| Time & API |
Arguments |
Status |
Return |
Repeated |
1619999682.837822
NtAllocateVirtualMemory
|
process_identifier:
2772
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00360000
|
success
|
0 |
0
|
1619999683.259822
NtProtectVirtualMemory
|
process_identifier:
2772
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
57344
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00456000
|
success
|
0 |
0
|
1619999683.275822
NtAllocateVirtualMemory
|
process_identifier:
2772
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00660000
|
success
|
0 |
0
|
1620011909.831875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00400000
|
success
|
0 |
0
|
1620011909.878875
NtAllocateVirtualMemory
|
process_identifier:
2252
region_size:
1638400
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x01eb0000
|
success
|
0 |
0
|
1620011909.878875
NtAllocateVirtualMemory
|
process_identifier:
2252
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02000000
|
success
|
0 |
0
|
1620011909.878875
NtAllocateVirtualMemory
|
process_identifier:
2252
region_size:
311296
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
base_address:
0x00550000
|
success
|
0 |
0
|
1620011909.878875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
282624
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00552000
|
success
|
0 |
0
|
1620011910.191875
NtAllocateVirtualMemory
|
process_identifier:
2252
region_size:
1572864
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x02040000
|
success
|
0 |
0
|
1620011910.191875
NtAllocateVirtualMemory
|
process_identifier:
2252
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x02180000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x77d4f000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76353000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76354000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x003e2000
|
success
|
0 |
0
|
1620011910.660875
NtProtectVirtualMemory
|
process_identifier:
2252
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x76351000
|
success
|
0 |
0
|