How to tell if your PC is Hacked? Process Forensics

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 มิ.ย. 2024
  • Procmon is a powerful forensic tool and part of the sysinternals suite that can help you monitor almost any activity on your system. In this forensics tutorial we will look at an infected Windows 11 VM using Process Monitor. learn.microsoft.com/en-us/sys.... Invest in blue-chip art with Masterworks (sponsor): www.masterworks.art/pcsecurity
    Purchase shares in great masterpieces from artists like Pablo Picasso, Banksy, Andy Warhol, and more. See important Masterworks disclosures: www.masterworks.com/cd
    Buy the best antivirus: thepcsecuritychannel.com/best...
    Join the discussion on Discord: discord.tpsc.tech/
    Get your business endpoints tested by us: tpsc.tech/
    Contact us for business: thepcsecuritychannel.com/contact
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 429

  • @lobotomizedamericans
    @lobotomizedamericans 11 หลายเดือนก่อน +393

    This piece of software is invaluable. I've used it from everything in terms of malware scanning/detection/analysis to assisting in cracking a piece of software to determining why a cracked game would refused to load (turns out it was literally missing 5 or 6 "maps", which was causing the game to crash-on-load. Fantastico.

    • @ViroRads
      @ViroRads 11 หลายเดือนก่อน +18

      More often than not my games dont work cause missing Dlls, it felt like a chore having to reinstall both x64 and x86 runtimes and DirectX updates just for them to work.

    • @Krazy0
      @Krazy0 11 หลายเดือนก่อน +5

      @@ViroRads A disappointing truth about dependencies.

    • @lobotomizedamericans
      @lobotomizedamericans 11 หลายเดือนก่อน +7

      @@it1970 that's why I love 'em so much. ;)

    • @Krazy0
      @Krazy0 11 หลายเดือนก่อน +2

      @@it1970 Not, but somewhat on the top of the most effective ways to distribute.

    • @dennisaleander5175
      @dennisaleander5175 11 หลายเดือนก่อน +7

      @@it1970Thats why it’s best to buy cd keys as a pirate.

  • @bluesky2145
    @bluesky2145 11 หลายเดือนก่อน +594

    Interesting video but after watching it I still have no idea how to tell what's bad and what's good. How about doing a video detail how to tell if something bad is happening compared to something good.

    • @rexheters6717
      @rexheters6717 11 หลายเดือนก่อน +48

      This

    • @kuromiLayfe
      @kuromiLayfe 11 หลายเดือนก่อน +46

      exactly… the video is just showing exactly what is directly written on the tools main page … how could he tell the Sihost process was phishy ? as it literally is also a regular windows process normally

    • @Xuzyy
      @Xuzyy 11 หลายเดือนก่อน +20

      I suggest google anything that you think its strange, and you might be lucky.

    • @kuromiLayfe
      @kuromiLayfe 11 หลายเดือนก่อน +37

      @@Xuzyy and that is how i ended up deleting system files necessary to show windows login after boot.
      windows booted but no possibility to login or access any command line tools/interfaces even in safe mode

    • @redeemer665
      @redeemer665 11 หลายเดือนก่อน +3

      @@kuromiLayfe do you have any other boot disk and/or separate computer where you could copy those deleted files from? After booting to a command prompt and mounting your system disk, you could copy those files over. Actually it's easier to remove the drive altogether and connect it to another computer to do all that.

  • @myriadcorp
    @myriadcorp 11 หลายเดือนก่อน +42

    I may as well be looking at Chinese writing because I don't know what those logs are. This is obviously something for advanced users who can recognize something is wrong.

    • @chrise.9316
      @chrise.9316 11 หลายเดือนก่อน

      In part that's true. It's up to you how much knowledge you want to learn and have deep you want to go. I can say this video shows some things that were on my system like 5 years ago that nobody believed to me. And I'm just a normal person who is learning this by myself. Talk about getting exhausted frustrated and even just discouraged. But I will say this channel is amazing and what he says and talks about is very practical. And I appreciate the fact that I don't feel like I'm wasting his time. even though he wants to do this. This is my perspective. Hey instead of looking at Chinese getting ready trying to read this out loud lol. I do have something tattooed on my arm that is in Chinese.

    • @7kortos7
      @7kortos7 10 หลายเดือนก่อน +4

      i agree, this video was only partially informative. i'd have also liked to of seen the FIX of a virus using this method.
      this video might as well of been "here's the tool, look how neat, right? video over"

  • @hiatus9148
    @hiatus9148 11 หลายเดือนก่อน +173

    I'd really love if you'd do another Antivirus tier list. It's been a few years since your last one and I'm interested to see if anything has changed between the rankings. Great videos as always!

    • @Crazy--Clown
      @Crazy--Clown 11 หลายเดือนก่อน

      Most of them are a Virus Lol

  • @doesitmatter3642
    @doesitmatter3642 10 หลายเดือนก่อน +15

    I'm a complete neophyte at this stuff and your explanation was really clear and easy to follow. I even tried checking my own system with this and could understand what I was looking at a little bit at least. Thank you!

  • @asas-tech
    @asas-tech 11 หลายเดือนก่อน +27

    Process Monitor is a great tool! It's been really helpful in tracking down some issues 👍

  • @christopherchilton-smith6482
    @christopherchilton-smith6482 11 หลายเดือนก่อน +5

    Holy crap, this would've been super useful like 3 months ago. Definitely saving this video.

  • @tezlol2255
    @tezlol2255 11 หลายเดือนก่อน +13

    Thank you so much for making this!

  • @nickdixon3536
    @nickdixon3536 11 หลายเดือนก่อน +13

    Excellent video! I'd love to see more forensic videos like this. Cheers!

    • @NightShooter87
      @NightShooter87 10 หลายเดือนก่อน

      It's not a forensics tool. It's a monitoring tool. This word forensics, gets thrown around with people in security, it's not. Forensics is analysis of devices, with the strictest protocols, like any forensics, that evidence then goes either goes to court, or if there's no evidence, a case is dropped. Cybersecurity pre-crime, Digital/Cyber Forensics post-crime.

  • @patrickarmstrong8908
    @patrickarmstrong8908 11 หลายเดือนก่อน +19

    Great overview of the process monitor. Thanks for that. Great tool.
    But the title of this video is "how to tell if your PC is hacked"
    How about a video on that? Like what processes to look out for, examples of how to find known hacks, etc.

  • @merk5789
    @merk5789 11 หลายเดือนก่อน +55

    Shouldve went in more detail on how you can detect something fishy from something normal. The way I see it, I have to look up every IP, .dll and what else to see if something is off.

    • @IvanOoze1990
      @IvanOoze1990 11 หลายเดือนก่อน +1

      I know right.

    • @chrise.9316
      @chrise.9316 11 หลายเดือนก่อน +5

      Well he could have done that but it's very hard to do unfortunately and I'm not trying to discourage or not what you're asking. You can even type in Google like copy and paste a whole line of code and type in what is this. So an example for me is my router will just drop randomly for like 3 or 4 So what I did was I copied it into note pad. In Google I would type in my router, what is a normal fog look like. Or an example of a normal log. And then I would copy and paste that into another notepad and then look at the two. Now what I found out was it's not my problem it was actually spectrums and they needed to replace cable that they're never going to do. I'll read the comments section. a lot of the times. through the Trials of others, it has helped me. you'll get it. just stick with it. Be patient with yourself too.

    • @DBreeazyy
      @DBreeazyy 8 หลายเดือนก่อน

      @@chrise.9316 ayo whut? I been dropping on discord lately and it better dang not be because of spectrum😂

  • @chrisbowring4298
    @chrisbowring4298 11 หลายเดือนก่อน +2

    Excellent informative narrative! Look forward too much more! Thank you!

  • @welovfree
    @welovfree 11 หลายเดือนก่อน +4

    Great stuff as always, please more stuff like these.

  • @int_pro
    @int_pro 11 หลายเดือนก่อน +5

    Super helpful vid! Thanks buddy!!

  • @itenthusiast5988
    @itenthusiast5988 9 หลายเดือนก่อน

    Yes yes yes love to see more such videos. Always been a fan of process explorer, but badly need of something like this but never knew sysinternals had it in the name called process monitor. Thank you🎉 thanks a lot. Love you ❤

  • @adamgarlow5347
    @adamgarlow5347 8 หลายเดือนก่อน +1

    this helped me find things i didn't know i had (or still had) that were regularly phoning home. much appreciated.

  • @hardwin82
    @hardwin82 11 หลายเดือนก่อน +5

    great video. could you make one with more examples about this program

  • @ownmicelio
    @ownmicelio 11 หลายเดือนก่อน +5

    Really nice tool, thank you for the info!!!

