xpmili.blogg.se

How to use process explorer
How to use process explorer











how to use process explorer
  1. #HOW TO USE PROCESS EXPLORER UPDATE#
  2. #HOW TO USE PROCESS EXPLORER PC#
  3. #HOW TO USE PROCESS EXPLORER PLUS#
  4. #HOW TO USE PROCESS EXPLORER WINDOWS 7#

In DLL mode, you can see the DLLs and memory-mapped files that the process has loaded. In handle mode, you can view the handles opened by the selected process in the top window. The information shown in the bottom window depends on the mode that the app is in. The top window always displays a list of currently active processes, including the names of their associated accounts. User Interface The Process Explorer interface consists of two sub-windows. This tool provides you with information about the handles and DLLs ( Dynamic Link Libraries) that processes have opened or loaded.

#HOW TO USE PROCESS EXPLORER PLUS#

Get the oddest tech stories of the week, plus the most popular news and reviews delivered straight to your inbox.Have you ever been curious about which program has a specific file or directory open? Now you can easily find out with Process Explorer. Sign up for TechRadar's free Weird Week in Tech newsletter Liked this? Then check out 10 tips for removing stubborn malware

#HOW TO USE PROCESS EXPLORER PC#

NET components.įirst published in PC Plus Issue 252. The range of columns covers memory, disk and network use, threads, DLLs and even. You can also add columns to the display by right-clicking a column heading and selecting 'Select columns'.

#HOW TO USE PROCESS EXPLORER UPDATE#

You'll see your anti-malware update itself, discover what uses most CPU, see which applications hog your memory and much more. It's a good idea to keep Process Explorer open in the background for a few days to get a feel for what's normal for your PC based on your typical usage. If you have a dual core processor or better, you can still access the system and kill the process using Process Explorer. Sometimes normal processes can go wild and suddenly take nearly 100 per cent of the CPU time. Many processes use ports to communicate locally it's nothing to worry about.

how to use process explorer

You can tell because rather than the local or remote address being an external DNS name, both will be your PC's name, a colon, and the port number. Many of the processes you interrogate in this way will be listening to the local machine.

how to use process explorer

Note down any unknown sites and search for them online. To convert the IP addresses listed into DNS names, ensure that the 'Resolve Addresses' tick box is selected.

how to use process explorer

In Process Explorer, double-click the suspicious process, then click the 'TCP/IP' tab. If a botnet client has infected your computer, it'll need to phone home to receive orders on a regular basis, for example. Any process that isn't an application you've started (or a service related to an application you've installed) and which shows a path or working directory outside of the C:\Windows directory tree should be treated as possible malware, especially ones that use the 'Temp' directory.ĭiscovering what a suspicious process connects to, if anything, is a good way of deciding whether it's malicious.

#HOW TO USE PROCESS EXPLORER WINDOWS 7#

System directories in Windows 7 are all well protected by default, so any malware will have to use a temporary directory outside of the system area. Some very old software, like Microsoft Office 2000, has no signature to check, which will lead to an 'Unable to verify' message. It's likely that the manufacturer isn't a verified signer of images. If verifying the image of a seemingly legitimate process produces the message 'Unable to verify', don't panic. When verifying images, pay particular attention to processes that have no entry in the 'Company name' column, those whose description is blank or meaningless, and those whose name is a jumble of letters. If they match, it changes the text to read 'Verified'. Process Explorer uses the running process to generate its own signature and compares the two. Clicking the 'Verify' button verifies the image against a stored signature. Next to the process's icon are the words 'Not verified'. You can verify that the process hasn't been tampered with or infected by malware by selecting the 'Image' tab. To get more details of any process, double-click it. To make it easier to spot such files, you can click the 'Process' column heading until you get an alphabetical listing.













How to use process explorer