Pourquoi mon PC crash et reboot tout seul?

Solutions (1)
Tags :
  • Système d'exploitation
|
Bonjour,

depuis un moment ma machine crash et reboot toute seul ... malgré mes recherche j'ai rien trouver voulez vous m'aider svp ...


j'ai analyser le Dump :


====================================================================================================


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\test.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Windows 7 Kernel Version 7601 (Service Pack 1) MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`01c05000 PsLoadedModuleList = 0xfffff800`01e4a670
Debug session time: Tue Jun 26 17:07:02.480 2012 (UTC + 2:00)
System Uptime: 0 days 0:34:37.412
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F4, {3, fffffa8021f0f630, fffffa8021f0f910, fffff80001f858b0}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

Page 44c35e not present in the dump file. Type ".hh dbgerr004" for details
------------------------------------------------
| |
| NT symbols are not available |
| reduced functionality |
| |
------------------------------------------------
unable to get nt!KiCurrentEtwBufferOffset
unable to get nt!KiCurrentEtwBufferBase
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
Probably caused by : csrss.exe

Followup: MachineOwner
---------

6: kd> .reload
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa8021f0f630, Terminating object
Arg3: fffffa8021f0f910, Process image file name
Arg4: fffff80001f858b0, Explanatory message (ascii)

Debugging Details:
------------------

Page 44c35e not present in the dump file. Type ".hh dbgerr004" for details

PROCESS_OBJECT: fffffa8021f0f630

IMAGE_NAME: _

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: _

FAULTING_MODULE: 0000000000000000

PROCESS_NAME: pskill.exe

BUGCHECK_STR: 0xF4_pskill.exe

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff8000200c5e2 to fffff80001c81c40

STACK_TEXT:
fffff880`0a11db08 fffff800`0200c5e2 : 00000000`000000f4 00000000`00000003 fffffa80`21f0f630 fffffa80`21f0f910 : nt!KeBugCheckEx
fffff880`0a11db10 fffff800`01fb999b : ffffffff`ffffffff fffffa80`38d55060 fffffa80`21f0f630 fffffa80`399c1060 : nt!PspCatchCriticalBreak+0x92
fffff880`0a11db50 fffff800`01f39448 : ffffffff`ffffffff 00000000`00000001 fffffa80`21f0f630 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x176d6
fffff880`0a11dba0 fffff800`01c80ed3 : fffffa80`21f0f630 00000000`00000000 fffffa80`38d55060 00000000`00000074 : nt!NtTerminateProcess+0xf4
fffff880`0a11dc20 00000000`77b615da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b615da


STACK_COMMAND: kb

FOLLOWUP_NAME: MachineOwner

FAILURE_BUCKET_ID: X64_0xF4_pskill.exe_IMAGE__

BUCKET_ID: X64_0xF4_pskill.exe_IMAGE__

Followup: MachineOwner
---------

11: kd> !process 0 0
**** NT ACTIVE PROCESS DUMP ****
PROCESS fffffa8019a5f040
SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
DirBase: 00187000 ObjectTable: fffff8a0000017a0 HandleCount: 1312.
Image: System

PROCESS fffffa801cf63b30
SessionId: none Cid: 018c Peb: 7fffffd8000 ParentCid: 0004
DirBase: 453be0000 ObjectTable: fffff8a0019eaf90 HandleCount: 55.
Image: smss.exe

PROCESS fffffa801cd5db30
SessionId: 0 Cid: 0200 Peb: 7fffffde000 ParentCid: 01f8
DirBase: 44c715000 ObjectTable: fffff8a0041fcc00 HandleCount: 1169.
Image: csrss.exe

PROCESS fffffa8038a785f0
SessionId: 1 Cid: 0234 Peb: 7fffffd3000 ParentCid: 022c
DirBase: 85398b000 ObjectTable: fffff8a0042618a0 HandleCount: 73.
Image: csrss.exe

PROCESS fffffa801cd77b30
SessionId: 0 Cid: 023c Peb: 7fffffd6000 ParentCid: 01f8
DirBase: 44c0db000 ObjectTable: fffff8a004277be0 HandleCount: 92.
Image: wininit.exe

PROCESS fffffa801cda0b30
SessionId: 0 Cid: 0268 Peb: 7fffffd4000 ParentCid: 023c
DirBase: 44ba5e000 ObjectTable: fffff8a0042a2c40 HandleCount: 368.
Image: services.exe

