Welcome to Process-info.org library

Process-info.org is an online library of Computer Operating System's Processes, which helps you to identify processes running at background of computer operating system or at remote computers on your network.

Process-info.org contains a growing database of executable processes (mostly with .EXE extension) and DLL libraries. You can search for processes through search box or navigate alphabeticaly by starting letter of process name.

It is assumed that users are familiar with computer operating system they're using and agree with suggested changes. Process-info.org will not be held responsible, if changes you make cause a system failure.

The Latest News

15 latest global news related to computer security

February 12, 2016 3:09:58 AM CET

Trojan-Spy:W32/FinSpy.A – Trojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity.


February 11, 2016 7:49:48 PM CET

VU#327976: Cisco Adaptive Security Appliance (ASA) IKEv1 and IKEv2 contains a buffer overflow vulnerability – Cisco Adaptive Security Appliance(ASA)Internet Key Exchange versions 1 and 2(IKEv1 and IKEv2)contains a buffer overflow vulnerability that may be leveraged to gain remote code execution.


February 11, 2016 7:47:55 PM CET

KillDisk and BlackEnergy Are Not Just Energy Sector Threats – Our new intelligence on BlackEnergy expands previous findings on the first wide-scale coordinated attack against industrial networks. Based on our research that we will further outline below, attackers behind the outages in two power facilities in Ukraine in December likely attempted similar attacks against a mining company and a large railway operator in Ukraine. This proves...


February 11, 2016 11:54:31 AM CET

Kaspersky Lab Named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms for the Fifth Consecutive Year – Kaspersky Lab today announced that it has been positioned in the "Leaders" quadrant of the 2016 Gartner Magic Quadrant for Endpoint Protection Platforms


February 11, 2016 11:00:00 AM CET

Throwback Thursday: The Thin Blue Line – This Throwback Thursday, VB heads back to 1994 when UK Fraud Squad detectives started making inroads into the most puzzling 'Whodunnit' since the Great Train Robbery. Had an outbreak of computer crime swept Britain? No, it was all part of a police training program. Read more


February 11, 2016 7:03:15 AM CET

Bogus Posts About ISIS Attacks in Australia Link to Scam Website – ‘News’ posts currently appearing on Facebook and other social media sites are claiming that ISIS attacks have killed and wounded people in various Australian cities and towns including Geelong, Geraldton, and Atherton. Clicking the posts opens a ‘World Current Events’ website that features a report with details about the supposed attack. The report claims that seven people have been killed and 11 wounded in various shootings across the named city or town.


February 11, 2016 3:48:38 AM CET

Amazon ‘Security Notice’ Phishing Scam Email – According to this ‘security notice’ email, which purports to be from Internet giant Amazon, access to ‘certain features’ of your account have been temporarily restricted as a security measure.


February 11, 2016 2:36:18 AM CET

‘Bananas Injected With HIV’ Hoax Warning – According to would be warning messages that are circulating via social media and various fake-news reports, people are injecting HIV infected blood into bananas so you should not eat bananas that contain a red colour inside. Supposedly, health authorities have discovered that about one million bananas originating from Guatemala have been contaminated with the HIV infected blood.


February 11, 2016 1:07:21 AM CET

Surprise, Surprise! Four Headed Snake Picture is ‘Photoshopped’ – This rather compelling picture depicting a four headed, two bodied snake is currently slithering its way around the interwebs.


February 11, 2016 1:00:00 AM CET

Trojan.Ransomcrypt.AC – Risk Level: Very Low. Type: Trojan.


February 10, 2016 11:29:24 PM CET

Online dating scams target divorced, middle-aged women –   Lonely hearts still waiting for their soulmate are easy prey for online dating scams. Many people search for love through online dating sites, dating apps, or social media. Unfortunately, before you find your prince (or princess), you have to eliminate the frogs. “Romance” scammers, sometimes referred to as “sweetheart” scammers take advantage of vulnerable […]


February 10, 2016 11:18:00 PM CET

Welcome to virusbulletin.com – Almost 20 years after Virus Bulletin revealed its first site on the "world wide web", we've redesigned our whole website. And we have a new domain as well. Read more


February 10, 2016 6:17:31 PM CET

Cisco Releases Security Update – Original release date: February 10, 2016 | Last revised: February 11, 2016 Cisco has released a security update to address a vulnerability in its Adaptive Security Appliance (ASA) software. Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.                                               Users and administrators are encouraged to review the Cisco Security Advisory and apply the necessary update. For additional information, please see Vulnerability Note VU#327976.  This product is provided subject to this Notification and this Privacy & Use policy.


February 10, 2016 11:36:34 AM CET

User Beware: Rooting Malware Found in 3rd Party App Stores – Think of third-party app stores as independent shops in the city where people go to as an alternative to the city mall. The mall practically has everything you need. In fact, almost everyone goes to the mall. The shops have items not available in the mall, and vice versa. Some people would rather go to...


February 10, 2016 1:48:15 AM CET

February 2016 Patch Tuesday Includes Critical Fixes for IE Vulnerabilities; Adobe Releases Updates for Flash Player – For this month’s Patch Tuesday, Microsoft released 13 security bulletins addressing vulnerabilities in Internet Explorer, Microsoft Windows, and Microsoft Edge among others. Out of these bulletins 6 are tagged as Critical while 7 are marked as Important.


Navigate through library of processes alphabeticaly by first letter: