A defensive security tool for analyzing Windows process logs to detect suspicious behavior, malicious processes, and potential security threats.
- Process Tree Analysis: Builds parent-child relationships from process logs
- Security Detection: Identifies suspicious processes and behaviors including:
- Known malicious/hacking tools
- Process masquerading (legitimate processes with wrong signatures)
- Suspicious process chains (e.g., Office apps spawning cmd/PowerShell)
- High CPU/memory usage anomalies
- Unsigned processes
- Comprehensive Reporting: Generates detailed security reports with severity levels
- JSON Export: Export analysis results for further processing
No special installation required. Just ensure Python 3.6+ is installed.
Basic usage:
python process_analyzer.py <logfile>Save report to file:
python process_analyzer.py <logfile> --output report.txtExport to JSON:
python process_analyzer.py <logfile> --json results.jsonThe analyzer expects process logs in tab-separated format with the following columns:
- Process name (with indentation showing hierarchy)
- CPU usage
- Private Bytes
- Working Set
- PID
- Description
- Company Name
The analyzer performs the following security checks:
- Known malicious tools (mimikatz, psexec, cryptolocker, etc.)
- Process masquerading (system processes with incorrect signatures)
- Suspicious process chains (Office → cmd/PowerShell)
- Missing company information for system processes
- Extremely high CPU usage (>90%)
- Unsigned processes
- High memory usage (>1GB)
================================================================================
WINDOWS PROCESS SECURITY ANALYSIS REPORT
================================================================================
SUMMARY STATISTICS
----------------------------------------
Total processes analyzed: 500
Suspicious findings: 25
Findings by severity:
CRITICAL: 0
HIGH: 2
MEDIUM: 5
LOW: 18
[HIGH] Findings:
• Process Masquerading: svchost.exe
Process svchost.exe has unexpected company: Unknown (expected: Microsoft Corporation)
PID: 12345
When reviewing the analysis results:
- Investigate Critical findings immediately - These indicate known malicious tools
- Verify High severity findings - Check if processes are legitimate or compromised
- Review Medium findings - May indicate configuration issues or suspicious activity
- Monitor Low severity findings - Track patterns over time
This tool is for defensive security purposes only. Use responsibly for analyzing and securing Windows systems.