInfo "Copying ISO $(Split-Path $SourcePath -Leaf) to temp folder..."
Copy-Item -Path $SourcePath -Destination $env:Temp -Force
$SourcePath = "$($env:Temp)\$(Split-Path $SourcePath -Leaf)"
}
$isoPath = (Resolve-Path $SourcePath).Path
Write-W2VInfo "Opening ISO $(Split-Path $isoPath -Leaf)..."
$openIso = Mount-DiskImage -ImagePath $isoPath -StorageType ISO -PassThru
$openIso = Get-DiskImage -ImagePath $isoPath
$driveLetter = ($openIso | Get-Volume).DriveLetter
$SourcePath = "$($driveLetter):\sources\install.wim"
Write-W2VInfo "Looking for $($SourcePath)..."
if (!(Test-Path $SourcePath)) {
throw "The specified ISO does not appear to be valid Windows installation media."
}
}
if (Test-IsNetworkLocation $SourcePath) {
Write-W2VInfo "Copying WIM $(Split-Path $SourcePath -Leaf) to temp folder..."
Copy-Item -Path $SourcePath -Destination $env:Temp -Force
$SourcePath = "$($env:Temp)\$(Split-Path $SourcePath -Leaf)"
}
$SourcePath = (Resolve-Path $SourcePath).Path
$openWim = New-Object WIM2VHD.WimFile $SourcePath
if ($openWim.ImageNames.Contains("Windows Longhorn Client") -or
$openWim.ImageNames.Contains("Windows Longhorn Server") -or
$openWim.ImageNames.Contains("Windows Longhorn Server Core")) {
throw "Convert-WindowsImage cannot run against unstaged builds. Please try again with a staged build."
}
if ($openWim.Images.Count -eq 1) {
$Edition = $openWim.Images[0].ImageFlags
$openImage = $openWim[$Edition]
} else {
if ([String]::IsNullOrEmpty($Edition)) {
Write-W2VError "You must specify an Edition or SKU index, since the WIM has more than one image."
Write-W2VError "Valid edition names are:"
$openWim.Images | %{ Write-W2VError " $($_.ImageFlags)" }
throw
}
if ([Int32]::TryParse($Edition, [ref]$null)) {
$openImage = $openWim[[Int32]$Edition]
} else {
$openImage = $openWim[$Edition]
}
}
if ($null -eq $openImage) {
Write-W2VError "The specified edition does not appear to exist in the specified WIM."
Write-W2VError "Valid edition names are:"
$openWim.Images | %{ Write-W2VError " $($_.ImageFlags)" }
throw
}
Write-W2VInfo "Image $($openImage.ImageIndex) selected ($($openImage.ImageFlags))..."
if ($openImage.ImageVersion -lt $lowestSupportedVersion) {
throw "Convert-WindowsImage only supports Windows 7 and Windows 8 WIM files. The specified image does not appear to contain one of those operating systems."
}
if ($VHDType -eq "Dynamic") {
Write-W2VInfo "Creating sparse disk..."
$openVhd = [WIM2VHD.VirtualHardDisk]::CreateSparseDisk(
$VHDFormat,
$VHDPath,
$SizeBytes,
$true
)
} else {
Write-W2VInfo "Creating fixed disk..."
$openVhd = [WIM2VHD.VirtualHardDisk]::CreateFixedDisk(
$VHDFormat,
$VHDPath,
$SizeBytes,
$true
)
}
Write-W2VInfo "Attaching $VHDFormat..."
$openVhd.Attach()
if ($VHDPartitionStyle -eq "MBR" ) {
Initialize-Disk -Number $openVhd.DiskIndex -PartitionStyle MBR
Write-W2VInfo "Disk initialized with MBR..."
} elseif ($VHDPartitionStyle -eq "GPT" ) {
Initialize-Disk -Number $openVhd.DiskIndex -PartitionStyle GPT
Write-W2VInfo "Disk initialized with GPT..."
}
$disk = Get-Disk -Number $openVhd.DiskIndex
if ( $VHDPartitionStyle -eq "MBR") {
$partition = New-Partition -DiskNumber $openVhd.DiskIndex -Size $disk.LargestFreeExtent -MbrType IFS -IsActive
Write-W2VInfo "Disk partitioned..."
} elseif ( $VHDPartitionStyle -eq "GPT" ) {
$PartitionSystem = New-Partition -DiskNumber $openVhd.DiskIndex -Size 100MB -GptType '{c12a7328-f81f-11d2-ba4b-00a0c93ec93b}'
$partition = New-Partition -DiskNumber $openVhd.DiskIndex -Size ( $disk.LargestFreeExtent - 100MB ) -GptType '{ebd0a0a2-b9e5-4433-87c0-68b6b72699c7}'
Write-W2VInfo "Disk partitioned with two Volumes..."
}
if ( $VHDPartitionStyle -eq "MBR" ) {
$volume = Format-Volume -Partition $partition -FileSystem NTFS -Force -Confirm:$false
Write-W2VInfo "Volume formatted..."
} elseif ( $VHDPartitionStyle -eq "GPT" ) {
@"
select disk $($disk.Number)
select partition $($partitionSystem.PartitionNumber)
format fs=fat32 label="System"
"@ | & $env:SystemRoot\System32\DiskPart.exe | Out-Null
Write-W2VInfo "System Volume formatted (with DiskPart)..."
$volume = Format-Volume -Partition $partition -FileSystem NTFS -Force -Confirm:$false
Write-W2VInfo "Boot Volume formatted (with Format-Volume)..."
}
if ( $VHDPartitionStyle -eq "MBR") {
$partition | Add-PartitionAccessPath -AssignDriveLetter
$drive = $(Get-Partition -Disk $disk).AccessPaths[0]
Write-W2VInfo "Access path ($drive) has been assigned..."
} elseif ( $VHDPartitionStyle -eq "GPT" ) {
$partitionSystem | Add-PartitionAccessPath -AssignDriveLetter
$driveSystem = $(Get-Partition -Disk $disk).AccessPaths[1]
Write-W2VInfo "Access path ($driveSystem) has been assigned to the System Volume..."
$partition | Add-PartitionAccessPath -AssignDriveLetter
$drive = $(Get-Partition -Disk $disk).AccessPaths[2]
Write-W2VInfo "Access path ($drive) has been assigned to the Boot Volume..."
}
Write-W2VInfo "Applying image to $VHDFormat. This could take a while..."
$openImage.Apply($drive)
if (![string]::IsNullOrEmpty($UnattendPath)) {
Write-W2VInfo "Applying unattend file ($(Split-Path $UnattendPath -Leaf))..."
Copy-Item -Path $UnattendPath -Destination (Join-Path $drive "unattend.xml") -Force
}
Write-W2VInfo "Signing disk..."
$flagText | Out-File -FilePath (Join-Path $drive "Convert-WindowsImageInfo.txt") -Encoding Unicode -Force
if ($openImage.ImageArchitecture -ne "ARM") {
if ( $BCDinVHD -eq "VirtualMachine" ) {
Write-W2VInfo "Image applied. Making image bootable..."
if ( $VHDPartitionStyle -eq "MBR" ) {
$bcdBootArgs = @(
"$($drive)Windows",
"/s $drive",
"/v"
"/f BIOS"
)
} elseif ( $VHDPartitionStyle -eq "GPT" ) {
$bcdBootArgs = @(
"$($drive)Windows",
"/s $driveSystem",
"/v"
"/f UEFI"
)
}
Run-Executable -Executable $BCDBoot -Arguments $bcdBootArgs
if ( $VHDPartitionStyle -eq "MBR" ) {
Write-W2VInfo "Fixing the Device ID in the BCD store on $($VHDFormat)..."
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)boot\bcd",
"/set `{bootmgr`} device locate"
)
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)boot\bcd",
"/set `{default`} device locate"
)
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)boot\bcd",
"/set `{default`} osdevice locate"
)
}
Write-W2VInfo "Drive is bootable. Cleaning up..."
} elseif ( $BCDinVHD -eq "NativeBoot" ) {
Write-W2VInfo "Image applied. It is not bootable without an external boot loader. Cleaning up..."
}
if ($EnableDebugger -inotlike "None") {
Write-W2VInfo "Turning kernel debugging on in the $($VHDFormat)..."
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)\boot\bcd",
"/set `{default`} debug on"
)
}
switch ($EnableDebugger) {
"Serial" {
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)\boot\bcd",
"/dbgsettings SERIAL",
"DEBUGPORT:$($ComPort.Value)",
"BAUDRATE:$($BaudRate.Value)"
)
break
}
"1394" {
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)\boot\bcd",
"/dbgsettings 1394",
"CHANNEL:$($Channel.Value)"
)
break
}
"USB" {
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)\boot\bcd",
"/dbgsettings USB",
"TARGETNAME:$($Target.Value)"
)
break
}
"Local" {
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)\boot\bcd",
"/dbgsettings LOCAL"
)
break
}
"Network" {
Run-Executable -Executable "BCDEDIT.EXE" -Arguments (
"/store $($drive)\boot\bcd",
"/dbgsettings NET",
"HOSTIP:$($IP.Value)",
"PORT:$($Port.Value)",
"KEY:$($Key.Value)"
)
break
}
default {
break
}
}
} else {
Write-W2VInfo "Not making VHD bootable, since WOA can't boot in VMs."
}
if (
(
$RemoteDesktopEnable -eq $True
) -or (
$ExpandOnNativeBoot -eq $False
)
) {
$hive = Mount-RegistryHive -Hive (Join-Path $drive "Windows\System32\Config\System")
if ( $RemoteDesktopEnable -eq $True ) {
Write-W2VInfo -text "Enabling Remote Desktop"
Set-ItemProperty -Path "HKLM:\$($hive)\ControlSet001\Control\Terminal Server" -Name "fDenyTSConnections" -Value 0
}
if ( $ExpandOnNativeBoot -eq $False ) {
Write-W2VInfo -text "Disabling automatic $VHDFormat expansion for Native Boot"
Set-ItemProperty -Path "HKLM:\$($hive)\ControlSet001\Services\FsDepends\Parameters" -Name "VirtualDiskExpandOnMount" -Value 4
}
Dismount-RegistryHive -HiveMountPoint $hive
}
if ( $Driver ) {
Write-W2VInfo -text "Adding Windows Drivers to the Image"
Add-WindowsDriver -Path $drive -Recurse -Driver $Driver -Verbose
}
If ( $Feature ) {
Write-W2VInfo -text "Installing Windows Feature(s) $Feature to the Image"
$FeatureSourcePath = Join-Path -Path "$($driveLetter):" -ChildPath "sources\sxs"
Write-W2VInfo -text "From $FeatureSourcePath"
Enable-WindowsOptionalFeature -FeatureName $Feature -Source $FeatureSourcePath -Path $drive -All
}
if ([String]::IsNullOrEmpty($vhdFinalName)) {
Write-W2VInfo "Generating name for $($VHDFormat)..."
$hive = Mount-RegistryHive -Hive (Join-Path $drive "Windows\System32\Config\Software")
$buildLabEx = (Get-ItemProperty "HKLM:\$($hive)\Microsoft\Windows NT\CurrentVersion").BuildLabEx
$installType = (Get-ItemProperty "HKLM:\$($hive)\Microsoft\Windows NT\CurrentVersion").InstallationType
$editionId = (Get-ItemProperty "HKLM:\$($hive)\Microsoft\Windows NT\CurrentVersion").EditionID
$skuFamily = $null
Dismount-RegistryHive -HiveMountPoint $hive
if ($installType.ToUpper().Contains("CORE")) {
$editionId += "Core"
}
if ($installType.ToUpper().Contains("SERVER")) {
$skuFamily = "Server"
} elseif ($installType.ToUpper().Contains("CLIENT")) {
$skuFamily = "Client"
} else {
$skuFamily = "Unknown"
}
$vhdFinalName = "$($buildLabEx)_$($skuFamily)_$($editionId)_$($openImage.ImageDefaultLanguage).$($VHDFormat.ToLower())"
Write-W2VTrace "$VHDFormat final name is : $vhdFinalName"
}
Write-W2VInfo "Closing $VHDFormat..."
$openVhd.Close()
$openVhd = $null
$vhdFinalPath = Join-Path (Split-Path $VHDPath -Parent) $vhdFinalName
if (Test-Path $vhdFinalPath) {
Write-W2VInfo "Deleting pre-existing $VHDFormat : $(Split-Path $vhdFinalPath -Leaf)..."
Remove-Item -Path $vhdFinalPath -Force
}
Rename-Item -Path (Resolve-Path $VHDPath).Path -NewName $vhdFinalName -Force
} catch {
Write-W2VError $_
Write-W2VInfo "Log folder is $logFolder"
} finally {
if ($openWim -ne $null) {
Write-W2VInfo "Closing Windows image..."
$openWim.Close()
}
if ($mountedHive -ne $null) {
Write-W2VInfo "Closing registry hive..."
Dismount-RegistryHive -HiveMountPoint $mountedHive
}
if ($openVhd -ne $null) {
Write-W2VInfo "Closing $VHDFormat..."
$openVhd.Close()
}
if ($openIso -ne $null) {
Write-W2VInfo "Closing ISO..."
Dismount-DiskImage $ISOPath
}
Write-W2VInfo "Done."
if ($transcripting) {
$null = Stop-Transcript
}
}
}
End {
if (($Passthru) -and (![string]::IsNullOrEmpty($vhdFinalPath)) -and (Test-Path $vhdFinalPath)) {
return (Get-ChildItem -Path $vhdFinalPath)
}
}
}
|
combined_dataset/train/non-malicious/4242.ps1
|
4242.ps1
|
$Source = @"
using System;
using System.Collections.Generic;
using System.Runtime.InteropServices;
using System.Reflection;
public class sRDI
{
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_DATA_DIRECTORY
{
public uint VirtualAddress;
public uint Size;
}
//[StructLayout(LayoutKind.Sequential, Pack = 1)]
[StructLayout(LayoutKind.Explicit)]
unsafe struct IMAGE_SECTION_HEADER
{
[FieldOffset(0)]
public fixed byte Name[8];
[FieldOffset(8)]
public uint PhysicalAddress;
[FieldOffset(8)]
public uint VirtualSize;
[FieldOffset(12)]
public uint VirtualAddress;
[FieldOffset(16)]
public uint SizeOfRawData;
[FieldOffset(20)]
public uint PointerToRawData;
[FieldOffset(24)]
public uint PointerToRelocations;
[FieldOffset(28)]
public uint PointerToLinenumbers;
[FieldOffset(32)]
public ushort NumberOfRelocations;
[FieldOffset(34)]
public ushort NumberOfLinenumbers;
[FieldOffset(36)]
public uint Characteristics;
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_FILE_HEADER
{
public ushort Machine;
public ushort NumberOfSections;
public uint TimeDateStamp;
public uint PointerToSymbolTable;
public uint NumberOfSymbols;
public ushort SizeOfOptionalHeader;
public ushort Characteristics;
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_EXPORT_DIRECTORY
{
public uint Characteristics;
public uint TimeDateStamp;
public ushort MajorVersion;
public ushort MinorVersion;
public uint Name;
public uint Base;
public uint NumberOfFunctions;
public uint NumberOfNames;
public uint AddressOfFunctions; // RVA from base of image
public uint AddressOfNames; // RVA from base of image
public uint AddressOfNameOrdinals; // RVA from base of image
}
enum IMAGE_DOS_SIGNATURE : ushort
{
DOS_SIGNATURE = 0x5A4D, // MZ
OS2_SIGNATURE = 0x454E, // NE
OS2_SIGNATURE_LE = 0x454C, // LE
}
enum MagicType : ushort
{
IMAGE_NT_OPTIONAL_HDR32_MAGIC = 0x10b,
IMAGE_NT_OPTIONAL_HDR64_MAGIC = 0x20b,
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_DOS_HEADER
{
public IMAGE_DOS_SIGNATURE e_magic; // Magic number
public ushort e_cblp; // public bytes on last page of file
public ushort e_cp; // Pages in file
public ushort e_crlc; // Relocations
public ushort e_cparhdr; // Size of header in paragraphs
public ushort e_minalloc; // Minimum extra paragraphs needed
public ushort e_maxalloc; // Maximum extra paragraphs needed
public ushort e_ss; // Initial (relative) SS value
public ushort e_sp; // Initial SP value
public ushort e_csum; // Checksum
public ushort e_ip; // Initial IP value
public ushort e_cs; // Initial (relative) CS value
public ushort e_lfarlc; // File address of relocation table
public ushort e_ovno; // Overlay number
[MarshalAs(UnmanagedType.ByValTStr, SizeConst = 8)]
public string e_res; // May contain 'Detours!'
public ushort e_oemid; // OEM identifier (for e_oeminfo)
public ushort e_oeminfo; // OEM information; e_oemid specific
[MarshalAsAttribute(UnmanagedType.ByValArray, SizeConst = 10)]
public ushort[] e_res2; // Reserved public ushorts
public Int32 e_lfanew; // File address of new exe header
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_OPTIONAL_HEADER
{
//
// Standard fields.
//
public MagicType Magic;
public byte MajorLinkerVersion;
public byte MinorLinkerVersion;
public uint SizeOfCode;
public uint SizeOfInitializedData;
public uint SizeOfUninitializedData;
public uint AddressOfEntryPoint;
public uint BaseOfCode;
public uint BaseOfData;
public uint ImageBase;
public uint SectionAlignment;
public uint FileAlignment;
public ushort MajorOperatingSystemVersion;
public ushort MinorOperatingSystemVersion;
public ushort MajorImageVersion;
public ushort MinorImageVersion;
public ushort MajorSubsystemVersion;
public ushort MinorSubsystemVersion;
public uint Win32VersionValue;
public uint SizeOfImage;
public uint SizeOfHeaders;
public uint CheckSum;
public ushort Subsystem;
public ushort DllCharacteristics;
public uint SizeOfStackReserve;
public uint SizeOfStackCommit;
public uint SizeOfHeapReserve;
public uint SizeOfHeapCommit;
public uint LoaderFlags;
public uint NumberOfRvaAndSizes;
public IMAGE_DATA_DIRECTORY ExportTable;
public IMAGE_DATA_DIRECTORY ImportTable;
public IMAGE_DATA_DIRECTORY ResourceTable;
public IMAGE_DATA_DIRECTORY ExceptionTable;
public IMAGE_DATA_DIRECTORY CertificateTable;
public IMAGE_DATA_DIRECTORY BaseRelocationTable;
public IMAGE_DATA_DIRECTORY Debug;
public IMAGE_DATA_DIRECTORY Architecture;
public IMAGE_DATA_DIRECTORY GlobalPtr;
public IMAGE_DATA_DIRECTORY TLSTable;
public IMAGE_DATA_DIRECTORY LoadConfigTable;
public IMAGE_DATA_DIRECTORY BoundImport;
public IMAGE_DATA_DIRECTORY IAT;
public IMAGE_DATA_DIRECTORY DelayImportDescriptor;
public IMAGE_DATA_DIRECTORY CLRRuntimeHeader;
public IMAGE_DATA_DIRECTORY Public;
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_OPTIONAL_HEADER64
{
public MagicType Magic;
public byte MajorLinkerVersion;
public byte MinorLinkerVersion;
public uint SizeOfCode;
public uint SizeOfInitializedData;
public uint SizeOfUninitializedData;
public uint AddressOfEntryPoint;
public uint BaseOfCode;
public ulong ImageBase;
public uint SectionAlignment;
public uint FileAlignment;
public ushort MajorOperatingSystemVersion;
public ushort MinorOperatingSystemVersion;
public ushort MajorImageVersion;
public ushort MinorImageVersion;
public ushort MajorSubsystemVersion;
public ushort MinorSubsystemVersion;
public uint Win32VersionValue;
public uint SizeOfImage;
public uint SizeOfHeaders;
public uint CheckSum;
public ushort Subsystem;
public ushort DllCharacteristics;
public ulong SizeOfStackReserve;
public ulong SizeOfStackCommit;
public ulong SizeOfHeapReserve;
public ulong SizeOfHeapCommit;
public uint LoaderFlags;
public uint NumberOfRvaAndSizes;
public IMAGE_DATA_DIRECTORY ExportTable;
public IMAGE_DATA_DIRECTORY ImportTable;
public IMAGE_DATA_DIRECTORY ResourceTable;
public IMAGE_DATA_DIRECTORY ExceptionTable;
public IMAGE_DATA_DIRECTORY CertificateTable;
public IMAGE_DATA_DIRECTORY BaseRelocationTable;
public IMAGE_DATA_DIRECTORY Debug;
public IMAGE_DATA_DIRECTORY Architecture;
public IMAGE_DATA_DIRECTORY GlobalPtr;
public IMAGE_DATA_DIRECTORY TLSTable;
public IMAGE_DATA_DIRECTORY LoadConfigTable;
public IMAGE_DATA_DIRECTORY BoundImport;
public IMAGE_DATA_DIRECTORY IAT;
public IMAGE_DATA_DIRECTORY DelayImportDescriptor;
public IMAGE_DATA_DIRECTORY CLRRuntimeHeader;
public IMAGE_DATA_DIRECTORY Public;
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_NT_HEADERS64
{
public uint Signature;
public IMAGE_FILE_HEADER FileHeader;
public IMAGE_OPTIONAL_HEADER64 OptionalHeader;
}
[StructLayout(LayoutKind.Sequential, Pack = 1)]
struct IMAGE_NT_HEADERS
{
public uint Signature;
public IMAGE_FILE_HEADER FileHeader;
public IMAGE_OPTIONAL_HEADER OptionalHeader;
}
public delegate int SIZEOFHELPER(Type type, bool throwIfNotMarshalable);
public static unsafe class InteropTools
{
//static ctor
static InteropTools()
{
BindingFlags flags = BindingFlags.NonPublic | BindingFlags.Static;
MethodInfo tmi = typeof(System.Runtime.InteropServices.Marshal).GetMethod("SizeOfHelper", flags);
if (null != tmi)
SizeOfHelper_f = (SIZEOFHELPER)Delegate.CreateDelegate(typeof(SIZEOFHELPER), tmi);
Type SafeBufferType = Type.GetType("System.Runtime.InteropServices.SafeBuffer");
if (null == SafeBufferType)
//.Net 2.0 SafePointer has the members instead of SafeBuffer
SafeBufferType = Type.GetType("System.Runtime.InteropServices.SafePointer");
MethodInfo PtrToStructureNativeMethod = SafeBufferType.GetMethod("PtrToStructureNative", flags);
MethodInfo StructureToPtrNativeMethod = SafeBufferType.GetMethod("StructureToPtrNative", flags);
PtrToStructureNative = (PtrToStructureNativeDelegate)Delegate.CreateDelegate(typeof(PtrToStructureNativeDelegate), PtrToStructureNativeMethod);
StructureToPtrNative = (StructureToPtrNativeDelegate)Delegate.CreateDelegate(typeof(StructureToPtrNativeDelegate), StructureToPtrNativeMethod);
}
public delegate void PtrToStructureNativeDelegate(byte* ptr, TypedReference structure, uint sizeofT);
public delegate void StructureToPtrNativeDelegate(TypedReference structure, byte* ptr, uint sizeofT);
public static readonly PtrToStructureNativeDelegate PtrToStructureNative;
public static readonly StructureToPtrNativeDelegate StructureToPtrNative;
private static readonly SIZEOFHELPER SizeOfHelper_f = null;
public static void StructureToPtrDirect(TypedReference structure, IntPtr ptr, int size)
{
StructureToPtrNative(structure, (byte*)ptr, unchecked((uint)size));
}
public static void StructureToPtrDirect(TypedReference structure, IntPtr ptr)
{
StructureToPtrDirect(structure, ptr, SizeOf(__reftype(structure)));
}
public static void PtrToStructureDirect(IntPtr ptr, TypedReference structure, int size)
{
PtrToStructureNative((byte*)ptr, structure, unchecked((uint)size));
}
public static void PtrToStructureDirect(IntPtr ptr, TypedReference structure)
{
PtrToStructureDirect(ptr, structure, SizeOf(__reftype(structure)));
}
public static void StructureToPtr<T>(ref T structure, IntPtr ptr)
{
StructureToPtrDirect(__makeref(structure), ptr);
}
public static void PtrToStructure<T>(IntPtr ptr, out T structure)
{
structure = default(T);
PtrToStructureDirect(ptr, __makeref(structure));
}
public static T PtrToStructure<T>(IntPtr ptr)
{
T obj;
PtrToStructure(ptr, out obj);
return obj;
}
public static int SizeOf<T>(T structure)
{
return SizeOf<T>();
}
public static int SizeOf<T>()
{
return SizeOf(typeof(T));
}
public static int SizeOf(Type t)
{
if (null != SizeOfHelper_f)
return SizeOfHelper_f(t, true);
else
return System.Runtime.InteropServices.Marshal.SizeOf(t);
}
}
public static IntPtr Rva2Offset(uint dwRva, IntPtr PEPointer)
{
bool is64Bit = false;
ushort wIndex = 0;
ushort wNumberOfSections = 0;
IntPtr imageSectionPtr;
IMAGE_SECTION_HEADER SectionHeader;
int sizeOfSectionHeader = Marshal.SizeOf(typeof(IMAGE_SECTION_HEADER));
IMAGE_DOS_HEADER dosHeader = InteropTools.PtrToStructure<IMAGE_DOS_HEADER>(PEPointer);
IntPtr NtHeadersPtr = (IntPtr)((UInt64)PEPointer + (UInt64)dosHeader.e_lfanew);
IMAGE_NT_HEADERS imageNtHeaders32 = (IMAGE_NT_HEADERS)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS));
IMAGE_NT_HEADERS64 imageNtHeaders64 = (IMAGE_NT_HEADERS64)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS64));
if (imageNtHeaders64.OptionalHeader.Magic == MagicType.IMAGE_NT_OPTIONAL_HDR64_MAGIC) is64Bit = true;
if (is64Bit)
{
imageSectionPtr = (IntPtr)(((Int64)NtHeadersPtr + (Int64)Marshal.OffsetOf(typeof(IMAGE_NT_HEADERS64), "OptionalHeader") + (Int64)imageNtHeaders64.FileHeader.SizeOfOptionalHeader));
SectionHeader = (IMAGE_SECTION_HEADER)Marshal.PtrToStructure(imageSectionPtr, typeof(IMAGE_SECTION_HEADER));
wNumberOfSections = imageNtHeaders64.FileHeader.NumberOfSections;
}
else
{
imageSectionPtr = (IntPtr)(((Int64)NtHeadersPtr + (Int64)Marshal.OffsetOf(typeof(IMAGE_NT_HEADERS), "OptionalHeader") + (Int64)imageNtHeaders32.FileHeader.SizeOfOptionalHeader));
SectionHeader = (IMAGE_SECTION_HEADER)Marshal.PtrToStructure(imageSectionPtr, typeof(IMAGE_SECTION_HEADER));
wNumberOfSections = imageNtHeaders32.FileHeader.NumberOfSections;
}
if (dwRva < SectionHeader.PointerToRawData)
return (IntPtr)((UInt64)dwRva + (UInt64)PEPointer);
for (wIndex = 0; wIndex < wNumberOfSections; wIndex++)
{
SectionHeader = (IMAGE_SECTION_HEADER)Marshal.PtrToStructure((IntPtr)((uint)imageSectionPtr + (uint)(sizeOfSectionHeader * (wIndex))), typeof(IMAGE_SECTION_HEADER));
if (dwRva >= SectionHeader.VirtualAddress && dwRva < (SectionHeader.VirtualAddress + SectionHeader.SizeOfRawData))
return (IntPtr)((UInt64)(dwRva - SectionHeader.VirtualAddress + SectionHeader.PointerToRawData) + (UInt64)PEPointer);
}
return IntPtr.Zero;
}
public static unsafe bool Is64BitDLL(byte[] dllBytes)
{
bool is64Bit = false;
GCHandle scHandle = GCHandle.Alloc(dllBytes, GCHandleType.Pinned);
IntPtr scPointer = scHandle.AddrOfPinnedObject();
IMAGE_DOS_HEADER dosHeader = (IMAGE_DOS_HEADER)Marshal.PtrToStructure(scPointer, typeof(IMAGE_DOS_HEADER));
IntPtr NtHeadersPtr = (IntPtr)((UInt64)scPointer + (UInt64)dosHeader.e_lfanew);
IMAGE_NT_HEADERS64 imageNtHeaders64 = (IMAGE_NT_HEADERS64)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS64));
IMAGE_NT_HEADERS imageNtHeaders32 = (IMAGE_NT_HEADERS)Marshal.PtrToStructure(NtHeadersPtr, typeof(IMAGE_NT_HEADERS));
if (imageNtHeaders64.Signature != 0x00004550)
throw new ApplicationException("Invalid IMAGE_NT_HEADER signature.");
if (imageNtHeaders64.OptionalHeader.Magic == MagicType.IMAGE_NT_OPTIONAL_HDR64_MAGIC) is64Bit = true;
scHandle.Free();
return is64Bit;
}
[UnmanagedFunctionPointer(CallingConvention.StdCall)]
delegate IntPtr ReflectiveLoader();
[UnmanagedFunctionPointer(CallingConvention.Cdecl)]
delegate bool ExportedFunction(IntPtr userData, uint userLength);
public static byte[] ConvertToShellcode(byte[] dllBytes, uint functionHash, byte[] userData)
{
byte[] rdiShellcode64 = new byte[] { 0xe9, 0x1b, 0x04, 0x00, 0x00, 0xcc, 0xcc, 0xcc, 0x48, 0x89, 0x5c, 0x24, 0x08, 0x48, 0x89, 0x6c, 0x24, 0x10, 0x48, 0x89, 0x74, 0x24, 0x18, 0x57, 0x48, 0x83, 0xec, 0x10, 0x65, 0x48, 0x8b, 0x04, 0x25, 0x60, 0x00, 0x00, 0x00, 0x8b, 0xf1, 0x33, 0xed, 0x48, 0x8b, 0x50, 0x18, 0x4c, 0x8b, 0x4a, 0x10, 0x4d, 0x8b, 0x41, 0x30, 0x4d, 0x85, 0xc0, 0x0f, 0x84, 0xb9, 0x00, 0x00, 0x00, 0x41, 0x0f, 0x10, 0x41, 0x58, 0x49, 0x63, 0x40, 0x3c, 0x4d, 0x8b, 0x09, 0x46, 0x8b, 0x9c, 0x00, 0x88, 0x00, 0x00, 0x00, 0x8b, 0xd5, 0xf3, 0x0f, 0x7f, 0x04, 0x24, 0x45, 0x85, 0xdb, 0x74, 0xd3, 0x48, 0x8b, 0x04, 0x24, 0x48, 0xc1, 0xe8, 0x10, 0x66, 0x3b, 0xe8, 0x73, 0x26, 0x48, 0x8b, 0x4c, 0x24, 0x08, 0x44, 0x0f, 0xb7, 0x54, 0x24, 0x02, 0x0f, 0xbe, 0x01, 0xc1, 0xca, 0x0d, 0x80, 0x39, 0x61, 0x7c, 0x06, 0x8d, 0x54, 0x02, 0xe0, 0xeb, 0x02, 0x03, 0xd0, 0x48, 0xff, 0xc1, 0x49, 0xff, 0xca, 0x75, 0xe5, 0x4f, 0x8d, 0x14, 0x18, 0x8b, 0xcd, 0x45, 0x8b, 0x5a, 0x20, 0x4d, 0x03, 0xd8, 0x41, 0x39, 0x6a, 0x18, 0x76, 0x8d, 0x41, 0x8b, 0x1b, 0x8b, 0xfd, 0x49, 0x03, 0xd8, 0x49, 0x83, 0xc3, 0x04, 0x0f, 0xbe, 0x03, 0xc1, 0xcf, 0x0d, 0x48, 0xff, 0xc3, 0x03, 0xf8, 0x40, 0x38, 0x6b, 0xff, 0x75, 0xef, 0x8d, 0x04, 0x17, 0x3b, 0xc6, 0x74, 0x0d, 0xff, 0xc1, 0x41, 0x3b, 0x4a, 0x18, 0x72, 0xd4, 0xe9, 0x5c, 0xff, 0xff, 0xff, 0x41, 0x8b, 0x52, 0x24, 0x03, 0xc9, 0x49, 0x8d, 0x04, 0x10, 0x0f, 0xb7, 0x04, 0x01, 0x41, 0x8b, 0x4a, 0x1c, 0xc1, 0xe0, 0x02, 0x48, 0x98, 0x49, 0x03, 0xc0, 0x8b, 0x04, 0x01, 0x49, 0x03, 0xc0, 0xeb, 0x02, 0x33, 0xc0, 0x48, 0x8b, 0x5c, 0x24, 0x20, 0x48, 0x8b, 0x6c, 0x24, 0x28, 0x48, 0x8b, 0x74, 0x24, 0x30, 0x48, 0x83, 0xc4, 0x10, 0x5f, 0xc3, 0xcc, 0xcc, 0x44, 0x89, 0x4c, 0x24, 0x20, 0x4c, 0x89, 0x44, 0x24, 0x18, 0x89, 0x54, 0x24, 0x10, 0x53, 0x55, 0x56, 0x57, 0x41, 0x54, 0x41, 0x55, 0x41, 0x56, 0x41, 0x57, 0x48, 0x83, 0xec, 0x28, 0x48, 0x8b, 0xf1, 0xb9, 0x4c, 0x77, 0x26, 0x07, 0x44, 0x8b, 0xe2, 0xe8, 0xca, 0xfe, 0xff, 0xff, 0xb9, 0x49, 0xf7, 0x02, 0x78, 0x4c, 0x8b, 0xf0, 0xe8, 0xbd, 0xfe, 0xff, 0xff, 0xb9, 0x58, 0xa4, 0x53, 0xe5, 0x4c, 0x8b, 0xf8, 0xe8, 0xb0, 0xfe, 0xff, 0xff, 0xb9, 0xaf, 0xb1, 0x5c, 0x94, 0x48, 0x8b, 0xd8, 0xe8, 0xa3, 0xfe, 0xff, 0xff, 0x48, 0x63, 0x6e, 0x3c, 0x33, 0xc9, 0x48, 0x03, 0xee, 0x41, 0xb8, 0x00, 0x30, 0x00, 0x00, 0x8b, 0x55, 0x50, 0x44, 0x8d, 0x49, 0x40, 0x4c, 0x8b, 0xe8, 0x48, 0x89, 0x44, 0x24, 0x70, 0xff, 0xd3, 0x44, 0x8b, 0x45, 0x54, 0x48, 0x8b, 0xf8, 0x48, 0x8b, 0xd6, 0x41, 0xbb, 0x01, 0x00, 0x00, 0x00, 0x4d, 0x85, 0xc0, 0x74, 0x13, 0x48, 0x8b, 0xc8, 0x48, 0x2b, 0xce, 0x8a, 0x02, 0x88, 0x04, 0x11, 0x49, 0x03, 0xd3, 0x4d, 0x2b, 0xc3, 0x75, 0xf3, 0x44, 0x0f, 0xb7, 0x4d, 0x06, 0x0f, 0xb7, 0x45, 0x14, 0x4d, 0x85, 0xc9, 0x74, 0x36, 0x48, 0x8d, 0x4c, 0x28, 0x2c, 0x8b, 0x51, 0xf8, 0x44, 0x8b, 0x01, 0x44, 0x8b, 0x51, 0xfc, 0x48, 0x03, 0xd7, 0x4c, 0x03, 0xc6, 0x4d, 0x2b, 0xcb, 0x4d, 0x85, 0xd2, 0x74, 0x10, 0x41, 0x8a, 0x00, 0x4d, 0x03, 0xc3, 0x88, 0x02, 0x49, 0x03, 0xd3, 0x4d, 0x2b, 0xd3, 0x75, 0xf0, 0x48, 0x83, 0xc1, 0x28, 0x4d, 0x85, 0xc9, 0x75, 0xcf, 0x8b, 0x9d, 0x90, 0x00, 0x00, 0x00, 0x48, 0x03, 0xdf, 0x8b, 0x43, 0x0c, 0x85, 0xc0, 0x0f, 0x84, 0x93, 0x00, 0x00, 0x00, 0x8b, 0xc8, 0x48, 0x03, 0xcf, 0x41, 0xff, 0xd6, 0x44, 0x8b, 0x23, 0x8b, 0x73, 0x10, 0x4c, 0x03, 0xe7, 0x4c, 0x8b, 0xe8, 0x48, 0x03, 0xf7, 0xeb, 0x5b, 0x49, 0x83, 0x3c, 0x24, 0x00, 0x74, 0x3b, 0x48, 0xb8, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x80, 0x49, 0x85, 0x04, 0x24, 0x74, 0x2b, 0x49, 0x63, 0x45, 0x3c, 0x41, 0x0f, 0xb7, 0x14, 0x24, 0x42, 0x8b, 0x8c, 0x28, 0x88, 0x00, 0x00, 0x00, 0x42, 0x8b, 0x44, 0x29, 0x10, 0x48, 0x2b, 0xd0, 0x42, 0x8b, 0x44, 0x29, 0x1c, 0x49, 0x8d, 0x4c, 0x05, 0x00, 0x8b, 0x04, 0x91, 0x49, 0x03, 0xc5, 0xeb, 0x0e, 0x48, 0x8b, 0x06, 0x49, 0x8b, 0xcd, 0x48, 0x8d, 0x54, 0x07, 0x02, 0x41, 0xff, 0xd7, 0x48, 0x89, 0x06, 0x48, 0x83, 0xc6, 0x08, 0x49, 0x83, 0xc4, 0x08, 0x48, 0x83, 0x3e, 0x00, 0x75, 0x9f, 0x8b, 0x43, 0x20, 0x48, 0x83, 0xc3, 0x14, 0x85, 0xc0, 0x0f, 0x85, 0x77, 0xff, 0xff, 0xff, 0x44, 0x8b, 0x64, 0x24, 0x78, 0x4c, 0x8b, 0x6c, 0x24, 0x70, 0x4c, 0x8b, 0xcf, 0x41, 0xbe, 0x02, 0x00, 0x00, 0x00, 0x4c, 0x2b, 0x4d, 0x30, 0x83, 0xbd, 0xb4, 0x00, 0x00, 0x00, 0x00, 0x41, 0x8d, 0x76, 0xff, 0x0f, 0x84, 0x94, 0x00, 0x00, 0x00, 0x8b, 0x95, 0xb0, 0x00, 0x00, 0x00, 0x48, 0x03, 0xd7, 0x8b, 0x42, 0x04, 0x85, 0xc0, 0x0f, 0x84, 0x80, 0x00, 0x00, 0x00, 0xbb, 0xff, 0x0f, 0x00, 0x00, 0x44, 0x8b, 0x02, 0x44, 0x8b, 0xd0, 0x4c, 0x8d, 0x5a, 0x08, 0x49, 0x83, 0xea, 0x08, 0x4c, 0x03, 0xc7, 0x49, 0xd1, 0xea, 0x74, 0x58, 0x41, 0x0f, 0xb7, 0x0b, 0x4c, 0x2b, 0xd6, 0x0f, 0xb7, 0xc1, 0x66, 0xc1, 0xe8, 0x0c, 0x66, 0x83, 0xf8, 0x0a, 0x75, 0x09, 0x48, 0x23, 0xcb, 0x4e, 0x01, 0x0c, 0x01, 0xeb, 0x33, 0x66, 0x83, 0xf8, 0x03, 0x75, 0x09, 0x48, 0x23, 0xcb, 0x46, 0x01, 0x0c, 0x01, 0xeb, 0x24, 0x66, 0x3b, 0xc6, 0x75, 0x11, 0x49, 0x8b, 0xc1, 0x48, 0x23, 0xcb, 0x48, 0xc1, 0xe8, 0x10, 0x66, 0x42, 0x01, 0x04, 0x01, 0xeb, 0x0e, 0x66, 0x41, 0x3b, 0xc6, 0x75, 0x08, 0x48, 0x23, 0xcb, 0x66, 0x46, 0x01, 0x0c, 0x01, 0x4d, 0x03, 0xde, 0x4d, 0x85, 0xd2, 0x75, 0xa8, 0x8b, 0x42, 0x04, 0x48, 0x03, 0xd0, 0x8b, 0x42, 0x04, 0x85, 0xc0, 0x75, 0x85, 0x8b, 0x5d, 0x28, 0x45, 0x33, 0xc0, 0x33, 0xd2, 0x48, 0x83, 0xc9, 0xff, 0x48, 0x03, 0xdf, 0x41, 0xff, 0xd5, 0x4c, 0x8b, 0xc6, 0x8b, 0xd6, 0x48, 0x8b, 0xcf, 0xff, 0xd3, 0x45, 0x85, 0xe4, 0x0f, 0x84, 0x99, 0x00, 0x00, 0x00, 0x83, 0xbd, 0x8c, 0x00, 0x00, 0x00, 0x00, 0x0f, 0x84, 0x8c, 0x00, 0x00, 0x00, 0x8b, 0x95, 0x88, 0x00, 0x00, 0x00, 0x48, 0x03, 0xd7, 0x44, 0x8b, 0x5a, 0x18, 0x45, 0x85, 0xdb, 0x74, 0x7a, 0x83, 0x7a, 0x14, 0x00, 0x74, 0x74, 0x44, 0x8b, 0x52, 0x20, 0x44, 0x8b, 0x42, 0x24, 0x33, 0xdb, 0x4c, 0x03, 0xd7, 0x4c, 0x03, 0xc7, 0x45, 0x85, 0xdb, 0x74, 0x5f, 0x45, 0x8b, 0x0a, 0x4c, 0x03, 0xcf, 0x33, 0xc9, 0x41, 0x0f, 0xbe, 0x01, 0xc1, 0xc9, 0x0d, 0x4c, 0x03, 0xce, 0x03, 0xc8, 0x41, 0x80, 0x79, 0xff, 0x00, 0x75, 0xed, 0x44, 0x3b, 0xe1, 0x74, 0x10, 0x03, 0xde, 0x49, 0x83, 0xc2, 0x04, 0x4d, 0x03, 0xc6, 0x41, 0x3b, 0xdb, 0x72, 0xd2, 0xeb, 0x2f, 0x41, 0x0f, 0xb7, 0x00, 0x83, 0xf8, 0xff, 0x74, 0x26, 0x8b, 0x52, 0x1c, 0xc1, 0xe0, 0x02, 0x48, 0x63, 0xc8, 0x48, 0x8d, 0x04, 0x0f, 0x48, 0x8b, 0x8c, 0x24, 0x80, 0x00, 0x00, 0x00, 0x44, 0x8b, 0x04, 0x02, 0x8b, 0x94, 0x24, 0x88, 0x00, 0x00, 0x00, 0x4c, 0x03, 0xc7, 0x41, 0xff, 0xd0, 0x48, 0x8b, 0xc7, 0x48, 0x83, 0xc4, 0x28, 0x41, 0x5f, 0x41, 0x5e, 0x41, 0x5d, 0x41, 0x5c, 0x5f, 0x5e, 0x5d, 0x5b, 0xc3, 0xcc, 0xcc, 0xcc, 0xcc, 0x56, 0x48, 0x8b, 0xf4, 0x48, 0x83, 0xe4, 0xf0, 0x48, 0x83, 0xec, 0x20, 0xe8, 0xdf, 0xfc, 0xff, 0xff, 0x48, 0x8b, 0xe6, 0x5e, 0xc3 };
byte[] rdiShellcode32 = new byte[] { 0x55, 0x8b, 0xec, 0x83, 0xec, 0x18, 0x53, 0x56, 0x57, 0x68, 0x4c, 0x77, 0x26, 0x07, 0xe8, 0x44, 0x02, 0x00, 0x00, 0x89, 0x45, 0xf4, 0xc7, 0x04, 0x24, 0x49, 0xf7, 0x02, 0x78, 0xe8, 0x35, 0x02, 0x00, 0x00, 0x68, 0x58, 0xa4, 0x53, 0xe5, 0x89, 0x45, 0xec, 0xe8, 0x28, 0x02, 0x00, 0x00, 0x68, 0xaf, 0xb1, 0x5c, 0x94, 0x8b, 0xf8, 0xe8, 0x1c, 0x02, 0x00, 0x00, 0x8b, 0x5d, 0x08, 0x8b, 0x73, 0x3c, 0x83, 0xc4, 0x0c, 0x6a, 0x40, 0x68, 0x00, 0x30, 0x00, 0x00, 0x03, 0xf3, 0xff, 0x76, 0x50, 0x89, 0x45, 0xe8, 0x6a, 0x00, 0xff, 0xd7, 0x8b, 0xc8, 0x8b, 0x46, 0x54, 0x89, 0x4d, 0xfc, 0x8b, 0xfb, 0x85, 0xc0, 0x74, 0x0b, 0x2b, 0xcb, 0x8a, 0x17, 0x88, 0x14, 0x39, 0x47, 0x48, 0x75, 0xf7, 0x0f, 0xb7, 0x46, 0x14, 0x8d, 0x7c, 0x30, 0x2c, 0x0f, 0xb7, 0x46, 0x06, 0x89, 0x45, 0x08, 0x85, 0xc0, 0x74, 0x2f, 0x8b, 0x47, 0xf8, 0x8b, 0x0f, 0x8b, 0x57, 0xfc, 0xff, 0x4d, 0x08, 0x03, 0x45, 0xfc, 0x03, 0xcb, 0x89, 0x55, 0xf8, 0x85, 0xd2, 0x74, 0x0f, 0x8a, 0x11, 0xff, 0x4d, 0xf8, 0x88, 0x10, 0x40, 0x41, 0x83, 0x7d, 0xf8, 0x00, 0x75, 0xf1, 0x83, 0xc7, 0x28, 0x83, 0x7d, 0x08, 0x00, 0x75, 0xd1, 0x8b, 0x9e, 0x80, 0x00, 0x00, 0x00, 0x03, 0x5d, 0xfc, 0xeb, 0x6a, 0x03, 0x45, 0xfc, 0x50, 0xff, 0x55, 0xf4, 0x8b, 0x0b, 0x8b, 0x7b, 0x10, 0x03, 0x4d, 0xfc, 0x03, 0x7d, 0xfc, 0x89, 0x45, 0x08, 0xeb, 0x48, 0x8b, 0x11, 0x85, 0xd2, 0x74, 0x27, 0x79, 0x25, 0x8b, 0x50, 0x3c, 0x8b, 0x54, 0x02, 0x78, 0x03, 0xd0, 0x8b, 0x01, 0x25, 0xff, 0xff, 0x00, 0x00, 0x2b, 0x42, 0x10, 0x8b, 0x52, 0x1c, 0x8d, 0x14, 0x82, 0x8b, 0x45, 0x08, 0x8b, 0x14, 0x02, 0x03, 0xd0, 0x89, 0x17, 0xeb, 0x15, 0x8b, 0x0f, 0x03, 0x4d, 0xfc, 0x83, 0xc1, 0x02, 0x51, 0x50, 0xff, 0x55, 0xec, 0x8b, 0x4d, 0xf8, 0x89, 0x07, 0x8b, 0x45, 0x08, 0x83, 0xc7, 0x04, 0x83, 0xc1, 0x04, 0x83, 0x3f, 0x00, 0x89, 0x4d, 0xf8, 0x75, 0xb0, 0x83, 0xc3, 0x14, 0x8b, 0x43, 0x0c, 0x85, 0xc0, 0x75, 0x8f, 0x8b, 0x5d, 0xfc, 0x2b, 0x5e, 0x34, 0x39, 0x86, 0xa4, 0x00, 0x00, 0x00, 0x74, 0x7e, 0x8b, 0x96, 0xa0, 0x00, 0x00, 0x00, 0x03, 0x55, 0xfc, 0xeb, 0x6c, 0x8b, 0x0a, 0x03, 0x4d, 0xfc, 0x83, 0xc0, 0xf8, 0xd1, 0xe8, 0x8d, 0x7a, 0x08, 0x89, 0x7d, 0xf8, 0x74, 0x57, 0x48, 0x89, 0x45, 0x08, 0x8b, 0x45, 0xf8, 0x0f, 0xb7, 0x00, 0x66, 0x8b, 0xf8, 0x66, 0xc1, 0xef, 0x0c, 0x66, 0x83, 0xff, 0x0a, 0x74, 0x06, 0x66, 0x83, 0xff, 0x03, 0x75, 0x0a, 0x25, 0xff, 0x0f, 0x00, 0x00, 0x01, 0x1c, 0x08, 0xeb, 0x25, 0x66, 0x83, 0xff, 0x01, 0x75, 0x10, 0x8b, 0xfb, 0x25, 0xff, 0x0f, 0x00, 0x00, 0xc1, 0xef, 0x10, 0x66, 0x01, 0x3c, 0x08, 0xeb, 0x0f, 0x66, 0x83, 0xff, 0x02, 0x75, 0x09, 0x25, 0xff, 0x0f, 0x00, 0x00, 0x66, 0x01, 0x1c, 0x08, 0x8b, 0x45, 0x08, 0x83, 0x45, 0xf8, 0x02, 0x85, 0xc0, 0x75, 0xa9, 0x03, 0x52, 0x04, 0x8b, 0x42, 0x04, 0x85, 0xc0, 0x75, 0x8d, 0x8b, 0x5e, 0x28, 0x03, 0x5d, 0xfc, 0x6a, 0x00, 0x6a, 0x00, 0x6a, 0xff, 0xff, 0x55, 0xe8, 0x8b, 0x7d, 0xfc, 0x6a, 0x01, 0x6a, 0x01, 0x57, 0xff, 0xd3, 0x33, 0xdb, 0x39, 0x5d, 0x0c, 0x74, 0x75, 0x39, 0x5e, 0x7c, 0x74, 0x70, 0x8b, 0x76, 0x78, 0x03, 0xf7, 0x8b, 0x56, 0x18, 0x3b, 0xd3, 0x74, 0x64, 0x39, 0x5e, 0x14, 0x74, 0x5f, 0x8b, 0x46, 0x20, 0x8b, 0x4e, 0x24, 0x03, 0xc7, 0x03, 0xcf, 0x89, 0x5d, 0x08, 0x3b, 0xd3, 0x76, 0x4e, 0x8b, 0x10, 0x03, 0x55, 0xfc, 0x33, 0xff, 0x0f, 0xbe, 0x1a, 0xc1, 0xcf, 0x0d, 0x03, 0xfb, 0x42, 0x80, 0x7a, 0xff, 0x00, 0x75, 0xf1, 0x39, 0x7d, 0x0c, 0x74, 0x13, 0xff, 0x45, 0x08, 0x8b, 0x55, 0x08, 0x83, 0xc0, 0x04, 0x83, 0xc1, 0x02, 0x3b, 0x56, 0x18, 0x72, 0xd4, 0xeb, 0x20, 0x0f, 0xb7, 0x01, 0x83, 0xf8, 0xff, 0x74, 0x18, 0x8b, 0x4e, 0x1c, 0xff, 0x75, 0x14, 0x8d, 0x0c, 0x81, 0x8b, 0x45, 0xfc, 0x8b, 0x0c, 0x01, 0xff, 0x75, 0x10, 0x03, 0xc8, 0xff, 0xd1, 0x59, 0x59, 0x8b, 0x45, 0xfc, 0x5f, 0x5e, 0x5b, 0xc9, 0xc3, 0x55, 0x8b, 0xec, 0x64, 0xa1, 0x30, 0x00, 0x00, 0x00, 0x8b, 0x40, 0x0c, 0x8b, 0x40, 0x0c, 0x83, 0xec, 0x14, 0x53, 0x56, 0x57, 0xe9, 0x9f, 0x00, 0x00, 0x00, 0x8b, 0x71, 0x3c, 0x8b, 0x50, 0x2c, 0x8b, 0x74, 0x0e, 0x78, 0x83, 0x65, 0xf8, 0x00, 0x8b, 0x78, 0x30, 0x8b, 0x00, 0x89, 0x55, 0xec, 0x85, 0xf6, 0x0f, 0x84, 0x81, 0x00, 0x00, 0x00, 0x83, 0x65, 0xfc, 0x00, 0xc1, 0xea, 0x10, 0x33, 0xdb, 0x66, 0x3b, 0xda, 0x73, 0x2d, 0x8b, 0x55, 0xfc, 0x8a, 0x14, 0x17, 0xc1, 0x4d, 0xf8, 0x0d, 0x80, 0xfa, 0x61, 0x0f, 0xbe, 0xd2, 0x7c, 0x0c, 0x8b, 0x5d, 0xf8, 0x8d, 0x54, 0x13, 0xe0, 0x89, 0x55, 0xf8, 0xeb, 0x03, 0x01, 0x55, 0xf8, 0x0f, 0xb7, 0x55, 0xee, 0xff, 0x45, 0xfc, 0x39, 0x55, 0xfc, 0x72, 0xd3, 0x83, 0x65, 0xfc, 0x00, 0x03, 0xf1, 0x8b, 0x56, 0x20, 0x8b, 0x7e, 0x18, 0x03, 0xd1, 0x85, 0xff, 0x74, 0x34, 0x8b, 0x3a, 0x03, 0xf9, 0x33, 0xdb, 0x83, 0xc2, 0x04, 0x89, 0x7d, 0xf4, 0x0f, 0xbe, 0x3f, 0xc1, 0xcb, 0x0d, 0x03, 0xdf, 0x8b, 0x7d, 0xf4, 0x47, 0x80, 0x7f, 0xff, 0x00, 0x89, 0x7d, 0xf4, 0x75, 0xeb, 0x03, 0x5d, 0xf8, 0x3b, 0x5d, 0x08, 0x74, 0x1d, 0xff, 0x45, 0xfc, 0x8b, 0x7d, 0xfc, 0x3b, 0x7e, 0x18, 0x72, 0xcc, 0x8b, 0x48, 0x18, 0x85, 0xc9, 0x0f, 0x85, 0x56, 0xff, 0xff, 0xff, 0x33, 0xc0, 0x5f, 0x5e, 0x5b, 0xc9, 0xc3, 0x8b, 0x55, 0xfc, 0x8b, 0x46, 0x24, 0x8d, 0x04, 0x50, 0x0f, 0xb7, 0x04, 0x08, 0x8b, 0x56, 0x1c, 0x8d, 0x04, 0x82, 0x8b, 0x04, 0x08, 0x03, 0xc1, 0xeb, 0xe1 };
List<byte> newShellcode = new List<byte>();
if (Is64BitDLL(dllBytes))
{
byte[] rdiShellcode = rdiShellcode64;
int bootstrapSize = 34;
// call next instruction (Pushes next instruction address to stack)
newShellcode.Add(0xe8);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
//Here is where the we pop the address of our shellcode off the stack and into the first register
// pop rcx
newShellcode.Add(0x59);
// mov r8, rcx - Backup our memory location to RCX before we start subtracting
newShellcode.Add(0x49);
newShellcode.Add(0x89);
newShellcode.Add(0xc8);
// Put the location of the DLL into RCX
// add rcx, <Length of bootstrap> - 5 (For our call instruction) + <rdiShellcode Length>
newShellcode.Add(0x48);
newShellcode.Add(0x81);
newShellcode.Add(0xc1);
foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length)))
newShellcode.Add(b);
// mov edx, <hash of function>
newShellcode.Add(0xba);
foreach (byte b in BitConverter.GetBytes((uint)functionHash))
newShellcode.Add(b);
// Put the location of our user data in
// add r8, (Size of bootstrap) + <Length of RDI Shellcode> + <Length of DLL>
newShellcode.Add(0x49);
newShellcode.Add(0x81);
newShellcode.Add(0xc0);
foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length + dllBytes.Length)))
newShellcode.Add(b);
// mov r9d, <Length of User Data>
newShellcode.Add(0x41);
newShellcode.Add(0xb9);
foreach (byte b in BitConverter.GetBytes((uint)userData.Length))
newShellcode.Add(b);
//Write the rest of RDI
foreach (byte b in rdiShellcode)
newShellcode.Add(b);
//Write our DLL
dllBytes[0] = 0x00;
dllBytes[1] = 0x00;
foreach (byte b in dllBytes)
newShellcode.Add(b);
//Write our userdata
foreach (byte b in userData)
newShellcode.Add(b);
}
else // 32 Bit
{
byte[] rdiShellcode = rdiShellcode32;
int bootstrapSize = 40;
// call next instruction (Pushes next instruction address to stack)
newShellcode.Add(0xe8);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
//Here is where the we pop the address of our shellcode off the stack and into the first register
// pop ecx
newShellcode.Add(0x58);
// mov ebx, eax - copy our location in memory to ebx before we start modifying eax
newShellcode.Add(0x89);
newShellcode.Add(0xc3);
// Put the location of the DLL into ECX
// add eax, <size of bootstrap> + <Size of RDI Shellcode>
newShellcode.Add(0x05);
foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length)))
newShellcode.Add(b);
// add ebx, <size of bootstrap> + <Size of RDI Shellcode> + <Size of DLL>
newShellcode.Add(0x81);
newShellcode.Add(0xc3);
foreach (byte b in BitConverter.GetBytes((uint)(bootstrapSize - 5 + rdiShellcode.Length + dllBytes.Length)))
newShellcode.Add(b);
//push <Length of User Data>
newShellcode.Add(0x68);
foreach (byte b in BitConverter.GetBytes((uint)userData.Length))
newShellcode.Add(b);
// push ebx
newShellcode.Add(0x53);
// push <hash of function>
newShellcode.Add(0x68);
foreach (byte b in BitConverter.GetBytes((uint)functionHash))
newShellcode.Add(b);
// push eax
newShellcode.Add(0x50);
// call instruction - We need to transfer execution to the RDI assembly this way (Skip over our next few op codes)
newShellcode.Add(0xe8);
newShellcode.Add(0x04);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
newShellcode.Add(0x00);
// add esp, 0x10 - RDI pushes things to the stack it never removes, we need to make the correction ourselves
newShellcode.Add(0x83);
newShellcode.Add(0xc4);
newShellcode.Add(0x10);
// ret - because we used call earlier
newShellcode.Add(0xc3);
//Write the rest of RDI
foreach (byte b in rdiShellcode)
newShellcode.Add(b);
//Write our DLL
dllBytes[0] = 0x00;
dllBytes[1] = 0x00;
foreach (byte b in dllBytes)
newShellcode.Add(b);
//Write our userdata
foreach (byte b in userData)
newShellcode.Add(b);
}
return newShellcode.ToArray();
}
}
"@
function ConvertTo-Shellcode{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=1)]
[string]$File,
[Parameter(Position=2)]
[int]$FunctionHash = 0x30627745,
[Parameter(Position=3)]
[string]$UserData = "None"
)
$Parameters = New-Object System.CodeDom.Compiler.CompilerParameters
$Parameters.CompilerOptions += "/unsafe"
Add-Type -TypeDefinition $Source -Language CSharp -CompilerParameters $Parameters
$FileData = Get-Content $File -Encoding Byte
$UserDataBytes = [system.Text.Encoding]::Default.GetBytes($UserData + "\0")
[sRDI]::ConvertToShellcode($FileData, $FunctionHash, $UserDataBytes)
}
|
combined_dataset/train/non-malicious/sample_42_27.ps1
|
sample_42_27.ps1
|
<#
.SYNOPSIS
Demonstrates how to write a command that works with paths that do
not allow wildards but must exist.
