Crash in srvhost, Analyzed 18 dumps, total processed 140, rate equals 12.86%



Top 1: Version = 1.8425.1015.415, Total count = 18


dump count = 2

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
010ff4d0 75801cef 0x0
010ff4f0 76d2d9db atlthunk!AtlThunk_0x0F+0x3f
010ff51c 76d246fa user32!_InternalCallWinProc+0x2b
010ff600 76d22a2a user32!UserCallWinProcCheckWow+0x33a
010ff674 76d227f0 user32!DispatchMessageWorker+0x22a
010ff680 009816cb user32!DispatchMessageW+0x10
010ffce8 009d1661 srvhost!main+0x7ab
010ffd30 7681f989 srvhost!__scrt_common_main_seh+0xfa
010ffd40 77cd7084 kernel32!BaseThreadInitThunk+0x19
010ffd9c 77cd7054 ntdll!__RtlUserThreadStart+0x2f
010ffdac 00000000 ntdll!_RtlUserThreadStart+0x1b
587989e4b2996681d9cdeb8f179925b3_005.dmp
fe658d2d5b974fd7002ebc10dab712d9_000.dmp

dump count = 2

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
008eedd0 71fb1cef 0x0
008eedf0 76f2148b atlthunk!AtlThunk_0x0F+0x3f
008eee1c 76f1844a user32!_InternalCallWinProc+0x2b
008eef00 76f1804a user32!UserCallWinProcCheckWow+0x33a
008eef64 76f1bc0f user32!DispatchClientMessage+0xea
008eefa0 77d94fbd user32!__fnDWORD+0x3f
008eefd8 76f1beaa ntdll!KiUserCallbackDispatcher+0x4d
008ef028 76f1be1e user32!_PeekMessage+0x2a
008ef064 778ab616 user32!PeekMessageW+0x16e
008ef0c4 77855226 shell32!SHProcessMessagesUntilEventsEx+0xd2
008ef0f4 77856d95 shell32!CShellExecute::_RunThreadMaybeWait+0x7d
008ef1fc 778a4b12 shell32!CShellExecute::ExecuteNormal+0x1d8
008ef240 778a45d7 shell32!ShellExecuteNormal+0xc1
008ef324 00def729 shell32!ShellExecuteExW+0x97
008ef5b0 76355402 srvhost!CDbgHelper::_MiniDumpHanlder+0x519
008ef64c 77dd0836 KERNELBASE!UnhandledExceptionFilter+0x192
008ef6f8 77d94f16 ntdll!LdrpLogFatalUserCallbackException+0x81
008ef704 77da8bb2 ntdll!KiUserCallbackExceptionHandler+0x26
008ef728 77da8b84 ntdll!ExecuteHandler2+0x26
008ef7f4 77d95006 ntdll!ExecuteHandler+0x24
008ef7f4 00000000 ntdll!KiUserExceptionDispatcher+0x26
3516a6097f5dc0a54249ecc78c1ae8be_000.dmp
b157f096045d3ca191f351219e2897b8_005.dmp

dump count = 1

003cfb98 7513343d srvhost!__scrt_common_main_seh+0xfa
003cfba4 77579802 kernel32!BaseThreadInitThunk+0xe
003cfbe4 775797d5 ntdll!__RtlUserThreadStart+0x70
003cfbfc 00000000 ntdll!_RtlUserThreadStart+0x1b
577c9e9b179c179ec7a14121e5bc0875_001.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
00cce24c 729f1cef 0x0
00cce26c 75f4157b atlthunk!AtlThunk_0x0F+0x3f
00cce298 75f37c5a user32!_InternalCallWinProc+0x2b
00cce380 75f37870 user32!UserCallWinProcCheckWow+0x33a
00cce3e4 75f3bd3f user32!DispatchClientMessage+0x190
00cce420 77a956cd user32!__fnDWORD+0x3f
00cce458 75f3c00a ntdll!KiUserCallbackDispatcher+0x4d
00cce4a8 75f3bebe user32!_PeekMessage+0x2a
00cce4e4 769e1236 user32!PeekMessageW+0xde
00cce544 7698a746 shell32!SHProcessMessagesUntilEventsEx+0xd2
00cce574 7698c2b5 shell32!CShellExecute::_RunThreadMaybeWait+0x7d
00cce67c 769da7c2 shell32!CShellExecute::ExecuteNormal+0x1d8
00cce6c0 769da287 shell32!ShellExecuteNormal+0xc1
00cce7a4 00dbf729 shell32!ShellExecuteExW+0x97
00ccea30 771211c2 srvhost!CDbgHelper::_MiniDumpHanlder+0x519
00cceacc 77ad0404 KERNELBASE!UnhandledExceptionFilter+0x192
00cceb78 77a95626 ntdll!LdrpLogFatalUserCallbackException+0x81
00cceb84 77aa91c2 ntdll!KiUserCallbackExceptionHandler+0x26
00cceba8 77aa9194 ntdll!ExecuteHandler2+0x26
00ccec70 77a95716 ntdll!ExecuteHandler+0x24
00ccec70 00000000 ntdll!KiUserExceptionDispatcher+0x26
1d6f1f797dbece2eb2612792e8915c3e_001.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
054de9b8 767d4903 0x8bfc558b
054de9e0 7681ec06 urlmon!CBSCHolder::OnProgress+0x50
054dea04 767d40fd urlmon!CBinding::CallOnProgress+0x3e
054dea3c 767d3824 urlmon!CBinding::OnTransNotification+0x64f
054dea64 767d0973 urlmon!COInetProt::ReportProgress+0x14c
054dea9c 767d3986 urlmon!CTransaction::DispatchReport+0x1cf
054deae4 767d3b09 urlmon!CTransaction::OnINetCallback+0x140
054deb00 7696630a urlmon!TransactionWndProc+0x29
054deb2c 76966d4a user32!InternalCallWinProc+0x23
054deba4 769677d7 user32!UserCallWinProcCheckWow+0x109
054dec04 76967bda user32!DispatchMessageWorker+0x3b5
054dec14 768004af user32!DispatchMessageA+0xf
054dec50 768005b4 urlmon!CTransaction::CompleteOperation+0x9d
054df108 76820e4a urlmon!CTransaction::StartEx+0x16e3
054df18c 767d49f7 urlmon!CBinding::StartBinding+0x921
054df1d8 767d46d8 urlmon!CUrlMon::StartBinding+0x1a6
054df208 76800663 urlmon!CUrlMon::BindToStorage+0x8e
054df250 76800d84 urlmon!CBaseBSCB::KickOffDownload+0x93
054df480 00afce65 urlmon!URLDownloadToCacheFileW+0x84
054df8dc 00afabb9 srvhost!CStatisticImpl::InternalDownloadFile+0xa5
054df938 00b26f55 srvhost!CStatisticImpl::DownloadThreadProc+0x139
054df974 754d343d srvhost!thread_start<unsigned int (__stdcall*)(void *)>+0x57
054df980 77d69802 kernel32!BaseThreadInitThunk+0xe
054df9c0 77d697d5 ntdll!__RtlUserThreadStart+0x70
054df9d8 00000000 ntdll!_RtlUserThreadStart+0x1b
7b51d236c2cb53837db52611b80a085c_001.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0143f3c0 73901caf 0x0
0143f3e0 742ce0bb atlthunk!GetAtlThunkData+0x50c
0143f40c 742d8849 user32!_InternalCallWinProc+0x2b
0143f430 742db145 user32!InternalCallWinProc+0x20
0143f500 742c90dc user32!UserCallWinProcCheckWow+0x1be
0143f56c 742c8c20 user32!DispatchMessageWorker+0x4ac
0143f578 012516cb user32!DispatchMessageW+0x10
0143fbe0 012a1661 srvhost!main+0x7ab
0143fc28 74bb8654 srvhost!__scrt_common_main_seh+0xfa
0143fc3c 777e4a47 kernel32!BaseThreadInitThunk+0x24
0143fc84 777e4a17 ntdll!__RtlUserThreadStart+0x2f
0143fc94 00000000 ntdll!_RtlUserThreadStart+0x1b
da5f68b28c0865e5c40ffd7dd45a331f_000.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
006ff488 71821cef 0x0
006ff4a8 759116ab atlthunk!AtlThunk_0x0F+0x3f
006ff4d4 75907e1a user32!_InternalCallWinProc+0x2b
006ff5bc 75906751 user32!UserCallWinProcCheckWow+0x33a
006ff638 75906270 user32!DispatchMessageWorker+0x4d1
006ff644 00cc16cb user32!DispatchMessageW+0x10
006ffcac 00d11661 srvhost!main+0x7ab
006ffcf4 75c7fcc9 srvhost!__scrt_common_main_seh+0xfa
006ffd04 775e809e kernel32!BaseThreadInitThunk+0x19
006ffd60 775e806e ntdll!__RtlUserThreadStart+0x2f
006ffd70 00000000 ntdll!_RtlUserThreadStart+0x1b
034df2a6bd2a089732511eb311f789c8_000.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
00efef6c 703a1cef 0x0
00efef8c 774e157b atlthunk!AtlThunk_0x0F+0x3f
00efefb8 774d7c5a user32!_InternalCallWinProc+0x2b
00eff0a0 774d6500 user32!UserCallWinProcCheckWow+0x33a
00eff11c 774d6030 user32!DispatchMessageWorker+0x4c0
00eff128 005616cb user32!DispatchMessageW+0x10
00eff790 005b1661 srvhost!main+0x7ab
00eff7d8 7765fcc9 srvhost!__scrt_common_main_seh+0xfa
00eff7e8 77ad82ae kernel32!BaseThreadInitThunk+0x19
00eff844 77ad827e ntdll!__RtlUserThreadStart+0x2f
00eff854 00000000 ntdll!_RtlUserThreadStart+0x1b
09fdba0875364c6b5c836f51579ec9f9_001.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0043f400 7506630a 0x750f00
0043f42c 75066d4a user32!InternalCallWinProc+0x23
0043f4a4 750677d7 user32!UserCallWinProcCheckWow+0x109
0043f504 7506789a user32!DispatchMessageWorker+0x3b5
0043f514 00cf16cb user32!DispatchMessageW+0xf
0043fb7c 00d41661 srvhost!main+0x7ab
0043fbc4 76a83d05 srvhost!__scrt_common_main_seh+0xfa
0043fbd0 77829732 kernel32!BaseThreadInitThunk+0xe
0043fc10 77829705 ntdll!__RtlUserThreadStart+0x70
0043fc28 00000000 ntdll!_RtlUserThreadStart+0x1b
357e9ff0a8a7720a7232bf78a81ea01c_000.dmp

dump count = 1

00eff51c 76db137b atlthunk!AtlThunk_0x0F+0x3f
00eff548 76da834a user32+0x4137b
00eff62c 76da60ba user32+0x3834a
00eff6a0 76da5e80 user32+0x360ba
00eff6ac 005416cb user32+0x35e80
00effd14 00591661 srvhost!main+0x7ab
00effd5c 766a00c9 srvhost!__scrt_common_main_seh+0xfa
00effd6c 770d7b4e kernel32!BaseThreadInitThunk+0x19
00effdc8 770d7b1e ntdll!__RtlUserThreadStart+0x2f
00effdd8 00000000 ntdll!_RtlUserThreadStart+0x1b
cd1e0b2b73d69c6d9c1621a8a1bce0ef_002.dmp