  • @r.e.d2016
    @r.e.d2016 11 หลายเดือนก่อน +2

    I watching you since 2020 great videos keep it up bro

  • @deepurangarajan8696
    @deepurangarajan8696 11 หลายเดือนก่อน

    I have to see this video many times to understand. Very good tutorial. Really good 👋

  • @GaryofNivea
    @GaryofNivea 10 หลายเดือนก่อน

    Very informative, please do make more of these

  • @serfraust
    @serfraust 11 หลายเดือนก่อน +6

    This video barely scratches the surface without really going over anything, aside from filters.
    What would have been more beneficial for viewers would be to show them how to quickly filter out genuine Windows activity and to later filter what the user knows is safe. You're then left with a list of potential candidates for the problems you're experiencing.
    As it stands, this video just says people "yeah this exists, good luck."

  • @anti-h2894
    @anti-h2894 9 หลายเดือนก่อน

    They way how you talk is amazing, my mother tongue is spanish and it's a bit diffcult to me to understand videos with english audio, but I understood everything very clean from you, thank you for your nice job.

  • @3lH4ck3rC0mf0r7
    @3lH4ck3rC0mf0r7 11 หลายเดือนก่อน +42

    Malware usually injects itself into Windows components to make it tougher to recognize, which is why many of the processes performing unusual malicious activity here actually belong to Windows. You'll find these processes in every Windows installation, and _don't_ exhibit anything resembling the abnormal behavior showcased in this video unless infected (at least, by Microsoft standards. Windows doesn't need any spyware to perform a lot of questionable telemetry after all, but this video shows even more junk than usual). This is a nice way to figure out if a system is infected, but it takes a lot more to actually track down the source malware.
    I personally use Process Monitor a lot more often to figure out some of the inner workings of software, and even Windows itself. Track down the files and registry keys discrete Windows features and apps need to work properly, as a last-ditch effort in order to fix the more awful kind of registry and install corruption bugs when all easier repair options fail, and they show their ugly face just often enough in our line of repair work to be a major PITA. I'm talking the kind of issues that have no documented fix anywhere on the Internet, meaning they would otherwise require a full Windows reinstall to get rid of, and can range from mildly annoying to total showstopper as they can prevent essential user programs and Windows features from functioning altogether.
    As I'm not a security researcher, I just rely on AVs to do all the detection work for me, and only attempt a manual checkup as a last resort, if multiple different AVs and even rescue liveCDs all fail to detect any malware on a system that is still definitely, actively misbehaving. I once caught and manually deleted a cryptominer trojan that way. It faked the Task Manager GPU percentage and even the framerate numbers of games, but couldn't inject iself into Windows processes (it just showed up on Task Manager as a standalone process), and was installed inside AppData. Either way, when even lightweight games believe they're running at 60fps and only actually presenting at like 10, you know something is going horribly wrong. I still have the suspicion the bad performance metrics might've been more of an NVIDIA driver bug, and not actually a feature of the malware. Chances are it doesn't matter anymore with the hundreds of updates to Windows and the GPU drivers since that infection happened.

    • @chrise.9316
      @chrise.9316 11 หลายเดือนก่อน +2

      thanks for this.

  • @unknown_gaming4209
    @unknown_gaming4209 11 หลายเดือนก่อน +1

    Thanks for the tool gonna have to get to know it and use it more.

  • @kandym3478
    @kandym3478 11 หลายเดือนก่อน +1

    I really liked this video, please make more like these :)

  • @sloatch5361
    @sloatch5361 9 หลายเดือนก่อน

    Kindly share more videos regarding this tool, seems so complicated and full of info

  • @Bandana_Assault
    @Bandana_Assault 11 หลายเดือนก่อน +1

    This software is a chef's kiss Thank you.

  • @BlueBearOne
    @BlueBearOne 4 หลายเดือนก่อน

    Nice video. Thanks!

  • @shantanusapru
    @shantanusapru 11 หลายเดือนก่อน +1

    Awesome video!!

  • @xAndrzej42
    @xAndrzej42 9 หลายเดือนก่อน +54

    You can skip 90% of malware and stuff by simply choosing "ask before every download" option in your browser. It saved my pc so many times as suddenly something was trying to download but browser was asking me where I want it.
    Remaining 5% is windows defender which acts as a virus itself and 5% are backdoors in the system CPUs. That's basically all to it.

    • @AROAH
      @AROAH 9 หลายเดือนก่อน +6

      >implying malware doesn’t generally spread via people downloading things willingly

    • @Noconstitutionfordemocrats1
      @Noconstitutionfordemocrats1 9 หลายเดือนก่อน +10

      ​@@AROAHI always download. Don't even read what it is. Must collect them all!

