| Time & API |
Arguments |
Status |
Return |
Repeated |
1619910849.978608
NtAllocateVirtualMemory
|
process_identifier:
152
region_size:
184320
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x02310000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00401000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00402000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00403000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00404000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00405000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00406000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00407000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00408000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00409000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040a000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040b000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040c000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040d000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040e000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0040f000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00410000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00411000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00412000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00413000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00414000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00415000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00416000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00417000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00418000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00419000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041a000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041b000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041c000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041d000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041e000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0041f000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00420000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00421000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00422000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00423000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00424000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00425000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00426000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00427000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00428000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00429000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042a000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042b000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042c000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042d000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042e000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x0042f000
|
success
|
0 |
0
|
1619910858.010608
NtProtectVirtualMemory
|
process_identifier:
152
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00430000
|
success
|
0 |
0
|