Ultraviewer
Appsv2
Author: Ryan McVicar, Sam Smoker
description
UltraViewer
paths
4 paths
Remote AccessUltraViewer User Logs
C:\Users\%user%\AppData\Roaming\UltraViewerIncludes all files related to UltraViewer chat, connections, and recordings
Remote AccessUltraViewer System Logs
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\UltraViewerIncludes all files related to UltraViewer chat, connections, and recordings
Remote AccessUltraViewer Service Log
C:\Program Files*\UltraViewerUltraViewerService_log.txtUltraViewer Service log file
Remote AccessUltraViewer Connection Log
C:\Program Files*\UltraViewerConnectionLog.LogUltraViewer Service level connection log
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: Ultraviewer
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. UltraViewer User Logs
$UserPath = Join-Path $env:USERPROFILE "AppData\Roaming\UltraViewer"
Collect-Artifact -SourcePath "$UserPath\*" -FolderName "UltraViewer_User_Logs"
# 2. UltraViewer System Logs
Collect-Artifact -SourcePath "C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\UltraViewer\*" -FolderName "UltraViewer_System_Logs"
# 3. UltraViewer Service Log
Collect-Artifact -SourcePath "C:\Program Files*\UltraViewer\UltraViewerService_log.txt" -FolderName "UltraViewer_Service_Log"
# 4. UltraViewer Connection Log
Collect-Artifact -SourcePath "C:\Program Files*\UltraViewer\ConnectionLog.Log" -FolderName "UltraViewer_Connection_Log"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1