Fact-checked by Grok 2 weeks ago

Process Explorer

Process Explorer is a and system monitor for Microsoft Windows, developed by , that displays detailed information about which handles and dynamic-link libraries (DLLs) processes have opened or loaded. It features a dual-pane interface with the upper pane listing active processes alongside their owner accounts and the lower pane showing either open handles or loaded DLLs and memory-mapped files, depending on the selected view mode. Created by as part of the suite of utilities, which originated in 1996 to provide advanced system tools for IT professionals and developers, Process Explorer was enhanced over time to offer powerful search capabilities for identifying processes associated with specific handles or DLLs. was acquired by in July 2006, integrating the tool into Microsoft's official diagnostics portfolio while keeping it freely available. The is particularly valued for troubleshooting issues such as DLL version conflicts, handle leaks, and gaining insights into the inner workings of Windows and applications. Its latest version, 17.07, was released on November 11, 2025, and it supports and later client editions as well as and higher.

History and Development

Origins

Process Explorer was developed in 2001 by and Bryce Cogswell as part of Winternals Software LP, a company they co-founded to create advanced Windows utilities. The tool emerged from the merger of two prior utilities: HandleEx, which viewed open handles, and DLLView, which displayed loaded dynamic-link libraries (DLLs). This combination addressed limitations in existing process monitoring tools by providing a unified for deeper system diagnostics. The initial purpose of Process Explorer was to serve as a more powerful alternative to the Windows , enabling administrators and developers to diagnose issues, track usage, and identify potential problems like leaks or DLL conflicts. Unlike the basic overview offered by , it emphasized real-time visualization of running es, including hierarchical views of parent-child relationships and basic inspection of open s. Version 1.0 of Process Explorer was released in 2001 and made freely available for download through the Winternals website, quickly gaining popularity among IT professionals for its practical capabilities. Early iterations prioritized ease of use with a graphical interface that updated process data in real time, laying the foundation for its role as an essential diagnostic resource in Windows environments.

Acquisition by Microsoft

On July 18, 2006, Microsoft announced the acquisition of Winternals Software LP, the company behind the Sysinternals suite of utilities, including Process Explorer. This move brought the popular free tools, developed by Mark Russinovich and Bryce Cogswell since 1996, under Microsoft's ownership, with the founders joining the company—Russinovich as a Technical Fellow in the Platforms and Services Division and Cogswell as a Software Architect on the Windows Component Platform Team. The acquisition aimed to enhance Microsoft's efforts in reducing the total cost of ownership for Windows users by integrating advanced diagnostic and management tools into its ecosystem. Following the acquisition, tools were temporarily unavailable for public download as Microsoft conducted a licensing review to ensure compliance and standardize terms. During this period, some older or incompatible utilities (such as those limited to or ) were not reinstated, but the core suite, including Process Explorer, was preserved and re-released as the "Sysinternals Suite"—a bundled package available as a single download from 's TechNet site. This re-release featured updated, more permissive click-through licensing that broadened usage rights without requiring custom agreements, allowing continued free access for troubleshooting and system analysis. The integration positioned within 's freeware offerings, committing to no commercialization or paywalls for the tools, which aligned with their longstanding availability to millions of users worldwide. Russinovich, as a employee, assumed responsibility for ongoing maintenance and updates, ensuring the tools' evolution while leveraging 's resources for broader compatibility and support. This shift marked a pivotal moment, transitioning Process Explorer from an independent utility to a key component of 's diagnostic portfolio without disrupting its community-driven utility.

Version Updates

Following Microsoft's acquisition of Sysinternals in 2006, Process Explorer has received regular updates to enhance compatibility and functionality with evolving Windows operating systems. Version 11.0, released in September 2007, introduced improved support for 64-bit Windows systems, including better handling of 64-bit processes and threads. In July 2011, version 15.0 added GPU utilization and memory monitoring capabilities for and later, allowing users to track usage per via new column options in the view . Version 16.0, released in January 2014, integrated scanning for process hashes to aid in detection, with subsequent updates in the 16.x series through 2016 enhancing search functionality for handles and DLLs. Dark mode support was added later in the 16.x series in October 2022, aligning the tool's interface with Windows theming options. Version 17.06, released on May 28, 2024, addressed bugs such as window display issues on startup, process suspend/resume menu problems, and compatibility fixes for , including security enhancements. The most recent version, 17.07, was released on November 11, 2025, adding support for strings in Arm64 binaries and fixing a bug that disabled notification area icons. Updates to Process Explorer are typically issued every 1-2 years, often coinciding with Windows releases to ensure ongoing and incorporate new .

