crash system 2008 server

Le Forum Windows Server 2008
Scanner Windows pour détecter les erreurs de registre

Ce que nous vous conseillons :

1. Lisez les réponses ci-dessous où vous trouverez des conseils et de l'aide de la part des autres utilisateurs.

2. Avant de faire des modifications sur votre système ou d'installer des logiciels, nous vous recommandons
    fortement de cliquer ici pour scanner Windows afin de détecter les erreurs de registre.



crash system 2008 server

Messagepar aghaliz » 03 Juil 2012, 10:15

Bonjour,

depuis un moment ma machine crash et reboot toute seul ... malgré mes recherche j'ai rien trouver voulez vous m'aider svp ...


j'ai analyser le Dump :


====================================================================================================


Microsoft (R) Windows Debugger Version 6.12.0002.633 X86
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [D:\test.DMP]
Kernel Summary Dump File: Only kernel address space is available

Symbol search path is: *** Invalid ***
****************************************************************************
* Symbol loading may be unreliable without a symbol search path. *
* Use .symfix to have the debugger choose a symbol path. *
* After setting your symbol path, use .reload to refresh symbol locations. *
****************************************************************************
Executable search path is:
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Windows 7 Kernel Version 7601 (Service Pack 1) MP (12 procs) Free x64
Product: Server, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`01c05000 PsLoadedModuleList = 0xfffff800`01e4a670
Debug session time: Tue Jun 26 17:07:02.480 2012 (UTC + 2:00)
System Uptime: 0 days 0:34:37.412
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*** ERROR: Symbol file could not be found. Defaulted to export symbols for ntkrnlmp.exe -
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck F4, {3, fffffa8021f0f630, fffffa8021f0f910, fffff80001f858b0}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

Page 44c35e not present in the dump file. Type ".hh dbgerr004" for details
------------------------------------------------
| |
| NT symbols are not available |
| reduced functionality |
| |
------------------------------------------------
unable to get nt!KiCurrentEtwBufferOffset
unable to get nt!KiCurrentEtwBufferBase
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
Probably caused by : csrss.exe

Followup: MachineOwner
---------

6: kd> .reload
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`7efdf018). Type ".hh dbgerr001" for details
Loading unloaded module list
....
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

CRITICAL_OBJECT_TERMINATION (f4)
A process or thread crucial to system operation has unexpectedly exited or been
terminated.
Several processes and threads are necessary for the operation of the
system; when they are terminated (for any reason), the system can no
longer function.
Arguments:
Arg1: 0000000000000003, Process
Arg2: fffffa8021f0f630, Terminating object
Arg3: fffffa8021f0f910, Process image file name
Arg4: fffff80001f858b0, Explanatory message (ascii)

Debugging Details:
------------------

Page 44c35e not present in the dump file. Type ".hh dbgerr004" for details

PROCESS_OBJECT: fffffa8021f0f630

IMAGE_NAME: _

DEBUG_FLR_IMAGE_TIMESTAMP: 0

MODULE_NAME: _

FAULTING_MODULE: 0000000000000000

PROCESS_NAME: pskill.exe

BUGCHECK_STR: 0xF4_pskill.exe

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff8000200c5e2 to fffff80001c81c40

STACK_TEXT:
fffff880`0a11db08 fffff800`0200c5e2 : 00000000`000000f4 00000000`00000003 fffffa80`21f0f630 fffffa80`21f0f910 : nt!KeBugCheckEx
fffff880`0a11db10 fffff800`01fb999b : ffffffff`ffffffff fffffa80`38d55060 fffffa80`21f0f630 fffffa80`399c1060 : nt!PspCatchCriticalBreak+0x92
fffff880`0a11db50 fffff800`01f39448 : ffffffff`ffffffff 00000000`00000001 fffffa80`21f0f630 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x176d6
fffff880`0a11dba0 fffff800`01c80ed3 : fffffa80`21f0f630 00000000`00000000 fffffa80`38d55060 00000000`00000074 : nt!NtTerminateProcess+0xf4
fffff880`0a11dc20 00000000`77b615da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b615da


STACK_COMMAND: kb

FOLLOWUP_NAME: MachineOwner

FAILURE_BUCKET_ID: X64_0xF4_pskill.exe_IMAGE__

BUCKET_ID: X64_0xF4_pskill.exe_IMAGE__

Followup: MachineOwner
---------

11: kd> !process 0 0
**** NT ACTIVE PROCESS DUMP ****
PROCESS fffffa8019a5f040
SessionId: none Cid: 0004 Peb: 00000000 ParentCid: 0000
DirBase: 00187000 ObjectTable: fffff8a0000017a0 HandleCount: 1312.
Image: System

PROCESS fffffa801cf63b30
SessionId: none Cid: 018c Peb: 7fffffd8000 ParentCid: 0004
DirBase: 453be0000 ObjectTable: fffff8a0019eaf90 HandleCount: 55.
Image: smss.exe

PROCESS fffffa801cd5db30
SessionId: 0 Cid: 0200 Peb: 7fffffde000 ParentCid: 01f8
DirBase: 44c715000 ObjectTable: fffff8a0041fcc00 HandleCount: 1169.
Image: csrss.exe

PROCESS fffffa8038a785f0
SessionId: 1 Cid: 0234 Peb: 7fffffd3000 ParentCid: 022c
DirBase: 85398b000 ObjectTable: fffff8a0042618a0 HandleCount: 73.
Image: csrss.exe

PROCESS fffffa801cd77b30
SessionId: 0 Cid: 023c Peb: 7fffffd6000 ParentCid: 01f8
DirBase: 44c0db000 ObjectTable: fffff8a004277be0 HandleCount: 92.
Image: wininit.exe

PROCESS fffffa801cda0b30
SessionId: 0 Cid: 0268 Peb: 7fffffd4000 ParentCid: 023c
DirBase: 44ba5e000 ObjectTable: fffff8a0042a2c40 HandleCount: 368.
Image: services.exe

PROCESS fffffa8038ae5910
SessionId: 1 Cid: 0280 Peb: 7fffffdd000 ParentCid: 022c
DirBase: 8536d1000 ObjectTable: fffff8a00425fa40 HandleCount: 88.
Image: winlogon.exe

PROCESS fffffa801cda69e0
SessionId: 0 Cid: 02a4 Peb: 7fffffdc000 ParentCid: 023c
DirBase: 44b6cc000 ObjectTable: fffff8a004298a40 HandleCount: 1264.
Image: lsass.exe

PROCESS fffffa801cdaa6c0
SessionId: 0 Cid: 02b0 Peb: 7fffffdf000 ParentCid: 023c
DirBase: 44b212000 ObjectTable: fffff8a00415ccd0 HandleCount: 410.
Image: lsm.exe

PROCESS fffffa8038b1f280
SessionId: 0 Cid: 0310 Peb: 7fffffd7000 ParentCid: 0268
DirBase: 851d3e000 ObjectTable: fffff8a0044184f0 HandleCount: 415.
Image: svchost.exe

PROCESS fffffa8038b49b30
SessionId: 0 Cid: 0360 Peb: 7fffffde000 ParentCid: 0268
DirBase: 8519ff000 ObjectTable: fffff8a0040a0ac0 HandleCount: 378.
Image: svchost.exe

PROCESS fffffa8038b4b6b0
SessionId: 1 Cid: 03bc Peb: 7fffffd9000 ParentCid: 0280
DirBase: 851834000 ObjectTable: fffff8a00442ae00 HandleCount: 187.
Image: LogonUI.exe

PROCESS fffffa8038b5e200
SessionId: 0 Cid: 03c8 Peb: 7fffffd9000 ParentCid: 0268
DirBase: 85155a000 ObjectTable: fffff8a004453150 HandleCount: 1009.
Image: svchost.exe

PROCESS fffffa8038b63b30
SessionId: 0 Cid: 03f0 Peb: 7fffffd5000 ParentCid: 0268
DirBase: 850805000 ObjectTable: fffff8a0044fe940 HandleCount: 1246.
Image: svchost.exe

PROCESS fffffa8038b6d920
SessionId: 0 Cid: 00cc Peb: 7fffffdf000 ParentCid: 0268
DirBase: 85044d000 ObjectTable: fffff8a0044f96b0 HandleCount: 379.
Image: svchost.exe

PROCESS fffffa8038b751b0
SessionId: 0 Cid: 01a0 Peb: 7fffffd7000 ParentCid: 0268
DirBase: 850ad3000 ObjectTable: fffff8a0044f6b30 HandleCount: 852.
Image: svchost.exe

PROCESS fffffa8038b7db30
SessionId: 0 Cid: 01e0 Peb: 7fffffd6000 ParentCid: 0268
DirBase: 85091b000 ObjectTable: fffff8a0045afd40 HandleCount: 701.
Image: Smc.exe

PROCESS fffffa8038ba4b30
SessionId: 0 Cid: 00b4 Peb: 7fffffdc000 ParentCid: 0268
DirBase: 84f12a000 ObjectTable: fffff8a004961010 HandleCount: 481.
Image: svchost.exe

PROCESS fffffa8038bc5550
SessionId: 0 Cid: 0428 Peb: 7efdf000 ParentCid: 0268
DirBase: 84e50f000 ObjectTable: fffff8a004837200 HandleCount: 540.
Image: ccSvcHst.exe

PROCESS fffffa8038bedb30
SessionId: 0 Cid: 0588 Peb: 7fffffd8000 ParentCid: 0268
DirBase: 84d355000 ObjectTable: fffff8a0049cb7a0 HandleCount: 326.
Image: svchost.exe

PROCESS fffffa8038c66610
SessionId: 0 Cid: 0634 Peb: 7fffffd5000 ParentCid: 0268
DirBase: 84c078000 ObjectTable: fffff8a0040374d0 HandleCount: 394.
Image: spoolsv.exe

PROCESS fffffa8038c92b30
SessionId: 0 Cid: 0694 Peb: 7efdf000 ParentCid: 0268
DirBase: 84c13c000 ObjectTable: fffff8a004b811e0 HandleCount: 179.
Image: dsm_sa_eventmgr32.exe

PROCESS fffffa8038c9ab30
SessionId: 0 Cid: 06c8 Peb: 7efdf000 ParentCid: 0268
DirBase: 84b402000 ObjectTable: fffff8a004bc5df0 HandleCount: 1317.
Image: dsm_sa_datamgr32.exe

PROCESS fffffa8038ca4600
SessionId: 0 Cid: 06ec Peb: 7efdf000 ParentCid: 0268
DirBase: 84b549000 ObjectTable: fffff8a004d62ac0 HandleCount: 775.
Image: scanmaster.exe

PROCESS fffffa8038c0f950
SessionId: 0 Cid: 0724 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 84add3000 ObjectTable: fffff8a004c491d0 HandleCount: 106.
Image: SPMonitor.exe

PROCESS fffffa8038cbd420
SessionId: 0 Cid: 075c Peb: 7efdf000 ParentCid: 0268
DirBase: 84aa1f000 ObjectTable: fffff8a0049c4b10 HandleCount: 88.
Image: mr2kserv.exe

PROCESS fffffa8038cc2b30
SessionId: 0 Cid: 077c Peb: 7ffff000 ParentCid: 0268
DirBase: 84a147000 ObjectTable: fffff8a004c55180 HandleCount: 146.
Image: bpinetd.exe

PROCESS fffffa8038d0eb30
SessionId: 0 Cid: 07b8 Peb: 7efdf000 ParentCid: 0268
DirBase: 8496ce000 ObjectTable: fffff8a004a95160 HandleCount: 235.
Image: NSClient++.exe

PROCESS fffffa8038d26b30
SessionId: 0 Cid: 05cc Peb: 7fffffda000 ParentCid: 077c
DirBase: 849599000 ObjectTable: fffff8a0049d8cd0 HandleCount: 111.
Image: bpjava-msvc.exe

PROCESS fffffa8038d26060
SessionId: 0 Cid: 0614 Peb: 7efdf000 ParentCid: 0268
DirBase: 848c55000 ObjectTable: fffff8a004d02120 HandleCount: 74.
Image: OcsService.exe

PROCESS fffffa801cdc4b30
SessionId: 0 Cid: 01cc Peb: 7fffffdf000 ParentCid: 0200
DirBase: 43e316000 ObjectTable: fffff8a004cced50 HandleCount: 32.
Image: conhost.exe

PROCESS fffffa8038d3ab30
SessionId: 0 Cid: 07e0 Peb: 7efdf000 ParentCid: 0268
DirBase: 84915e000 ObjectTable: fffff8a0047ff750 HandleCount: 166.
Image: dsm_om_shrsvc32.exe

PROCESS fffffa8038d8f060
SessionId: 0 Cid: 0978 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 8484af000 ObjectTable: fffff8a004dafa00 HandleCount: 139.
Image: TNSLSNR.EXE

PROCESS fffffa8021c1d4e0
SessionId: 0 Cid: 0ad0 Peb: 7fffffd4000 ParentCid: 0268
DirBase: 840435000 ObjectTable: fffff8a0051f48d0 HandleCount: 548.
Image: oracle.exe

PROCESS fffffa8038ea8b30
SessionId: 0 Cid: 0684 Peb: 7fffffdd000 ParentCid: 0268
DirBase: 83dabd000 ObjectTable: fffff8a0053020a0 HandleCount: 706.
Image: oracle.exe

PROCESS fffffa8038e95b30
SessionId: 0 Cid: 0928 Peb: 7fffffd8000 ParentCid: 0268
DirBase: 83d784000 ObjectTable: fffff8a0052f74a0 HandleCount: 850.
Image: oracle.exe

PROCESS fffffa8038e8ab30
SessionId: 0 Cid: 0754 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 83d30a000 ObjectTable: fffff8a005381d10 HandleCount: 713.
Image: oracle.exe

PROCESS fffffa8038e89860
SessionId: 0 Cid: 0a30 Peb: 7fffffdc000 ParentCid: 0268
DirBase: 83c7ee000 ObjectTable: fffff8a00531d8e0 HandleCount: 1012.
Image: oracle.exe

PROCESS fffffa8038e92890
SessionId: 0 Cid: 099c Peb: 7fffffd4000 ParentCid: 0268
DirBase: 83c6b5000 ObjectTable: fffff8a0051fad60 HandleCount: 62.
Image: svchost.exe

PROCESS fffffa8038ec3b30
SessionId: 0 Cid: 0ab4 Peb: 7efdf000 ParentCid: 0268
DirBase: 83c47c000 ObjectTable: fffff8a0051f04d0 HandleCount: 487.
Image: dsm_om_connsvc32.exe

PROCESS fffffa8038e7c060
SessionId: 0 Cid: 0ad8 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 83bfa4000 ObjectTable: fffff8a005270430 HandleCount: 181.
Image: snmp.exe

PROCESS fffffa8021c037b0
SessionId: 0 Cid: 0a8c Peb: 7efdf000 ParentCid: 0ad8
DirBase: 83dc5c000 ObjectTable: fffff8a00539c9d0 HandleCount: 194.
Image: snmp.exe

PROCESS fffffa8021c74b30
SessionId: 0 Cid: 0b88 Peb: 7fffffd5000 ParentCid: 0200
DirBase: 435906000 ObjectTable: fffff8a005427300 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8038ecbb30
SessionId: 0 Cid: 0b44 Peb: 7efdf000 ParentCid: 0268
DirBase: 83c02a000 ObjectTable: fffff8a0053aa410 HandleCount: 525.
Image: Rtvscan.exe

PROCESS fffffa8038f00b30
SessionId: 0 Cid: 0bac Peb: 7fffffd4000 ParentCid: 0928
DirBase: 837508000 ObjectTable: fffff8a00532cc20 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8038efeb30
SessionId: 0 Cid: 0bb0 Peb: 7fffffdd000 ParentCid: 0ad0
DirBase: 8375a5000 ObjectTable: fffff8a004dfabe0 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8021c98630
SessionId: 0 Cid: 0bc0 Peb: 7fffffd6000 ParentCid: 0a30
DirBase: 42d6ce000 ObjectTable: fffff8a0052798d0 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8021c9eb30
SessionId: 0 Cid: 0bc4 Peb: 7fffffda000 ParentCid: 0684
DirBase: 42e738000 ObjectTable: fffff8a00506b5f0 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8021c81b30
SessionId: 0 Cid: 0bbc Peb: 7fffffdd000 ParentCid: 0754
DirBase: 42e4e4000 ObjectTable: fffff8a004d30510 HandleCount: 67.
Image: oradim.exe

PROCESS fffffa8038f04b30
SessionId: 0 Cid: 09f4 Peb: 7fffffda000 ParentCid: 0268
DirBase: 835d76000 ObjectTable: fffff8a004ebc300 HandleCount: 109.
Image: VolumeInfoProvider.exe

PROCESS fffffa8038f19b30
SessionId: 0 Cid: 09d0 Peb: 7fffffdb000 ParentCid: 0268
DirBase: 835fbc000 ObjectTable: fffff8a004db0010 HandleCount: 24.
Image: cmd.exe

PROCESS fffffa8021caab30
SessionId: 0 Cid: 0a98 Peb: 7efdf000 ParentCid: 09d0
DirBase: 42c4a1000 ObjectTable: fffff8a004f2cc10 HandleCount: 150.
Image: pbx_exchange.exe

PROCESS fffffa8021caa290
SessionId: 0 Cid: 0acc Peb: 7fffffd7000 ParentCid: 0200
DirBase: 42cac4000 ObjectTable: fffff8a004ebdd80 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8038fc9b30
SessionId: 0 Cid: 0f08 Peb: 7efdf000 ParentCid: 0268
DirBase: 82dc87000 ObjectTable: fffff8a00578a980 HandleCount: 55.
Image: SRVANY.EXE

PROCESS fffffa8019b0cb30
SessionId: 0 Cid: 0f20 Peb: 7efdf000 ParentCid: 0f08
DirBase: 428ca9000 ObjectTable: fffff8a0055ca010 HandleCount: 57.
Image: R3D3_agent.exe

PROCESS fffffa8019b0c600
SessionId: 0 Cid: 0f28 Peb: 7fffffd8000 ParentCid: 0200
DirBase: 427fc0000 ObjectTable: fffff8a0056b1630 HandleCount: 38.
Image: conhost.exe

PROCESS fffffa8038ff4b30
SessionId: 0 Cid: 0fa4 Peb: 7fffffd7000 ParentCid: 0310
DirBase: 82b49f000 ObjectTable: fffff8a004a68b40 HandleCount: 132.
Image: WmiPrvSE.exe

PROCESS fffffa8038f4e2e0
SessionId: 0 Cid: 1184 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 7200de000 ObjectTable: fffff8a005a0ae90 HandleCount: 383.
Image: svchost.exe

PROCESS fffffa8021e14060
SessionId: 0 Cid: 112c Peb: 7fffffda000 ParentCid: 0268
DirBase: 71f575000 ObjectTable: fffff8a0045e4de0 HandleCount: 123.
Image: svchost.exe

PROCESS fffffa8038f38740
SessionId: 0 Cid: 118c Peb: 7fffffd5000 ParentCid: 0268
DirBase: 839b11000 ObjectTable: fffff8a005a3c500 HandleCount: 80.
Image: svchost.exe

PROCESS fffffa8038d51b30
SessionId: 0 Cid: 093c Peb: 7fffffd6000 ParentCid: 0268
DirBase: 84f6d7000 ObjectTable: fffff8a004f42a40 HandleCount: 160.
Image: msdtc.exe

PROCESS fffffa8021d99060
SessionId: 0 Cid: 0d04 Peb: 7fffffdf000 ParentCid: 0268
DirBase: 71d8e1000 ObjectTable: fffff8a005a3cf90 HandleCount: 193.
Image: sppsvc.exe

PROCESS fffffa8021f0f630
SessionId: 2 Cid: 0f70 Peb: 7fffffdf000 ParentCid: 05fc
DirBase: 353124000 ObjectTable: fffff8a009055650 HandleCount: 280.
Image: csrss.exe

PROCESS fffffa8021f06870
SessionId: 2 Cid: 0f74 Peb: 7fffffd9000 ParentCid: 05fc
DirBase: 352469000 ObjectTable: fffff8a0093a67b0 HandleCount: 110.
Image: winlogon.exe

PROCESS fffffa8038bccb30
SessionId: 2 Cid: 030c Peb: 7fffffd9000 ParentCid: 0268
DirBase: 71ec5a000 ObjectTable: fffff8a005bb7c60 HandleCount: 168.
Image: taskhost.exe

PROCESS fffffa8021f5c630
SessionId: 2 Cid: 1154 Peb: 7fffffdb000 ParentCid: 1184
DirBase: 351369000 ObjectTable: fffff8a00917c550 HandleCount: 131.
Image: rdpclip.exe

PROCESS fffffa8038f649b0
SessionId: 2 Cid: 1224 Peb: 7fffffde000 ParentCid: 01a0
DirBase: 71ba75000 ObjectTable: fffff8a0049e8920 HandleCount: 84.
Image: dwm.exe

PROCESS fffffa8021e11b30
SessionId: 2 Cid: 1314 Peb: 7fffffdf000 ParentCid: 1330
DirBase: 35066e000 ObjectTable: fffff8a005c88530 HandleCount: 636.
Image: explorer.exe

PROCESS fffffa8019ac7b30
SessionId: 2 Cid: 1320 Peb: 7fffffd8000 ParentCid: 01e0
DirBase: 34ec06000 ObjectTable: fffff8a004b7c7c0 HandleCount: 295.
Image: SmcGui.exe

PROCESS fffffa80391e0740
SessionId: 2 Cid: 13ac Peb: 7efdf000 ParentCid: 0c88
DirBase: 34ec44000 ObjectTable: fffff8a004bc3910 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa80390b4b30
SessionId: 2 Cid: 0438 Peb: 7efdf000 ParentCid: 0310
DirBase: 71ac8f000 ObjectTable: fffff8a00504ee40 HandleCount: 289.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa803906e2f0
SessionId: 2 Cid: 1304 Peb: 7fffffdf000 ParentCid: 0300
DirBase: 719c0c000 ObjectTable: fffff8a004fee010 HandleCount: 639.
Image: mmc.exe

PROCESS fffffa8038f5e790
SessionId: 0 Cid: 11c8 Peb: 7fffffd6000 ParentCid: 0268
DirBase: 850008000 ObjectTable: fffff8a004fc53d0 HandleCount: 138.
Image: TrustedInstaller.exe

PROCESS fffffa8022036b30
SessionId: 3 Cid: 1168 Peb: 7fffffdf000 ParentCid: 0f2c
DirBase: 711f8b000 ObjectTable: fffff8a004e9a940 HandleCount: 223.
Image: csrss.exe

PROCESS fffffa8038534060
SessionId: 3 Cid: 116c Peb: 7fffffdf000 ParentCid: 0f2c
DirBase: 712560000 ObjectTable: fffff8a00032c6f0 HandleCount: 111.
Image: winlogon.exe

PROCESS fffffa8039460630
SessionId: 3 Cid: 12ec Peb: 7fffffde000 ParentCid: 0268
DirBase: 713068000 ObjectTable: fffff8a004ae0b40 HandleCount: 164.
Image: taskhost.exe

PROCESS fffffa8021f36b30
SessionId: 3 Cid: 0960 Peb: 7fffffdd000 ParentCid: 1184
DirBase: 2e2d3a000 ObjectTable: fffff8a004d04f90 HandleCount: 115.
Image: rdpclip.exe

PROCESS fffffa8038563b30
SessionId: 3 Cid: 12b0 Peb: 7fffffdf000 ParentCid: 01a0
DirBase: 7105d4000 ObjectTable: fffff8a00a02d5f0 HandleCount: 80.
Image: dwm.exe

PROCESS fffffa8038565b30
SessionId: 3 Cid: 043c Peb: 7fffffdb000 ParentCid: 0290
DirBase: 710448000 ObjectTable: 00000000 HandleCount: 0.
Image: explorer.exe

PROCESS fffffa802209b300
SessionId: 3 Cid: 10c4 Peb: 7fffffd9000 ParentCid: 01e0
DirBase: 2e23a4000 ObjectTable: fffff8a00a0bd3c0 HandleCount: 296.
Image: SmcGui.exe

PROCESS fffffa803949db30
SessionId: 3 Cid: 03a4 Peb: 7efdf000 ParentCid: 0310
DirBase: 711cba000 ObjectTable: fffff8a0049dc5f0 HandleCount: 293.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa8039546b30
SessionId: 3 Cid: 06e4 Peb: 7efdf000 ParentCid: 100c
DirBase: 70b294000 ObjectTable: fffff8a00a0656b0 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa802216e370
SessionId: 3 Cid: 13e8 Peb: 7fffffd4000 ParentCid: 122c
DirBase: 709b8b000 ObjectTable: fffff8a00a6e4db0 HandleCount: 539.
Image: mmc.exe

PROCESS fffffa8038d71260
SessionId: 0 Cid: 157c Peb: 7fffffdf000 ParentCid: 0200
DirBase: 275188000 ObjectTable: fffff8a00a0a48f0 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8039673b30
SessionId: 0 Cid: 16f4 Peb: 7fffffdb000 ParentCid: 0200
DirBase: 34e813000 ObjectTable: fffff8a00adb0650 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa8038561060
SessionId: 0 Cid: 14e4 Peb: 7fffffd6000 ParentCid: 0200
DirBase: 277ff6000 ObjectTable: fffff8a00a0544d0 HandleCount: 31.
Image: conhost.exe

PROCESS fffffa802220b060
SessionId: 0 Cid: 05fc Peb: 7efdf000 ParentCid: 0f20
DirBase: 6b8d8c000 ObjectTable: fffff8a004b6b890 HandleCount: 41.
Image: R3D3_monora.exe

PROCESS fffffa80385c1890
SessionId: 0 Cid: 0290 Peb: 7efdf000 ParentCid: 0f20
DirBase: 6b9893000 ObjectTable: 00000000 HandleCount: 0.
Image: R3D3_monora.exe

PROCESS fffffa8039298b30
SessionId: 4 Cid: 10a0 Peb: 7fffffda000 ParentCid: 1264
DirBase: 67d095000 ObjectTable: fffff8a008dfb140 HandleCount: 221.
Image: csrss.exe

PROCESS fffffa8039613060
SessionId: 4 Cid: 12c0 Peb: 7fffffd3000 ParentCid: 1264
DirBase: 67d61a000 ObjectTable: fffff8a00a230a60 HandleCount: 111.
Image: winlogon.exe

PROCESS fffffa8039757690
SessionId: 5 Cid: 10b4 Peb: 7fffffdf000 ParentCid: 1798
DirBase: 67a819000 ObjectTable: fffff8a00b149f50 HandleCount: 254.
Image: csrss.exe

PROCESS fffffa802228f630
SessionId: 5 Cid: 0b20 Peb: 7fffffd5000 ParentCid: 1798
DirBase: 67829e000 ObjectTable: fffff8a00a7ca330 HandleCount: 110.
Image: winlogon.exe

PROCESS fffffa80397dab30
SessionId: 4 Cid: 15b0 Peb: 7fffffd7000 ParentCid: 0268
DirBase: 67739b000 ObjectTable: fffff8a00a262a00 HandleCount: 169.
Image: taskhost.exe

PROCESS fffffa80222d5b30
SessionId: 4 Cid: 15c4 Peb: 7fffffd7000 ParentCid: 1184
DirBase: 30c431000 ObjectTable: fffff8a005040640 HandleCount: 119.
Image: rdpclip.exe

PROCESS fffffa803982c490
SessionId: 4 Cid: 1100 Peb: 7fffffdf000 ParentCid: 01a0
DirBase: 675106000 ObjectTable: fffff8a008d7a970 HandleCount: 85.
Image: dwm.exe

PROCESS fffffa8039819b30
SessionId: 4 Cid: 1604 Peb: 7fffffde000 ParentCid: 1110
DirBase: 67437a000 ObjectTable: fffff8a00a989890 HandleCount: 539.
Image: explorer.exe

PROCESS fffffa8022365b30
SessionId: 4 Cid: 1014 Peb: 7fffffd3000 ParentCid: 01e0
DirBase: 66ed02000 ObjectTable: fffff8a00a636980 HandleCount: 294.
Image: SmcGui.exe

PROCESS fffffa8039855b30
SessionId: 4 Cid: 0b50 Peb: 7efdf000 ParentCid: 0310
DirBase: 67101d000 ObjectTable: fffff8a00aba85d0 HandleCount: 283.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa80397e2b30
SessionId: 4 Cid: 19b8 Peb: 7efdf000 ParentCid: 198c
DirBase: 660a16000 ObjectTable: fffff8a00acfcb60 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa802239b150
SessionId: 4 Cid: 1b88 Peb: 7fffffd7000 ParentCid: 1604
DirBase: 6591a9000 ObjectTable: fffff8a00a710a30 HandleCount: 19.
Image: cmd.exe

PROCESS fffffa80397c3b30
SessionId: 4 Cid: 1b90 Peb: 7fffffdf000 ParentCid: 10a0
DirBase: 66f61d000 ObjectTable: fffff8a00a72a940 HandleCount: 35.
Image: conhost.exe

PROCESS fffffa80398f5b30
SessionId: 5 Cid: 1688 Peb: 7fffffdb000 ParentCid: 0268
DirBase: 829a00000 ObjectTable: fffff8a00a6d7d50 HandleCount: 170.
Image: taskhost.exe

PROCESS fffffa8022399600
SessionId: 5 Cid: 187c Peb: 7fffffd7000 ParentCid: 1184
DirBase: 658815000 ObjectTable: fffff8a00a051a40 HandleCount: 182.
Image: rdpclip.exe

PROCESS fffffa80398f7b30
SessionId: 5 Cid: 18dc Peb: 7fffffd4000 ParentCid: 01a0
DirBase: 654829000 ObjectTable: fffff8a00592cec0 HandleCount: 77.
Image: dwm.exe

PROCESS fffffa80223b9b30
SessionId: 5 Cid: 1910 Peb: 7fffffdf000 ParentCid: 18e8
DirBase: 653b7c000 ObjectTable: fffff8a00a6356f0 HandleCount: 526.
Image: explorer.exe

PROCESS fffffa80223c1b30
SessionId: 5 Cid: 1914 Peb: 7fffffd6000 ParentCid: 01e0
DirBase: 652f35000 ObjectTable: fffff8a00b2bfae0 HandleCount: 298.
Image: SmcGui.exe

PROCESS fffffa803990db30
SessionId: 5 Cid: 05ec Peb: 7efdf000 ParentCid: 0310
DirBase: 653a3e000 ObjectTable: fffff8a00a3c2a20 HandleCount: 288.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa8022424b30
SessionId: 5 Cid: 0a74 Peb: 7efdf000 ParentCid: 1bd8
DirBase: 637b61000 ObjectTable: fffff8a00bf17df0 HandleCount: 230.
Image: ccApp.exe