.DESCRIPTION
This command does not require a LiteralPath parameter because the
Path parameter can handle paths that use wildcard characters. That's
because this command does not "resolve" the supplied path.
.EXAMPLE
C:\PS> Import-FileNoWildcard -Path ..\..\Tests\foo[1].txt -WhatIf
This example shows how the Path parameter can handle a path that happens
to use the wildcard chars "[" and "]".
#>
function Import-FileNoWildcard {
[CmdletBinding(SupportsShouldProcess=$true)]
param(
# Specifies a path to one or more locations.
[Parameter(Mandatory=$true,
Position=0,
ParameterSetName="Path",
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Path to one or more locations.")]
[Alias("PSPath")]
[ValidateNotNullOrEmpty()]
[string[]]
$Path
)
begin {
}
process {
# Modify [CmdletBinding()] to [CmdletBinding(SupportsShouldProcess=$true)]
$paths = @()
foreach ($aPath in $Path) {
if (!(Test-Path -LiteralPath $aPath)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$aPath' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$aPath
$psCmdlet.WriteError($errRecord)
continue
}
# Resolve any relative paths
$paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath)
}
foreach ($aPath in $paths) {
if ($pscmdlet.ShouldProcess($aPath, 'Operation')) {
# Process each path
$aPath
}
}
}
end {
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfzLutwn2+TZtl
# ROHMHoV6NbYy6BXv9v/bMMcnE/HZ76CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJnq0gDB8hgni2ygCGyv375P
# pSBWhmrOHH2a5cXZvIMbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAn49KpClnG0+Nc1fz2RDlFiq3hXW0zPnrFwmUntKMO4c7E4gM49cJfiQB
# VwS1rdM+CQOihIGstpegXVqbf6OsVUW50+cw28UUgbfE5S7gTh6yDoGhrzu95WhK
# cJ524EJXioJC3JXnEJEF7hrFtW6dN9n4KauRLZjvFGZYkxj44jZFKF54Yd/DMS2z
# Gu0KWN7T2fIxi9VbpgPOswgTxlxT8zHOnzn3Y7Vl+I0UZqFCLmJO/GsWx8WkX4DG
# tkU4+RU78FYpBK3zXTqtIFriOF3pAEXjBXZPaKBJM5y8zwsFn95Pc75iRm2CZYgZ
# IontF/GDmLjtKCI/fhebmja53deSzaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCl50zcXyMEKdjPP/gh4bfEO7sSvHlcHubL/6d0VUM68AIGZjOsD7b7
# GBMyMDI0MDUwNDAwMDA1OC42MThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnfe+gwIhgPMjAyNDA1MDMyMzA2MTZaGA8yMDI0MDUwNDIzMDYxNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6d976AIBADAHAgEAAgII5TAHAgEAAgIRdzAKAgUA
# 6eDNaAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAE42BV4TjzrO4e8MzduR
# TIhukwFONTrsablZ+qdQ+v7PGkBooZIwWxzYdZ6BggvWhANOZhkdONHTu2sJrmek
# xj0YUvp+9m51Lqoxrf2ZqO8NEirR07NX7s1CxN1DU3pP9dQ6JXzA2aNE0xqySQzW
# BUsdk9tsKuGv0axMCec0xjTvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgJuJ9/3GlX+Rp1i33wABOyp+Pzjbrp12IcuY8OLyMnRIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEII+z1YG2NS3Xd7KHQ5AsD3zoHSOZnaxTAIWLw/sW9Jpc
# MA0GCSqGSIb3DQEBCwUABIICAHFGjl7NAAm8ioel0mwiYZZ58rDdGWS7PdUSR2LJ
# MKz2YprLlLrOd4XZV62Td2eFIyki8lEI81qw8DYyGrZHx5k2oRa6zZ0vqrBGYKJB
# TptO9PDHvhunqfDLz8u+FKKfOFu1RG/EkIE6lRPF5Omw19Bv9lRxsFOsA7u40hnO
# 9d6vMgBm2hrk0aEJYQUiKfVpayRCteEsI6sDNYqtF7tzNuyqrx+8Hx0CcyR4ALAB
# zBT0HwYSL8/QojSDbzycjnoSYoQnw/KyuK13pwUEqkvdeP8vytbuabT5CUt4rWc+
# YTMso355S90c2dv/2nX3uwj4c52942iOoCCEQwhHwcqOTMoJw8XTO7Z80qxVB0Zf
# KgA7bjAwTCvQqG5YbTweqVhc4mFKFyBMDOzKsixw0l2ZvbXMh2S0S8Hptbq/wU3b
# sLK6jBApnCT1yW+nMwK+N00AEMo+70x/eHB5pTdcFb1GVo3UZWhldgBgcgac+PUj
# r6Ckp+p2GvE7QtDZxetMsQxlzaizwWftRYdfSxwJNp5XWK5A/YhQ2v8Z7vo+KaLh
# LYvRv/GVxK//yWtTRU9i6fw03XuB9ZOPvXKUAOj461pSem7/Ig85qSoLPXadIbbd
# 58SruO7E7wtIII5EovbXcbGhbTI9ea/Cj+teX5i5qCaeiz2tak1UNPPnnNTKHgde
# pTRV
# SIG # End signature block
|
combined_dataset/train/non-malicious/ISE-Lines_3.ps1
|
ISE-Lines_3.ps1
|
#requires -version 2.0
## ISE-Lines module v 1.1
## DEVELOPED FOR CTP3
## See comments for each function for changes ...
##############################################################################################################
## Provides Line cmdlets for working with ISE
## Duplicate-Line - Duplicates current line
## Conflate-Line - Conflates current and next line
## MoveUp-Line - Moves current line up
## MoveDown-Line - Moves current line down
## Delete-TrailingBlanks - Deletes trailing blanks in the whole script
##############################################################################################################
## Duplicate-Line
##############################################################################################################
## Duplicates current line
##############################################################################################################
function Duplicate-Line
{
$editor = $psISE.CurrentFile.Editor
$caret_row = $editor.CaretLine
$caret_col = $editor.CaretColumn
$this_line_text = $editor.Text.Split("`n")[$caret_row - 1].TrimEnd([environment]::NewLine)
$editor.SetCaretPosition($caret_row, $this_line_text.length + 1)
$editor.InsertText("`r`n" + $this_line_text)
$editor.SetCaretPosition($caret_row, $caret_col)
}
## Conflate-Line
##############################################################################################################
## Conflates current and next line
## v 1.1 fixed bug on last but one line and remove line continuation character while joining
##############################################################################################################
function Conflate-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
if ( $caretLine -ne $text.Count )
{
$line = $text[$caretLine -1] + $text[$caretLine] -replace ("(``)?`r", "")
$newText = @()
if ( $caretLine -gt 1 )
{
$newText = $text[0..($caretLine -2)]
}
$newText += $line
if ( $caretLine -ne $text.Count - 1)
{
$newText += $text[($caretLine +1)..($text.Count -1)]
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine, $caretColumn)
}
}
## MoveUp-Line
##############################################################################################################
## Moves current line up
##############################################################################################################
function MoveUp-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
if ( $caretLine -ne 1 )
{
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
$line = $text[$caretLine -1]
$lineBefore = $text[$caretLine -2]
$newText = @()
if ( $caretLine -gt 2 )
{
$newText = $text[0..($caretLine -3)]
}
$newText += $line
$newText += $lineBefore
if ( $caretLine -ne $text.Count )
{
$newText += $text[$caretLine..($text.Count -1)]
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine - 1, $caretColumn)
}
}
## MoveDown-Line
##############################################################################################################
## Moves current line down
##############################################################################################################
function MoveDown-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
if ( $caretLine -ne $text.Count )
{
$line = $text[$caretLine -1]
$lineAfter = $text[$caretLine]
$newText = @()
if ( $caretLine -ne 1 )
{
$newText = $text[0..($caretLine -2)]
}
$newText += $lineAfter
$newText += $line
if ( $caretLine -lt $text.Count -1 )
{
$newText += $text[($caretLine +1)..($text.Count -1)]
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine +1, $caretColumn)
}
}
## Delete-TrailingBlanks
##############################################################################################################
## Deletes trailing blanks in the whole script
##############################################################################################################
function Delete-TrailingBlanks
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$newText = @()
foreach ( $line in $editor.Text.Split("`n") )
{
$newText += $line -replace ("\\s+$", "")
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine, 1)
}
##############################################################################################################
## Inserts a submenu Lines to ISE's Custum Menu
## Inserts command Duplicate Line to submenu Lines
## Inserts command Conflate Line Selected to submenu Lines
## Inserts command Move Up Line to submenu Lines
## Inserts command Move Down Line to submenu Lines
## Inserts command Delete Trailing Blanks to submenu Lines
##############################################################################################################
if (-not( $psISE.CustomMenu.Submenus | where { $_.DisplayName -eq "Line" } ) )
{
$lineMenu = $psISE.CustomMenu.Submenus.Add("_Lines", $null, $null)
$null = $lineMenu.Submenus.Add("Duplicate Line", {Duplicate-Line}, "Ctrl+Alt+D")
$null = $lineMenu.Submenus.Add("Conflate Line", {Conflate-Line}, "Ctrl+Alt+J")
$null = $lineMenu.Submenus.Add("Move Up Line", {MoveUp-Line}, "Ctrl+Shift+Up")
$null = $lineMenu.Submenus.Add("Move Down Line", {MoveDown-Line}, "Ctrl+Shift+Down")
$null = $lineMenu.Submenus.Add("Delete Trailing Blanks", {Delete-TrailingBlanks}, "Ctrl+Shift+Del")
}
|
combined_dataset/train/non-malicious/ShowUI Clock 6.ps1
|
ShowUI Clock 6.ps1
|
New-UIWidget -AsJob -Content {
$shadow = DropShadowEffect -Color Black -Shadow 0 -Blur 8
$now = Get-Date;
StackPanel {
TextBlock -Name "Time" ('{0:h:mm tt}' -f $now) -FontSize 108 -LineHeight 100 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -Foreground White -Effect $shadow -FontFamily "Century Gothic"
StackPanel -Orientation Horizontal {
TextBlock -Name "Day" ('{0:dd}' -f $now) -FontSize 80 -LineHeight 80 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -Foreground White -Opacity 0.6 -Effect $shadow -FontFamily "Century Gothic"
StackPanel {
TextBlock -Name "Month" ('{0:MMMM}' -f $now).ToUpper() -fontsize 40 -LineHeight 40 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -FontFamily "Century Gothic"
TextBlock -Name "Weekday" ('{0:dddd}' -f $now).ToUpper() -fontsize 28 -LineHeight 28 -LineStackingStrategy BlockLineHeight -Margin 0 -Padding 0 -Foreground White -Effect $shadow -FontFamily "Century Gothic"
} -Margin 0
} -Margin 0
} -Margin 0
} -Interval "0:0:0.2" -UpdateBlock {
$now = Get-Date
$Time.Text = '{0:h:mm tt}' -f $now
$Day.Text = '{0:dd}' -f $now
$Month.Text = ('{0:MMMM}' -f $now).ToUpper()
$Weekday.Text = ('{0:dddd}' -f $now).ToUpper()
}
|
combined_dataset/train/non-malicious/GPRS Online log_5.ps1
|
GPRS Online log_5.ps1
|
<#
.SYNOPSIS
Get-GprsTime (V3.3 Update for Windows 7) Check the total connect time of any
GPRS devices from a specified date.
Use Get-Help .\\Get-GprsTime -full to view Help for this file.
.DESCRIPTION
Display all the GPRS modem Event Log entries. While applications issued by the
mobile phone manufacturers will invariably monitor only their own usage, this
will show any logged GPRS activity, be it via PCMCIA, USB, mobile phone, etc.
Use the -Verbose switch for some extra information if desired. A default value
can be set with the -Monthly switch but can be temporarily overridden with any
-Start value and deleted by entering an invalid date. Now uses .NET Parse to
use any culture date input. Switches -M and -S cannot be used together.
A Balloon prompt will be issued in the Notification area for the 5 days
before the nominal month end.
NOTE: this can effectively be suppressed by using a value higher than the SIM
card term, ie something like -Account 90 for a 30 day card which will override
the default setting. Use -Today to check only today's usage.
Define a function in $profile to set any permanent switches, for example to
set the account value permanently to 30 days.
function GPRS {
Invoke-Expression "Get-GprsTime -Account 30 $args"
}
.EXAMPLE
.\\Get-GprsTime.ps1 -Monthly 4/8/2011
This will set the default search date to start from 4/8/2011 and is used to
reset the start date each month for the average 30/31 day SIM card.
.EXAMPLE
.\\Get-GprsTime.ps1 -Start 12/07/2009 -Account 100 -Verbose
Search from 12/07/2011 and also show (Verbose) details for each session. The
Account switch will override any balloon prompt near the SIM expiry date.
.EXAMPLE
.\\Get-GprsTime.ps1 5/9/2011 -v
Search one day only and show session details.
.EXAMPLE
.\\Get-GprsTime.ps1 -Today
Show all sessions for today. This always defaults to verbose output.
.EXAMPLE
.\\Get-GprsTime.ps1 -Debug
This shows the first available Event Log record & confirms switch settings.
(Note that it will probably not be the first 'RemoteAccess' or 'RasClient'
record).
.NOTES
A shorter total time than that actually used will result if the Event Log
does not contain earlier dates; just increase the log size in such a case.
The author can be contacted at www.SeaStarDevelopment.Bravehost.com and a
(binary compiled) Module version of this procedure is included in the file
Gprs3xxx.zip download there; the execution time of the module being about
10 times faster than this script.
Use '(measure-Command {.\\Get-GprsTime}).TotalSeconds' to confirm the times.
For the Event Log to record connect & disconnect events, the modem software
should be set to RAS rather than NDIS if possible.
#>
Param ([String] $start,
[String] $monthly,
[Int] $account = 0, #Start warning prompt 5 days before month end.
[Switch] $today,
[Switch] $verbose,
[Switch] $debug)
Trap [System.Management.Automation.MethodInvocationException] {
[Int]$line = $error[0].InvocationInfo.ScriptLineNumber
[System.Media.SystemSounds]::Hand.Play()
if ($line -eq 197) {
Write-Warning "[$name] Current GPRS variable has been deleted."
$monthly = ""
[Environment]::SetEnvironmentVariable("GPRS",$monthly,"User")
}
else {
Write-Warning "[$name] Date is missing or invalid $SCRIPT:form"
}
exit 1
}
#Establish the Operating System...We only need to confirm XP here.
#The result will be written to the 'out' variable '$osv'.
function Get-OSVersion($computer,[ref]$osv) {
$os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer
Switch -regex ($os.Version) {
'^5\\.1\\.(\\d{1,4})$' { $osv.value = "xp" } #Find XP & variants.
default { $osv.value = "unknown" }
}
}
$osv = $null
Get-OSVersion -computer 'localhost' -osv ([ref]$osv)
if ($osv -eq 'xp') {
$logname = 'System'
$connEvent = 20158
$discEvent = 20159
$source = 'RemoteAccess'
}
else { #Treat As Vista or Windows 7.
$logname = 'Application'
$connEvent = 20225
$discEvent = 20226
$source = 'RasClient'
}
$entryType = 'Information'
$logEntry = $null
$oldest = Get-eventlog -LogName $logname | #Get the earliest Log record.
Sort-Object TimeGenerated |
Select-Object -first 1
if ($oldest.TimeGenerated) {
$logEntry = "System Event records available from - $($oldest.TimeGenerated.ToLongDateString())"
}
$name = $myInvocation.MyCommand
$newLine = "[$name] The switches -Start and -Monthly can only be used separately."
if ($debug) {
$DebugPreference = 'Continue'
}
if ($start -and $monthly) {
[System.Media.SystemSounds]::Hand.Play()
Write-Warning "$newLine"
exit 1
}
$SCRIPT:form = ""
#In certain cases Culture & UICulture can be different and have been known to
# return conflicting results regarding '-is [DateTime]' queries, etc.
if ($Host.CurrentCulture -eq $Host.CurrentUICulture) {
$SCRIPT:form = '-Use format mm/dd/year'
[Int]$culture = "{0:%d}" -f [DateTime] "6/5/2009" #Returns local day.
If ($culture -eq 6) {
$SCRIPT:form = '-Use format dd/mm/year'
}
}
$ErrorActionPreference = 'SilentlyContinue'
$VerbosePreference = 'SilentlyContinue'
$WarningPreference = 'Continue'
$conn = $disc = $default = $print = $null
$timeNow = [DateTime]::Now
$total = $timeNow - $timeNow #Set initial value to 00:00:00.
$insert = "since"
if ($verbose) {
$VerbosePreference = 'Continue'
}
function CreditMsg ($value, $value2) {
$value = [Math]::Abs($value)
$prefix = "CURRENT"
[DateTime] $creditDT = $value2
$creditDT = $creditDT.AddDays($value) #Add the -Account days.
$thisDay = "{0:M/d/yyyy}" -f [DateTime]::Now #Force US format.
#If we use '$number = $creditDT - (Get-Date)' instead of the line below we
#can sometimes get a value of 1 returned instead 2, hence the above lines.
$number = $creditDT - [DateTime] $thisDay
[String] $credit = $creditDT
$credit = $credit.Replace('00:00:00','') #Remove any trailing time.
$credit = "{0:d}" -f [DateTime]$credit
Switch($number.Days) {
1 {$prefix = "($value days) will expire tomorrow"; break}
0 {$prefix = "($value days) will expire today"; break}
-1 {$prefix = "($value days) expired yesterday"; break}
{($_ -lt 0)} {$prefix = "($value days) expired on $credit"; break}
{($_ -le 5)} {$prefix = "($value days) will expire on $credit"}
Default {$prefix = "CURRENT"} #Only come here if over 5 days.
}
return $prefix
}
function Interval ([String] $value) {
Switch -regex ($value) {
'^00:00:\\d+(.*)$' {$suffix = "seconds"; break}
'^00:\\d+:\\d+(.*)$' {$suffix = "minutes"; break}
'^\\d+:\\d+:\\d+(.*)$' {$suffix = " hours"; break}
'^(\\d+)\\D(\\d+)(.*)$' {$suffix = " hours"
$pDays = $matches[1]
$pHours = $matches[2]
[string]$pMinSec = $matches[3]
[string]$tHours = (([int]$pDays) * 24)+[int]$pHours
$value = $tHours + $pminSec; break}
default {$suffix = " hours"} #Should never come here!
}
return "$value $suffix"
}
function CheckSetting ($value) {
if ($value) { #Correct for local culture.
$print = $default.ToShortDateString()
}
else {
$print = "(Value not set)"
}
return $print
}
#The Script effectively starts here.............................................
$getGprs = [Environment]::GetEnvironmentVariable("GPRS","User")
#First check for GPRS variable and change from US date format to current locale.
if ([DateTime]::TryParse($getGprs, [Ref]$timeNow)) { #No error as date is valid.
$default = "{0:d}" -f [datetime]$getGprs
$default = [DateTime]::Parse($default)
$checkParts = "{0:yyyy},{0:%M}" -f $default
$times = $checkParts.Split(',')
$dayCount = [DateTime]::DaysInMonth($times[0],$times[1]) #Range 28-31.
if($account -eq 0) {
$account = $dayCount
$summary = "$($dayCount.ToString()) days"
}
else {
$summary = "$($account.Tostring()) days"
}
$text = CreditMsg $account $getGprs #Check if within 5 days of expiry date.
if ($text -ne "CURRENT") {
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
$objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon
$objNotifyIcon.Icon = [System.Drawing.SystemIcons]::Exclamation
$objNotifyIcon.BalloonTipIcon = "Info"
$objNotifyIcon.BalloonTipTitle = "GPRS online account"
$objNotifyIcon.BalloonTipText = "Credit $text"
$objNotifyIcon.Visible = $True
$objNotifyIcon.ShowBalloonTip(10000)
}
}
else {
$summary = "(Days not set)"
if ((!$today) -and (!$monthly) -and (!$start)) {
[System.Media.SystemSounds]::Hand.Play()
Write-Warning("Monthly date is either invalid or not set.")
exit 1
}
}
if ($start) {
$start = [DateTime]::Parse($start) #Trigger TRAP if invalid!
