Procmon, is an advanced monitoring tool for Windows that helps track registry, file system, network, process, and thread activities. It enhances the functionality of two legacy tools: FileMon and RegMon. Procmon is widely used in malware analysis and system troubleshooting, providing deep insights into system behavior.

Note

Procmon captures a lot of data, it doesn’t capture everything.

For example, it can miss the device driver activity of a user-mode component talking to a rootkit via device I/O controls, as well as certain GUI calls.

Running Procmon Safely

Procmon begins capturing system calls immediately upon execution. Given that a Windows machine can generate over 50,000 events per minute, excessive logging can crash a virtual machine by consuming all available RAM. To prevent this:

  • Run Procmon for limited time periods.

  • Stop capturing events manually via File > Capture Events.

  • Clear irrelevant data before analysis using Edit > Clear Display.

Understanding the Procmon Display

Procmon provides detailed event logs with configurable columns displaying:

  • Timestamp

  • Process name

  • PID

  • Operation performed

  • Path accessed

  • Result status

For example, a malware sample might create a suspicious file at C:\Documents and Settings\All Users\Application Data\mw2mmgr.txt using the CreateFile operation. The Result column will indicate whether the operation was successful or not.

How to Apply Filters

  1. Go to Filter > Filter.

  2. Select a column to filter (e.g., Process Name).

  3. Choose a condition

  4. Click Add and Apply.

Toolbar Quick Filters

Procmon also offers one-click filters for:

  • Registry: Shows registry interactions (e.g., malware modifying startup keys).

  • File System: Displays created or modified files.

  • Process Activity: Tracks new processes spawned by malware.

  • Network: Identifies network connections (e.g., malware communication channels).