PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe5857765a004, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80717666e84, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 6806
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe5857765a004
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80717666e84
BUGCHECK_P4: 2
READ_ADDRESS: fffff807180fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
fffff8071800f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe5857765a004
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
TRAP_FRAME: ffff8086458df800 -- (.trap 0xffff8086458df800)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000006f4 rbx=0000000000000000 rcx=0000000000000004
rdx=ffffe5855be87048 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80717666e84 rsp=ffff8086458df990 rbp=ffffe5855a0f7e0e
r8=ffffe5857765a004 r9=ffffe5855be96f29 r10=ffffe5855a0f7e0e
r11=ffffe5855a0f8000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!RtlCompressBufferXpressLzStandard+0x144:
fffff807`17666e84 413808 cmp byte ptr [r8],cl ds:ffffe585`7765a004=??
Resetting default scope
STACK_TEXT:
ffff8086`458df558 fffff807`1787a665 : 00000000`00000050 ffffe585`7765a004 00000000`00000000 ffff8086`458df800 : nt!KeBugCheckEx
ffff8086`458df560 fffff807`176ea4a0 : 00000000`00000000 00000000`00000000 ffff8086`458df880 00000000`00000000 : nt!MiSystemFault+0x172315
ffff8086`458df660 fffff807`1780335e : ffffe585`584267b0 00000000`000017d4 00000000`000000c0 00000000`00000001 : nt!MmAccessFault+0x400
ffff8086`458df800 fffff807`17666e84 : ffff8086`458df9b8 00000000`00000000 00000000`00000000 00000008`00000000 : nt!KiPageFault+0x35e
ffff8086`458df990 fffff807`17666d31 : ffffe585`5be96f29 00000000`00000003 ffffe585`5a0f7070 ffffe585`5be95f4f : nt!RtlCompressBufferXpressLzStandard+0x144
ffff8086`458dfa40 fffff807`1764b6bf : 00000000`c0000055 fffff97c`be5f2e58 ffffe585`59efa000 ffffe585`581b0b10 : nt!RtlCompressBufferXpressLz+0x61
ffff8086`458dfaa0 fffff807`1764b76e : fffff807`18123eb0 00000000`00000070 ffffe585`59efa028 fffff972`c2acf7d8 : nt!RtlCompressBuffer+0x6f
ffff8086`458dfb00 fffff807`1764b4f6 : fffff807`18123eb0 fffff807`181239c0 fffff807`18123eb0 ffffe585`564cf100 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxProcessEntry+0x92
ffff8086`458dfb90 fffff807`176a29a5 : ffffffff`fd050f80 ffffe585`568450c0 fffff807`1764b380 ffffe585`5be87000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmCompressCtxWorkerThread+0x176
ffff8086`458dfc10 fffff807`177fc868 : ffffbb00`4095c180 ffffe585`568450c0 fffff807`176a2950 ffffe43e`33d05b6b : nt!PspSystemThreadStartup+0x55
ffff8086`458dfc60 00000000`00000000 : ffff8086`458e0000 ffff8086`458da000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!RtlCompressBufferXpressLzStandard+144
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 144
FAILURE_BUCKET_ID: AV_R_INVALID_nt!RtlCompressBufferXpressLzStandard
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5dc26c18-791e-2b65-66c1-84251459e2c3}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 000000000000005d, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8046a086e6b, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4890
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7493
Key : Analysis.Memory.CommitPeak.Mb
Value: 83
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 0
BUGCHECK_P2: ff
BUGCHECK_P3: 5d
BUGCHECK_P4: fffff8046a086e6b
WRITE_ADDRESS: fffff8046a8fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8046a80f340: Unable to get Flags value from nt!KdVersionBlock
fffff8046a80f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8d002da45960 -- (.trap 0xffff8d002da45960)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000058 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8046a086e6b rsp=ffff8d002da45af0 rbp=ffff8d002da45bf0
r8=00000000ffffffff r9=0000000000000000 r10=ffff9583fb69ea00
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe cy
nt!PoIdle+0x1601db:
fffff804`6a086e6b 8908 mov dword ptr [rax],ecx ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffff8d00`2da45818 fffff804`6a007169 : 00000000`0000000a 00000000`00000000 00000000`000000ff 00000000`0000005d : nt!KeBugCheckEx
ffff8d00`2da45820 fffff804`6a003469 : ffff9583`fbc23010 ffffffff`ffffffff ffffffff`00100000 ffff9583`fbc231f8 : nt!KiBugCheckDispatch+0x69
ffff8d00`2da45960 fffff804`6a086e6b : 00000000`00000000 00001f80`00e5005b 00000000`00178c06 00000000`00000002 : nt!KiPageFault+0x469
ffff8d00`2da45af0 fffff804`69ff8d34 : ffffffff`00000000 ffffe781`a55e0340 ffff9584`00e8e080 00000000`00000b88 : nt!PoIdle+0x1601db
ffff8d00`2da45c60 00000000`00000000 : ffff8d00`2da46000 ffff8d00`2da40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!PoIdle+1601db
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1601db
FAILURE_BUCKET_ID: AV_nt!PoIdle
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0f00f4f4-fc66-441c-10bf-8ccc2952f11b}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000102, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff801184deb8e, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3734
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3730
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 102
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff801184deb8e
WRITE_ADDRESS: fffff80118efb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80118e0f340: Unable to get Flags value from nt!KdVersionBlock
fffff80118e0f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
0000000000000102
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: EpicGamesLauncher.exe
TRAP_FRAME: ffffe1058bc457e0 -- (.trap 0xffffe1058bc457e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000184c rbx=0000000000000000 rcx=ffffce01aebd5180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801184deb8e rsp=ffffe1058bc45970 rbp=ffffe1058bc45a01
r8=0000000000000001 r9=0000000039f06995 r10=0000000000000000
r11=fffff780000003b0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeWaitForSingleObject+0x18e:
fffff801`184deb8e f00fba2f07 lock bts dword ptr [rdi],7 ds:00000000`00000000=????????
Resetting default scope
STACK_TEXT:
ffffe105`8bc45698 fffff801`18607169 : 00000000`0000000a 00000000`00000102 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffe105`8bc456a0 fffff801`18603469 : ffffce01`aebd5100 ffffaa87`174526e7 00000000`00000000 ffffa682`a1d10440 : nt!KiBugCheckDispatch+0x69
ffffe105`8bc457e0 fffff801`184deb8e : ffffce01`0000007b fffff801`00000000 ffffce01`aee43101 ffffa682`a1d10480 : nt!KiPageFault+0x469
ffffe105`8bc45970 fffff801`188f1531 : 00000000`00000102 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x18e
ffffe105`8bc45a60 fffff801`188f15da : ffffa682`a1d10340 00000093`d204fc58 00000000`00000000 fffff801`18606a18 : nt!ObWaitForSingleObject+0x91
ffffe105`8bc45ac0 fffff801`18606bb8 : 00000000`00000000 00000000`00000000 ffffe105`8bc45b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
ffffe105`8bc45b00 00007ffa`fe5cbe24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000093`d204fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`fe5cbe24
SYMBOL_NAME: nt!KeWaitForSingleObject+18e
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 18e
FAILURE_BUCKET_ID: AV_nt!KeWaitForSingleObject
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {505415ce-6277-25db-2465-e86127b1616c}
Followup: MachineOwner
---------
APC_INDEX_MISMATCH (1)
This is a kernel internal error. The most common reason to see this
bugcheck is when a filesystem or a driver has a mismatched number of
calls to disable and re-enable APCs. The key data item is the
Thread->CombinedApcDisable field. This consists of two separate 16-bit
fields, the SpecialApcDisable and the KernelApcDisable. A negative value
of either indicates that a driver has disabled special or normal APCs
(respectively) without re-enabling them; a positive value indicates that
a driver has enabled special or normal APCs (respectively) too many times.
Arguments:
Arg1: 0000000077581cfc, Address of system call function or worker routine
Arg2: 0000000000000000, Thread->ApcStateIndex
Arg3: 000000000000ffff, (Thread->SpecialApcDisable << 16) | Thread->KernelApcDisable
Arg4: ffff838ecd395b80, Call type (0 - system call, 1 - worker routine)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3453
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3455
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1
BUGCHECK_P1: 77581cfc
BUGCHECK_P2: 0
BUGCHECK_P3: ffff
BUGCHECK_P4: ffff838ecd395b80
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Discord.exe
STACK_TEXT:
ffff838e`cd3959b8 fffff801`71807169 : 00000000`00000001 00000000`77581cfc 00000000`00000000 00000000`0000ffff : nt!KeBugCheckEx
ffff838e`cd3959c0 fffff801`71807033 : ffffd68f`24faa080 00007ff9`0ffb7f01 ffff838e`cd395b18 ffffffff`fffea070 : nt!KiBugCheckDispatch+0x69
ffff838e`cd395b00 00000000`77581cfc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x1fe
00000000`099fe928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77581cfc
SYMBOL_NAME: nt!KiSystemServiceExitPico+1fe
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1fe
FAILURE_BUCKET_ID: 0x1_SysCallNum_d0004_nt!KiSystemServiceExitPico
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1e5e8093-a7e6-a911-7b9b-47d4229c250f}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8045b41a876, Address of the instruction which caused the bugcheck
Arg3: ffff8200ecff5920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 5319
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8045b41a876
BUGCHECK_P3: ffff8200ecff5920
BUGCHECK_P4: 0
CONTEXT: ffff8200ecff5920 -- (.cxr 0xffff8200ecff5920)
rax=ffffcc05c65057e8 rbx=ffffcc05c3bad080 rcx=cc05c65057b00000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffcc05c65057e0
rip=fffff8045b41a876 rsp=ffffb00da0b95940 rbp=ffffb00da0b95a01
r8=0000000000000000 r9=0000000040e07c36 r10=0000000000000002
r11=fffff780000003b0 r12=0000000000000000 r13=cc05c65057b00000
r14=0000000000000000 r15=ffffcc05c3bad1c0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050282
nt!KeAbPreWait+0x6:
fffff804`5b41a876 0fb64120 movzx eax,byte ptr [rcx+20h] ds:002b:cc05c650`57b00020=??
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: nvcontainer.exe
BAD_STACK_POINTER: ffff8200ecff5018
STACK_TEXT:
ffffb00d`a0b95940 fffff804`5b66f029 : 00000000`00000000 fffff804`5b8efe11 00000000`00000000 00000000`00000000 : nt!KeAbPreWait+0x6
ffffb00d`a0b95970 fffff804`5b8f1531 : ffffcc05`c65057e0 00000000`00000006 ffffcc05`00000001 00000000`00000900 : nt!KeWaitForSingleObject+0x190629
ffffb00d`a0b95a60 fffff804`5b8f15da : ffffcc05`c3bad080 000000a9`75fff5d8 00000000`00000000 0000022f`5cc19a80 : nt!ObWaitForSingleObject+0x91
ffffb00d`a0b95ac0 fffff804`5b606bb8 : 000000a9`75fff700 ffffcc05`c46b2080 ffffb00d`a0b95b18 ffffffff`ffb38db0 : nt!NtWaitForSingleObject+0x6a
ffffb00d`a0b95b00 00007ffe`4738be24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000a9`75fff5a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`4738be24
SYMBOL_NAME: nt!KeAbPreWait+6
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.630
STACK_COMMAND: .cxr 0xffff8200ecff5920 ; kb
BUCKET_ID_FUNC_OFFSET: 6
FAILURE_BUCKET_ID: 0x3B_c0000005_STACKPTR_ERROR_nt!KeAbPreWait
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ddcb9656-083d-2ea8-831a-b13145df4ef7}
Followup: MachineOwner
---------