Crash in unknown_srvhost, Analyzed 43 dumps, total processed 103, rate equals 41.75%
Top 1: Version = 1.7224.1005.626, Total count = 43
dump count = 7
ChildEBP RetAddr
069af2c8 77bf023a ntdll!RtlpWaitOnCriticalSection+0x93
069af300 77bf0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
069af374 75c411d7 ntdll!RtlEnterCriticalSection+0x49
069af39c 00000000 kernel32!CreateThreadStub+0x27
d38171b2ac4ceb619bdc03a3d6dff84d_000.dmp
d3ce73a4ef7493cc5b7b9fc934e38c83_000.dmp
e333b6a62680df07ba2e19f9debba92f_001.dmp
dump count = 3
ChildEBP RetAddr
05e3f048 779c008a ntdll!RtlpWaitOnCriticalSection+0x93
05e3f080 779bfed9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
05e3f0f4 76df0f37 ntdll!RtlEnterCriticalSection+0x49
05e3f11c ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
05e3f164 779dbd4b 0xffffffff
05e3f1c4 00000000 ntdll!RtlQueryPerformanceCounter+0x12b
4c822727423ca544ed9c4d01aeb40a5e_002.dmp
9221ad73fa2b4139f4f4e00132bd6457_003.dmp
c77fd45a29be86daa1f04d38b080abc7_000.dmp
dump count = 2
ChildEBP RetAddr
0505f8d8 00000000 ntdll!RtlpWaitOnCriticalSection+0x95
1a3abc4cf8f638de410429adf116ffa8_000.dmp
26858b726da4612f2add87111b70a6a3_000.dmp
dump count = 2
ChildEBP RetAddr
0ad0f5d0 77aee0a3 ntdll!RtlpLowFragHeapFree+0x31
0ad0f5e8 76fe316c ntdll!RtlFreeHeap+0x105
0ad0f600 76fe4f40 kernel32!BasepFreeAppCompatData+0x6c
0ad0f610 76fe4959 kernel32!CreateProcessInternalW+0x20f7
0ad0fc8c 76fd1069 kernel32!CreateProcessInternalW+0x1f14
0ad0fcc4 758c5589 kernel32!CreateProcessW+0x2c
0ad0fdbc 758d2b76 shell32!_SHCreateProcess+0x251
0ad0fe10 758c538d shell32!CExecuteApplication::_CreateProcess+0xfc
0ad0fe20 758c5341 shell32!CExecuteApplication::_TryCreateProcess+0x2e
0ad0fe30 758c4789 shell32!CExecuteApplication::_DoApplication+0x48
0ad0fe40 758df5f1 shell32!CExecuteApplication::Execute+0x33
0ad0fe60 758c49d4 shell32!CExecuteAssociation::_DoCommand+0x88
0ad0fe84 758df673 shell32!CExecuteAssociation::_TryApplication+0x41
0ad0fea4 758c4b1b shell32!CExecuteAssociation::Execute+0x5f
0ad0fed0 758d2220 shell32!CShellExecute::_ExecuteAssoc+0x8c
0ad0feec 758d2347 shell32!CShellExecute::_DoExecute+0x89
0ad0ff00 76bc43c0 shell32!CShellExecute::s_ExecuteThreadProc+0x30
0ad0ff88 76fd336a shlwapi!WrapperThreadProc+0x1b5
0ad0ff94 77af9902 kernel32!BaseThreadInitThunk+0xe
0ad0ffd4 77af98d5 ntdll!__RtlUserThreadStart+0x70
0ad0ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
0792875192cc7d37cbb0cd5f23a048e7_001.dmp
da005eb35a51e7cae01b4abcd9210ba9_001.dmp
dump count = 1
ChildEBP RetAddr
07fff45c 07fff478 KERNELBASE!RaiseException+0x64
WARNING: Frame IP not in any known module. Following frames may be wrong.
07fff470 00000000 0x7fff478
e0df8078232066a49279d3c551a6854a_000.dmp
dump count = 1
ChildEBP RetAddr
0607daec 00000000 ntdll!RtlpFreeHeapInternal+0x2f3
20fdbb4ffb22543f6b39644798e036be_001.dmp
dump count = 1
ChildEBP RetAddr
05c5eef8 778f00ea ntdll!RtlpWaitOnCriticalSection+0x93
05c5ef30 778eff39 ntdll!RtlpEnterCriticalSectionContended+0x1aa
05c5efe4 778f628f ntdll!RtlEnterCriticalSection+0x49
01219be0 033cfe61 ntdll!RtlpAllocateHeapInternal+0x48f
WARNING: Frame IP not in any known module. Following frames may be wrong.
