Son kullanma tarihi geçmiş, bayatlamış bir tarayıcı kullanıyorsanız, Mercedes kullanmak yerine tosbağaya binmek gibi... Web sitelerini düzgün görüntüleyemiyorsanız eh, bi' zahmet tarayıcınızı güncelleyiniz. Modern Web standartlarını karşılayan bir tarayıcı alternatifine göz atın.
Merhaba, vgk.sys yani Riot Vanguard'dan kaynaklanmış.
Sağ altta Vanguard'dan çıkış yapın.
Başlata "Program ekle veya kaldır" yazın ve Riot Vanguard'ı bulup kaldırın.
Daha sonra Riot Vanguard'ın kalıntıları için C:\Program Files\Riot Vanguard dizinine bakın. Başka bir yere de kurulu olabilir, diski bir kontrol edin. Vanguard ile alakalı şeyleri bulup silin.
Kaldırma işlemi bitince PC'yi yeniden başlatın ve ve açılınca oyun dosyalarının bütünlüğünü doğrulatın.
Ancak bunun dışında önerebileceğim birkaç bir şey daha var, bazı sürücüler vs. eski kalmış Bunlardan da kaynaklanıyor olabilir.
1- BIOS
BIOS'unuz epey bir eski.
2 Aralık 2020'den kalma 2409 sürümünü kullanıyorsunuz.
Bu sürede epey bir performans/kalite/stabilite güncelleştirmesi gelmiş.
Mutlaka güncelleyin. 4002 sürümüne güncelleyebilirsiniz.
BIOS'u güncelledikten sonra BIOS'a girip F5'ya basıp gelen Load Defaults sorusuna Yes deyip çıkın. Daha sonra BIOS ayarlarınızı yapın; fan, RAM için XMP vs...
Download the English (US) GeForce Game Ready Driver for Windows 10 64-bit, Windows 11 systems. Released 2023.5.30
www.nvidia.com
3-Windows sürümü
* Windows 10 yapı sürümünüz çok eski gözüküyor. Windows Update aracılığıyla güncellemelerinizi yapın.
4-Chipset
* Aşağıdaki AMD linkinden chipset sürücülerini indirin. Daha sonra Denetim masası > Program Ekle/Kaldırdan "AMD Chipset Software" kaldırın. PC'yi yeniden başlatın ve başlayınca aşağıdaki linkten verdiğim güncel chipset sürücülerini indirip kurun.
Çok fazla Bluestacks sürücüsü görüyorum. Emülatör güncel değilse güncelleyin. Ayrıca BIOS'ta SVM (sanallaştırma modu) açık değil mi? Kapalıysa açın. Ama tabii mavi ekranları çözene kadar Bluestacks çok elzem değilse kaldırmanızı öneririm.
Döküm:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9d0102f80738, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8077972e399, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1437
Key : Analysis.Elapsed.mSec
Value: 1527
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 55504
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_R_(null)_vgk!unknown_function
Key : Failure.Hash
Value: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff9d0102f80738
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8077972e399
BUGCHECK_P4: 0
FILE_IN_CAB: 061323-10500-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
READ_ADDRESS: fffff80767afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff9d0102f80738
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: fffffc0dd5da9f80 -- (.trap 0xfffffc0dd5da9f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f48 rbx=0000000000000000 rcx=ffff9d0102f80738
rdx=00005f0cd2e29cb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077972e399 rsp=fffffc0dd5daa118 rbp=ffff890fad6ab0a0
r8=0000000000000036 r9=ffff9d0102f80738 r10=0000000000000738
r11=ffff9d0102f80000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
vgk+0x2e399:
fffff807`7972e399 413801 cmp byte ptr [r9],al ds:ffff9d01`02f80738=??
Resetting default scope
STACK_TEXT:
fffffc0d`d5da9cd8 fffff807`6724af03 : 00000000`00000050 ffff9d01`02f80738 00000000`00000000 fffffc0d`d5da9f80 : nt!KeBugCheckEx
fffffc0d`d5da9ce0 fffff807`6706e7b0 : 00000000`00000fff 00000000`00000000 fffffc0d`d5daa000 00000000`00000000 : nt!MiSystemFault+0x1b2523
fffffc0d`d5da9de0 fffff807`6720b7d8 : ffff890f`952612f0 fffff807`672033e8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffffc0d`d5da9f80 fffff807`7972e399 : fffff807`797da6df ffff890f`952612f0 00000000`00000058 00000001`7cd90000 : nt!KiPageFault+0x358
fffffc0d`d5daa118 fffff807`797da6df : ffff890f`952612f0 00000000`00000058 00000001`7cd90000 00000000`00000050 : vgk+0x2e399
fffffc0d`d5daa120 ffff890f`952612f0 : 00000000`00000058 00000001`7cd90000 00000000`00000050 00000000`000001a0 : vgk+0xda6df
fffffc0d`d5daa128 00000000`00000058 : 00000001`7cd90000 00000000`00000050 00000000`000001a0 00000000`00000001 : 0xffff890f`952612f0
fffffc0d`d5daa130 00000001`7cd90000 : 00000000`00000050 00000000`000001a0 00000000`00000001 00000000`00000001 : 0x58
fffffc0d`d5daa138 00000000`00000050 : 00000000`000001a0 00000000`00000001 00000000`00000001 ffff890f`adfea7c8 : 0x00000001`7cd90000
fffffc0d`d5daa140 00000000`000001a0 : 00000000`00000001 00000000`00000001 ffff890f`adfea7c8 00000000`00000036 : 0x50
fffffc0d`d5daa148 00000000`00000001 : 00000000`00000001 ffff890f`adfea7c8 00000000`00000036 fffff807`79e9d839 : 0x1a0
fffffc0d`d5daa150 00000000`00000001 : ffff890f`adfea7c8 00000000`00000036 fffff807`79e9d839 fffffc0d`d5daa3f0 : 0x1
fffffc0d`d5daa158 ffff890f`adfea7c8 : 00000000`00000036 fffff807`79e9d839 fffffc0d`d5daa3f0 00000000`00000036 : 0x1
fffffc0d`d5daa160 00000000`00000036 : fffff807`79e9d839 fffffc0d`d5daa3f0 00000000`00000036 00000001`7cd90000 : 0xffff890f`adfea7c8
fffffc0d`d5daa168 fffff807`79e9d839 : fffffc0d`d5daa3f0 00000000`00000036 00000001`7cd90000 ffff890f`952612f0 : 0x36
fffffc0d`d5daa170 fffffc0d`d5daa3f0 : 00000000`00000036 00000001`7cd90000 ffff890f`952612f0 fffffc0d`d5daa448 : vgk+0x79d839
fffffc0d`d5daa178 00000000`00000036 : 00000001`7cd90000 ffff890f`952612f0 fffffc0d`d5daa448 fffffc0d`d5daa430 : 0xfffffc0d`d5daa3f0
fffffc0d`d5daa180 00000001`7cd90000 : ffff890f`952612f0 fffffc0d`d5daa448 fffffc0d`d5daa430 e70765ee`c1667038 : 0x36
fffffc0d`d5daa188 ffff890f`952612f0 : fffffc0d`d5daa448 fffffc0d`d5daa430 e70765ee`c1667038 fffffc0d`d5daa438 : 0x00000001`7cd90000
fffffc0d`d5daa190 fffffc0d`d5daa448 : fffffc0d`d5daa430 e70765ee`c1667038 fffffc0d`d5daa438 fffffc0d`d5daa438 : 0xffff890f`952612f0
fffffc0d`d5daa198 fffffc0d`d5daa430 : e70765ee`c1667038 fffffc0d`d5daa438 fffffc0d`d5daa438 00000000`00000000 : 0xfffffc0d`d5daa448
fffffc0d`d5daa1a0 e70765ee`c1667038 : fffffc0d`d5daa438 fffffc0d`d5daa438 00000000`00000000 00000000`00000000 : 0xfffffc0d`d5daa430
fffffc0d`d5daa1a8 fffffc0d`d5daa438 : fffffc0d`d5daa438 00000000`00000000 00000000`00000000 ffff890f`adfea7c8 : 0xe70765ee`c1667038
fffffc0d`d5daa1b0 fffffc0d`d5daa438 : 00000000`00000000 00000000`00000000 ffff890f`adfea7c8 aa9b2a6c`67bb0969 : 0xfffffc0d`d5daa438
fffffc0d`d5daa1b8 00000000`00000000 : 00000000`00000000 ffff890f`adfea7c8 aa9b2a6c`67bb0969 ffff890f`ad6ab140 : 0xfffffc0d`d5daa438
SYMBOL_NAME: vgk+2e399
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2e399
FAILURE_BUCKET_ID: AV_R_(null)_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Followup: MachineOwner
---------
Daha sonra Riot Vanguard'ın kalıntıları için C:\Program Files\Riot Vanguard dizinine bakın. Başka bir yere de kurulu olabilir, diski bir kontrol edin. Vanguard ile alakalı şeyleri bulup silin.
Kaldırma işlemi bitince PC'yi yeniden başlatın ve ve açılınca oyun dosyalarının bütünlüğünü doğrulatın.
Ancak bunun dışında önerebileceğim birkaç bir şey daha var, bazı sürücüler vs. eski kalmış bunlardan da kaynaklanıyor olabilir.
1- BIOS.
BIOS'unuz epey bir eski.
2 Aralık 2020'den kalma 2409 sürümünü kullanıyorsunuz.
Bu sürede epey bir performans/kalite/stabilite güncelleştirmesi gelmiş.
Mutlaka güncelleyin. 4002 sürümüne güncelleyebilirsiniz.
BIOS'u güncelledikten sonra BIOS'a girip F5'ya basıp gelen load defaults sorusuna yes deyip çıkın. Daha sonra BIOS ayarlarınızı yapın; fan, RAM için XMP vs...
Download the English (US) GeForce Game Ready Driver for Windows 10 64-bit, Windows 11 systems. Released 2023.5.30
www.nvidia.com
3-Windows sürümü.
* Windows 10 yapı sürümünüz çok eski gözüküyor. Windows Update aracılığıyla güncellemelerinizi yapın.
4-chipset
* Aşağıdaki AMD linkinden chipset sürücülerini indirin. Daha sonra Denetim Masası > program Ekle/Kaldırdan "AMD chipset software" kaldırın. PC'yi yeniden başlatın ve başlayınca aşağıdaki linkten verdiğim güncel chipset sürücülerini indirip kurun.
çok fazla BlueStacks sürücüsü görüyorum. Emülatör güncel değilse güncelleyin. Ayrıca BIOS'ta SVM (sanallaştırma modu) açık değil mi? Kapalıysa açın. Ama tabii mavi ekranları çözene kadar BlueStacks çok elzem değilse kaldırmanızı öneririm.
Döküm:
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff9d0102f80738, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8077972e399, If non-zero, the instruction address which referenced the bad memory.
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read.
Key : Analysis.CPU.mSec
Value: 1437.
Key : Analysis.Elapsed.mSec
Value: 1527.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187.
Key : Analysis.Init.Elapsed.mSec
Value: 55504.
Key : Analysis.Memory.CommitPeak.Mb
Value: 145.
Key : Bugcheck.Code.LegacyAPI
Value: 0x50.
Key : Dump.Attributes.AsUlong
Value: 8
Key : Dump.Attributes.KernelGeneratedTriageDump
Value: 1
Key : Failure.Bucket
Value: AV_R_(null)_vgk!unknown_function
Key : Failure.Hash
Value: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
BUGCHECK_CODE: 50.
BUGCHECK_P1: ffff9d0102f80738.
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8077972e399.
BUGCHECK_P4: 0
FILE_IN_CAB: 061323-10500-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8.
Kernel Generated Triage Dump.
READ_ADDRESS: fffff80767afb390: Unable to get MiVisibleState.
Unable to get NonPagedPoolStart.
Unable to get NonPagedPoolEnd.
Unable to get PagedPoolStart.
Unable to get PagedPoolEnd.
unable to get nt!MmSpecialPagesInUse
ffff9d0102f80738.
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: fffffc0dd5da9f80 -- (.trap 0xfffffc0dd5da9f80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f48 rbx=0000000000000000 rcx=ffff9d0102f80738
rdx=00005f0cd2e29cb8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8077972e399 rsp=fffffc0dd5daa118 rbp=ffff890fad6ab0a0
r8=0000000000000036 r9=ffff9d0102f80738 r10=0000000000000738
r11=ffff9d0102f80000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy.
vgk+0x2e399:
fffff807`7972e399 413801 cmp byte ptr [r9],al ds:ffff9d01`02f80738=??
Resetting default scope.
STACK_TEXT:
fffffc0d`d5da9cd8 fffff807`6724af03 : 00000000`00000050 ffff9d01`02f80738 00000000`00000000 fffffc0d`d5da9f80 : nt!KeBugCheckEx
fffffc0d`d5da9ce0 fffff807`6706e7b0 : 00000000`00000fff 00000000`00000000 fffffc0d`d5daa000 00000000`00000000 : nt!MiSystemFault+0x1b2523
fffffc0d`d5da9de0 fffff807`6720b7d8 : ffff890f`952612f0 fffff807`672033e8 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffffc0d`d5da9f80 fffff807`7972e399 : fffff807`797da6df ffff890f`952612f0 00000000`00000058 00000001`7cd90000 : nt!KiPageFault+0x358
fffffc0d`d5daa118 fffff807`797da6df : ffff890f`952612f0 00000000`00000058 00000001`7cd90000 00000000`00000050 : vgk+0x2e399
fffffc0d`d5daa120 ffff890f`952612f0 : 00000000`00000058 00000001`7cd90000 00000000`00000050 00000000`000001a0 : vgk+0xda6df
fffffc0d`d5daa128 00000000`00000058 : 00000001`7cd90000 00000000`00000050 00000000`000001a0 00000000`00000001 : 0xffff890f`952612f0
fffffc0d`d5daa130 00000001`7cd90000 : 00000000`00000050 00000000`000001a0 00000000`00000001 00000000`00000001 : 0x58.
fffffc0d`d5daa138 00000000`00000050 : 00000000`000001a0 00000000`00000001 00000000`00000001 ffff890f`adfea7c8 : 0x00000001`7cd90000
fffffc0d`d5daa140 00000000`000001a0 : 00000000`00000001 00000000`00000001 ffff890f`adfea7c8 00000000`00000036 : 0x50.
fffffc0d`d5daa148 00000000`00000001 : 00000000`00000001 ffff890f`adfea7c8 00000000`00000036 fffff807`79e9d839 : 0x1a0.
fffffc0d`d5daa150 00000000`00000001 : ffff890f`adfea7c8 00000000`00000036 fffff807`79e9d839 fffffc0d`d5daa3f0 : 0x1.
fffffc0d`d5daa158 ffff890f`adfea7c8 : 00000000`00000036 fffff807`79e9d839 fffffc0d`d5daa3f0 00000000`00000036 : 0x1.
fffffc0d`d5daa160 00000000`00000036 : fffff807`79e9d839 fffffc0d`d5daa3f0 00000000`00000036 00000001`7cd90000 : 0xffff890f`adfea7c8
fffffc0d`d5daa168 fffff807`79e9d839 : fffffc0d`d5daa3f0 00000000`00000036 00000001`7cd90000 ffff890f`952612f0 : 0x36.
fffffc0d`d5daa170 fffffc0d`d5daa3f0 : 00000000`00000036 00000001`7cd90000 ffff890f`952612f0 fffffc0d`d5daa448 : vgk+0x79d839
fffffc0d`d5daa178 00000000`00000036 : 00000001`7cd90000 ffff890f`952612f0 fffffc0d`d5daa448 fffffc0d`d5daa430 : 0xfffffc0d`d5daa3f0
fffffc0d`d5daa180 00000001`7cd90000 : ffff890f`952612f0 fffffc0d`d5daa448 fffffc0d`d5daa430 e70765ee`c1667038 : 0x36.
fffffc0d`d5daa188 ffff890f`952612f0 : fffffc0d`d5daa448 fffffc0d`d5daa430 e70765ee`c1667038 fffffc0d`d5daa438 : 0x00000001`7cd90000
fffffc0d`d5daa190 fffffc0d`d5daa448 : fffffc0d`d5daa430 e70765ee`c1667038 fffffc0d`d5daa438 fffffc0d`d5daa438 : 0xffff890f`952612f0
fffffc0d`d5daa198 fffffc0d`d5daa430 : e70765ee`c1667038 fffffc0d`d5daa438 fffffc0d`d5daa438 00000000`00000000 : 0xfffffc0d`d5daa448
fffffc0d`d5daa1a0 e70765ee`c1667038 : fffffc0d`d5daa438 fffffc0d`d5daa438 00000000`00000000 00000000`00000000 : 0xfffffc0d`d5daa430
fffffc0d`d5daa1a8 fffffc0d`d5daa438 : fffffc0d`d5daa438 00000000`00000000 00000000`00000000 ffff890f`adfea7c8 : 0xe70765ee`c1667038
fffffc0d`d5daa1b0 fffffc0d`d5daa438 : 00000000`00000000 00000000`00000000 ffff890f`adfea7c8 aa9b2a6c`67bb0969 : 0xfffffc0d`d5daa438
fffffc0d`d5daa1b8 00000000`00000000 : 00000000`00000000 ffff890f`adfea7c8 aa9b2a6c`67bb0969 ffff890f`ad6ab140 : 0xfffffc0d`d5daa438
SYMBOL_NAME: vgk+2e399
MODULE_NAME: vgk.
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb.
BUCKET_ID_FUNC_OFFSET: 2e399.
FAILURE_BUCKET_ID: AV_R_(null)_vgk!unknown_function
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Followup: MachineOwner.
---------