Crash in mozartbreathcore, Analyzed 1 dumps, total processed 237, rate equals 0.42%



Top 1: Version = 3.5.10820.6, Total count = 1


dump count = 1

0dc8e524 7348d76c MozartBreathCore+0x24f296
0dc8e5c8 73c21d53 MozartBreathBolo2+0x1d76c
0dc8e9f8 73bf392f MozartBreathCore+0x231d53
0dc8eda0 74c4c7c3 MozartBreathCore+0x20392f
0dc8ee44 74ac40be KERNELBASE!CreateFileW+0x35e
0dc8ee70 7566a642 kernel32!CreateFileWImplementation+0x69
0dc8eea4 7566a605 iertutil!GetFileIntegrityRid+0x22
0dc8eeb0 74cd199d iertutil!IEIsLowIntegrityFile+0x15
0dc8eec4 74cd193c urlmon!CMapPathToSpecialDirHelper::IsFileInSpecialDirs+0x41
0dc8eeec 74cd189e urlmon!_GetZoneFromFilePath+0x51
0dc8ef0c 74cd1856 urlmon!CSecurityManager::_MapPathToZone+0x3a
0dc8f174 74c97b3b urlmon!CSecurityManager::_MapComponentsToZone+0x235
0dc8f68c 74c97a28 urlmon!CSecurityManager::_MapUrlToZoneDirect+0xcb
0dc8f724 74c97037 urlmon!CSecurityManager::MapUrlToZoneEx2Internal+0x530
0dc8f768 74c96d4f urlmon!CSecurityManager::GetZoneFromUriInternal+0x104
0dc8f7d4 74c970e1 urlmon!CSecurityManager::MapUrlToZoneEx2Private+0x1f8
0dc8fa80 74c96eed urlmon!CSecurityManager::ProcessUrlActionEx2Internal+0x149
0dc8fb08 757f33e3 urlmon!CSecurityManager::ProcessUrlAction+0x15d
0dc8fb60 757f331c shlwapi!ZoneCheckUrlExCacheW+0xe6
0dc8fb8c 758666c6 shlwapi!ZoneCheckUrlExW+0x24
0dc8fbd0 75866668 shell32!CExecuteApplication::_ZoneCheckFile+0x40
0dc8fbe8 75864829 shell32!CExecuteApplication::_VerifyZoneTrust+0x2d
0dc8fc04 7586478d shell32!CExecuteApplication::_VerifyExecTrust+0x74
0dc8fc14 7587f5d9 shell32!CExecuteApplication::Execute+0x27
0dc8fc34 758649e4 shell32!CExecuteAssociation::_DoCommand+0x88
0dc8fc58 7587f65b shell32!CExecuteAssociation::_TryApplication+0x41
0dc8fc78 75864b2b shell32!CExecuteAssociation::Execute+0x5f
0dc8fca4 7587223c shell32!CShellExecute::_ExecuteAssoc+0x8c
0dc8fcc0 75872363 shell32!CShellExecute::_DoExecute+0x89
0dc8fcd4 758043f8 shell32!CShellExecute::s_ExecuteThreadProc+0x30
0dc8fd5c 74ac344d shlwapi!WrapperThreadProc+0x1b5
0dc8fd68 770f9802 kernel32!BaseThreadInitThunk+0xe
0dc8fda8 770f97d5 ntdll!__RtlUserThreadStart+0x70
0dc8fdc0 00000000 ntdll!_RtlUserThreadStart+0x1b
80342d09fc902625296aa0639b868ac9_000.dmp