| Time & API |
Arguments |
Status |
Return |
Repeated |
1619426983.678793
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00590000
|
success
|
0 |
0
|
1619426983.896793
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
28672
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0045a000
|
success
|
0 |
0
|
1619426983.896793
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x01f70000
|
success
|
0 |
0
|
1619450411.89475
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1619450411.92575
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
1703936
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x01f20000
|
success
|
0 |
0
|
1619450411.92575
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02080000
|
success
|
0 |
0
|
1619450411.92575
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
335872
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00510000
|
success
|
0 |
0
|
1619450411.92575
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
307200
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00512000
|
success
|
0 |
0
|
1619450412.31675
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
983040
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x01f20000
|
success
|
0 |
0
|
1619450412.31675
NtAllocateVirtualMemory
|
process_identifier:
784
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x01fd0000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x77d4f000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x01f12000
|
success
|
0 |
0
|
1619450413.23875
NtProtectVirtualMemory
|
process_identifier:
784
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|