![]() ![]() Malicious artifacts seen in the context of a contacted hostįound malicious artifacts related to "90.156.201.39". "DevXUnityUnpackerRun.exe" wrote 4 bytes to a remote process "C:\Windows\Microsoft.NET\Framework\v9\csc.exe" (Handle: 532) "DevXUnityUnpackerRun.exe" wrote 52 bytes to a remote process "C:\Windows\Microsoft.NET\Framework\v9\csc.exe" (Handle: 532) ![]() ![]() "DevXUnityUnpackerRun.exe" wrote 32 bytes to a remote process "C:\Windows\Microsoft.NET\Framework\v9\csc.exe" (Handle: 532) "DevXUnityUnpackerToolsSetup.tmp" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\DevXUnityUnpackerMagicTools-Demo\DevXUnityUnpackerRun.exe" (Handle: 648) ![]() "DevXUnityUnpackerToolsSetup.tmp" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\DevXUnityUnpackerMagicTools-Demo\DevXUnityUnpackerRun.exe" (Handle: 648) "DevXUnityUnpackerToolsSetup.tmp" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\DevXUnityUnpackerMagicTools-Demo\DevXUnityUnpackerRun.exe" (Handle: 648) "" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\is-PP5IS.tmp\DevXUnityUnpackerToolsSetup.tmp" (Handle: 220) "" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\is-PP5IS.tmp\DevXUnityUnpackerToolsSetup.tmp" (Handle: 220) "" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\is-PP5IS.tmp\DevXUnityUnpackerToolsSetup.tmp" (Handle: 220) "" wrote 1500 bytes to a remote process "%TEMP%\is-PP5IS.tmp\DevXUnityUnpackerToolsSetup.tmp" (Handle: 220) ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |