The owner of the process, his privileges and security groups are identified by an access token.
The process has virtual memory for private use available.
A process consists of one ore more threads (empty processes are possible, but not useful).
Ressources that were allocated by Windows on behalf of the processes are identified by handles (and such handles can be shown with the Sysinternals tools handle).
Two importand structures for processes are
EPROCESS (kernel mode)
PEB (user mode)
User mode processes
User processes can be divided into four categories
transfers control for this thread to the function LdrpInitialize in ntdll.dll
LdrpInitialize recursively traverses the EXE's import tables and maps the found executables into memory. Then, it calls LdrpRunInitializeRoutines which in turn calls the entry points of the DLLs that were mapped into memory (using the parameter DLL_PROCESS_ATTACH).
After initialzing the DLLs, LdrpInitialize calls BaseProcesStart (in kernel32.dll) which eventually calls the exe's entry point which (probably) eventually calls main or WinMain.
Integrity levels
Each running process is assigned an integrity level which is identified by a SID
Name
SID
Example or comments
Untrusted(?)
S-1-16-0
Low
S-1-16-4096
iexplore.exe (in order to prevent spreading malware)