On Windows, the constructor writes a PowerShell script to %TMP%\ab.ps1 that contains two Base64-encoded payloads: one gzipped blob decoded into a PowerShell command ($cmd) and a second Base64 string decoded into a Python source snippet. It launches powershell.exe with –ExecutionPolicy Bypass and –WindowStyle Hidden, uses Set-Content to overwrite the original .py file, invokes the decoded commands via Invoke-Expression, deletes ab.ps1 for cleanup, and then exits the Python process. This self-modifying, hidden execution pattern enables arbitrary code execution, stealthy persistence, and supply-chain/backdoor compromise.
Live on pypi for 119 days, 14 hours and 47 minutes before removal. Socket users were protected even while the package was live.