| Time & API |
Arguments |
Status |
Return |
Repeated |
1620762779.48425
NtAllocateVirtualMemory
|
process_identifier:
1436
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003e0000
|
success
|
0 |
0
|
1620762779.70325
NtProtectVirtualMemory
|
process_identifier:
1436
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
40960
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00452000
|
success
|
0 |
0
|
1620762779.70325
NtAllocateVirtualMemory
|
process_identifier:
1436
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x005a0000
|
success
|
0 |
0
|
1620762780.063
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1620762780.094
NtAllocateVirtualMemory
|
process_identifier:
1688
region_size:
917504
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00680000
|
success
|
0 |
0
|
1620762780.094
NtAllocateVirtualMemory
|
process_identifier:
1688
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00720000
|
success
|
0 |
0
|
1620762780.094
NtAllocateVirtualMemory
|
process_identifier:
1688
region_size:
335872
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00680000
|
success
|
0 |
0
|
1620762780.094
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
307200
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00682000
|
success
|
0 |
0
|
1620762780.453
NtAllocateVirtualMemory
|
process_identifier:
1688
region_size:
2031616
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x02230000
|
success
|
0 |
0
|
1620762780.453
NtAllocateVirtualMemory
|
process_identifier:
1688
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x023e0000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x77d4f000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x020c2000
|
success
|
0 |
0
|
1620762783.109
NtProtectVirtualMemory
|
process_identifier:
1688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|