| Time & API |
Arguments |
Status |
Return |
Repeated |
1619910848.684334
CreateProcessInternalW
|
thread_identifier:
152
thread_handle:
0x0000002c
process_identifier:
2616
current_directory:
filepath:
track:
1
command_line:
winver
filepath_r:
stack_pivoted:
0
creation_flags:
4
(CREATE_SUSPENDED)
process_handle:
0x00000074
inherit_handles:
0
|
success
|
1 |
0
|
1619910848.684334
NtGetContextThread
|
thread_handle:
0x0000002c
|
success
|
0 |
0
|
1619910848.684334
WriteProcessMemory
|
process_identifier:
2616
buffer:
è ÇWè Ãè ReadProcessMemory WÿÓÆè
VirtualAlloc WÿÓè [ë@ j@h 0 ÿ³W@ j ÿÐ
Àt ÇW@ j ÿ0WÿpÿpÿÖ
ÀtÇó
WÃÌ[ $ d¡0 @@ H y3 2 uò@ÃUåWEÂR<RxÂr Æ1ÉAÆ>ÇocAduïÆr$·4N4°r_ÉÂ
process_handle:
0x00000074
base_address:
0x008f16c1
|
success
|
1 |
0
|
1619910849.246334
NtResumeThread
|
thread_handle:
0x0000002c
suspend_count:
1
process_identifier:
2616
|
success
|
0 |
0
|
1619922132.39525
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x00000088
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x06cf0000
|
success
|
0 |
0
|
1619922132.39525
WriteProcessMemory
|
process_identifier:
1424
buffer:
process_handle:
0x00000088
base_address:
0x06cf0000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
276
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00210000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
276
buffer:
process_handle:
0x000000a4
base_address:
0x00210000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
372
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00c00000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
372
buffer:
process_handle:
0x000000a4
base_address:
0x00c00000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
424
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x01320000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
424
buffer:
process_handle:
0x000000a4
base_address:
0x01320000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
432
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00110000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
432
buffer:
process_handle:
0x000000a4
base_address:
0x00110000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
476
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00110000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
476
buffer:
process_handle:
0x000000a4
base_address:
0x00110000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
508
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001d0000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
508
buffer:
process_handle:
0x000000a4
base_address:
0x001d0000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
536
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x009e0000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
536
buffer:
process_handle:
0x000000a4
base_address:
0x009e0000
|
success
|
1 |
0
|
1619922138.41125
NtAllocateVirtualMemory
|
process_identifier:
544
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00190000
|
success
|
0 |
0
|
1619922138.41125
WriteProcessMemory
|
process_identifier:
544
buffer:
process_handle:
0x000000a4
base_address:
0x00190000
|
success
|
1 |
0
|
1619922138.42625
NtAllocateVirtualMemory
|
process_identifier:
656
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00400000
|
success
|
0 |
0
|
1619922138.42625
WriteProcessMemory
|
process_identifier:
656
buffer:
process_handle:
0x000000a4
base_address:
0x00400000
|
success
|
1 |
0
|
1619922138.42625
NtAllocateVirtualMemory
|
process_identifier:
720
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x000d0000
|
success
|
0 |
0
|
1619922138.42625
WriteProcessMemory
|
process_identifier:
720
buffer:
process_handle:
0x000000a4
base_address:
0x000d0000
|
success
|
1 |
0
|
1619922138.42625
NtAllocateVirtualMemory
|
process_identifier:
788
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x001c0000
|
success
|
0 |
0
|
1619922138.42625
WriteProcessMemory
|
process_identifier:
788
buffer:
process_handle:
0x000000a4
base_address:
0x001c0000
|
success
|
1 |
0
|
1619922138.42625
NtAllocateVirtualMemory
|
process_identifier:
868
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00e50000
|
success
|
0 |
0
|
1619922138.42625
WriteProcessMemory
|
process_identifier:
868
buffer:
process_handle:
0x000000a4
base_address:
0x00e50000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
924
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00e50000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
924
buffer:
process_handle:
0x000000a4
base_address:
0x00e50000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
956
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00f70000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
956
buffer:
process_handle:
0x000000a4
base_address:
0x00f70000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
540
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00d10000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
540
buffer:
process_handle:
0x000000a4
base_address:
0x00d10000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1080
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x014f0000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1080
buffer:
process_handle:
0x000000a4
base_address:
0x014f0000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1260
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00190000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1260
buffer:
process_handle:
0x000000a4
base_address:
0x00190000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1288
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00180000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1288
buffer:
process_handle:
0x000000a4
base_address:
0x00180000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1336
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00350000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1336
buffer:
process_handle:
0x000000a4
base_address:
0x00350000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1384
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00130000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1384
buffer:
process_handle:
0x000000a4
base_address:
0x00130000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1424
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x06d10000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1424
buffer:
process_handle:
0x000000a4
base_address:
0x06d10000
|
success
|
1 |
0
|
1619922138.44225
NtAllocateVirtualMemory
|
process_identifier:
1592
region_size:
24576
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0x000000a4
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x004b0000
|
success
|
0 |
0
|
1619922138.44225
WriteProcessMemory
|
process_identifier:
1592
buffer:
process_handle:
0x000000a4
base_address:
0x004b0000
|
success
|
1 |
0
|