| Time & API |
Arguments |
Status |
Return |
Repeated |
1619793998.535124
NtAllocateVirtualMemory
|
process_identifier:
200
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003b0000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040e000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00408000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00408000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00408000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00403000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00408000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00404000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042d000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00409000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00409000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00409000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00409000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00409000
|
success
|
0 |
0
|
1619793998.660124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00408000
|
success
|
0 |
0
|
1619793999.816124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x745a1000
|
success
|
0 |
0
|
1619794000.035124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x74571000
|
success
|
0 |
0
|
1619794000.098124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x74551000
|
success
|
0 |
0
|
1619794000.098124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x750c1000
|
success
|
0 |
0
|
1619794000.129124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x74541000
|
success
|
0 |
0
|
1619794000.426124
NtProtectVirtualMemory
|
process_identifier:
200
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x752f1000
|
success
|
0 |
0
|