0x0000001a ve 0x0000003B hatası

İşletim sistemi
Windows 7

p.queenq

Centipat
Katılım
2 Ekim 2020
Mesajlar
38
Merhaba, bugün bilgisayarım 2 kere mavi ekran hatası verdi, rica etsem sorunu bulabilir misiniz?
 
  • MemTest86 yapın.
  • Samsung cihazınızı bir süre bağlamayın. İnternet paylaşımı yapıyorsanız ethernet ile bağlantı yapın.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800034fcb44, Address of the instruction which caused the bugcheck
Arg3: fffff8800ae67f80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff800033f00e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ab300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 48212

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-01-02T17:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24545


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800034fcb44

BUGCHECK_P3: fffff8800ae67f80

BUGCHECK_P4: 0

CONTEXT:  fffff8800ae67f80 -- (.cxr 0xfffff8800ae67f80)
rax=000000000001f000 rbx=0000000000004011 rcx=0000000040110000
rdx=000000004051ffff rsi=fffffa800b564060 rdi=0000000000004051
rip=fffff800034fcb44 rsp=fffff8800ae68950 rbp=0000000000410000
r8=00000000737ab506  r9=0000000000000000 r10=0000000000000001
r11=fffffa800b564060 r12=0007ffffffffffff r13=fffffa8007be5440
r14=000000004051ffff r15=0000000040110000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210246
nt!MiReturnPageTablePageCommitment+0x64:
fffff800`034fcb44 004c8994        add     byte ptr [rcx+rcx*4-6Ch],cl ds:002b:00000001`4054ff94=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClientUx

STACK_TEXT:
fffff880`0ae68950 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiReturnPageTablePageCommitment+0x64


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800034fcb3a - nt!MiReturnPageTablePageCommitment+5a
    [ c1:81 ]
1 error : !nt (fffff800034fcb3a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xfffff8800ae67f80 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  7.1.7601.24545

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff680000de958
Arg3: cde00001da10c867
Arg4: fffffa800ad01aa0

Debugging Details:
------------------

fffff800034440e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ff300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5693

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-01-02T17:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24545


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41201

BUGCHECK_P2: fffff680000de958

BUGCHECK_P3: cde00001da10c867

BUGCHECK_P4: fffffa800ad01aa0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff880`05176858 fffff800`033794fa     : 00000000`0000001a 00000000`00041201 fffff680`000de958 cde00001`da10c867 : nt!KeBugCheckEx
fffff880`05176860 fffff800`03282509     : cde00001`da10c867 03a00002`0326d867 fffffa80`0ad01aa0 00000000`00000000 : nt!MiGetPageProtection+0x2aa
fffff880`051768b0 fffff800`032828fa     : fffffa80`0721db50 fffff880`05176b60 fffffa80`0726bb00 fffff880`05176980 : nt!MiQueryAddressState+0x3c9
fffff880`05176910 fffff800`0353aa24     : 000007ff`00000004 00000000`1bd2c000 fffffa80`0ad01aa0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`05176980 fffff800`03303f53     : 00000000`000003dc fffffa80`0721db50 fffff880`00000000 00000000`0949ed28 : nt!NtQueryVirtualMemory+0x3a4
fffff880`05176a70 00000000`77b899da     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0949ed08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b899da


SYMBOL_NAME:  nt!MiGetPageProtection+2aa

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection+2aa

OS_VERSION:  7.1.7601.24545

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {ace12829-0783-84e7-5d0f-5ee48b8301eb}

Followup:     MachineOwner
---------

Adımları yaptıktan sonra mutlaka geri dönüş yapın, MemTest86 sonuçlarını mutlaka paylaşın.

Bu arada merakımdan soruyorum, neden Windows 10 kullanmıyorsunuz? Sisteminiz fena değil.
 
  • MemTest86 yapın.
  • Samsung cihazınızı bir süre bağlamayın. İnternet paylaşımı yapıyorsanız ethernet ile bağlantı yapın.
  • Vanguard'ı kaldırın.
Kod:
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800034fcb44, Address of the instruction which caused the bugcheck
Arg3: fffff8800ae67f80, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

fffff800033f00e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ab300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5296

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 48212

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-01-02T17:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24545


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff800034fcb44

BUGCHECK_P3: fffff8800ae67f80

BUGCHECK_P4: 0

CONTEXT:  fffff8800ae67f80 -- (.cxr 0xfffff8800ae67f80)
rax=000000000001f000 rbx=0000000000004011 rcx=0000000040110000
rdx=000000004051ffff rsi=fffffa800b564060 rdi=0000000000004051
rip=fffff800034fcb44 rsp=fffff8800ae68950 rbp=0000000000410000
r8=00000000737ab506  r9=0000000000000000 r10=0000000000000001
r11=fffffa800b564060 r12=0007ffffffffffff r13=fffffa8007be5440
r14=000000004051ffff r15=0000000040110000
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00210246
nt!MiReturnPageTablePageCommitment+0x64:
fffff800`034fcb44 004c8994        add     byte ptr [rcx+rcx*4-6Ch],cl ds:002b:00000001`4054ff94=??
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  LeagueClientUx

STACK_TEXT:
fffff880`0ae68950 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiReturnPageTablePageCommitment+0x64


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800034fcb3a - nt!MiReturnPageTablePageCommitment+5a
    [ c1:81 ]
1 error : !nt (fffff800034fcb3a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .cxr 0xfffff8800ae67f80 ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  7.1.7601.24545

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff680000de958
Arg3: cde00001da10c867
Arg4: fffffa800ad01aa0

Debugging Details:
------------------

fffff800034440e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034ff300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 1624

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 5693

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-01-02T17:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24545


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1a

BUGCHECK_P1: 41201

BUGCHECK_P2: fffff680000de958

BUGCHECK_P3: cde00001da10c867

BUGCHECK_P4: fffffa800ad01aa0

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  chrome.exe

STACK_TEXT:
fffff880`05176858 fffff800`033794fa     : 00000000`0000001a 00000000`00041201 fffff680`000de958 cde00001`da10c867 : nt!KeBugCheckEx
fffff880`05176860 fffff800`03282509     : cde00001`da10c867 03a00002`0326d867 fffffa80`0ad01aa0 00000000`00000000 : nt!MiGetPageProtection+0x2aa
fffff880`051768b0 fffff800`032828fa     : fffffa80`0721db50 fffff880`05176b60 fffffa80`0726bb00 fffff880`05176980 : nt!MiQueryAddressState+0x3c9
fffff880`05176910 fffff800`0353aa24     : 000007ff`00000004 00000000`1bd2c000 fffffa80`0ad01aa0 fffff880`00000000 : nt!MiQueryAddressSpan+0xba
fffff880`05176980 fffff800`03303f53     : 00000000`000003dc fffffa80`0721db50 fffff880`00000000 00000000`0949ed28 : nt!NtQueryVirtualMemory+0x3a4
fffff880`05176a70 00000000`77b899da     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0949ed08 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b899da


SYMBOL_NAME:  nt!MiGetPageProtection+2aa

MODULE_NAME: nt

IMAGE_VERSION:  6.1.7601.24545

STACK_COMMAND:  .thread ; .cxr ; kb

IMAGE_NAME:  ntkrnlmp.exe

FAILURE_BUCKET_ID:  0x1a_41201_nt!MiGetPageProtection+2aa

OS_VERSION:  7.1.7601.24545

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {ace12829-0783-84e7-5d0f-5ee48b8301eb}

Followup:     MachineOwner
---------

Adımları yaptıktan sonra mutlaka geri dönüş yapın, MemTest86 sonuçlarını mutlaka paylaşın.

Bu arada merakımdan soruyorum, neden Windows 10 kullanmıyorsunuz? Sisteminiz fena değil.
Merhaba, cezam vardı yazamadım. Bu süre zarfında yeni bir mavi ekran hatası aldım.
Vanguard'ı sildim, maalesef Ethernet kablom yarın geliyor, sadece USB ile bağlayabiliyorum bilgisayarımı.
Windows 10'da iken bilgisayarım çok garip bir şekilde kasıyordu, YouTube'dan video bile izleyemiyordum.
Hata kodu 0x0000001E.
Minidump
 
MemTest86 yapın. Yüksek ihtimalle bellek sorunu.

Kod:
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800034fcb38, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000040870f20, Parameter 1 of the exception

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ExceptionRecord                               ***
***                                                                   ***
*************************************************************************
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: ContextRecord                                 ***
***                                                                   ***
*************************************************************************
fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034aa300

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5312

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-62N06FT

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 7250

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 62

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: win7sp1_ldr_escrow

    Key  : WER.OS.Timestamp
    Value: 2020-01-02T17:07:00Z

    Key  : WER.OS.Version
    Value: 7.1.7601.24545


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  1e

BUGCHECK_P1: ffffffffc0000005

BUGCHECK_P2: fffff800034fcb38

BUGCHECK_P3: 0

BUGCHECK_P4: 40870f20

READ_ADDRESS: fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
fffff800033ef0e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff800034aa2f0
GetUlongPtrFromAddress: unable to read from fffff800034aa4a8
0000000000000000

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  svchost.exe

TRAP_FRAME:  fffff8800d426880 -- (.trap 0xfffff8800d426880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000011 rbx=0000000000000000 rcx=0000000000000010
rdx=fffff8a00006f650 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800034fcb38 rsp=fffff8800d426a10 rbp=fffff8a0000221bb
r8=fffff8a000024010  r9=000000000000fffe r10=0000000000000000
r11=fffff8800d426bc0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!CmpKcbCacheLookup+0x4f8:
fffff800`034fcb38 4883b9100f874005 cmp     qword ptr [rcx+40870F10h],5 ds:00000000`40870f20=????????????????
Resetting default scope

STACK_TEXT:
fffff880`0d426008 fffff800`03387f38     : 00000000`0000001e ffffffff`c0000005 fffff800`034fcb38 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d426010 fffff800`032af3c2     : fffff880`0d4267d8 00000000`00000000 fffff880`0d426880 fffffa80`07560060 : nt!KiDispatchException+0x1c8
fffff880`0d4266a0 fffff800`032ad0a8     : 00000000`00000000 00000000`40870f20 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`0d426880 fffff800`034fcb38     : fffff8a0`0000dce0 00000000`659a7ef2 fffff880`0d426f8c fffff800`034fb24d : nt!KiPageFault+0x428
fffff880`0d426a10 fffff800`034fdae5     : fffff880`0d426bc0 fffff880`00000003 fffff880`0d426fb8 fffff880`0d426fb0 : nt!CmpKcbCacheLookup+0x4f8
fffff880`0d426b00 fffff800`036bbd47     : fffff8a0`0000fca0 fffff880`0d426fb0 fffff880`0d427038 fffff880`0d426fe0 : nt!CmpBuildHashStackAndLookupCache+0x335
fffff880`0d426ee0 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CmpParseKey+0x5a7


CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff800034fcb3a - nt!CmpKcbCacheLookup+4fa
    [ f9:b9 ]
1 error : !nt (fffff800034fcb3a)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

MEMORY_CORRUPTOR:  ONE_BIT

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_ONE_BIT

OS_VERSION:  7.1.7601.24545

BUILDLAB_STR:  win7sp1_ldr_escrow

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 7

FAILURE_ID_HASH:  {e3faf315-c3d0-81db-819a-6c43d23c63a7}

Followup:     memory_corruption
---------

Vanguard'ı sildim.
Silmediniz gibi görünüyor.

C:\Program Files\Riot Vanguard\uninstall.exe
Bu dosyayı çalıştırıp -karşınıza çıkarsa- ilgili adımları takip edebilir misiniz?

Windows 10'da iken bilgisayarım çok garip bir şekilde kasıyordu, YouTube'dan video bile izleyemiyordum.
En azından Windows 8.1 kullanmanızı öneririm.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı