Crash in unknown_srvhost, Analyzed 91 dumps, total processed 276, rate equals 32.97%
Top 1: Version = 1.7224.1005.626, Total count = 91
dump count = 16
ChildEBP RetAddr
069af2c8 77bf023a ntdll!RtlpWaitOnCriticalSection+0x93
069af300 77bf0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
069af374 75c411d7 ntdll!RtlEnterCriticalSection+0x49
069af39c 00000000 kernel32!CreateThreadStub+0x27
6910d78f05a494d412dd6f96903c1267_000.dmp
9ee332dc63217a83ef7d14867f225db3_000.dmp
b86263d275dfc720a07cee3ff41a5a0a_000.dmp
dump count = 6
ChildEBP RetAddr
045aef58 76ef012a ntdll!RtlpWaitOnCriticalSection+0x93
045aef90 76eeff79 ntdll!RtlpEnterCriticalSectionContended+0x1aa
045aeff0 76f3799d ntdll!RtlEnterCriticalSection+0x49
045af04c 00000000 ntdll!RtlpFreeHeapInternal+0x783
0df2fcce9dad8714fe33eed16ef8afe2_000.dmp
15e4f5765438c09b00978fa3589f145c_000.dmp
c77dbdef9b0de737580957d7c688a7db_001.dmp
dump count = 4
ChildEBP RetAddr
1f10d9e0 77cc3fd8 ntdll!RtlpWaitOnCriticalSection+0x95
1f10da28 77cc3d99 ntdll!RtlpEnterCriticalSectionContended+0x228
1f10db00 77ccbfa3 ntdll!RtlEnterCriticalSection+0x49
1f10db88 00000000 ntdll!RtlpAllocateHeapInternal+0x443
a4d0f165a5049ee8e4ebc7162084052d_000.dmp
aa77b2a3840c24ee6567f40c98efe1ae_000.dmp
d9de17d193e4d3cefbac27673eea4dcd_000.dmp
dump count = 4
ChildEBP RetAddr
0ad0f5d0 77aee0a3 ntdll!RtlpLowFragHeapFree+0x31
0ad0f5e8 76fe316c ntdll!RtlFreeHeap+0x105
0ad0f600 76fe4f40 kernel32!BasepFreeAppCompatData+0x6c
0ad0f610 76fe4959 kernel32!CreateProcessInternalW+0x20f7
0ad0fc8c 76fd1069 kernel32!CreateProcessInternalW+0x1f14
0ad0fcc4 758c5589 kernel32!CreateProcessW+0x2c
0ad0fdbc 758d2b76 shell32!_SHCreateProcess+0x251
0ad0fe10 758c538d shell32!CExecuteApplication::_CreateProcess+0xfc
0ad0fe20 758c5341 shell32!CExecuteApplication::_TryCreateProcess+0x2e
0ad0fe30 758c4789 shell32!CExecuteApplication::_DoApplication+0x48
0ad0fe40 758df5f1 shell32!CExecuteApplication::Execute+0x33
0ad0fe60 758c49d4 shell32!CExecuteAssociation::_DoCommand+0x88
0ad0fe84 758df673 shell32!CExecuteAssociation::_TryApplication+0x41
0ad0fea4 758c4b1b shell32!CExecuteAssociation::Execute+0x5f
0ad0fed0 758d2220 shell32!CShellExecute::_ExecuteAssoc+0x8c
0ad0feec 758d2347 shell32!CShellExecute::_DoExecute+0x89
0ad0ff00 76bc43c0 shell32!CShellExecute::s_ExecuteThreadProc+0x30
0ad0ff88 76fd336a shlwapi!WrapperThreadProc+0x1b5
0ad0ff94 77af9902 kernel32!BaseThreadInitThunk+0xe
0ad0ffd4 77af98d5 ntdll!__RtlUserThreadStart+0x70
0ad0ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
241f08bb4bdac02166e55f91c4238644_000.dmp
5dcd8101982292698c66e5dff2232c42_000.dmp
bea4fbd36945c7865da42f4ca62470ee_001.dmp
dump count = 3
ChildEBP RetAddr
063af1c8 77c011d7 KERNELBASE!RaiseException+0x62
063af1f0 00000000 kernel32!CreateThreadStub+0x27
58ec739af2c7871c39dfcbd34284fe69_000.dmp
97cd112b98c04c59aea5348917e8a524_001.dmp
a4d327455ace0e55623208a15860e825_000.dmp
dump count = 3
ChildEBP RetAddr
0617f6f0 77df058d KERNELBASE!RaiseException+0x62
0617f74c 00000000 ntdll!RtlpFreeHeapInternal+0x796
5ea007e2e796177d8b6b4658663c197e_000.dmp
9e82cf7d2c1109615472af3ab13cac92_000.dmp
afa1cd94bf377c22f1898138292f538a_000.dmp
dump count = 2
ChildEBP RetAddr
06b2f00c 765411d7 KERNELBASE!RaiseException+0x62
06b2f034 ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
00000000 00000000 0xffffffff
34ca37150225bdff76052ba43280418a_000.dmp
d803b2df7f6b318a25a0d904804c1e15_000.dmp
dump count = 2
ChildEBP RetAddr
05dff2d0 76f600ea ntdll!RtlpWaitOnCriticalSection+0x93
05dff308 76f5ff39 ntdll!RtlpEnterCriticalSectionContended+0x1aa
05dff37c 74ea0f37 ntdll!RtlEnterCriticalSection+0x49
05dff3a4 ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
05dff3e0 76f7bcec 0xffffffff
05dff454 00000000 ntdll!RtlQueryPerformanceCounter+0x7c
3da5bd0ac53c20b2aff2eb955a431c6d_000.dmp
a22deeeecaf86ea9325daaf3f2969043_000.dmp
dump count = 1
ChildEBP RetAddr
00f3e870 774a4ad8 ntdll!RtlpWaitOnCriticalSection+0x95
00f3e8b8 774a4899 ntdll!RtlpEnterCriticalSectionContended+0x228
00f3e8d8 755979b4 ntdll!RtlEnterCriticalSection+0x49
040b5684 00000000 KERNELBASE!CreateEventW+0x24
ba55e79b043e4cb7a27a240c2974a36e_000.dmp
dump count = 1
ChildEBP RetAddr
055ff030 7751020a ntdll!RtlpWaitOnCriticalSection+0x93
055ff068 77510059 ntdll!RtlpEnterCriticalSectionContended+0x1aa
055ff0dc 75e511d7 ntdll!RtlEnterCriticalSection+0x49
055ff11c 7751639f kernel32!CreateThreadStub+0x27
0606b658 00000000 ntdll!RtlpAllocateHeapInternal+0x48f
48c783d4535029583e01d86d5ad3c490_000.dmp