Core Functionality

Process and Thread Monitoring

Process Explorer provides a hierarchical that organizes active processes according to their parent-child relationships, enabling users to visualize how processes and interact within the . By default, this indents child processes beneath their parents, offering a clear representation of process hierarchies that surpasses the flat list in Windows . This view updates dynamically to reflect the current state of running processes, facilitating real-time oversight of activity. In the main process view, users can access metrics such as CPU usage percentage, process start time, and full command-line arguments for each entry. The CPU usage column highlights resource-intensive processes immediately, while the start time indicates and potential anomalies like unexpectedly persistent tasks. Command-line details reveal parameters, aiding in identifying scripted or automated executions. These elements are displayed in customizable columns, allowing tailored monitoring without external tools. For deeper thread-level analysis, double-clicking a process opens a properties dialog with a dedicated Threads tab, listing all active threads within that process along with their levels—ranging from idle to —and base priority values. Selecting a thread enables viewing of its current , including both user-mode and kernel-mode stacks if appropriate privileges are enabled, which helps diagnose blocking or erroneous thread . This granular visibility supports multithreaded applications by exposing execution contexts not visible in standard process lists. Direct management options are integrated into the via context menus, permitting users to or resume individual or threads to temporarily halt execution for , or to kill them outright for termination. Suspending a freezes all its threads, while thread-specific suspension targets only the selected one, preserving overall responsiveness. Resuming reverses suspension, and killing removes the target from , with options to end entire trees including descendants. These actions require administrative privileges and provide immediate control over potentially problematic elements.

Handle and DLL Inspection

Process Explorer includes dedicated views for examining the handles and dynamic-link libraries (DLLs) associated with running processes, enabling users to identify resource conflicts, dependency issues, and potential leaks. The view displays all open handles held by a selected process, categorizing them by type such as files, registry keys, threads, mutexes, and network connections. This allows administrators to pinpoint which resources a process is accessing, which is essential for troubleshooting scenarios like file locking or registry access problems. To access the Handle view, users select a process in the upper pane of the Process Explorer and switch to the handle tab in the lower pane, revealing a comprehensive list of with details including the handle type, name, and status. Search and filter options facilitate quick navigation; for instance, the built-in search function (accessible via Ctrl+F or the Find menu) scans across all for specific by name or type, while filters can narrow results to particular categories like only. Double-clicking a in this view populates the lower pane with expanded details, such as the full path for a or the associated ID for a , aiding in deeper investigation without leaving the tool. The DLL view, similarly accessed by selecting a process and switching tabs in the lower pane, lists all loaded modules including DLLs and memory-mapped files, providing critical like the module's number, file path, timestamp, and verification status to confirm authenticity and detect tampering. This view is particularly useful for diagnosing scenarios, where incompatible versions lead to application instability, as it reveals dependencies and loaded paths that might conflict with system-wide installations. Search capabilities extend here as well, allowing users to locate DLLs by name or attributes across processes, with filters to isolate verified versus unverified modules. Double-clicking a DLL entry displays detailed properties in the lower pane, including export functions, import dependencies, and resource sections, which help trace cascading library issues. For detecting handle leaks—where processes fail to release resources, potentially leading to system exhaustion—Process Explorer supports snapshot comparisons. Users can capture a baseline of open via the View menu, then generate a subsequent after running a workload; the tool highlights differences, such as newly opened that persist unexpectedly, quantifying potential leaks by count and type. This feature integrates contextually with the process tree view, providing a hierarchical perspective on how parent-child processes share or accumulate .

