Analyzed 2 dump
Top 1: total counts = 1
ChildEBP RetAddr
0c54ff10 77db595b ntdll!RtlpWaitOnCriticalSection+0xac
0c54ff3c 77db58b2 ntdll!RtlpEnterCriticalSectionContended+0x9b
0c54ff44 0fda98bb ntdll!RtlEnterCriticalSection+0x42
0c54ff58 0fdaa102 msctfuimanager!CCommandingUI::_IsCloseOnUIThread+0x11
0c54ff74 0fdaa3d0 msctfuimanager!CCommandingUI::_Create+0x60
0c54ff8c 76a41793 msctfuimanager!CCommandingUI::UIThreadProc+0xba
0c54ff98 77dec206 kernel32!BaseThreadInitThunk+0xe
0c54ffdc 77dec1df ntdll!__RtlUserThreadStart+0x20
0c54ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
a7789139b1dd94305ae1f6d625837686_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
03beff88 7619ef3c NetUL+0x134a7
03beff94 7785360c kernel32!BaseThreadInitThunk+0xe
03beffd4 778535df ntdll!__RtlUserThreadStart+0x70
03beffec 00000000 ntdll!_RtlUserThreadStart+0x1b
fd576236be6560b22027a2eb7e12ee60_000.dmp