다음을 통해 공유

컴퓨터 프리징 현상 이후 블루스크린

익명
2023-10-08T07:18:22+00:00

블루스크린 문의드립니다

컴퓨터 부팅 이후 사용 중 프리징 현상이 발생합니다. 이후 시간 제약 없이 계속된 프리징 현상이 발생하거나 블루스크린이 발생합니다.
프리징 지속시간은 무작위입니다. 짧게는 3분, 길게는 50분 이상 지속 되기도 합니다.

블루스크린 중지코드 : dpc_watchdog_violation.

이벤트 이슈 : 위험단계의 목록입니다.
정말 무작위하게 프리징이 발생합니다. 첫 번째와 다섯 번째 로그는 프리징현상 이후 10분 이내에 블루스크린이 발생해서 기록이 있지만 이외 로그들은 프리징현상이 30분을 넘겨 강제부팅하여 기록이 남아있지 않습니다.

아래에 몇 가지 참고사항을 첨부해드립니다.

개인적인 생각으로 드라이버간의 충돌일 것 같은데 정확한 원인이 무엇인지 모르겠네요.

원인이 무엇인지, 해결방법을 알려주시면 대단히 감사하겠습니다.

-*참고1 : 가장 최근 이벤트의 XML

  • <Event xmlns="**http://schemas.microsoft.com/win/2004/08/events/event**">
  • <System> <Provider Name="Microsoft-Windows-Kernel-Power" Guid="{331c3b3a-2005-44c2-ac5e-77220c37d6b4}" /><EventID>41</EventID><Version>8</Version><Level>1</Level><Task>63</Task><Opcode>0</Opcode><Keywords>0x8000400000000002</Keywords><TimeCreated SystemTime="2023-10-08T06:34:02.7423295Z" /><EventRecordID>1992</EventRecordID><Correlation /><Execution ProcessID="4" ThreadID="8" /><Channel>System</Channel><Computer>DESKTOP-VBRJHNB</Computer><Security UserID="S-1-5-18" /></System>
  • <EventData> <Data Name="BugcheckCode">307</Data><Data Name="BugcheckParameter1">0x1</Data><Data Name="BugcheckParameter2">0x1e00</Data><Data Name="BugcheckParameter3">0xfffff8040eafb320</Data><Data Name="BugcheckParameter4">0x0</Data><Data Name="SleepInProgress">0</Data><Data Name="PowerButtonTimestamp">0</Data><Data Name="BootAppStatus">0</Data><Data Name="Checkpoint">0</Data><Data Name="ConnectedStandbyInProgress">false</Data><Data Name="SystemSleepTransitionsToOn">0</Data><Data Name="CsEntryScenarioInstanceId">0</Data><Data Name="BugcheckInfoFromEFI">false</Data><Data Name="CheckpointStatus">0</Data><Data Name="CsEntryScenarioInstanceIdV2">0</Data><Data Name="LongPowerButtonPressDetected">false</Data></EventData> </Event>

-*참고2 : 미니 덤프파일

--**가장 최근에 일어난 블루스크린에 대한 미니덤프파일 내용

************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : false AllowNugetExeUpdate : false AllowNugetMSCredentialProviderInstall : false AllowParallelInitializationOfLocalRepositories : true

-- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\100823-7796-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff8040de00000 PsLoadedModuleList = 0xfffff8040ea2a220 Debug session time: Sun Oct 8 15:33:01.436 2023 (UTC + 9:00) System Uptime: 0 days 0:12:24.281 Loading Kernel Symbols ............................................................... ................................................................ ..................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 000000000033c018). Type ".hh dbgerr001" for details Loading unloaded module list ............ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff8040e1fcd70 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff804`12cb7c90=0000000000000133 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************

DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. Arg2: 0000000000001e00, The watchdog period (in ticks). Arg3: fffff8040eafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000

Debugging Details:

************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** *************************************************************************

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 3296

Key  : Analysis.Elapsed.mSec
Value: 4694

Key  : Analysis.IO.Other.Mb
Value: 0

Key  : Analysis.IO.Read.Mb
Value: 0

Key  : Analysis.IO.Write.Mb
Value: 0

Key  : Analysis.Init.CPU.mSec
Value: 421

Key  : Analysis.Init.Elapsed.mSec
Value: 4287

Key  : Analysis.Memory.CommitPeak.Mb
Value: 93

Key  : Bugcheck.Code.LegacyAPI
Value: 0x133

Key  : Failure.Bucket
Value: 0x133\_ISR\_nt!KeAccumulateTicks

Key  : Failure.Hash
Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Key  : WER.OS.Branch
Value: vb\_release

Key  : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8040eafb320

BUGCHECK_P4: 0

FILE_IN_CAB: 100823-7796-01.dmp

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: fffffc8dc717ef90 -- (.trap 0xfffffc8dc717ef90) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=ffffc50599ae4340 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8040e084810 rsp=fffffc8dc717f120 rbp=0000000000000003 r8=0000000000000000 r9=00000000000000e1 r10=fffff8040e137090 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc nt!KiIpiSendRequestEx+0xb0: fffff8040e084810 8b87802d0000 mov eax,dword ptr [rdi+2D80h] ds:0000000000002d80=???????? Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: 537.42-desktop-win10-win11-64bit-international-dch-whql.exe

STACK_TEXT:
fffff80412cb7c88 fffff8040e230f64 : 0000000000000133 0000000000000001 0000000000001e00 fffff8040eafb320 : nt!KeBugCheckEx fffff80412cb7c90 fffff8040e048dbd : 0000020fcc75ccdd fffff8040a7c3180 0000000000000246 000000000000ba12 : nt!KeAccumulateTicks+0x1eb3c4 fffff80412cb7cf0 fffff8040e03fe41 : 0000000000009c00 0000000000006ee8 fffff8040a7c3180 0000000000000001 : nt!KiUpdateRunTime+0x5d fffff80412cb7d40 fffff8040e0431d3 : fffff8040a7c3180 0000000000000000 fffff8040ea31630 0000000000000000 : nt!KiUpdateTime+0x4a1 fffff80412cb7e80 fffff8040e04aa62 : fffffc8dc717ef90 fffffc8dc717f010 fffffc8dc717f000 000000000000000c : nt!KeClockInterruptNotify+0x2e3 fffff80412cb7f30 fffff8040e0a7765 : 00000001bbb76be7 fffff8040eaf3a20 fffff8040eaf3ad0 0000000000000000 : nt!HalpTimerClockInterrupt+0xe2 fffff80412cb7f60 fffff8040e1fed0a : fffffc8dc717f010 fffff8040eaf3a20 0000000000000001 000000000a2453e3 : nt!KiCallInterruptServiceRoutine+0xa5 fffff80412cb7fb0 fffff8040e1ff4d7 : 00000000b4240c26 fffff8040a7c6088 fffffc8dc717f0c1 0000000000000003 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffffc8dc717ef90 fffff8040e084810 : c505997200000000 0000000000000001 0000000000000001 0a000002a5277867 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffffc8dc717f120 fffff8040e0cdcac : 0000000000000000 0000000000000002 0000000000000000 ffff958007ef76a2 : nt!KiIpiSendRequestEx+0xb0 fffffc8dc717f160 fffff8040e0cd9eb : 0000000000000004 0000000000000000 fffffc8dc717f5a0 0000000000000002 : nt!KxFlushEntireTb+0x1bc fffffc8dc717f1b0 fffff8040e0cd7ea : 0000000000000000 0000000000000000 0000000000000000 ffffc50599ae4300 : nt!KeFlushTb+0x7b fffffc8dc717f210 fffff8040e0b79f5 : 0000000000000000 0000000000000000 ffff95800667c800 ffff95800667c800 : nt!MiFlushEntireTbDueToAttributeChange+0x3a fffffc8dc717f300 fffff8040e036d25 : 8a0000022298086b 0000000000000001 ffff95800667c822 0000000000000000 : nt!MiChangePageAttributeBatch+0x91 fffffc8dc717f370 fffff8040e033aa8 : fffffc8dc717f730 0000000000000000 0000000000000001 fffffb7d00000001 : nt!MiGetPageChain+0xd75 fffffc8dc717f5b0 fffff8040e024610 : fffffc8dc717f730 ffffc50599ae49c0 fffffb0000000000 0000000000000000 : nt!MiResolvePrivateZeroFault+0x6e8 fffffc8dc717f6e0 fffff8040e03121d : fffffc8dc717f920 fffffc8dc717f860 fffffc8dc717f868 fffffc8dc717f878 : nt!MiZeroFault+0x380 fffffc8dc717f7d0 fffff8040e03049a : 00000000033bfa01 0000000000000000 0000000000000000 0000000000000000 : nt!MiUserFault+0x80d fffffc8dc717f860 fffff8040e20c8d8 : 00000000144053e3 ffffc505998e1080 0000000000000000 ffffc50500000000 : nt!MmAccessFault+0x16a fffffc8dc717fa00 0000000000459296 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiPageFault+0x358 00000000033bfa1c 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x459296

