====== سجل أخطاء النظام ======
Computer Name: MAJED-PC
Event Code: 3
Message: A command sent to the adapter has timed out. The adapter did not respond.
Record Number: 353
Source Name: BTHUSB
Time Written: 20120627082626.942428-000
Event Type: Warning
User:
Computer Name: MAJED-PC
Event Code: 3
Message: A command sent to the adapter has timed out. The adapter did not respond.
Record Number: 352
Source Name: BTHUSB
Time Written: 20120627082622.933221-000
Event Type: Warning
User:
Computer Name: 37L4247D28-05
Event Code: 17
Message: The local Bluetooth adapter has failed in an undetermined manner and will not be used. The driver has been unloaded.
Record Number: 301
Source Name: BTHUSB
Time Written: 20120627082517.673404-000
Event Type: Error
User:
Computer Name: 37L4247D28-05
Event Code: 3
Message: A command sent to the adapter has timed out. The adapter did not respond.
Record Number: 300
Source Name: BTHUSB
Time Written: 20120627082517.673404-000
Event Type: Warning
User:
Computer Name: 37L4247D28-05
Event Code: 3
Message: A command sent to the adapter has timed out. The adapter did not respond.
Record Number: 298
Source Name: BTHUSB
Time Written: 20120627082513.664197-000
Event Type: Warning
User:
===== سجل أخطاء البرامج =====
Computer Name: MAJED-PC
Event Code: 1000
Message: Faulting application name: Setup.exe_InstallShield, version: 12.0.0.49974, time stamp: 0x4474907b
Faulting module name: Setup.exe, version: 12.0.0.49974, time stamp: 0x4474907b
Exception code: 0xc0000005
Fault offset: 0x0001e48b
Faulting process id: 0x860
Faulting application start time: 0x01cd53e46f84cef2
Faulting application path: E:\ماجد\retalk\Win7 Realtek\(080716)RTL8187_WinDriver_6.1313.0613.2007\87-USB\Setup.exe
Faulting module path: E:\ماجد\retalk\Win7 Realtek\(080716)RTL8187_WinDriver_6.1313.0613.2007\87-USB\Setup.exe
Report Id: ae6209f5-bfd7-11e1-ac3d-abaf4f9c3f00
Record Number: 215
Source Name: Application Error
Time Written: 20120626214127.000000-000
Event Type: Error
User:
Computer Name: MAJED-PC
Event Code: 1530
Message: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.
DETAIL -
2 user registry handles leaked from \Registry\User\S-1-5-21-1168383501-894255767-1229738354-1000:
Process 420 (\Device\HarddiskVolume1\Windows\System32\winlogon.exe) has opened key \REGISTRY\USER\S-1-5-21-1168383501-894255767-1229738354-1000
Process 2492 (\Device\HarddiskVolume1\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-1168383501-894255767-1229738354-1000\Software\Microsoft\Windows\CurrentVersion\Explorer
Record Number: 190
Source Name: Microsoft-Windows-User Profiles Service
Time Written: 20120626213515.530528-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: MAJED-PC
Event Code: 1000
Message: Faulting application name: Setup.exe_InstallShield, version: 12.0.0.58849, time stamp: 0x45b1a378
Faulting module name: Setup.exe, version: 12.0.0.58849, time stamp: 0x45b1a378
Exception code: 0xc0000005
Fault offset: 0x0001e7b9
Faulting process id: 0xbc8
Faulting application start time: 0x01cd53e34da69e8d
Faulting application path: E:\ماجد\retalk\Win7 Realtek\RTL8187B_5_6.1135.0625.2008_Silent_Install\RTL8187B_5_6.1135.0625.2008_Silent_Install\Setup.exe
Faulting module path: E:\ماجد\retalk\Win7 Realtek\RTL8187B_5_6.1135.0625.2008_Silent_Install\RTL8187B_5_6.1135.0625.2008_Silent_Install\Setup.exe
Report Id: 8b806393-bfd6-11e1-a376-eca8184ea971
Record Number: 184
Source Name: Application Error
Time Written: 20120626213319.000000-000
Event Type: Error
User:
Computer Name: MAJED-PC
Event Code: 1000
Message: Faulting application name: Setup.exe_InstallShield, version: 12.0.0.58849, time stamp: 0x45b1a378
Faulting module name: Setup.exe, version: 12.0.0.58849, time stamp: 0x45b1a378
Exception code: 0xc0000005
Fault offset: 0x0001e7b9
Faulting process id: 0x21c
Faulting application start time: 0x01cd53e34588fa8e
Faulting application path: E:\ماجد\retalk\Win7 Realtek\
www.x-drivers.ru_realtek_rtl8187-6....ers.ru_realtek_rtl8187-6.1291-vista\Setup.exe
Faulting module path: E:\ماجد\retalk\Win7 Realtek\
www.x-drivers.ru_realtek_rtl8187-6....ers.ru_realtek_rtl8187-6.1291-vista\Setup.exe
Report Id: 849a93d8-bfd6-11e1-a376-eca8184ea971
Record Number: 182
Source Name: Application Error
Time Written: 20120626213307.000000-000
Event Type: Error
User:
Computer Name: MAJED-PC
Event Code: 1008
Message: The Windows Search Service is starting up and attempting to remove the old search index {Reason: Full Index Reset}.
Record Number: 110
Source Name: Microsoft-Windows-Search
Time Written: 20120626212844.000000-000
Event Type: Warning
User:
===== السجل الأمني =====
Computer Name: 37L4247D28-05
Event Code: 4672
Message: Special privileges assigned to new logon.
Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7
Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 5
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120627082342.014036-000
Event Type: Audit Success
User:
Computer Name: 37L4247D28-05
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: 37L4247D28-05$
Account Domain: WORKGROUP
Logon ID: 0x3e7
Logon Type: 5
New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x1d0
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 4
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120627082342.014036-000
Event Type: Audit Success
User:
Computer Name: 37L4247D28-05
Event Code: 4902
Message: The Per-user audit policy table was created.
Number of Elements: 0
Policy ID: 0x23955
Record Number: 3
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120627082341.702035-000
Event Type: Audit Success
User:
Computer Name: 37L4247D28-05
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 0
New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x4
Process Name:
Network Information:
Workstation Name: -
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: -
Authentication Package: -
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 2
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120627082340.547633-000
Event Type: Audit Success
User:
Computer Name: 37L4247D28-05
Event Code: 4608
Message: Windows is starting up.
This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.
Record Number: 1
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20120627082340.516433-000
Event Type: Audit Success
User:
===== تقرير انهيار البرامج =====
===== تقرير الشاشة الزرقاء =====