CPU and Memory Analysis

Process Explorer offers robust tools for analyzing CPU and utilization, enabling users to monitor system-wide performance and diagnose per-process . The primary includes mini-graphs at the top of the main displaying CPU, , and I/O , providing an immediate overview of resource trends. The System Information dialog, invoked through the View menu or by pressing Ctrl+I, presents comprehensive system-wide metrics in a dedicated with multiple tabs. In the Summary tab, it features paired graphs showing current levels alongside historical data for CPU load, commit charge, and physical . The CPU graph differentiates kernel-mode usage in red from total usage (kernel plus user-mode) in green, with mouse-over tooltips revealing precise percentages, the top contributing , and timestamps. For multi-processor systems, a option displays one graph per CPU core, highlighting per-processor loads and aiding in identifying uneven distribution. The commit charge graph illustrates committed against the commit limit (total physical plus pagefile size), where approaching the limit signals potential system instability due to paging . Physical stats include available and in-use RAM, paged , and non-paged allocations, helping users assess overall . For per-process analysis, double-clicking a process opens the Properties dialog, where the Performance Graph tab displays Task Manager-style historical charts for CPU usage and memory allocation. The CPU history chart uses color coding—red for kernel-mode execution and green for combined kernel and user-mode—to track consumption over time, allowing identification of spikes or sustained high usage that may indicate performance bottlenecks. Similarly, the private bytes graph visualizes the process's exclusive virtual memory allocation, scaled to its peak, to reveal trends in committed resources. Users can sort the main process list by CPU or memory columns to quickly spot high-usage processes, with visual cues like flashing green for new processes or purple for services enhancing prioritization. Memory analysis distinguishes between private bytes and working set to facilitate leak detection. Private bytes measure the non-shareable virtual memory committed to the process, including heap and stack allocations, while the working set reflects the subset actively resident in physical . In the Properties dialog's Performance or Memory tabs, these metrics are listed alongside graphs; a steadily rising private bytes value without proportional working set increases often signals a memory leak, as the process accumulates un-freed allocations over time. This differentiation helps troubleshoot issues like gradual resource exhaustion, with examples including applications that fail to release buffers, leading to escalating private bytes. These tools—graphs for trends and color-coded indicators for emphasis—enable efficient identification of hogs without exhaustive , supporting proactive .

Advanced Features

Security and Virus Detection

Process Explorer incorporates several built-in features designed to assist users in detecting and analyzing potentially malicious processes, enhancing its utility beyond basic monitoring. A prominent security capability is the integration with , added in version 16.0 released in January 2014. This feature enables users to scan running processes and associated s directly from the tool's context menu by right-clicking a process and selecting "Check VirusTotal." Process Explorer submits the file's cryptographic hash to VirusTotal's online service, which compares it against signatures from over 70 antivirus engines without uploading the full , thereby maintaining user . Results appear in a dedicated "VirusTotal" column, displaying the number of detections (e.g., "5/70" indicating five engines flagged it as malicious), allowing rapid identification of known threats. Users must opt in once via the Options > VirusTotal.com menu, and the tool also supports checking all running processes at once for comprehensive scans. Complementing this, Process Explorer offers digital signature verification for executables and loaded DLLs, accessible when the "Verify Image Signatures" option is enabled under the Options menu. Upon inspection via the process properties dialog (double-click a process or right-click > Properties), the tool queries the Windows certificate store to determine if the image is signed by a trusted root authority. The verification status is explicitly indicated—such as "Signed" for valid signatures, "Unsigned" for lacking any signature, or "Not Verified" for failed checks due to expiration or revocation—helping users distinguish legitimate system components from potentially altered or rogue software. This feature is particularly useful for spotting unsigned processes that may indicate malware injection or unauthorized modifications. To facilitate quick visual triage of potential threats, Process Explorer employs color-based highlighting in its process list view. Unsigned processes do not receive a unique color, but suspicious attributes are emphasized: for instance, processes exhibiting signs of packing or —a technique often used by for —are highlighted in purple, drawing immediate attention to possible hidden payloads. Other security-relevant highlights include pink for processes hosting services (which could threats), dark gray for suspended processes (potentially evading detection), and red for recently terminated processes (useful for tracking short-lived ). These customizable colors, configurable via Options > Configure Highlighting, provide an at-a-glance without altering core monitoring functions. Process Explorer also supports examination of boot execute entries to uncover startup threats, viewable through its integration with system startup mechanisms, though detailed analysis often pairs it with complementary tools for full visibility into early-boot persistence.

System Tray Integration

Process Explorer supports integration with the Windows system tray, allowing users to run the tool minimized for unobtrusive monitoring. By launching the application with the /t command-line parameter or enabling the "Hide When Minimized" option under the View menu, Process Explorer minimizes to the system tray instead of the taskbar, displaying a compact graph icon that visualizes real-time CPU usage. The tray dynamically updates to reflect overall system CPU utilization, with color coding to indicate load levels: green for under 70%, yellow for 70-90%, and red for over 90%. Users can toggle between a simple CPU usage meter and a detailed CPU history graph via the "CPU History in Tray" setting in the Options menu, providing at-a-glance performance insights without restoring the full . Hovering over the icon reveals tooltips with additional metrics, such as precise CPU percentage and the top consuming . Right-clicking the tray icon accesses a context menu for quick actions, including restoring the main window, searching for specific processes by name or , and initiating shutdowns or terminations of selected processes directly from the . A single left-click on the icon restores the full Process Explorer window to the foreground. To enhance accessibility as a Task Manager alternative, Process Explorer includes an option under the Options menu to replace the default Windows (taskmgr.exe). Selecting "Replace Task Manager" modifies the system registry to redirect invocations of —such as via Ctrl+Shift+Esc or right-clicking the —to launch Process Explorer instead, enabling seamless substitution for routine process management. This replacement can be reversed through the same menu or by deleting the associated registry key at HKEY_LOCAL_MACHINE\SOFTWARE\[Microsoft](/page/Microsoft)\Windows [NT](/page/Windows_NT)\CurrentVersion\Image File Execution Options\taskmgr.exe. For continuous monitoring, the "Always on Top" feature, accessible via the View menu or the tray context menu, pins the Process Explorer window above other applications, ensuring visibility during multitasking without interrupting workflows. This mode is particularly useful for real-time oversight of system resources while using other software.

