Crash in 360conf, Analyzed 4 dumps, total processed 4860, rate equals 0.08%
Top 1: Version = 1.0.0.1050, Total count = 4
dump count = 1
001cc343 736d2030 0x32353537
001cc347 6353203a 360Conf+0x2030
001cc34b 6e657661 0x6353203a
001cc34f 31206567 0x6e657661
001cc353 20312e32 0x31206567
001cc357 2e333128 0x20312e32
001cc35b 2d202931 0x2e333128
001cc35f 3131203e 0x2d202931
001cc363 2820322e 0x3131203e
001cc367 342e3331 0x2820322e
001cc36b 424d2029 0x342e3331
001cc36f 3131202c 0x424d2029
001cc373 20382e31 0x3131202c
001cc377 2e30202f 0x20382e31
001cc37b 736d2030 0x2e30202f
001cc37f 61282020 360Conf+0x2030
001cc383 61726576 0x61282020
001cc387 6d206567 0x61726576
001cc38b 203d2075 0x6d206567
001cc38f 39392e30 0x203d2075
001cc393 63202c36 0x39392e30
001cc397 65727275 0x63202c36
001cc39b 6d20746e node+0x1d27275
001cc39f 203d2075 0x6d20746e
001cc3a3 30302e30 0x203d2075
001cc3a7 61202931 0x30302e30
001cc3ab 636f6c6c 0x61202931
001cc3af 6f697461 0x636f6c6c
001cc3b3 6166206e 0x6f697461
001cc3b7 72756c69 0x6166206e
001cc3bb 5b0a2065 0x72756c69
001cc3bf 32353332 0x5b0a2065
001cc3c3 4430303a 0x32353332
001cc3c7 33454341 0x4430303a
001cc3cb 33205d38 0x33454341
001cc3cf 33303430 0x33205d38
001cc3d3 20383934 0x33303430
001cc3d7 203a736d 0x20383934
001cc3db 6b72614d 0x203a736d
001cc3df 6577732d 0x6b72614d
001cc3e3 31207065 node+0x1d7732d
001cc3e7 20382e31 0x31207065
001cc3eb 2e333128 0x20382e31
001cc3ef 2d202934 0x2e333128
001cc3f3 3131203e 0x2d202934
001cc3f7 2820312e 0x3131203e
001cc3fb 342e3331 0x2820312e
001cc3ff 424d2029 0x342e3331
001cc403 3836202c 0x424d2029
001cc407 322e3131 0x3836202c
001cc40b 30202f20 0x322e3131
001cc40f 6d20302e 0x30202f20
001cc413 28202073 0x6d20302e
001cc417 72657661 0x28202073
001cc41b 20656761 0x72657661
001cc41f 3d20756d 0x20656761
001cc423 392e3020 0x3d20756d
001cc427 202c3132 0x392e3020
001cc42b 72727563 0x202c3132
001cc42f 20746e65 0x72727563
001cc433 3d20756d 0x20746e65
001cc437 382e3020 0x3d20756d
001cc43b 20293839 0x382e3020
001cc43f 20776f6c 0x20293839
001cc443 6f6d656d 0x20776f6c
001cc447 6e207972 0x6f6d656d
001cc44b 6669746f 0x6e207972
001cc44f 74616369 node+0x2c9746f
001cc453 206e6f69 ddraw!bInEnumCallback+0x58d59
001cc457 69204347 0x206e6f69
001cc45b 6c6f206e 0x69204347
001cc45f 70732064 0x6c6f206e
001cc463 20656361 0x70732064
001cc467 75716572 0x20656361
001cc46b 65747365 shell32!__dyn_tls_init_callback <PERF> (shell32+0x426572)
001cc46f 325b0a64 node+0x1d47365
001cc473 3a323533 0x325b0a64
001cc477 41443030 0x3a323533
001cc47b 38334543 0x41443030
001cc47f 3033205d 0x38334543
001cc483 30343034 0x3033205d
001cc487 6d203534 0x30343034
001cc48b 4d203a73 0x6d203534
001cc48f 2d6b7261 0x4d203a73
001cc493 65657773 0x2d6b7261
001cc497 31312070 node+0x1c57773
001cc49b 2820312e 0x31312070
001cc49f 342e3331 0x2820312e
001cc4a3 3e2d2029 0x342e3331
001cc4a7 2e313120 0x3e2d2029
001cc4ab 31282031 0x2e313120
001cc4af 29312e33 0x31282031
001cc4b3 2c424d20 0x29312e33