    • @clevertaco328
      @clevertaco328 9 หลายเดือนก่อน +1

      This might help the casuals with amateur stuff, but even so, 90%? Nope, that number definitely came out your backside, pre wipe. Ok, little much, I know, just kidding, about the pre wipe part. 🙃

    • @4agewise120
      @4agewise120 8 หลายเดือนก่อน

      🤣@@Noconstitutionfordemocrats1

    • @bbokgomu5422
      @bbokgomu5422 7 หลายเดือนก่อน

      ​@@Noconstitutionfordemocrats1ure awesome but dont do that please

  • @vjaykrishna3233
    @vjaykrishna3233 11 หลายเดือนก่อน +1

    wonderful content❤

  • @Alpha-ms9nj
    @Alpha-ms9nj 11 หลายเดือนก่อน +2

    Thank you for sharing this and how to use it. Now I know how to start using this tool. This is why I like and subscribed to this channel.

  • @blackorcshagrat8587
    @blackorcshagrat8587 11 หลายเดือนก่อน +29

    Neat! My only issue is that I'm not sure an average computer user would necessarily recognize all the programs Process Monitor shows. Wonder if it could be too easy to mistake some program's actions as an active malware.

    • @user-dt6pk3zp9m
      @user-dt6pk3zp9m 11 หลายเดือนก่อน +1

      pretty sure i did that a lot back when i was playing wow in high school. would task manager end task on a lot of dependent little programs then my main programs would be super buggy. learned to leave it alone lol.

    • @nightmarerex2035
      @nightmarerex2035 11 หลายเดือนก่อน +9

      i know stepfather would DELETE ANYTHING he "diddent know what it was" so had to hide the existance of the C drive on him and had to lie that deleting the icon deletes the whole program or else he would went around wiping stuff out to then get bricked and need cosntant reinstall.

    • @blackorcshagrat8587
      @blackorcshagrat8587 11 หลายเดือนก่อน +3

      @@nightmarerex2035 I guess that can indeed be a problem with some people.
      I admit, I don't have a clue how much one should actually know about computers and computer software.

    • @masteroak9724
      @masteroak9724 11 หลายเดือนก่อน +3

      I've used to be paranoid with these, took me quite some time and I guess some of my own health to get past that point. I've used to think someone somewhere could decide to target my machine and there would be nothing I could do until it was too late and thus would be constantly overwatching every process to verify everything was alright. It was something like some people do with performance overlays in games and wouldn't be able to have fun because they're paranoid with FPS and temps.

    • @chrise.9316
      @chrise.9316 11 หลายเดือนก่อน +1

      Now I'm your 100% correct. it's hard when people want to ask, but as the internet is people are not very kind. I'm saying this in general. it's too much work to try to help or assist somebody. glad to see you have that insight and perspective and the awareness of others who may not get it.

  • @pvt.lucio.4173
    @pvt.lucio.4173 11 หลายเดือนก่อน +1

    THANK YOU SO MUCH.

  • @dha12oks
    @dha12oks 11 หลายเดือนก่อน +1

    Early congratulations on 400k subs.

  • @jjb0894
    @jjb0894 11 หลายเดือนก่อน +101

    Even as a Mac user, I’m always super paranoid that I have some kind of zero day I’m not aware of.

    • @InternetSlavicMan
      @InternetSlavicMan 11 หลายเดือนก่อน +13

      every piece of software has bugs waiting to be found

    • @int_pro
      @int_pro 11 หลายเดือนก่อน +18

      "Macs don't get viruses" /s 😆 Yeah buddy I'm with you. Feel like we're flying blind on Mac.

    • @imseagull
      @imseagull 11 หลายเดือนก่อน +8

      Same and I’m running Linux…

    • @redrush-hp9li
      @redrush-hp9li 11 หลายเดือนก่อน +11

      ​@@imseagullI'd just like to interject for a moment. What you're refering to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.
      Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called Linux, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.
      There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called Linux distributions are really distributions of GNU/Linux!

    • @purpose_is_empty
      @purpose_is_empty 11 หลายเดือนก่อน +7

      For a random home user, it is very unlikely to encounter true zero day malware.
      And there are scanners and tools for macos as well.
      You could probably do a lot of this in the terminal somehow.

  • @indrar1213
    @indrar1213 9 หลายเดือนก่อน

    Very nice and informative

  • @BsktImp
    @BsktImp 11 หลายเดือนก่อน +3

    Very powerful! What data (if any) does Procmon collect and send back to Winternals?

