Crash in unknown_srvhost, Analyzed 24 dumps, total processed 78, rate equals 30.77%



Top 1: Version = 1.7224.1005.626, Total count = 24


dump count = 3

ChildEBP RetAddr  
069af2c8 77bf023a ntdll!RtlpWaitOnCriticalSection+0x93
069af300 77bf0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
069af374 75c411d7 ntdll!RtlEnterCriticalSection+0x49
069af39c 00000000 kernel32!CreateThreadStub+0x27
0196ab12366f9bcaf28032b00c6bbfd0_002.dmp
417e3b93a3819192acd82a832c0abad2_001.dmp
bbc03a9cd8db4c69f66e06237080b471_001.dmp

dump count = 3

ChildEBP RetAddr  
07cff424 75a711d7 KERNELBASE!RaiseException+0x62
07cff44c ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
07cff494 7754c11b 0xffffffff
07cff4f4 00000000 ntdll!RtlQueryPerformanceCounter+0x12b
2cac9c999498d1997fc2ab8e7508d666_000.dmp
5d5bb231e67fb8fd00d232d8f70089df_000.dmp
9ac6009ee392b98882e93926834b417c_000.dmp

dump count = 1

ChildEBP RetAddr  
05b6ef40 77718871 ntdll!RtlpWaitOnCriticalSection+0x93
05b6ef78 77716049 ntdll!RtlpEnterCriticalSectionContended+0x261
05b6efd4 7597e666 ntdll!RtlEnterCriticalSection+0x49
05b6f000 77746707 KERNELBASE!BasepGetModuleHandleExW+0x39
05b6f0b0 00000000 ntdll!RtlWow64GetProcessMachines+0xa7
26071bfdc069bca474568a7313cfeb2f_000.dmp

dump count = 1

ChildEBP RetAddr  
005cebb0 77e6f306 ntdll!RtlpWaitOnCriticalSection+0x6c
005cebd8 77e6f229 ntdll!RtlpEnterCriticalSectionContended+0xd6
005cec74 76d5c90d ntdll!RtlEnterCriticalSection+0x49
005ced28 76d5c5de KERNELBASE!CreateFileInternal+0x31d
005ced58 76d54ea9 KERNELBASE!CreateFileW+0x5e
005cedbc 005cf0cc KERNELBASE!GetTempFileNameW+0x1a9
WARNING: Frame IP not in any known module. Following frames may be wrong.
005cee54 77e660c2 0x5cf0cc
005ceea4 77e65bb6 ntdll!RtlpInsertFreeBlock+0x102
005ceeec 005c0061 ntdll!RtlpDeCommitFreeBlock+0x95
005ceef8 005c006c 0x5c0061
00610063 00000000 0x5c006c
d5ee37a4c7c5028c82b9b4e842abdc18_000.dmp

dump count = 1

ChildEBP RetAddr  
059ef2c8 77dfcb53 KERNELBASE!RaiseException+0x62
059ef350 059eeef8 ntdll!RtlpAllocateHeapInternal+0x443
WARNING: Frame IP not in any known module. Following frames may be wrong.
00000000 00000000 0x59eeef8
d3091b73e307ed7dc37d10a637923bbc_000.dmp

dump count = 1

06bdf59c 75c60ec2 netprofm!CPubINetworkListManager::GetNetworks+0x39
06bdf61c 06bdf644 wininet!NETWORK_MANAGER::ReadGuidsForConnectedNetworks+0x12d
06bdf630 06bdf6b8 0x6bdf644
00000000 00000000 0x6bdf6b8
5653f9d8c27835ce89eac0649eeec0e5_000.dmp

dump count = 1

045af62c 76990ec2 netprofm!CPubINetworkListManager::GetNetworks+0x39
045af6ac 045af6d4 wininet!NETWORK_MANAGER::ReadGuidsForConnectedNetworks+0x12d
045af6c0 045af748 0x45af6d4
00000000 00000000 0x45af748
926a7d946f9154f533a842a8044d9eaa_000.dmp

dump count = 1

ChildEBP RetAddr  
0095e9e0 77b2015a ntdll!RtlpWaitOnCriticalSection+0x93
0095ea18 77b1ffa9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0095eabc 76c4724e ntdll!RtlEnterCriticalSection+0x49
0095eb60 76c46cbe KERNELBASE!CreateFileInternal+0x57e
0095eb94 76c34166 KERNELBASE!CreateFileW+0x5e
0095ebf8 0095ef08 KERNELBASE!GetTempFileNameW+0x1a6
WARNING: Frame IP not in any known module. Following frames may be wrong.
0095ec78 77b20cbf 0x95ef08
0095ecb4 038e32d8 ntdll!RtlpInsertFreeBlock+0x11f
0095ed00 00650073 0x38e32d8
0095ed04 00730072 0x650073
0095ed08 004c005c 0x730072
0095ed0c 006e0065 0x4c005c
0095ed10 0076006f 0x6e0065
0095ed14 005c006f 0x76006f
0095ed18 00700041 0x5c006f
0095ed1c 00440070 0x700041
0095ed20 00740061 0x440070
0095ed24 005c0061 0x740061
0095ed28 006f004c 0x5c0061
0095ed2c 00610063 0x6f004c
0095ed30 005c006c 0x610063
0095ed34 00650054 0x5c006c
0095ed38 0070006d 0x650054
0095ed3c 00000000 0x70006d
199da42820d14669e303277d1caa440c_000.dmp

dump count = 1

ChildEBP RetAddr  
06aff2dc 76b3c8c7 KERNELBASE!RaiseException+0x62
06aff304 06aff360 kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
06aff328 7761cb53 0x6aff360
06aff3b0 06afef58 ntdll!RtlpAllocateHeapInternal+0x443
00000000 00000000 0x6afef58
59487d113458a4756823f29abe15496b_000.dmp

dump count = 1

ChildEBP RetAddr  
045aef58 76ef012a ntdll!RtlpWaitOnCriticalSection+0x93
045aef90 76eeff79 ntdll!RtlpEnterCriticalSectionContended+0x1aa
045aeff0 76f3799d ntdll!RtlEnterCriticalSection+0x49
045af04c 00000000 ntdll!RtlpFreeHeapInternal+0x783
40396ae7f079660fa5508998a3a0cdf8_000.dmp