001cc4b7 36343520 0x2c424d20
001cc4bb 2f20382e 0x36343520
001cc4bf 302e3020 0x2f20382e
001cc4c3 20736d20 0x302e3020
001cc4c7 76612820 0x20736d20
001cc4cb 67617265 0x76612820
001cc4cf 756d2065 node+0x3c17265
001cc4d3 30203d20 shell32!__dyn_tls_init_callback <PERF> (shell32+0x3e2065)
001cc4d7 3930392e 0x30203d20
001cc4db 7563202c 0x3930392e
001cc54b 00000000 shell32!CFTAssocInfo::_ClassIDToProgID+0xc0
syscleaner/2025-06-04_04-17-03/dump/197f2b263db073e4cfc915bd6f97455b_000.dmp
dump count = 1
0045d01b 726f6d65 0x6d20776f
0045d01f 6f6e2079 360Conf+0x16d65
0045d023 69666974 0x6f6e2079
0045d027 69746163 0x69666974
0045d02b 47206e6f 0x69746163
0045d02f 6e692043 0x47206e6f
0045d033 646c6f20 0x6e692043
0045d037 61707320 node+0x30c6f20
0045d03b 72206563 node+0x107320
0045d03f 65757165 0x72206563
0045d043 64657473 node+0x4157165
0045d047 36325b0a node+0x3057473
0045d04b 303a3235 0x36325b0a
0045d04f 39343232 0x303a3235
0045d053 5d384539 0x39343232
0045d057 32342020 0x5d384539
0045d05b 36303930 0x32342020
0045d05f 736d2036 0x36303930
0045d063 614d203a 0x736d2036
0045d067 732d6b72 0x614d203a
0045d06b 70656577 0x732d6b72
0045d06f 2e313120 0x70656577
0045d073 31282030 0x2e313120
0045d077 29322e33 0x31282030
0045d07b 203e2d20 0x29322e33
0045d07f 302e3131 0x203e2d20
0045d083 33312820 0x302e3131
0045d087 2029342e 0x33312820
0045d08b 202c424d 0x2029342e
0045d08f 32303332 0x202c424d
0045d093 2f20352e 0x32303332
0045d097 302e3020 0x2f20352e
0045d09b 20736d20 0x302e3020
0045d09f 76612820 0x20736d20
0045d0a3 67617265 msvcrt!_utime64+0x65
0045d0af 3434392e 0x67617265
0045d0b3 7563202c 0x3434392e
0045d0b7 6e657272 shell32!__dyn_tls_init_callback <PERF> (shell32+0xb2202c)
0045d0bb 756d2074 0x6e657272
0045d0bf 30203d20 shell32!__dyn_tls_init_callback <PERF> (shell32+0xbc2074)
0045d0c3 3030302e 0x30203d20
0045d0c7 6f6c2029 0x3030302e
0045d0cb 656d2077 0x6f6c2029
0045d0cf 79726f6d node+0x40d2077
0045d0d3 746f6e20 0x79726f6d
0045d0d7 63696669 360Base+0x16e20
0045d0db 6f697461 node+0x2096669
0045d0df 4347206e 0x6f697461
0045d0e3 206e6920 0x4347206e
0045d0e7 20646c6f 0x206e6920
0045d0eb 63617073 0x20646c6f
0045d0ef 65722065 node+0x2017073
0045d0f3 73657571 node+0x4122065
0045d0f7 0a646574 0x73657571
0045d0fb 00000000 0xa646574
halowp/2025-06-04_04-03-35/dump/cf9e7ce3d3be802050ef7eb3d318c559_010.dmp
dump count = 1
002cce3f 736d2030 0x2e30202f
002cce43 61282020 360Conf+0x22030
002cce47 61726576 0x61282020
002cce4b 6d206567 0x61726576
002cce4f 203d2075 0x6d206567
002cce53 39392e30 0x203d2075
002cce57 63202c38 0x39392e30
002cce5b 65727275 0x63202c38
002cce5f 6d20746e 0x65727275
002cce63 203d2075 0x6d20746e
002cce67 30302e30 0x203d2075
002cce6b 6c202932 0x30302e30
002cce6f 6d20776f 0x6c202932
002cce73 726f6d65 0x6d20776f
002cce77 6f6e2079 0x726f6d65
002cce7b 69666974 0x6f6e2079
002cce7f 69746163 0x69666974
002cce83 47206e6f 0x69746163
002cce87 6e692043 0x47206e6f
002cce8b 646c6f20 0x6e692043
002cce8f 61707320 0x646c6f20
002cce93 72206563 0x61707320
002cce97 65757165 0x72206563
002cce9b 64657473 0x65757165
002cce9f 36325b0a 0x64657473
002ccea3 303a3438 0x36325b0a
002ccea7 44333531 0x303a3438
002cceab 5d383836 0x44333531
002cceaf 32372020 0x5d383836
002cceb3 39393834 0x32372020
002cceb7 736d2031 0x39393834
002ccebb 614d203a 360Conf+0x22031
002ccebf 732d6b72 0x614d203a
002ccec3 70656577 0x732d6b72
002ccec7 2e313120 0x70656577
002ccecb 31282037 0x2e313120
002ccecf 29312e33 0x31282037
002cced3 203e2d20 0x29312e33
002cced7 382e3031 0x203e2d20
002ccedb 33312820 0x382e3031
002ccedf 2029312e 0x33312820
002ccee3 202c424d 0x2029312e
002ccee7 2e353331 0x202c424d
002cceeb 202f2039 0x2e353331
002cceef 20302e30 0x202f2039
002ccef3 2020736d 0x20302e30
002ccef7 65766128 0x2020736d
002ccefb 65676172 0x65766128
002cceff 20756d20 0x65676172
002ccf03 2e30203d 0x20756d20
002ccf07 2c383939 0x2e30203d
002ccf0b 72756320 0x2c383939
002ccf0f 746e6572 0x72756320
002ccf33 6e6f6974 comctl32!_SetHeaderTitles+0x22
002ccf4b 74736575 0x6e6f6974
71657220 8d51e44d comctl32!DirectUI::TableLayout::DoLayout+0x16f
71657230 6e74c085 0x8d51e44d
71657234 741c5d39 0x6e74c085
71657244 4d8d51e4 dui70!DirectUI::HWNDHostAccessible::get_accKeyboardShortcut+0x48
71657260 ff0889dc 0x4d8d51e4
71657264 4d8d1075 0xff0889dc
71657268 3124e808 0x4d8d1075
7165726c 75ffffee 0x3124e808
716584d4 ff50468b imagehlp!PDB1::CopyToW2+0x112
716584e8 1475ff57 0xff50468b
716584ec fff04589 0x1475ff57
716584f0 468b1075 0xfff04589
716584f4 75ff5350 0x468b1075
71658520 ffd0a6e8 imagehlp!CalculateImagePtrs+0x19
7165852c 00ff7d80 0xffd0a6e8
71658530 468b6b74 0xff7d80
71658534 6a088b50 0x468b6b74
71658538 80b6ff20 0x6a088b50
7165853c 50000000 0x80b6ff20
71658540 8b2c51ff 0x50000000
71658544 507e8b03 0x8b2c51ff
71658548 0c50ff53 0x507e8b03
7165854c 078bd88b 0xc50ff53
71658550 6876ff53 0x78bd88b
71658554 3050ff57 0x6876ff53
71658558 ff53038b 0x3050ff57
7165855c 468b0850 0xff53038b
71658560 50088b50 0x468b0850
71658564 8b4051ff 0x50088b50
71658568 088b5046 0x8b4051ff
7165856c b6ff016a 0x88b5046
71658570 00000000 0xb6ff016a
aicleaner/2025-06-04_04-14-22/dump/7c7539187611b6a544c903e31c4086a3_000.dmp
dump count = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
07ebfe34 77b887cc 360Conf+0x20dc1
07ebfe54 77b5f5fa ntdll!LdrpCallInitRoutine+0x14
07ebfef8 77b5f4fb ntdll!LdrShutdownThread+0xe6
07ebff08 75ed850c ntdll!RtlExitUserThread+0x2a
07ebff1c 776105c8 KERNELBASE!FreeLibraryAndExitThread+0x5f
07ebff2c 0fcd2995 kernel32!FreeLibraryAndExitThreadStub+0x10
07ebff40 0fcd2a71 LockScreen!common_end_thread+0x56
07ebff4c 0fcd28e7 LockScreen!_endthreadex+0xd
07ebff88 7761ef3c LockScreen!thread_start<unsigned int (__stdcall*)(void *)>+0x5c
07ebff94 77b93618 kernel32!BaseThreadInitThunk+0xe
07ebffd4 77b935eb ntdll!__RtlUserThreadStart+0x70
07ebffec 00000000 ntdll!_RtlUserThreadStart+0x1b
360wpsrv/2025-06-04_04-00-43/dump/071ce11d2c622fc23dadb66bbd640e6c_000.dmp