A fatal system error has occurred.
Debugger entered on first try; Bugcheck callbacks have not been invoked.
A fatal system error has occurred.
nt!DbgBreakPointWithStatus:
fffff802`335cd210 cc int 3
2: kd> !analyze -v
Connected to Windows 10 18362 x64 target at (Fri Jul 24 10:44:19.257 2020 (UTC + 8:00)), ptr64 TRUE
Loading Kernel Symbols
............................
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
...................................
................................................................
................................................................
....
Loading User Symbols
..................................
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................
.
Loading unloaded module list
...........
*
Bugcheck Analysis *
*
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffb887aa9e08d8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8023560ea81, address which referenced memory
TRAP_FRAME: ffffaf092fbe5550 -- (.trap 0xffffaf092fbe5550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb887aa9aae10 rbx=0000000000000000 rcx=ffffb887aa9aae10
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8023560ea81 rsp=ffffaf092fbe56e0 rbp=ffffb887aa9e0880
r8=ffffb887a9d018c0 r9=0000000000000000 r10=ffffb887a0a25160
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ndis!NdisFreeNetBuffer+0x11:
fffff8023560ea81 8b4558 mov eax,dword ptr [rbp+58h] ss:0018:ffffb887aa9e08d8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802336ac922 to fffff802335cd210
2: kd> g KDTARGET: Refreshing KD connection
*** Fatal System Error: 0x000000d1 (0xFFFFB887AA9E08D8,0x0000000000000002,0x0000000000000000,0xFFFFF8023560EA81)
Break instruction exception - code 80000003 (first chance)
A fatal system error has occurred. Debugger entered on first try; Bugcheck callbacks have not been invoked.
A fatal system error has occurred.
nt!DbgBreakPointWithStatus: fffff802`335cd210 cc int 3 2: kd> !analyze -v Connected to Windows 10 18362 x64 target at (Fri Jul 24 10:44:19.257 2020 (UTC + 8:00)), ptr64 TRUE Loading Kernel Symbols ............................
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols.
................................... ................................................................ ................................................................ .... Loading User Symbols ..................................
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols.
.............................. . Loading unloaded module list ...........
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: ffffb887aa9e08d8, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000000, value 0 = read operation, 1 = write operation Arg4: fffff8023560ea81, address which referenced memory
Debugging Details:
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 0
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
DUMP_TYPE: 0
BUGCHECK_P1: ffffb887aa9e08d8
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8023560ea81
READ_ADDRESS: ffffb887aa9e08d8 Special pool
CURRENT_IRQL: 2
FAULTING_IP: ndis!NdisFreeNetBuffer+11 fffff802`3560ea81 8b4558 mov eax,dword ptr [rbp+58h]
CPU_COUNT: 6
CPU_MHZ: c78
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 9e
CPU_STEPPING: a
CPU_MICROCODE: 6,9e,a,0 (F,M,S,R) SIG: B4'00000000 (cache) B4'00000000 (init)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: dumpcap.exe
ANALYSIS_SESSION_HOST: CORREY
ANALYSIS_SESSION_TIME: 07-24-2020 10:45:02.0973
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
DEVICE_OBJECT: ffffb88700000000
