الحالة
مغلق و غير مفتوح للمزيد من الردود.

مصرى

زيزوومي جديد
إنضم
14 أغسطس 2011
المشاركات
26
مستوى التفاعل
5
النقاط
20
غير متصل
السلام عليكم ورحمة الله وبركاته
منذ فترة بدأت تظهر لي مشكلة الشاشة الزرقاء حيث يتوقف الكمبيوتر عن العمل وتظهر الشاشة الزرقاء ويعيد الجهاز تشغيل نفسه وقد تمكنت من قراءة ما هو مكتوب في الشاشة الزرقاء وهو كالأتي :
__________________________________________________________________________________________
A problem has been detected and Windows has been shut down to prevent damage to your computer.

APC_INDEX_MISMATCH

If this is the first time you've seen this Stop error screen, restart your computer. If this screen appears again, follow these steps:

Check to make sure any new hardware or software is properly installed. If this is a new installation, ask your hardware or software manufacturer for any Windows updates you might need.

If problems continue, disable or remove any newly installed hardware or software. Disable BIOS memory options such as caching or shadowing. If you need to use Safe Mode to remove or disable components, restart your computer, press F8 to select Advanced Startup Options, and then select Safe Mode.

Technical Information:

*** STOP: 0x00000001 (0x82E48E1F , 0x00000000 , 0x0000FFE0 , 0x00000000 )

Beginning dump of physical memory
Physical memory dump complete.

Contact your system administrator or technical support group for further
assistance.
________________________________________________________________________________________
وعند اعادة تشغيل الجهاز وصل الى LOGO الخاص بال windows ثم ظهرت شاشة زرقاء واعاد تشغيل نفسه وحدث ذلك مرة اخرى وفي المرة الثالثة وقبل الانتقال الى الشاشة التي يمكنني الاختيار فيها بين ال safe mode و start windows normally ظهرت شاشة سوداء مكتوب فيها :
"The file is possibly corrupt. The file header checksum does not match the computed checksum."
________________________________________________________________________________________
فأغلقت الجهاز لمدة نصف ساعة وعند اعادة تشغيله اشتغل
الرجاء المساعدة في حل هذه المشكلة ومشكورين مقدما
 

شيك على الذاكرة او افحصها
لان اغلب مشاكل الشاشة الزرقاء تكون من الذاكره
عن تجربة
تقديري لك
 
كيف استطيع فحص الذاكرة لو سمحت يا أخي الفاضل ؟؟
وهل من الممكن ان تكون تلك المشكلة لها علاقة بالهارد ( القرص الصلب )
 
كيف استطيع فحص الذاكرة لو سمحت يا أخي الفاضل ؟؟
وهل من الممكن ان تكون تلك المشكلة لها علاقة بالهارد ( القرص الصلب )
نعم اخى ممكن تكون المشكلة من الهارد
اعمل تقرير سجلات النظام والاخطاء حتى نعرف سبب المشكلة
 
توقيع : White Man
هذا هو التقرير الذي طلبته :
_____________________________



====== سجل أخطاء النظام ======

Computer Name: MohamadWaly-PC
Event Code: 7006
Message: The ScRegSetValueExW call failed for FailureActions with the following error:
Access is denied.
Record Number: 1610427
Source Name: Service Control Manager
Time Written: 20140305000500.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 263
Message: The service 'AntiVirSchedulerService' may not have unregistered for device event notifications before it was stopped.
Record Number: 1610297
Source Name: PlugPlayManager
Time Written: 20140304190515.000000-000
Event Type: Warning
User:

Computer Name: MohamadWaly-PC
Event Code: 6008
Message: The previous system shutdown at 07:54:24 م on 04/03/2014 was unexpected.
Record Number: 1610290
Source Name: EventLog
Time Written: 20140304190511.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 263
Message: The service 'AntiVirSchedulerService' may not have unregistered for device event notifications before it was stopped.
Record Number: 1610171
Source Name: PlugPlayManager
Time Written: 20140304163948.000000-000
Event Type: Warning
User:

Computer Name: MohamadWaly-PC
Event Code: 7006
Message: The ScRegSetValueExW call failed for FailureActions with the following error:
Access is denied.
Record Number: 1610141
Source Name: Service Control Manager
Time Written: 20140304160155.000000-000
Event Type: Error
User:



===== سجل أخطاء البرامج =====

Computer Name: MohamadWaly-PC
Event Code: 1530
Message: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.

