CreateProcessInternalW
|
thread_identifier:
8024
thread_handle:
0x000000f8
process_identifier:
4208
current_directory:
filepath:
C:\Users\test22\AppData\Local\Temp\taskhost.exe
track:
1
command_line:
filepath_r:
C:\Users\test22\AppData\Local\Temp\taskhost.exe
stack_pivoted:
0
creation_flags:
4
(CREATE_SUSPENDED)
inherit_handles:
0
process_handle:
0x00000164
|
1
|
1 |
0
|
NtUnmapViewOfSection
|
base_address:
0x15793d6a
region_size:
1638060032
process_identifier:
4208
process_handle:
0x00000164
|
|
3221225497 |
0
|
NtAllocateVirtualMemory
|
process_identifier:
4208
region_size:
1342222336
stack_dep_bypass:
0
stack_pivoted:
0
heap_dep_bypass:
0
protection:
64
(PAGE_EXECUTE_READWRITE)
base_address:
0x15790000
allocation_type:
12288
(MEM_COMMIT|MEM_RESERVE)
process_handle:
0x00000164
|
1
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x15793d6a
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x54f2b6af
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x6c1ce6af
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x84e1b6e3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xbe797e35
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x15ba090b
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x24e8e40b
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x5abce813
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x19e3e813
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x571fde6a
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x54d08dd3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xc0227c6a
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xb6a952e3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xb6817ea9
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x56d69ea9
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xd51ab6df
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x2af2e113
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x6ac286b3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x1df67c6a
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x7af2b6df
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x19ba7d0d
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x54f2b6df
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xb6b85fde
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x54d77e9d
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x5b4cdfa9
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x1dba7ce3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xfc1b45ab
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x8a863412
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x89bae40b
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x84eee40b
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xb6eee40b
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x1b1be63d
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x8ebce813
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x8af23daa
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xbc1a45ab
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x7aca3d6a
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x571fde72
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x56b8b6e3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x7dba9ac5
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x1dba7ce3
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x63de8ec0
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x93de49df
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x15793fa9
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x7dba9ac5
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xb6817ea9
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0xc21b3d6a
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|
WriteProcessMemory
|
buffer:
base_address:
0x68797e35
process_identifier:
4208
process_handle:
0x00000164
|
|
0 |
0
|