no one run any program they see posted here! it is malware
キタ━━━(゚∀゚)━━━!!
other then the malware. here is the cute images teh evil man made
>other then the malware. here is the cute images teh evil man madei put decent work into it. i almost made it into a real interactive instead of something for lulz
>>2119just for the fact you didnt do any coding at all...
i am a skid XD. rekt (USER WAS BANNED FOR THIS POST) Λ_Λ \\ ( ・∀・) | | ガッ と ) | | Y /ノ 人 / ) < >_Λ∩ _/し' //. V`Д´)/ (_フ彡 /
Moar blushing pears, then ill THINK of running the malware
https://litter.catbox.moe/y2kdz9.ziphere it is if you want it. it wont wreck your computer but you will have to restart it
>y2k
>>2123zip bomb?it seems to extract fine for linux$ unzip y2kdz9.zip Archive: y2kdz9.zip extracting: heyuritan_01.png extracting: heyuritan_02.png extracting: nurse_01.png extracting: nurse_02.png inflating: pear_01.png extracting: pear_02.png except there is pear inflation...
$ unzip y2kdz9.zip Archive: y2kdz9.zip extracting: heyuritan_01.png extracting: heyuritan_02.png extracting: nurse_01.png extracting: nurse_02.png inflating: pear_01.png extracting: pear_02.png
teh loveliest malware ive ever seen! ヽ(´∇`)ノヽ(´∇`)ノヽ(´∇`)ノヽ(´∇`)ノ
okauy
I've no clue what any of this Termux terminal is saying, what is the malware doing exactly?
>>2147The script you uploaded to your site is indeed malicious. Here is a summary of what it does:1. **Elevation**: It attempts to elevate its privileges if not already running with elevated permissions.2. **Registry Modifications**: It modifies several registry settings to disrupt normal system operation, such as: - Changing the computer name and various registry entries to "Bolbi." - Hiding files and folders. - Changing system policies to disable task manager, control panel, and other system tools. - Modifying file associations and disabling certain security tools.3. **File and Folder Operations**: It creates and hides specific folders and files.4. **Downloading Files**: It downloads files (e.g., images and audio files) from specified URLs.5. **Message Display**: It shows messages like "BANZAIIIII!!!" and "Bolbi has made the use of this file forbidden!"6. **Sound Playback**: It plays a downloaded MP3 file repeatedly.7. **Batch File Creation**: It creates a batch file that can alter system settings and file permissions.8. **Propagation**: It attempts to copy itself to numerous locations and clone itself with various names.9. **File Destruction**: It modifies and overwrites certain file types (e.g., documents, executables) with malicious code.This script is designed to cause significant disruption, data loss, and system instability. It should be removed immediately, and you should run a thorough antivirus scan to ensure no remnants are left. If this script has been executed, you may need to restore your system from a backup or reinstall the operating system.
https://youtu.be/qGDI1wgL1LM