01219bec 65ea2ab3 0x33cfe61
01219bf0 bb9c05de 0x65ea2ab3
01219bf4 a868bd72 0xbb9c05de
01219bf8 c3cf621e 0xa868bd72
01219bfc 20e5bd7c 0xc3cf621e
01219c00 f09f4410 0x20e5bd7c
01219c04 6d4c1f10 0xf09f4410
01219c08 3a13f5e1 0x6d4c1f10
01219c0c 70cad13d 0x3a13f5e1
01219c10 453f176c 0x70cad13d
01219c14 aa26482d 0x453f176c
01219c18 96a30017 0xaa26482d
01219c1c 2321a87b 0x96a30017
01219c20 a2a57bb2 0x2321a87b
01219c24 6ba8ff4c 0xa2a57bb2
01219c28 4320bbad 0x6ba8ff4c
01219c2c bba7b9a7 0x4320bbad
01219c30 b8e23ec4 0xbba7b9a7
01219c34 c3f98e2a 0xb8e23ec4
01219c38 f4909c17 0xc3f98e2a
01219c3c cfb6e118 0xf4909c17
01219c40 7a58bd52 0xcfb6e118
01219c44 2d9149e2 0x7a58bd52
01219c48 cd12b947 0x2d9149e2
01219c4c 1232f1f8 0xcd12b947
01219c50 50b7d5ba 0x1232f1f8
01219c54 17706340 0x50b7d5ba
01219c58 5636e3ca 0x17706340
Map C:\Windows\System32\wininet.dll:
Image region 408400:e400 does not fit in mapping
01219c5c 2e83e33a 0x5636e3ca
01219c60 59d7216b 0x2e83e33a
01219c64 018da9b2 0x59d7216b
01219c68 1ca4b308 0x18da9b2
01219c6c a4147e85 0x1ca4b308
01219c70 99cd3041 0xa4147e85
01219c74 b8300552 0x99cd3041
01219c78 357518e9 0xb8300552
01219c7c 83819309 0x357518e9
01219c80 80000a30 0x83819309
01219c84 0401062b 0x80000a30
01219c88 0a378201 0x401062b
01219c8c 0101040b 0xa378201
01219c90 c31004ff 0x101040b
01219c94 a3137eb2 0xc31004ff
01219c98 6c34bbe1 0xa3137eb2
01219c9c 3b112307 0x6c34bbe1
01219ca0 3075da2d 0x3b112307
01219ca4 2b050609 0x3075da2d
01219ca8 1a02030e 0x2b050609
01219cac 15030005 0x1a02030e
01219cb0 01fcae00 0x15030005
01219cb4 f209d3da 0x1fcae00
01219cb8 280dad19 0xf209d3da
01219cbc 90372cc7 0x280dad19
01219cc0 00509f82 0x90372cc7
01219cc4 18860174 0x509f82
01219cc8 70747468 0x18860174
01219ccc 80000080 0x70747468
01219cd0 00000000 0x80000080
90b7c4c4a0667960c77f55699104f21b_000.dmp
dump count = 1
ChildEBP RetAddr
03eff590 773a4b18 ntdll!RtlpWaitOnCriticalSection+0x95
03eff5d8 773a48d9 ntdll!RtlpEnterCriticalSectionContended+0x228
03eff698 773acad3 ntdll!RtlEnterCriticalSection+0x49
03eff720 03eff2c8 ntdll!RtlpAllocateHeapInternal+0x443
WARNING: Frame IP not in any known module. Following frames may be wrong.
00000000 00000000 0x3eff2c8
2075d4e8fbf24ded77b30a1731b05b8e_000.dmp
dump count = 1
ChildEBP RetAddr
00afed1c 7620306c KERNELBASE!RaiseException+0x62
00afedc0 76202d5e KERNELBASE!CreateFileInternal+0x2fc
00afedf4 761ef266 KERNELBASE!CreateFileW+0x5e
00afee58 00aff168 KERNELBASE!GetTempFileNameW+0x1a6
WARNING: Frame IP not in any known module. Following frames may be wrong.
