Solved

NSRTray.exe maxing out my CPU

Posted on 2007-12-06
5
325 Views
Last Modified: 2010-05-18
After NSR runs a scheduled backup overnight, NSRTray.exe just maxes out my CPU until reboot.  The backup seems to have ended fine.  If I kil the process, the CPU usage drops down, but NSR won't run again until reboot.  I lowed the priority to Low and this allows me to interact with my system, otherwise, it would be unusable until reboot.
0
Comment
Question by:akivashapiro
  • 2
5 Comments
 
LVL 66

Expert Comment

by:johnb6767
ID: 20422429
Have you simply tried to uninstall, reboot and reinstall it?
0
 
LVL 66

Accepted Solution

by:
johnb6767 earned 125 total points
ID: 20422437
Process Explorer for Windows v10.21
http://www.microsoft.com/technet/sysinternals/ProcessesAndThreads/ProcessExplorer.mspx

Double click NSRTray.exe. Then Select the Threads tab, and see what .exe or .dll is using the CPU, and then select it by double clicking it....and copying/pasting the call stack here.....

0
 
LVL 2

Assisted Solution

by:biztopia
biztopia earned 125 total points
ID: 20425440
As well as Johnb6767's suggestion re Process Explorer, you could also try Process Monitor from sysinternals.  With those two tools you should be able to see exactly what NSRTray.exe is doing.

Cheers
D.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20591226
Forced accept.

Computer101
EE Admin
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question