Does Traps see pico processes in Windows?

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.

Does Traps see pico processes in Windows?

L1 Bithead

Wanted to know if Traps was capable of stoping a bashware attack in Windows 10 by being able to analyze a pico process as part of the Windows Subsystem for Linux. If not by default, how would you enable Traps to see the pico processes?


Community Team Member

Moving this to the Traps discussions.


Cheers !


LIVEcommunity team member, CISSP
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Sorry about that. 

Does anyone know whether or not Traps can see into the pico processes?


Can you define what you mean by PICO; I'm only familar with that acronim in healthcare and sadly that doesn't mean anything here. 



This is what I'm referring to. It's the "minimal process that is associated with a pico profider kernel-mode driver." I'm curious if Traps can see these processes in Windows 10 when using Windows Subsystem for Linux (WSL). Bashware can leverage these processes to avoid detection from antivirus software installed on windows by utilizing these processes and I'm looking for clarification on how Traps does or does not protect against this.


So I actually just looked through my processes on the ESM console and they do detect processes running from within the Bash shell. I looked at a few of them that I know I would have been using and from what I can see non of them are protected by default, meaning you would have to setup the process in a provisional or protected state yourself. 

Hope that helps, looks like you could pretty easily make Traps compliant with whatever protections you need but it wouldn't be enabled by default. 


That's great news. Can you share how you had that configured?


I actually don't have any specific to these types of processes, as far as I'm aware I'm the only person running Bash in our enviroment and I only use it for it's built in SSH capablities. That being said setting up process protection and linking subsequent EPM rules would be the same as adding protection to a custom or otherwise unprotected process; I highly recommend reaching out to your SE and getting in touch with your regions endpoint protection team, they can help you along this process. 

  • 7 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!