PROCESS fffffa8038ae5910
SessionId: 1 Cid: 0280 Peb: 7fffffdd000 ParentCid: 022c
DirBase: 8536d1000 ObjectTable: fffff8a00425fa40 HandleCount: 88.
Image: winlogon.exe

PROCESS fffffa801cda69e0
SessionId: 0 Cid: 02a4 Peb: 7fffffdc000 ParentCid: 023c
DirBase: 44b6cc000 ObjectTable: fffff8a004298a40 HandleCount: 1264.
Image: lsass.exe

PROCESS fffffa801cdaa6c0
SessionId: 0 Cid: 02b0 Peb: 7fffffdf000 ParentCid: 023c
DirBase: 44b212000 ObjectTable: fffff8a00415ccd0 HandleCount: 410.
Image: lsm.exe

PROCESS fffffa8038b1f280
SessionId: 0 Cid: 0310 Peb: 7fffffd7000 ParentCid: 0268
DirBase: 851d3e000 ObjectTable: fffff8a0044184f0 HandleCount: 415.
Image: svchost.exe

PROCESS fffffa8038b49b30
SessionId: 0 Cid: 0360 Peb: 7fffffde000 ParentCid: 0268
DirBase: 8519ff000 ObjectTable: fffff8a0040a0ac0 HandleCount: 378.
Image: svchost.exe

PROCESS fffffa8038b4b6b0
SessionId: 1 Cid: 03bc Peb: 7fffffd9000 ParentCid: 0280
DirBase: 851834000 ObjectTable: fffff8a00442ae00 HandleCount: 187.
Image: LogonUI.exe

PROCESS fffffa8038b5e200
SessionId: 0 Cid: 03c8 Peb: 7fffffd9000 ParentCid: 0268
DirBase: 85155a000 ObjectTable: fffff8a004453150 HandleCount: 1009.
Image: svchost.exe

PROCESS fffffa8038b63b30
SessionId: 0 Cid: 03f0 Peb: 7fffffd5000 ParentCid: 0268
DirBase: 850805000 ObjectTable: fffff8a0044fe940 HandleCount: 1246.
Image: svchost.exe

PROCESS fffffa8038b6d920
SessionId: 0 Cid: 00cc Peb: 7fffffdf000 ParentCid: 0268
DirBase: 85044d000 ObjectTable: fffff8a0044f96b0 HandleCount: 379.
Image: svchost.exe

PROCESS fffffa8038b751b0
SessionId: 0 Cid: 01a0 Peb: 7fffffd7000 ParentCid: 0268
DirBase: 850ad3000 ObjectTable: fffff8a0044f6b30 HandleCount: 852.
Image: svchost.exe

PROCESS fffffa8038b7db30
SessionId: 0 Cid: 01e0 Peb: 7fffffd6000 ParentCid: 0268
DirBase: 85091b000 ObjectTable: fffff8a0045afd40 HandleCount: 701.
Image: Smc.exe

PROCESS fffffa8038ba4b30
SessionId: 0 Cid: 00b4 Peb: 7fffffdc000 ParentCid: 0268
DirBase: 84f12a000 ObjectTable: fffff8a004961010 HandleCount: 481.
Image: svchost.exe

PROCESS fffffa8038bc5550
SessionId: 0 Cid: 0428 Peb: 7efdf000 ParentCid: 0268
DirBase: 84e50f000 ObjectTable: fffff8a004837200 HandleCount: 540.
Image: ccSvcHst.exe

PROCESS fffffa8038bedb30
SessionId: 0 Cid: 0588 Peb: 7fffffd8000 ParentCid: 0268
DirBase: 84d355000 ObjectTable: fffff8a0049cb7a0 HandleCount: 326.
Image: svchost.exe

PROCESS fffffa8038c66610
SessionId: 0 Cid: 0634 Peb: 7fffffd5000 ParentCid: 0268
DirBase: 84c078000 ObjectTable: fffff8a0040374d0 HandleCount: 394.
Image: spoolsv.exe

PROCESS fffffa8038c92b30
SessionId: 0 Cid: 0694 Peb: 7efdf000 ParentCid: 0268
DirBase: 84c13c000 ObjectTable: fffff8a004b811e0 HandleCount: 179.
Image: dsm_sa_eventmgr32.exe

PROCESS fffffa8038c9ab30
SessionId: 0 Cid: 06c8 Peb: 7efdf000 ParentCid: 0268
DirBase: 84b402000 ObjectTable: fffff8a004bc5df0 HandleCount: 1317.
Image: dsm_sa_datamgr32.exe

PROCESS fffffa8038ca4600
SessionId: 0 Cid: 06ec Peb: 7efdf000 ParentCid: 0268
DirBase: 84b549000 ObjectTable: fffff8a004d62ac0 HandleCount: 775.
Image: scanmaster.exe

PROCESS fffffa8038c0f950
SessionId: 0 Cid: 0724 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 84add3000 ObjectTable: fffff8a004c491d0 HandleCount: 106.
Image: SPMonitor.exe

PROCESS fffffa8038cbd420
SessionId: 0 Cid: 075c Peb: 7efdf000 ParentCid: 0268
DirBase: 84aa1f000 ObjectTable: fffff8a0049c4b10 HandleCount: 88.
Image: mr2kserv.exe

PROCESS fffffa8038cc2b30
SessionId: 0 Cid: 077c Peb: 7ffff000 ParentCid: 0268
DirBase: 84a147000 ObjectTable: fffff8a004c55180 HandleCount: 146.
Image: bpinetd.exe

PROCESS fffffa8038d0eb30
SessionId: 0 Cid: 07b8 Peb: 7efdf000 ParentCid: 0268
DirBase: 8496ce000 ObjectTable: fffff8a004a95160 HandleCount: 235.
Image: NSClient++.exe

PROCESS fffffa8038d26b30
SessionId: 0 Cid: 05cc Peb: 7fffffda000 ParentCid: 077c
DirBase: 849599000 ObjectTable: fffff8a0049d8cd0 HandleCount: 111.
Image: bpjava-msvc.exe

PROCESS fffffa8038d26060
SessionId: 0 Cid: 0614 Peb: 7efdf000 ParentCid: 0268
DirBase: 848c55000 ObjectTable: fffff8a004d02120 HandleCount: 74.
Image: OcsService.exe

PROCESS fffffa801cdc4b30
SessionId: 0 Cid: 01cc Peb: 7fffffdf000 ParentCid: 0200
DirBase: 43e316000 ObjectTable: fffff8a004cced50 HandleCount: 32.
Image: conhost.exe

PROCESS fffffa8038d3ab30
SessionId: 0 Cid: 07e0 Peb: 7efdf000 ParentCid: 0268
DirBase: 84915e000 ObjectTable: fffff8a0047ff750 HandleCount: 166.
Image: dsm_om_shrsvc32.exe

PROCESS fffffa8038d8f060
SessionId: 0 Cid: 0978 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 8484af000 ObjectTable: fffff8a004dafa00 HandleCount: 139.
Image: TNSLSNR.EXE

PROCESS fffffa8021c1d4e0
SessionId: 0 Cid: 0ad0 Peb: 7fffffd4000 ParentCid: 0268
DirBase: 840435000 ObjectTable: fffff8a0051f48d0 HandleCount: 548.
Image: oracle.exe

PROCESS fffffa8038ea8b30
SessionId: 0 Cid: 0684 Peb: 7fffffdd000 ParentCid: 0268
DirBase: 83dabd000 ObjectTable: fffff8a0053020a0 HandleCount: 706.
Image: oracle.exe

PROCESS fffffa8038e95b30
SessionId: 0 Cid: 0928 Peb: 7fffffd8000 ParentCid: 0268
DirBase: 83d784000 ObjectTable: fffff8a0052f74a0 HandleCount: 850.
Image: oracle.exe

PROCESS fffffa8038e8ab30
SessionId: 0 Cid: 0754 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 83d30a000 ObjectTable: fffff8a005381d10 HandleCount: 713.
Image: oracle.exe

PROCESS fffffa8038e89860
SessionId: 0 Cid: 0a30 Peb: 7fffffdc000 ParentCid: 0268
DirBase: 83c7ee000 ObjectTable: fffff8a00531d8e0 HandleCount: 1012.
Image: oracle.exe

PROCESS fffffa8038e92890
SessionId: 0 Cid: 099c Peb: 7fffffd4000 ParentCid: 0268
DirBase: 83c6b5000 ObjectTable: fffff8a0051fad60 HandleCount: 62.
Image: svchost.exe

PROCESS fffffa8038ec3b30
SessionId: 0 Cid: 0ab4 Peb: 7efdf000 ParentCid: 0268
DirBase: 83c47c000 ObjectTable: fffff8a0051f04d0 HandleCount: 487.
Image: dsm_om_connsvc32.exe

PROCESS fffffa8038e7c060
SessionId: 0 Cid: 0ad8 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 83bfa4000 ObjectTable: fffff8a005270430 HandleCount: 181.
Image: snmp.exe

PROCESS fffffa8021c037b0
SessionId: 0 Cid: 0a8c Peb: 7efdf000 ParentCid: 0ad8
DirBase: 83dc5c000 ObjectTable: fffff8a00539c9d0 HandleCount: 194.
Image: snmp.exe

PROCESS fffffa8021c74b30
SessionId: 0 Cid: 0b88 Peb: 7fffffd5000 ParentCid: 0200
DirBase: 435906000 ObjectTable: fffff8a005427300 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8038ecbb30
SessionId: 0 Cid: 0b44 Peb: 7efdf000 ParentCid: 0268
DirBase: 83c02a000 ObjectTable: fffff8a0053aa410 HandleCount: 525.
Image: Rtvscan.exe

PROCESS fffffa8038f00b30
SessionId: 0 Cid: 0bac Peb: 7fffffd4000 ParentCid: 0928
DirBase: 837508000 ObjectTable: fffff8a00532cc20 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8038efeb30
SessionId: 0 Cid: 0bb0 Peb: 7fffffdd000 ParentCid: 0ad0
DirBase: 8375a5000 ObjectTable: fffff8a004dfabe0 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8021c98630
SessionId: 0 Cid: 0bc0 Peb: 7fffffd6000 ParentCid: 0a30
DirBase: 42d6ce000 ObjectTable: fffff8a0052798d0 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8021c9eb30
SessionId: 0 Cid: 0bc4 Peb: 7fffffda000 ParentCid: 0684
DirBase: 42e738000 ObjectTable: fffff8a00506b5f0 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8021c81b30
SessionId: 0 Cid: 0bbc Peb: 7fffffdd000 ParentCid: 0754
DirBase: 42e4e4000 ObjectTable: fffff8a004d30510 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8038f04b30
SessionId: 0 Cid: 09f4 Peb: 7fffffda000 ParentCid: 0268
DirBase: 835d76000 ObjectTable: fffff8a004ebc300 HandleCount: 109.
Image: VolumeInfoProvider.exe

PROCESS fffffa8038f19b30
SessionId: 0 Cid: 09d0 Peb: 7fffffdb000 ParentCid: 0268
DirBase: 835fbc000 ObjectTable: fffff8a004db0010 HandleCount: 24.
Image: cmd.exe

PROCESS fffffa8021caab30
SessionId: 0 Cid: 0a98 Peb: 7efdf000 ParentCid: 09d0
DirBase: 42c4a1000 ObjectTable: fffff8a004f2cc10 HandleCount: 150.
Image: pbx_exchange.exe

PROCESS fffffa8021caa290
SessionId: 0 Cid: 0acc Peb: 7fffffd7000 ParentCid: 0200
DirBase: 42cac4000 ObjectTable: fffff8a004ebdd80 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8038fc9b30
SessionId: 0 Cid: 0f08 Peb: 7efdf000 ParentCid: 0268
DirBase: 82dc87000 ObjectTable: fffff8a00578a980 HandleCount: 55.
Image: SRVANY.EXE

PROCESS fffffa8019b0cb30
SessionId: 0 Cid: 0f20 Peb: 7efdf000 ParentCid: 0f08
DirBase: 428ca9000 ObjectTable: fffff8a0055ca010 HandleCount: 57.
Image: R3D3_agent.exe

PROCESS fffffa8019b0c600
SessionId: 0 Cid: 0f28 Peb: 7fffffd8000 ParentCid: 0200
DirBase: 427fc0000 ObjectTable: fffff8a0056b1630 HandleCount: 38.
Image: conhost.exe

PROCESS fffffa8038ff4b30
SessionId: 0 Cid: 0fa4 Peb: 7fffffd7000 ParentCid: 0310
DirBase: 82b49f000 ObjectTable: fffff8a004a68b40 HandleCount: 132.
Image: WmiPrvSE.exe

PROCESS fffffa8038f4e2e0
SessionId: 0 Cid: 1184 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 7200de000 ObjectTable: fffff8a005a0ae90 HandleCount: 383.
Image: svchost.exe

PROCESS fffffa8021e14060
SessionId: 0 Cid: 112c Peb: 7fffffda000 ParentCid: 0268
DirBase: 71f575000 ObjectTable: fffff8a0045e4de0 HandleCount: 123.
Image: svchost.exe

PROCESS fffffa8038f38740
SessionId: 0 Cid: 118c Peb: 7fffffd5000 ParentCid: 0268
DirBase: 839b11000 ObjectTable: fffff8a005a3c500 HandleCount: 80.
Image: svchost.exe

PROCESS fffffa8038d51b30
SessionId: 0 Cid: 093c Peb: 7fffffd6000 ParentCid: 0268
DirBase: 84f6d7000 ObjectTable: fffff8a004f42a40 HandleCount: 160.
Image: msdtc.exe

PROCESS fffffa8021d99060
SessionId: 0 Cid: 0d04 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 71d8e1000 ObjectTable: fffff8a005a3cf90 HandleCount: 193.
Image: sppsvc.exe

PROCESS fffffa8021f0f630
SessionId: 2 Cid: 0f70 Peb: 7fffffdf000 ParentCid: 05fc
DirBase: 353124000 ObjectTable: fffff8a009055650 HandleCount: 280.
Image: csrss.exe

PROCESS fffffa8021f06870
SessionId: 2 Cid: 0f74 Peb: 7fffffd9000 ParentCid: 05fc
DirBase: 352469000 ObjectTable: fffff8a0093a67b0 HandleCount: 110.
Image: winlogon.exe

PROCESS fffffa8038bccb30
SessionId: 2 Cid: 030c Peb: 7fffffd9000 ParentCid: 0268
DirBase: 71ec5a000 ObjectTable: fffff8a005bb7c60 HandleCount: 168.
Image: taskhost.exe

PROCESS fffffa8021f5c630
SessionId: 2 Cid: 1154 Peb: 7fffffdb000 ParentCid: 1184
DirBase: 351369000 ObjectTable: fffff8a00917c550 HandleCount: 131.
Image: rdpclip.exe

PROCESS fffffa8038f649b0
SessionId: 2 Cid: 1224 Peb: 7fffffde000 ParentCid: 01a0
DirBase: 71ba75000 ObjectTable: fffff8a0049e8920 HandleCount: 84.
Image: dwm.exe

PROCESS fffffa8021e11b30
SessionId: 2 Cid: 1314 Peb: 7fffffdf000 ParentCid: 1330
DirBase: 35066e000 ObjectTable: fffff8a005c88530 HandleCount: 636.
Image: explorer.exe

PROCESS fffffa8019ac7b30
SessionId: 2 Cid: 1320 Peb: 7fffffd8000 ParentCid: 01e0
DirBase: 34ec06000 ObjectTable: fffff8a004b7c7c0 HandleCount: 295.
Image: SmcGui.exe

PROCESS fffffa80391e0740
SessionId: 2 Cid: 13ac Peb: 7efdf000 ParentCid: 0c88
DirBase: 34ec44000 ObjectTable: fffff8a004bc3910 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa80390b4b30
SessionId: 2 Cid: 0438 Peb: 7efdf000 ParentCid: 0310
DirBase: 71ac8f000 ObjectTable: fffff8a00504ee40 HandleCount: 289.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa803906e2f0
SessionId: 2 Cid: 1304 Peb: 7fffffdf000 ParentCid: 0300
DirBase: 719c0c000 ObjectTable: fffff8a004fee010 HandleCount: 639.
Image: mmc.exe

PROCESS fffffa8038f5e790
SessionId: 0 Cid: 11c8 Peb: 7fffffd6000 ParentCid: 0268
DirBase: 850008000 ObjectTable: fffff8a004fc53d0 HandleCount: 138.
Image: TrustedInstaller.exe

PROCESS fffffa8022036b30
SessionId: 3 Cid: 1168 Peb: 7fffffdf000 ParentCid: 0f2c
DirBase: 711f8b000 ObjectTable: fffff8a004e9a940 HandleCount: 223.
Image: csrss.exe