[DateTime]$limit = $start
$convert = "{0:D}" -f $limit
$print = CheckSetting $default
}
if ($monthly) {
$start = [DateTime]::Parse($monthly) #Trigger TRAP if invalid!
Write-Output "Setting GPRS (monthly) environment variable to: $monthly"
$gprs = [String]$start.Replace('00:00:00','')
[Environment]::SetEnvironmentVariable("GPRS",$gprs,"User")
[DateTime] $limit = $start #Change to required US date format.
$convert = "{0:D}" -f $limit
$print = $limit.ToShortDateString()
$summary = "(Days undetermined)" #Will show next time around.
}
if ($today) {
$verBosePreference = 'Continue' #Show VERBOSE by default.
[DateTime] $limit = (Get-Date)
$convert = "{0:D}" -f $limit
$limit = $limit.Date #Override any start date if using -Today input.
$insert = "for today"
$print = CheckSetting $default
}
if ((!$today) -and (!$monthly) -and (!$start)) {
if ($default) {
$monthly = $default
[DateTime] $limit = $monthly
$convert = "{0:D}" -f $limit
$print = CheckSetting $default
}
}
Write-Verbose "All records $($insert.Replace('for ','')) - $convert"
Write-Verbose "Script activation - User [$($env:UserName)] Computer [$($env:ComputerName)]"
Write-Output ""
Write-Output "Calculating total connect time of all GPRS modem devices..."
#We cannot proceed beyond here without a valid $limit value.
Write-Debug "Using - [Search date] $($limit.ToShortDateString()) [Account] $summary [GPRS Monthly] $print"
if ($logEntry) {
Write-Debug "$logEntry"
}
$lines = Get-EventLog $logname | Where-Object {($_.TimeGenerated -ge $limit) -and `
($_.EventID -eq $discEvent -or $_.EventID -eq $connEvent)}
if ($lines) {
Write-Verbose "A total of $([Math]::Truncate($lines.Count/2)) online sessions extracted from the System Event Log."
}
else {
Write-Output "(There are no events indicated in the System Event Log)"
}
$lines | ForEach-Object {
$source = $_.Source
if ($_.EventID -eq $discEvent) { #Event 20159 is Disconnect.
$disc = $_.TimeGenerated
}
else { #Event 20158 is Connect.
$conn = $_.TimeGenerated
} #We are only interested in matching pairs of DISC/CONN...
if ($disc -ne $null -and $conn -ne $null -and $disc -gt $conn) {
$diff = $disc - $conn
$total += $diff
$convDisc = "{0:G}" -f $disc
$convConn = "{0:G}" -f $conn
$period = Interval $diff
Write-Verbose "Disconnect at $convDisc. Online - $period"
Write-Verbose " Connect at $convConn."
}
} #End ForEach
if (!$source) {
$source = '(Undetermined)'
}
Write-Verbose "Using local event source - System Event Log [$source]"
$period = Interval $total
Write-Output "Total online usage $insert $convert is $($period.Replace(' ',' '))."
Write-Output ""
|
combined_dataset/train/non-malicious/sample_30_39.ps1
|
sample_30_39.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Creates or updates a FHIR Service resource with the specified parameters.
.Description
Creates or updates a FHIR Service resource with the specified parameters.
.Example
PS C:\> New-AzHealthcareFhirService -Name azpsfhirservice -ResourceGroupName azps_test_group -WorkspaceName azpshcws -Location eastus2 -Kind 'fhir-R4' -Authority "https://login.microsoftonline.com/{DirectoryID}" -Audience "https://azpshcws-{FhirServiceName}.fhir.azurehealthcareapis.com"
Location Name Kind ResourceGroupName
-------- ---- ---- -----------------
eastus2 azpshcws/azpsfhirservice fhir-R4 azps_test_group
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IFhirService
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
ACCESSPOLICYOBJECTID <IFhirServiceAccessPolicyEntry[]>: Fhir Service access policies.
ObjectId <String>: An Azure AD object ID (User or Apps) that is allowed access to the FHIR service.
ACRCONFIGURATIONOCIARTIFACT <IServiceOciArtifactEntry[]>: The list of Open Container Initiative (OCI) artifacts.
[Digest <String>]: The artifact digest.
[ImageName <String>]: The artifact name.
[LoginServer <String>]: The Azure Container Registry login server.
.Link
https://learn.microsoft.com/powershell/module/az.healthcareapis/new-azhealthcarefhirservice
#>
function New-AzHealthcareFhirService {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IFhirService])]
[CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Alias('FhirServiceName')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')]
[System.String]
# The name of FHIR Service resource.
${Name},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')]
[System.String]
# The name of the resource group that contains the service instance.
${ResourceGroupName},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')]
[System.String]
# The name of workspace resource.
${WorkspaceName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The subscription identifier.
${SubscriptionId},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IFhirServiceAccessPolicyEntry[]]
# Fhir Service access policies.
# To construct, see NOTES section for ACCESSPOLICYOBJECTID properties and create a hash table.
${AccessPolicyObjectId},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String[]]
# The list of the Azure container registry login servers.
${AcrConfigurationLoginServer},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IServiceOciArtifactEntry[]]
# The list of Open Container Initiative (OCI) artifacts.
# To construct, see NOTES section for ACRCONFIGURATIONOCIARTIFACT properties and create a hash table.
${AcrConfigurationOciArtifact},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.Management.Automation.SwitchParameter]
# If credentials are allowed via CORS.
${AllowCorsCredential},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String]
# The audience url for the service
${Audience},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String]
# The authority url for the service
${Authority},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String[]]
# The headers to be allowed via CORS.
${CorsHeader},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.Int32]
# The max age to be allowed via CORS.
${CorsMaxAge},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String[]]
# The methods to be allowed via CORS.
${CorsMethod},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String[]]
# The origins to be allowed via CORS.
${CorsOrigin},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.Management.Automation.SwitchParameter]
# If the SMART on FHIR proxy is enabled
${EnableSmartProxy},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String]
# An etag associated with the resource, used for optimistic concurrency when editing it.
${Etag},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String]
# The name of the default export storage account.
${ExportStorageAccountName},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.ServiceManagedIdentityType])]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.ServiceManagedIdentityType]
# Type of identity being specified, currently SystemAssigned and None are allowed.
${IdentityType},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IUserAssignedIdentities]))]
[System.Collections.Hashtable]
# The set of user assigned identities associated with the resource.
# The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}.
# The dictionary values can be empty objects ({}) in requests.
${IdentityUserAssignedIdentity},
[Parameter(Mandatory)]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirServiceKind])]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirServiceKind]
# The kind of the service.
${Kind},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[System.String]
# The resource location.
${Location},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.PublicNetworkAccess])]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.PublicNetworkAccess]
# Control permission for data plane traffic coming from public networks while private endpoint is enabled.
${PublicNetworkAccess},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirResourceVersionPolicy])]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Support.FhirResourceVersionPolicy]
# The default value for tracking history across all resources.
${ResourceVersionPolicyConfigurationDefault},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IResourceVersionPolicyConfigurationResourceTypeOverrides]))]
[System.Collections.Hashtable]
# A list of FHIR Resources and their version policy overrides.
${ResourceVersionPolicyConfigurationResourceTypeOverride},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Models.Api20211101.IResourceTags]))]
[System.Collections.Hashtable]
# Resource tags.
${Tag},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.HealthcareApis.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try {
Az.HealthcareApis.internal\New-AzHealthcareFhirService @PSBoundParameters
} catch {
throw
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZ+r24npWnhqkc
# yaf1oqQ/tEB1fQOY4To7osDKdoxjm6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAqq24lGlbJgWVpwcfJQF5Xn
# OneyOZAf0dQ91a3Zs585MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAu3XtHFHdgrQPJJKn/1o5Mfo/CCN2bii/lt9MG4fUEWOCmHSjNjReUGBF
# kRExqqtu0Wr/jegZkTTL7gqIAXJZxCIfnRoE43EIm4KoUXmhtOFFEMtVt2qD2jDq
# rUzxJXgDdSf7DwuHfgX4GRcY/XamNFkKXd8JuequCGAXalRk1oSsZ33S9y+kSZKY
# tTjF40r8XEYEL8vVAQFqdygACGm3AvFIPBWZPdUdmqNdAJNJxcsgzTTkRpGS1P+q
# ffGw0yJieE6fYlgwKe+vel36eUMSYY5VEoQvKhZataaCtEEPnmVPbJa4Sv+hry0h
# Og9mStd4+MeADs39L1A7YBVtXnHkrqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDmxIDsQRknz0aYgbuCkAfqovhqTebip16rlX/ZezOy6gIGZhf9t0+2
# GBMyMDI0MDQyMzEzMTYxMS4zMDhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGk+zAiGA8yMDI0MDQyMzAzMDk0
# N1oYDzIwMjQwNDI0MDMwOTQ3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0aT7
# AgEAMAoCAQACAh2yAgH/MAcCAQACAhQBMAoCBQDp0vZ7AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAG3Tuff4zR8zcaVgTLUDfl0xfRocWtx6pvLTWn5lo6N9
# Ak/XTdyVZV3oFZBAbtKglmbTcLN40qFbmrGuTqIuiHb7JQZlTjW5F+EQgD7YsS4c
# wJ6YQVFrXtZDUB0EICL7yMptISLaBGXZPelWUJ7qLaIFu9jwk1lhSiJBBWtmOqXf
# qbtcuT8D1Y1cggfTZkt8vGF4GZRkEaQwd14QQKGm8fLz4WwtzneqbM0vXhNcJy6o
# Q/GCqSvXz1qE8em5Ym2ZtBL14QDm8x+/D8tLpZXCx6+AsR26NUgkkQjRyuEunW+c
# KSokVvA6lrCyTg8VerFU7w8xbfbO2/dRz4EkBrijI9MxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDi7R7AN/o1HsESpYk6P8Pm3mPCZkSVUOVzQlVdTt9h
# ajCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgkSVAVMCQP43gRUUZLldZpT1L
# MwzkyidT5GxFNcH73KkwDQYJKoZIhvcNAQELBQAEggIAtBKztfA/zdyw/6HJVL/u
# FStLWPx4yZO7+M0bFjfD18UPdhubncPBgVN9Mr2WO64wiQy1NGftssnhXu/DwF/W
# ZM28lKV7/03jvSXSceJKlsOHognaI0O9szEEdL9MwV+kWOp+BXP2Ab+oHWLfbFaH
# f+2Dzup/HiJ1mXF2Qu+V9YvG2Om7D7Iws7B0KbEjNpzllnl1GLZImUS5UMMJb0iU
# MrN97bgrNlPVswOP26Dh403haj/i+3gvDFI6aGBbBSc9x1BGKLw8NXJ1JIRgTRYq
# nwvL/zgMgZhhciVLQgDcjM7tNHjVeNsL3N97c+i40jt0pWJ0ciO3OpyDHiQidnBa
# egFMcefYXwmQbqYXgJg6LbgaGiHYgNLRs5WsgLy9G/E22FrushLJV6doR1mA0OJd
# +vI/3aSRKdhyVoyHyXMfPrfUxoRlXHbhnHiMkHK5hTqnkyeKfmBUI9+yBjTLB0CI
# YEI2XAjhBeToPx+jFDw3Opu5TbN+nPd3jDk3EmNnosOTwK8nZOZ9ATSBAyeYEmXW
# 040hmmsr8/ggj+8uo7dmBhksvloQyx1/aVtlUeyxWJXuwpYXK0AuUlR9XlraXOda
# v9m4Ohre2Wk+bJ1b+qKpArNZLlQLM3dDJIFcOCfzYxWX0TsJ6PCufl2NknWNCIOW
# jPDDsuLUlKkXn/k22JcTMqI=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_4_42.ps1
|
sample_4_42.ps1
|
ConvertFrom-StringData @'
id_vssbackuppkgfiles=Windows Server Backup Files
id_vssbackuppkgfilesobtaining=Obtaining Windows Server Backup log files
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOvlPZ227+vUpg
# 5DcajLEanyZ2bO0Mu45dr/sn9VubnKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP+HDMXTTNWjy26gRAN+ef+B
# 79aqvm+f2LbTAmHkoUNNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAWKGPTxW2U6Mcz2aMRpYkrDk6TPJoo28kdrUbv4v8muvz7TK/EXj+SJ0f
# gZltE2jo9CMja9H5lOqN32YX4pSR8hKaaIPT5VIGV12eyWFmHizE17yP4n2fDogn
# E3o+Kh80jsMbIfK8r5nftczXga+wzypYKt6c169BFcJBDG3Gh+AkoONW6BqMreY9
# JE5B3qjhbsXPc9My4W4ML65pDlRDLV/ZRJ2I9IffWG7lSGqvK7g+vuqOFg0GewlR
# /Jj3IaBQNjhlnZ8fD2k36NEpXyFvjxbAV+nDxZ6nZGiF+Fi9EvLzqAaOiTTYAGwx
# ZfbxpzLo0fyy8Jfv+t19GAaAzcHIQaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAODfZ6wfl2ALSBdxGsUL0mFbFsiA1U3cC1TNtxVodgKwIGZusyQ1dK
# GBMyMDI0MTAyODExNDA0MS4yODZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu
# 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6
# FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B
# EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b
# tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ
# X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP
# 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP
# 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp
# 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2
# uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG
# cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d
# OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8
# +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr
# YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ
# 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE
# DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9
# uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp
# Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n
# +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath
# RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX
# XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4
# CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE
# rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD
# hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK
# AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y
# M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7
# RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j
# /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty
# l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1
# Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP
# 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgrQ3Ahdr+NwzW
# 1RjrY68n0tl7k67HEzs2lgqxOqFAW54wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9
# MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB
# CwUABIICAJGPQsNrAe1kcDIZqEekUpAiTT0uTNvtBlFX6ytKd3/LN05VJg+C8Y5A
# +E8koc0O4mT04yY6ICZE4pc/L1OlK/VLB/T5mkHeJkD6qZu4Ni/3sFFDLFbjc1wy
# KfSQQZXX9gH/GJCG/gu58yUQMZcZl4qACnPyX/9bk46x7F27hM14B6uHrKVWUNJ1
# E5Wx6ZdJU9UedE+fHMeoEhDezK9utujtkDo14cObgm8IRQLyAyN7Xoyp46LNZyBb
# fVIgCB3LxFJYyAaCLBfQtuqicRYuRQZ1gpzHdfBsmzwOBv+ov+WQfNZy3JLN3WCl
# QRn8inntPr/ubzSnvlR4OofG0w7gwkLkF5N4bFsFVysh3Ca69JlXirxZdQxXGMsT
# 75C1ML+24MhB36UQK1G6/0VrS2Z4iL3his7pOxcSuTfwMMrWmZZCUnjh45AVZrzH
# tlGhQKE0YpOHvUwCO4w9jNYMO1T6lKWFMBLJSoFzeJkGpgIQKFXGV3nCCkt6IZBs
# L1IEYvYNxWTluxu9WmLB3nGHE3WEwxVhCrJI7ZFJvwjGNH3Lw64KdjVcnjh+ZkCy
# sIHPBK7AyCTH7fKomDKvDVZBpA1zJWdtbmYrFXp8QWGQCmbqKwS4tOd6a6XB99Ay
# nSRM2Wf1ruS34qTJBz2C90/NMK486hmN7wriHTDgugT1JPclyAjM
# SIG # End signature block
|
combined_dataset/train/non-malicious/1993.ps1
|
1993.ps1
|
using namespace System.Diagnostics
Describe 'minishell for native executables' -Tag 'CI' {
BeforeAll {
$powershell = Join-Path -Path $PsHome -ChildPath "pwsh"
}
Context 'Streams from minishell' {
It 'gets a hashtable object from minishell' {
$output = & $powershell -noprofile { @{'a' = 'b'} }
($output | Measure-Object).Count | Should -Be 1
$output | Should -BeOfType 'Hashtable'
$output['a'] | Should -Be 'b'
}
It 'gets the error stream from minishell' {
$output = & $powershell -noprofile { Write-Error 'foo' } 2>&1
($output | Measure-Object).Count | Should -Be 1
$output | Should -BeOfType 'System.Management.Automation.ErrorRecord'
$output.FullyQualifiedErrorId | Should -Be 'Microsoft.PowerShell.Commands.WriteErrorException'
}
It 'gets the information stream from minishell' {
$output = & $powershell -noprofile { Write-Information 'foo' } 6>&1
($output | Measure-Object).Count | Should -Be 1
$output | Should -BeOfType 'System.Management.Automation.InformationRecord'
$output | Should -Be 'foo'
}
}
Context 'Streams to minishell' {
It "passes input into minishell" {
$a = 1,2,3
$val = $a | & $powershell -noprofile -command { $input }
$val.Count | Should -Be 3
$val[0] | Should -Be 1
$val[1] | Should -Be 2
$val[2] | Should -Be 3
}
}
}
Describe "ConsoleHost unit tests" -tags "Feature" {
BeforeAll {
$powershell = Join-Path -Path $PsHome -ChildPath "pwsh"
$ExitCodeBadCommandLineParameter = 64
function NewProcessStartInfo([string]$CommandLine, [switch]$RedirectStdIn)
{
return [ProcessStartInfo]@{
FileName = $powershell
Arguments = $CommandLine
RedirectStandardInput = $RedirectStdIn
RedirectStandardOutput = $true
RedirectStandardError = $true
UseShellExecute = $false
}
}
function RunPowerShell([ProcessStartInfo]$si)
{
$process = [Process]::Start($si)
return $process
}
function EnsureChildHasExited([Process]$process, [int]$WaitTimeInMS = 15000)
{
$process.WaitForExit($WaitTimeInMS)
if (!$process.HasExited)
{
$process.HasExited | Should -BeTrue
$process.Kill()
}
}
}
AfterEach {
$Error.Clear()
}
It "Clear-Host does not injects data into PowerShell output stream" {
& { Clear-Host; 'hi' } | Should -BeExactly 'hi'
}
Context "ShellInterop" {
It "Verify Parsing Error Output Format Single Shell should throw exception" {
{ & $powershell -outp blah -comm { $input } } | Should -Throw -ErrorId "IncorrectValueForFormatParameter"
}
It "Verify Validate Dollar Error Populated should throw exception" {
$origEA = $ErrorActionPreference
$ErrorActionPreference = "Stop"
$a = 1,2,3
$e = {
$a | & $powershell -noprofile -command { wgwg-wrwrhqwrhrh35h3h3}
} | Should -Throw -ErrorId "CommandNotFoundException" -PassThru
$e.ToString() | Should -Match "wgwg-wrwrhqwrhrh35h3h3"
$ErrorActionPreference = $origEA
}
It "Verify Validate Output Format As Text Explicitly Child Single Shell does not throw" {
{
"blahblah" | & $powershell -noprofile -out text -com { $input }
} | Should -Not -Throw
}
It "Verify Parsing Error Input Format Single Shell should throw exception" {
{ & $powershell -input blah -comm { $input } } | Should -Throw -ErrorId "IncorrectValueForFormatParameter"
}
}
Context "CommandLine" {
It "simple -args" {
& $powershell -noprofile { $args[0] } -args "hello world" | Should -Be "hello world"
}
It "array -args" {
& $powershell -noprofile { $args[0] } -args 1,(2,3) | Should -Be 1
(& $powershell -noprofile { $args[1] } -args 1,(2,3))[1] | Should -Be 3
}
foreach ($x in "--help", "-help", "-h", "-?", "--he", "-hel", "--HELP", "-hEl") {
It "Accepts '$x' as a parameter for help" {
& $powershell -noprofile $x | Where-Object { $_ -match "pwsh[.exe] -Help | -? | /?" } | Should -Not -BeNullOrEmpty
}
}
It "Should accept a Base64 encoded command" {
$commandString = "Get-Location"
$encodedCommand = [System.Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes($commandString))
$expected = & $powershell -noprofile -command $commandString
$actual = & $powershell -noprofile -EncodedCommand $encodedCommand
$actual | Should -Be $expected
}
It "-Version should return the engine version using: -version <value>" -TestCases @(
@{value = ""},
@{value = "2"},
@{value = "-command 1-1"}
) {
$currentVersion = "PowerShell " + $PSVersionTable.GitCommitId.ToString()
$observed = & $powershell -version $value 2>&1
$observed | Should -Be $currentVersion
$LASTEXITCODE | Should -Be 0
}
It "-File should be default parameter" {
Set-Content -Path $testdrive/test -Value "'hello'"
$observed = & $powershell -NoProfile $testdrive/test
$observed | Should -Be "hello"
}
It "-File accepts scripts with and without .ps1 extension: <Filename>" -TestCases @(
@{Filename="test.ps1"},
@{Filename="test"}
) {
param($Filename)
Set-Content -Path $testdrive/$Filename -Value "'hello'"
$observed = & $powershell -NoProfile -File $testdrive/$Filename
$observed | Should -Be "hello"
}
It "-File should pass additional arguments to script" {
Set-Content -Path $testdrive/script.ps1 -Value 'foreach($arg in $args){$arg}'
$observed = & $powershell -NoProfile $testdrive/script.ps1 foo bar
$observed.Count | Should -Be 2
$observed[0] | Should -Be "foo"
$observed[1] | Should -Be "bar"
}
It "-File should be able to pass bool string values as string to parameters: <BoolString>" -TestCases @(
@{BoolString = '$truE'},
@{BoolString = '$falSe'},
@{BoolString = 'trUe'},
@{BoolString = 'faLse'}
) {
param([string]$BoolString)
Set-Content -Path $testdrive/test.ps1 -Value 'param([string]$bool) $bool'
$observed = & $powershell -NoProfile -Nologo -File $testdrive/test.ps1 -Bool $BoolString
$observed | Should -Be $BoolString
}
It "-File should be able to pass bool string values as string to positional parameters: <BoolString>" -TestCases @(
@{BoolString = '$tRue'},
@{BoolString = '$falSe'},
@{BoolString = 'tRUe'},
@{BoolString = 'fALse'}
) {
param([string]$BoolString)
Set-Content -Path $testdrive/test.ps1 -Value 'param([string]$bool) $bool'
$observed = & $powershell -NoProfile -Nologo -File $testdrive/test.ps1 $BoolString
$observed | Should -BeExactly $BoolString
}
It "-File should be able to pass bool string values as bool to switches: <BoolString>" -TestCases @(
@{BoolString = '$tRue'; BoolValue = 'True'},
@{BoolString = '$faLse'; BoolValue = 'False'},
@{BoolString = 'tRue'; BoolValue = 'True'},
@{BoolString = 'fAlse'; BoolValue = 'False'}
) {
param([string]$BoolString, [string]$BoolValue)
Set-Content -Path $testdrive/test.ps1 -Value 'param([switch]$switch) $switch.IsPresent'
$observed = & $powershell -NoProfile -Nologo -File $testdrive/test.ps1 -switch:$BoolString
$observed | Should -Be $BoolValue
}
It "-File '<filename>' should return exit code from script" -TestCases @(
@{Filename = "test.ps1"},
@{Filename = "test"}
) {
param($Filename)
Set-Content -Path $testdrive/$Filename -Value 'exit 123'
& $powershell $testdrive/$Filename
$LASTEXITCODE | Should -Be 123
}
It "A single dash should be passed as an arg" {
$testScript = @'
[CmdletBinding()]param(
[string]$p1,
[string]$p2,
[Parameter(ValueFromPipeline)][string]$InputObject
)
process{
$input.replace($p1, $p2)
}
'@
$testFilePath = Join-Path $TestDrive "test.ps1"
Set-Content -Path $testFilePath -Value $testScript
$observed = echo hello | pwsh -noprofile $testFilePath e -
$observed | Should -BeExactly "h-llo"
}
It "Empty command should fail" {
pwsh -noprofile -c ''
$LASTEXITCODE | Should -Be 64
}
It "Whitespace command should succeed" {
pwsh -noprofile -c ' ' | Should -BeNullOrEmpty
$LASTEXITCODE | Should -Be 0
}
}
Context "-Login pwsh switch" {
BeforeAll {
$profilePath = "~/.profile"
$backupProfilePath = "profile.bak"
if (Test-Path $profilePath) {
Move-Item -Path $profilePath -Destination $backupProfilePath -Force
}
$envVarName = 'PSTEST_PROFILE_LOAD'
$guid = New-Guid
Set-Content -Force -Path $profilePath -Value @"
export $envVarName='$guid'
"@
}
AfterAll {
if (Test-Path $backupProfilePath) {
Move-Item -Path $backupProfilePath -Destination $profilePath -Force
}
}
It "Doesn't run the login profile when -Login not used" {
$result = & $powershell -Command "`$env:$envVarName"
$result | Should -BeNullOrEmpty
$LASTEXITCODE | Should -Be 0
}
It "Doesn't falsely recognise -Login when elsewhere in the invocation" {
$result = & $powershell -nop -c 'Write-Output "-login"'
$result | Should -BeExactly '-login'
$LASTEXITCODE | Should -Be 0
}
It "Doesn't falsely recognise -Login when used after -Command" {
$result = & $powershell -nop -c 'Write-Output' -Login
$result | Should -BeExactly '-Login'
$LASTEXITCODE | Should -Be 0
}
It "Accepts the <LoginSwitch> switch for -Login and behaves correctly" -TestCases @(
@{ LoginSwitch = '-l' }
@{ LoginSwitch = '-L' }
@{ LoginSwitch = '-login' }
@{ LoginSwitch = '-Login' }
@{ LoginSwitch = '-LOGIN' }
@{ LoginSwitch = '-log' }
) {
param($LoginSwitch)
$result = & $powershell $LoginSwitch -NoProfile -Command "`$env:$envVarName"
if ($IsWindows) {
$result | Should -BeNullOrEmpty
$LASTEXITCODE | Should -Be 0
return
}
$result | Should -BeExactly $guid
$LASTEXITCODE | Should -Be 0
}
It "Starts as a login shell with '-' prepended to name" -Skip:(-not (Get-Command -Name /bin/bash -ErrorAction Ignore)) {
$quoteEscapedPwsh = $powershell.Replace("'", "\'")
$pwshCommand = "`$env:$envVarName"
$bashCommand = "exec -a '-pwsh' '$quoteEscapedPwsh' -NoProfile -Command '`$env:$envVarName' ''"
$result = /bin/bash -c $bashCommand
$result | Should -BeExactly $guid
$LASTEXITCODE | Should -Be 0
}
}
Context "-SettingsFile Commandline switch" {
BeforeAll {
if ($IsWindows) {
$CustomSettingsFile = Join-Path -Path $TestDrive -ChildPath 'Powershell.test.json'
$DefaultExecutionPolicy = 'RemoteSigned'
}
}
BeforeEach {
if ($IsWindows) {
Set-Content -Path $CustomSettingsfile -Value "{`"Microsoft.PowerShell:ExecutionPolicy`":`"$DefaultExecutionPolicy`"}" -ErrorAction Stop
}
}
It "Verifies PowerShell reads from the custom -settingsFile" -skip:(!$IsWindows) {
$actualValue = & $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {(Get-ExecutionPolicy -Scope LocalMachine).ToString()}
$actualValue | Should -Be $DefaultExecutionPolicy
}
It "Verifies PowerShell writes to the custom -settingsFile" -skip:(!$IsWindows) {
$expectedValue = 'AllSigned'
& $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {Set-ExecutionPolicy -ExecutionPolicy AllSigned -Scope LocalMachine }
$content = (Get-Content -Path $CustomSettingsFile | ConvertFrom-Json)
$content.'Microsoft.PowerShell:ExecutionPolicy' | Should -Be $expectedValue
$actualValue = & $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {(Get-ExecutionPolicy -Scope LocalMachine).ToString()}
$actualValue | Should -Be $expectedValue
}
It "Verify PowerShell removes a setting from the custom -settingsFile" -skip:(!$IsWindows) {
& $powershell -NoProfile -SettingsFile $CustomSettingsFile -Command {Set-ExecutionPolicy -ExecutionPolicy Undefined -Scope LocalMachine }
$content = (Get-Content -Path $CustomSettingsFile | ConvertFrom-Json)
$content.'Microsoft.PowerShell:ExecutionPolicy' | Should -Be $null
}
}
Context "Pipe to/from powershell" {
$p = [PSCustomObject]@{X=10;Y=20}
It "xml input" {
$p | & $powershell -noprofile { $input | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } } | Should -Be 30
$p | & $powershell -noprofile -inputFormat xml { $input | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } } | Should -Be 30
}
It "text input" {
$p | & $powershell -noprofile -inputFormat text { -join ($input -replace "\s","") } | Should -Be "XY--1020"
}
It "xml output" {
& $powershell -noprofile { [PSCustomObject]@{X=10;Y=20} } | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } | Should -Be 30
& $powershell -noprofile -outputFormat xml { [PSCustomObject]@{X=10;Y=20} } | Foreach-Object {$a = 0} { $a += $_.X + $_.Y } { $a } | Should -Be 30
}
It "text output" {
-join (& $powershell -noprofile -outputFormat text { [PSCustomObject]@{X=10;Y=20} }) -replace "\s","" | Should -Be "XY--1020"
}
It "errors are in text if error is redirected, encoded command, non-interactive, and outputformat specified" {
$p = [Diagnostics.Process]::new()
$p.StartInfo.FileName = "pwsh"
$encoded = [Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes('$ErrorView="NormalView";throw "boom"'))
$p.StartInfo.Arguments = "-EncodedCommand $encoded -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -OutputFormat text"
$p.StartInfo.UseShellExecute = $false
$p.StartInfo.RedirectStandardError = $true
$p.Start() | Out-Null
$out = $p.StandardError.ReadToEnd()
$out | Should -Not -BeNullOrEmpty
$out.Split([Environment]::NewLine)[0] | Should -BeExactly "boom"
}
}
Context "Redirected standard output" {
It "Simple redirected output" {
$si = NewProcessStartInfo "-noprofile -c 1+1"
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
}
Context "Input redirected but not reading from stdin (not really interactive)" {
It "Redirected input w/ implicit -Command w/ -NonInteractive" {
$si = NewProcessStartInfo "-NonInteractive -noprofile -c 1+1" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
It "Redirected input w/ implicit -Command w/o -NonInteractive" {
$si = NewProcessStartInfo "-noprofile -c 1+1" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
It "Redirected input w/ explicit -Command w/ -NonInteractive" {
$si = NewProcessStartInfo "-NonInteractive -noprofile -Command 1+1" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
It "Redirected input w/ explicit -Command w/o -NonInteractive" {
$si = NewProcessStartInfo "-noprofile -Command 1+1" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
It "Redirected input w/ -File w/ -NonInteractive" {
'1+1' | Out-File -Encoding Ascii -FilePath TestDrive:test.ps1 -Force
$si = NewProcessStartInfo "-noprofile -NonInteractive -File $testDrive\test.ps1" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
It "Redirected input w/ -File w/o -NonInteractive" {
'1+1' | Out-File -Encoding Ascii -FilePath TestDrive:test.ps1 -Force
$si = NewProcessStartInfo "-noprofile -File $testDrive\test.ps1" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardOutput.ReadToEnd() | Should -Be 2
EnsureChildHasExited $process
}
}
Context "Redirected standard input for 'interactive' use" {
$nl = [Environment]::Newline
It "Interactive redirected input: <InteractiveSwitch>" -Pending:($IsWindows) -TestCases @(
@{InteractiveSwitch = ""}
@{InteractiveSwitch = " -IntERactive"}
@{InteractiveSwitch = " -i"}
) {
param($interactiveSwitch)
$si = NewProcessStartInfo "-noprofile -nologo$interactiveSwitch" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardInput.Write("`$function:prompt = { 'PS> ' }`n")
$null = $process.StandardOutput.ReadLine()
$process.StandardInput.Write("1+1`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> 1+1"
$process.StandardOutput.ReadLine() | Should -Be "2"
$process.StandardInput.Write("1+2`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> 1+2"
$process.StandardOutput.ReadLine() | Should -Be "3"
$process.StandardInput.Write("1+2`b3`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> 1+2`b3"
$process.StandardOutput.ReadLine() | Should -Be "4"
$process.StandardInput.Close()
$process.StandardOutput.ReadToEnd() | Should -Be "PS> "
EnsureChildHasExited $process
}
It "Interactive redirected input w/ initial command" -Pending:($IsWindows) {
$si = NewProcessStartInfo "-noprofile -noexit -c ""`$function:prompt = { 'PS> ' }""" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardInput.Write("1+1`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> 1+1"
$process.StandardOutput.ReadLine() | Should -Be "2"
$process.StandardInput.Write("1+2`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> 1+2"
$process.StandardOutput.ReadLine() | Should -Be "3"
$process.StandardInput.Close()
$process.StandardOutput.ReadToEnd() | Should -Be "PS> "
EnsureChildHasExited $process
}
It "Redirected input explicit prompting (-File -)" -Pending:($IsWindows) {
$si = NewProcessStartInfo "-noprofile -" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardInput.Write("`$function:prompt = { 'PS> ' }`n")
$null = $process.StandardOutput.ReadLine()
$process.StandardInput.Write("1+1`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> 1+1"
$process.StandardOutput.ReadLine() | Should -Be "2"
$process.StandardInput.Close()
$process.StandardOutput.ReadToEnd() | Should -Be "PS> "
EnsureChildHasExited $process
}
It "Redirected input no prompting (-Command -)" -Pending:($IsWindows) {
$si = NewProcessStartInfo "-noprofile -Command -" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardInput.Write("1+1`n")
$process.StandardOutput.ReadLine() | Should -Be "2"
$process.StandardInput.Write("if (1)`n{`n 42`n}`n`n")
$process.StandardOutput.ReadLine() | Should -Be "42"
$process.StandardInput.Write(@"
function foo
{
'in foo'
}
foo
"@)
$process.StandardOutput.ReadLine() | Should -Be "in foo"
$process.StandardInput.Write("`"a`bc`".Length`n")
$process.StandardOutput.ReadLine() | Should -Be "3"
$process.StandardInput.Write('22 + 22')
$process.StandardInput.Close()
$process.StandardOutput.ReadLine() | Should -Be "44"
EnsureChildHasExited $process
}
It "Redirected input w/ nested prompt" -Pending:($IsWindows) {
$si = NewProcessStartInfo "-noprofile -noexit -c ""`$function:prompt = { 'PS' + ('>'*(`$nestedPromptLevel+1)) + ' ' }""" -RedirectStdIn
$process = RunPowerShell $si
$process.StandardInput.Write("`$host.EnterNestedPrompt()`n")
$process.StandardOutput.ReadLine() | Should -Be "PS> `$host.EnterNestedPrompt()"
$process.StandardInput.Write("exit`n")
$process.StandardOutput.ReadLine() | Should -Be "PS>> exit"
$process.StandardInput.Close()
$process.StandardOutput.ReadToEnd() | Should -Be "PS> "
EnsureChildHasExited $process
}
}
Context "Exception handling" {
BeforeAll {
$classDefinition = @'
using System;
using System.Management.Automation;
using System.Management.Automation.Runspaces;
using System.Threading;
namespace StackTest {
public class StackDepthTest {
public static PowerShell ps;
public static int size = 512 * 1024;
public static void CauseError() {
Thread t = new Thread(RunPS, size);
t.Start();
t.Join();
}
public static void RunPS() {
InitialSessionState iss = InitialSessionState.CreateDefault2();
iss.ThreadOptions = PSThreadOptions.UseCurrentThread;
ps = PowerShell.Create(iss);
ps.AddScript("function recurse { recurse }; recurse").Invoke();
}
public static void GetPSError() {
if ( ps.Streams.Error.Count > 0) {
throw ps.Streams.Error[0].Exception.InnerException;
}
}
}
}
'@
$TestType = Add-Type -PassThru -TypeDefinition $classDefinition
}
It "Should handle a CallDepthOverflow" {
$TestType::CauseError()
{ $TestType::GetPSError() } | Should -Throw -ErrorId "CallDepthOverflow"
}
}
Context "Data, Config, and Cache locations" {
BeforeEach {
$XDG_CACHE_HOME = $env:XDG_CACHE_HOME
$XDG_DATA_HOME = $env:XDG_DATA_HOME
$XDG_CONFIG_HOME = $env:XDG_CONFIG_HOME
}
AfterEach {
$env:XDG_CACHE_HOME = $XDG_CACHE_HOME
$env:XDG_DATA_HOME = $XDG_DATA_HOME
$env:XDG_CONFIG_HOME = $XDG_CONFIG_HOME
}
It "Should start if Data, Config, and Cache location is not accessible" -skip:($IsWindows) {
$env:XDG_CACHE_HOME = "/dev/cpu"
$env:XDG_DATA_HOME = "/dev/cpu"
$env:XDG_CONFIG_HOME = "/dev/cpu"
$output = & $powershell -noprofile -Command { (get-command).count }
[int]$output | Should -BeGreaterThan 0
}
}
Context "HOME environment variable" {
It "Should start if HOME is not defined" -skip:($IsWindows) {
bash -c "unset HOME;$powershell -c '1+1'" | Should -BeExactly 2
}
}
Context "PATH environment variable" {
It "`$PSHOME should be in front so that pwsh.exe starts current running PowerShell" {
pwsh -v | Should -Match $psversiontable.GitCommitId
}
It "powershell starts if PATH is not set" -Skip:($IsWindows) {
bash -c "unset PATH;$powershell -c '1+1'" | Should -BeExactly 2
}
}
Context "Ambiguous arguments" {
It "Ambiguous argument '<testArg>' should return possible matches" -TestCases @(
@{testArg="-no";expectedMatches=@("-nologo","-noexit","-noprofile","-noninteractive")},
@{testArg="-format";expectedMatches=@("-inputformat","-outputformat")}
) {
param($testArg, $expectedMatches)
$output = & $powershell $testArg -File foo 2>&1
$LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter
$outString = [String]::Join(",", $output)
foreach ($expectedMatch in $expectedMatches)
{
$outString | Should -Match $expectedMatch
}
}
}
Context "-WorkingDirectory parameter" {
BeforeAll {
$folderName = (New-Guid).ToString() + " test";
New-Item -Path ~/$folderName -ItemType Directory
$ExitCodeBadCommandLineParameter = 64
}
AfterAll {
Remove-Item ~/$folderName -Force -ErrorAction SilentlyContinue
}
It "Can set working directory to '<value>'" -TestCases @(
@{ value = "~" ; expectedPath = $((Get-Item ~).FullName) },
@{ value = "~/$folderName"; expectedPath = $((Get-Item ~/$folderName).FullName) },
@{ value = "~\$folderName"; expectedPath = $((Get-Item ~\$folderName).FullName) }
) {
param($value, $expectedPath)
$output = & $powershell -NoProfile -WorkingDirectory "$value" -Command '(Get-Location).Path'
$output | Should -BeExactly $expectedPath
}
It "Can use '<parameter>' to set working directory" -TestCases @(
@{ parameter = '-workingdirectory' },
@{ parameter = '-wd' },
@{ parameter = '-wo' }
) {
param($parameter)
$output = & $powershell -NoProfile $parameter ~ -Command "`$pwd.Path"
$output | Should -BeExactly $((Get-Item ~).FullName)
}
It "Error case if -WorkingDirectory isn't given argument as last on command line" {
$output = & $powershell -WorkingDirectory 2>&1
$LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter
$output | Should -Not -BeNullOrEmpty
}
It "-WorkingDirectory should be processed before profiles" {
if (Test-Path $PROFILE) {
$currentProfile = Get-Content $PROFILE
}
else {
New-Item -ItemType File -Path $PROFILE -Force
}
@"
(Get-Location).Path
Set-Location $testdrive
"@ > $PROFILE
try {
$out = pwsh -workingdirectory ~ -c '(Get-Location).Path'
$out | Should -HaveCount 2
$out[0] | Should -BeExactly (Get-Item ~).FullName
$out[1] | Should -BeExactly "$testdrive"
}
finally {
if ($currentProfile) {
Set-Content $PROFILE -Value $currentProfile
}
else {
Remove-Item $PROFILE
}
}
}
}
Context "CustomPipeName startup tests" {
It "Should create pipe file if CustomPipeName is specified" {
$pipeName = [System.IO.Path]::GetRandomFileName()
$pipePath = Get-PipePath $pipeName
& $powershell -CustomPipeName $pipeName -Command "Test-Path '$pipePath'" | Should -BeTrue
}
It "Should throw if CustomPipeName is too long on Linux or macOS" -Skip:($IsWindows) {
$longPipeName = [string]::new("A", 200)
"`$pid" | & $powershell -CustomPipeName $longPipeName -c -
$LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter
}
}
Context "ApartmentState WPF tests" -Tag Slow {
It "WPF requires STA and will work" -Skip:(!$IsWindows -or [System.Management.Automation.Platform]::IsNanoServer) {
add-type -AssemblyName presentationframework
$xaml = [xml]@"
<Window
xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
x:Name="Window" Title="Initial Window" WindowStartupLocation = "CenterScreen"
Width = "400" Height = "300" ShowInTaskbar = "True">
</Window>
"@
$reader = [System.Xml.XmlNodeReader]::new($xaml)
$Window = [System.Windows.Markup.XamlReader]::Load($reader)
{ $Window.Show() } | Should -Not -Throw
$Window.Close()
}
}
Context "ApartmentState tests" {
It "Default apartment state for main thread is STA" -Skip:(!$IsWindows -or [System.Management.Automation.Platform]::IsNanoServer) {
[System.Threading.Thread]::CurrentThread.GetApartmentState() | Should -BeExactly "STA"
}
It "Default apartment state for new runspace is MTA" -Skip:(!$IsWindows) {
$ps = [powershell]::Create()
$ps.AddScript({[System.Threading.Thread]::CurrentThread.GetApartmentState()})
$ps.Invoke() | Should -BeExactly "MTA"
}
It "Should be able to set apartment state to: <apartment>" -Skip:(!$IsWindows -or [System.Management.Automation.Platform]::IsNanoServer) -TestCases @(
@{ apartment = "STA"; switch = "-sta" }
@{ apartment = "MTA"; switch = "-mta" }
) {
param ($apartment, $switch)
& $powershell $switch -noprofile -command "[System.Threading.Thread]::CurrentThread.GetApartmentState()" | Should -BeExactly $apartment
}
It "Should fail to set apartment state to: <switch>" -Skip:($IsWindows -and ![System.Management.Automation.Platform]::IsNanoServer) -TestCases @(
@{ switch = "-sta" }
@{ switch = "-mta" }
) {
param ($switch)
& $powershell $switch -noprofile -command exit
$LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter
}
}
}
Describe "WindowStyle argument" -Tag Feature {
BeforeAll {
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = !$IsWindows
if ($IsWindows)
{
$ExitCodeBadCommandLineParameter = 64
Add-Type -Name User32 -Namespace Test -MemberDefinition @"
public static WINDOWPLACEMENT GetPlacement(IntPtr hwnd)
{
WINDOWPLACEMENT placement = new WINDOWPLACEMENT();
placement.length = Marshal.SizeOf(placement);
GetWindowPlacement(hwnd, ref placement);
return placement;
}
[DllImport("user32.dll", SetLastError = true)]
[return: MarshalAs(UnmanagedType.Bool)]
public static extern bool GetWindowPlacement(
IntPtr hWnd, ref WINDOWPLACEMENT lpwndpl);
[Serializable]
[StructLayout(LayoutKind.Sequential)]
public struct WINDOWPLACEMENT
{
public int length;
public int flags;
public ShowWindowCommands showCmd;
public System.Drawing.Point ptMinPosition;
public System.Drawing.Point ptMaxPosition;
public System.Drawing.Rectangle rcNormalPosition;
}
public enum ShowWindowCommands : int
{
Hidden = 0,
Normal = 1,
Minimized = 2,
Maximized = 3,
}
"@
}
}
AfterAll {
$global:PSDefaultParameterValues = $defaultParamValues
}
It "-WindowStyle <WindowStyle> should work on Windows" -TestCases @(
@{WindowStyle="Normal"},
@{WindowStyle="Minimized"},
@{WindowStyle="Maximized"}
) {
param ($WindowStyle)
try {
$ps = Start-Process pwsh -ArgumentList "-WindowStyle $WindowStyle -noexit -interactive" -PassThru
$startTime = Get-Date
$showCmd = "Unknown"
while (((Get-Date) - $startTime).TotalSeconds -lt 10 -and $showCmd -ne $WindowStyle) {
Start-Sleep -Milliseconds 100
$showCmd = ([Test.User32]::GetPlacement($ps.MainWindowHandle)).showCmd
}
$showCmd | Should -BeExactly $WindowStyle
} finally {
$ps | Stop-Process -Force
}
}
It "Invalid -WindowStyle returns error" {
pwsh -WindowStyle invalid
$LASTEXITCODE | Should -Be $ExitCodeBadCommandLineParameter
}
}
Describe "Console host api tests" -Tag CI {
Context "String escape and control sequences" {
$esc = [char]0x1b
$csi = [char]0x9b
$testCases =
@{InputObject = "abc"; Length = 3; Name = "No escapes"},
@{InputObject = "${esc} [31mabc"; Length = 9; Name = "Malformed escape - extra space"},
@{InputObject = "${esc}abc"; Length = 4; Name = "Malformed escape - no csi"},
@{InputObject = "[31mabc"; Length = 7; Name = "Malformed escape - no escape"}
$testCases += if ($host.UI.SupportsVirtualTerminal)
{
@{InputObject = "$esc[31mabc"; Length = 3; Name = "Escape at start"}
@{InputObject = "$esc[31mabc$esc[0m"; Length = 3; Name = "Escape at start and end"}
@{InputObject = "${csi}31mabc"; Length = 3; Name = "C1 CSI at start"}
@{InputObject = "${csi}31mabc${csi}0m"; Length = 3; Name = "C1 CSI at start and end"}
@{InputObject = "abc${csi}m"; Length = 3; Name = "C1 CSI, no params"}
@{InputObject = "abc${csi}
@{InputObject = "abc${csi}
@{InputObject = "abc${csi}
@{InputObject = "abc${csi}
@{InputObject = "abc${esc}[0
@{InputObject = "${esc}[0;1
}
else
{
@{InputObject = "$esc[31mabc"; Length = 8; Name = "Escape at start - no virtual term support"}
@{InputObject = "$esc[31mabc$esc[0m"; Length = 12; Name = "Escape at start and end - no virtual term support"}
@{InputObject = "${csi}31mabc"; Length = 7; Name = "C1 CSI at start - no virtual term support"}
@{InputObject = "${csi}31mabc${csi}0m"; Length = 10; Name = "C1 CSI at start and end - no virtual term support"}
@{InputObject = "abc${csi}m"; Length = 5; Name = "C1 CSI, no params - no virtual term support"}
@{InputObject = "abc${csi}
@{InputObject = "abc${csi}
@{InputObject = "abc${csi}
@{InputObject = "abc${csi}
@{InputObject = "abc${esc}[0
@{InputObject = "${esc}[0;1
}
It "Should properly calculate buffer cell width of '<Name>'" -TestCases $testCases {
param($InputObject, $Length)
$host.UI.RawUI.LengthInBufferCells($InputObject) | Should -Be $Length
}
}
}
Describe "Pwsh exe resources tests" -Tag CI {
It "Resource strings are embedded in the executable" -Skip:(!$IsWindows) {
$pwsh = Get-Item -Path "$PSHOME\pwsh.exe"
$pwsh.VersionInfo.FileVersion | Should -Match $PSVersionTable.PSVersion.ToString().Split("-")[0]
$productVersion = $pwsh.VersionInfo.ProductVersion.Replace("-dirty","").Replace(" Commits: ","-").Replace(" SHA: ","-g")
if ($PSVersionTable.GitCommitId.Contains("-g")) {
$productVersion | Should -BeExactly $PSVersionTable.GitCommitId
} else {
$productVersion | Should -Match $PSVersionTable.GitCommitId
}
$pwsh.VersionInfo.ProductName | Should -BeExactly "PowerShell"
}
It "Manifest contains compatibility section" -Skip:(!$IsWindows) {
$osversion = [System.Environment]::OSVersion.Version
$psversiontable.os | Should -MatchExactly "$($osversion.Major).$($osversion.Minor)"
}
}
Describe 'Pwsh startup in directories that contain wild cards' -Tag CI {
BeforeAll {
$powershell = Join-Path -Path $PsHome -ChildPath "pwsh"
$dirnames = "[T]est","[Test","T][est","Test"
$testcases = @()
foreach ( $d in $dirnames ) {
$null = New-Item -type Directory -path "${TESTDRIVE}/$d"
$testcases += @{ Dirname = $d }
}
}
It "pwsh can startup in a directory named <dirname>" -testcases $testcases {
param ( $dirname )
try {
Push-Location -LiteralPath "${TESTDRIVE}/${dirname}"
$result = & $powershell -noprofile -c '(Get-Item .).Name'
$result | Should -BeExactly $dirname
}
finally {
Pop-Location
}
}
}
|
combined_dataset/train/non-malicious/2073.ps1
|
2073.ps1
|
Describe "Json.NET LINQ Parsing" -tags "CI" {
BeforeEach {
$jsonFile = Join-Path -Path (Join-Path $PSScriptRoot -ChildPath assets) -ChildPath TestJson.json
$jsonData = (Get-Content $jsonFile | Out-String)
$json = [Newtonsoft.Json.Linq.JObject]::Parse($jsonData)
}
It "Should return data via Item()" {
[string]$json.Item("Name") | Should -BeExactly "Zaphod Beeblebrox"
}
It "Should return data via []" {
[string]$json["Planet"] | Should -BeExactly "Betelgeuse"
}
It "Should return nested data via Item().Item()" {
[int]$json.Item("Appendages").Item("Heads") | Should -Be 2
}
It "Should return nested data via [][]" {
[int]$json["Appendages"]["Arms"] | Should -Be 3
}
It "Should return correct array count" {
$json["Achievements"].Count | Should -Be 4
}
It "Should return array data via [n]" {
[string]$json["Achievements"][3] | Should -BeExactly "One hoopy frood"
}
}
|
combined_dataset/train/non-malicious/sample_66_22.ps1
|
sample_66_22.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for AzureDataLakeGen1Datastore.
.Description
Create an in-memory object for AzureDataLakeGen1Datastore.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.AzureDataLakeGen1Datastore
.Link
https://learn.microsoft.com/powershell/module/Az.MachineLearningServices/new-AzMLWorkspaceDatastoreDataLakeGen1Object
#>
function New-AzMLWorkspaceDatastoreDataLakeGen1Object {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.AzureDataLakeGen1Datastore')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="Indicates which identity to use to authenticate service data access to customer's storage.")]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.ServiceDataAccessAuthIdentity])]
[Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Support.ServiceDataAccessAuthIdentity]
$ServiceDataAccessAuthIdentity,
[Parameter(Mandatory, HelpMessage="[Required] Azure Data Lake store name.")]
[string]
$StoreName,
[Parameter(Mandatory, HelpMessage="[Required] Account credentials.")]
[Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.IDatastoreCredentials]
$Credentials,
[Parameter(HelpMessage="The asset description text.")]
[string]
$Description,
[Parameter(HelpMessage="The asset property dictionary.")]
[Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.IResourceBaseProperties]
$Property,
[Parameter(HelpMessage="Tag dictionary. Tags can be added, removed, and updated.")]
[Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.IResourceBaseTags]
$Tag
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.AzureDataLakeGen1Datastore]::New()
$Object.DatastoreType = "AzureDataLakeGen1"
if ($PSBoundParameters.ContainsKey('ServiceDataAccessAuthIdentity')) {
$Object.ServiceDataAccessAuthIdentity = $ServiceDataAccessAuthIdentity
}
if ($PSBoundParameters.ContainsKey('StoreName')) {
$Object.StoreName = $StoreName
}
if ($PSBoundParameters.ContainsKey('Credentials')) {
$Object.Credentials = $Credentials
}
if ($PSBoundParameters.ContainsKey('Description')) {
$Object.Description = $Description
}
if ($PSBoundParameters.ContainsKey('Property')) {
$Object.Property = $Property
}
if ($PSBoundParameters.ContainsKey('Tag')) {
$Object.Tag = $Tag
}
return $Object
}
}
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAQFKS7wID4NNb+
# KKeJSN4RM6ZS93vN1dubBfQPZdsoZaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMpS
# aFBlekQ7fQRc8CR96SrQBBshWiZU2owIeCrSsXRBMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAQr235KLIEzTID+iyMvCqWxFYUAppl4wyB5HL
# PIByxvgDJXgQdu9x2tjvxyUl5KiJ2cM1Gnu/MFtGtFCCsRkbxMn5hBSCN0J/gNi3
# dChh4KqddN7IxdVRSJgvzOyfWlROlvYiVBUbYsUXOtXQUqp7oOn/yXJ8HwVv7MMo
# 99CdWQe+7+sdkqmFmd7q75KZk4NDxIt192qQbanYme9V6i3z3MYeuwEdr6mik/gW
# EthdrF7HGzgN1SSrGk7/NVAIGSSjppr6EpHMiQz4btUgs/c02T0yDFTP3Y4OmLqV
# QpTF3akZr93kOFUtpm3+e8NSTxY7ZmXh+wA1lW0ggu9K3H53+qGCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCVzM54vqiu0PVIzE9uYfwhoZkjouOAVilN
# 6jFSq5Wa+wIGZpe3Nw7VGBMyMDI0MDczMTA3MDA0Mi43MDNaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHajtXJ
# WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ
# Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC
# lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf
# 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D
# M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k
# UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl
# PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA
# 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY
# mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ
# BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24
# 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl
# oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca
# HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW
# ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50
# WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q
# /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C
# /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ
# 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj
# MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix
# 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6
# 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P
# P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/
# wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOpUAEQwIhgPMjAyNDA3MzEwODEzNTZaGA8yMDI0MDgw
# MTA4MTM1NlowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6lQARAIBADAGAgEAAgFC
# MAcCAQACAhMzMAoCBQDqVVHEAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# HKk1ACP5BnIOHhLcJLV+MgdaDPygzoG9rCqcWaXTIxvIuN27smq+5+PYb1RV5p57
# DnlLOp2HW4qEoqwUGu3krV78VzqeRd6csEzR3xDvkH8Jn/zaV4fP3RpLLon9p0Rj
# 94R2abRDw8cjnLcyGFiB3lFoCFFVqkCn1zz8jsqAkQAxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQABAAAB
# 2jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCCisJxVBP0b/BjrJj5WMJIcqeHX9gq0wSaPvE4mrQU
# ezCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICKlo2liwO+epN73kOPULT3T
# bQjmWOJutb+d0gI7GD3GMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowIgQgDWJelj1571clkyiZPYKcyeSx
# /kiBMDIAd5c0xTEnplowDQYJKoZIhvcNAQELBQAEggIAAAVex6XVQUJ8dTP9N6+l
# wNOLASaAVLXISdzKjwomBXnsnOM1A3E9anyLpdrmMAwWOw6a74uwhTgzQf272ym6
# iCsdQ2qpW/2FaodcGaPBd8LwjXKbjeRKEysROPPhHpANTVR0cbLXwB+TUihB/teT
# CwvXhF1I5l/AYdG920m5Z3nYyygsuJoBOtjxXijqIv3B7gq7CeNX7jYCJlhDFZlI
# YU3Yf9cVP895CMAY+TcZNx7IhGnkJJxnQxjLGEEAV1Ic3egXbTYkSfI7Gmntx2/J
# wAVMCvT07RTsTWguOc+neUQVJdmdDokZhwxeinvJ7qezc86uIf1UnRQ8pf4CylG/
# J8Y/FeXWDxGqH7zRuEOBBaYJqv+WgQlVPAs44N3N8wrIfDh5oXtcczNlEN5HzTnE
# KmRbQUkqEKpiW56uWo/qHQMdOOP6XZf7yvDpiSnoUYtNb+Ol7fsER/l569N4ImK9
# i5g7aVU3Hwqde+WLnQyOWpoElCzQ9mwydoenKH8k/aqCxNcQx6wkb6EeCYoppPVW
# gPomrpg77Qf7j1Lxbv8LLWaX30AO+bpp/lJWpqj4hY0vORHj0nXztI0wMOiEd++I
# e+mGuKRZAOW/mIZWgqcIIGOeNFjNXby79S675HsKdwrQuFWQCcv1DbxNeXMcSw5E
# 18Px7P1QTCbkQjHA7LDol+k=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_28_75.ps1
|
sample_28_75.ps1
|
param(
[Parameter(HelpMessage="Creates a tunnel")]
[switch]$Tunnel = $False,
[Parameter(Mandatory=$True,HelpMessage="Last 4 digits of the GCRAZGDL host you wish to connect to")]
[string]$Num,
[Parameter(Mandatory=$True,HelpMessage="Your Alias in type DOMAIN.alias")]
[string]$Alias,
[Parameter(Mandatory=$True,HelpMessage="Port to open tunnel")]
[string]$Port
)
$ALIAS = $Alias
$KEYPATH = $HOME + "\.ssh\id_ed25519"
$EX1 = "7ccdb8ae-4daf-4f0f-8019-e80665eb00d2"
$EX2 = "46da6261-2167-4e71-8b0d-f4a45215ce61"
$EX3 = "992cb282-dd69-41bf-8fcc-cc8801d28b58"
$BAST1 = "GPU-Sandbox-VNET-bastion"
$BAST2 = "GPU-Sandbox2-VNET-bastion"
$BAST3 = "GPU-Sandbox3-VNET-bastion"
$RG1 = "GPU-SANDBOX"
$RG2 = "GPU-SANDBOX2"
$RG3 = "GPU-SANDBOX3"
$SANDBOXNUM=$Num
if (!(get-command az 2>$null)) {
write-host "azure-cli not installed -- https://learn.microsoft.com/en-us/cli/azure/install-azure-cli-linux?pivots=apt"
Exit 2
}
if (((az extension list|ConvertFrom-Json).name|sls "ssh"|measure-object).count -lt 1) {
write-host "az ssh extension not installed. Please run the following to install."
write-host "az extension add --name ssh"
Exit 3
}
if (!(Test-Path -Path $KEYPATH)) {
Write-Host "Keypath not found $KEYPATH"
Exit 4
}
if ($Tunnel) {
$BASTIONCOMMAND = "tunnel"
$BASTIONPARAMS = "--resource-port 22 --port $Port"
} else {
$BASTIONCOMMAND = "ssh"
$BASTIONPARAMS = "--auth-type ssh-key --username $ALIAS --ssh-key $KEYPATH"
}
if ($SANDBOXNUM -like '0*'){
az account set --subscription $EX1
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX1 --name $BAST1 --resource-group $RG1 --target-resource-id /subscriptions/$EX1/resourceGroups/$RG1/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
if ($SANDBOXNUM -ge 1000 -and $SANDBOXNUM -le 1115) {
az account set --subscription $EX2
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST1 --resource-group $RG1 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG1/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
if ($SANDBOXNUM -ge 1116 -and $SANDBOXNUM -le 1215) {
az account set --subscription $EX2
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST2 --resource-group $RG2 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG2/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
if ($SANDBOXNUM -ge 1400 -and $SANDBOXNUM -le 1767) {
az account set --subscription $EX2
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST3 --resource-group $RG3 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG3/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
if ($SANDBOXNUM -ge 3001 -and $SANDBOXNUM -le 3068) {
az account set --subscription $EX2
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST3 --resource-group $RG3 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG3/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
if ($SANDBOXNUM -ge 4001 -and $SANDBOXNUM -le 4020) {
az account set --subscription $EX2
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX2 --name $BAST3 --resource-group $RG3 --target-resource-id /subscriptions/$EX2/resourceGroups/$RG3/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
if ($SANDBOXNUM -ge 2000 -and $SANDBOXNUM -le 2999) {
az account set --subscription $EX3
$COMMAND = "az network bastion $BASTIONCOMMAND --subscription $EX3 --name $BAST1 --resource-group $RG1 --target-resource-id /subscriptions/$EX3/resourceGroups/$RG1/providers/Microsoft.Compute/virtualMachines/GCRAZGDL$SANDBOXNUM $BASTIONPARAMS"
Write-Output $COMMAND
Invoke-Expression $COMMAND
}
Write-Host "Done with code $LASTEXITCODE"
Exit $LASTEXITCODE
|
combined_dataset/train/non-malicious/sample_4_38.ps1
|
sample_4_38.ps1
|
# Copyright ?008, Microsoft Corporation. All rights reserved.
if($debug -eq $true){[void]$shell.popup("Run TS_Virtualization.ps1")}
Import-LocalizedData -BindingVariable VirtualizationStrings
Write-DiagProgress -Activity $VirtualizationStrings.ID_Virtualization -Status $VirtualizationStrings.ID_VirtualizationObtaining
#$CommandToExecute = "cscript.exe GetVirtualEnv.VBS /GenerateScriptedDiagAlertXML"
#$OutputFiles = $Computername + "_Virtualization.*"
#RunCmD -commandToRun $CommandToExecute -sectionDescription $VirtualizationStrings.ID_Virtualization -filesToCollect $OutputFiles -fileDescription $VirtualizationStrings.ID_VirtualizationOutput
## Andret: Decomissioning alert for virtualization as this will be more and more common moving forward
#$VirtualizationAlertXMLFileName = $Computername + "_VirtualizationAlerts.XML"
#if (test-path $VirtualizationAlertXMLFileName) {
# Update-DiagRootCause -id RC_Virtualization -Detected $true
#}
#
$VirtualizationInfo = new-object PSObject
$Script:MicrosoftVirtualizationEnv = $false
$Script:VMWareVirtualizationEnv = $false
$Script:VirtualMachineSoftware = ""
$Script:VMIntegrationsInstalled = $false
$Script:VMToolsInstalled = $false
Function DetectMSVirtualizationSoftware()
{
$VMBugRegPath = "HKLM:SYSTEM\CurrentControlSet\Services\vmbus"
if(Test-Path $VMBugRegPath)
{
$VMBugStart = (Get-ItemProperty -Path $VMBugRegPath).Start
if(($VMBugStart -eq 0) -or ($VMBugStart -eq 1))
{
$Script:VirtualMachineSoftware = "Hyper-V"
$VMService = Get-CimInstance -query "Select Name from Win32_Service where Name = 'vmickvpexchange'"
if($null -ne $VMService)
{
$Script:VMIntegrationsInstalled = $true
}
}
else
{
$Script:VirtualMachineSoftware = "Virtual Server"
Get-CimInstance -query "Select Name, Started from Win32_Service where Name = 'VPCMap'" |
ForEach-Object {
if($_.Started -eq $true)
{
$Script:VirtualMachineSoftware = "Virtual PC"
}
else
{
$Script:VirtualMachineSoftware = "Virtual Server"
}
}
$VMService = Get-CimInstance -query "Select Name, Started from Win32_Service where Name = '1-vmsrvc'"
if($null -ne $VMService)
{
$Script:VMIntegrationsInstalled = $true
}
}
}
}
Function DetectVMWareVirtualizationSoftware()
{
$Script:VirtualMachineSoftware = "VMWare"
$VMService = Get-CimInstance -query "Select Name, Started from Win32_Service where Name = 'VMTools'"
if($null -ne $VMService)
{
$Script:VMToolsInstalled = $true
}
}
Function DetectVirtualizationEnv()
{
$Manufacturer = (Get-CimInstance -class 'Win32_ComputerSystem').Manufacturer
if($Manufacturer.Contains("Microsoft"))
{
$Script:MicrosoftVirtualizationEnv = $true
DetectMSVirtualizationSoftware
}
elseif($Manufacturer.Contains("VMware"))
{
$Script:VMWareVirtualizationEnv = $true
DetectVMWareVirtualizationSoftware
}
}
DetectVirtualizationEnv
#region Rule 5850 Detect Azure Virtual Machine
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_VirtualMachineInAzureCheck"
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
#Add your logic here to specify on which environments this rule will appy
return ($Script:MicrosoftVirtualizationEnv -and
((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or # Windows Server 2008 R2
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or # Windows 8
($OSVersion.Major -eq 10))) # Win10
}
Function Confirm-AzureVM
{
$detected = $False
#[void][System.Reflection.Assembly]::LoadWithPartialName('System.Serviceprocess')
#$vmbus = [System.ServiceProcess.ServiceController]::GetDevices() | where {$_.Name -eq 'vmbus'}
$VmbusRegistryKeysPath = "Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vmbus"
if(Test-Path $VmbusRegistryKeysPath)
{
$vmbus = Get-Service vmbus -ErrorAction SilentlyContinue
If($vmbus.Status -eq 'Running')
{
Add-Type -Path .\AzureDHCPClient.cs
$client = New-Object Microsoft.WindowsAzure.Internal.AzureDHCPClient
try {
[Microsoft.WindowsAzure.Internal.AzureDHCPClient]::GetDhcpInterfaces() | ForEach-Object {
$val = $client.DhcpRequestParams($_.Id, 245)
if($val -And $val.Length -eq 4) {
$detected = $True
}
}
$client.Dispose()
}
catch {
$client.Dispose()
}
}
}
return $detected
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
if (Confirm-AzureVM)
{
$RootCauseDetected = $true
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Add-GenericMessage -Id $RootCauseName
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
#endregion
if($Script:MicrosoftVirtualizationEnv -or $Script:VMWareVirtualizationEnv)
{
add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Virtual Machine Software" -value $Script:VirtualMachineSoftware
if($Script:MicrosoftVirtualizationEnv)
{
add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Integration Services Installed" -value $Script:VMIntegrationsInstalled
if($RootCauseDetected)
{
add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Windows Azure" -value $true
}
else
{
add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "Windows Azure" -value $false
}
}
elseif($Script:VMWareVirtualizationEnv)
{
add-member -inputobject $VirtualizationInfo -membertype noteproperty -name "VMTools installed" -value $Script:VMToolsInstalled
}
$VirtualizationInfo | ConvertTo-Xml2 | update-diagreport -id ("zzz_Virtualization Report") -name ("Virtual Environment Information") -verbosity informational
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDepAhNJk+viUZO
# l+ysWIgWx7ydxY/N+prqIYxIYnaRJaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGEM
# 35s+TctsSx50y0MMHVGUw9Zl5ryJb2j/ehjIurZXMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAAuvxvK092vPrjfj8sCthPx+apUtS1lzaPFGA
# SURQVfuMEd/I5lB0g4V21lIMH+sc6+9gYyq/4oPXBeuzKgaYTMZvc530dH86jEQf
# jDdG2VCtp3j4ul2DYqZxlvu0u7O9gQDll28YiIplF4jpbP6g6Q43bkyXR8/N0l0u
# tUujz/FoqYfYu2NjfcjM4OyFCGlxZut4Vtjj2iqN7Q5mFDyjh2FoQtj+MpcUGYAg
# OVHQQXGRTbajh75cbuJezSZM243iyxYiAuSMT2WC3BHpX26CEv+ANpLRbGBzAps3
# jG8mIeiQP0haT8XUqhGVF8MnwlfGMENBOWPbbP8Q7jeHyvgeW6GCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB31kQVZMUJvSCOln8RTe9vSu5H+yZLngp1
# 221S3TkvjgIGZus6esm5GBMyMDI0MTAyODExNDA0MS4zNTJaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9n
# jXWrpPGxAAEAAAH5MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# tD1MH3yAHWHNVslC+CBTj/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BO
# JUiYg7fDJ2AxGVGyovUtgGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONW
# y6lOyGZwZpxfV2EX4qAh6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2
# ps8Nc1xr41N8Qi3KVJLYX0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2
# KDJ2sQRFFF/egCxKgogdF3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN
# 8hiMc8Z47RRJuIWCOeyIJ1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57
# ITXsD9DPOob8tjtsefPcQJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5D
# HM4ovCmD3lifgYnzjOry4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby
# 44kGVK8MzY9s32Dy1THnJg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRV
# Ux2G/0Tr7Dk3fpCU8u+5olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1
# HvNIBpSNNuTBQk7FBvu+Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSJ7aO6nJXJI9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAZiAJgFbkf7jfhx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG
# 2CcdoXaq7VgpVkNf1uvIhrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0kt
# H+EkEuGXs9DBLyt71iutVkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2
# q5TjmrgEKyPe3TApAio8cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/ui
# zP1NuHSxF/V1ks/2tCEoriicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+U
# d9Va3Iw9Bs4ccrkgBjLtg3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y
# 6Si3AaNINt/pOMKU6l4AW0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qI
# VBZJ2XQpnhEuRbh+AgpmRn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhnc
# FetJ0ZK36wxAa3FiPgBebRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B
# 0s8RiFBMf/W7+O7EPZ+wMH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojz
# uCEahSAcq86yjwQeTPN9YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAK
# mIcdwhqgZvyp6UaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0
# MTAyOTA4MjgwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEA
# AgIIXjAHAgEAAgITcTAKAgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQAZdq+OU23EaUchwQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2Dewx
# IzsFz1t8ELbs/7V+b+lLZ25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh8
# 4y9kT8c5HUYL5kF2NJiqgHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e7
# 2AvfpKtUZO94WfnvRVAu4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpU
# qnrIVhOqTZE0I5GJiVJydAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGE
# u6OFzH+g6bBiUu/BsmlodM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgCQ3Y5O1ylBOYJyP7LkZIQvevtOe7egKSXPh1bV+0KvcwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5S
# bGLYEDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# +R9njXWrpPGxAAEAAAH5MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkH
# B7rdMA0GCSqGSIb3DQEBCwUABIICAEebm+T4SRX0p7ROMn6E6Xp+b3RwtpQhOzJD
# 4O/OE9/1g2yZLqI9WD9z+J3TeVT1xjiMQY+aSyck78wPqRqq1A/EvKnlaw2tfvW/
# XZ/eNZM34O6opPW57cycbPlDL5Ai8uAEqrfEBAAirLqrczp22HJo/9KZU4Kjwle6
# lNAOu4LqJnocqyJawuApTsG9FAV3ld7E4V4GYJn3JsyDkV0T/w/iSyvbswWqeV+E
# U+qB/3lK/lCEcIcFjVZtL3q2ZjCIyI5MNJBpMOZTe62NJPrMZPm+9j61EDjlRSRb
# bW+hu8r2cXw91DvELnnJcLSdHQGUWj23lbZvaChXr1lfnv3A8zbX+dF3nNAGHqd0
# upt9wNX8if0qHseci7WrjRh6kxC3T/titdR2uIdeZ2+EEuLrWP49rse9o05uM74f
# hmEUNJi/LqhOCIcPizuRAV3lfZ5rXsJSiQxMqQrCO9SbyHgWidViNhTuNWev++ry
# 04mP1WbHMP6GqfW5fTR7j1tmLBIFDsbbBwto+Zz0Vwh2CXdt+CSaBSvG3kir8MOg
# zx4hQd5EweOfk3Qlf0HMxD8UgY4jc23QmVm3Sqt4kjjg35H1Qz0Yz+msrZBFxKis
# vxn3CJdxzdXgU7G6tEmyhSg862pV4IVEacy2bTQTHqNy13gxKn+asY7ggKqQ3eL/
# PF5SEaTk
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_7_97.ps1
|
sample_7_97.ps1
|
ConvertFrom-StringData @'
id_descriptors=Collecting Windows Update service descriptors
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC0vOKlb1UTpE0M
# Z+j9Lq+3PpJN3jGS8qNbSGJOr4XdCaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN2jqHU4DeKl/P5lzWo9P2yP
# zIznDyfdAwGnHrGibNHnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAT+BFjFDDkJhLjd5sh3R/f+7K/5iLZ/oE+i7lrb/3SfZw/szdlt7OcrNm
# 4sGRvXWl/Tbt3us3ZRXK826T7vfHOEzWC7GXWM9dAu7Ua51+GgxdxyXmjDayfKZ7
# Jvs1Mu85iDKEEM/jx6itjunczhvgg1XP98r5Dg8teoy/LKk6qM1EcWtdqH0XzLus
# opBk86+k1pITdmEU3pseMYnDBB+Pq3BcXbKQ/9FI4b8O/prOnRCj3ayQ7A9fQOPj
# wW33fpUnxd4j4DvCDNCvZ2/j5mTDZDoT352ydM5Ra1cqMdUv4RHTjfoOsG8BueLQ
# K6snTHj19yVIyQSv6qf4dUdNaNIeOaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAZKPCSY53AKXN9GsxngJ0vrT70/1u3OmUUTuLk91C1GQIGZxqDjw9t
# GBMyMDI0MTAyODExNDA0Mi4yMTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smfDzAiGA8yMDI0MTAyODA1MjYz
# OVoYDzIwMjQxMDI5MDUyNjM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZ8P
# AgEAMAoCAQACAiYaAgH/MAcCAQACAhM/MAoCBQDqyvCPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAEy6prjM5nn6m2wPFDV2l7yQLdf34GsB8soqvapDL1eR
# rPtWitnTEp7vhoVzRz9hYUjbNVz41gTK6QLMwnryax54lVtv7R+ycSEZGir7KV1C
# Tjp2r0eaAAM8e5NelaIbG0kXU0fBms51FkcYQirRI4P+80FYKXx5iFqcvs69kQXm
# xZfJwGOYkJtgvPMgNqBd0cL6UDTHo3N5w5H9YuolMSwEh/jYgYnNOS/PJdyHj/Fy
# fhCJzSN42Eqw1jMZIaoWpXv13Pm5X9rEhWE15EJiSSQFig7Ouj24B3wbU2l1uyvo
# 5g+dLcWpqjjoZU4fXoFOEyXyKBH7s1NAAm4GzqtlwfwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB
# 8DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAGqishU9utJlBUlH9z3LmXX4YC6gFiTY79ksDfJ8Uy
# VjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74Q
# FAiS6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQgR3SpcmzGLGE6OkDlhx79aiWy
# SoOiH8fVebPajToioVAwDQYJKoZIhvcNAQELBQAEggIADpRmbdrTcM6iFeD3WD6Y
# /L+e9jBzrHf82slMLx5E/REaF39S+cpltOtUKzMIL97wEHcWMIqpIracZHp1KW41
# 8GOuQxtN9wdgn7mBTbosjGsI3qDTk9Mc+6xsfay37fqS4IyDXKEBG9TJV6/2Utp1
# B30621de6uy1v+WyVdbPypkjGNT4Dsma/fe2AEHbF5qLkMwBsO9gqYNgIvLdq0CA
# /GZ1JPRnHzFY4hE8825aOcmGb6727TTgMqmogYJBJD9qvV3MqXXZnzhQzb0OdOYn
# xeFPRcKmziiIDiIbTGXbQkI/UCZxgXjnyNcCudcIFVp+vRlN5I0fEEMRU2KtxjLy
# Mbv7To+DqBerPxZroAIxQj89jV+bJNuvV17Bux7LC0NxwpcegrRpoiX4nNq6EPkM
# /El3Fg/ZcxBckM2S42wbTQR+U0KMjwwVtUXqo6Eweu5RrgbGMgD190MkZuBMzFc8
# UsRYEmzbxglXC+LdeRL4LFhha61+NnsTa2tQYC/fjOA9JsMdBDE5JBSFSi917Sph
# NuUHJfK+JqsEhUGEd8ScfY3ZMmmLg7D5rLd7T2ZhjGwXe1mWwfzShwn3DPQbSbvI
# /xiuZk/WCYHFWbDwuLFzN42hHTMMiYK8qb4hHNGjqOeWMNwKGPst365gEU3U9ppE
# yHBGQPvzjkYr3a17mz+F7AA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_18_23.ps1
|
sample_18_23.ps1
|
##------------------------------------------------------------------
## <copyright file="GMATenantJson.psm1" company="Microsoft">
## Copyright (C) Microsoft. All rights reserved.
## </copyright>
##------------------------------------------------------------------
$azureStackNugetPath = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Solution.Deploy.CloudDeployment"
Import-Module (Join-Path $azureStackNugetPath "content\roles\common\RoleHelpers.psm1") -Verbose:$false
class GMATenantJson
{
<#
.SYNOPSIS
Creates multi tenant json configs for setting up the Observability (Telemetry, Diagnostics, Health, Security and Metrics) pipeline.
.EXAMPLE
[GMATenantJson]::GenerateMultiTenantJsonConfigsForObservability($Parameters)
.PARAMETER Parameters
The ECE role parameters for this interface.
#>
static GenerateMultiTenantJsonConfigsForObservability([CloudEngine.Configurations.EceInterfaceParameters] $Parameters)
{
$ErrorActionPreference = "Stop"
## For classes in PS, we need to use the call stack to get the current executing function.
$functionName = $(Get-PSCallStack)[0].FunctionName
$gmaNugetName = "Microsoft.AzureStack.Observability.GenevaMonitoringAgent"
$gmaPackageContentPath = Join-Path $(Get-ASArtifactPath -NugetName $gmaNugetName) -ChildPath "content"
Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -DisableNameChecking
## Get PhysicalDriveLetter to place GMA cache folder
$PhysicalDriveLetter = $Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.PhysicalDriveLetter
$volumeName = "${PhysicalDriveLetter}:"
## GMA cache folder path
$gmaCacheFolderName = $Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.GMACacheFolderName
$gmaCacheFolderPath = Join-Path -Path $volumeName -ChildPath $gmaCacheFolderName
Trace-Execution "$functionName : GMACacheFolderPath - $gmaCacheFolderPath"
# Get StreamingDataClient value
$streamingDataClient =[System.Convert]::ToBoolean($Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.StreamingDataClient)
Trace-Execution "$functionName : StreamingDataClient - $streamingDataClient"
$gcsRegionName = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.RegistrationRegion
Trace-Execution "$functionName : GCSRegionName - $gcsRegionName"
## Determine GcsEnvironment
$gcsEnvironment = "Prod" ## default environment
## Check if the reg key created for CI exists or not, if yes then change the GCSEnvironment to point to PPE.
if (Test-RegKeyExists -Path "HKLM:\Software\Microsoft\SQMClient\" -Name "IsCIEnv") {
$gcsEnvironment = "Ppe"
}
Trace-Execution "$functionName : GCSEnvironment - $gcsEnvironment"
## Fetch the clusterName
$managementClusterName = $Parameters.Roles["Cluster"].PublicConfiguration.Clusters.Node | `
Where-Object { $_.IsManagementCluster -ieq "true"} | `
Select-Object -ExpandProperty Name
if(-not $managementClusterName) {
$errorMessage = "$functionName : ManagementClusterName not found in Cloud config."
Trace-Error $errorMessage
throw $errorMessage
}
Trace-Execution "$functionName : ManagementClusterName - $managementClusterName"
$assemblyVersion = $Parameters.Roles["GMATenantJson"].PublicConfiguration.PublicInfo.Version
Trace-Execution "$functionName : AssemblyVersion - $assemblyVersion"
Set-GlobalEnvironmentVariable -EnvVariableName "ASSEMBLY_BUILD_VERSION" -EnvVariableValue $assemblyVersion
Trace-Execution "$functionName : ASSEMBLY_BUILD_VERSION Environment variable set to - $assemblyVersion"
Set-GlobalEnvironmentVariable -EnvVariableName "CLUSTER_NAME" -EnvVariableValue $managementClusterName
Trace-Execution "$functionName : CLUSTER_NAME Environment variable set to - $env:CLUSTER_NAME"
# Get StampID, NodeId, and DeviceArmResourceUri
$azureStackHciDetails = Get-AzureStackHCI
$deviceArmResourceUri = $azureStackHciDetails.AzureResourceUri
$StampId = $azureStackHciDetails.AzureResourceName
$nodeId = $StampId + "-" + (Get-ClusterNode(hostname)).Id
Set-GlobalEnvironmentVariable -EnvVariableName "HCI_RESOURCE_URI" -EnvVariableValue $deviceArmResourceUri
Trace-Execution "$functionName : HCI_RESOURCE_URI Environment variable set to - $env:HCI_RESOURCE_URI"
# Disable telemetry if either diagnostic level is Off or StreamingDataClient value is False.
$diagnosticLevel = [System.Convert]::ToString($azureStackHciDetails.DiagnosticLevel).ToLower()
$telemetryEnabled = $true
if ($diagnosticLevel -eq "off" -or $StreamingDataClient -eq $false) {
$telemetryEnabled = $false
}
try {
Trace-Execution "$functionName : Observability tasks will now run on node $($env:COMPUTERNAME)."
$envInfoFilePath = "$GmaPackageContentPath\EnvironmentInfo.json"
$tenantInfoContent = Get-Content $envInfoFilePath -Raw | ConvertFrom-Json
$envInfo = $tenantInfoContent.$GcsEnvironment
$configTypes = @("Telemetry", "Diagnostics", "Health", "Security", "Metrics")
foreach($configType in $configTypes) {
## Based on the config type, initialize dynamic variables.
$envInfoFilePath = "$GmaPackageContentPath\EnvironmentInfo.json"
$tenantInfoContent = Get-Content $envInfoFilePath -Raw | ConvertFrom-Json
$envInfo = $tenantInfoContent.$GcsEnvironment
$arcAgentResourceInfo = Get-ArcAgentResourceInfo
$arcAgentResourceId = Get-ArcAgentResourceId -ArcAgentInfo $arcAgentResourceInfo
$gcsEndpoint = $envInfo.EndPoint
$gcsAccount = $envInfo.Account
$gcsNameSpace = $envInfo.Namespaces.$configType
if ($configType -eq "Metrics")
{
$gcsNameSpace = Get-MetricsNamespaceRegionMapping -MetricsNamespace $envInfo.Namespaces.$configType -Region $arcAgentResourceInfo.Location
$metricsShoeboxAccount = Get-MetricsShoeboxAccountName -ShoeboxAccountPrefix $envInfo.ShoeboxAccountPrefix -MetricsNamespace $envInfo.Namespaces.$configType -Region $arcAgentResourceInfo.Location
}
$genevaConfigVersion = $envInfo.ConfigVersion
$jsonConfigFileName = "AEO" + $configType + ".json"
$jsonDropLocation = Join-Path -Path $GMACacheFolderPath -ChildPath "JsonDropLocation"
$tenantJsonFilePath = Join-Path -Path $jsonDropLocation -ChildPath $jsonConfigFileName
$cacheLocalPath = Join-Path -Path $GMACacheFolderPath -ChildPath $($configType + "Cache")
Trace-Execution "$functionName : Multi-Tenant Json will be created for Observability-$configType under $gcsRegionName region and $gcsEnvironment environment on $($env:COMPUTERNAME)."
Set-TenantConfigRegistryKeys `
-ConfigType $configType `
-Version "1.0" `
-GcsAuthIdType "AuthMSIToken" `
-GcsEnvironment $gcsEndpoint `
-GcsGenevaAccount $gcsAccount `
-GcsNamespace $gcsNameSpace `
-GcsRegion $gcsRegionName `
-GenevaConfigVersion $genevaConfigVersion `
-LocalPath $cacheLocalPath `
-DisableUpdate "true" `
-DisableCustomImds "true" `
-MONITORING_AEO_REGION $gcsRegionName `
-MONITORING_AEO_DEVICE_ARM_RESOURCE_URI $deviceArmResourceUri `
-MONITORING_AEO_STAMPID $StampId `
-MONITORING_AEO_CLUSTER_NAME $managementClusterName `
-MONITORING_AEO_OSBUILD (Get-OSBuildVersion) `
-MONITORING_AEO_ASSEMBLYBUILD $assemblyVersion `
-MONITORING_AEO_NODEID $nodeId `
-MONITORING_AEO_NODE_ARC_RESOURCE_URI $arcAgentResourceId `
-MONITORING_AEO_CLUSTER_NODE_NAME "%COMPUTERNAME%"
# Conditionally create the security tenant json to enable/disable secuirty MA namespace.
# In Deployment it is always disabled. In Scale-Out and Update it can be either enabled or disabled.
if ($configType -ieq "Security")
{
if (-not $Parameters.Roles.Contains("SyslogForwarder"))
{
Trace-Execution "Will not create new Security tenant config. SyslogForwarder role configuration not found."
continue
}
$syslogForwarderRole = $Parameters.Roles["SyslogForwarder"].PublicConfiguration
try
{
$syslogEnabled = [System.Convert]::ToBoolean($syslogForwarderRole.PublicInfo.SyslogEnabled)
}
catch
{
Trace-Execution "Failed to retrieve SyslogForwarder enabling state: $_. SyslogForwarder configuration state: $($syslogForwarderRole.PublicInfo.SyslogEnabled)"
continue
}
if (-not $syslogEnabled)
{
Trace-Execution "Will not create new Security tenant config when SyslogForwarder is disabled"
continue
}
}
& "$gmaPackageContentPath\NewMultiTenantJsonForObservabilityGMA.ps1" `
-ConfigType $configType `
-GmaPackageContentPath $gmaPackageContentPath `
-TelemetryEnabled $telemetryEnabled `
-TenantJsonFilePath $tenantJsonFilePath `
-GcsNamespace $gcsNameSpace
}
$taskName = "Get-TelemetryStatusAndEditConfigsInJsonDropLocation"
$description = "Runs every hour to fetch telemetry status and based on that either adds or removes Telemetry config from JsonDropLocation"
$scriptPath = "$gmaPackageContentPath\GetTelemetryStatusAndEditConfigs.ps1"
$telemetryGcsNamespace = $envInfo.Namespaces.Telemetry
# Need to convert StreamingDataClient to int as arguments are sent as string.
# If just True or False is sent as string, it doesn't implicitly convert it to Boolean, but it is able to convert 0 and 1 to boolean.
$scriptArguments = "-TaskName `'$taskName`' -GMACacheFolderPath `'$GMACacheFolderPath`' -GMAPackageContentPath `'$gmaPackageContentPath`' -StreamingDataClient $([System.Convert]::ToInt16($streamingDataClient)) -GcsNamespace `'$telemetryGcsNameSpace`'"
Trace-Execution "$functionName : ScheduledTask to fetch Telemetry status and Edit configs based on it will be created now on $($env:COMPUTERNAME)."
New-ScheduledTaskForObservability $taskName $description $scriptPath $scriptArguments
}
catch {
if ($null -eq (Get-Command Get-ExceptionDetails -ErrorAction SilentlyContinue)) {
Import-Module "$gmaPackageContentPath\GMATenantJsonHelper.psm1" -Force
}
$customErrorMessage = "$functionName : Could not run Observability tasks on node $($env:COMPUTERNAME) due to following error: "
$customErrorMessage += Get-ExceptionDetails -ErrorObject $_
Trace-Error $customErrorMessage
throw
}
}
<#
.SYNOPSIS
Evaluation function to identify what type of GMA configuration action to use.
Following are the cases involved during evaluation :
case 1 : If the interface is invoked in case of Deployment then run configuration on all nodes.
case 2 : If the interface is invoked in case of AddNode or RepairNode then run configuration on only that node.
.EXAMPLE
[GMATenantJson]::EvaluateGMAConfigurationType($Parameters)
.PARAMETER Parameters
The ECE role parameters for this interface.
#>
static [CloudEngine.Actions.ConditionalActionDescription] EvaluateGMAConfigurationType([CloudEngine.Configurations.EceInterfaceParameters] $Parameters)
{
$ErrorActionPreference = "Stop"
## For classes in PS, we need to use the call stack to get the current executing function.
$functionName = $(Get-PSCallStack)[0].FunctionName
try {
$cloudRolePath = "GMATenantJson"
$gmaConfigOnAllNodes = "ConfigureGMAOnAllNodes"
$gmaConfigOnOneNode = "ConfigureGMAOnOneNode"
$gmaConfigOnAllNodesAction = [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction($cloudRolePath, $gmaConfigOnAllNodes)
$gmaConfigOnOneNodeAction = [CloudEngine.Actions.ConditionalActionDescription]::CreateWithDefinedAction($cloudRolePath, $gmaConfigOnOneNode)
$nodeName = Get-ExecutionContextNodeName -Parameters $Parameters
if($null -ne $nodeName)
{
# In add node or repair node case, ExecutionContextNodeName should have exactly one value.
Trace-Execution "Execution context node was determined. GMA will be configured on $nodeName only."
return $gmaConfigOnOneNodeAction
}
# In regular deployment case, ExecutionContextNodeName will be null.
Trace-Execution "No exceution context node was determined. GMA will be configured on all the nodes."
return $gmaConfigOnAllNodesAction
}
catch {
Trace-Error "$functionName :Failed to evaluate GMA configuration type on node $($env:COMPUTERNAME) due to following error : $_"
throw
}
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALIIs+vNlsaVm+
# s9heLt0IrJw4ok5uV53Kbw5NOvUFqaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPScT/geNglfnQ//YpHLQ44k
# RgQKcW1ot/Ut34Udn170MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAnVQrayqUyGRZ18VtAU2rilP7Rs3aSkMU3UmHWtOenlaFPP+juFa9Z66n
# Jg2GfHMvCu2dP0x2p61R/JmivG/5m1eZgl7T2jne7pl+WJElr+Pbbz4e0fRdHT3C
# zqJL0+54yLRVp1+0924mvJacKJSECCWafPgDKcGjOpjKBmBji7uhHab4DJ2sLCIx
# 7hDmZF9s1ciCe+oTbD3NJyByApqKL0+Nwr61+1LMhRe1awXosC+E7JbELUD5JkYR
# d+reV6KkO1QvJpMoDQfltkPnyVfCqHlfa2g6ntTpkspOExeCkf4E06Qto9eOsuzv
# GA7rA3cqbqp0MLHbpaPE5nYSWZB1DaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBNWeW3vclzA+iBiXEFQTyj+kDw0D7rpsj0xAQtnzYA8AIGZbqjMxsK
# GBMyMDI0MDIxMjE0MDg0NS4yNjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA
# 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu
# jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi
# y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD
# NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg3V4cxNBdE803H3b5Vdy21DWZMYhlHy7aawxz9yURyYIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A
# MA0GCSqGSIb3DQEBCwUABIICABR6sSwd4qo2PltFbyK3ebqfoVd+vOS9U4KXokEw
# XY4cDSXXFd70Q/MO25BTkxh53wZaZRppgZ34h12G3SKf4oVrIHFciIndy7RnjyID
# uXx+vdT9/+9dRzr+Me80Qh2rwYGeaBpSe4p1aZmlfYbeUapgZWGbdsDHSDjW2u6d
# MSVG1Maj0GEItU56haGYYSkJN/gufHF88DXCAgVSWl5AI/MRYHfpT9nu66XxfBKq
# 6Ul5q0InNvYP7UfDxpORHJApPtzivIYYu/HVV6/dnRfgt/iB3zWUCvtMD+OoI3Xg
# mo/RQwwEEYuRhOLBZ11/t+HQ/5QP/rflWNALBqBD3wbDENBy8rM6d+wzqeZR0jXn
# LDJ4plQGFUcHbbfeTBf3ipoYRh1G7AaqIDm8cDai2A5cIsy/yS05nkOAfHiE/+eH
# ToLxm8kyuGBb6i5+hT5HWtTLFioN8TMDpXlQEUasPnvam8vtA6V0d1+J/ZJVowQD
# vtqSrbMEL9pBphzyKxvfogQisPlXsej9DF3WIdnxEG7gyNEPqNxNj0z8bbLVjkgj
# Z4sbn3/vYEuatZWdBRnp+s/7e8wgXcM+YvVQP0Fj4IiyeuqxiFmdcW7mMkDpAtj9
# fIRzRqCqYwDyyRH75C6XOdyH9+NDvhuky6CHtby7doAeszJCfKm7OBsW5Sh2jz8t
# Gxu3
# SIG # End signature block
|
combined_dataset/train/non-malicious/LetterDiamondOneliner v_3.ps1
|
LetterDiamondOneliner v_3.ps1
|
&{param([char]$c)[int]$s=65;$p=$c-$s;$r=,(' '*$p+[char]$s);$r+=@(do{"{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p));$r;$r[-2..-99]}Z
# trimmed 130 chars w/o arg
&{param([char]$c)$p=$c-($s=65);$r=,(' '*$p+[char]$s);do{$r+="{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p);$r;$r[-2..-99]}J
# trimmed to 127 chars w/o arg
&{$p=[char]$args[0]-($s=65);$r=,(' '*$p+[char]$s);do{$r+="{0,$p} {1}{0}"-f([char]++$s),(' '*$f++)}until(!--$p);$r;$r[-2..-99]}J
|
combined_dataset/train/non-malicious/217.ps1
|
217.ps1
|
function Test-RemoteDesktopIsEnabled
{
PARAM(
[String[]]$ComputerName = $env:COMPUTERNAME
)
FOREACH ($Computer in $ComputerName)
{
TRY{
IF (Test-Connection -Computer $Computer -count 1 -quiet)
{
$Splatting = @{
ComputerName = $Computer
NameSpace = "root\cimv2\TerminalServices"
}
[boolean](Get-WmiObject -Class Win32_TerminalServiceSetting @Splatting).AllowTsConnections
}
}
CATCH{
Write-Warning -Message "Something wrong happened"
Write-Warning -MEssage $Error[0].Exception.Message
}
}
}
|
combined_dataset/train/non-malicious/1094.ps1
|
1094.ps1
|
if( (Get-WmiObject -Class 'Win32_ComputerSystem').Domain -eq 'WORKGROUP' )
{
Write-Warning -Message ('Find-ADUser tests can''t run because this computer is not part of a domain.')
}
else
{
$domainUrl = ''
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Setup
{
$domainController = Get-ADDomainController -Domain $env:USERDOMAIN
Assert-NotNull $domainController
$domainUrl = "LDAP://{0}:389" -f $domainController
}
function Test-ShouldFindUser
{
$me = Find-ADUser -DomainUrl $domainUrl -sAMAccountName $env:USERNAME
Assert-NotNull $me
Assert-Equal $env:USERNAME $me.sAMAccountName
}
function Test-ShouldEscapeSpecialCharacters
{
$me = Find-ADUser -DomainUrl $domainUrl -sAMAccountName "(user*with\special/characters)"
Assert-Null $me
}
}
|
combined_dataset/train/non-malicious/ConvertFrom-Property_2.ps1
|
ConvertFrom-Property_2.ps1
|
<#
.SYNOPSIS
Converts data from flat or single-level property files into PSObjects
.DESCRIPTION
Converts delimited string data into objects
.PARAMETER InputObject
The text to be parsed
.PARAMETER FilePath
A file containing text to be parsed (so you can pipeline files to be processed)
.PARAMETER ValueSeparator
The value separator string used between name=value pairs. Allows regular expressions.
Typical values are "=" or ":" or ";"
Defaults to "="
.PARAMETER PropertySeparator
The property separator string used between sets of name=value pairs. Allows regular expressions.
Typical values are "`n" or "`n`n" or "\\n\\s*\\n"
Defaults to "\\n\\s*\\n?"
.PARAMETER CountOfPropertiesPerRecord
Separate the input into groups of a certain number of properties.
If your input file has no specific record separator, you can usually match the first property by using a look-ahead expression *(See Example 2)*
However, if the properties aren't in the same order each time or regular expressions make you queasy, and each of your records have the same number of properties on each record, you can use this to separate them by count.
.PARAMETER RecordSeparator
The record separator string is used between records or sections in a text file.
Typical values are "\\n\\s*\\n" or "\\n\\[(.*)\\]\\s*\\n"
Defaults to "\\n\\[(.+)\\]\\s*\\n" (the correct value for ini files).
To support named sections or records, make sure to use a regular expression here that has a capture group defined.
.PARAMETER AutomaticRecords
Supports guessing when a new record starts based on the repetition of a property name. You can use this whenever your input has multiple records and the properties are always in the same order.
.PARAMETER SimpleOutput
Prevent outputting the PSName parameter which indicates the source of the object when pipelineing file names
.EXAMPLE
ConvertFrom-PropertyString config.ini
Reads in an ini file (which has key=value pairs), using the default settings
.EXAMPLE
@"
ID:3468
Type:Developer
StartDate:1998-02-01
Code:SWENG3
Name:Baraka
ID:11234
Type:Management
StartDate:2005-05-21
Code:MGR1
Name:Jax
"@ |ConvertFrom-PropertyString -sep ":" -RecordSeparator "\\r\\n\\s*\\r\\n" | Format-Table
Code StartDate Name ID Type
---- --------- ---- -- ----
SWENG3 1998-02-01 Baraka 3468 Developer
MGR1 2005-05-21 Jax 11234 Management
Reads records from a key:value string with records separated by blank lines.
NOTE that in this example you could also have used -AutomaticRecords or -Count 5 instead of specifying a RecordSeparator
.EXAMPLE
@"
Name=Fred
Address=Street1
Number=123
Name=Janet
Address=Street2
Number=345
"@ | ConvertFrom-PropertyString -RecordSeparator "`n(?=Name=)"
Reads records from a key=value string and uses a look-ahead record separator to start a new record whenever "Name=" is encountered
NOTE that in this example you could have used -AutomaticRecords or -Count 3 instead of specifying a RecordSeparator
.EXAMPLE
ConvertFrom-PropertyString data.txt -ValueSeparator ":"
Reads in a property file which has key:value pairs
.EXAMPLE
Get-Content data.txt -RecordSeparator "`r`n`r`n" | ConvertFrom-PropertyString -ValueSeparator ";"
Reads in a property file with key;value pairs, and records separated by blank lines, and converts it to objects
.EXAMPLE
ls *.data | ConvertFrom-PropertyString
Reads in a set of *.data files which have an object per file defined with key:value pairs of properties, one-per line.
.EXAMPLE
ConvertFrom-PropertyString data.txt -RecordSeparator "^;(.*?)\\r*\\n" -ValueSeparator ";"
Reads in a property file with key:value pairs, and sections with a header that starts with the comment character ';'
.NOTES
3.0 2010 Aug 4 (This Version)
- Renamed most of the parameters because I couldn't tell which did what from the Syntax help
- Added a -AutomaticRecords switch which creates new output objects whenevr it encounters a duplicated property
- Added a -SimpleOutput swicth which prevents the output of the PSChildName property
- Added a -CountOfPropertiesPerRecord parameter which allows splitting input by count instead of regex or automatic
2.0 2010 July 9 http://poshcode.org/get/1956
- changes the output so that if there are multiple instances of the same key, we collect the values in an array
1.0 2010 June 15 http://poshcode.org/get/1915
- Initial release
#>
#function ConvertFrom-PropertyString {
[CmdletBinding(DefaultParameterSetName="Data")]
param(
[Parameter(Position=99, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Data")]
[Alias("Data","Content","IO")]
[string]$InputObject
,
[Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName="File")]
[Alias("PSPath")]
[string]$FilePath
,
[Parameter(ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)]
[Alias("VS","Separator")]
[String]$ValueSeparator="\\s*=\\s*"
,
[Parameter(ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)]
[Alias("PS","Delimiter")]
[String]$PropertySeparator='(?:\\s*\\n+\\s*)+'
,
[Parameter(ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)]
[Alias("RS")]
[String]$RecordSeparator='(?:\\n|^)\\[([^\\]]+)\\]\\s*\\n'
,
[Parameter(ParameterSetName="Data")]
[Alias("MultiRecords","MR","MultipleRecords","AR","AutoRecords")]
[Switch]$AutomaticRecords
,
[Parameter()]
[int]$CountOfPropertiesPerRecord
,
[Parameter()]
[Switch]$SimpleOutput
)
begin {
function new-output {
[CmdletBinding()]
param(
[Switch]$SimpleOutput
,
[AllowNull()][AllowEmptyString()]
[String]$Key
,
[AllowNull()][AllowEmptyString()]
$FilePath
)
end {
if(!$SimpleOutput -and ("" -ne $Key)) { @{"PSName"=$key} }
elseif(!$SimpleOutput -and $FilePath) { @{"PSName"=((get-item $FilePath).PSChildName)} }
else { @{} }
}
}
function out-output {
[CmdletBinding()]
param([Hashtable]$output)
end {
## If we made arrays out of single values, unwrap those
foreach($k in $Output.Keys | Where { $Output.$_.Count -eq 1 } ) {
$Output.$k = $Output.$k[0]
}
if($output.Count) {
New-Object PSObject -Property $output
}
}
}
Write-Verbose "Setting up the regular expressions: `n`tRecord: '$RecordSeparator' `n`tProperty: '$PropertySeparator' `n`tValue: '$ValueSeparator'"
[Regex]$ReRecordSeparator = New-Object Regex ([System.String]$RecordSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
[Regex]$RePropertySeparator = New-Object Regex ([System.String]$PropertySeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
[Regex]$ReValueSeparator = New-Object Regex ([System.String]$ValueSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
}
process {
## some kind of PowerShell bug when expecting pipeline input:
if(!"$ReRecordSeparator"){
Write-Verbose "Setting up the record regex in the PROCESS block: '$RecordSeparator'"
[Regex]$ReRecordSeparator = New-Object Regex ([System.String]$RecordSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
}
if(!"$RePropertySeparator"){
Write-Verbose "Setting up the property regex in the PROCESS block: '$PropertySeparator'"
[Regex]$RePropertySeparator = New-Object Regex ([System.String]$PropertySeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
}
if(!"$ReValueSeparator") {
Write-Verbose "Setting up the value regex in the PROCESS block: '$ValueSeparator'"
[Regex]$ReValueSeparator = New-Object Regex ([System.String]$ValueSeparator), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
}
Write-Verbose "ParameterSet: $($PSCmdlet.ParameterSetName)"
Write-Verbose "ValueSeparator: $($ReValueSeparator)"
$InputData = @{}
if($PSCmdlet.ParameterSetName -eq "File") {
$AutomaticRecords = $true
$InputObject = Get-Content $FilePath -Delimiter ([char]0)
}
## Separate RecordText with the RecordSeparator if the user asked us to:
if($PsBoundParameters.ContainsKey('RecordSeparator') -or $AutomaticRecords ) {
$Records = $ReRecordSeparator.Split( $InputObject ) | Where-Object { $_ }
Write-Verbose "There are $($ReRecordSeparator.GetGroupNumbers().Count) groups and $(@($Records).Count) records!"
if($ReRecordSeparator.GetGroupNumbers().Count -gt 1 -and @($Records).Count -gt 1) {
while($Records) {
$Key,$Value,$Records = $Records
Write-Verbose "RecordSeparator with grouping: $Key = $Value"
$InputData.$Key += @($Value)
}
} elseif(@($Records).Count -gt 1) {
$InputData."" = @($Records)
$InputObject = $Records
} else {
$InputObject = $Records
}
}
## Separate RecordText into properties and group them together by count if we were told a count
if($PsBoundParameters.ContainsKey('CountOfPropertiesPerRecord')) {
$Properties = $RePropertySeparator.Split($InputObject)
Write-Verbose "Separating Records by Property count = $CountOfPropertiesPerRecord of $($Properties.Count)"
for($Index = 0; $Index -lt $Properties.Count; $Index += $CountOfPropertiesPerRecord) {
$InputData."" += @($Properties[($Index..($Index+$CountOfPropertiesPerRecord-1))] -Join ([char]0))
Write-Verbose "Record ($Index..) $($Index/$CountOfPropertiesPerRecord) = $(@($Properties[($Index..($Index+$CountOfPropertiesPerRecord-1))] -Join ([char]0)))"
}
## We have to manually set the PropertySeparator because we can't generate text from your regex pattern to match your regex pattern
$SetPropertySeparator = $RePropertySeparator
[Regex]$RePropertySeparator = New-Object Regex ([System.String][char]0), ([System.Text.RegularExpressions.RegexOptions]"Multiline,IgnoreCase,Compiled")
}
if($InputData.Keys.Count -eq 0){
Write-Verbose "Keyless entry enabled!"
$InputData."" = @($InputObject)
}
Write-Verbose "InputData: $($InputData.GetEnumerator() | ft -auto -wrap| out-string)"
## Process each Record
foreach($key in $InputData.Keys) { foreach($record in $InputData.$Key) {
Write-Verbose "Record($Key): $record"
$output = new-output -SimpleOutput:$SimpleOutput -Key:$Key -FilePath:$FilePath
foreach($Property in $RePropertySeparator.Split("$record")) {
[string[]]$data = $ReValueSeparator.split($Property,2) | foreach { $_.Trim() } | where { $_ }
Write-Verbose "Property: $Property --> $($data -join ': ')"
if($AutomaticRecords -and $Output.ContainsKey($Data[0])) {
out-output $output
$output = new-output -SimpleOutput:$SimpleOutput -Key:$Key -FilePath:$FilePath
}
switch($data.Count) {
1 { $output.($Data[0]) += @($null) }
2 { $output.($Data[0]) += @($Data[1]) }
}
}
out-output $output
} }
## Put this back in case there's more input
$RePropertySeparator = $SetPropertySeparator
}
#}
|
combined_dataset/train/non-malicious/adv2.ps1
|
adv2.ps1
|
#--------------------------------------------------------
# Script : Advanced2_2011.ps1
# Author : marc carter (marcadamcarter)
# Date : 4/5/2011
# Keywords: PowerShell, Scripting Games
# Comments:
# Expected Arguments: ADquery, Excel, textfile, <device_name_or_ip>
# Examples: .\\Advanced2_2011.ps1 ADquery
# .\\Advanced2_2011.ps1 Excel <file_fullname>
# .\\Advanced2_2011.ps1 textfile <file_fullname> - File format: List of device names, one per line.
# .\\Advanced2_2011.ps1 <device_name_or_ip>
#--------------------------------------------------------
#Begin Functions
Function get-runningServices{
#--------------------------------------------------------
<#
.SYNOPSIS
Retrieves currently running Services and their Dependent services and reports on the dependent services status
.DESCRIPTION
Retrieves currently running Services and their Dependent services and reports on the dependent services status
.PARAMETER server
Name of the server(s) you wish to query.
.NOTES
Name: get-runningServices
Author: Marc Carter
DateCreated: 5APR2011
.EXAMPLE
get-ModuleInfo LOCALHOST
Description
------------
Returns a formatted list of running Services and their dependancies.
#>
[cmdletbinding(
DefaultParameterSetName = 'server',
ConfirmImpact = 'low'
)]
Param(
[Parameter(
Mandatory = $True,
Position = 0,
ParameterSetName = '',
ValueFromPipeline = $True)]
[string][ValidatePattern(".{2,}")]$server
)
Begin{
$ErrorActionPreference = "SilentlyContinue"
$array = @()
}
Process{
$isServer = get-OSVersion $server
#Test to see if running server OS
if($isServer){
get-service -ComputerName $server | where-object {$_.Status -eq "Running"} | Select-Object name | % {
$BaseServiceName = $_.Name
Get-Service -name $_.Name -DependentServices | Sort-Object Name | Select-Object Name, Status | % {
#Group values into a custom object in order to output in table view.
$tmpObj = New-Object Object
$tmpObj | add-member -membertype noteproperty -name "BaseServiceName" -value $BaseServiceName
$tmpObj | add-member -membertype noteproperty -name "DependentName" -value $_.Name
$tmpObj | add-member -membertype noteproperty -name "DependentStatus" -value $_.Status
#Append the object to the existing array.
$array += $tmpObj
}
}
}
else { "Skipping $server (Not running Server OS)" }
}
End{
#Output results of the array and set both to $Null when done.
$array | ft @{Name='BaseServiceName';Expression={$_.BaseServiceName}; Align='Right';}, @{Name='DependentName';Expression={$_.DependentName};}, @{Name='DependentStatus';Expression={$_.DependentStatus};align='Left';} -auto
$array = $Null
$tmpObj = $Null
}
}
#--------------------------------------------------------
#End function get-runningServices
function get-listFromAD{
#--------------------------------------------------------
<#
.SYNOPSIS
Retrieves list of devices from active directory.
.DESCRIPTION
Retrieves list of devices from active directory.
Description
------------
Returns list of devices from AD query.
#>
$strFilter = "(&(objectcategory=computer)(operatingsystem=Windows Server*))" #All Server OS
$props = "cn"
$dse = [ADSI]"LDAP://rootdse"
#$root = "LDAP://"+$dse.defaultNamingContext
$ds = New-Object DirectoryServices.DirectorySearcher([ADSI]$root,$strFilter,$props)
$ds.PageSize = 1000
$results = $ds.FindAll()
foreach($obj in $results){
$obj.properties.cn
}
}
#--------------------------------------------------------
#End function get-listFromAD
function get-OSVersion($computer){
#--------------------------------------------------------
$os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer
Switch ($os.Version){
"5.1.2600" { $False }
"5.1.3790" { $True }
"6.0.6001" {
if($os.ProductType -eq 1){ $False }
else{ $True }
}
"6.1.7600"{
if($os.ProductType -eq 1){ $False }
else{ $True }
}
DEFAULT { "N/A" }
}
}
#--------------------------------------------------------
#End get-OSVersion
#End Functions
#Main Script
#--------------------------------------------------------
#If arguments are present, determine how to proceed.
if($args){
<#
If arguments exist, assume input from external sorce
.Expected: ADquery, Excel, Text, <device_name_or_ip>
.Examples: .\\Advanced2_2011.ps1 ADquery
.\\Advanced2_2011.ps1 Excel <file_fullname>
.\\Advanced2_2011.ps1 textfile <file_fullname> - File format: List of device names, one per line.
.\\Advanced2_2011.ps1 <device_name_or_ip>
#>
switch($args[0].toLower()){
"adquery" {
foreach($device in get-listFromAD){
$device.toUpper()
get-runningServices $device
}
}
"excel" {
if(Test-Path $args[1]){
$xlCSV=6
$xls=$args[1]
$csv=$args[1] -replace(".xls",".csv")
$xl=New-Object -com "Excel.Application"
$wb=$xl.workbooks.open($xls)
$wb.SaveAs($csv,$xlCSV)
$xl.displayalerts=$False
$xl.quit()
Import-Csv $csv | Select-Object name | % {
$_.name
get-runningServices $_.name
}
}
else{
Write-Error "`nInvalid path for $args[1]`nCheck the path and try again."
}
}
"textfile" {
if(Test-Path $args[1]){
Get-Content -Path $args[1] | % {
$_
get-runningServices $_
}
}
else{
Write-Error "`nInvalid path for $args[1]`nCheck the path and try again."
}
}
Default {
#Initiate the function taking the first argument (assume single server instance name).
get-runningServices $args[0]
}
}
}
else{
#Otherwise, initiate the function and prompt for device.
get-runningServices
}
|
combined_dataset/train/non-malicious/sample_33_2.ps1
|
sample_33_2.ps1
|
#
# Module manifest for module 'OCI.PSModules.Datalabelingservicedataplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datalabelingservicedataplane.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c7f9095b-be8f-42bb-88ca-422eca4176a1'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datalabelingservicedataplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservicedataplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDatalabelingservicedataplaneAnnotation',
'Get-OCIDatalabelingservicedataplaneAnnotationsList',
'Get-OCIDatalabelingservicedataplaneDataset',
'Get-OCIDatalabelingservicedataplaneRecord',
'Get-OCIDatalabelingservicedataplaneRecordContent',
'Get-OCIDatalabelingservicedataplaneRecordPreviewContent',
'Get-OCIDatalabelingservicedataplaneRecordsList',
'Invoke-OCIDatalabelingservicedataplaneSummarizeAnnotationAnalytics',
'Invoke-OCIDatalabelingservicedataplaneSummarizeRecordAnalytics',
'New-OCIDatalabelingservicedataplaneAnnotation',
'New-OCIDatalabelingservicedataplaneRecord',
'Remove-OCIDatalabelingservicedataplaneAnnotation',
'Remove-OCIDatalabelingservicedataplaneRecord',
'Update-OCIDatalabelingservicedataplaneAnnotation',
'Update-OCIDatalabelingservicedataplaneRecord'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservicedataplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_33_73.ps1
|
sample_33_73.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmcontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2656b809-7098-428e-b605-696525730fec'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain',
'Get-OCIApmcontrolplaneApmDomainsList',
'Get-OCIApmcontrolplaneApmDomainWorkRequestsList',
'Get-OCIApmcontrolplaneDataKeysList',
'Get-OCIApmcontrolplaneWorkRequest',
'Get-OCIApmcontrolplaneWorkRequestErrorsList',
'Get-OCIApmcontrolplaneWorkRequestLogsList',
'Get-OCIApmcontrolplaneWorkRequestsList',
'Move-OCIApmcontrolplaneApmDomainCompartment',
'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys',
'Remove-OCIApmcontrolplaneApmDomain',
'Remove-OCIApmcontrolplaneDataKeys',
'Update-OCIApmcontrolplaneApmDomain'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_65_5.ps1
|
sample_65_5.ps1
|
$ErrorActionPreference = 'Stop'
<#
.Synopsis
Returns payload information from glcm. This info is required to send a heart beat request to AA
#>
function Get-HeartbeatInfo
{
[CmdletBinding()]
param()
$glcm = Get-DscLocalConfigurationManager
$configurationName = ""
$aaServerUrls = New-Object System.Collections.ArrayList
if($glcm.ReportManagers)
{
$serverUrl = $glcm.ReportManagers.ServerURL
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
if($glcm.ResourceModuleManagers)
{
$serverUrl = $glcm.ResourceModuleManagers.ServerURL
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
if($glcm.ConfigurationDownloadManagers)
{
$serverUrl = $glcm.ConfigurationDownloadManagers.ServerURL
try
{
#get configuration name if available
if($glcm.ConfigurationDownloadManagers.CimClass -and $glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)
{
$configurationNamesExists = ($glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)['ConfigurationNames']
if($configurationNamesExists)
{
$configurationName = [string]($glcm.ConfigurationDownloadManagers.configurationNames)
}
}
}
catch
{
Write-Verbose "[WARNING] Could not retrieve ConfigurationNames from glcm $_ ..."
}
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
$registrationMetaData = @{
NodeConfigurationName = $configurationName
ConfigurationMode = $glcm.ConfigurationMode
ConfigurationModeFrequencyMins = $glcm.ConfigurationModeFrequencyMins
RefreshFrequencyMins = $glcm.RefreshFrequencyMins
RebootNodeIfNeeded = $glcm.RebootNodeIfNeeded
ActionAfterReboot = $glcm.ActionAfterReboot
AllowModuleOverwrite = $glcm.AllowModuleOverWrite
}
return @{
ServerUrls = $aaServerUrls
RegistrationMetaData = $registrationMetaData
}
}
function Test-Command
{
param
(
[String] $Name
)
return ($null -ne (Get-Command -Name $Name -ErrorAction Continue 2> $null))
}
function GetComputerInfoEditionId
{
param()
$windowsEditionId = $null
if(Test-Command -Name Get-ComputerInfo)
{
$windowsEditionId = Get-ComputerInfo -Property WindowsEditionId -ErrorAction SilentlyContinue
}
return $windowsEditionId
}
function GetEditionId
{
param()
$windowsEditionId = $null
if(Test-Command -Name Get-ItemPropertyValue)
{
$windowsEditionId = Get-ItemPropertyValue 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId
}
elseif(Test-Command -Name Get-ItemProperty)
{
if($editionId = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId -ErrorAction SilentlyContinue)
{
$windowsEditionId = $editionId.EditionID
}
}
return $windowsEditionId
}
<#
.synopsis
Returns windows edition id
For e.g.
on Nano Server returns - ServerDatacenterNano
on Windows Client - Enterprise
#>
function Get-WindowsEdition
{
param()
$windowsEditionId = GetEditionId
if(!$windowsEditionId)
{
if($windowsEditionId = GetComputerInfoEditionId)
{
$windowsEditionId = $windowsEditionId.WindowsEditionId
}
}
return $windowsEditionId
}
<#
.Synopsis
Returns OS major minor version
#>
function GetOSVersion {
[CmdletBinding()]
param()
$majorVersion = ""
$minorVersion = ""
if(Test-Command -Name Get-CimInstance)
{
$os = Get-CimInstance Win32_OperatingSystem
}
else
{
$os = Get-WmiObject Win32_OperatingSystem
}
$version = $os.Version
if($version)
{
# On PS/.NET 2.0, [System.Version] doesn't have a Parse method
if ($version -match '^(?<major>[0-9]+)\.(?<minor>[0-9]+)(\.[0-9]+)*$') {
$majorVersion = [int]::Parse($matches['major'])
$minorVersion = [int]::Parse($matches['minor'])
}
else
{
Write-Verbose "Invalid OS version: $version ..."
}
}
@{
Major = $majorVersion
Minor = $minorVersion
}
}
<#
.Synopsis
Returns VM UUID
#>
function Get-VMUUId
{
[CmdletBinding()]
param()
$vmuuid = ""
$status = "success"
try
{
if(Test-Command -Name Get-CimInstance)
{
$computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct
}
else
{
$computerSystemProduct = Get-WmiObject Win32_ComputerSystemProduct
}
if($computerSystemProduct)
{
$vmuuid = $computerSystemProduct.UUID
}
Write-Verbose "VMUUId is $vmuuid ..."
}
catch
{
Write-Verbose "[WARNING] An error occurred while retrieving VM UUID $_ ..."
$status = "error"
}
return @{
VMUUID = $vmuuid
Status = $status
}
}
<#
.Synopsis
Returns OS profile object
#>
function Get-OSProfile
{
[CmdletBinding()]
param()
$osName = Get-WindowsEdition
$osVersion = GetOSVersion
return @{
Name = $osName
Type = "Windows"
MajorVersion = $osVersion["Major"]
MinorVersion = $osVersion["Minor"]
VMUUID = (Get-VMUUId).VMUUID
}
}
function GetCimClass
{
[CmdletBinding()]
param(
[String] $ClassName,
[String] $Namespace
)
return (Get-CimClass -ClassName MSFT_DSCMetaConfiguration -Namespace root/microsoft/windows/desiredstateconfiguration -ErrorAction Continue)
}
<#
.Synopsis
Retrieves DSC agent id. Returns an empty string if agent id is not available
#>
function Get-DscAgentId
{
[CmdletBinding()]
param()
$agentID = ""
$status = "success"
#AgentID is not available in wmf 4.0. So return blank agent id if the property does not exists
try
{
if($getlcm = GetCimClass)
{
if($getlcm -and $getlcm.CimClassProperties -and ($getlcm.CimClassProperties)['AgentId'])
{
$agentID = (Get-DscLocalConfigurationManager).AgentId
}
}
Write-Verbose "AgentID is $agentID ..."
}
catch
{
Write-Verbose "[WARNING] An error occurred while retrieving agent ID $_ ..."
$status = "error"
}
return @{
AgentID = $agentID
Status = $status
}
}
<#
.Synopsis
Returns OAAS certificate from the local machine that is used to authenticate with AA pull server
#>
function Get-OAASCertificate
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$ServerUrl
)
$subject = 'CN=' + $ServerUrl
$certificate = Get-ChildItem Cert:\LocalMachine\My | ? Subject -eq $subject | Select-Object -First 1
if (!$certificate) {
throw "Failed to retrieve the OAAS certificate for heartbeat api request [ServerURL]: $ServerUrl ..."
}
return $certificate
}
<#
.Synopsis
Returns OAAS endpoint
#>
function GetOAASEndpoint {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $AgentId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ServerURL
)
return ($ServerURL + "/Nodes(AgentId='" + $AgentId + "')/ExtendedProperties")
}
function SendWebRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string] $Uri,
[Parameter(Mandatory=$true)]
[System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate,
[Parameter(Mandatory=$true)]
[hashtable] $Payload
)
$jsonPayload = ConvertTo-Json $Payload -Depth 10
try
{
$response = Invoke-WebRequest `
-Uri ([Uri] $Uri) `
-ContentType 'application/json' `
-Method Post `
-Certificate $Certificate `
-Headers @{ "protocolversion" = "2.0" } `
-Body $jsonPayload `
-UseBasicParsing
return $response
}
finally
{
[System.Net.ServicePointManager]::CertificatePolicy = $null
}
}
<#
.Synopsis
Invokes AA server heartbeat endpoint to send the heartbeat request
#>
function Send-HeartbeatRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ServerURL,
[Parameter(Mandatory=$true)]
[hashtable] $Payload
)
$agentId = (Get-DscAgentId)["AgentID"]
$accountId = Split-Path -Path $ServerURL -Leaf
$certificate = Get-OAASCertificate -ServerUrl $ServerURL
$endpoint = GetOAASEndpoint -AgentId $agentId -ServerURL $ServerURL
try
{
$response = SendWebRequest -Uri $endpoint -Certificate $certificate -Payload $Payload
Write-Verbose "Heartbeat is sent successfully"
return
}
catch
{
#No retries when status code is 400,401,403,404
$message = "Invoking heartbeat web request failed for registration url {0}: {1}" -f ($ServerURL, $_.ToString().TrimEnd())
Write-Verbose $message
}
}
<#
.Synopsis
Send Guest config heartbeat
#>
function Send-Heartbeat {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateSet('GCAgentStart')]
[string]$Event
)
try
{
Write-Verbose "[INFO] Event $Event" -Verbose
if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) {
Write-Verbose "[ERROR] DSC is not installed ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
# Get dsc local configuration manager properties
$heartbeatInfo = Get-HeartbeatInfo
$serverUrls = $heartbeatInfo["ServerUrls"]
if(!$serverUrls)
{
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
else {
for ($i = 0; $i -lt $serverUrls.Count; $i++) {
if(-not $serverUrls.ToLower().Contains('agentservice')) {
Write-Verbose "[ERROR] Node is not registered to AA Server. Server URI : $serverUrls ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
}
}
$extnInfo = @{
Name = "Microsoft.Powershell.DSC"
Version = "2.77.0.0"
}
# Get OS Profile
$osProfile = Get-OSProfile
# Get OMS cloud if
$omsCloudId = '7783-7084-3265-9085-8269-3286-77'
# Create request payload
$payload = @{
OMSCloudId = $omsCloudId
TimeStamp = (Get-Date -UFormat '%Y%m%d-%H%M%S')
VMResourceId = ""
ExtensionStatusEvent = $Event
ExtensionInformation = $extnInfo
OSProfile = $osProfile
LCMMetaData = $heartbeatInfo["RegistrationMetaData"]
}
# For each server that VM is registered to, send heartbeat request to AA
foreach($serverURL in $serverUrls)
{
Send-HeartbeatRequest -ServerURL $serverURL -Payload $payload
}
}
catch
{
Write-Verbose "[ERROR] occurred while sending heartbeat event: $Event ... $_"
}
}
<#
.Synopsis
Verify if DSC is enabled
#>
function Test-AutomationDscRegistration {
[CmdletBinding()]
param(
)
try
{
if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) {
Write-Verbose "[ERROR] DSC is not installed ..." -Verbose
exit 1
}
# Get dsc local configuration manager properties
$heartbeatInfo = Get-HeartbeatInfo
$serverUrls = $heartbeatInfo["ServerUrls"]
if(!$serverUrls)
{
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose
exit 1
}
else {
$foundUrl = $false
for ($i = 0; $i -lt $serverUrls.Count; $i++) {
if($serverUrls.ToLower().Contains('agentsvc')) {
$foundUrl = $true
Write-Verbose "DSC is registered to pull server ..." -Verbose
exit 0
}
}
}
}
catch
{
Write-Verbose "[ERROR] occurred ... $_" -Verbose
}
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose
exit 1
}
function IsFileOlderThanOneHour {
[CmdletBinding()]
param(
[String] $Path
)
$lastWrite = (get-item $Path).LastWriteTime
$timespan = New-TimeSpan -Days 0 -Hours 1 -Minutes 0
if (((Get-Date) - $lastWrite) -lt $timespan) {
return $false
}
return $true
}
<#
.Synopsis
Verify if ChangeTracking/Inventory is enabled
ChangeTracking solution saves the inventory and changetracking states under
'$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\CT*' or '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\FCT*'
locations. this functions checks when these state files are modified.
if the state files are modified recently (within an hour) then this is considered as the solution is enabled otherwise disabled.
#>
function Test-ChangeTrackingEnabled {
[CmdletBinding()]
param(
)
try
{
$mmaServiceStateFolder = Join-Path $env:ProgramFiles 'Microsoft Monitoring Agent\Agent\Health Service State'
if(-not(Test-Path $mmaServiceStateFolder)) {
Write-Verbose "$mmaServiceStateFolder does not exist"
exit 1
}
$changeTrackingFolder = Get-ChildItem "$mmaServiceStateFolder\CT*"
if($changeTrackingFolder -ne $null) {
$chWorkFolder = "$changeTrackingFolder\work"
$serviceInventoryFile = "$chWorkFolder\ServiceInventory\ServiceInventory.json"
$serviceStateFile = "$chWorkFolder\ServiceState\ServiceState.json"
if(Test-Path $serviceInventoryFile) {
if(-not(IsFileOlderThanOneHour -Path $serviceInventoryFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $serviceStateFile) {
if(-not(IsFileOlderThanOneHour -Path $serviceStateFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
}
$fileCTFolder = Get-ChildItem "$mmaServiceStateFolder\FCT*"
if($fileCTFolder -ne $null) {
$fctWorkFolder = "$fileCTFolder\work"
$changedFilesFile = "$fctWorkFolder\ChangedFiles\localhost.json"
$changeTrackingFile = "$fctWorkFolder\localhost.json"
$inventoryFile = "$fctWorkFolder\Inventory\localhost.json"
if(Test-Path $changedFilesFile) {
if(-not(IsFileOlderThanOneHour -Path $changedFilesFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $changeTrackingFile) {
if(-not(IsFileOlderThanOneHour -Path $changeTrackingFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $inventoryFile) {
if(-not(IsFileOlderThanOneHour -Path $inventoryFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
}
}
catch
{
Write-Verbose "[ERROR] occurred ... $_" -Verbose
}
Write-Verbose "ChangeTracking is not enabled ..." -Verbose
exit 1
}
Export-ModuleMember -Function @('Send-Heartbeat','Test-AutomationDscRegistration', 'Test-ChangeTrackingEnabled')
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEi08uUxmuV/k+
# eFo9XbeS5D+NnbKbBMmE5ssq40SCKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5+n+JMdZ50mpD1HGFaizpL
# LsNtiYBwj2i4vCIuf9wLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAfTNNPf55vLMUy/tiMRB7v/PIXG2ZpgD/yk0tTGjq57/NbR+bbtHW/6my
# 011gqy+GHl2hRgE/2u4rNbqurCeUYR/fgXulGYrjMcluV0HSR9fFeX7lDd++BsdI
# gorjlW+IVGPe5CIY2EcGyRvsfCB3Hv/ekWn1SqsjNzT/ZuxaTmYwJdt1XbPT7fiV
# fQfFxHDjpk5dC/oQIleeIqUEPk9Yuva8Sqm3650vc4uojEVG8uM4IDAI/LvwIGTS
# urwtat7Y73NSQmGTKOxuJxVJoDr4RIlURdaSi0xRtGQgoDDPr/xNDb3E8nunL0vB
# pjFQGmEFkyiK1F+K4HORbxR4yOJKoqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAyUe7VwGLBox2bq0c5tS4CsgVQPqWOGH/L7qqysIXn3wIGZmra72BH
# GBMyMDI0MDcxMTIxMjQzNC4wMzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6jpBEDAiGA8yMDI0MDcxMTExMzEy
# OFoYDzIwMjQwNzEyMTEzMTI4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqOkEQ
# AgEAMAoCAQACAgO5AgH/MAcCAQACAhlnMAoCBQDqO5KQAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAGzi5FO2QiwVQg4gd2LD0g+WyNrl2yI1bZTv0sj1IHWv
# MjkmEg8NChd3V9ph8q2YqSHDes4JTRZBTSElrFyd+VM4vTGh2CWV0cjSn0mEk1ac
# 7uKIx8j6cSucLO47o1EjpDlT2/swi4rAs1ifahnBsECfgXj8TADKAj9Yl6DGbUqi
# o4LzH780lC3SVqeYJVSJNEDFMTm1eCIvBli6duyE4gtB4KwZd3h81S76WCP/sLF1
# 5o22hRBepBMOSWlWU8OeC3Pz/vgWRwF3SWJd2E5USbO74JmmrSBnerzjc6gFmZKY
# OJyXFlQBM0ysenqB3MD+niN0Tg5gpJB7L+1y8/fO4LsxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB
# 7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAaj7n44rVqP8YifFBZshMk15Gr9LyDE196Kmo4xmqI
# +DCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/
# xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgdW4n0e/aoaJZRLIf55aQQVAI
# m+q4s8Gi+eUTpGwC5RUwDQYJKoZIhvcNAQELBQAEggIAJEM8qiTOrPYON0I1aa0L
# UXPFNz+JXLAJSgFtqB1zTN2klOGDZxaO4duYsAV2XuEp/YdovvNsF+zG2XxO8pLu
# LD6/KV9kqj9m49iKOdK2m3zoZLBS+8FfoS721rqVYQkJqqYx5RYrxTPZSB0+5tgD
# XOAcQF+PTV3CrXnXzhODH07212/VrDZLpSHi8k3KDTRWzds5A0M3SXhgogBiFRT5
# nR3QwrlS1vKh7RDeGhlxx1F3idq0XvSrXz5u3D/WvIk9VCEwRhevdePJ4VfCYh1e
# GowKQSt6OGf4eoPc2LyvlFf33id/7/zvLa2cV/5tMf+miKpAgevtWsu8RVAwK0OP
# Lo9WU7fEEth2maHjAGk4Uf97kX7kLNplqWtFXvJVyf1sw0bZTU+5ytRR0fWkse6d
# IDJgVs+15pdj18cABfuRG+ELWhII/pdnHPRtPUVPY9Wt3iK2A5G8p7cqzGxWkZxW
# uU9fWGc29rTbrrb7GiQCCiQuIlkzC0qQT6ocTQEbv2WlMZARWB9lWkHHRp2/qnt3
# z8558wvjjb6HDxAMyaqLmnHUOBrCB5MMER7IsL8GK4Wsrk4GWVV6UvGOUiw/ATwY
# 3RVyUuD+HRN85aIhXyafom1PvmBmX5I+rlIMb6BGqiymrrstOS3zbW9aPHb3+bGD
# 5v894KyVcFxWVe9c8mD1xYE=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Find Permissions.ps1
|
Find Permissions.ps1
|
function findPermission ([string]$a, [string]$b)
{
$string = $a
$user = $b
$initialArray = @{}
$lowerArray = @{}
do{
$initialArray = get-acl $string | %{$_.access} | %{$_.IdentityReference}
$lowerArray = $initialArray | %{$_.value.toLower()} | %{$_.SubString(12)}
foreach($item in $lowerArray)
{
if($item.Contains($user))
{
$a1 = new-object -comobject wscript.shell
$b = $a1.popup($string,0,"Permission Found",1)
}
}
$string = $string.SubString(0, $string.LastIndexOf("\\"))
}while($string.Contains("\\"))
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.