Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) has what appears to be a double extension. | 8/2/2024, 7:20:36 AM |
kyrazongame-ns.exe.exe (PID: 4992) has what appears to be a double extension. | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 11832) has what appears to be a double extension. | 8/2/2024, 7:20:44 AM |
Description | Time |
---|---|
tasklist.exe (PID: 8160) executed with arguments: /nh /fo csv | 8/2/2024, 7:21:23 AM |
Description | Time |
---|---|
powershell.exe (PID: 1892) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 944) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 12732) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 9072) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:00 AM |
powershell.exe (PID: 10580) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:00 AM |
powershell.exe (PID: 2072) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 5700) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:08 AM |
powershell.exe (PID: 7844) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:08 AM |
powershell.exe (PID: 2264) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:08 AM |
powershell.exe (PID: 8128) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:08 AM |
powershell.exe (PID: 10108) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:08 AM |
powershell.exe (PID: 11620) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 7348) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 6216) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:16 AM |
powershell.exe (PID: 8880) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:19 AM |
Description | Time |
---|---|
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_cybpchoj.4es.ps1 was created by powershell.exe (PID:1892) and deleted by powershell.exe (PID: 1892) | 8/2/2024, 7:20:53 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_g1f13y2w.x3x.ps1 was created by powershell.exe (PID:944) and deleted by powershell.exe (PID: 944) | 8/2/2024, 7:20:53 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_4gecncla.1ne.ps1 was created by powershell.exe (PID:12732) and deleted by powershell.exe (PID: 12732) | 8/2/2024, 7:20:53 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_uq3u2l33.fwp.ps1 was created by powershell.exe (PID:9072) and deleted by powershell.exe (PID: 9072) | 8/2/2024, 7:21:01 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_odqzsguu.ywl.ps1 was created by powershell.exe (PID:10580) and deleted by powershell.exe (PID: 10580) | 8/2/2024, 7:21:01 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_0i4415gj.ccp.ps1 was created by powershell.exe (PID:2072) and deleted by powershell.exe (PID: 2072) | 8/2/2024, 7:21:01 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_oz5hcc5s.num.ps1 was created by powershell.exe (PID:5700) and deleted by powershell.exe (PID: 5700) | 8/2/2024, 7:21:09 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_d4hqtiv1.szj.ps1 was created by powershell.exe (PID:7844) and deleted by powershell.exe (PID: 7844) | 8/2/2024, 7:21:09 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_ze3la3ao.4pk.ps1 was created by powershell.exe (PID:2264) and deleted by powershell.exe (PID: 2264) | 8/2/2024, 7:21:09 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_omo0eak2.qdo.ps1 was created by powershell.exe (PID:8128) and deleted by powershell.exe (PID: 8128) | 8/2/2024, 7:21:10 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_etuaeiuw.bh3.ps1 was created by powershell.exe (PID:10108) and deleted by powershell.exe (PID: 10108) | 8/2/2024, 7:21:11 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_s1rh2uld.yhz.ps1 was created by powershell.exe (PID:11620) and deleted by powershell.exe (PID: 11620) | 8/2/2024, 7:21:11 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_m50lbdvp.crt.ps1 was created by powershell.exe (PID:7348) and deleted by powershell.exe (PID: 7348) | 8/2/2024, 7:21:11 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_p30gpycy.vrl.ps1 was created by powershell.exe (PID:6216) and deleted by powershell.exe (PID: 6216) | 8/2/2024, 7:21:16 AM |
c:\users\ieuser\appdata\local\temp\__psscriptpolicytest_tfpo1gxq.qze.ps1 was created by powershell.exe (PID:8880) and deleted by powershell.exe (PID: 8880) | 8/2/2024, 7:21:19 AM |
Description | Time |
---|---|
reg.exe (PID: 12676) modified HKU\s-1-5-21-321011808-3761883066-353627080-1000\software\microsoft\windows\currentversion\run\svchost = C:\Users\IEUser\AppData\Local\Microsoft\Windows\0\svchost.exe | 8/2/2024, 7:21:26 AM |
Description | Time |
---|---|
cmd.exe (PID: 152) executed with arguments: /d /s /c "chcp" | 8/2/2024, 7:20:43 AM |
cmd.exe (PID: 10128) executed with arguments: /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Martin Prikryl\WinSCP 2\Sessions"" | 8/2/2024, 7:20:47 AM |
cmd.exe (PID: 7276) executed with arguments: /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%" | 8/2/2024, 7:20:51 AM |
cmd.exe (PID: 11668) executed with arguments: /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log"" | 8/2/2024, 7:21:00 AM |
cmd.exe (PID: 1796) executed with arguments: /d /s /c "reg query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0" /v FeatureSet" | 8/2/2024, 7:21:00 AM |
cmd.exe (PID: 13000) executed with arguments: /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v svchost /t REG_SZ /d C:\Users\IEUser\AppData\Local\Microsoft\Windows\0\svchost.exe /f" | 8/2/2024, 7:21:26 AM |
Description | Time |
---|---|
powershell.exe (PID: 1892) conducted Process Discovery | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 1892) conducted Process Discovery | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 944) conducted Process Discovery | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 944) conducted Process Discovery | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 12732) conducted Process Discovery | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 12732) conducted Process Discovery | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 9072) conducted Process Discovery | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 9072) conducted Process Discovery | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 10580) conducted Process Discovery | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 10580) conducted Process Discovery | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 2072) conducted Process Discovery | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 2072) conducted Process Discovery | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 5700) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 5700) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 7844) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 7844) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 2264) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 2264) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 8128) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 8128) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 10108) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 10108) conducted Process Discovery | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 11620) conducted Process Discovery | 8/2/2024, 7:21:10 AM |
powershell.exe (PID: 11620) conducted Process Discovery | 8/2/2024, 7:21:10 AM |
powershell.exe (PID: 7348) conducted Process Discovery | 8/2/2024, 7:21:11 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: explorer.exe (PID: 6048) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: windowsinternal.composableshell.experiences.textinput.inputapp.exe (PID: 8024) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: searchui.exe (PID: 7084) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: shellexperiencehost.exe (PID: 6832) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: explorer.exe (PID: 6048) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: microsoftedgecp.exe (PID: 10948) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: procexp64.exe (PID: 1732) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: microsoftedgecp.exe (PID: 7860) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: systemsettings.exe (PID: 3152) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: cptraywui.exe (PID: 10820) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: microsoftedgecp.exe (PID: 3720) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: winstore.app.exe (PID: 7448) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: taskmgr.exe (PID: 7268) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: taskmgr.exe (PID: 7268) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: applicationframehost.exe (PID: 7552) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: procexp64.exe (PID: 1732) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: microsoftedgecp.exe (PID: 12752) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: microsoftedge.exe (PID: 7616) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: microsoftedgecp.exe (PID: 10508) | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: kyrazongame-ns.exe.exe (PID: 4992) | 8/2/2024, 7:20:46 AM |
kyrazongame-ns.exe.exe (PID: 8060) conducted App Window Discovery with target: cptraywui.exe (PID: 10820) | 8/2/2024, 7:21:27 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) succeeded to terminate process c:\windows\system32\windowspowershell\v1.0\powershell.exe (PID: 8128) | 8/2/2024, 7:21:16 AM |
kyrazongame-ns.exe.exe (PID: 8060) failed to terminate process c:\windows\system32\windowspowershell\v1.0\powershell.exe (PID: 8128) | 8/2/2024, 7:21:16 AM |
kyrazongame-ns.exe.exe (PID: 8060) succeeded to terminate process c:\windows\system32\windowspowershell\v1.0\powershell.exe (PID: 7348) | 8/2/2024, 7:21:16 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) executed. | 8/2/2024, 7:20:36 AM |
kyrazongame-ns.exe.exe (PID: 4992) executed with arguments: --type=gpu-process --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:2 | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 11832) executed with arguments: --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --field-trial-handle=2244,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:3 | 8/2/2024, 7:20:44 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) executed. | 8/2/2024, 7:20:36 AM |
kyrazongame-ns.exe.exe (PID: 4992) executed with arguments: --type=gpu-process --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:2 | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 11832) executed with arguments: --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --field-trial-handle=2244,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:3 | 8/2/2024, 7:20:44 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) connected to: 34.117.59.81/:443 | 8/2/2024, 7:20:47 AM |
kyrazongame-ns.exe.exe (PID: 8060) connected to: 34.117.59.81/:443 | 8/2/2024, 7:20:47 AM |
kyrazongame-ns.exe.exe (PID: 8060) connected to: 34.117.59.81/:443 | 8/2/2024, 7:20:47 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) connected via HTTPS to 34.117.59.81/ | 8/2/2024, 7:20:47 AM |
kyrazongame-ns.exe.exe (PID: 8060) connected via HTTPS to 34.117.59.81/ | 8/2/2024, 7:20:47 AM |
kyrazongame-ns.exe.exe (PID: 8060) connected via HTTPS to 34.117.59.81/ | 8/2/2024, 7:20:47 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) has what appears to be a double extension. | 8/2/2024, 7:20:36 AM |
kyrazongame-ns.exe.exe (PID: 4992) has what appears to be a double extension. | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 11832) has what appears to be a double extension. | 8/2/2024, 7:20:44 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) has an invalid certificate name of: Image is not signed | 8/2/2024, 7:20:10 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) succeeded to inject into c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq\kyrazongame-ns.exe.exe (PID: 4992) | 8/2/2024, 7:20:44 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) created app-64.7z in c:\users\ieuser\appdata\local\temp\nsm72db.tmp | 8/2/2024, 7:20:14 AM |
kyrazongame-ns.exe.exe (PID: 8060) created aura-ieuser.zip in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:25 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) executed. | 8/2/2024, 7:20:10 AM |
Description | Time |
---|---|
powershell.exe (PID: 1892) created __psscriptpolicytest_cybpchoj.4es.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 12732) created __psscriptpolicytest_4gecncla.1ne.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 944) created __psscriptpolicytest_g1f13y2w.x3x.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:20:53 AM |
powershell.exe (PID: 9072) created __psscriptpolicytest_uq3u2l33.fwp.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 10580) created __psscriptpolicytest_odqzsguu.ywl.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 2072) created __psscriptpolicytest_0i4415gj.ccp.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:01 AM |
powershell.exe (PID: 5700) created __psscriptpolicytest_oz5hcc5s.num.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 7844) created __psscriptpolicytest_d4hqtiv1.szj.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 2264) created __psscriptpolicytest_ze3la3ao.4pk.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 8128) created __psscriptpolicytest_omo0eak2.qdo.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:09 AM |
powershell.exe (PID: 10108) created __psscriptpolicytest_etuaeiuw.bh3.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:10 AM |
powershell.exe (PID: 11620) created __psscriptpolicytest_s1rh2uld.yhz.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:11 AM |
powershell.exe (PID: 7348) created __psscriptpolicytest_m50lbdvp.crt.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:11 AM |
powershell.exe (PID: 6216) created __psscriptpolicytest_p30gpycy.vrl.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:16 AM |
powershell.exe (PID: 8880) created __psscriptpolicytest_tfpo1gxq.qze.ps1 in c:\users\ieuser\appdata\local\temp | 8/2/2024, 7:21:19 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) executed. | 8/2/2024, 7:20:36 AM |
cmd.exe (PID: 152) executed with arguments: /d /s /c "chcp" | 8/2/2024, 7:20:43 AM |
conhost.exe (PID: 11620) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:20:43 AM |
chcp.com (PID: 5084) executed. | 8/2/2024, 7:20:43 AM |
kyrazongame-ns.exe.exe (PID: 4992) executed with arguments: --type=gpu-process --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:2 | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 11832) executed with arguments: --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --field-trial-handle=2244,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:3 | 8/2/2024, 7:20:44 AM |
cmd.exe (PID: 10128) executed with arguments: /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Martin Prikryl\WinSCP 2\Sessions"" | 8/2/2024, 7:20:47 AM |
conhost.exe (PID: 13180) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:20:47 AM |
reg.exe (PID: 6192) executed with arguments: QUERY "HKCU\Software\Martin Prikryl\WinSCP 2\Sessions" | 8/2/2024, 7:20:47 AM |
cmd.exe (PID: 7276) executed with arguments: /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%" | 8/2/2024, 7:20:51 AM |
conhost.exe (PID: 4508) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:20:51 AM |
powershell.exe (PID: 1892) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 944) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 12732) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:20:52 AM |
conhost.exe (PID: 11572) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:20:52 AM |
conhost.exe (PID: 1768) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:20:52 AM |
conhost.exe (PID: 1872) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:20:52 AM |
cmd.exe (PID: 11668) executed with arguments: /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log"" | 8/2/2024, 7:21:00 AM |
conhost.exe (PID: 8028) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:21:00 AM |
findstr.exe (PID: 2580) executed with arguments: /C:"Detected boot environment" "C:\Windows\Panther\setupact.log" | 8/2/2024, 7:21:00 AM |
cmd.exe (PID: 1796) executed with arguments: /d /s /c "reg query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0" /v FeatureSet" | 8/2/2024, 7:21:00 AM |
conhost.exe (PID: 4108) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:21:00 AM |
reg.exe (PID: 5244) executed with arguments: query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0" /v FeatureSet | 8/2/2024, 7:21:00 AM |
powershell.exe (PID: 9072) executed with arguments: -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command - | 8/2/2024, 7:21:00 AM |
conhost.exe (PID: 11920) executed with arguments: 0xffffffff -ForceV1 | 8/2/2024, 7:21:00 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) connected to: 163.5.112.21/customer/upload:3000 | 8/2/2024, 7:21:26 AM |
Description | Time |
---|---|
reg.exe (PID: 6192) executed with arguments: QUERY "HKCU\Software\Martin Prikryl\WinSCP 2\Sessions" | 8/2/2024, 7:20:47 AM |
reg.exe (PID: 5244) executed with arguments: query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0" /v FeatureSet | 8/2/2024, 7:21:00 AM |
reg.exe (PID: 10776) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 2532) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 4944) executed with arguments: QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager" | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 1456) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 10448) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 12524) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 1400) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40 | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 8936) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 8440) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 7424) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 12780) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 12700) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2 | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 13100) executed with arguments: QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ProPlus2021Volume - en-us" | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 1872) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 8524) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 10104) executed with arguments: QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinRAR archiver" | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 9716) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1FF5D624-5515-4343-837A-E54C101573E6} | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 11900) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{211EBCE0-A1F0-466C-BA4B-EED02E75BAB5} | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 7592) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{26A24AE4-039D-4CA4-87B4-2F64180321F0} | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 2584) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{2DFD24A2-69EC-4BAE-81DE-5B8F5B87EA14} | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 13232) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{43AC067E-E383-4610-914E-7034CBF422E6} | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 6360) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 4792) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{620A7633-7A09-42A8-8580-076A4483C4B0} | 8/2/2024, 7:21:24 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) executed. | 8/2/2024, 7:20:10 AM |
kyrazongame-ns.exe.exe (PID: 8060) executed. | 8/2/2024, 7:20:36 AM |
kyrazongame-ns.exe.exe (PID: 4992) executed with arguments: --type=gpu-process --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1888 /prefetch:2 | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 11832) executed with arguments: --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\IEUser\AppData\Roaming\KyrazonGame" --field-trial-handle=2244,i,17194741437871258966,7524705200630508141,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:3 | 8/2/2024, 7:20:44 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) created koffi.node in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out\node_modules\koffi\build\koffi\win32_arm64 | 8/2/2024, 7:20:23 AM |
kyrazon setup.exe (PID: 488) created koffi.node in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out\node_modules\koffi\build\koffi\win32_ia32 | 8/2/2024, 7:20:23 AM |
kyrazon setup.exe (PID: 488) created koffi.node in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out\node_modules\koffi\build\koffi\win32_x64 | 8/2/2024, 7:20:23 AM |
kyrazon setup.exe (PID: 488) created kyrazongame-ns.exe.exe in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:30 AM |
kyrazon setup.exe (PID: 488) created elevate.exe in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out\resources | 8/2/2024, 7:20:32 AM |
kyrazon setup.exe (PID: 488) created kyrazongame-ns.exe.exe in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created koffi.node in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq\node_modules\koffi\build\koffi\win32_arm64 | 8/2/2024, 7:20:36 AM |
kyrazon setup.exe (PID: 488) created koffi.node in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq\node_modules\koffi\build\koffi\win32_ia32 | 8/2/2024, 7:20:36 AM |
kyrazon setup.exe (PID: 488) created koffi.node in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq\node_modules\koffi\build\koffi\win32_x64 | 8/2/2024, 7:20:36 AM |
kyrazon setup.exe (PID: 488) created elevate.exe in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq\resources | 8/2/2024, 7:20:36 AM |
kyrazongame-ns.exe.exe (PID: 8060) created svchost.exe in c:\users\ieuser\appdata\local\microsoft\windows\0 | 8/2/2024, 7:21:25 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) created system.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp | 8/2/2024, 7:20:13 AM |
kyrazon setup.exe (PID: 488) created nsis7z.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp | 8/2/2024, 7:20:15 AM |
kyrazon setup.exe (PID: 488) created d3dcompiler_47.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:30 AM |
kyrazon setup.exe (PID: 488) created ffmpeg.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:30 AM |
kyrazon setup.exe (PID: 488) created libegl.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:32 AM |
kyrazon setup.exe (PID: 488) created libglesv2.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:32 AM |
kyrazon setup.exe (PID: 488) created vk_swiftshader.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:32 AM |
kyrazon setup.exe (PID: 488) created vulkan-1.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp\7z-out | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created d3dcompiler_47.dll in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created ffmpeg.dll in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created libegl.dll in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created libglesv2.dll in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created vk_swiftshader.dll in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:33 AM |
kyrazon setup.exe (PID: 488) created vulkan-1.dll in c:\users\ieuser\appdata\local\temp\2k4lpey89rbnqfw0cpbjnwkthvq | 8/2/2024, 7:20:34 AM |
kyrazon setup.exe (PID: 488) created stdutils.dll in c:\users\ieuser\appdata\local\temp\nsm72db.tmp | 8/2/2024, 7:20:36 AM |
Description | Time |
---|---|
kyrazongame-ns.exe.exe (PID: 8060) modified HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-321011808-3761883066-353627080-1000\\device\harddiskvolume1\windows\system32\cmd.exe | 8/2/2024, 7:20:43 AM |
kyrazongame-ns.exe.exe (PID: 8060) modified HKU\s-1-5-21-321011808-3761883066-353627080-1000\software\microsoft\spelling\ | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 8060) modified HKU\s-1-5-21-321011808-3761883066-353627080-1000\software\microsoft\spelling\dictionaries\ | 8/2/2024, 7:20:46 AM |
kyrazongame-ns.exe.exe (PID: 8060) modified HKU\s-1-5-21-321011808-3761883066-353627080-1000\software\microsoft\spelling\options\ | 8/2/2024, 7:20:46 AM |
kyrazongame-ns.exe.exe (PID: 8060) modified HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-321011808-3761883066-353627080-1000\\device\harddiskvolume1\windows\system32\windowspowershell\v1.0\powershell.exe | 8/2/2024, 7:20:52 AM |
reg.exe (PID: 2532) executed with arguments: QUERY HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook | 8/2/2024, 7:21:24 AM |
reg.exe (PID: 10020) executed with arguments: QUERY HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook | 8/2/2024, 7:21:25 AM |
reg.exe (PID: 12676) executed with arguments: ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v svchost /t REG_SZ /d C:\Users\IEUser\AppData\Local\Microsoft\Windows\0\svchost.exe /f | 8/2/2024, 7:21:26 AM |
reg.exe (PID: 12676) modified HKU\s-1-5-21-321011808-3761883066-353627080-1000\software\microsoft\windows\currentversion\run\svchost = C:\Users\IEUser\AppData\Local\Microsoft\Windows\0\svchost.exe | 8/2/2024, 7:21:26 AM |
Description | Time |
---|---|
