Crash in utility, Analyzed 7 dumps, total processed 66, rate equals 10.61%
Top 1: Version = 5.5024.1200.716, Total count = 7
dump count = 1
ChildEBP RetAddr
0082f150 7c1b11ed utility!CTaskbarSerialRunner::DownloadResource+0x1a7
0082f328 7c1b0d8b utility!CTaskbarSerialRunner::StartNext+0x39d
0082f4e4 7c1a6310 utility!CTaskbarSerialRunner::Run+0x34b
0082f5e4 7c1a66bc utility!CPopTrayClient::OnMsgConfigReady+0x260
0082f604 7c19b34c utility!CPopTrayClient::ProcessWindowMessage+0x5c
0082f654 73421926 utility!ATL::CWindowImplBaseT<ATL::CWindow,ATL::CWinTraits<1442840576,0> >::WindowProc+0x6c
0082f674 757e16ab atlthunk!AtlThunk_0x03+0x36
0082f6a0 757d7e1a user32!_InternalCallWinProc+0x2b
0082f788 757d6751 user32!UserCallWinProcCheckWow+0x33a
0082f804 757d6270 user32!DispatchMessageWorker+0x4d1
0082f810 009ba5ff user32!DispatchMessageW+0x10
0082fe64 009c7e11 srvhost!main+0x71f
0082feac 75d8fcc9 srvhost!__scrt_common_main_seh+0xfa
0082febc 7712809e kernel32!BaseThreadInitThunk+0x19
0082ff18 7712806e ntdll!__RtlUserThreadStart+0x2f
0082ff28 00000000 ntdll!_RtlUserThreadStart+0x1b
641f41b00084596f3d7c2d96037a7177_000.dmp
dump count = 1
05d3f304 6a33eecd utility!CTaskbarSerialRunner::OnHttpStatus+0x7f7
05d3f330 6a336eaf NetBridge!CHttpTask::UpdateProgress+0x4d
05d3f36c 6a339282 NetBridge!CHttpCurl::EndDownload+0x1cf
05d3f458 6a340646 NetBridge!CHttpCurl::ThreadImpl+0x162
05d3f46c 6a340a9d NetBridge!CXThread::Execute+0x36
05d3f78c 6a340b28 NetBridge!ATL::CWorkerThread<ATL::CRTThreadTraits>::WorkerThreadProc+0x14d
05d3f7b4 6a3975ad NetBridge!ATL::CWorkerThread<ATL::CRTThreadTraits>::_WorkerThreadProc+0x38
05d3f7f0 755c7ba9 NetBridge!thread_start<unsigned int (__stdcall*)(void *)>+0x57
05d3f800 7717c10b kernel32!BaseThreadInitThunk+0x19
05d3f858 7717c08f ntdll!__RtlUserThreadStart+0x2b
05d3f868 00000000 ntdll!_RtlUserThreadStart+0x1b
1957b5c475e86b6f52d669c6a00044c9_000.dmp
dump count = 1
ChildEBP RetAddr
0698f4e8 771b023a ntdll!RtlpWaitOnCriticalSection+0x93
0698f520 771b0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0698f598 760211d7 ntdll!RtlEnterCriticalSection+0x49
0698f5ec 756f24b9 kernel32!CreateThreadStub+0x27
0698f6f8 794ce13a KERNELBASE!WaitForSingleObjectEx+0x99
0698f714 794a0747 utility!LogUtils::LoggerImpl::IsLogOn+0x2a
0698f9b0 7570a9f1 utility!CTaskbarSerialRunner::OnHttpStatus+0x7f7
0698f9c0 7526854f KERNELBASE!FlsSetValue+0x11
0698f9e0 7526821b combase!RegisterThreadCleanupCallback+0x2c
0698fa50 75267175 combase!_CoInitializeEx+0x136
0698fb3c 771e4c2c combase!CoInitializeEx+0x35
0698fb8c 771e343c ntdll!ZwTestAlert+0xc
0698fb90 00000000 ntdll!ZwContinue+0xc
ff1f74cc79b96baa4f6af0be721eac53_000.dmp
dump count = 1
ChildEBP RetAddr
07adf0f0 77588911 ntdll!RtlpWaitOnCriticalSection+0x93
07adf128 775860f9 ntdll!RtlpEnterCriticalSectionContended+0x261
07adf184 74e3f1a6 ntdll!RtlEnterCriticalSection+0x49
07adf1b0 775b67a7 KERNELBASE!BasepGetModuleHandleExW+0x39
07adf260 775d6dd2 ntdll!RtlWow64GetProcessMachines+0xa7
07adf2fc 65fbe13a ntdll!RtlpFreeHeapInternal+0x7aa
07adf318 65f90747 utility!LogUtils::LoggerImpl::IsLogOn+0x2a
07adf5b0 74e5b9a1 utility!CTaskbarSerialRunner::OnHttpStatus+0x7f7
07adf5c0 76e566bc KERNELBASE!FlsSetValue+0x11
07adf644 775c1edc combase!RegisterThreadCleanupCallback+0x2c
07adf740 775c39bc ntdll!ZwSetEvent+0xc
07adf790 775c224c ntdll!ZwTestAlert+0xc
07adf794 00000000 ntdll!ZwContinue+0xc
3279349323e668b104d75da1c6082b9c_000.dmp
dump count = 1
05b0f778 6377eecd utility!CTaskbarSerialRunner::OnHttpStatus+0x7f7
05b0f7a4 63776eaf NetBridge!CHttpTask::UpdateProgress+0x4d
05b0f7e0 63779282 NetBridge!CHttpCurl::EndDownload+0x1cf
05b0f8cc 63780646 NetBridge!CHttpCurl::ThreadImpl+0x162
05b0f8e0 63780a9d NetBridge!CXThread::Execute+0x36
05b0fc00 63780b28 NetBridge!ATL::CWorkerThread<ATL::CRTThreadTraits>::WorkerThreadProc+0x14d
05b0fc28 637d75ad NetBridge!ATL::CWorkerThread<ATL::CRTThreadTraits>::_WorkerThreadProc+0x38
05b0fc64 771ffcc9 NetBridge!thread_start<unsigned int (__stdcall*)(void *)>+0x57
05b0fc74 77aa7c5e kernel32!BaseThreadInitThunk+0x19
05b0fcd0 77aa7c2e ntdll!__RtlUserThreadStart+0x2f
05b0fce0 00000000 ntdll!_RtlUserThreadStart+0x1b
059f632d2143b1dda4020643f78a0a95_000.dmp
dump count = 1
ChildEBP RetAddr
0965f298 77d7023a ntdll!RtlpWaitOnCriticalSection+0x93
0965f2d0 77d70089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0965f338 77db8094 ntdll!RtlEnterCriticalSection+0x49
0965f3d4 77d73d66 ntdll!RtlpFreeHeapInternal+0x7aa
0965f4a4 7a8ce13a ntdll!RtlFreeHeap+0x46
0965f4c0 7a8a0734 utility!LogUtils::LoggerImpl::IsLogOn+0x2a
0965f758 761ba9f1 utility!CTaskbarSerialRunner::OnHttpStatus+0x7e4
0965f768 76ca854f KERNELBASE!FlsSetValue+0x11
0965f788 76ca821b combase!RegisterThreadCleanupCallback+0x2c
0965f7f8 76ca7175 combase!_CoInitializeEx+0x136
0965f8e8 77da4c2c combase!CoInitializeEx+0x35
0965f938 77da343c ntdll!ZwTestAlert+0xc
0965f93c 00000000 ntdll!ZwContinue+0xc
6678b192e31dd07e9911beec087d3547_000.dmp
dump count = 1
ChildEBP RetAddr
003ae9e0 774f4b18 ntdll!RtlpWaitOnCriticalSection+0x95
003aea28 774f48d9 ntdll!RtlpEnterCriticalSectionContended+0x228
003aeab4 75f6a3b2 ntdll!RtlEnterCriticalSection+0x49
003aeb58 75f69d6d KERNELBASE!CreateFileInternal+0x592
003aeb9c 7605919d KERNELBASE!CreateFileW+0x6d
003aec1c 79e2ec52 KERNELBASE!GetTempFileNameW+0x1cd
003aef28 79e311ed utility!CTaskbarSerialRunner::DownloadResource+0x132
003af100 79e30d8b utility!CTaskbarSerialRunner::StartNext+0x39d
003af2bc 79e26310 utility!CTaskbarSerialRunner::Run+0x34b
003af3bc 79e266bc utility!CPopTrayClient::OnMsgConfigReady+0x260
003af3dc 79e1b34c utility!CPopTrayClient::ProcessWindowMessage+0x5c
003af42c 714e1a23 utility!ATL::CWindowImplBaseT<ATL::CWindow,ATL::CWinTraits<1442840576,0> >::WindowProc+0x6c
003af44c 751c3473 atlthunk!AtlThunk_0x04+0x43
003af478 751b4236 user32!_InternalCallWinProc+0x2b
003af570 751b2a48 user32!UserCallWinProcCheckWow+0x4c6
003af5ec 751b25b0 user32!DispatchMessageWorker+0x488
003af5f8 008ea5ff user32!DispatchMessageW+0x10
003afc4c 008f7e11 srvhost!main+0x71f
003afc94 76f57ba9 srvhost!__scrt_common_main_seh+0xfa
003afca4 7751c28b kernel32!BaseThreadInitThunk+0x19
003afcfc 7751c20f ntdll!__RtlUserThreadStart+0x2b
003afd0c 00000000 ntdll!_RtlUserThreadStart+0x1b
4447254b6cfdfa2ec133c2cfbeb2e531_000.dmp