PROCESS fffffa8039951b30
SessionId: 5 Cid: 19f4 Peb: 7fffffdc000 ParentCid: 0ecc
DirBase: 6779cc000 ObjectTable: fffff8a00ab36a30 HandleCount: 520.
Image: mmc.exe

PROCESS fffffa8039463b30
SessionId: 6 Cid: 0cf8 Peb: 7fffffd9000 ParentCid: 0f8c
DirBase: 633485000 ObjectTable: fffff8a00ad1fcb0 HandleCount: 279.
Image: csrss.exe

PROCESS fffffa8039928b30
SessionId: 6 Cid: 1568 Peb: 7fffffd3000 ParentCid: 0f8c
DirBase: 633cca000 ObjectTable: fffff8a00a237060 HandleCount: 135.
Image: winlogon.exe

PROCESS fffffa8039996b30
SessionId: 6 Cid: 195c Peb: 7fffffdf000 ParentCid: 0268
DirBase: 62e750000 ObjectTable: fffff8a00a7348d0 HandleCount: 182.
Image: taskhost.exe

PROCESS fffffa8022428b30
SessionId: 6 Cid: 1978 Peb: 7fffffd9000 ParentCid: 1184
DirBase: 62f81a000 ObjectTable: fffff8a00bb80720 HandleCount: 207.
Image: rdpclip.exe

PROCESS fffffa803998a060
SessionId: 6 Cid: 1854 Peb: 7fffffd8000 ParentCid: 01a0
DirBase: 62a672000 ObjectTable: fffff8a00b312540 HandleCount: 88.
Image: dwm.exe

PROCESS fffffa80399832d0
SessionId: 6 Cid: 0420 Peb: 7fffffda000 ParentCid: 1b94
DirBase: 629dbe000 ObjectTable: fffff8a009e3f330 HandleCount: 920.
Image: explorer.exe

PROCESS fffffa80399c1b30
SessionId: 6 Cid: 1a9c Peb: 7efdf000 ParentCid: 1bac
DirBase: 62bfd1000 ObjectTable: fffff8a004deed40 HandleCount: 232.
Image: ccApp.exe

PROCESS fffffa802235cb30
SessionId: 6 Cid: 07e4 Peb: 7fffffdf000 ParentCid: 01e0
DirBase: 627000000 ObjectTable: fffff8a00b225510 HandleCount: 296.
Image: SmcGui.exe

PROCESS fffffa80223a7500
SessionId: 6 Cid: 1534 Peb: 7efdf000 ParentCid: 0310
DirBase: 62c298000 ObjectTable: fffff8a0051041e0 HandleCount: 293.
Image: ProtectionUtilSurrogate.exe

PROCESS fffffa8022231060
SessionId: 6 Cid: 1b00 Peb: 7fffffdf000 ParentCid: 1bc4
DirBase: 6269c2000 ObjectTable: fffff8a00b6b2570 HandleCount: 532.
Image: mmc.exe

PROCESS fffffa80397b6230
SessionId: 0 Cid: 14f0 Peb: 7fffffd5000 ParentCid: 0290
DirBase: 5ff71b000 ObjectTable: 00000000 HandleCount: 0.
Image: sqlplus.exe

PROCESS fffffa802231e780
SessionId: 0 Cid: 192c Peb: 7fffffdd000 ParentCid: 05fc
DirBase: 5f98e2000 ObjectTable: fffff8a00bf76310 HandleCount: 136.
Image: sqlplus.exe

PROCESS fffffa8039956500
SessionId: 6 Cid: 0c48 Peb: 7fffffdc000 ParentCid: 0310
DirBase: 5f31e2000 ObjectTable: fffff8a00b6748c0 HandleCount: 97.
Image: dllhost.exe

PROCESS fffffa80399c1060
SessionId: 0 Cid: 12a0 Peb: 7efdf000 ParentCid: 0f20
DirBase: 6b49e3000 ObjectTable: fffff8a00b7c0950 HandleCount: 70.
Image: pskill.exe
aghaliz
 
Messages: 1
Inscrit le: 03 Juil 2012, 10:12

Retour vers Windows Server 2008

Qui est en ligne ?

Utilisateurs parcourant actuellement ce forum : Aucun utilisateur inscrit et 1 invité

  •  Liens commerciaux