![]() ![]() ![]() "UltraViewer_setup_6.2_en.tmp" wrote 52 bytes to a remote process "C:\Windows\System32\taskkill.exe" (Handle: 536) "UltraViewer_setup_6.2_en.tmp" wrote 32 bytes to a remote process "C:\Windows\System32\taskkill.exe" (Handle: 536) "UltraViewer_setup_6.2_en.tmp" wrote 4 bytes to a remote process "C:\Windows\System32\sc.exe" (Handle: 476) "UltraViewer_setup_6.2_en.tmp" wrote 52 bytes to a remote process "C:\Windows\System32\sc.exe" (Handle: 476) "UltraViewer_setup_6.2_en.tmp" wrote 32 bytes to a remote process "C:\Windows\System32\sc.exe" (Handle: 476) "UltraViewer_setup_6.2_en.tmp" wrote 4 bytes to a remote process "C:\Windows\System32\net.exe" (Handle: 480) "UltraViewer_setup_6.2_en.tmp" wrote 52 bytes to a remote process "C:\Windows\System32\net.exe" (Handle: 480) "UltraViewer_setup_6.2_en.tmp" wrote 4 bytes to a remote process "C:\Windows\System32\net.exe" (Handle: 420) "UltraViewer_setup_6.2_en.tmp" wrote 52 bytes to a remote process "C:\Windows\System32\net.exe" (Handle: 420) "UltraViewer_setup_6.2_en.tmp" wrote 32 bytes to a remote process "C:\Windows\System32\net.exe" (Handle: 420) ![]() "UltraViewer_setup_6.2_en.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\is-B1S6J.tmp\UltraViewer_setup_6.2_en.tmp" (Handle: 168) "UltraViewer_setup_6.2_en.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\is-B1S6J.tmp\UltraViewer_setup_6.2_en.tmp" (Handle: 168) "UltraViewer_setup_6.2_en.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\is-B1S6J.tmp\UltraViewer_setup_6.2_en.tmp" (Handle: 168) "UltraViewer_setup_6.2_en.exe" wrote 1500 bytes to a remote process "%TEMP%\is-B1S6J.tmp\UltraViewer_setup_6.2_en.tmp" (Handle: 168) Sample was identified as malicious by at least one Antivirus engine ![]() Process "taskkill.exe" with commandline "/f /im "UltraViewer_Desktop.exe"" ( Show Process) ![]()
0 Comments
Leave a Reply. |