| Process injection |
Process 1948 manipulating memory of non-child process 2852 |
| Time & API |
Arguments |
Status |
Return |
Repeated |
1619633623.9325
NtAllocateVirtualMemory
|
process_identifier:
2852
region_size:
73728
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x00000128
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00400000
|
success
|
0 |
0
|
1619633623.9325
NtProtectVirtualMemory
|
process_identifier:
2852
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
2
(PAGE_READONLY)
process_handle:
0x00000128
base_address:
0x00400000
|
success
|
0 |
0
|
1619633623.9325
NtProtectVirtualMemory
|
process_identifier:
2852
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
49152
protection:
32
(PAGE_EXECUTE_READ)
process_handle:
0x00000128
base_address:
0x00402000
|
success
|
0 |
0
|
1619633623.9325
NtProtectVirtualMemory
|
process_identifier:
2852
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
2
(PAGE_READONLY)
process_handle:
0x00000128
base_address:
0x0040e000
|
success
|
0 |
0
|
1619633623.9325
NtProtectVirtualMemory
|
process_identifier:
2852
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
2
(PAGE_READONLY)
process_handle:
0x00000128
base_address:
0x00410000
|
success
|
0 |
0
|