Windows Sysinternals Toolkit Walkthrough

Date: June 12th 2025
Category:
 Windows 11 Projects


Tools Installed

Installed via Chocolatey:

choco install sysinternals -y --ignore-checksums

Install location:
C:\ProgramData\chocolatey\lib\sysinternals\tools

Command-line access enabled for:

procexp
autoruns
procmon
tcpview

🔗 Official Microsoft page:
https://learn.microsoft.com/sysinternals


1. Process Explorer


2. Autoruns


3. Process Monitor (Procmon)


4. TCPView – Active Network Monitoring

Tool Summary:

Observations:

Process Remote Host/Service Notes
firefox.exe google.com (via 142.250.x.x) Normal browser activity
steam.exe valve.net, akamai.net, u2-puls.tech Related to Steam/Valve CDN
PowerPanel Internal kubernetes.docker.internal Local/VM bridge — normal
syncthing.exe u2-puls.tech / Docker bridges Syncthing sync traffic — expected

WHOIS Lookup: akamaitechnologies.com

TCPView revealed connections to domains like akamaistream.net, a known CDN subdomain.

WHOIS record for akamaitechnologies.com:

Field Value
Domain akamaitechnologies.com
Registrar MarkMonitor Inc.
Created August 18, 1998
Updated July 16, 2024
Expires August 17, 2025
DNS AX0.AKAMAISTREAM.NET, NS2-32.AKAMAISTREAM.NET, etc.
Status Protected (delete/transfer/update disabled)
Registrar Abuse abusecomplaints@markmonitor.com
Official Whois https://www.icann.org/wicf/

🔗 Akamai Official Site: https://www.akamai.com

Conclusion:


5. PowerShell Signature Verification

Command used:

Get-AuthenticodeSignature "C:\Path\To\File.exe"

Example:

Get-AuthenticodeSignature "C:\ProgramData\chocolatey\lib\sysinternals\tools\procexp.exe"

Reviewed:

There are tons of other tools for system analysis as well.


Revision #1
Created 12 June 2025 22:01:49 by Nate Nash
Updated 12 June 2025 22:04:21 by Nate Nash