TRAP_FRAME: ffffaf092fbe5550 -- (.trap 0xffffaf092fbe5550) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffb887aa9aae10 rbx=0000000000000000 rcx=ffffb887aa9aae10 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8023560ea81 rsp=ffffaf092fbe56e0 rbp=ffffb887aa9e0880 r8=ffffb887a9d018c0 r9=0000000000000000 r10=ffffb887a0a25160 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ndis!NdisFreeNetBuffer+0x11: fffff802
3560ea81 8b4558 mov eax,dword ptr [rbp+58h] ss:0018:ffffb887
aa9e08d8=???????? Resetting default scopeLAST_CONTROL_TRANSFER: from fffff802336ac922 to fffff802335cd210
STACK_TEXT:
ffffaf09
2fbe4c68 fffff802
336ac922 : ffffb887aa9e08d8 00000000
00000003 ffffaf092fbe4dd0 fffff802
33514b70 : nt!DbgBreakPointWithStatus ffffaf092fbe4c70 fffff802
336ac017 : 0000000000000003 ffffaf09
2fbe4dd0 fffff802335d9a60 00000000
000000d1 : nt!KiBugCheckDebugBreak+0x12 ffffaf092fbe4cd0 fffff802
335c54c7 : ffffaf092fbe5450 ffffb887
ab0e2fc0 0000000000000000 00000000
ffffffff : nt!KeBugCheck2+0x947 ffffaf092fbe53d0 fffff802
335d71e9 : 000000000000000a ffffb887
aa9e08d8 0000000000000002 00000000
00000000 : nt!KeBugCheckEx+0x107 ffffaf092fbe5410 fffff802
335d3529 : 0000000000000103 00000000
00000000 0000000000000103 00000000
00000000 : nt!KiBugCheckDispatch+0x69 ffffaf092fbe5550 fffff802
3560ea81 : ffffb887ab0e2fc0 fffff802
33d7e52b ffffb887a104a7c8 00000000
00000000 : nt!KiPageFault+0x469 ffffaf092fbe56e0 fffff802
322a479a : ffffb887ab0e2fc0 ffffb887
40000010 00000000ffffffff 00000000
00000001 : ndis!NdisFreeNetBuffer+0x11 ffffaf092fbe5710 fffff802
322a3fe3 : 0000000000000067 fffff802
322a4830 ffffb887aa024502 ffffb887
aba66c44 : npcap!NPF_FreeNBCopies+0x7a [F:\git\network\nmap\npcap\packetWin7\npf\npf\Openclos.c @ 442] ffffaf092fbe5740 fffff802
322a3fe3 : 0000000000040246 00000000
00000067 0000000000000000 ffffb887
aa024500 : npcap!NPF_ObjectPoolReturn+0x43 [F:\git\network\nmap\npcap\packetWin7\npf\npf\ObjPool.c @ 291] ffffaf092fbe5780 fffff802
322a9971 : ffffb887ab0e2fc0 00000000
00000067 0000000000000000 ffffb887
aa024500 : npcap!NPF_ObjectPoolReturn+0x43 [F:\git\network\nmap\npcap\packetWin7\npf\npf\ObjPool.c @ 291] ffffaf092fbe57c0 fffff802
335827aa : 0000000000000000 ffffb887
aa990ea0 ffffb88700000300 ffffb887
0003e800 : npcap!NPF_Read+0x3e1 [F:\git\network\nmap\npcap\packetWin7\npf\npf\Read.c @ 376] ffffaf092fbe5840 fffff802
33d680a9 : ffffb887aa990ea0 ffffb887
aa3022f0 fffff57a8096f800 81000000
278f8867 : nt!IopfCallDriver+0x56 ffffaf092fbe5880 fffff802
33621b65 : ffffb887aa990ea0 00000000
00000000 0000000000000001 ffffb887
ab97ce00 : nt!IovCallDriver+0x275 ffffaf092fbe58c0 fffff802
33a0ae15 : ffffaf092fbe5b80 ffffb887
aa990ea0 0000000000000001 ffffb887
a7599ed0 : nt!IofCallDriver+0x184ce5 ffffaf092fbe5900 fffff802
33a06fef : ffffb88700000000 00000000
00000000 0000000000000000 ffffaf09
2fbe5b80 : nt!IopSynchronousServiceTail+0x1a5 ffffaf092fbe59a0 fffff802
335d6c15 : 0000000000000001 00000000
00000000 0000000000000000 00000000
00000000 : nt!NtReadFile+0x59f ffffaf092fbe5a90 00007ffc
c1c7c134 : 00007ffcbf7c5187 00000000
00000000 ffffffffffd9da60 00000000
00000048 : nt!KiSystemServiceCopyEnd+0x25 000000eea56fd5a8 00007ffc
bf7c5187 : 0000000000000000 ffffffff
ffd9da60 0000000000000048 00000000
00000001 : ntdll!NtReadFile+0x14 000000eea56fd5b0 00007ffc
98605945 : 0000025be017b010 0000025b
e017b010 0000025b00000000 000000ee
a56fd6c4 : KERNELBASE!ReadFile+0x77 000000eea56fd630 00007ffc
86cfe3b6 : 0000025be0124cb0 00007ffc
bf815ac9 0000000000000000 00000000
