| Time & API |
Arguments |
Status |
Return |
Repeated |
1619283418.03525
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
1114112
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00670000
|
success
|
0 |
0
|
1619283418.03525
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00740000
|
success
|
0 |
0
|
1619283418.34825
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
2162688
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00ca0000
|
success
|
0 |
0
|
1619283418.34825
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00e70000
|
success
|
0 |
0
|
1619283418.50425
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x73e71000
|
success
|
0 |
0
|
1619283418.81625
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
655360
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
8192
(MEM_RESERVE)
base_address:
0x00470000
|
success
|
0 |
0
|
1619283418.81625
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x004d0000
|
success
|
0 |
0
|
1619283418.81625
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0039a000
|
success
|
0 |
0
|
1619283418.81625
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
8192
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x73e72000
|
success
|
0 |
0
|
1619283418.81625
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00392000
|
success
|
0 |
0
|
1619283419.20725
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003a2000
|
success
|
0 |
0
|
1619283419.30125
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00445000
|
success
|
0 |
0
|
1619283419.30125
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x0044b000
|
success
|
0 |
0
|
1619283419.30125
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x00447000
|
success
|
0 |
0
|
1619283419.37925
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003a3000
|
success
|
0 |
0
|
1619283419.41025
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003ac000
|
success
|
0 |
0
|
1619283419.47325
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006f0000
|
success
|
0 |
0
|
1619283419.81625
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
8192
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003a4000
|
success
|
0 |
0
|
1619283419.83225
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003a6000
|
success
|
0 |
0
|
1619283420.03525
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x003a7000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtAllocateVirtualMemory
|
process_identifier:
2064
region_size:
4096
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
1
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
allocation_type:
4096
(MEM_COMMIT)
base_address:
0x006f1000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|
1619283420.03525
NtProtectVirtualMemory
|
process_identifier:
2064
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
length:
4096
protection:
64
(PAGE_EXECUTE_READWRITE)
process_handle:
0xffffffff
base_address:
0x00ef0000
|
success
|
0 |
0
|