DETAIL -
15 user registry handles leaked from \Registry\User\S-1-5-21-2436857955-1634931535-3747342020-1000:
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\Disallowed
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\trust
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\My
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\CA
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Policies\Microsoft\SystemCertificates
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Policies\Microsoft\SystemCertificates
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Policies\Microsoft\SystemCertificates
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Policies\Microsoft\SystemCertificates
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\Root
Process 1504 (\Device\HarddiskVolume1\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2436857955-1634931535-3747342020-1000\Software\Microsoft\SystemCertificates\TrustedPeople

Record Number: 136992
Source Name: Microsoft-Windows-User Profiles Service
Time Written: 20130621225619.000000-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM

Computer Name: MohamadWaly-PC
Event Code: 20
Message:
Record Number: 136982
Source Name: Google Update
Time Written: 20130621205106.000000-000
Event Type: Error
User: MohamadWaly-PC\Mohamad Waly

Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 136972
Source Name: SideBySide
Time Written: 20130621145337.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 10
Message: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
Record Number: 136951
Source Name: Microsoft-Windows-WMI
Time Written: 20130621110241.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 136950
Source Name: SideBySide
Time Written: 20130621110217.000000-000
Event Type: Error
User:



===== السجل الأمني =====

Computer Name: MohamadWaly-PC
Event Code: 4648
Message: A logon was attempted using explicit credentials.

Subject:
Security ID: S-1-5-18
Account Name: MOHAMADWALY-PC$
Account Domain: WORKGROUP
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon GUID: {00000000-0000-0000-0000-000000000000}

Target Server:
Target Server Name: localhost
Additional Information: localhost

Process Information:
Process ID: 0x3e0
Process Name: C:\Windows\System32\services.exe

Network Information:
Network Address: -
Port: -

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
Record Number: 177659
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130921215440.657673-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 5038
Message: Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.

File Name: \Device\HarddiskVolume1\Windows\System32\drivers\hid8101.sys
Record Number: 177658
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130921210041.597673-000
Event Type: Audit Failure
User:

Computer Name: MohamadWaly-PC
Event Code: 4672
Message: Special privileges assigned to new logon.

Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7

Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 177657
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130921203816.973273-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.

Subject:
Security ID: S-1-5-18
Account Name: MOHAMADWALY-PC$
Account Domain: WORKGROUP
Logon ID: 0x3e7

Logon Type: 5

New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Process Information:
Process ID: 0x3e0
Process Name: C:\Windows\System32\services.exe

Network Information:
Workstation Name:
Source Network Address: -
Source Port: -

Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177656
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130921203816.973273-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 4648
Message: A logon was attempted using explicit credentials.

Subject:
Security ID: S-1-5-18
Account Name: MOHAMADWALY-PC$
Account Domain: WORKGROUP
Logon ID: 0x3e7
Logon GUID: {00000000-0000-0000-0000-000000000000}

Account Whose Credentials Were Used:
Account Name: SYSTEM
Account Domain: NT AUTHORITY
Logon GUID: {00000000-0000-0000-0000-000000000000}

Target Server:
Target Server Name: localhost
Additional Information: localhost

Process Information:
Process ID: 0x3e0
Process Name: C:\Windows\System32\services.exe

Network Information:
Network Address: -
Port: -

This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
Record Number: 177655
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130921203816.973273-000
Event Type: Audit Success
User:



===== تقرير انهيار البرامج =====




===== تقرير الشاشة الزرقاء =====

==================================================
Dump File : Mini090314-01.dmp
Crash Time : 03/09/2014 05:08:43 م
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : 0xc0000005
Parameter 2 : 0x82d3f010
Parameter 3 : 0x8c72b720
Parameter 4 : 0x8c72b41c
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+ee010
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18881 (vistasp2_gdr.130707-1535)
Processor : 32-bit
Computer Name :
Full Path : C:\Windows\Minidump\Mini090314-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 135,344
==================================================
 
ظهرت شاشة زرقاء جديدة وهذا هو تقريرها :
_____________________________________
====== سجل أخطاء النظام ======

Computer Name: MohamadWaly-PC
Event Code: 4001
Message: WLAN AutoConfig service has successfully stopped.

Record Number: 1610793
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20140306123842.101673-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM

Computer Name: MohamadWaly-PC
Event Code: 7006
Message: The ScRegSetValueExW call failed for FailureActions with the following error:
Access is denied.
Record Number: 1610783
Source Name: Service Control Manager
Time Written: 20140306123834.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 263
Message: The service 'AntiVirSchedulerService' may not have unregistered for device event notifications before it was stopped.
Record Number: 1610650
Source Name: PlugPlayManager
Time Written: 20140306112657.000000-000
Event Type: Warning
User:

Computer Name: MohamadWaly-PC
Event Code: 4001
Message: WLAN AutoConfig service has successfully stopped.

Record Number: 1610635
Source Name: Microsoft-Windows-WLAN-AutoConfig
Time Written: 20140306002000.816269-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM

Computer Name: MohamadWaly-PC
Event Code: 7006
Message: The ScRegSetValueExW call failed for FailureActions with the following error:
Access is denied.
Record Number: 1610627
Source Name: Service Control Manager
Time Written: 20140306001942.000000-000
Event Type: Error
User:



===== سجل أخطاء البرامج =====

Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 137095
Source Name: SideBySide
Time Written: 20130622204005.000000-000
Event Type: Error
User:

Computer Name: MOHAMADWALY-PC
Event Code: 4122
Message: Unable to load file AVPREF.DLL. Returned error code: 0x45a
Record Number: 137085
Source Name: Avira AntiVir
Time Written: 20130622203933.000000-000
Event Type: Error
User: NT AUTHORITY\SYSTEM

Computer Name: MohamadWaly-PC
Event Code: 10
Message: Event filter with query "SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 99" could not be reactivated in namespace "//./root/CIMV2" because of error 0x80041003. Events cannot be delivered through this filter until the problem is corrected.
Record Number: 137063
Source Name: Microsoft-Windows-WMI
Time Written: 20130622113221.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 137059
Source Name: SideBySide
Time Written: 20130622113130.000000-000
Event Type: Error
User:

Computer Name: MohamadWaly-PC
Event Code: 33
Message: Activation context generation failed for "C:\Windows\Installer\{3DC873BB-FFE3-46BF-9701-26B9AE371F9F}\recordingmanager.exe". Dependent Assembly rpshellextension.1.0,language="*",type="win32",version="1.0.0.0" could not be found. Please use sxstrace.exe for detailed diagnosis.
Record Number: 137058
Source Name: SideBySide
Time Written: 20130622113130.000000-000
Event Type: Error
User:



===== السجل الأمني =====

Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0

Logon Type: 3

New Logon:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x97d4ea
Logon GUID: {00000000-0000-0000-0000-000000000000}

Process Information:
Process ID: 0x0
Process Name: -

Network Information:
Workstation Name: AHMEDMEKHIMA-PC
Source Network Address: 192.168.1.64
Source Port: 52237

Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177808
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922164747.453277-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 4634
Message: An account was logged off.

Subject:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825fc

Logon Type: 3

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
Record Number: 177807
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163553.492277-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 4634
Message: An account was logged off.

Subject:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825ed

Logon Type: 3

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
Record Number: 177806
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163553.485277-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0

Logon Type: 3

New Logon:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825fc
Logon GUID: {00000000-0000-0000-0000-000000000000}

Process Information:
Process ID: 0x0
Process Name: -

Network Information:
Workstation Name: AHMEDMEKHIMA-PC
Source Network Address: 192.168.1.64
Source Port: 52021

Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177805
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163543.233277-000
Event Type: Audit Success
User:

Computer Name: MohamadWaly-PC
Event Code: 4624
Message: An account was successfully logged on.

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0

Logon Type: 3

New Logon:
Security ID: S-1-5-7
Account Name: ANONYMOUS LOGON
Account Domain: NT AUTHORITY
Logon ID: 0x8825ed
Logon GUID: {00000000-0000-0000-0000-000000000000}

Process Information:
Process ID: 0x0
Process Name: -

Network Information:
Workstation Name: AHMEDMEKHIMA-PC
Source Network Address: 192.168.1.64
Source Port: 52020

Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): NTLM V1
Key Length: 128

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 177804
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20130922163543.200277-000
Event Type: Audit Success
User:



===== تقرير انهيار البرامج =====




===== تقرير الشاشة الزرقاء =====

==================================================
Dump File : Mini090314-01.dmp
Crash Time : 03/09/2014 05:08:43 م
Bug Check String : SYSTEM_THREAD_EXCEPTION_NOT_HANDLED
Bug Check Code : 0x1000007e
Parameter 1 : 0xc0000005
Parameter 2 : 0x82d3f010
Parameter 3 : 0x8c72b720
Parameter 4 : 0x8c72b41c
Caused By Driver : ntkrnlpa.exe
Caused By Address : ntkrnlpa.exe+ee010
File Description : NT Kernel & System
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18881 (vistasp2_gdr.130707-1535)
Processor : 32-bit
Computer Name :
Full Path : C:\Windows\Minidump\Mini090314-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 135,344
==================================================

==================================================
Dump File : Mini090514-01.dmp
Crash Time : 05/09/2014 12:01:42 م
Bug Check String : PFN_LIST_CORRUPT
Bug Check Code : 0x0000004e
Parameter 1 : 0x00000099
Parameter 2 : 0x00016d55
Parameter 3 : 0x00000002
Parameter 4 : 0x0007e14c
Caused By Driver : hal.dll
Caused By Address : hal.dll+770c
File Description : Hardware Abstraction Layer DLL
Product Name : Microsoft® Windows® Operating System
Company : Microsoft Corporation
File Version : 6.0.6002.18005 (lh_sp2rtm.090410-1830)
Processor : 32-bit
Computer Name :
Full Path : C:\Windows\Minidump\Mini090514-01.dmp
Processors Count : 2
Major Version : 15
Minor Version : 6002
Dump File Size : 143,896
==================================================
 
اخى قم بحذف تعريف كرت الشاشة ومن اعلى نافذة مدير الاجهزة اضغط على تفحص تغييرات الهاردوير ... وانتظر الى ان ينتهى واعد تشغيل الجهاز
وبعد ذلك
قم بفتح موجه الاوامر كمسئول واكتب الامر sfc /scannow وانتظر الى ان ينتهى
واعطنا صورة
 
توقيع : White Man
اعتذر عن كثرة الطلبات اخي الكريم ولكن ال windows عندي باللغة الانجليزية
فهل تستطيع ان تشرح لي كيف اقوم بتلك الخطوات ؟؟
من اين احذف تعريف كارت الشاشة ؟ ومن اين استطيع تفحص تغييرات الهاردوير ؟؟

ومعذرة مرة اخرى على كثرة الطلبات وشكرا على ردك
 
اعتذر عن كثرة الطلبات اخي الكريم ولكن ال windows عندي باللغة الانجليزية
فهل تستطيع ان تشرح لي كيف اقوم بتلك الخطوات ؟؟
من اين احذف تعريف كارت الشاشة ؟ ومن اين استطيع تفحص تغييرات الهاردوير ؟؟

ومعذرة مرة اخرى على كثرة الطلبات وشكرا على ردك
بالنسبة للجزء الاول :
اضغط على Start واكتب Cmd
سيظهر لك command prompt اضغط عليه كليك يمين واختر Run as administrator
ستظهر لك رسالة اختر yes
واكتب الامر sfc /scannow وانتظر الى ان ينتهى
واعطنا صورة
...
وبعد ذلك نكمل الجزء الثانى
ولا شكر على واجب
 
توقيع : White Man
هذه الصورة التي طلبتها
 

المرفقات

  • Untitled.webp
    Untitled.webp
    27.4 KB · المشاهدات: 37
هذه الصورة التي طلبتها
59446


ستفتح النافذة التالية :
نختار ادارة الاجهزة ( device manager )
اضغط على محولات العرض ( display adapters )
سيظهر لك التعريف الخاص بكرت الشاشة اضغط عليه كليك يمين ثم الغاء التنصيب " uninstall "
ثم اضغط على ابحث عن تغييرات الهاردوير فى اعلى النافذة

59448


وبعد ذلك اعد تشغيل الجهاز
 
توقيع : White Man
تم كل ما طلبته
 
توقيع : White Man
تمام ، سأبلغكم بالنتائج والمستجدات في خلال اليومين القادمين
وشكرا جزيلا على المساعدة
لكن سؤال اخير ، كيف اعرف اذا كان الهارد او الرامات بهم مشاكل ؟؟
 
تمام ، سأبلغكم بالنتائج والمستجدات في خلال اليومين القادمين
وشكرا جزيلا على المساعدة
لكن سؤال اخير ، كيف اعرف اذا كان الهارد او الرامات بهم مشاكل ؟؟
بالنسبة للهارد قم بعمل فحص له ببرنامج hd tune لفحص الباد سكتور / اداء الهارد / صحته
او برنامج hard disk sentinel
والرامات من خلال برنامج mem test
 
توقيع : White Man
حتى الان وبعد مرور 3 ايام لم تظهر الشاة الزرقاء مرة اخرى ولكن حدث اليوم freeze في شاشة ال welcome فهل هذا امر عادي ؟؟
 
حتى الان وبعد مرور 3 ايام لم تظهر الشاة الزرقاء مرة اخرى ولكن حدث اليوم freeze في شاشة ال welcome فهل هذا امر عادي ؟؟
سنغلق هذا الموضوع لانتهاء الغرض منه
وقم بفتح موضوع جديد بالمشلكة الجديدة
==
 
توقيع : White Man
الحالة
مغلق و غير مفتوح للمزيد من الردود.
عودة
أعلى