Search commands reference
Posted: 04 Aug 2013 12:26
Process Hacker supports a limited number of searchbox commands in addition to the default wildcard search.
By default you can search by any entered syntax and filter all Process, Service and Network activity. Examples:Explorer.exe
Svchost
TDI
High
Low
You can enter multiple queries using the | character. Examples:
svchost
|BadSignature
svchost
|IsImmersive
svchost
|chrome
|firefox
|IsBeingDebugged
You can also filter the current view based on specific search queries:
Limited
The Process token elevation type is limited.
Full
The Process token elevation type is elevated.
IsBeingDebugged
The Process is being natively debugged.
IsDotNet
The Process is a native .NET executable.
IsElevated
The Process is elevated.
IsInJob
The Process is part of a job.
IsInSignificantJob
The Process is part of a significant job.
IsPacked
The Process is a packed executable.
IsPosix
The Process is a native POSIX executable.
IsSuspended
The Process is suspended.
IsWow64
The Process is a 32bit executable.
IsImmersive
The Process is a Metro (Immersive) executable.
NoSignature
The Process executable signature unavailable.
Trusted
The Process executable signature is trusted.
Expired
The Process executable signature has expired.
Revoked
The Process executable signature is revoked.
Distrust
The Process executable signature is not trusted.
SecuritySettings
The Process executable signature encountered a policy error.
BadSignature
The Process executable signature has a bad signature, not trusted.
Unknown
The Process executable signature is unknown.