• بادئ الموضوع بادئ الموضوع medosamady
  • تاريخ البدء تاريخ البدء
  • المشاهدات 1,172

medosamady

زيزوومى مبدع
إنضم
22 يونيو 2008
المشاركات
1,184
مستوى التفاعل
380
النقاط
670
الإقامة
egypt
غير متصل
ظهرت عندى اليوم الشاشة الزرقاء
المميتة
وظل الجهاز عالقا عليها ولم ينطفئ ولم يعمل رستارت الا بعد ان فصلت الباور عنه.
وهذا تقرير الاخطاء واللى فهمته منه ان السبب كارت الواير اظن ارجو التوضيح من اخوانى الخبراء

====== سجل أخطاء النظام ======

Computer Name: TROY-PC
Event Code: 1014
Message: Name resolution for the name media.winamp.com timed out after none of the configured DNS servers responded.
Record Number: 792
Source Name: Microsoft-Windows-DNS-Client
Time Written: 20120215195123.400571-000
Event Type: Warning
User: NT AUTHORITY\NETWORK SERVICE

Computer Name: TROY-PC
Event Code: 10000
Message: WLAN Extensibility Module has failed to start.

Module Path: C:\Windows\system32\athExt.dll
Error Code: 126

Record Number: 544
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20120215190951.213639-000
Event Type: Error
User: NT AUTHORITY\SYSTEM

Computer Name: TROY-PC
Event Code: 134
Message: NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on ''. NtpClient will try again in 3473457 minutes and double the reattempt interval thereafter. The error was: The requested name is valid, but no data of the requested type was found. (0x80072AFC)
Record Number: 499
Source Name: Microsoft-Windows-Time-Service
Time Written: 20120215190846.564049-000
Event Type: Warning
User: NT AUTHORITY\LOCAL SERVICE

Computer Name: TROY-PC
Event Code: 4001
Message: WLAN AutoConfig service has successfully stopped.

Record Number: 497
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20120215190846.548449-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM

Computer Name: TROY-PC
Event Code: 10000
Message: WLAN Extensibility Module has failed to start.

Module Path: C:\Windows\system32\athExt.dll
Error Code: 126

Record Number: 420
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20120215185552.095977-000
Event Type: Error
User: NT AUTHORITY\SYSTEM



===== سجل أخطاء البرامج =====

Computer Name: TROY-PC
Event Code: 1008
Message: The Windows Search Service is starting up and attempting to remove the old search index {Reason: Application Requested}.

Record Number: 277
Source Name: Microsoft-Windows-Search
Time Written: 20120215214535.000000-000
Event Type: Warning
User:

Computer Name: TROY-PC
Event Code: 1002
Message: The program iexplore.exe version 8.0.7600.16385 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.
Process ID: 6d8
Start Time: 01ccec22ec2b76bc
Termination Time: 30
Application Path: C:\Program Files\Internet Explorer\iexplore.exe
Report Id: a36bd121-5816-11e1-bf5f-001d7d36552a

Record Number: 246
Source Name: Application Hang
Time Written: 20120215205045.000000-000
Event Type: Error
User:

Computer Name: TROY-PC
Event Code: 8194
Message: Volume Shadow Copy Service error: Unexpected error querying for the IVssWriterCallback interface. hr = 0x80070005, Access is denied.
. This is often caused by incorrect security settings in either the writer or requestor process.

Operation:
Gathering Writer Data

Context:
Writer Class Id: {e8132975-6f93-4464-a53e-1050253ae220}
Writer Name: System Writer
Writer Instance ID: {1aa3701a-dce9-43fb-bd37-6104f8f07fc4}
Record Number: 212
Source Name: VSS
Time Written: 20120215200554.000000-000
Event Type: Error
User:

Computer Name: TROY-PC
Event Code: 1530
Message: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.

DETAIL -
1 user registry handles leaked from \Registry\User\S-1-5-21-2054773350-1334016290-2555014134-1000:
Process 468 (\Device\HarddiskVolume2\Windows\System32\winlogon.exe) has opened key \REGISTRY\USER\S-1-5-21-2054773350-1334016290-2555014134-1000

Record Number: 179
Source Name: Microsoft-Windows-User Profiles Service
Time Written: 20120215190841.868441-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM

Computer Name: TROY-PC
Event Code: 1008
Message: The Windows Search Service is starting up and attempting to remove the old search index {Reason: Full Index Reset}.

Record Number: 121
Source Name: Microsoft-Windows-Search
Time Written: 20120215183952.000000-000
Event Type: Warning
User:



===== السجل الأمني =====

Computer Name: 37L4247D28-05
Event Code: 4672
Message: Special privileges assigned to new logon.

Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7

Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 5
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120215182636.183655-000
Event Type: Audit Success
User:

Computer Name: 37L4247D28-05
Event Code: 4624
Message: An account was successfully logged on.

Subject:
Security ID: S-1-5-18
Account Name: 37L4247D28-05$
Account Domain: WORKGROUP
Logon ID: 0x3e7

Logon Type: 5

New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Process Information:
Process ID: 0x1c8
Process Name: C:\Windows\System32\services.exe

Network Information:
Workstation Name:
Source Network Address: -
Source Port: -

Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 4
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120215182636.183655-000
Event Type: Audit Success
User:

Computer Name: 37L4247D28-05
Event Code: 4902
Message: The Per-user audit policy table was created.

Number of Elements: 0
Policy ID: 0x22df3
Record Number: 3
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120215182635.824855-000
Event Type: Audit Success
User:

Computer Name: 37L4247D28-05
Event Code: 4624
Message: An account was successfully logged on.

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0

Logon Type: 0

New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Process Information:
Process ID: 0x4
Process Name:

Network Information:
Workstation Name: -
Source Network Address: -
Source Port: -

Detailed Authentication Information:
Logon Process: -
Authentication Package: -
Transited Services: -
Package Name (NTLM only): -
Key Length: 0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 2
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120215182634.077652-000
Event Type: Audit Success
User:

Computer Name: 37L4247D28-05
Event Code: 4608
Message: Windows is starting up.

This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
Record Number: 1
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120215182633.999651-000
Event Type: Audit Success
User:



===== تقرير انهيار البرامج =====

==================================================
Process File : WerFault.exe
Event Name : Shut down unexpectedly
Event Time : 22/02/2012 12:16:42 م
User Name : All Users
Exception Code :
Exception Offset :
Fault Module Name :
Fault Module Version:
Process Path : C:\Windows\System32\WerFault.exe
Report File Size : 3,394
Report File Path : C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_08b5729f\Report.wer
==================================================

==================================================
Process File : WerFault.exe
Event Name : Shut down unexpectedly
Event Time : 22/02/2012 12:16:42 م
User Name :
Exception Code :
Exception Offset :
Fault Module Name :
Fault Module Version:
Process Path : C:\Windows\System32\WerFault.exe
Report File Size : 3,394
Report File Path : C:\ProgramData\Microsoft\Windows\WER\ReportArchive\Kernel_0_0_cab_08b5729f\Report.wer
==================================================




===== تقرير الشاشة الزرقاء =====

==================================================
Dump File : 022212-17768-01.dmp
Crash Time : 22/02/2012 12:15:42 م
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : 0xc0000005
Parameter 2 : 0x8d13f317
Parameter 3 : 0x89255b14
Parameter 4 : 0x892556f0
Caused By Driver : athur.sys
Caused By Address : athur.sys+d1317
File Description : Atheros Extensible Wireless LAN device driver
Product Name : Driver for Atheros CB42/CB43/MB42/MB43 Network Adapter
Company : Atheros Communications, Inc.
File Version : 2.0.0.32 built by: WinDDK
Processor : 32-bit
Computer Name :
Full Path : C:\Windows\Minidump\022212-17768-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 7600
Dump File Size : 182,936
==================================================


 

توقيع : medosamady
هل يوجد تفسير لذلك اخوانى او حل
 
توقيع : medosamady
عندك مشكلة في التعريف الشبكة وايرلس
وهو السبب الشاشة الزرقاء
 
توقيع : format
عندك مشكلة في التعريف الشبكة وايرلس
وهو السبب الشاشة الزرقاء
بماذا تنصحنى اخى هل احذف التعريف واثبته من جديد علما باننى سطبته من الاسطوانه الاصليه للكارت
 
توقيع : medosamady
نعم احذفه
اضغط على جهاز الكمبيوتر باليمين واختار اداره ثم ادارة الاجهزه

ثم حدد كرت الشبكة واضغط عليه بزر الفاره اليمن واختار الغاء التثبيت

وثم قم بتثبيته من الاسطوانه حقتك .. واعطينا النتيجة .. هل يستمر معاك الشاشة الزرقا ام لا
هذا وفقك الله
 
توقيع : format
قمت بتثبيت التعريف الجديد له من على موقع الكارت نفسه ويبدو ان المشكله تم حلها
بارك الله فيكم
 
توقيع : medosamady
عودة
أعلى