Çözüldü Oyun açmaya çalışırken mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 10

XeaWhitefish

Hectopat
Katılım
23 Aralık 2020
Mesajlar
214
Daha fazla  
Cinsiyet
Erkek
Arkadaşlar merhaba, bu sorun 2 saat önce falan oldu birdenbire. Durduk yere kişisel bilgisayarınız bir sorunla karşılastı ve yeniden başlatılması gerekiyor hatasını alıyorum %100'de kalıyor ve yenıden baslatmıyor. Sonra laptopumu kapatıp actıgımda bir oyuna girmeye çalısıyorum fakat gene aynı hatayı verıyor bu hatanın çözümü nedir? Şimdiden teşekkürler not: Oyun ilk defa indirdiğim bir oyun değil önceden de indirip rahat rahat hiç kasmadan oynamıstım.
 
Son düzenleyen: Moderatör:
Çözüm
1) WireGuard yüklüyse kaldırın.

2) Vanguard kaldırın.

3) Aşağıdaki sürücüyü indirip kurun. (Wi-Fi)

4) Aşağıdaki sürücüyü indirip kurun. (Dahili GPU)

5) Aşağıdaki sürücüyü indirip kurun. (Harici GPU)

6) Aşağıdaki rehberi uygulayıp sonucun ekran alıntısını paylaşın.

7) Aşağıdaki sürücüyü indirip kurun. (Wi-Fi)

8) Windows Update ile 20H2 sürümüne yükseltin. Güncellik iyidir.

9) BIOS güncelleyin. Güncellemek için aşağıdaki EXE uzantılı dosyayı indirin ve çalıştırın. İşlem sırasında bilgisayarınızın kapanmamasına dikkat edin.

NOT: Tüm işlemleri verdiğim adımlara göre uygulayın. BIOS işlemini şarj tam doluyken uygulayın ve tüm işlemlerin sonrasına uygulayın. Ek olarak sorun çözülürse bildirmeyi unutmayın.

Kod:
Machine ID Information [From Smbios 2.7, DMIVersion 0, Size=3040]
BiosMajorRelease = 1
BiosMinorRelease = 37
FirmwareMajorRelease = 1
FirmwareMinorRelease = 25
BiosVendor = LENOVO
BiosVersion = 8DCN37WW
BiosReleaseDate = 10/24/2013
SystemManufacturer = LENOVO
SystemProductName = AILZx
SystemFamily = IDEAPAD
SystemVersion = INVALID                         
SystemSKU = LENOVO_BI_IDEAPAD8D
BaseBoardManufacturer = LENOVO
BaseBoardProduct = VIUU4
BaseBoardVersion = Not Defined                     

[CPU Information]
~MHz = REG_DWORD 2494
Component Information = REG_BINARY 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
Configuration Data = REG_FULL_RESOURCE_DESCRIPTOR ff,ff,ff,ff,ff,ff,ff,ff,0,0,0,0,0,0,0,0
Identifier = REG_SZ Intel64 Family 6 Model 60 Stepping 3
ProcessorNameString = REG_SZ Intel(R) Core(TM) i5-4200M CPU @ 2.50GHz
Update Status = REG_DWORD 0
VendorIdentifier = REG_SZ GenuineIntel
MSR8B = REG_QWORD 2500000000

Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800511aaec7, address which referenced memory

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11561

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 82851

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff800511aaec7

READ_ADDRESS: fffff800515713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock
fffff800514283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000994

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff85889e6e6100 -- (.trap 0xffff85889e6e6100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000022000 rbx=0000000000000000 rcx=ffff85889e6e6370
rdx=ffffd00cefd75890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800511aaec7 rsp=ffff85889e6e6290 rbp=ffff85889e6e6309
 r8=ffffd00cefd75860  r9=0000000000000003 r10=0000000000000000
r11=ffff85889e6e64e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff800`511aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT: 
ffff8588`9e6e5fb8 fffff800`511d5929     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8588`9e6e5fc0 fffff800`511d1c69     : 00000000`ffff8001 ffffd00c`e529ea70 ffffd00c`00000000 ffffd00c`e529ea70 : nt!KiBugCheckDispatch+0x69
ffff8588`9e6e6100 fffff800`511aaec7     : 00000000`00000000 ffffd00c`efd75040 ffffd00c`efd75040 fffff800`511d5358 : nt!KiPageFault+0x469
ffff8588`9e6e6290 fffff800`511c9a98     : ffff8588`9e6e6370 00000000`00000000 ffff8588`9e6e63f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8588`9e6e6370 fffff800`54e0154f     : fffff800`55335c77 00000000`00000000 ffffffff`800030ec 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8588`9e6e6508 fffff800`55335c77     : 00000000`00000000 ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 : vgk+0x154f
ffff8588`9e6e6510 00000000`00000000     : ffffffff`800030ec 00000000`00000008 fffff7ff`14e00000 fffff800`516e9c40 : vgk+0x535c77


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80144faaec7, address which referenced memory

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 8453

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 78077

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff80144faaec7

READ_ADDRESS: fffff801453713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock
fffff801452283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000994

