Current location - Quotes Website - Personality signature - How to use procexp
How to use procexp
First, check for suspicious processes. Some Trojans use windows system program names, such as services. Exe and svchost. Exe。 (These files are in the windows\system32 directory, and Trojans are usually placed in the disk root directory or windows directory. Another situation is that a process occupies a large proportion of CPU.

2 If you see a suspicious program, select it directly from the list, right-click to view the properties, or double-click it directly.

Look at the description information of the program. Microsoft program description information and version information are generally very detailed. If there is no version information, it may be a Trojan horse, and some Trojans have written information similar to Microsoft. At this point, you can use the digital signature verification function and click the verify button. If the Microsoft program will prompt.

A suspicious program was found and could not be confirmed. Click Google in the right-click menu, and you can directly open IE to help you search online.

According to the information of this program, you can confirm whether this program is a Trojan horse.

4 This tool can replace the Windows Task Manager, and select the option->; Replace the task manager, which will be started every time you start the task manager through CTRL+ALT+DEL or in the explorer taskbar.