"" wrote 4 bytes to a remote process "C:\Program Files\Glary Utilities 5\StartupManager.exe" (Handle: 428) "" wrote 52 bytes to a remote process "C:\Program Files\Glary Utilities 5\StartupManager.exe" (Handle: 428) "" wrote 32 bytes to a remote process "C:\Program Files\Glary Utilities 5\StartupManager.exe" (Handle: 428) "" wrote 4 bytes to a remote process "C:\Program Files\Glary Utilities 5\DiskDefrag.exe" (Handle: 452) ![]() "" wrote 52 bytes to a remote process "C:\Program Files\Glary Utilities 5\DiskDefrag.exe" (Handle: 452) "" wrote 32 bytes to a remote process "C:\Program Files\Glary Utilities 5\DiskDefrag.exe" (Handle: 452) ![]() "" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\nsfAFC0.tmp\sendinfo.exe" (Handle: 436) "" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\nsfAFC0.tmp\sendinfo.exe" (Handle: 436) "" wrote 32 bytes to a remote process "%TEMP%\nsfAFC0.tmp\sendinfo.exe" (Handle: 436) ![]() Source Hybrid Analysis Technology relevance 8/10ĭrops executable files to the Windows system directory From DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show from DiskDefrag.exe (PID: 1348) ( Show at at at at at at 21000001400084C0
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |