Analyzed 4 dump

Top 1: total counts = 1

05a3f498 79a53551 oleacc!EXTERNAL_AccessibleObjectFromEvent+0x27
05a3f5f4 79a5cc0d BrowserBasic!BrowserChromeBaseImpl::GetEventInfo+0xc1
05a3fa7c 79aec987 BrowserBasic!BrowserMgrImpl::BrowserEventProc+0x6ed
05a3faa4 7661fb89 BrowserBasic!WinEventProc+0x57
05a3fae8 76f456cd user32!__ClientCallWinEventProc+0x39
05a3fb20 7678106c ntdll!KiUserCallbackDispatcher+0x4d
05a3fb24 7661bd9e win32u!NtUserGetMessage+0xc
05a3fb60 79ae9ae9 user32!GetMessageW+0x2e
05a3fca0 79a46583 BrowserBasic!CBrowserBasicTrayClient::AsyncStart+0x3e9
05a3fcf4 79b046e3 BrowserBasic!LdsThread::ThreadProc+0x123
05a3fd30 750efcc9 BrowserBasic!thread_start+0x57
05a3fd40 76f382ae kernel32!BaseThreadInitThunk+0x19
05a3fd9c 76f3827e ntdll!__RtlUserThreadStart+0x2f
05a3fdac 00000000 ntdll!_RtlUserThreadStart+0x1b

1ba6f48ba4857dd8ea3e21484cfadfae_000.dmp

Top 2: total counts = 1

099ada38 0ff5cab0 traceless!CHttpTaskAdapterGet::OnHttpStatus+0x9d
WARNING: Stack unwind information not available. Following frames may be wrong.
099ada90 00000000 NetBridge+0xcab0

c96897eb46a21530b8daeccd0384ccd1_000.dmp

Top 3: total counts = 1

062cf954 5ee7cf29 NetUL+0x11613
062cfa8c 5ee8f9b8 corner_show!CornerADConfigTask::Run+0x449
062cfad0 5ee8782a corner_show!ScheduledTasksMgr::TaskDispatcher+0x88
062cfaf0 5ee84f0a corner_show!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
062cfaf8 5eecaf30 corner_show!std::_Pad::_Call_func+0xa
062cfb34 7715344d corner_show!thread_start+0x57
062cfb40 77939802 kernel32!BaseThreadInitThunk+0xe
062cfb80 779397d5 ntdll!__RtlUserThreadStart+0x70
062cfb98 00000000 ntdll!_RtlUserThreadStart+0x1b

0f48740f83e5739ba8fbfb9a512034d5_003.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
053bf564 6921368c KERNELBASE!RaiseException+0x62
WARNING: Stack unwind information not available. Following frames may be wrong.
053bf648 77566e73 NetUL_69200000+0x1368c
03199420 00b0ce50 ntdll!RtlpAllocateHeapInternal+0xfb3
0319942c 53524556 0xb0ce50
03199430 03199430 0x53524556
03199434 00000000 0x3199430

428fd81e351e877707acdfeb51a2ed02_000.dmp