00afeed8 77010d1f 0xaff168
00afef14 05fc7668 ntdll!RtlpInsertFreeBlock+0x11f
00afef60 00650073 0x5fc7668
00afef64 00730072 0x650073
00afef68 0041005c 0x730072
00afef6c 004d0044 0x41005c
00afef70 004e0049 0x4d0044
00afef74 007e0049 0x4e0049
00afef78 002e0031 0x7e0049
00afef7c 00490057 0x2e0031
00afef80 005c004e 0x490057
00afef84 00700041 0x5c004e
00afef88 00440070 0x700041
00afef8c 00740061 0x440070
00afef90 005c0061 0x740061
00afef94 006f004c 0x5c0061
00afef98 00610063 0x6f004c
00afef9c 005c006c 0x610063
00afefa0 00650054 0x5c006c
00afefa4 0070006d 0x650054
00afefa8 00000000 0x70006d
b60fccfce595ae9ddf6ffc97a2daa667_000.dmp
dump count = 1
ChildEBP RetAddr
0b1ff0b8 774fe0c3 ntdll!RtlpLowFragHeapFree+0xc5
0b1ff0d0 74f205fa ntdll!RtlFreeHeap+0x105
0b1ff0e4 74f205b9 rpcrt4!FreeWrapper+0x36
0b1ff0f0 74f32f0e rpcrt4!operator delete+0xd
0b1ff100 74f2abd3 rpcrt4!LRPC_CCALL::`vector deleting destructor'+0x19
0b1ff114 74f2aad7 rpcrt4!LRPC_BASE_BINDING_HANDLE::FreeCachedCalls+0x42
0b1ff11c 74f2a9ef rpcrt4!LRPC_BASE_BINDING_HANDLE::BindingFree+0x14
0b1ff12c 72b914df rpcrt4!RpcBindingFree+0x55
0b1ff138 74f2af38 dhcpcsvc6!STRING_HANDLE_unbind+0xf
0b1ff160 74f2af6b rpcrt4!GenericHandleMgr+0xe2
0b1ff178 74f28077 rpcrt4!GenericHandleUnbind+0x28
0b1ff190 74fc018c rpcrt4!NdrpClientFinally+0x5e
0b1ff198 74fc016a rpcrt4!NdrClientCall2+0x29c
0b1ff5ac 72b91cd9 rpcrt4!NdrClientCall2+0x27f
0b1ff5c4 72b91825 dhcpcsvc6!RpcCliQueryLeaseInfov6+0x19
0b1ff798 749d671f dhcpcsvc6!Dhcpv6QueryLeaseInfo+0x124
0b1ff7b8 749d66a7 IPHLPAPI!AddDhcpv6Configuration+0x2d
0b1ffa38 749d6156 IPHLPAPI!AddDhcpConfiguration+0x79
0b1ffac4 749d6a89 IPHLPAPI!AllocateAndGetAdaptersAddresses+0x42f
0b1ffafc 7537ff30 IPHLPAPI!GetAdaptersAddresses+0x44
0b1ffb3c 75382823 wininet!WxGetAdaptersAddresses+0x5b
0b1ffb6c 75382ac6 wininet!CIpConfig::GetAdapterList+0x42
0b1ffb80 7538392d wininet!CIpConfig::Initialize+0x2a
0b1ffbb0 753837e6 wininet!RunDhcpWpad+0x4f
0b1ffbdc 7538da52 wininet!InternalDetectAutoProxyUrl+0xfd
0b1ffc40 7538ce9c wininet!ForegroundWpadDetection+0x159
0b1ffc8c 75323630 wininet!AutoProxyWpadAndResultThread+0x9c
0b1ffca4 77538ddf wininet!RefCountWorkItemThread+0x5e1c0
0b1ffd18 775209b1 ntdll!RtlpTpWorkCallback+0x11d
0b1ffe68 74d9344d ntdll!TppWorkerThread+0x562
0b1ffe74 77509802 kernel32!BaseThreadInitThunk+0xe
0b1ffeb4 775097d5 ntdll!__RtlUserThreadStart+0x70
0b1ffecc 00000000 ntdll!_RtlUserThreadStart+0x1b
b96142f9976cfec297b089938baa6a57_000.dmp