Skip to main content

How to detect what process is thrashing your hard drive

Posted September 2007 by Steve Sinchak

Every once in a while you notice that your hard drive is working extra hard for what seems like no reason.  A background process has taken your hard drive hostage, forcing it to thrash loudly as it struggles to keep up with the high rate of reads and writes.  Your computer responds slowly as the process overloads the physical limitations of your drive. What are you to do?

The solution is simple, identify and stop the process that is killing your drive.  There are two methods and tools that you can use to identify the process. Once you have identified the bad process, you can kill it in Task Manager.

Method 1

  1. Click on the Start Button and key in perfmon.exe /res and hit Enter. This should launch the Resource Monitor on Windows 7 and Windows Vista.
  2. On the overview screen click on the Disk section down arrow to see a list of all processes and the files they are writing or reading from your drives.
  3. Click on the Read, Write or Total headings to sort all disk operations to identify which process and file is currently using the disk the most.

Method 2

  1. Visit Microsoft’s Sysinternals web site and download Process Explorer.
  2. After you have started Process Explorer, click on the View menubar item and then Select Columns.
  3. Click on the Process I/O tab and check:
    • Reads
    • Read Bytes
    • Writes
    • Write Bytes
  4. Hit OK.
  5. You will now see the new columns listed for each process. To identify what process is killing your hard drive, just look for the process with the highest number of Reads or Bytes.

Related Posts


If you own a Google Chromecast streaming device, you can easily share a browser tab in Chrome browser or even your entire desktop.  This can be very useful when presenting from your laptop or if you just want to watch something on a big screen that is only on your PC.  The only requirement is you must be on the same network as your Chromecast...

Read More

If you are a fan of minimalist desktop experiences, hiding the desktop icons are an easy way to clean up the Windows interface.  Instead of saving everything to your desktop, use the default profile folders such as downloads and documents.  Actually hiding all the icons on your desktop is a very simple customization hidden in the right-click context menu.  Just right-click on the desktop, select View...

Read More

Google security researchers have published details about a major security flaw found in the SSL protocol that is used to encrypt data transferred between your browser and a web server. SSL is typically used in situations where logon credentials are validated...

Read More

Enabling two-factor authentication is a great way to add an additional level of protection to your Microsoft account.  Even if your password is stolen, your account is still protected because two-factor authetication requires an additional level of verification to log in. Microsoft calls their version of two-factor authentication "two-step verification" and it works by providing you with a random code...

Read More