Crash in unknown_srvhost, Analyzed 92 dumps, total processed 305, rate equals 30.16%
Top 1: Version = 1.7224.1005.626, Total count = 92
dump count = 8
ChildEBP RetAddr
069af2c8 77bf023a ntdll!RtlpWaitOnCriticalSection+0x93
069af300 77bf0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
069af374 75c411d7 ntdll!RtlEnterCriticalSection+0x49
069af39c 00000000 kernel32!CreateThreadStub+0x27
273c4fd988539fbb7e3ec02457a9d134_000.dmp
712426eff36ac16656ad6f93cea810f8_001.dmp
934133073ddd238b6b620ea230df7d05_000.dmp
dump count = 4
ChildEBP RetAddr
06def218 779e4ae8 ntdll!RtlpWaitOnCriticalSection+0x95
06def260 779e48a9 ntdll!RtlpEnterCriticalSectionContended+0x228
06def2c0 77a30afd ntdll!RtlEnterCriticalSection+0x49
06def31c 00000000 ntdll!RtlpFreeHeapInternal+0x796
a0bfd804051072063bef93d502b17bff_000.dmp
b123d780383c44edaf26ce3b84fac7ee_000.dmp
e741d83f83f0bb26c10107f20f844d85_000.dmp
dump count = 4
ChildEBP RetAddr
05e3f048 779c008a ntdll!RtlpWaitOnCriticalSection+0x93
05e3f080 779bfed9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
05e3f0f4 76df0f37 ntdll!RtlEnterCriticalSection+0x49
05e3f11c ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
05e3f164 779dbd4b 0xffffffff
05e3f1c4 00000000 ntdll!RtlQueryPerformanceCounter+0x12b
2c4f19e8d58f3aaa6506fe296af5fe37_000.dmp
383fb085e2e753c559f1a8e22d2cd186_000.dmp
7eeb839255d025238ad92c4a5fa1c1b8_000.dmp
dump count = 4
ChildEBP RetAddr
063af1c8 77c011d7 KERNELBASE!RaiseException+0x62
063af1f0 00000000 kernel32!CreateThreadStub+0x27
24d0900f31cd114714f4ee44eb155bbe_000.dmp
44c637e269574cf5dc26e6efe9eb1d4e_000.dmp
7693550a35df1972fc017cee679506f3_001.dmp
dump count = 2
ChildEBP RetAddr
0631f1d8 77bd01aa ntdll!RtlpWaitOnCriticalSection+0x93
0631f210 77bcfff9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0631f284 76220f37 ntdll!RtlEnterCriticalSection+0x49
0631f2ac ffffffff kernel32!CreateThreadStub+0x27
WARNING: Frame IP not in any known module. Following frames may be wrong.
00000000 00000000 0xffffffff
1cc651ae4c8d02359257e68ea3b2d013_000.dmp
56b768ccc54a5367be74615971e7caf0_000.dmp
dump count = 2
ChildEBP RetAddr
045aef58 76ef012a ntdll!RtlpWaitOnCriticalSection+0x93
045aef90 76eeff79 ntdll!RtlpEnterCriticalSectionContended+0x1aa
045aeff0 76f3799d ntdll!RtlEnterCriticalSection+0x49
045af04c 00000000 ntdll!RtlpFreeHeapInternal+0x783
2f2383df13bedc7d4629fa929026ce7a_000.dmp
9a1b25e43ecd1ba0d9e5f530966923ec_000.dmp
dump count = 2
ChildEBP RetAddr
060aefd8 7770806d KERNELBASE!RaiseException+0x62
060af034 00000000 ntdll!RtlpFreeHeapInternal+0x783
4e596dbc536f2c5553b3f50642280cc2_000.dmp
626c774578cc5c86d078c05090f7097c_000.dmp
dump count = 1
ChildEBP RetAddr
0c7bf5c0 77c9e0c3 ntdll!RtlpLowFragHeapFree+0xc5
0c7bf5d8 767931a4 ntdll!RtlFreeHeap+0x105
0c7bf5f0 76794f78 kernel32!BasepFreeAppCompatData+0x6c
0c7bf600 76794991 kernel32!CreateProcessInternalW+0x20f7
0c7bfc7c 76781069 kernel32!CreateProcessInternalW+0x1f14
0c7bfcb4 75b25595 kernel32!CreateProcessW+0x2c
0c7bfdac 75b32b92 shell32!_SHCreateProcess+0x251
0c7bfe00 75b25399 shell32!CExecuteApplication::_CreateProcess+0xfc
0c7bfe10 75b2534d shell32!CExecuteApplication::_TryCreateProcess+0x2e
0c7bfe20 75b24799 shell32!CExecuteApplication::_DoApplication+0x48
0c7bfe30 75b3f591 shell32!CExecuteApplication::Execute+0x33
0c7bfe50 75b249e4 shell32!CExecuteAssociation::_DoCommand+0x88
0c7bfe74 75b3f613 shell32!CExecuteAssociation::_TryApplication+0x41
0c7bfe94 75b24b2b shell32!CExecuteAssociation::Execute+0x5f
0c7bfec0 75b3223c shell32!CShellExecute::_ExecuteAssoc+0x8c
0c7bfedc 75b32363 shell32!CShellExecute::_DoExecute+0x89
0c7bfef0 76dd43c0 shell32!CShellExecute::s_ExecuteThreadProc+0x30
0c7bff78 7678343d shlwapi!WrapperThreadProc+0x1b5
0c7bff84 77ca9802 kernel32!BaseThreadInitThunk+0xe
0c7bffc4 77ca97d5 ntdll!__RtlUserThreadStart+0x70
0c7bffdc 00000000 ntdll!_RtlUserThreadStart+0x1b
295f0f742295e66dbf07af89fafbd9ef_000.dmp
dump count = 1
ChildEBP RetAddr
07dff9f8 76fa62ca ntdll!RtlpWaitOnCriticalSection+0x6b
07dffa18 76fa6199 ntdll!RtlpEnterCriticalSectionContended+0x12a
07dffa1c 00000000 ntdll!RtlEnterCriticalSection+0x49
f715cf1cdefcf72633011d8d03729554_000.dmp
dump count = 1
0339f95c 76d30ec2 netprofm!CPubINetworkListManager::GetNetworks+0x53
0339f9dc 0339fa04 wininet!NETWORK_MANAGER::ReadGuidsForConnectedNetworks+0x12d
0339f9f0 0339fa78 0x339fa04
00000000 00000000 0x339fa78
430acca6d82047990c17bcf434351fb0_000.dmp