Customization Options

Process Explorer provides extensive customization for its process view, enabling users to tailor the displayed information to specific needs. Through the View , users access the "Select Columns" dialog to choose from a wide array of data fields, such as CPU usage percentage, private bytes for , handle count, and thread details, allowing for a focused display without overwhelming details. Columns can be rearranged by dragging headers, and the view supports saving multiple column sets for quick switching between configurations. Sorting is achieved by clicking on column headers, which organizes processes ascending or descending based on the selected metric, facilitating rapid identification of resource-intensive applications. Visual customization options include adjustable color schemes to enhance readability and adapt to user preferences. Since 17.0, released in 2022, Process Explorer incorporates dark mode support, which can be toggled via the View > Options menu to match the Windows system theme or enable manually for reduced glare during extended use. Additional color configurations, such as highlighting for elevated processes or CPU heatmaps, are managed in the same Options dialog to differentiate process states visually. The Options dialog, found under the Options menu, centralizes behavioral settings for precise control over tool functionality. Key features include enabling "Verify Image Signatures" to validate the authenticity of files against digital certificates, aiding in detection by flagging unsigned or tampered images. Users can also configure the display of start times as relative to the current moment rather than timestamps, improving temporal in dynamic environments. Furthermore, the CPU history length can be adjusted—typically set to samples by default—to balance between detailed historical tracking of usage patterns and performance overhead. For efficient navigation and operation, Process Explorer includes built-in shortcuts for frequent tasks. Pressing Ctrl+K on a selected initiates termination, bypassing interactions for swift management. Other shortcuts, such as Ctrl+H to suspend a or F2 to rename in the view, streamline workflows without altering core settings. These can be viewed or customized in the Options > Hotkeys section for personalized key bindings.

Usage and Integration

Installation and Basic Operation

Process Explorer is distributed by as part of the Sysinternals suite and can be downloaded directly from the official Sysinternals page on Microsoft Learn in the form of a portable ZIP archive measuring approximately 3.3 MB. This format requires no formal installation process; users simply extract the contents of the ZIP file to a desired location on their system. Alternatively, the tool can be executed directly via the Sysinternals Live service without downloading the archive, by accessing procexp.exe from https://live.sysinternals.com/procexp.exe.[](https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer) The application supports and later versions, as well as and subsequent releases. To launch Process Explorer, users run the procexp.exe executable, ideally with administrator privileges to ensure access to all system processes and detailed information that may be restricted under standard user accounts. Upon startup, the tool presents a double-pane : the upper pane displays a hierarchical list of all currently active processes, including details such as process names, owning account names, CPU usage, and consumption. The lower pane focuses on the process selected in the upper pane, showing either open s (in handle mode) or loaded dynamic-link libraries (DLLs) and memory-mapped files (in DLL mode), with the mode toggleable via the View menu or toolbar buttons. This layout provides an immediate overview of system activity without needing additional configuration. Basic operations begin with viewing the process list in the upper pane, where users can scroll, sort columns by clicking headers (e.g., by CPU or usage), or expand process trees to see processes. To locate a specific by name, the Find dialog (accessible via Ctrl+F or the menu) allows searching across the process list. For deeper inspection, right-clicking a in the upper pane and selecting opens a comprehensive dialog displaying tabs for details like performance graphs, threads, disk activity, GPU usage, and security attributes. These actions enable quick monitoring of system resources, and the included help file (procexp.chm) offers further guidance on and options.

Troubleshooting Applications

Process Explorer serves as a vital diagnostic tool for identifying and resolving application hangs, where processes become unresponsive due to or deadlocks. By examining CPU wait chains, users can visualize the dependencies between s and processes that lead to such issues. To access this feature, right-click on a suspected process in the main window and select "Properties," then navigate to the Threads tab; from there, selecting "Show Wait Chain" for a reveals a hierarchical of waiting relationships, highlighting bottlenecks such as a blocked on a mutex held by another process. This capability, introduced in early versions of the tool, enables administrators to pinpoint the root cause—often a higher-priority monopolizing a —and take corrective actions like terminating the blocking process or adjusting priorities, thereby restoring system responsiveness. Detecting memory leaks, where an application progressively consumes more without releasing it, is facilitated through Process Explorer's monitoring of the , which represents the physical actively used by a process. Users can add the "" and "Private Bytes" columns via View > Select Columns > Process to track these metrics over extended periods; a steadily increasing in the absence of corresponding workload growth indicates a leak, as unreleased allocations accumulate in the process's . For instance, in a long-running service like a , observing the climb from 50 to over 1 within hours without traffic spikes allows for targeted investigation, such as suspending threads or capturing a memory dump for further analysis with tools like . This tracking method provides quantitative insight into leak severity, helping prioritize fixes based on impact to system stability. Resolving DLL conflicts, which arise when incompatible versions of dynamic link libraries are loaded simultaneously, relies on Process Explorer's detailed inspection of loaded modules. Switching to DLL view (View > Lower Pane View > DLLs) displays all DLLs, memory-mapped files, and their paths, versions, and timestamps for a selected process, allowing users to identify discrepancies such as multiple instances of the same DLL from different directories (e.g., one from the system folder and another from a third-party installation). By verifying signatures and comparing against expected versions via the Verify option, conflicts causing crashes or erratic behavior—common in environments with legacy software—can be diagnosed; remediation might involve updating the application, removing redundant paths from the system PATH variable, or using tools like Dependency Walker for deeper dependency graphs. This granular visibility prevents "DLL hell" scenarios without requiring code changes. Network-related application issues, such as port exhaustion or unauthorized , can be troubleshot using Process Explorer's TCP/IP endpoint enumeration. In the process properties dialog, the TCP/IP tab lists all active , including local and remote addresses, ports, and states (e.g., ESTABLISHED or TIME_WAIT), revealing anomalies like a process holding excessive ephemeral ports that block new outbound . For example, a database client repeatedly failing to connect due to port depletion becomes evident when hundreds of TIME_WAIT states accumulate under its , guiding interventions like adjusting TCP timeouts via registry edits or restarting the service to clear the backlog. This endpoint view integrates seamlessly with broader network diagnostics, offering process-specific context that correlates application behavior with traffic patterns.

Compatibility with Windows Versions

Process Explorer maintains full compatibility with modern Windows client editions starting from and extending to , supporting both 32-bit and 64-bit architectures through dedicated executables such as procexp.exe for 32-bit systems and procexp64.exe for 64-bit systems. The tool also includes native ARM64 support via the procexp64a.exe binary, enabling seamless operation on Windows 11 devices with ARM-based processors, a capability introduced in updates following the 2019 porting effort for and refined in subsequent releases to align with Windows 11's architecture. For server environments, Process Explorer is supported on and later versions, providing the same diagnostic functionalities as on client editions. However, on minimal installations like , which intentionally omit the to reduce footprint and enhance security, Process Explorer cannot run locally due to its reliance on GUI components; instead, users must employ remote access methods, such as (RDP), to interact with the tool from a full desktop session. Historically, earlier iterations of Process Explorer extended compatibility to legacy Windows versions, including , where versions up to 16.05 operated effectively on XP SP3 with both 32-bit and 64-bit support where applicable. Subsequent updates aligned requirements with newer APIs, such as credui.dll in version 12.04 and beyond, effectively dropping support for pre-XP systems like while maintaining backward compatibility through and 8 in intermediate releases. Process Explorer is exclusively designed for Windows operating systems and does not support non-Windows environments like , though the broader suite has seen expansions with Linux-compatible tools such as Sysmon and certain PsTools utilities. This Windows-centric focus ensures optimized integration with native for process monitoring but limits cross-platform applicability.

Comparisons and Alternatives

Versus Windows

Process Explorer serves as an advanced alternative to the built-in Windows , offering deeper insights into system processes while overlapping in basic monitoring functions such as viewing CPU and usage. Unlike , which presents a flat list of processes grouped by applications or background tasks, Process Explorer displays processes in a hierarchical that reveals parent-child relationships, enabling users to trace how applications spawn subprocesses for better of complex behaviors. One key distinction lies in thread-level details: Task Manager provides only aggregate thread counts per process, whereas Process Explorer allows users to access a dedicated Threads tab in the process properties dialog, showing individual s with their CPU utilization, start addresses, and stack traces for diagnosing performance bottlenecks or hangs. This granular view supports advanced , such as identifying high-CPU threads within a process. Process Explorer extends beyond 's basic resource overviews by including specialized tabs for handles and DLLs. While reports total handles opened by a process, Process Explorer lists all active handles (e.g., files, registry keys, or mutexes) and enables searching across processes to detect leaks or conflicts. Similarly, it enumerates loaded DLLs and memory-mapped files per process, aiding in resolving version conflicts or dependency issues absent from 's interface. For resource monitoring, both tools feature real-time graphs, but Process Explorer's System Information dialog provides more comprehensive visualizations of CPU, I/O, memory, and GPU activity, with options to zoom and correlate events, surpassing Task Manager's performance tab in depth for prolonged analysis. As a portable, free tool from Microsoft Sysinternals, Process Explorer requires no installation and can directly replace Task Manager via its Options menu, intercepting Ctrl+Shift+Esc shortcuts for seamless integration without third-party dependencies.

Versus Other Sysinternals Tools

Process Explorer provides a graphical for viewing and managing currently running es, distinguishing it from other tools that target more specialized aspects of system diagnostics. Unlike , which captures real-time file system, Registry, , and activity through continuous capable of handling millions of events, Process Explorer emphasizes static snapshots of details, such as CPU usage, memory allocation, and open handles, without ongoing event tracing. This makes Process Explorer ideal for quick overviews of system load and interactions, while excels in troubleshooting dynamic behaviors like file access conflicts or registry modifications during application execution. In contrast to Autoruns, which focuses exclusively on enumerating and managing startup programs across locations like Registry keys, scheduled tasks, and browser extensions, Process Explorer offers broad monitoring of all active processes regardless of their launch origin. Autoruns aids in identifying and disabling persistent auto-start entries that could impact boot performance, whereas Process Explorer reveals the runtime impact of those entries once they are active, including resource consumption and dependencies. The tools complement each other, as Autoruns can directly launch Process Explorer to inspect properties of selected startup executables for deeper analysis. Process Explorer also overlaps with PsList in providing process listings but prioritizes a user-friendly over PsList's command-line approach, which is better suited for scripted or remote querying of process statistics like and thread counts. While PsList delivers concise textual output for automation across local or remote systems, Process Explorer's interactive features, such as double-clicking to view process trees or handle details, facilitate on-the-fly investigation without scripting. Overall, these utilities form a complementary suite: Process Explorer serves as the central hub for process oversight, with tools like , Autoruns, and PsList handling targeted logging, startup management, and command-line enumeration, respectively.

