News
In reality, it's used to run a malicious Python script. The attack relies upon the use of VS Code, which, if not present on the machine, will be deployed via the installation of the VS Code ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results