Crash in dolphinsrv, Analyzed 2 dumps, total processed 9, rate equals 22.22%



Top 1: Version = 1.6423.1065.802, Total count = 2


dump count = 1

0019f324 00416571 user32!DispatchMessageW+0x10
WARNING: Stack unwind information not available. Following frames may be wrong.
0019f348 004096ea dolphinsrv+0x16571
0019fe6c 0040911e dolphinsrv+0x96ea
0019ff24 0054c7ec dolphinsrv+0x911e
0019ff70 762e00c9 dolphinsrv+0x14c7ec
0019ff80 77507b1e kernel32!BaseThreadInitThunk+0x19
0019ffdc 77507aee ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
a4e287d85cd6f2c50d8349a7ee614321_000.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0019dfec 0041e034 dolphinsrv+0x18bfc
0019e008 0041d395 dolphinsrv+0x1e034
0019e024 0041d55f dolphinsrv+0x1d395
0019e030 0041d02d dolphinsrv+0x1d55f
0019e03c 0041c8cc dolphinsrv+0x1d02d
0019e04c 0041c8ff dolphinsrv+0x1c8cc
0019e068 0041decd dolphinsrv+0x1c8ff
0019e080 0041e3fd dolphinsrv+0x1decd
0019e0a8 004e513e dolphinsrv+0x1e3fd
0019e2f4 004e49c5 dolphinsrv+0xe513e
0019e46c 004a3ff6 dolphinsrv+0xe49c5
0019eb74 00413758 dolphinsrv+0xa3ff6
0019eb98 00417d47 dolphinsrv+0x13758
0019ebf4 7091195a dolphinsrv+0x17d47
0019ec14 76f97d52 atlthunk!AtlThunk_0x02+0x3a
0019ec40 76f7711a user32!_InternalCallWinProc+0x2a
0019ed30 76f76baa user32!UserCallWinProcCheckWow+0x4aa
0019ed94 76f80119 user32!DispatchClientMessage+0xea
0019ede0 778b712c user32!__fnINLPCREATESTRUCT+0x69
0019ee60 755c177c ntdll!KiUserCallbackDispatcher+0x4c
0019ee64 76f7b7ea win32u!NtUserCreateWindowEx+0xc
0019f144 76f7b094 user32!VerNtUserCreateWindowEx+0x229
0019f224 004170c1 user32!CreateWindowInternal+0x132
0019f26c 004b7c64 dolphinsrv+0x170c1
0019f2b0 004b7b94 dolphinsrv+0xb7c64
0019f2e0 004a3ec4 dolphinsrv+0xb7b94
0019f34c 004096a8 dolphinsrv+0xa3ec4
0019fe70 0040911e dolphinsrv+0x96a8
0019ff28 0054c7ec dolphinsrv+0x911e
0019ff74 766f6939 dolphinsrv+0x14c7ec
0019ff84 778a8fd2 kernel32!BaseThreadInitThunk+0x19
0019ffdc 778a8f9d ntdll!__RtlUserThreadStart+0x2b
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
9ffa2532287daef9497d4ad58d0799f2_000.dmp