Time & API |
Arguments |
Status |
Return |
Repeated |
1620985520.078625
NtProtectVirtualMemory
|
process_identifier:
2504
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1620985520.078625
NtProtectVirtualMemory
|
process_identifier:
2504
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
90112
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00401000
|
success
|
0 |
0
|
1620985520.078625
NtProtectVirtualMemory
|
process_identifier:
2504
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
131072
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00420000
|
success
|
0 |
0
|
1621005941.005124
NtAllocateVirtualMemory
|
process_identifier:
2632
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x01ff0000
|
success
|
0 |
0
|
1621005942.568124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
3231744
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x100d1000
|
success
|
0 |
0
|
1621005942.568124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
634880
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x10001000
|
success
|
0 |
0
|
1621005943.458124
NtAllocateVirtualMemory
|
process_identifier:
2632
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x03fa0000
|
success
|
0 |
0
|
1621005944.849124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
32768
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fb1000
|
success
|
0 |
0
|
1621005944.849124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fbc000
|
success
|
0 |
0
|
1621005944.849124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fbd000
|
success
|
0 |
0
|
1621005944.849124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fbe000
|
success
|
0 |
0
|
1621005944.927124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
49152
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fc1000
|
success
|
0 |
0
|
1621005944.927124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fd0000
|
success
|
0 |
0
|
1621005944.927124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
8192
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fd1000
|
success
|
0 |
0
|
1621005944.927124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
8192
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x03fd3000
|
success
|
0 |
0
|
1621005946.474124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.490124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.521124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.568124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.583124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.599124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.615124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.646124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.677124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|
1621005946.849124
NtProtectVirtualMemory
|
process_identifier:
2632
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x040e0000
|
success
|
0 |
0
|