PROCESS fffffa8038534060
SessionId: 3 Cid: 116c Peb: 7fffffdf000 ParentCid: 0f2c
DirBase: 712560000 ObjectTable: fffff8a00032c6f0 HandleCount: 111.
Image: winlogon.exe

PROCESS fffffa8039460630
SessionId: 3 Cid: 12ec Peb: 7fffffde000 ParentCid: 0268
DirBase: 713068000 ObjectTable: fffff8a004ae0b40 HandleCount: 164.
Image: taskhost.exe

PROCESS fffffa8021f36b30
SessionId: 3 Cid: 0960 Peb: 7fffffdd000 ParentCid: 1184
DirBase: 2e2d3a000 ObjectTable: fffff8a004d04f90 HandleCount: 115.
Image: rdpclip.exe

PROCESS fffffa8038563b30
SessionId: 3 Cid: 12b0 Peb: 7fffffdf000 ParentCid: 01a0
DirBase: 7105d4000 ObjectTable: fffff8a00a02d5f0 HandleCount: 80.
Image: dwm.exe

PROCESS fffffa8038565b30
SessionId: 3 Cid: 043c Peb: 7fffffdb000 ParentCid: 0290
DirBase: 710448000 ObjectTable: 00000000 HandleCount: 0.
Image: explorer.exe

PROCESS fffffa802209b300
SessionId: 3 Cid: 10c4 Peb: 7fffffd9000 ParentCid: 01e0
DirBase: 2e23a4000 ObjectTable: fffff8a00a0bd3c0 HandleCount: 296.
Image: SmcGui.exe

PROCESS fffffa803949db30
SessionId: 3 Cid: 03a4 Peb: 7efdf000 ParentCid: 0310
DirBase: 711cba000 ObjectTable: fffff8a0049dc5f0 HandleCount: 293.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa8039546b30
SessionId: 3 Cid: 06e4 Peb: 7efdf000 ParentCid: 100c
DirBase: 70b294000 ObjectTable: fffff8a00a0656b0 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa802216e370
SessionId: 3 Cid: 13e8 Peb: 7fffffd4000 ParentCid: 122c
DirBase: 709b8b000 ObjectTable: fffff8a00a6e4db0 HandleCount: 539.
Image: mmc.exe

PROCESS fffffa8038d71260
SessionId: 0 Cid: 157c Peb: 7fffffdf000 ParentCid: 0200
DirBase: 275188000 ObjectTable: fffff8a00a0a48f0 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8039673b30
SessionId: 0 Cid: 16f4 Peb: 7fffffdb000 ParentCid: 0200
DirBase: 34e813000 ObjectTable: fffff8a00adb0650 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8038561060
SessionId: 0 Cid: 14e4 Peb: 7fffffd6000 ParentCid: 0200
DirBase: 277ff6000 ObjectTable: fffff8a00a0544d0 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa802220b060
SessionId: 0 Cid: 05fc Peb: 7efdf000 ParentCid: 0f20
DirBase: 6b8d8c000 ObjectTable: fffff8a004b6b890 HandleCount: 41.
Image: R3D3_monora.exe

PROCESS fffffa80385c1890
SessionId: 0 Cid: 0290 Peb: 7efdf000 ParentCid: 0f20
DirBase: 6b9893000 ObjectTable: 00000000 HandleCount: 0.
Image: R3D3_monora.exe

PROCESS fffffa8039298b30
SessionId: 4 Cid: 10a0 Peb: 7fffffda000 ParentCid: 1264
DirBase: 67d095000 ObjectTable: fffff8a008dfb140 HandleCount: 221.
Image: csrss.exe

PROCESS fffffa8039613060
SessionId: 4 Cid: 12c0 Peb: 7fffffd3000 ParentCid: 1264
DirBase: 67d61a000 ObjectTable: fffff8a00a230a60 HandleCount: 111.
Image: winlogon.exe

PROCESS fffffa8039757690
SessionId: 5 Cid: 10b4 Peb: 7fffffdf000 ParentCid: 1798
DirBase: 67a819000 ObjectTable: fffff8a00b149f50 HandleCount: 254.
Image: csrss.exe

