mirror of
https://github.com/nganhkhoa/malware.git
synced 2024-06-10 21:32:07 +07:00
Update analysis_processhollowing.md
This commit is contained in:
parent
8b6d58aed3
commit
a6cdff6eb6
@ -116,6 +116,7 @@ Process Hollowingにも利用するデータに関する説明
|
|||||||
![](https://github.com/mether049/malware/blob/master/Trickbot/img/apicall_15_720.png)
|
![](https://github.com/mether049/malware/blob/master/Trickbot/img/apicall_15_720.png)
|
||||||
- 以下は[NtQueryInformationProcess](https://docs.microsoft.com/ja-jp/windows/win32/api/winternl/nf-winternl-ntqueryinformationprocess?redirectedfrom=MSDN)の呼び出し後におけるPROCESS_BASIC_INFORMATION構造体の各メンバの値である
|
- 以下は[NtQueryInformationProcess](https://docs.microsoft.com/ja-jp/windows/win32/api/winternl/nf-winternl-ntqueryinformationprocess?redirectedfrom=MSDN)の呼び出し後におけるPROCESS_BASIC_INFORMATION構造体の各メンバの値である
|
||||||
- svchost.exeのプロセスIDは9652
|
- svchost.exeのプロセスIDは9652
|
||||||
|
|
||||||
![](https://github.com/mether049/malware/blob/master/Trickbot/img/PROCESS_BASIC_INFORMATION.png)
|
![](https://github.com/mether049/malware/blob/master/Trickbot/img/PROCESS_BASIC_INFORMATION.png)
|
||||||
![](https://github.com/mether049/malware/blob/master/Trickbot/img/processhacker.PNG)
|
![](https://github.com/mether049/malware/blob/master/Trickbot/img/processhacker.PNG)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user