00000000 : packet!PacketReceivePacket+0x95 000000eea56fd670 0000025b
e0124cb0 : 00007ffcbf815ac9 00000000
00000000 0000000000000000 00000000
00000000 : wpcap!pcap_lookupnet+0x416 000000eea56fd678 00007ffc
bf815ac9 : 0000000000000000 00000000
00000000 0000000000000000 00007ff7
886ae4d0 : 0x0000025be0124cb0 000000ee
a56fd680 00007ff788692049 : 0000025b
e0124cb0 0000000000001001 000000ee
a56fd800 000000eea56fd770 : KERNELBASE!PeekNamedPipe+0x1b9 000000ee
a56fd750 0000025be0124cb0 : 00000000
00001001 000000eea56fd800 000000ee
a56fd770 000000eea56fd7a0 : dumpcap+0x2049 000000ee
a56fd758 0000000000001001 : 000000ee
a56fd800 000000eea56fd770 000000ee
a56fd7a0 0000000000000000 : 0x0000025b
e0124cb0 000000eea56fd760 000000ee
a56fd800 : 000000eea56fd770 000000ee
a56fd7a0 0000000000000000 00000000
00000000 : 0x1001 000000eea56fd768 000000ee
a56fd770 : 000000eea56fd7a0 00000000
00000000 0000000000000000 0000de17
d64ece18 : 0x000000eea56fd800 000000ee
a56fd770 000000eea56fd7a0 : 00000000
00000000 0000000000000000 0000de17
d64ece18 0000025be0124cb0 : 0x000000ee
a56fd770 000000eea56fd778 00000000
00000000 : 0000000000000000 0000de17
d64ece18 0000025be0124cb0 00007ff7
88693617 : 0x000000ee`a56fd7a0THREAD_SHA1_HASH_MOD_FUNC: be0bf8f4f9dba2874fd7cfeb9c6097e33cfe8e65
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 85026973df6ad21b3639f90b10c374a637589978
THREAD_SHA1_HASH_MOD: 2bf4801162187112be2880c1c2294cf2ce5b8490
FOLLOWUP_IP: npcap!NPF_FreeNBCopies+7a [F:\git\network\nmap\npcap\packetWin7\npf\npf\Openclos.c @ 442] fffff802`322a479a 488b5c2430 mov rbx,qword ptr [rsp+30h]
FAULT_INSTR_CODE: 245c8b48
FAULTING_SOURCE_LINE: F:\git\network\nmap\npcap\packetWin7\npf\npf\Openclos.c
FAULTING_SOURCE_FILE: F:\git\network\nmap\npcap\packetWin7\npf\npf\Openclos.c
FAULTING_SOURCE_LINE_NUMBER: 442
FAULTING_SOURCE_CODE:
438: pDeleteMe = pMdl; 439: pMdl = pMdl->Next; 440: NdisFreeMdl((PMDL)pDeleteMe); 441: }
SYMBOL_STACK_INDEX: 7
SYMBOL_NAME: npcap!NPF_FreeNBCopies+7a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: npcap
IMAGE_NAME: npcap.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5f16baac
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7a
FAILURE_BUCKET_ID: AV_VRF_npcap!NPF_FreeNBCopies
BUCKET_ID: AV_VRF_npcap!NPF_FreeNBCopies
PRIMARY_PROBLEM_CLASS: AV_VRF_npcap!NPF_FreeNBCopies
TARGET_TIME: 2020-07-24T02:42:18.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 9cae
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_vrf_npcap!npf_freenbcopies
FAILURE_ID_HASH: {35be24f4-dc28-ccad-e493-9cc776d83253}
Followup: MachineOwner
2: kd> .trap 0xffffaf092fbe5550 NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=ffffb887aa9aae10 rbx=0000000000000000 rcx=ffffb887aa9aae10 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8023560ea81 rsp=ffffaf092fbe56e0 rbp=ffffb887aa9e0880 r8=ffffb887a9d018c0 r9=0000000000000000 r10=ffffb887a0a25160 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc ndis!NdisFreeNetBuffer+0x11: fffff802
3560ea81 8b4558 mov eax,dword ptr [rbp+58h] ss:0018:ffffb887
aa9e08d8=???????? 2: kd> lmvm npcap Browse full module list start end module name fffff802322a0000 fffff802
322bd000 npcap (private pdb symbols) F:\git\network\nmap\npcap\packetWin7\vs14\x64\Win7 Debug\npcap.pdb Loaded symbol image file: npcap.sys Image path: npcap.sys Image name: npcap.sys Browse all global symbols functions data Timestamp: Tue Jul 21 17:51:40 2020 (5F16BAAC) CheckSum: 0001C54B ImageSize: 0001D000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables: 2: kd> dv pNBCopy = 0xffffb887a3e2136c pMdl = 0x00000000
00000000 pDeleteMe =