My Blog

Process Hacker on Cloud

1-click AWS Deployment    1-click Azure Deployment


Process Hacker is an open source process viewer. It is similar to Process Explorer, but has many more features for debugging and monitoring. Additionally, it can terminate processes that other tools cannot.

It is a free and open source app that will let you view all the processes that your system runs. The app is a powerful multi-purpose tool that can be used as a replacement for Windows Task Manager.

It will help you with debugging, malware detection and system monitoring. Process Hacker includes features like powerful process termination, memory viewing/editing and other unique and specialized features.

Process Hacker is owned by Process Hacker( and they own all related trademarks and IP rights for this software.

Process Hacker gives you a detailed overview of your system activity by highlighting the processes in different colours. You can also view your system resources by means of graphs and stats.

Process Hacker on Cloud For AWS


Major Features Of Process Hacker 

Process Hacker has a rich feature set which includes the following:

  • One major addition is support for viewing the load time and load reasons for process modules, on Windows 8 and above. If a long-running process like Explorer.exe is developing problems, you can now sort its modules by load time to get clues about the cause.
  • Priority and I/O priority can be set for multiple processes at once, while I/O priorities may be saved as required.
  • Right-clicking a service now provides menu options to open its key in Regedit, or open its file location in Explorer.
  • There’s new support for checking process use of Control Flow Guard, Microsoft’s new exploit mitigation technology for Windows 8.1 and 10.
  • You’ll get handle names for job and section objects, while the very brave can directly access section objects in memory (double-click a process, select Handles, right-click a section, select Read/ Write Memory).
  • Elsewhere there’s new highlighting for AppContainer DLLs, disk and network graphs are now available for all processes, there’s support for setting thread/ process affinity on up to 64 processors and the ExtendedTools and UserNotes plugins have both seen updates.


Installation Instructions For Windows

Note: How to find PublicDNS in AWS

Step 1) RDP  Connection: To connect to the deployed instance, Please follow Instructions to Connect to Windows  instance on AWS Cloud

1) Connect to the virtual machine using following RDP credentials:

  • Hostname: PublicDNS  / IP of machine
  • Port : 3389

Username: To connect to the operating system, use RDP and the username is Administrator.
Password: Please Click here to know how to get password .

Step 2) Click the Windows “Start” button and select “All Programs” and then point to Process Hacker

Step 3) Other Information:

1.Default installation path: will be in your root folder “C:\Program Files\Process Hacker 2”
2.Default ports:

  • Windows Machines:  RDP Port – 3389
  • Http: 80
  • Https: 443

Configure custom inbound and outbound rules using this link

Installation Step by Sinp Screenshots


Process Hacker on Cloud

Related Posts