So few months ago I built a new system. Since I was a bit short on money I decided not to buy a new GPU and stick with the old one (GT 620). The built came out extremely unstable, I had a lot of different BSOD. Since every component in the system was brand new I blamed the GPU for all the crashes. I bought new a new GPU few days ago, installed it, but the system still crashes. Today I ran OCCT test on RAM and it crashed. Then I ran CPU test and within few minutes it reported for over 3k errors and then suddenly my PC BSODed. I'm looking for a help. I don't know what can be the cause for all the BSODs. I updated all drivers on my PC with Driver Easy. I update BIOS to the latest version, went to the UEFI settings enabled the XMP 2.0 profile, but the system still crashes.
I have ran out of guesses, I don't know what may cause all of the BSODs. Maybe I need to configure CPU settings in UEFI?
Most of the errors are MEMORY_MANAGMENT, PAGE_FAULT_IN_NONPAGES_AREA and IRQL_NOT_LESS_OR_EQUAL.
Here is the content of one the dump files analyzed with WinDbg:
Please, help me with the issue.
Here's is the link to the first post I opened because of the BSODs. The PC stopped crashing for few days, so I assumed that it's fixed, but then it started crashing again. The memtest didn't find any errors.




I have ran out of guesses, I don't know what may cause all of the BSODs. Maybe I need to configure CPU settings in UEFI?
Most of the errors are MEMORY_MANAGMENT, PAGE_FAULT_IN_NONPAGES_AREA and IRQL_NOT_LESS_OR_EQUAL.
Here is the content of one the dump files analyzed with WinDbg:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\022621-1268281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
Debug session time: Fri Feb 26 17:07:15.284 2021 (UTC + 4:00)
System Uptime: 0 days 0:38:29.974
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
10: kd> !analyze -v
***
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8b9aedbf8050, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8051bc611d6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-3MF977B
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18195
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8b9aedbf8050
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8051bc611d6
BUGCHECK_P4: 2
READ_ADDRESS: fffff8051c6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051c60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8051c60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8b9aedbf8050
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: firefox.exe
TRAP_FRAME: ffffe70fa8148480 -- (.trap 0xffffe70fa8148480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000062970 rbx=0000000000000000 rcx=ffff8b9aedbf8080
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051bc611d6 rsp=ffffe70fa8148610 rbp=ffffe70fa8148709
r8=0000000000000003 r9=00000000ffffffff r10=fffff8051bc48710
r11=ffffe70fa8148768 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff805
Resetting default scope
STACK_TEXT:
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
ffffe70f
0000000c
SYMBOL_NAME: Npfs+d834
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d834
FAILURE_BUCKET_ID: AV_INVALID_Npfs!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5997191b-9534-6e03-7650-35d9877524bb}
Followup: MachineOwner
---------
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\022621-1268281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805
1ba00000 PsLoadedModuleList = 0xfffff805
1c62a390Debug session time: Fri Feb 26 17:07:15.284 2021 (UTC + 4:00)
System Uptime: 0 days 0:38:29.974
Loading Kernel Symbols
...............................................................
................................................................
............................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805
1bdf5a80 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe70f
a81481e0=000000000000005010: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8b9aedbf8050, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff8051bc611d6, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4061
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-3MF977B
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18195
Key : Analysis.Memory.CommitPeak.Mb
Value: 77
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff8b9aedbf8050
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8051bc611d6
BUGCHECK_P4: 2
READ_ADDRESS: fffff8051c6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8051c60f330: Unable to get Flags value from nt!KdVersionBlock
fffff8051c60f330: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff8b9aedbf8050
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: firefox.exe
TRAP_FRAME: ffffe70fa8148480 -- (.trap 0xffffe70fa8148480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000062970 rbx=0000000000000000 rcx=ffff8b9aedbf8080
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051bc611d6 rsp=ffffe70fa8148610 rbp=ffffe70fa8148709
r8=0000000000000003 r9=00000000ffffffff r10=fffff8051bc48710
r11=ffffe70fa8148768 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfDereferenceObjectWithTag+0x26:
fffff805
1bc611d6 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff
ffffffd0=????????????????Resetting default scope
STACK_TEXT:
ffffe70f
a81481d8 fffff805
1be1ebbb : 0000000000000050 ffff8b9a
edbf8050 0000000000000002 ffffe70f
a8148480 : nt!KeBugCheckExffffe70f
a81481e0 fffff805
1bc0c960 : ffffb600e8800180 00000000
00000002 ffffe70fa8148500 00000000
00000000 : nt!MiSystemFault+0x1f43abffffe70f
a81482e0 fffff805
1be03c5e : 0000000000000000 00000000
00000000 ffffb600e88af180 00000000
00000cbe : nt!MmAccessFault+0x400ffffe70f
a8148480 fffff805
1bc611d6 : 0000000000000001 00000000
5246704e ffffe70fa81487a0 00000000
00000000 : nt!KiPageFault+0x35effffe70f
a8148610 fffff805
1bc6119e : ffff8b8af2204850 00000000
00000000 000000005246704e 00000000
00000002 : nt!ObfDereferenceObjectWithTag+0x26ffffe70f
a8148650 fffff805
1bc48e52 : ffff8b8ae59d9760 00000000
00000000 0000000000000040 fffff805
2c58dc9a : nt!HalPutDmaAdapter+0xeffffe70f
a8148680 fffff805
1bc48727 : 0000000000000001 00000000
00000002 ffff8b8af1339b50 ffff8b8a
f006c388 : nt!IopfCompleteRequest+0x712ffffe70f
a8148770 fffff805
2c58d834 : fffff80500000000 00000172
110cfb40 ffff8b8af006c270 ffff8b8a
eedac080 : nt!IofCompleteRequest+0x17ffffe70f
a81487a0 fffff805
1bc52f55 : ffff8b8ae59d9760 ffff8b8a
e59d9760 0000000000000001 ffff8b8a
f006c270 : Npfs+0xd834ffffe70f
a8148810 fffff805
1afe4906 : 0000000000000000 00000000
00000000 0000000000000000 fffff805
1afe4906 : nt!IofCallDriver+0x55ffffe70f
a8148850 fffff805
1bc52f55 : ffff8b8af006c270 00000000
00000001 ffff8b8af1339b50 fffff805
00000000 : FLTMGR!FltpDispatch+0xd6ffffe70f
a81488b0 fffff805
1bffd878 : ffff8b8af006c270 00000000
00000000 ffff8b8af006c270 00000000
00000000 : nt!IofCallDriver+0x55ffffe70f
a81488f0 fffff805
1bfe454f : ffffd68900000000 ffffe70f
a8148b80 0000000c29bff630 ffffe70f
a8148b80 : nt!IopSynchronousServiceTail+0x1a8ffffe70f
a8148990 fffff805
1be074b8 : ffff8b8aeedac080 00000000
00000000 0000000000000000 00000172
08c3c798 : nt!NtWriteFile+0x66fffffe70f
a8148a90 00007fff
4638c724 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x280000000c
29bff5b8 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007fff`4638c724SYMBOL_NAME: Npfs+d834
MODULE_NAME: Npfs
IMAGE_NAME: Npfs.SYS
IMAGE_VERSION: 10.0.19041.1030
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: d834
FAILURE_BUCKET_ID: AV_INVALID_Npfs!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5997191b-9534-6e03-7650-35d9877524bb}
Followup: MachineOwner
---------
Here's is the link to the first post I opened because of the BSODs. The PC stopped crashing for few days, so I assumed that it's fixed, but then it started crashing again. The memtest didn't find any errors.
Last edited: