Analyzed 14 dump

Top 1: total counts = 4

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
050ef920 7a963e19 NetUL+0x13e19
050ef9c8 755bfcc9 NetUL+0x13e19
050ef9d8 77397b1e kernel32!BaseThreadInitThunk+0x19
050efa34 77397aee ntdll!__RtlUserThreadStart+0x2f
050efa44 00000000 ntdll!_RtlUserThreadStart+0x1b

f313053145ac2c66686d391442f9ca67_000.dmp
99792b50998b50fffe900b12222825bb_000.dmp
103b8ed26eebb364dcce064e142e29d9_000.dmp
15d468627e244d5645476cb19125742c_000.dmp

Top 2: total counts = 4

09ddf614 5a2ed03d NetUL+0x11613
09ddf750 5a2fff08 corner_show!CornerADConfigTask::Run+0x3cd
09ddf794 5a2f7a0a corner_show!ScheduledTasksMgr::TaskDispatcher+0x88
09ddf7b4 5a2f50ea corner_show!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
09ddf7bc 5a343590 corner_show!std::_Pad::_Call_func+0xa
09ddf7f8 76c8343d corner_show!thread_start+0x57
09ddf804 77b89732 kernel32!BaseThreadInitThunk+0xe
09ddf844 77b89705 ntdll!__RtlUserThreadStart+0x70
09ddf85c 00000000 ntdll!_RtlUserThreadStart+0x1b

7f80b6b90974f0c9a64fa254da83d9a2_001.dmp
ff4a4252f582aabefba13cd9e42ef67e_001.dmp
255742d14dc7a6a050995981ae97fdce_000.dmp
c20f62bb9c1be3f62993b089d0281d40_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
060ef59c 61603ce8 corner_show!std::basic_stringbuf,std::allocator >::~basic_stringbuf,std::allocator >+0x25
060ef5b8 61605742 corner_show!std::basic_istringstream,std::allocator >::`vbase destructor'+0x48
060ef700 61612020 corner_show!UtilFun::String2TimePoint+0x232
060ef748 61613f55 corner_show!CornerAdPopTask::GetStartTime+0x1e0
060ef858 61612306 corner_show!CornerAdPopTask::StartTimeCheck+0x2f5
060ef968 6161fef9 corner_show!CornerAdPopTask::NeedRun+0x76
060ef9ac 61617a0a corner_show!ScheduledTasksMgr::TaskDispatcher+0x79
060ef9cc 616150ea corner_show!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
060ef9d4 61663590 corner_show!std::_Pad::_Call_func+0xa
060efa10 76b63d12 corner_show!thread_start+0x57
060efa1c 77079732 kernel32!BaseThreadInitThunk+0xe
060efa5c 77079705 ntdll!__RtlUserThreadStart+0x70
060efa74 00000000 ntdll!_RtlUserThreadStart+0x1b

812e42a36d699ad4d7237e673bcc5405_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
04a7ebcc 00000000 KERNELBASE!RaiseException+0x62

4a138ce742bcf40938e17de8530f8ae2_000.dmp

Top 5: total counts = 1

06caf7c8 0749ab63 0x7ac8629b
06caf7f4 0749be6e tabx_pp+0x6ab63
06caf830 074b7761 tabx_pp+0x6be6e
06caf950 075104fd tabx_pp+0x87761
06cafaf0 074cde17 tabx_pp+0xe04fd
06cafc2c 074ce7bc tabx_pp+0x9de17
06cafca0 07499d3e tabx_pp+0x9e7bc
06cafcc4 07480e5a tabx_pp+0x69d3e
06cafccc 077decb8 tabx_pp+0x50e5a
06cafd04 76dc5d49 tabx_pp+0x3aecb8
06cafd14 77cad1ab kernel32!BaseThreadInitThunk+0x19
06cafd6c 77cad131 ntdll!__RtlUserThreadStart+0x2b
06cafd7c 00000000 ntdll!_RtlUserThreadStart+0x1b

d67e818dad7db9f368870b4a94c8f1ef_000.dmp

Top 6: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
06e2e490 00000000 MozartBreathCore+0x1e88ea

f75ec1b8b7b312e582f9e43f296ada04_001.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
02eaea74 779a2880 ntdll!RtlpLowFragHeapFree+0x31
02eaea8c 75ecc5d4 ntdll!RtlFreeHeap+0x105
02eaeaa0 7601b25e kernel32!HeapFree+0x14
02eaeab4 7601aa0e shlwapi!operator delete+0x1d
02eaeac4 7601a9e8 shlwapi!CRegistrySource::`scalar deleting destructor'+0x19
02eaead8 76b5321f shlwapi!CRegistrySource::Release+0x27
02eaeaf8 76b625c9 shell32!CUserChoiceForFileAssociation::Open+0x88
02eaeb14 76b4f6ff shell32!CAssocProgidElement::_GetUserChoice+0x1a
02eaeb8c 76b625a8 shell32!CAssocProgidElement::_InitFileAssociation+0x87
02eaeb98 76b9ddd9 shell32!CAssocProgidElement::_InitSource+0x1b
02eaeba8 76b9de30 shell32!CAssocShellElement::SetString+0x53
02eaebd0 76b158bf shell32!AssocElemCreateForClass+0x46
02eaebfc 76b157fe shell32!CExecuteApplication::_AppCompatHooks+0x3a
02eafc80 76b15321 shell32!CExecuteApplication::_SetCommand+0x193
02eafc90 76b14789 shell32!CExecuteApplication::_DoApplication+0x1c
02eafca0 76b2f5f1 shell32!CExecuteApplication::Execute+0x33
02eafcc0 76b149d4 shell32!CExecuteAssociation::_DoCommand+0x88
02eafce4 76b2f673 shell32!CExecuteAssociation::_TryApplication+0x41
02eafd04 76b14b1b shell32!CExecuteAssociation::Execute+0x5f
02eafd30 76b22220 shell32!CShellExecute::_ExecuteAssoc+0x8c
02eafd4c 76b22347 shell32!CShellExecute::_DoExecute+0x89
02eafd60 760143c0 shell32!CShellExecute::s_ExecuteThreadProc+0x30
02eafde8 75ecef6c shlwapi!WrapperThreadProc+0x1b5
02eafdf4 779b3618 kernel32!BaseThreadInitThunk+0xe
02eafe34 779b35eb ntdll!__RtlUserThreadStart+0x70
02eafe4c 00000000 ntdll!_RtlUserThreadStart+0x1b

98737788c9885740bc168d504dd121be_000.dmp

Top 8: total counts = 1

ChildEBP RetAddr  
0b87fa38 76ee023a ntdll!RtlpWaitOnCriticalSection+0x93
0b87fa70 76ee0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0b87fb10 7685fcc9 ntdll!RtlEnterCriticalSection+0x49
0b87fb20 76f080ce kernel32!BaseThreadInitThunk+0x19
0b87fb7c 76f0809e ntdll!__RtlUserThreadStart+0x2f
0b87fb8c 00000000 ntdll!_RtlUserThreadStart+0x1b

271b3604e049dcd14714066d696d0caf_000.dmp