Crash in unknown_srvhost, Analyzed 39 dumps, total processed 266, rate equals 14.66%



Top 1: Version = 1.8325.1020.415, Total count = 36


dump count = 5

ChildEBP RetAddr  
069af2c8 77bf023a ntdll!RtlpWaitOnCriticalSection+0x93
069af300 77bf0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
069af374 75c411d7 ntdll!RtlEnterCriticalSection+0x49
069af39c 00000000 kernel32!CreateThreadStub+0x27
4c2315c610bf66fe26e8a8885c99e83a_000.dmp
564a4cfbfb11a1ad6f093bc788a283e6_001.dmp
65a71673ea0c5dfacf9cb181921a10fc_000.dmp

dump count = 2

ChildEBP RetAddr  
0ad0f5d0 77aee0a3 ntdll!RtlpLowFragHeapFree+0x31
0ad0f5e8 76fe316c ntdll!RtlFreeHeap+0x105
0ad0f600 76fe4f40 kernel32!BasepFreeAppCompatData+0x6c
0ad0f610 76fe4959 kernel32!CreateProcessInternalW+0x20f7
0ad0fc8c 76fd1069 kernel32!CreateProcessInternalW+0x1f14
0ad0fcc4 758c5589 kernel32!CreateProcessW+0x2c
0ad0fdbc 758d2b76 shell32!_SHCreateProcess+0x251
0ad0fe10 758c538d shell32!CExecuteApplication::_CreateProcess+0xfc
0ad0fe20 758c5341 shell32!CExecuteApplication::_TryCreateProcess+0x2e
0ad0fe30 758c4789 shell32!CExecuteApplication::_DoApplication+0x48
0ad0fe40 758df5f1 shell32!CExecuteApplication::Execute+0x33
0ad0fe60 758c49d4 shell32!CExecuteAssociation::_DoCommand+0x88
0ad0fe84 758df673 shell32!CExecuteAssociation::_TryApplication+0x41
0ad0fea4 758c4b1b shell32!CExecuteAssociation::Execute+0x5f
0ad0fed0 758d2220 shell32!CShellExecute::_ExecuteAssoc+0x8c
0ad0feec 758d2347 shell32!CShellExecute::_DoExecute+0x89
0ad0ff00 76bc43c0 shell32!CShellExecute::s_ExecuteThreadProc+0x30
0ad0ff88 76fd336a shlwapi!WrapperThreadProc+0x1b5
0ad0ff94 77af9902 kernel32!BaseThreadInitThunk+0xe
0ad0ffd4 77af98d5 ntdll!__RtlUserThreadStart+0x70
0ad0ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
38d49430bdc8caada324fcd7691e5e88_000.dmp
e94560fa585c9af3a7fc8f2ac5bcc87e_001.dmp

dump count = 2

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0014ec74 00000000 0x0
7c6199c7a9acbd0ca2602867efc3114e_008.dmp
d50b3d21302c6b5c95af1a9a923676c8_010.dmp

dump count = 1

ChildEBP RetAddr  
00afe75c 75b20ace KERNELBASE!RaiseException+0x62
00afe800 75b2053e KERNELBASE!CreateFileInternal+0x57e
00afe830 75b191f9 KERNELBASE!CreateFileW+0x5e
00afe894 00afeba4 KERNELBASE!GetTempFileNameW+0x209
WARNING: Frame IP not in any known module. Following frames may be wrong.
00afe910 76f60e0f 0xafeba4
00afe94c 76f4f247 ntdll!RtlpInsertFreeBlock+0x11f
00afe994 003a0043 ntdll!RtlpDeCommitFreeBlock+0x95
00cf0298 7d65ab77 0x3a0043
00cf029c 44f90a9d 0x7d65ab77
00cf02a0 00000000 0x44f90a9d
e871691e49a1eabd64485bc7eaf91ef0_004.dmp

dump count = 1

ChildEBP RetAddr  
0794f08c 779f8686 ntdll!RtlpFreeHeapInternal+0xd7
0794f160 77a2118c ntdll!RtlFreeHeap+0x46
0794f1c4 77a0d8df ntdll!ZwClose+0xc
0794f250 77a0d76c ntdll!RtlWow64GetProcessMachines+0x9f
0794f2c4 00000000 ntdll!RtlQueryPerformanceCounter+0x7c
4fab43df7eb4f83f91ed68d7d4126440_000.dmp