SYMBOL_NAME: nt!KeAccumulateTicks+1eb3c4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.3448

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1eb3c4

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner

--**처음 발생한 블루스크린의 미니덤프파일 내용

************* Preparing the environment for Debugger Extensions Gallery repositories ************** ExtensionRepository : Implicit UseExperimentalFeatureForNugetShare : false AllowNugetExeUpdate : false AllowNugetMSCredentialProviderInstall : false AllowParallelInitializationOfLocalRepositories : true

-- Configuring repositories ----> Repository : LocalInstalled, Enabled: true ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds ----> Repository : UserExtensions, Enabled: true, Packages count: 0 ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64 Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\100823-8890-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available

************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (6 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Kernel base = 0xfffff8021d000000 PsLoadedModuleList = 0xfffff8021dc2a220 Debug session time: Sun Oct 8 05:25:14.701 2023 (UTC + 9:00) System Uptime: 0 days 1:19:57.547 Loading Kernel Symbols ............................................................... ................................................................ ...................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 000000342fd67018). Type ".hh dbgerr001" for details Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff8021d3fcd70 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb680`7afdae20=0000000000000133 1: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * *******************************************************************************

DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. Arg2: 0000000000001e00, The watchdog period (in ticks). Arg3: fffff8021dcfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000

Debugging Details:

************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** *************************************************************************

KEY_VALUES_STRING: 1

Key  : Analysis.CPU.mSec
Value: 3093

Key  : Analysis.Elapsed.mSec
Value: 4442

Key  : Analysis.IO.Other.Mb
Value: 0

Key  : Analysis.IO.Read.Mb
Value: 0

Key  : Analysis.IO.Write.Mb
Value: 0

Key  : Analysis.Init.CPU.mSec
Value: 437

Key  : Analysis.Init.Elapsed.mSec
Value: 2064

Key  : Analysis.Memory.CommitPeak.Mb
Value: 93

Key  : Bugcheck.Code.LegacyAPI
Value: 0x133

Key  : Failure.Bucket
Value: 0x133\_ISR\_nt!KeAccumulateTicks

Key  : Failure.Hash
Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Key  : WER.OS.Branch
Value: vb\_release

Key  : WER.OS.Version
Value: 10.0.19041.1

BUGCHECK_CODE: 133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8021dcfb320

BUGCHECK_P4: 0

FILE_IN_CAB: 100823-8890-01.dmp

DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME: ffff8a86607dee50 -- (.trap 0xffff8a86607dee50) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=cf98da8cdb2f0000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8021d2cdeb1 rsp=ffff8a86607defe0 rbp=ffffffffffffffff r8=0000000000000000 r9=00000000000000e1 r10=fffff8021d4d1430 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!KeFlushProcessWriteBuffers+0xb5: fffff8021d2cdeb1 ebf2 jmp nt!KeFlushProcessWriteBuffers+0xa9 (fffff8021d2cdea5) Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: dialer.exe

STACK_TEXT:
ffffb6807afdae18 fffff8021d430f64 : 0000000000000133 0000000000000001 0000000000001e00 fffff8021dcfb320 : nt!KeBugCheckEx ffffb6807afdae20 fffff8021d243343 : 00000d23e0492674 ffffb6807af88180 0000000000000000 ffffb6807af88180 : nt!KeAccumulateTicks+0x1eb3c4 ffffb6807afdae80 fffff8021d242e2a : ffff8e074a4a7480 ffff8a86607deed0 0000000000000000 0000000000000050 : nt!KeClockInterruptNotify+0x453 ffffb6807afdaf30 fffff8021d2a7765 : ffff8e074a4a7480 fffff8021d34ea57 0000000000000000 0000000000000000 : nt!HalpTimerClockIpiRoutine+0x1a ffffb6807afdaf60 fffff8021d3fed0a : ffff8a86607deed0 ffff8e074a4a7480 0000000000000001 0000000000000000 : nt!KiCallInterruptServiceRoutine+0xa5 ffffb6807afdafb0 fffff8021d3ff4d7 : 0000000000000000 fffff8021dd2f1a0 fffff8021a6df0b8 fffff8021d2ce34a : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa ffff8a86607dee50 fffff8021d2cdeb1 : ffff8a86607df028 ffff8a86607df020 0000000000000000 0000000000000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37 ffff8a86607defe0 fffff8021d6025b3 : 0000000000000000 ffff8a86607dfa80 0000000000000001 0000000000000001 : nt!KeFlushProcessWriteBuffers+0xb5 ffff8a86607df020 fffff8021d5f9067 : 0000000000000001 0000000000010000 0000000000000000 0000000000000000 : nt!ExpGetProcessInformation+0x183 ffff8a86607df680 fffff8021d5f8217 : ffff8e075ae4d080 fffff8021d6b1dbf 0000000000000000 0000000000000000 : nt!ExpQuerySystemInformation+0xd07 ffff8a86607df9c0 fffff8021d4105f5 : 0000000000000000 ffff8e0759a10080 fffffffffff0bdc0 ffff8e0759dad080 : nt!NtQuerySystemInformation+0x37 ffff8a86607dfa00 00007fff606ed514 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x25 000000343027fa48 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007fff`606ed514

SYMBOL_NAME: nt!KeAccumulateTicks+1eb3c4

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.3448

STACK_COMMAND: .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET: 1eb3c4

FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup: MachineOwner

---*** 위 두 가지 미니덤프파일 기록에 대한 압축링크입니다.

100823-7796-01.zip
100823-8890-01.zip

원인 분석 및 해결방법을 제시해주시기 바랍니다. 부탁드립니다.

가정용 Windows | Windows 10 | 디바이스 및 드라이버

잠긴 질문. 이 질문은 Microsoft 지원 커뮤니티에서 마이그레이션되었습니다. 질문이 도움이 되었는지 여부에 대해 응답할 수는 있지만, 메모나 회신을 추가하거나 질문을 따를 수는 없습니다.

댓글 0개 설명 없음

답변 1개

정렬 기준: 가장 유용함
  1. 익명
    2023-10-08T07:49:10+00:00

    추가로 거의 모든 검사는 진행했습니다.

    -dism /online /cleanup-image /restorehealth : 이상없음
    -sfc /scannow : 이상없음
    -chkdsk c/ f/ r/ x/ : 이상없음
    윈도우, 그래픽카드, hd오디오, ide ata/atapi 컨트롤러, 네트워크 어뎁터, 설치된 모든 디스크 드라이버 업데이트: 모두 최신상태

    위 질문 내용의 프리징과 블루스크린이 발생한 시기는 듀얼 모니터 구성을 위해 gtx 1060 3g 그래픽카드와 더불어 인텔 내장그래픽을 사용한 후 발생했습니다.
    이후 외장그래픽카드 하드웨어의 결함, 불량을 의심하여 gtx 1080 8g 모델로 변경하였는데 더 빈번히 블루스크린과 프리징현상이 나타났습니다.
    이후 ddu를 사용해 드라이버를 제거하고 인터넷 연결없이 수동을 nvidia 그래픽카드 드라이버만 설치하였습니다.
    bios에서는 igp 멀티 그래픽 사용안함으로 설정하였습니다. 하지만 문제는 계속 발생 했습니다.
    이후 윈도우 재 설치를 하였는데 8시간 정도 문제 없이 정상 작동하다가 또 프리징현상 및 블루스크린이 발생하였습니다.
    해당 이슈는 정말 무작위입니다. 컴퓨터 파일을 실행하는 중, 업데이트를 진행하던 중, youtube 영상을 시청하던 도중, sfc /scannow 검사를 진행하던 중, 부팅 이후 바탕화면 상태에서 아무것도 진행하지 않았던 중 등.

    인텔 내장그래픽을 사용했을 때의 cpu온도는 50~55도 / 인텔 내장그래픽을 사용하지 않았을 때의 cpu온도는 48~50도
    1060 3g 그래픽카드를 사용했을 때의 gpu온도는 39~42도 / 1080 8g 그래픽카드를 사용했을 때의 gpu온도는 58~63도
    해당온도는 모두 부팅이후 인터넷을 실행했을때 온도입니다. 더불어 youtube 영상시청 또는 문제해결을 위한 인터넷창 실행 시 온도입니다.

    문제발생 현재 컴퓨터의 상세정보
    cpu : i5-8500
    m.b: z390 extream4
    ram: kingbank tech 32g
    gpu: msi gtx 1080 twin frozr 8g
    storage: wd sn750 nvme m.2 ssd 1tb*2 / samsung 870 evo sata3 ssd 1tb / wd20purz hdd 2tb*2

    nvidia 그래픽카드 업데이트 버전 537.42
    윈도우 사양 Windows 10 Pro / 22H2 /2023-‎10-‎07 / 19045.3448 / Windows Feature Experience Pack 1000.19044.1000.0

    원인 해결에 도움이 되길바랍니다.

    댓글 0개 설명 없음