How To View Hidden Processes

Table of contents:

How To View Hidden Processes
How To View Hidden Processes

Video: How To View Hidden Processes

Video: How To View Hidden Processes
Video: Windows 10 - Process Monitor - Find Hidden Registry Keys And View Program Behavior 2024, December
Anonim

By opening the "Task Manager", a Windows user can see the processes running in the system and close those that seem suspicious to him. To protect their programs from detection, the authors of Trojans and ad-aware try in every possible way to hide their processes.

How to view hidden processes
How to view hidden processes

Instructions

Step 1

To get the most out of Task Manager, you must configure it correctly. Open the utility (Ctrl + alt="Image" + Del), select "View" - "Select Columns". Check the boxes: "Process ID", "CPU Load", "Memory - Usage", "USER Objects", "Username". You won't be able to see hidden processes, but more information about visible ones can be very useful too. For example, many simple Trojans disguise themselves as the svchost.exe process. The original process is marked as SYSTEM in the Username column. The Trojan process will have the Admin status, that is, it will be launched as an administrator.

Step 2

Almost any well-written Trojan horse is now capable of hiding its presence from the Task Manager. Can it be found in this case? This is where special utilities come to the rescue to reveal hidden processes. AnVir Task Manager is a very convenient program that allows you to identify many dangerous programs. The program has a Russian interface and can be downloaded for free on the Internet.

Step 3

The simple and easy-to-use Process Hacker program has very good capabilities for finding hidden processes. With this utility, you can see running processes, services and current network connections.

Step 4

One of the best programs for finding hidden processes is Spyware Process Detector, its 14-day trial version can be downloaded from the link at the end of the article. The program has a wide range of search mechanisms for hidden processes, which compares favorably with many other similar utilities.

Step 5

A small utility called HijackThis can be a useful tool in the fight against Trojans. The utility is designed for fairly experienced users. You can see a guide on its use below, in the list of sources.

Recommended: