Çözüldü Monster Abra A5 v.17.2.3 mavi ekran hatası

Bu konu çözüldü olarak işaretlenmiştir. Çözülmediğini düşünüyorsanız konuyu rapor edebilirsiniz.
İşletim sistemi
Windows 11
Çözüm
@TheEasTurco öncelikle bilmediğimiz konularda yanlış yönlendirme yapmayalım. Ekran kartı ile alakalı bir sorun yok.

@onlyhelly Sorununuz asıl kaynağı " kbdclass.sys " dosyasıdır. Bu sys dosyası da Monster Control Center uygulaması ile özelleştirdiğiniz klavyenize bağlı bir sys dosyasıdır. Kısaca Monster Control Center uygulamasını silerseniz sorunun çözüleceğini görebilirsiniz silmek istemiyorum diyorsanız şu çözüm yolunu deneyin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318} klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc30bb5582f4c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8044f2a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2156

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4321

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 389

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1985

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key  : WER.OS.Version
    Value: 10.0.22621.1


FILE_IN_CAB:  042623-17812-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc30bb5582f4c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8044f2a32d2

READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc30bb5582f4c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

DPC_STACK_BASE:  FFFFF8040D49DFB0

TRAP_FRAME:  fffff8040d49d470 -- (.trap 0xfffff8040d49d470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400
rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc3039af31000
r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`4f2a32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff804`0d49d328 fffff804`08e3e9a9     : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`0d49d330 fffff804`08e3a034     : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69
fffff804`0d49d470 fffff804`4f2a32d2     : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474
fffff804`0d49d608 fffff804`4f2a5b5d     : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92
fffff804`0d49d610 fffff804`4f291511     : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`0d49d6b0 ffffc303`97159510     : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`0d49d6b8 fffff804`0d49d7d8     : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510
fffff804`0d49d6c0 ffffc303`a7fd1310     : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8
fffff804`0d49d6c8 fffff804`0d49d7d8     : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310
fffff804`0d49d6d0 00000000`00000008     : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8
fffff804`0d49d6d8 fffff804`0d49d730     : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8
fffff804`0d49d6e0 ffffc303`971593c0     : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730
fffff804`0d49d6e8 fffff804`4f2913f0     : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0
fffff804`0d49d6f0 fffff804`04b73180     : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0
fffff804`0d49d6f8 fffff804`4f26b848     : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180
fffff804`0d49d700 fffff804`08c2a1da     : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`0d49d7d0 fffff804`08c299e4     : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff804`0d49dd20 fffff804`08e32815     : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4
fffff804`0d49dfb0 fffff804`08e327bf     : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff890b`2e57f2b0 fffff804`08c2c0c9     : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn
ffff890b`2e57f2c0 fffff804`08e31f8b     : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
ffff890b`2e57f3b0 fffff804`08e2b5c1     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff890b`2e57f3e0 00007ff7`f117862b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000002e`ac5dfd30 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

0: kd> lmvm kbdclass
Browse full module list
start             end                 module name
fffff804`4f2a0000 fffff804`4f2b5000   kbdclass # (pdb symbols)          C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb
    Loaded symbol image file: kbdclass.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys
    Image path: \SystemRoot\System32\drivers\kbdclass.sys
    Image name: kbdclass.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        3D8A7081 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         0001CDCA
    ImageSize:        00015000
    File version:     10.0.23435.1000
    Product version:  10.0.23435.1000
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     kbdclass.sys
        OriginalFilename: kbdclass.sys
        ProductVersion:   10.0.23435.1000
        FileVersion:      10.0.23435.1000 (WinBuild.160101.0800)
        FileDescription:  Keyboard Class Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
@TheEasTurco öncelikle bilmediğimiz konularda yanlış yönlendirme yapmayalım. Ekran kartı ile alakalı bir sorun yok.

@onlyhelly Sorununuz asıl kaynağı " kbdclass.sys " dosyasıdır. Bu sys dosyası da Monster Control Center uygulaması ile özelleştirdiğiniz klavyenize bağlı bir sys dosyasıdır. Kısaca Monster Control Center uygulamasını silerseniz sorunun çözüleceğini görebilirsiniz silmek istemiyorum diyorsanız şu çözüm yolunu deneyin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318} klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc30bb5582f4c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8044f2a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2156

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 4321

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 0

    Key  : Analysis.Init.CPU.mSec
    Value: 389

    Key  : Analysis.Init.Elapsed.mSec
    Value: 1985

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 88

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: ni_release

    Key  : WER.OS.Timestamp
    Value: 2022-05-06T12:50:00Z

    Key  : WER.OS.Version
    Value: 10.0.22621.1


FILE_IN_CAB:  042623-17812-01.dmp

TAG_NOT_DEFINED_202b:  *** Unknown TAG in analysis list 202b


BUGCHECK_CODE:  d1

BUGCHECK_P1: ffffc30bb5582f4c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8044f2a32d2

READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc30bb5582f4c

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  VALORANT-Win64-Shipping.exe

DPC_STACK_BASE:  FFFFF8040D49DFB0

TRAP_FRAME:  fffff8040d49d470 -- (.trap 0xfffff8040d49d470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400
rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680
 r8=00000000000000c0  r9=0000000000000038 r10=ffffc3039af31000
r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`4f2a32d2 0f100411        movups  xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=????????????????????????????????
Resetting default scope

STACK_TEXT: 
fffff804`0d49d328 fffff804`08e3e9a9     : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`0d49d330 fffff804`08e3a034     : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69
fffff804`0d49d470 fffff804`4f2a32d2     : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474
fffff804`0d49d608 fffff804`4f2a5b5d     : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92
fffff804`0d49d610 fffff804`4f291511     : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`0d49d6b0 ffffc303`97159510     : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`0d49d6b8 fffff804`0d49d7d8     : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510
fffff804`0d49d6c0 ffffc303`a7fd1310     : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8
fffff804`0d49d6c8 fffff804`0d49d7d8     : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310
fffff804`0d49d6d0 00000000`00000008     : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8
fffff804`0d49d6d8 fffff804`0d49d730     : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8
fffff804`0d49d6e0 ffffc303`971593c0     : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730
fffff804`0d49d6e8 fffff804`4f2913f0     : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0
fffff804`0d49d6f0 fffff804`04b73180     : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0
fffff804`0d49d6f8 fffff804`4f26b848     : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180
fffff804`0d49d700 fffff804`08c2a1da     : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`0d49d7d0 fffff804`08c299e4     : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff804`0d49dd20 fffff804`08e32815     : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4
fffff804`0d49dfb0 fffff804`08e327bf     : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff890b`2e57f2b0 fffff804`08c2c0c9     : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn
ffff890b`2e57f2c0 fffff804`08e31f8b     : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
ffff890b`2e57f3b0 fffff804`08e2b5c1     : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff890b`2e57f3e0 00007ff7`f117862b     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000002e`ac5dfd30 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b


SYMBOL_NAME:  kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME:  kbdclass.sys

IMAGE_VERSION:  10.0.23435.1000

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  92

FAILURE_BUCKET_ID:  AV_kbdclass!memcpy

OS_VERSION:  10.0.22621.1

BUILDLAB_STR:  ni_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup:     MachineOwner
---------

0: kd> lmvm kbdclass
Browse full module list
start             end                 module name
fffff804`4f2a0000 fffff804`4f2b5000   kbdclass # (pdb symbols)          C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb
    Loaded symbol image file: kbdclass.sys
    Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys
    Image path: \SystemRoot\System32\drivers\kbdclass.sys
    Image name: kbdclass.sys
    Browse all global symbols  functions  data
    Image was built with /Brepro flag.
    Timestamp:        3D8A7081 (This is a reproducible build file hash, not a timestamp)
    CheckSum:         0001CDCA
    ImageSize:        00015000
    File version:     10.0.23435.1000
    Product version:  10.0.23435.1000
    File flags:       0 (Mask 3F)
    File OS:          40004 NT Win32
    File type:        3.7 Driver
    File date:        00000000.00000000
    Translations:     0409.04b0
    Information from resource tables:
        CompanyName:      Microsoft Corporation
        ProductName:      Microsoft® Windows® Operating System
        InternalName:     kbdclass.sys
        OriginalFilename: kbdclass.sys
        ProductVersion:   10.0.23435.1000
        FileVersion:      10.0.23435.1000 (WinBuild.160101.0800)
        FileDescription:  Keyboard Class Driver
        LegalCopyright:   © Microsoft Corporation. All rights reserved.
 
Çözüm
@TheEasTurco öncelikle bilmediğimiz konularda yanlış yönlendirme yapmayalım. Ekran kartı ile alakalı bir sorun yok.

@onlyhelly Sorununuz asıl kaynağı " kbdclass.sys " dosyasıdır. Bu SYS dosyası da Monster Control Center uygulaması ile özelleştirdiğiniz klavyenize bağlı bir SYS dosyasıdır. Kısaca Monster Control Center uygulamasını silerseniz sorunun çözüleceğini görebilirsiniz silmek istemiyorum diyorsanız şu çözüm yolunu deneyin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318} klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc30bb5582f4c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8044f2a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2156

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 4321

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 389

 Key : Analysis.Init.Elapsed.mSec
 Value: 1985

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 88

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1

 Key : Bugcheck.Code.Register
 Value: 0xa

 Key : WER.OS.Branch
 Value: ni_release

 Key : WER.OS.Timestamp
 Value: 2022-05-06T12:50:00Z

 Key : WER.OS.Version
 Value: 10.0.22621.1

FILE_IN_CAB: 042623-17812-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffc30bb5582f4c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8044f2a32d2

READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc30bb5582f4c

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: VALORANT-Win64-Shipping.exe

DPC_STACK_BASE: FFFFF8040D49DFB0

TRAP_FRAME: fffff8040d49d470 -- (.trap 0xfffff8040d49d470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400
rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680
 r8=00000000000000c0 r9=0000000000000038 r10=ffffc3039af31000
r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`4f2a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff804`0d49d328 fffff804`08e3e9a9 : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`0d49d330 fffff804`08e3a034 : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69
fffff804`0d49d470 fffff804`4f2a32d2 : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474
fffff804`0d49d608 fffff804`4f2a5b5d : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92
fffff804`0d49d610 fffff804`4f291511 : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`0d49d6b0 ffffc303`97159510 : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`0d49d6b8 fffff804`0d49d7d8 : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510
fffff804`0d49d6c0 ffffc303`a7fd1310 : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8
fffff804`0d49d6c8 fffff804`0d49d7d8 : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310
fffff804`0d49d6d0 00000000`00000008 : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8
fffff804`0d49d6d8 fffff804`0d49d730 : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8
fffff804`0d49d6e0 ffffc303`971593c0 : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730
fffff804`0d49d6e8 fffff804`4f2913f0 : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0
fffff804`0d49d6f0 fffff804`04b73180 : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0
fffff804`0d49d6f8 fffff804`4f26b848 : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180
fffff804`0d49d700 fffff804`08c2a1da : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`0d49d7d0 fffff804`08c299e4 : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff804`0d49dd20 fffff804`08e32815 : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4
fffff804`0d49dfb0 fffff804`08e327bf : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff890b`2e57f2b0 fffff804`08c2c0c9 : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn
ffff890b`2e57f2c0 fffff804`08e31f8b : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
ffff890b`2e57f3b0 fffff804`08e2b5c1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff890b`2e57f3e0 00007ff7`f117862b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000002e`ac5dfd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.23435.1000

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 92

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner
---------

0: kd> lmvm kbdclass
Browse full module list
start end module name
fffff804`4f2a0000 fffff804`4f2b5000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb
 Loaded symbol image file: kbdclass.sys
 Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys
 Image path: \SystemRoot\System32\drivers\kbdclass.sys
 Image name: kbdclass.sys
 Browse all global symbols functions data
 Image was built with /Brepro flag.
 Timestamp: 3D8A7081 (This is a reproducible build file hash, not a timestamp)
 CheckSum: 0001CDCA
 ImageSize: 00015000
 File version: 10.0.23435.1000
 Product version: 10.0.23435.1000
 File flags: 0 (Mask 3F)
 File OS: 40004 NT Win32
 File type: 3.7 Driver
 File date: 00000000.00000000
 Translations: 0409.04b0
 Information from resource tables:
 CompanyName: Microsoft Corporation
 ProductName: Microsoft® Windows® Operating System
 InternalName: kbdclass.sys
 OriginalFilename: kbdclass.sys
 ProductVersion: 10.0.23435.1000
 FileVersion: 10.0.23435.1000 (WinBuild.160101.0800)
 FileDescription: Keyboard Class Driver
 LegalCopyright: © Microsoft Corporation. All rights reserved.

Merhaba çözüm yönteminiz için sağ olun ama söylediğiniz dosyaları bulamıyorum nerede olması gerek
 
Merhaba çözüm yönteminiz için sağ olun ama söylediğiniz dosyaları bulamıyorum nerede olması gerek

Yazmayı unutmuşum :) Windows tuşu+R komutu çalıştır penceresinden Regedit yazın ve Tamam'a tıklayın. Önünüze gelecek.
 
@TheEasTurco öncelikle bilmediğimiz konularda yanlış yönlendirme yapmayalım. Ekran kartı ile alakalı bir sorun yok.