    • @chrise.9316
      @chrise.9316 11 หลายเดือนก่อน

      Have you looked this up? are you asking about a future video, just curious. I did Google search and there's quite a bit of information.
      either way great question.

  • @Randtiktok
    @Randtiktok 11 หลายเดือนก่อน +8

    Useful, kinda complicated

  • @Sucundea
    @Sucundea 11 หลายเดือนก่อน +1

    congrats on 400 k

  • @msh6610
    @msh6610 11 หลายเดือนก่อน

    It's been a must-have program since snoop-dos on my Amiga :) (Diddent need no filters there :D goodtmes :P)

  • @JSmiththe5th
    @JSmiththe5th 11 หลายเดือนก่อน +27

    This tool is great for gamers to find out the "save location" of a game. You pick the game process and filter to see what files are being created.
    I wonder, regarding the security features, would Task Manager's Processes tab be a quicker way of checking for any strange processes using the Network, for example, by sorting by Network?

    • @Bry.89
      @Bry.89 10 หลายเดือนก่อน

      That's super useful actually, thanks.

    • @JSmiththe5th
      @JSmiththe5th 10 หลายเดือนก่อน

      @@Bry.89 Glad it helps.

    • @Kiduk90
      @Kiduk90 9 หลายเดือนก่อน

      Thanks for the advice. Im not as bright and found this amazingly useful to know!

  • @affezs
    @affezs 11 หลายเดือนก่อน

    El video que no sabia que necesitaba :D

  • @elismart13
    @elismart13 9 หลายเดือนก่อน

    3:10 can anyone explain what Exactly was "suspicious" i mean I've bene trying to understand it for hours but differentiating between hack and or other is super hard for me so far, maybe its cause i don't have any but ye

  • @Bry.89
    @Bry.89 10 หลายเดือนก่อน +5

    All I've learned is that Corsair iCue is basically malware lol.. constant network/telemetry stuff going on even if you have that option to send them data disabled. Closing icue reduced the amount of network events I was seeing drastically, and it actually seems to have improved game performance.

  • @dmagic1one
    @dmagic1one 10 หลายเดือนก่อน

    So I looked at a system that showed the same AMSI queries over and over like in the video. Nortons Power Erase didn't find anything beyond medium. What do you suggest?

  • @vesrand
    @vesrand 10 หลายเดือนก่อน +25

    You explained quite obvious things about this program (filters, autoscrolling etc). But I still dont get it how to tell if my PC is hacked. Need more examples please

  • @masteroak9724
    @masteroak9724 11 หลายเดือนก่อน +21

    Great tool, just take care to not get paranoid with these. I've had clients in the past before I became a developer who would think any svchost.exe would mean a malware, which is not the case.

    • @joesantaniello8709
      @joesantaniello8709 10 หลายเดือนก่อน

      That's unfortunately why Malware uses it. The registry edits it does to query and fwd to temp/apps data and run .dll as far as most users see it's a ssys32 file running which most believe safe. I recently dealt with it, and I like to think I'm a halfway decent dev xD 😂

  • @_NoCommentaryGameplay
    @_NoCommentaryGameplay 10 หลายเดือนก่อน

    When you say please like and share the like bars light up. that's a cool feature.

  • @V4mpirella
    @V4mpirella 10 หลายเดือนก่อน

    Im so curious now!!

  • @fabioamado6725
    @fabioamado6725 11 หลายเดือนก่อน +1

    What an amazing video, thank you very much. Can you please make an equivalent video on Mac OS forensics? 😊

    • @Sci-Fi_Fan296
      @Sci-Fi_Fan296 11 หลายเดือนก่อน

      I was thinking the same thing as a full-time mac user myself. Are there any equivalent mac options available?

  • @macblink
    @macblink 11 หลายเดือนก่อน

    Good to know, gonna try it one day just in case

  • @Ilovetobmx22
    @Ilovetobmx22 11 หลายเดือนก่อน +1

    Would this be able to detect Port scans? My antivirus detecting them happening multiple times per day.

  • @heatherryan9820
    @heatherryan9820 11 หลายเดือนก่อน +1

    That's really interesting. Is there an equivalent for Linux?

  • @grim.reaper
    @grim.reaper 11 หลายเดือนก่อน +7

    This is very interesting. Is this data only accessible via the ProcMon? is there an interface Microsoft provides to access this pragmatically?

    • @machfiver753
      @machfiver753 11 หลายเดือนก่อน +3

      Task manager is the equivalent Microsoft built in app but it pales in comparison as to the details and information it provides.

