Hello and welcome :)!
The bugchecks are all the same pretty much in blaming an OEM Lenovo driver.
Code:
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a012d4e000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800033909f3, If non-zero, the instruction address which referenced
the bad address.
Arg4: 0000000000000000, (reserved)
Probably caused by : fbfmon.sys ( fbfmon+330f )
Two Lenovo drivers, please remove or update.
Code:
lmvm fbfmon
start end module name
fffff880`01be6000 fffff880`01bfa000 fbfmon T (no symbols)
Loaded symbol image file: fbfmon.sys
Image path: \SystemRoot\system32\drivers\fbfmon.sys
Image name: fbfmon.sys
Timestamp: Thu Jan 27 17:35:42 2011
Code:
lmvm DamageGuardX64
Browse full module list
start end module name
fffff880`013b5000 fffff880`013ec000 DamageGuardX64 T (no symbols)
Loaded symbol image file: DamageGuardX64.sys
Image path: \SystemRoot\system32\DRIVERS\DamageGuardX64.sys
Image name: DamageGuardX64.sys
Browse all global symbols functions data
Timestamp: Thu Feb 09 07:36:21 2012
We see that McAfee is also active in the stack interacting with fltmgr.
Code:
0xfffff8800acc0268 : 0xfffff800033784e2 : nt!CcMapData+0xd2
0xfffff8800acc02e8 : 0xfffff8800164285c : Ntfs!NtfsExtendedCompleteRequestInternal+0x11c
0xfffff8800acc0328 : 0xfffff880016f3383 : Ntfs!NtfsReadUsnJournal+0xb52
0xfffff8800acc0368 : 0xfffff80003077cae : nt!KiPageFault+0x16e
0xfffff8800acc0370 : 0x0000000000000000 : Trap @ fffff8800acc0370
0xfffff8800acc0498 : 0xfffff880016f15cf : Ntfs!NtOfsPostNewLength+0x16b
0xfffff8800acc04d8 : 0xfffff800033909f3 : nt!FsRtlNotifyFilterReportChange+0x3c7
0xfffff8800acc0528 : 0xfffff880016df4ef : Ntfs!NtfsCommitCurrentTransaction+0x9f
0xfffff8800acc05a8 : 0xfffff880016ab5e1 : Ntfs!NtfsRenameLcb+0xed
0xfffff8800acc05e8 : 0xfffff880016ab0f0 : Ntfs!NtfsRenameLinkInDir+0xd4
0xfffff8800acc0628 : 0xfffff8800164aad9 : Ntfs!NtfsReportDirNotify+0xe5
0xfffff8800acc06f8 : 0xfffff880016a98e9 : Ntfs!NtfsSetRenameInfo+0xb59
0xfffff8800acc0968 : 0xfffff8800acc0980 : !du "tempFile"
0xfffff8800acc0980 : 0x0070006d00650074 : !du "tempFile"
0xfffff8800acc09e8 : 0xfffff80003091891 : nt!FsRtlCheckOplockEx+0x5b1
0xfffff8800acc09f8 : 0xfffff800031ade80 : nt!ExAllocatePoolWithTag+0x270
Unable to load image \SystemRoot\system32\DRIVERS\DamageGuardX64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for DamageGuardX64.sys
*** ERROR: Module load completed but symbols could not be loaded for DamageGuardX64.sys
Unable to load image \SystemRoot\system32\drivers\mfehidk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mfehidk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfehidk.sys
Unable to load image \SystemRoot\system32\drivers\mfeavfk.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mfeavfk.sys
*** ERROR: Module load completed but symbols could not be loaded for mfeavfk.sys
0xfffff8800acc0ae8 : 0xfffff880016cd985 : Ntfs!NtfsCommonSetInformation+0x7d5
0xfffff8800acc0b88 : 0xfffff8800164227e : Ntfs!NtfsInitializeTopLevelIrp+0x3e
0xfffff8800acc0bc8 : 0xfffff8800163ff84 : Ntfs!NtfsFsdSetInformation+0x11c
0xfffff8800acc0c48 : 0xfffff8800142cbcf : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
0xfffff8800acc0c78 : 0xfffff800032ec800 : nt!IopOpenLinkOrRenameTarget+0x140
0xfffff8800acc0cd8 : 0xfffff8800142b6df : fltmgr!FltpDispatch+0xcf
*** WARNING: Unable to verify timestamp for fbfmon.sys
*** ERROR: Module load completed but symbols could not be loaded for fbfmon.sys
0xfffff8800acc0dd8 : 0xfffff80003359703 : nt!NtSetInformationFile+0x91f
0xfffff8800acc0ef8 : 0xfffff80003078e13 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800acc0f68 : 0xfffff80003078e13 : nt!KiSystemServiceCopyEnd+0x13
0xfffff8800acc0f70 : 0xfffffa800f1a2060 : Trap @ fffff8800acc0f70
Code:
lmvm mfehidk
Browse full module list
start end module name
fffff880`0148a000 fffff880`01543700 mfehidk T (no symbols)
Loaded symbol image file: mfehidk.sys
Image path: \SystemRoot\system32\drivers\mfehidk.sys
Image name: mfehidk.sys
Browse all global symbols functions data
Timestamp: Wed Nov 07 00:47:12 2012
Code:
lmvm mfeavfk
Browse full module list
start end module name
fffff880`0639d000 fffff880`063e6600 mfeavfk T (no symbols)
Loaded symbol image file: mfeavfk.sys
Image path: \SystemRoot\system32\drivers\mfeavfk.sys
Image name: mfeavfk.sys
Browse all global symbols functions data
Timestamp: Wed Nov 07 00:48:17 2012
Code:
lmvm mfefirek
Browse full module list
start end module name
fffff880`0685d000 fffff880`068d8680 mfefirek (deferred)
Image path: \SystemRoot\system32\drivers\mfefirek.sys
Image name: mfefirek.sys
Browse all global symbols functions data
Timestamp: Wed Nov 07 00:50:08 2012
Please remove McAfee.
I suggest using Microsoft Security Essentials as a reliable alternative.
Here from a number of different 0xD1, the Dell wireless needs an update as well.
Code:
lmvm bcmwl664
Browse full module list
start end module name
fffff880`05a87000 fffff880`05f11000 bcmwl664 (deferred)
Image path: \SystemRoot\system32\DRIVERS\bcmwl664.sys
Image name: bcmwl664.sys
Browse all global symbols functions data
Timestamp: Thu Oct 27 05:45:09 2011
Post back with the results :).