| Time & API |
Arguments |
Status |
Return |
Repeated |
1619134515.38885
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003f0000
|
success
|
0 |
0
|
1619134515.41985
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
77824
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00467000
|
success
|
0 |
0
|
1619134515.41985
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00550000
|
success
|
0 |
0
|
1619152697.280375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1619152697.311375
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
1572864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x01f20000
|
success
|
0 |
0
|
1619152697.311375
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02060000
|
success
|
0 |
0
|
1619152697.311375
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
368640
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x01d80000
|
success
|
0 |
0
|
1619152697.311375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
339968
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01d82000
|
success
|
0 |
0
|
1619152697.608375
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
1507328
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x020a0000
|
success
|
0 |
0
|
1619152697.608375
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x021d0000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x77d4f000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619152698.108375
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|