    • @igorthelight
      @igorthelight 11 หลายเดือนก่อน

      ProcMon does that somehow so it's possible ;-)

    • @FlyboyHelosim
      @FlyboyHelosim 11 หลายเดือนก่อน +1

      Bit of a moot point really considering the program is freely available, provided by Microsoft themselves, and is tiny in size. Just download it, put it in a folder somewhere, and create a shortcut to it. At that point it becomes transparent and you wouldn't even know it wasn't already a part of Windows. 🤷‍♂️

    • @true-dark-mind9681
      @true-dark-mind9681 11 หลายเดือนก่อน

      @@FlyboyHelosim Indeed

  • @sayacee5813
    @sayacee5813 9 หลายเดือนก่อน

    thanks for this

  • @Chris-op7yt
    @Chris-op7yt 11 หลายเดือนก่อน

    one thing i dislike about process monitor is how easy it is to confuse whether a switch is on or off. the hover help text is confusing as to whether the switch is enabled or is it instructing you to click it to get what hover help states.
    wish i could have a go at fixing these cosmetics in the UI

  • @billstecyk6466
    @billstecyk6466 11 หลายเดือนก่อน

    Very interesting video. Many things I did not know.6

  • @zoiuduu
    @zoiuduu 11 หลายเดือนก่อน +2

    i downloaded the suite, but there are so many .exes i think is over a 100, which one should i use?

  • @MaHeHRO
    @MaHeHRO 11 หลายเดือนก่อน

    So you use F-Secure as your main antimalware software?

  • @Treemie
    @Treemie 11 หลายเดือนก่อน

    Hey Leo, I just watched the Emsisoft Emergency Kit video 7 years ago, is that you?

  • @Tygo69
    @Tygo69 11 หลายเดือนก่อน +9

    There is an efi rootkit that bypasses this completely and is fully hidden, it basically patches a bunch of kernel stuff before pg is initialized. I don't remember exactly but the only way you could get rid of it is by reflashing bios and reinstalling windows. Problem being you'll never know you got infected.

    • @roguewasbanned4746
      @roguewasbanned4746 11 หลายเดือนก่อน +1

      So what’s the point in worrying if it’s untraceable?

    • @Tygo69
      @Tygo69 11 หลายเดือนก่อน +9

      @@roguewasbanned4746 your sessions, your passwords, your files etc can be stolen. They can do anything it's a rat hidden with kernel hooks and an uefi bootkit lol

    • @vladvah77
      @vladvah77 11 หลายเดือนก่อน

      what's the malware name sir???

    • @alfonzo7822
      @alfonzo7822 11 หลายเดือนก่อน +1

      This is a question I've asked someone before (in fact a few people). How to flash the bios when you only have access to an infected network? Pretty sure I have this rootkit but can't get rid of it with a clean reinstall, nothing is helping. I've no access to another computer out with my home (don't want to ask at work).

    • @Tygo69
      @Tygo69 11 หลายเดือนก่อน

      @@vladvah77 a day after my comment it's source got leaked

  • @lennix6
    @lennix6 11 หลายเดือนก่อน +1

    This Tool is really powerful, but I have a question.
    If I detect a Process that's sending Data, can I stop it without killing the whole process?

  • @dancewithrain6161
    @dancewithrain6161 10 หลายเดือนก่อน

    may i ask what is it runtime broker are?
    also is it normal if multiple runtime broker run at once?

  • @mdzmzm
    @mdzmzm 11 หลายเดือนก่อน +7

    How can you trust Armory Crate? Armory Crate has been exploited before, and hackers have managed to access all devices that have Armory Crate installed. The entire app is suspicious and plagued with bugs. I hope you can create a video about the activities that Armory Crate is performing in the background. Even ESET Antivirus is attempting to block some of its files, and VirusTotal has flagged the file as suspicious. Let's hope your computer wasn't already hacked.

  • @bananacyclist
    @bananacyclist 11 หลายเดือนก่อน

    Are there any solutions? I know nothing about these things but.... would it be possible to run linux from a DVD and have it load into ram so it runs at a decent speed? (if you have enough ram). ??

  • @Meusde
    @Meusde 11 หลายเดือนก่อน +1

    ty

  • @Newtttton
    @Newtttton 11 หลายเดือนก่อน

    is there a way to detect if a bitlocker mining is running undetected on a domain network?

