Welcome to Process-info.org library

Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.

Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.

It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.

The Latest News

15 latest global news related to computer security

July 7, 2015 3:09:12 AM CEST

Rootkit:W32/ZAccess – Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.

 

July 7, 2015 3:09:12 AM CEST

Trojan-Spy:W32/FinSpy.A – Trojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity.

 

July 6, 2015 2:45:08 AM CEST

'Internet Capacity Warning' Phishing Scam – According to this email, which claims to be from the 'Support Department' at 'Information Technology Services', your internet capacity is 70% full and you therefore need to contact support to avoid problems.

 

July 4, 2015 9:42:11 AM CEST

PlayStation 4 Like and Share Giveaway Facebook Scam – Facebook Page claims it is giving away '200 pieces of Play Station 4' because they have been unsealed and therefore cannot be sold. The Page claims that users can win just by liking and sharing.

 

July 4, 2015 1:37:07 AM CEST

'Confidential Document' Google Docs Phishing Scam – Email asks the recipient to click a link to view an important confidential document in Google Docs.

 

July 3, 2015 2:53:33 PM CEST

CryptoWall joins forces with click fraud botnet to infect individuals and businesses alike – Earlier this year, we told you about the return of CryptoWall, malware that encrypts certain files in your computer and, once activated, demands a fine around $500 as a ransom to provide the decryption key. These kinds of financial fraud schemes target both individuals and businesses, are usually very successful and have a significant impact […]

 

July 3, 2015 1:54:33 PM CEST

Defending Critical Systems: Does It Have To Be “Smart”? – Everywhere I go it seems to be that “critical” systems are being attacked. Earlier this year people were talking about whether planes could be hacked. We’ve talked about whether smart grids can be hacked, too. Just a week or so ago, LOT Polish Airlines was almost completely grounded by a distributed denial-of-service (DDoS) attack. In […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroDefending Critical Systems: Does It Have To Be “Smart”?

 

July 3, 2015 9:00:00 AM CEST

OSX.Backloader – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

OSX.Dropper – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

Hacktool.Securetunnel – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

Hacktool.Proxy.A – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

Hacktool.EventLog – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

Hacktool.Multipurpose – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

Hacktool.Bannerjack – Risk Level: Very Low. Type: Trojan.

 

July 3, 2015 9:00:00 AM CEST

Trojan.Cryptolock!g13 – Risk Level: Very Low. Type: Trojan.

 
 
 

Navigate through library of processes alphabeticaly by first letter: