Process Monitor
Ultimate System Activity Surveillance Tool
Essential ToolIntermediate
Real-time monitoring of file system, registry, and process/thread activity. Essential for live forensics, behavior analysis, and understanding how malware operates on Windows systems.
Comprehensive Monitoring Capabilities
File System
- Real-time file access tracking
- Write, read, delete operations
- Permission denied events
- File creation timestamps
Registry
- Registry key modifications
- Value creation and deletion
- Permission changes
- Real-time registry access
Process/Thread
- Process creation events
- Thread activity tracking
- Stack traces for analysis
- Process tree relationships
Advanced Filtering Techniques
Malware Analysis Filters
# Track malware file drops and data exfiltrationPath begins with 'C:\Users\' AND Operation is 'WriteFile'# Detect malware persistence mechanismsPath contains 'Run' AND Operation is 'RegSetValue'# Monitor process spawning and injectionProcess Name contains 'suspicious_process.exe'
Common Filter Examples
# Monitor specific file extensionsPath ends with '.exe' OR Path ends with '.dll'# Track registry autorun locationsPath contains 'CurrentVersion\Run'# Monitor temp directory activityPath begins with 'C:\Temp\' OR Path contains '\AppData\Local\Temp\'
Investigation Workflow
1. Launch Process Monitor as Administrator2. Set up filters before starting capture3. Start monitoring (Ctrl+E to capture/pause)4. Execute suspicious process or trigger event5. Stop capture and analyze results6. Export to CSV for further analysis7. Use Tools → Process Tree for relationship mapping
Cybersecurity Applications
Live Forensics
Monitor system activity in real-time during incident response to understand attack progression and collect forensic evidence.
Use Cases: File modification tracking, registry persistence analysis, process injection detection, data exfiltration monitoring
Behavior Analysis
Understand how malware operates by monitoring its interactions with the file system, registry, and other processes.
Techniques: Sandbox analysis, IOC generation, attack technique identification, persistence mechanism discovery
Performance Investigation
Identify performance bottlenecks and unusual system activity that might indicate compromise or system issues.
Indicators: Excessive file I/O, unusual registry access patterns, unauthorized network activity, resource consumption spikes
Quick Info
File Name:procmon.exe
Size:~3.2 MB
Requires Admin:Yes
Real-time:Yes
Export Format:CSV, XML
Filter Operators
is
Exact matchis not
Exclude matchcontains
Partial matchbegins with
Prefix matchends with
Suffix matchRelated Tools
Pro Tips
- 💡 Use Ctrl+E to pause/resume capture during analysis
- 💡 Set up filters before starting capture
- 💡 Use Include filters to focus on specific activity
- 💡 Export results to CSV for offline analysis
- 💡 Clear display between investigations