PROCESS fffffa802228f630
SessionId: 5 Cid: 0b20 Peb: 7fffffd5000 ParentCid: 1798
DirBase: 67829e000 ObjectTable: fffff8a00a7ca330 HandleCount: 110.
Image: winlogon.exe

PROCESS fffffa80397dab30
SessionId: 4 Cid: 15b0 Peb: 7fffffd7000 ParentCid: 0268
DirBase: 67739b000 ObjectTable: fffff8a00a262a00 HandleCount: 169.
Image: taskhost.exe

PROCESS fffffa80222d5b30
SessionId: 4 Cid: 15c4 Peb: 7fffffd7000 ParentCid: 1184
DirBase: 30c431000 ObjectTable: fffff8a005040640 HandleCount: 119.
Image: rdpclip.exe

PROCESS fffffa803982c490
SessionId: 4 Cid: 1100 Peb: 7fffffdf000 ParentCid: 01a0
DirBase: 675106000 ObjectTable: fffff8a008d7a970 HandleCount: 85.
Image: dwm.exe

PROCESS fffffa8039819b30
SessionId: 4 Cid: 1604 Peb: 7fffffde000 ParentCid: 1110
DirBase: 67437a000 ObjectTable: fffff8a00a989890 HandleCount: 539.
Image: explorer.exe

PROCESS fffffa8022365b30
SessionId: 4 Cid: 1014 Peb: 7fffffd3000 ParentCid: 01e0
DirBase: 66ed02000 ObjectTable: fffff8a00a636980 HandleCount: 294.
Image: SmcGui.exe

PROCESS fffffa8039855b30
SessionId: 4 Cid: 0b50 Peb: 7efdf000 ParentCid: 0310
DirBase: 67101d000 ObjectTable: fffff8a00aba85d0 HandleCount: 283.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa80397e2b30
SessionId: 4 Cid: 19b8 Peb: 7efdf000 ParentCid: 198c
DirBase: 660a16000 ObjectTable: fffff8a00acfcb60 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa802239b150
SessionId: 4 Cid: 1b88 Peb: 7fffffd7000 ParentCid: 1604
DirBase: 6591a9000 ObjectTable: fffff8a00a710a30 HandleCount: 19.
Image: cmd.exe

PROCESS fffffa80397c3b30
SessionId: 4 Cid: 1b90 Peb: 7fffffdf000 ParentCid: 10a0
DirBase: 66f61d000 ObjectTable: fffff8a00a72a940 HandleCount: 35.
Image: conhost.exe

PROCESS fffffa80398f5b30
SessionId: 5 Cid: 1688 Peb: 7fffffdb000 ParentCid: 0268
DirBase: 829a00000 ObjectTable: fffff8a00a6d7d50 HandleCount: 170.
Image: taskhost.exe

PROCESS fffffa8022399600
SessionId: 5 Cid: 187c Peb: 7fffffd7000 ParentCid: 1184
DirBase: 658815000 ObjectTable: fffff8a00a051a40 HandleCount: 182.
Image: rdpclip.exe

PROCESS fffffa80398f7b30
SessionId: 5 Cid: 18dc Peb: 7fffffd4000 ParentCid: 01a0
DirBase: 654829000 ObjectTable: fffff8a00592cec0 HandleCount: 77.
Image: dwm.exe

PROCESS fffffa80223b9b30
SessionId: 5 Cid: 1910 Peb: 7fffffdf000 ParentCid: 18e8
DirBase: 653b7c000 ObjectTable: fffff8a00a6356f0 HandleCount: 526.
Image: explorer.exe

PROCESS fffffa80223c1b30
SessionId: 5 Cid: 1914 Peb: 7fffffd6000 ParentCid: 01e0
DirBase: 652f35000 ObjectTable: fffff8a00b2bfae0 HandleCount: 298.
Image: SmcGui.exe

PROCESS fffffa803990db30
SessionId: 5 Cid: 05ec Peb: 7efdf000 ParentCid: 0310
DirBase: 653a3e000 ObjectTable: fffff8a00a3c2a20 HandleCount: 288.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa8022424b30
SessionId: 5 Cid: 0a74 Peb: 7efdf000 ParentCid: 1bd8
DirBase: 637b61000 ObjectTable: fffff8a00bf17df0 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa8039951b30
SessionId: 5 Cid: 19f4 Peb: 7fffffdc000 ParentCid: 0ecc
DirBase: 6779cc000 ObjectTable: fffff8a00ab36a30 HandleCount: 520.
Image: mmc.exe

