

With this data, and taking selective stack trace entries, it’s very easy to convert it to a timeline that resembles a log from an API Monitor…Ĭ:\Users\user\AppData\Local\Temp\Procmon64.exe The first one includes a list of processes and their properties:Īnd the second one lists the actual events:įollowed by the stack trace – all frames one bye one: It includes sections for process list and events. The second feature is the export to XML that may include the aforementioned stack trace (tick the ‘Resolve stack symbols’ as well – it will resolve addresses to actual function names if these are available in symbols). This tool can be downloaded from here the folloing link.Įxtract the downloaded tool and run the Procmon64.exe as shown below.This is pretty cool as it helps researches to find out where the possible access to an interesting object (a key, a file, etc.) comes from -i.e. Its unique and powerful features makes Process Monitor a core utility in your system troubleshooting and malware hunting toolkit. Kindly refer to these related guides: How to download and use Windows SysInternals tools locally, how to Install Sysinternals from the Microsoft Store, What is System Monitor and how to install and use it, and how to enable Automatic Logon on Windows 10.



It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such as session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. For a tour of Sysinternals tools, please see this link. Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry, and process/thread activity.