dump count = 1

ChildEBP RetAddr  
052cedcc 776b3d66 ntdll!RtlpFreeHeapInternal+0xd7
052cee34 776e302c ntdll!RtlFreeHeap+0x46
052cee44 75a524d6 ntdll!ZwWaitForSingleObject+0xc
052cef30 75e411d7 KERNELBASE!WaitForSingleObjectEx+0xb6
052cef58 00000000 kernel32!CreateThreadStub+0x27
34213b7baf7bc90ae3cda7084f3cff5e_000.dmp

dump count = 1

ChildEBP RetAddr  
054cf33c 77133ca6 ntdll!RtlpFreeHeapInternal+0x2ff
054cf448 77162b8c ntdll!RtlFreeHeap+0x46
054cf514 7713630f ntdll!ZwClose+0xc
00000000 00000000 ntdll!RtlpAllocateHeapInternal+0x48f
70ba6c7d112b202c8045098fbd6c7e98_000.dmp

dump count = 1

ChildEBP RetAddr  
05e3f048 779c008a ntdll!RtlpWaitOnCriticalSection+0x93
05e3f080 779bfed9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
05e3f0f4 76df0f37 ntdll!RtlEnterCriticalSection+0x49
05e3f11c ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
05e3f164 779dbd4b 0xffffffff
05e3f1c4 00000000 ntdll!RtlQueryPerformanceCounter+0x12b
5f3f477c3df42d3065a27bd1a6389f07_000.dmp

dump count = 1

ChildEBP RetAddr  
0814f208 77dd8851 ntdll!RtlpWaitOnCriticalSection+0x93
0814f240 77dd6039 ntdll!RtlpEnterCriticalSectionContended+0x261
0814f32c 729faa15 ntdll!RtlEnterCriticalSection+0x49
0814f398 00000000 mswsock!SockCloseSocket+0x1a5
1f04acaed1ff0b61144bc2f858876bbd_001.dmp

dump count = 1

ChildEBP RetAddr  
0781f494 0781f4b0 KERNELBASE!RaiseException+0x62
WARNING: Frame IP not in any known module. Following frames may be wrong.
0781f4a8 00000000 0x781f4b0
105213467cadd715d2a6a647a7a2d1fc_000.dmp


Top 2: Version = 1.8325.1015.313, Total count = 3


dump count = 1

ChildEBP RetAddr  
004fe528 772a01aa ntdll!RtlpWaitOnCriticalSection+0x93
004fe560 7729fff9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
004fe604 766c2f6c ntdll!RtlEnterCriticalSection+0x49
004fe6a8 766c2c5e KERNELBASE!CreateFileInternal+0x2fc
004fe6dc 766af146 KERNELBASE!CreateFileW+0x5e
004fe740 004fea50 KERNELBASE!GetTempFileNameW+0x1a6
WARNING: Frame IP not in any known module. Following frames may be wrong.
004fe794 772d2cdc 0x4fea50
004fe798 7728fb34 ntdll!ZwFreeVirtualMemory+0xc
008861e8 00000000 ntdll!RtlpSecMemFreeVirtualMemory+0x1a
4929d42370f84b3f4f2fe290d1efa900_000.dmp

dump count = 1

ChildEBP RetAddr  
0581f340 776bec9f ntdll!RtlpWaitOnCriticalSection+0x8f
0581f378 776be4f9 ntdll!RtlpEnterCriticalSectionContended+0x25f
0581f3c8 776b8fd1 ntdll!RtlEnterCriticalSection+0x49
0581f3d0 776b8ed0 ntdll!RtlpFreeHeap+0x1491
0581f500 00000000 ntdll!RtlpFreeHeap+0x1390
660fa0e89f329cc0351374127e92a225_000.dmp

dump count = 1

ChildEBP RetAddr  
00d5e8e0 776d02aa ntdll!RtlpWaitOnCriticalSection+0x93
00d5e918 776d00f9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
00d5e9c4 76180ace ntdll!RtlEnterCriticalSection+0x49
00d5ea68 7618053e KERNELBASE!CreateFileInternal+0x57e
00d5ea98 761791f9 KERNELBASE!CreateFileW+0x5e
00d5eafc 00d5ee0c KERNELBASE!GetTempFileNameW+0x209
WARNING: Frame IP not in any known module. Following frames may be wrong.
00d5eb50 776bfb74 0xd5ee0c
010e0000 01006593 ntdll!RtlpSecMemFreeVirtualMemory+0x1a
010e000c 033c0010 0x1006593
010e0010 010e00a4 0x33c0010
010e0014 010e0000 0x10e00a4
010e00a4 06ea0010 0x10e0000
010e00a8 00000000 0x6ea0010
6bdd45df19d1e198b1fc7be1aaf72754_000.dmp