PROCESS fffffa8039463b30
SessionId: 6 Cid: 0cf8 Peb: 7fffffd9000 ParentCid: 0f8c
DirBase: 633485000 ObjectTable: fffff8a00ad1fcb0 HandleCount: 279.
Image: csrss.exe

PROCESS fffffa8039928b30
SessionId: 6 Cid: 1568 Peb: 7fffffd3000 ParentCid: 0f8c
DirBase: 633cca000 ObjectTable: fffff8a00a237060 HandleCount: 135.
Image: winlogon.exe

PROCESS fffffa8039996b30
SessionId: 6 Cid: 195c Peb: 7fffffdf000 ParentCid: 0268
DirBase: 62e750000 ObjectTable: fffff8a00a7348d0 HandleCount: 182.
Image: taskhost.exe

PROCESS fffffa8022428b30
SessionId: 6 Cid: 1978 Peb: 7fffffd9000 ParentCid: 1184
DirBase: 62f81a000 ObjectTable: fffff8a00bb80720 HandleCount: 207.
Image: rdpclip.exe

PROCESS fffffa803998a060
SessionId: 6 Cid: 1854 Peb: 7fffffd8000 ParentCid: 01a0
DirBase: 62a672000 ObjectTable: fffff8a00b312540 HandleCount: 88.
Image: dwm.exe

PROCESS fffffa80399832d0
SessionId: 6 Cid: 0420 Peb: 7fffffda000 ParentCid: 1b94
DirBase: 629dbe000 ObjectTable: fffff8a009e3f330 HandleCount: 920.
Image: explorer.exe

PROCESS fffffa80399c1b30
SessionId: 6 Cid: 1a9c Peb: 7efdf000 ParentCid: 1bac
DirBase: 62bfd1000 ObjectTable: fffff8a004deed40 HandleCount: 232.
Image: ccApp.exe

PROCESS fffffa802235cb30
SessionId: 6 Cid: 07e4 Peb: 7fffffdf000 ParentCid: 01e0
DirBase: 627000000 ObjectTable: fffff8a00b225510 HandleCount: 296.
Image: SmcGui.exe

PROCESS fffffa80223a7500
SessionId: 6 Cid: 1534 Peb: 7efdf000 ParentCid: 0310
DirBase: 62c298000 ObjectTable: fffff8a0051041e0 HandleCount: 293.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa8022231060
SessionId: 6 Cid: 1b00 Peb: 7fffffdf000 ParentCid: 1bc4
DirBase: 6269c2000 ObjectTable: fffff8a00b6b2570 HandleCount: 532.
Image: mmc.exe

PROCESS fffffa80397b6230
SessionId: 0 Cid: 14f0 Peb: 7fffffd5000 ParentCid: 0290
DirBase: 5ff71b000 ObjectTable: 00000000 HandleCount: 0.
Image: sqlplus.exe

PROCESS fffffa802231e780
SessionId: 0 Cid: 192c Peb: 7fffffdd000 ParentCid: 05fc
DirBase: 5f98e2000 ObjectTable: fffff8a00bf76310 HandleCount: 136.
Image: sqlplus.exe

PROCESS fffffa8039956500
SessionId: 6 Cid: 0c48 Peb: 7fffffdc000 ParentCid: 0310
DirBase: 5f31e2000 ObjectTable: fffff8a00b6748c0 HandleCount: 97.
Image: dllhost.exe

PROCESS fffffa80399c1060
SessionId: 0 Cid: 12a0 Peb: 7efdf000 ParentCid: 0f20
DirBase: 6b49e3000 ObjectTable: fffff8a00b7c0950 HandleCount: 70.
Image: pskill.exe
  • Meuniers a édité ce message
  • aghaliz a édité ce message
Contenus similaires
Score
0
òh
òi
, Internet (collector) |
  • Commenter cette réponse |

Ce n'est pas ce que vous cherchiez ?

Tom's guide dans le monde
  • Allemagne
  • Italie
  • Irlande
  • Royaume Uni
  • Etats Unis
Suivre Tom's Guide
Inscrivez-vous à la Newsletter
  • ajouter à twitter
  • ajouter à facebook
  • ajouter un flux RSS