References

  1. [1]
    Process Explorer - Sysinternals - Microsoft Learn
    May 28, 2024 · The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the ...Process Monitor v4.01ProcDump v11.0
  2. [2]
    Sysinternals | Microsoft Learn
    Oct 13, 2025 · You'll find Sysinternals utilities to help you manage, troubleshoot and diagnose your Windows and Linux systems and applications.
  3. [3]
    [PDF] Diagnostics and Recovery Toolset Overview
    Microsoft acquired Sysinternals in July 2006. The Sysinternals utilities are some of the most powerful diagnostic tools available—and they are free. You can ...
  4. [4]
    What is Process Explorer and how does it work? - Microsoft Learn
    Aug 13, 2014 · Process Explorer began in the early Sysinternals days as two separate utilities, HandleEx and DLLView, which were merged in 2001.^\[1\]^Until ...Missing: Winternals | Show results with:Winternals
  5. [5]
    Microsoft Acquires Winternals Software - Source
    Jul 18, 2006 · Microsoft Acquires Winternals Software. Microsoft Source. REDMOND ... Winternals was established in 1996 by Mark Russinovich and Bryce ...
  6. [6]
    [PDF] Windows Sysinternals Administrator's Reference - Pearsoncmg.com
    Oct 19, 2012 · for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. ... and HandleEx to create Process Explorer in 2001.Missing: origins | Show results with:origins
  7. [7]
    How to use Process Explorer, Microsoft's free, supercharged Task ...
    Mar 21, 2017 · Microsoft's Process Explorer is a powerful utility that makes the built-in Windows Task Manager obsolete. Here's how to use it.
  8. [8]
    Sysinternals Site Migration - Microsoft Learn
    Oct 30, 2006 · At Mark's direction, we are not going to be migrating 100% of the tools for one of the following reasons: It only worked on Win9x or DOS – the ...
  9. [9]
    Sysinternals Software License Terms - Microsoft Learn
    May 24, 2023 · These license terms are an agreement between Sysinternals (a wholly owned subsidiary of Microsoft Corporation) and you. Please read them.Missing: review 2006
  10. [10]
    Process Explorer 11.0 | TechPowerUp Forums
    Sep 6, 2007 · Microsoft has released Version 11.0 of the free Process Explorer utility which is a more detailed version of Task Manager. Download.
  11. [11]
    Process Explorer 15 adds GPU monitoring - BetaNews
    Jul 20, 2011 · Click View > Select Columns > GPU and check the boxes next to whatever you'd like to watch: GPU Usage, GPU Private Data, GPU Committed Bytes, or ...
  12. [12]
    Download Process Explorer 15.0 for Windows - OldVersion.com
    Process Explorer 15.0 Change Log - Adds GPU utilization and memory monitoring on Vista and higher. - Adds the ability to restart services. - A smaller memory ...
  13. [13]
    Process Explorer 16.0 brings Virustotal support - gHacks Tech News
    Jan 30, 2014 · “Process Explorer v16.01: This release fixes a bug that could cause a crash when the VirusTotal column is added to the process view, and another ...
  14. [14]
    Microsoft updates Process Explorer with dark mode support - Neowin
    Oct 27, 2022 · The latest update for the Sysinternals app suite brings dark mode support and a multi-pane view to Process Explorer, plus a couple of new ...Missing: v16 | Show results with:v16<|control11|><|separator|>
  15. [15]
    Process Explorer v.17.06 finally patches issues that prevent app ...
    May 29, 2024 · Microsoft launched Process Explorer v. 17.06. The latest update now patches a few issues here and there, and you can download it now.
  16. [16]
    Update: Process Explorer v11.03 - Microsoft Community Hub
    Jun 27, 2019 · Process Explorer v11.03 : This update to Process Explorer, an advanced process information utility, has a number of miscellaneous improvements.
  17. [17]
    [PDF] Process Explorer - Documentation & Help
    Process Explorer is an advanced process management utility that picks up where Task Manager leaves off. It will show you detailed information.
  18. [18]
    The Systems Internals Newsletter Volume 6, Number 2
    ... priority. There is a Kill button which will terminate an individual ... Process Explorer displays the thread's stack (both user and kernel, if the ...
  19. [19]
    System Information - Process Explorer - Documentation & Help
    The System Information entry in the View menu and typing Ctrl+I opens a dialog box that shows global system performance metrics like those shown in Task ...Missing: charge Sysinternals<|control11|><|separator|>
  20. [20]
    System Information window | Process Explorer# - Geek University
    The Memory tab of the System Information window displays the System Commit and Physical Memory graphs. In the Commit graphs, the area under the yellow line ...
  21. [21]
    [PDF] Process Explorer - Documentation & Help
    Process Explorer includes a toolbar and mini graphs for CPU, memory, and if on Windows 2000 or higher, I/O history, at the top of the main window. They can ...
  22. [22]
    Sysinternals Process Utilities - Microsoft Learn
    Mar 23, 2021 · Find out what files, registry keys and other objects processes have open, which DLLs they have loaded, and more. This uniquely powerful utility ...
  23. [23]
    Private Bytes, Virtual Bytes, and Working Set - Baeldung
    Mar 18, 2024 · In this tutorial, we'll discuss three memory-related concepts in the operating system: private bytes, virtual bytes, and working sets.
  24. [24]
    Sysinternals Process Explorer - Cyber Raiden - WordPress.com
    Apr 19, 2015 · Version : The file version extracted from the version ... History : A graphical representation of the process' private byte commit history.
  25. [25]
    Process Explorer Now Including VirusTotal Support - ThreatDown
    Jan 29, 2014 · The popular Process Explorer program from Sysinternals, now including allowing users to submit files for running processes to VirusTotal.<|separator|>
  26. [26]
    Incident Response: Using Process Explorer to look for malware
    Jan 7, 2025 · Since version 16 (~ January 2014) Process Explorer has included integration with Virustotal. ... Further, Process Explorer supports submissions to ...
  27. [27]
    Process Properties - Process Explorer Documentation
    Process Explorer checks for whether or not an image has been digitally signed by a certificate root authority trusted by the computer and displays the status ...Missing: digital | Show results with:digital
  28. [28]
    Four ways to put Sysinternals Process Explorer to work | TechTarget
    Feb 10, 2016 · One option that's not turned on by default is Verify Image Signatures. It's worth turning this on so Process Explorer checks the digital ...
  29. [29]
    Process Explorer: part two - ThreatDown by Malwarebytes
    May 26, 2016 · Process Explorer uses color coding as extra information about the processes. ... The color red means that the process is exiting (being stopped).Missing: unsigned | Show results with:unsigned
  30. [30]
    Process highlighting | Process Explorer# - Geek University
    Process highlighting ; Green – a new process that was just started. ; Red – processes that have just exited. ; Light blue – processes running as the same user ...Missing: unsigned | Show results with:unsigned
  31. [31]
    Autoruns - Sysinternals - Microsoft Learn
    Feb 6, 2024 · ... boot execute images, Winlogon notification DLLs, Windows Services ... If Process Explorer is running and there is an active process ...
  32. [32]
    Process Explorer does not start minimized any more - Microsoft Q&A
    Mar 18, 2023 · I'm currently using Process Explorer 17.02. Normally it could be started into System Tray by using command line parameter '/t'.
  33. [33]
    Running in the Tray - Process Explorer - Documentation & Help
    The default is one second. You can change the highlighting colors by editing them in the Configure Highlighting dialog that you open in the Options menu.<|control11|><|separator|>
  34. [34]
    Process explorer will not revert back to task manager - Microsoft Q&A
    Feb 6, 2022 · Process explorer lets you replace the functionality of task manager with Process Explorer through a menu item that says "Replace Task Manager".
  35. [35]
    How to show the number of TCP connection in columns of Process ...
    Jun 3, 2023 · Open Process Explorer and go to the "View" menu. · Select "Select Columns" to open the Columns dialog box. · In the "Select Columns" dialog box, ...
  36. [36]
    Troubleshoot issues using Process Explorer - Windows Server
    Jan 15, 2025 · Install Debugging Tools for Windows. · Run Process Explorer as an administrator. · Select the Options menu, and then select Configure Symbols.
  37. [37]
    Process Explorer always verifies signatures - Microsoft Q&A
    May 22, 2022 · The option "Verify Image Signatures" cannot be disabled. I tried to uncheck it in the menu, but the setting is ignored.Signature-less Microsoft products? (Process Explorer)verified signer - Microsoft Q&AMore results from learn.microsoft.comMissing: digital | Show results with:digital
  38. [38]
    How do I install install process explorer? Which version of the ...
    Jul 24, 2024 · To install, run procexp.exe. There are three versions: procexp.exe, procexp64.exe, and possibly procexp64a.exe. The first two are likely 32-bit ...Missing: compatibility | Show results with:compatibility
  39. [39]
    Microsoft Ports Process Explorer and Monitor to Windows ARM64
    May 3, 2019 · Microsoft is looking to port the popular Sysinternals utilities to ARM64 so that they can run on Windows 10 on ARM.
  40. [40]
    Process explorer - Microsoft Q&A
    Apr 23, 2021 · Hello, What do i need to install on the newest ProcessExplorer ,latest windows in order to see process behind the system (smallest download possible if needed)
  41. [41]
    Manage Server Core | Microsoft Learn
    Jan 16, 2025 · There are some important limitations and tips to keep in mind when you work with Server Core: If you close all command prompt windows and ...Missing: Process | Show results with:Process
  42. [42]
    where to obtain Windows XP-compatible Process Explorer
    Nov 21, 2022 · Process Explorer version 15.30 16.02 is compatible with XP SP3, and is available here https://web.archive.org/web/20140508010446/http://download.sysinternals. ...
  43. [43]
    How to list a process tree on Windows? - Super User
    Jan 24, 2013 · Try Process Exporer from Sysinternals. It is like an advanced task manager, there is a tree view as well.Command line tools to view process list in Windows 10. pslist slowHow to show full command line of all processes in WindowsMore results from superuser.com
  44. [44]
    Defrag Tools: #2 - Process Explorer - Microsoft Learn
    Aug 6, 2012 · Process Explorer is a comprehensive replacement for Task Manager. It allows you to view the details of the processes running on the computer.
  45. [45]
    Process Monitor - Sysinternals | Microsoft Learn
    Jun 20, 2024 · Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity.Introduction · Screenshots · Related Links<|control11|><|separator|>
  46. [46]
    PsList - Sysinternals - Microsoft Learn
    Mar 30, 2023 · PsList is part of a growing kit of Sysinternals command-line tools that aid in the administration of local and remote systems named PsTools.