| Time & API |
Arguments |
Status |
Return |
Repeated |
1619861116.507633
NtAllocateVirtualMemory
|
process_identifier:
2368
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003f0000
|
success
|
0 |
0
|
1619861116.647633
NtProtectVirtualMemory
|
process_identifier:
2368
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
65536
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00468000
|
success
|
0 |
0
|
1619861116.647633
NtAllocateVirtualMemory
|
process_identifier:
2368
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00510000
|
success
|
0 |
0
|
1619861117.605805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1619861117.668805
NtAllocateVirtualMemory
|
process_identifier:
472
region_size:
2097152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x01f20000
|
success
|
0 |
0
|
1619861117.668805
NtAllocateVirtualMemory
|
process_identifier:
472
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x020e0000
|
success
|
0 |
0
|
1619861117.683805
NtAllocateVirtualMemory
|
process_identifier:
472
region_size:
311296
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00550000
|
success
|
0 |
0
|
1619861117.683805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
282624
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00552000
|
success
|
0 |
0
|
1619861118.027805
NtAllocateVirtualMemory
|
process_identifier:
472
region_size:
786432
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x01e00000
|
success
|
0 |
0
|
1619861118.027805
NtAllocateVirtualMemory
|
process_identifier:
472
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x01e80000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x77d4f000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003c2000
|
success
|
0 |
0
|
1619861118.496805
NtProtectVirtualMemory
|
process_identifier:
472
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|