Victor_VG

Tracker Mod | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору megabyte1 Легко. Process Hacker это умеет - Process - выбрать нужный - Enter - вкладка Treads, но т.к. XUL аддоны это по сути скрипты, в статистике тредов вы увидите список типа такого: Цитата: 5168, d3d9.dll!CBatchFilterI::LHBatchWorkerThread, Normal 4952, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 5204, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 6092, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 6444, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 6500, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 8612, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 11528, d3d9.dll!wmt_CSSEShaderCode::ProcessPositionAndColors+0x960, Normal 6356, MMDevAPI.dll!CDeviceEnumerator::PnpNotificationThreadWrapper, Normal 9832, mswsock.dll!SockAsyncThread, Above normal 7032, ntdll.dll!TppWaiterpThread, Normal 3260, ntdll.dll!TppWorkerThread, Normal 8184, ntdll.dll!TppWorkerThread, Normal 10492, ntdll.dll!TppWorkerThread, Normal 12584, ntdll.dll!TppWorkerThread, Normal 1524, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 3956, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 4820, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 5052, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Normal 5732, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 6636, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 8596, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 9784, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 10080, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Above normal 10652, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Idle 11896, nvwgf2um.dll!NVAPI_Thunk+0x4209a0, Normal 10048, seamonkey.exe!GetHandleVerifier+0x2d3f, Normal 9424, 30 748 662, seamonkey.exe!TargetNtUnmapViewOfSection+0x3139, Normal 8348, shlwapi.dll!WrapperThreadProc, Normal 1004, ucrtbase.dll!_o__CIpow+0x10, Normal 3608, ucrtbase.dll!_o__CIpow+0x10, Normal 3872, ucrtbase.dll!_o__CIpow+0x10, Normal 4056, ucrtbase.dll!_o__CIpow+0x10, Normal 4152, ucrtbase.dll!_o__CIpow+0x10, Normal 4348, ucrtbase.dll!_o__CIpow+0x10, Normal 4372, ucrtbase.dll!_o__CIpow+0x10, Normal 4432, ucrtbase.dll!_o__CIpow+0x10, Normal 4508, ucrtbase.dll!_o__CIpow+0x10, Normal 5124, ucrtbase.dll!_o__CIpow+0x10, Normal 5316, ucrtbase.dll!_o__CIpow+0x10, Normal 5684, 588 221, ucrtbase.dll!_o__CIpow+0x10, Normal 5912, ucrtbase.dll!_o__CIpow+0x10, Normal 5924, ucrtbase.dll!_o__CIpow+0x10, Below normal 6036, ucrtbase.dll!_o__CIpow+0x10, Normal 6104, ucrtbase.dll!_o__CIpow+0x10, Normal 6280, ucrtbase.dll!_o__CIpow+0x10, Normal 6288, ucrtbase.dll!_o__CIpow+0x10, Normal 6644, ucrtbase.dll!_o__CIpow+0x10, Normal 6904, ucrtbase.dll!_o__CIpow+0x10, Normal 6936, ucrtbase.dll!_o__CIpow+0x10, Normal 6984, ucrtbase.dll!_o__CIpow+0x10, Normal 7204, ucrtbase.dll!_o__CIpow+0x10, Normal 7332, ucrtbase.dll!_o__CIpow+0x10, Normal 7940, 46 632, ucrtbase.dll!_o__CIpow+0x10, Normal 8076, ucrtbase.dll!_o__CIpow+0x10, Normal 8084, ucrtbase.dll!_o__CIpow+0x10, Normal 8088, ucrtbase.dll!_o__CIpow+0x10, Normal 8312, ucrtbase.dll!_o__CIpow+0x10, Normal 8428, ucrtbase.dll!_o__CIpow+0x10, Normal 8456, ucrtbase.dll!_o__CIpow+0x10, Normal 8680, ucrtbase.dll!_o__CIpow+0x10, Normal 8800, ucrtbase.dll!_o__CIpow+0x10, Below normal 8848, ucrtbase.dll!_o__CIpow+0x10, Normal 8920, ucrtbase.dll!_o__CIpow+0x10, Normal 9084, ucrtbase.dll!_o__CIpow+0x10, Normal 9128, ucrtbase.dll!_o__CIpow+0x10, Normal 9132, ucrtbase.dll!_o__CIpow+0x10, Normal 9284, ucrtbase.dll!_o__CIpow+0x10, Normal 9428, ucrtbase.dll!_o__CIpow+0x10, Normal 9620, ucrtbase.dll!_o__CIpow+0x10, Normal 9848, ucrtbase.dll!_o__CIpow+0x10, Normal 9852, ucrtbase.dll!_o__CIpow+0x10, Normal 10480, ucrtbase.dll!_o__CIpow+0x10, Normal 10684, ucrtbase.dll!_o__CIpow+0x10, Normal 10732, ucrtbase.dll!_o__CIpow+0x10, Normal 10736, ucrtbase.dll!_o__CIpow+0x10, Normal 10832, ucrtbase.dll!_o__CIpow+0x10, Normal 11028, ucrtbase.dll!_o__CIpow+0x10, Normal 11216, 31 790, ucrtbase.dll!_o__CIpow+0x10, Normal 11572, ucrtbase.dll!_o__CIpow+0x10, Normal 12404, ucrtbase.dll!_o__CIpow+0x10, Normal 5380, winmm.dll!mciwindow, Highest 6080, xul.dll!mozilla::net::LoadInfo::GetForceInheritPrincipalDropped+0xdc69, Normal 7464, xul.dll!mozilla::net::LoadInfo::GetForceInheritPrincipalDropped+0xdc69, Normal 10076, 4 794 482, xul.dll!mozilla::net::LoadInfo::GetForceInheritPrincipalDropped+0xdc69, Normal 10096, xul.dll!mozilla::net::LoadInfo::GetForceInheritPrincipalDropped+0xdc69, Normal 5940, xul.dll!XRE_ParseAppData+0x8d3a, Normal | где первая колонка это TID - ID треда, а PID вы увидите только для процессов чьи треды исследуете. Если кликнуть по строке треда, то РН выведет стек его вызовов (его построение займёт некоторое время).
---------- Жив курилка! (Р. Ролан, "Кола Брюньон") Xeon E5 2697v2/C602/128 GB PC3-14900L/GTX 1660 Ti, Xeon E5-2697v2/C602J/128 Gb PC3-14900L/GTX 1660 Ti |
|