  • @MixBoxgamesareourlife
    @MixBoxgamesareourlife 10 หลายเดือนก่อน +1

    Hacker: I have your passwords in one place, look. *send me all my passwords*
    Me: Thanks I already forgot them.

  • @haroldflower8008
    @haroldflower8008 11 หลายเดือนก่อน +1

    procmon is one of my favorite discoveries from my college courses. procxp is a close 2nd

  • @SkoomaFish
    @SkoomaFish 11 หลายเดือนก่อน

    this is amazing

  • @n-0-1
    @n-0-1 11 หลายเดือนก่อน +1

    How do you know which domain a process should be connecting to if it is legitimate?

  • @dave24-73
    @dave24-73 11 หลายเดือนก่อน +5

    What we really need is a tool with checksums and whitelists so anything unusual shows up. Otherwise it’s like handing someone a phone book and say number starts with 555.

    • @chrise.9316
      @chrise.9316 11 หลายเดือนก่อน

      You can find templates that are examples of what a normal log or systems log should look like. Also asking what is this and then copying and pasting like a line or two of code. it's help me out. that's a good idea and great suggestion. I would use that more than I ever did the phone book. lol

  • @acrius3043
    @acrius3043 11 หลายเดือนก่อน +2

    I have a question for linux. So if a malware were to run on linux using an emulator would the malware even know what to look for if it was trying to steal info from the linux files or would it be limited because it’s a different environment. I’m new to linux and am trying to learn more about the platform.

    • @IvanOoze1990
      @IvanOoze1990 11 หลายเดือนก่อน

      No OS is safe. Linux is like a false security, You're never safe.

  • @christopherchilton-smith6482
    @christopherchilton-smith6482 11 หลายเดือนก่อน +3

    I had some sort of maleware I couldn't seem to wipe with any anti-virus software, I kept getting a message demanding bitcoin. I decided to just system restore, only to find someone had managed to setup a bitlocker on my system. I just ended up wiping the whole thing and installing Linux.

  • @ImPureBlood
    @ImPureBlood หลายเดือนก่อน

    Will this tell you why you suddenly go from 0-100% disk followed by a freeze, thanks?
    And i've only just heard about this software.

  • @drmatarkin2100
    @drmatarkin2100 8 หลายเดือนก่อน

    Where do we go from here though. If I find something that shouldn’t be happening, what is the course of action? And where can I find out where it came from?

  • @UZAMAA
    @UZAMAA 11 หลายเดือนก่อน

    Very interesting contents,can you make a video about how to get rid of remote control using kali linux by preventing hacker from accessing the pc or laptop,since the antivirus can't detect the malware

  • @OtherWorldExplorers
    @OtherWorldExplorers 11 หลายเดือนก่อน

    For the next 3 hours I'm going to be staring at my feet
    Thanks for letting us know about the tool

    • @FlyboyHelosim
      @FlyboyHelosim 11 หลายเดือนก่อน

      Why, are you bent over and taking one for the team? 😬😂

  • @IceColdProfessional
    @IceColdProfessional 8 หลายเดือนก่อน +1

    Man, you young boys have it made. Back in my day, we had to figure all this out reading 2600 Quarterly, text books, and sheer intuition messing around in the registry. Nowadays you boys have it all packaged up nice and neat in a video complete with slick graphics and color commentary. This combined with AI makes us old coding command line geezers obsolete.

  • @mnh3571
    @mnh3571 11 หลายเดือนก่อน +3

    My pc sometimes randomly open cmd and close it multiple times a day. Should i be worried

  • @frankbraun9819
    @frankbraun9819 8 หลายเดือนก่อน

    So Armoury Crate runs a three tier process six times per minute 😢🎉 to check for updates?!? Im thinking once a week would be plenty 😕

  • @ContantContact
    @ContantContact 11 หลายเดือนก่อน

    Good video.
    But I gave up on Windows about a year and a half ago. Went to Linux Mint.
    I see there are some utilities that do the same thing, I I might play with them.
    Though I am not all that concerned....

  • @cctvx-nj4ii
    @cctvx-nj4ii 4 หลายเดือนก่อน

    hey bro what does it mean lotta like really lot explorer.exe opertions somes are open some close and others read few registry keys, results are opening closing and no reparse point or invalid parameter. please need answer

  • @jgvtc559
    @jgvtc559 11 หลายเดือนก่อน

    Will breeches stay intruding even after completing deleting and reininstalling windows?

  • @vaisakhkm783
    @vaisakhkm783 11 หลายเดือนก่อน +2

    Is there any similar thing for linux??

