NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
98304
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x00440000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
61440
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x00575000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
32768
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x0057c000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtAllocateVirtualMemory
|
process_identifier:
1516
region_size:
100003840
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x020b0000
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
49152
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x00583000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
16384
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x0058b000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
40960
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x0058e000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
24576
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x00592000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
208896
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x00597000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
184320
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x0059d000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
438272
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x004f4000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtAllocateVirtualMemory
|
process_identifier:
1516
region_size:
462848
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x020b0000
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
196608
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x005c9000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
167936
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x005d0000
process_handle:
0xffffffff
|
1
|
0 |
0
|
NtProtectVirtualMemory
|
process_identifier:
1516
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
438272
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x004f4000
process_handle:
0xffffffff
|
1
|
0 |
0
|