ظهرت شاشة زرقاء جديدة وهذا هو تقريرها :
_____________________________________
====== سجل أخطاء النظام ======
Computer Name: MohamadWaly-PC
Event Code: 4001
Message: WLAN AutoConfig service has successfully stopped.
Record Number: 1610793
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20140306123842.101673-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: MohamadWaly-PC
Event Code: 7006
Message: The ScRegSetValueExW call failed for FailureActions with the following error:
Access is denied.
Record Number: 1610783
Source Name: Service Control Manager
Time Written: 20140306123834.000000-000
Event Type: Error
User:
Computer Name: MohamadWaly-PC
Event Code: 263
Message: The service 'AntiVirSchedulerService' may not have unregistered for device event notifications before it was stopped.
Record Number: 1610650
Source Name: PlugPlayManager
Time Written: 20140306112657.000000-000
Event Type: Warning
User:
Computer Name: MohamadWaly-PC
Event Code: 4001
Message: WLAN AutoConfig service has successfully stopped.
Record Number: 1610635
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20140306002000.816269-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: MohamadWaly-PC
Event Code: 7006
Message: The ScRegSetValueExW call failed for FailureActions with the following error:
Access is denied.
Record Number: 1610627
Source Name: Service Control Manager
Time Written: 20140306001942.000000-000
Event Type: Error
User:
===== سجل أخطاء البرامج =====
Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 137095
Source Name: SideBySide
Time Written: 20130622204005.000000-000
Event Type: Error
User:
Computer Name: MOHAMADWALY-PC
Event Code: 4122
Message: Unable to load file AVPREF.DLL. Returned error code: 0x45a
Record Number: 137085
Source Name: Avira AntiVir
Time Written: 20130622203933.000000-000
Event Type: Error
User: NT AUTHORITY\SYSTEM
Computer Name: MohamadWaly-PC
Event Code: 10
Message: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
Record Number: 137063
Source Name: Microsoft-Windows-WMI
Time Written: 20130622113221.000000-000
Event Type: Error
User:
Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 137059
Source Name: SideBySide
Time Written: 20130622113130.000000-000
Event Type: Error
User:
Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 137058
Source Name: SideBySide
Time Written: 20130622113130.000000-000
Event Type: Error
User:
===== السجل الأمني =====
Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
New Logon:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x97d4ea
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: AHMEDMEKHIMA-PC
Source Network Address: 192.168.1.64
Source Port: 52237
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177808
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922164747.453277-000
Event Type: Audit Success
User:
Computer Name: MohamadWaly-PC
Event Code: 4634
Message: An account was logged off.
Subject:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825fc
Logon Type: 3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
Record Number: 177807
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163553.492277-000
Event Type: Audit Success
User:
Computer Name: MohamadWaly-PC
Event Code: 4634
Message: An account was logged off.
Subject:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825ed
Logon Type: 3
This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
Record Number: 177806
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163553.485277-000
Event Type: Audit Success
User:
Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
New Logon:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825fc
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: AHMEDMEKHIMA-PC
Source Network Address: 192.168.1.64
Source Port: 52021
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177805
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163543.233277-000
Event Type: Audit Success
User:
Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
New Logon:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825ed
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x0
Process Name: -
Network Information:
Workstation Name: AHMEDMEKHIMA-PC
Source Network Address: 192.168.1.64
Source Port: 52020
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177804
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163543.200277-000
Event Type: Audit Success
User:
===== تقرير انهيار البرامج =====
===== تقرير الشاشة الزرقاء =====
==================================================
Dump File : Mini090314-01.dmp
Crash Time : 03/09/2014 05:08:43 م
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : 0xc0000005
Parameter 2 : 0x82d3f010
Parameter 3 : 0x8c72b720
Parameter 4 : 0x8c72b41c
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+ee010
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18881 (vistasp2_gdr.130707-1535)
Processor : 32-bit
Computer Name :
Full Path : C:\Windows\Minidump\Mini090314-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 135,344
==================================================
==================================================
Dump File : Mini090514-01.dmp
Crash Time : 05/09/2014 12:01:42 م
Bug Check String : PFN_LIST_CORRUPT
Bug Check Code : 0x0000004e
Parameter 1 : 0x00000099
Parameter 2 : 0x00016d55
Parameter 3 : 0x00000002
Parameter 4 : 0x0007e14c
Caused By Driver : hal.dll
Caused By Address : hal.dll+770c
File Description : Hardware Abstraction Layer DLL
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Computer Name :
Full Path : C:\Windows\Minidump\Mini090514-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 143,896
==================================================