@onlyhelly Sorununuz asıl kaynağı " kbdclass.sys " dosyasıdır. Bu SYS dosyası da Monster Control Center uygulaması ile özelleştirdiğiniz klavyenize bağlı bir SYS dosyasıdır. Kısaca Monster Control Center uygulamasını silerseniz sorunun çözüleceğini görebilirsiniz silmek istemiyorum diyorsanız şu çözüm yolunu deneyin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96b-e325-11ce-bfc1-08002be10318} klasöründe UpperFilters anahtarını sadece kbdclass olacak şekilde değiştirin.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e96f-e325-11ce-bfc1-08002be10318} klasöründe ise UpperFilters anahtarını sadece mouclass olacak şekilde değiştirin.

Daha sonra sistemi yeniden başlatın. Kısa bir açıklama, ilk değişiklik kısayolları yöneten filtre sürücüsünü klavye sürücüsünden kaldırıyor. İkincisi ise fare sürücüsünden kaldırıyor.

Kod:
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffc30bb5582f4c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8044f2a32d2, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for HKKbdFltr.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 2156

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 4321

 Key : Analysis.IO.Other.Mb
 Value: 0

 Key : Analysis.IO.Read.Mb
 Value: 0

 Key : Analysis.IO.Write.Mb
 Value: 0

 Key : Analysis.Init.CPU.mSec
 Value: 389

 Key : Analysis.Init.Elapsed.mSec
 Value: 1985

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 88

 Key : Bugcheck.Code.DumpHeader
 Value: 0xd1

 Key : Bugcheck.Code.Register
 Value: 0xa

 Key : WER.OS.Branch
 Value: ni_release

 Key : WER.OS.Timestamp
 Value: 2022-05-06T12:50:00Z

 Key : WER.OS.Version
 Value: 10.0.22621.1

FILE_IN_CAB: 042623-17812-01.dmp

TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b

BUGCHECK_CODE: d1

BUGCHECK_P1: ffffc30bb5582f4c

BUGCHECK_P2: 2

BUGCHECK_P3: 0

BUGCHECK_P4: fffff8044f2a32d2

READ_ADDRESS: fffff8040971c468: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 ffffc30bb5582f4c

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: VALORANT-Win64-Shipping.exe

DPC_STACK_BASE: FFFFF8040D49DFB0

TRAP_FRAME: fffff8040d49d470 -- (.trap 0xfffff8040d49d470)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc303b1944400 rbx=0000000000000000 rcx=ffffc303b1944400
rdx=0000000803c3eb4c rsi=0000000000000000 rdi=0000000000000000
rip=fffff8044f2a32d2 rsp=fffff8040d49d608 rbp=fffff8040d49d680
 r8=00000000000000c0 r9=0000000000000038 r10=ffffc3039af31000
r11=ffffc30bb558300c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
kbdclass!memcpy+0x92:
fffff804`4f2a32d2 0f100411 movups xmm0,xmmword ptr [rcx+rdx] ds:ffffc30b`b5582f4c=????????????????????????????????
Resetting default scope

STACK_TEXT:
fffff804`0d49d328 fffff804`08e3e9a9 : 00000000`0000000a ffffc30b`b5582f4c 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff804`0d49d330 fffff804`08e3a034 : ffffc303`9af37180 fffff804`0da12ed2 00000000`00000000 ffffc303`9af37030 : nt!KiBugCheckDispatch+0x69
fffff804`0d49d470 fffff804`4f2a32d2 : fffff804`4f2a5b5d 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 : nt!KiPageFault+0x474
fffff804`0d49d608 fffff804`4f2a5b5d : 00000000`ecd9bf94 fffff804`0d49d680 ffffc303`ad57c920 fffff804`4f262d5c : kbdclass!memcpy+0x92
fffff804`0d49d610 fffff804`4f291511 : ffffc303`97159510 fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 : kbdclass!KeyboardClassServiceCallback+0x16d
fffff804`0d49d6b0 ffffc303`97159510 : fffff804`0d49d7d8 ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 : HKKbdFltr+0x1511
fffff804`0d49d6b8 fffff804`0d49d7d8 : ffffc303`a7fd1310 fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 : 0xffffc303`97159510
fffff804`0d49d6c0 ffffc303`a7fd1310 : fffff804`0d49d7d8 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 : 0xfffff804`0d49d7d8
fffff804`0d49d6c8 fffff804`0d49d7d8 : 00000000`00000008 fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 : 0xffffc303`a7fd1310
fffff804`0d49d6d0 00000000`00000008 : fffff804`0d49d730 ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 : 0xfffff804`0d49d7d8
fffff804`0d49d6d8 fffff804`0d49d730 : ffffc303`971593c0 fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 : 0x8
fffff804`0d49d6e0 ffffc303`971593c0 : fffff804`4f2913f0 fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 : 0xfffff804`0d49d730
fffff804`0d49d6e8 fffff804`4f2913f0 : fffff804`04b73180 fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 : 0xffffc303`971593c0
fffff804`0d49d6f0 fffff804`04b73180 : fffff804`4f26b848 ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 : HKKbdFltr+0x13f0
fffff804`0d49d6f8 fffff804`4f26b848 : ffffc303`97159510 fffff804`0d49d769 ffffc303`a79c3040 fffff804`4f270258 : 0xfffff804`04b73180
fffff804`0d49d700 fffff804`08c2a1da : 00000000`00000000 ffffc303`00000010 00000000`00000000 ffffa081`6bd40970 : i8042prt!I8042KeyboardIsrDpc+0x1a8
fffff804`0d49d7d0 fffff804`08c299e4 : 00000000`00000022 ffffc303`a3263080 fffff804`00b1a53f 00000000`00000010 : nt!KiExecuteAllDpcs+0x54a
fffff804`0d49dd20 fffff804`08e32815 : 00000000`00000000 00000000`00000000 ffffc303`a6b3a080 000001a2`ec58bd00 : nt!KiRetireDpcList+0xfe4
fffff804`0d49dfb0 fffff804`08e327bf : ffff890b`2e57f349 fffff804`08c2c0c9 00000000`00000000 ffffc303`b0eeb460 : nt!KxSwapStacksAndRetireDpcList+0x5
ffff890b`2e57f2b0 fffff804`08c2c0c9 : 00000000`00000000 ffffc303`b0eeb460 00000000`00040246 fffff804`08c3237b : nt!KiPlatformSwapStacksAndCallReturn
ffff890b`2e57f2c0 fffff804`08e31f8b : 00000000`00000000 00000000`00000006 00000000`00000000 00000000`00000000 : nt!KiDispatchInterrupt+0xd9
ffff890b`2e57f3b0 fffff804`08e2b5c1 : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDpcInterruptBypass+0x1b
ffff890b`2e57f3e0 00007ff7`f117862b : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch+0xb1
0000002e`ac5dfd30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff7`f117862b

SYMBOL_NAME: kbdclass!memcpy+92

MODULE_NAME: kbdclass

IMAGE_NAME: kbdclass.sys

IMAGE_VERSION: 10.0.23435.1000

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 92

FAILURE_BUCKET_ID: AV_kbdclass!memcpy

OS_VERSION: 10.0.22621.1

BUILDLAB_STR: ni_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {dfec7698-3775-c204-13ee-4d0f5bb2791c}

Followup: MachineOwner
---------

0: kd> lmvm kbdclass
Browse full module list
start end module name
fffff804`4f2a0000 fffff804`4f2b5000 kbdclass # (pdb symbols) C:\ProgramData\Dbg\sym\kbdclass.pdb\CAA611E8B1A0CE9D2CE034F62161033A1\kbdclass.pdb
 Loaded symbol image file: kbdclass.sys
 Mapped memory image file: C:\ProgramData\Dbg\sym\kbdclass.sys\3D8A708115000\kbdclass.sys
 Image path: \SystemRoot\System32\drivers\kbdclass.sys
 Image name: kbdclass.sys
 Browse all global symbols functions data
 Image was built with /Brepro flag.
 Timestamp: 3D8A7081 (This is a reproducible build file hash, not a timestamp)
 CheckSum: 0001CDCA
 ImageSize: 00015000
 File version: 10.0.23435.1000
 Product version: 10.0.23435.1000
 File flags: 0 (Mask 3F)
 File OS: 40004 NT Win32
 File type: 3.7 Driver
 File date: 00000000.00000000
 Translations: 0409.04b0
 Information from resource tables:
 CompanyName: Microsoft Corporation
 ProductName: Microsoft® Windows® Operating System
 InternalName: kbdclass.sys
 OriginalFilename: kbdclass.sys
 ProductVersion: 10.0.23435.1000
 FileVersion: 10.0.23435.1000 (WinBuild.160101.0800)
 FileDescription: Keyboard Class Driver
 LegalCopyright: © Microsoft Corporation. All rights reserved.

Çok sağ olun sorunum neredeyse 1 yıl sonunda çözüldü.
 

Yeni konular

Geri
Yukarı