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffff8b08f1aa0100 -- (.trap 0xffff8b08f1aa0100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffff8b08f1aa0370
rdx=ffff960fd87af8d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80144faaec7 rsp=ffff8b08f1aa0290 rbp=ffff8b08f1aa0309
 r8=ffff960fd87af8a0  r9=0000000000000003 r10=0000000000000000
r11=ffff8b08f1aa04e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff801`44faaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT: 
ffff8b08`f1a9ffb8 fffff801`44fd5929     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8b08`f1a9ffc0 fffff801`44fd1c69     : 00000000`ffff8001 ffff960f`d689e750 ffff960f`00000000 ffff960f`d689e750 : nt!KiBugCheckDispatch+0x69
ffff8b08`f1aa0100 fffff801`44faaec7     : 00000000`00000000 ffff960f`d87af080 ffff960f`d87af080 fffff801`44fd5358 : nt!KiPageFault+0x469
ffff8b08`f1aa0290 fffff801`44fc9a98     : ffff8b08`f1aa0370 00000000`00000000 ffff8b08`f1aa03f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffff8b08`f1aa0370 fffff801`41ed154f     : fffff801`42405c77 00000000`00000000 ffffffff`800030fc 00000000`00000008 : nt!KiSwInterrupt+0x368
ffff8b08`f1aa0508 fffff801`42405c77     : 00000000`00000000 ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 : vgk+0x154f
ffff8b08`f1aa0510 00000000`00000000     : ffffffff`800030fc 00000000`00000008 fffff800`01ed0000 fffff801`454e9c40 : vgk+0x535c77


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff807725aaec7, address which referenced memory

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11171

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 65885

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 75

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807725aaec7

READ_ADDRESS: fffff807729713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock
fffff807728283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000994

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffc9034d44c100 -- (.trap 0xffffc9034d44c100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffc9034d44c370
rdx=ffffa58ad4aed8d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807725aaec7 rsp=ffffc9034d44c290 rbp=ffffc9034d44c309
 r8=ffffa58ad4aed8a0  r9=0000000000000003 r10=0000000000000000
r11=ffffc9034d44c4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff807`725aaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT: 
ffffc903`4d44bfb8 fffff807`725d5929     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffc903`4d44bfc0 fffff807`725d1c69     : 00000000`ffff8001 ffffa58a`d2c9e250 ffffa58a`00000000 ffffa58a`d2c9e250 : nt!KiBugCheckDispatch+0x69
ffffc903`4d44c100 fffff807`725aaec7     : 00000000`00000000 ffffa58a`d4aed080 ffffa58a`d4aed080 fffff807`725d5358 : nt!KiPageFault+0x469
ffffc903`4d44c290 fffff807`725c9a98     : ffffc903`4d44c370 00000000`00000000 ffffc903`4d44c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffc903`4d44c370 fffff807`6c4f154f     : fffff807`6ca25c77 00000000`00000000 ffffffff`80002794 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffc903`4d44c508 fffff807`6ca25c77     : 00000000`00000000 ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 : vgk+0x154f
ffffc903`4d44c510 00000000`00000000     : ffffffff`80002794 00000000`00000008 fffff806`2c4f0000 fffff807`72ae9c40 : vgk+0x535c77


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000994, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8011dfaaec7, address which referenced memory

Debugging Details:
------------------
KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 7624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-70T822T

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 82446

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: 19h1_release

    Key  : WER.OS.Timestamp
    Value: 2019-03-18T12:02:00Z

    Key  : WER.OS.Version
    Value: 10.0.18362.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  a

BUGCHECK_P1: 994

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8011dfaaec7

READ_ADDRESS: fffff8011e3713b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock
fffff8011e2283b8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
 0000000000000994

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

TRAP_FRAME:  ffffa887a0f9c100 -- (.trap 0xffffa887a0f9c100)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000032000 rbx=0000000000000000 rcx=ffffa887a0f9c370
rdx=ffff98840843e890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8011dfaaec7 rsp=ffffa887a0f9c290 rbp=ffffa887a0f9c309
 r8=ffff98840843e860  r9=0000000000000003 r10=0000000000000000
r11=ffffa887a0f9c4e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiSwInterruptDispatch+0x27:
fffff801`1dfaaec7 f7879409000000001000 test dword ptr [rdi+994h],100000h ds:00000000`00000994=????????
Resetting default scope

STACK_TEXT: 
ffffa887`a0f9bfb8 fffff801`1dfd5929     : 00000000`0000000a 00000000`00000994 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffa887`a0f9bfc0 fffff801`1dfd1c69     : 00000000`ffff8001 ffff9883`fc69e930 ffff9883`00000000 ffff9883`fc69e930 : nt!KiBugCheckDispatch+0x69
ffffa887`a0f9c100 fffff801`1dfaaec7     : 00000000`00000000 ffff9884`0843e040 ffff9884`0843e040 fffff801`1dfd5358 : nt!KiPageFault+0x469
ffffa887`a0f9c290 fffff801`1dfc9a98     : ffffa887`a0f9c370 00000000`00000000 ffffa887`a0f9c3f0 00000000`00000000 : nt!KiSwInterruptDispatch+0x27
ffffa887`a0f9c370 fffff801`19cf154f     : fffff801`1a225c77 00000000`00000000 ffffffff`8000279c 00000000`00000008 : nt!KiSwInterrupt+0x368
ffffa887`a0f9c508 fffff801`1a225c77     : 00000000`00000000 ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 : vgk+0x154f
ffffa887`a0f9c510 00000000`00000000     : ffffffff`8000279c 00000000`00000008 fffff7ff`d9cf0000 fffff801`1e4e9c40 : vgk+0x535c77


SYMBOL_NAME:  vgk+154f

MODULE_NAME: vgk

IMAGE_NAME:  vgk.sys

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  154f

FAILURE_BUCKET_ID:  AV_vgk!unknown_function

OS_VERSION:  10.0.18362.1

BUILDLAB_STR:  19h1_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {56c5cf79-d160-8711-720f-03c630d4c72b}

Followup:     MachineOwner
---------

Geri
Yukarı