cmd.exe (PID: 152) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:43 AM |
conhost.exe (PID: 11620) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:43 AM |
chcp.com (PID: 5084) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:43 AM |
cmd.exe (PID: 10128) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:47 AM |
conhost.exe (PID: 13180) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:47 AM |
reg.exe (PID: 6192) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:47 AM |
cmd.exe (PID: 7276) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:51 AM |
conhost.exe (PID: 4508) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:51 AM |
powershell.exe (PID: 1892) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 944) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:52 AM |
powershell.exe (PID: 12732) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:52 AM |
conhost.exe (PID: 11572) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:52 AM |
conhost.exe (PID: 1768) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:52 AM |
conhost.exe (PID: 1872) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:20:52 AM |
cmd.exe (PID: 11668) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
conhost.exe (PID: 8028) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
findstr.exe (PID: 2580) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
cmd.exe (PID: 1796) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
conhost.exe (PID: 4108) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
reg.exe (PID: 5244) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
powershell.exe (PID: 9072) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
conhost.exe (PID: 11920) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
powershell.exe (PID: 10580) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:00 AM |
powershell.exe (PID: 2072) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:01 AM |
conhost.exe (PID: 12980) has an valid certificate name of: Microsoft Windows | 8/2/2024, 7:21:01 AM |
Description | Time |
---|---|
kyrazon setup.exe (PID: 488) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\ | 8/2/2024, 7:20:13 AM |
kyrazon setup.exe (PID: 488) accessed HKLM\system\controlset001\control\nls\language\ | 8/2/2024, 7:20:13 AM |
kyrazon setup.exe (PID: 488) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\muicached\ | 8/2/2024, 7:20:13 AM |
kyrazon setup.exe (PID: 488) accessed HKLM\system\controlset001\control\computername\activecomputername\ | 8/2/2024, 7:20:15 AM |
kyrazon setup.exe (PID: 488) accessed HKLM\software\microsoft\windows\currentversion\appmodelunlock\ | 8/2/2024, 7:20:33 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\ | 8/2/2024, 7:20:39 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\muicached\ | 8/2/2024, 7:20:39 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKLM\software\microsoft\windows nt\currentversion\ | 8/2/2024, 7:20:39 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\keyboard layout\preload\ | 8/2/2024, 7:20:39 AM |
conhost.exe (PID: 11620) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\ | 8/2/2024, 7:20:43 AM |
conhost.exe (PID: 11620) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\muicached\ | 8/2/2024, 7:20:43 AM |
cmd.exe (PID: 152) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\ | 8/2/2024, 7:20:43 AM |
cmd.exe (PID: 152) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\muicached\ | 8/2/2024, 7:20:43 AM |
chcp.com (PID: 5084) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\ | 8/2/2024, 7:20:43 AM |
chcp.com (PID: 5084) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\muicached\ | 8/2/2024, 7:20:43 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKLM\system\controlset001\control\computername\activecomputername\ | 8/2/2024, 7:20:43 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKLM\software\microsoft\windows\currentversion\appmodelunlock\ | 8/2/2024, 7:20:43 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKLM\system\controlset001\control\class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000\ | 8/2/2024, 7:20:43 AM |
kyrazongame-ns.exe.exe (PID: 8060) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\international\geo\ | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 4992) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\ | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 4992) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\desktop\muicached\ | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 4992) accessed HKU\s-1-5-21-321011808-3761883066-353627080-1000\control panel\international\ | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 4992) accessed HKLM\software\microsoft\windows nt\currentversion\ | 8/2/2024, 7:20:44 AM |
kyrazongame-ns.exe.exe (PID: 4992) accessed HKLM\system\controlset001\control\computername\activecomputername\ | 8/2/2024, 7:20:45 AM |
kyrazongame-ns.exe.exe (PID: 4992) accessed HKLM\system\controlset001\control\class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000\ | 8/2/2024, 7:20:45 AM |