Process Hacker Discussion Forum

Search found 9 matches

by WildByDesign
21 Apr 2019 02:09
Forum: General Discussion
Topic: UWP Apps: Who is the user?
Replies: 8
Views: 7100

Re: UWP Apps: Who is the user?

That's a bug with the attrbute parsing. I've fixed the NOALLAPPPKG checks for LPAC in the latest nightly :thumbup: Thank you, sir. Your time, effort and dedication to this project is greatly appreciated. Thanks! The last remaining item is adding parsing of the AppxManifest.xml and showing custom ca...
by WildByDesign
19 Apr 2019 22:26
Forum: General Discussion
Topic: UWP Apps: Who is the user?
Replies: 8
Views: 7100

Re: UWP Apps: Who is the user?

I've updated the nightly build with a new container tab showing the profile locations :thumbup: Your recent development regarding AppContainer and specifically this Container tab has been thorough and fantastic. It's exciting keeping up with your fast pace of development. I have a brief question re...
by WildByDesign
27 Feb 2019 14:51
Forum: Feature Requests
Topic: New Column: AppContainer
Replies: 1
Views: 5108

Re: New Column: AppContainer

I forgot to attach a screenshot. I wanted to show a screenshot from the TokenViewer program UI that shows how James Forshaw from Google's P0 team has differentiated between Integrity Level and AppContainer. It just shows AppContainer simply as True or False. However, I would suggest: AC, LPAC, blank...
by WildByDesign
22 Feb 2019 17:15
Forum: Feature Requests
Topic: New Column: AppContainer
Replies: 1
Views: 5108

New Column: AppContainer

I would like to request the addition of a new column in Process Hacker that a user can optionally select; AppContainer. Process Hacker (nightly builds) only labels some process as AppContainer within the Token tab. I propose having two columns because not all Untrusted or Low integrity processes are...
by WildByDesign
29 Jun 2018 13:52
Forum: Completed
Topic: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION
Replies: 4
Views: 4817

Re: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION

This issue/request is now fixed on the latest Nightly build and this thread can be closed. Thank you!
by WildByDesign
18 Jun 2018 15:27
Forum: Completed
Topic: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION
Replies: 4
Views: 4817

Re: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION

@dmex I noticed your recent commits (https://github.com/processhacker/processhacker/commit/07054f30a7a42a63055f7fae0de6027aee438b3b) and (https://github.com/processhacker/processhacker/commit/6495557f7fe970d8ab6d9f33e91d12c4290188a8) within the past couple of days regarding "RESTRICT_INDIRECT_B...
by WildByDesign
20 Feb 2018 19:52
Forum: Completed
Topic: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION
Replies: 4
Views: 4817

Re: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION

I found some more good details in the Chromium bug tracker.
Link: https://bugs.chromium.org/p/chromium/is ... =808526#c4

Some great details in that particular comment including some specifications in response from Microsoft's security team in response to Google's team.
by WildByDesign
20 Feb 2018 15:14
Forum: Completed
Topic: ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION
Replies: 4
Views: 4817

ProcessMitigations - RESTRICT_INDIRECT_BRANCH_PREDICTION

With the January 2018 security updates, a new process mitigation was developed under-the-hood "RESTRICT_INDIRECT_BRANCH_PREDICTION_ALWAYS_ON" to allow processes to utilize Windows OS mitigation for the recent Meltdown/Spectre side-channel CPU vulnerabilities. I noticed just recently that C...
by WildByDesign
18 Jan 2017 19:40
Forum: Completed
Topic: Return Flow Guard - Mitigation
Replies: 2
Views: 4881

Return Flow Guard - Mitigation

I am new to the forum, but have used Process Hacker for several years. I've always known Process Hacker to be ahead of the curve when it comes to supporting new things such as showing processes which had the Control Flow Guard (CFG) mitigation compiled and enabled several months prior to Process Exp...