  • @blhtml
    @blhtml 11 หลายเดือนก่อน

    thanks

  • @antoniocalimero1173
    @antoniocalimero1173 11 หลายเดือนก่อน +2

    Your PC is always hacked.
    With an update, for example, all your info goes to the manufacturer.
    That is why an update with a new PC is very fast and the same update with a used PC with the same spec. 10x slower.

  • @j4r3kk88
    @j4r3kk88 3 หลายเดือนก่อน

    lol, I'm speechless... amazing video and explanations an well...…just discover Your Chanel

  • @txemix79
    @txemix79 8 หลายเดือนก่อน

    I checked my laptop and found exactly the same behaviour described in the video, svchost.exe constantly accessing the Providers2 registry. Any idea how to fix that?

  • @usertempeuqwer7576
    @usertempeuqwer7576 11 หลายเดือนก่อน +1

    Can we have one video on Linux or Android please?

  • @noanyobiseniss7462
    @noanyobiseniss7462 10 หลายเดือนก่อน +1

    tcpview as well.

  • @user-xk9fb6gi6j
    @user-xk9fb6gi6j 8 หลายเดือนก่อน

    thank you but this is only for windows can you make similar for linux / Debian ..??

  • @manoo422
    @manoo422 11 หลายเดือนก่อน +1

    Ok you have shown us what looks like a very valuable piece of software but left us with no idea how to USE it!!!

  • @nebsun
    @nebsun 11 หลายเดือนก่อน +15

    Such great tools that MS owns, but for some reason are not included with the default OS install - yet they are so quick to add so much other bloat like news feeds, widgets, and other mostly useless apps.

    • @TheTubejunky
      @TheTubejunky 11 หลายเดือนก่อน +3

      Wouldn't doubt if the TOOL has a backdoor for windows to run shadow updates in.

    • @nonamenoname1942
      @nonamenoname1942 10 หลายเดือนก่อน

      @@TheTubejunky Is it??

    • @TheTubejunky
      @TheTubejunky 10 หลายเดือนก่อน

      @@nonamenoname1942 Try loading it in to Virus total.... Then again who knows if they bypass those checkers.

    • @1s1601
      @1s1601 9 หลายเดือนก่อน

      no he doesnt know what he is talking about dont worry about him @@nonamenoname1942

  • @UCs6ktlulE5BEeb3vBBOu6DQ
    @UCs6ktlulE5BEeb3vBBOu6DQ 11 หลายเดือนก่อน +8

    few weeks ago I learned something wild. I've been setting my firewall for decades with local subnet rules for my lan stuff including remote desktop that I only use in my lan. Imagine my surprise when I found out I was brute forced from a large distributed array of IP's. Turns out that forwarded ports are treated as being from local subnet in windows firewall !! I got saved by my 378 characters password.

    • @Tuxy79
      @Tuxy79 11 หลายเดือนก่อน +2

      Which password manager do you use?

    • @UCs6ktlulE5BEeb3vBBOu6DQ
      @UCs6ktlulE5BEeb3vBBOu6DQ 11 หลายเดือนก่อน +4

      @@Yolo_Swaggins Windows password. I made a way to not have to type it manually so I can have it as long as I want.

    • @UCs6ktlulE5BEeb3vBBOu6DQ
      @UCs6ktlulE5BEeb3vBBOu6DQ 11 หลายเดือนก่อน +4

      @@Tuxy79 KeePass

    • @FlyboyHelosim
      @FlyboyHelosim 11 หลายเดือนก่อน +8

      If you're using a password that's 378 characters long to be safe then something is very, very wrong.

    • @UCs6ktlulE5BEeb3vBBOu6DQ
      @UCs6ktlulE5BEeb3vBBOu6DQ 11 หลายเดือนก่อน +6

      @@FlyboyHelosim my passwords are on average 40 to 80 chars long. I have had multiple servers since '96 and you'd be surprised at how relentless the attacks are especialy from China.

  • @HYPERSHAONARCA770
    @HYPERSHAONARCA770 10 หลายเดือนก่อน +1

    Is there any app that will detect if my pc hacked and will block them automatically ?

  • @Red-ne
    @Red-ne 9 หลายเดือนก่อน

    That’s great and all but how can you tell which is which?
    How to know if this is thing is a malware or if it’s a system file or something from Microsoft themselves sending reports to them

  • @Mobay18
    @Mobay18 11 หลายเดือนก่อน +3

    I don't know how useful this is, if I where to create malware, I would just hijack the event collection and hide my malwares events.