Analyzed 2 dump

Top 1: total counts = 1

0813f05c 7a9e4d31 ntdll!RtlFreeHeap+0xca
0813f070 7a975478 NetBridge!_free_base+0x1c
0813f160 7a97e842 NetBridge!CHttpCurl::~CHttpCurl+0x1a8
0813f31c 7c054297 NetBridge!CHttpTask::Release+0x212
0813f520 7a97eecd utility!CTaskbarSerialRunner::OnHttpStatus+0x7f7
0813f54c 7a976eaf NetBridge!CHttpTask::UpdateProgress+0x4d
0813f588 7a979282 NetBridge!CHttpCurl::EndDownload+0x1cf
0813f674 7a980646 NetBridge!CHttpCurl::ThreadImpl+0x162
0813f688 7a980a9d NetBridge!CXThread::Execute+0x36
0813f9a8 7a980b28 NetBridge!ATL::CWorkerThread::WorkerThreadProc+0x14d
0813f9d0 7a9d75ad NetBridge!ATL::CWorkerThread::_WorkerThreadProc+0x38
0813fa0c 76085d49 NetBridge!thread_start+0x57
0813fa1c 77a5d1ab kernel32!BaseThreadInitThunk+0x19
0813fa74 77a5d131 ntdll!__RtlUserThreadStart+0x2b
0813fa84 00000000 ntdll!_RtlUserThreadStart+0x1b

c430a836c03d286198ed641c2024f771_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
07a1f038 77878871 ntdll!RtlpWaitOnCriticalSection+0x93
07a1f070 77876049 ntdll!RtlpEnterCriticalSectionContended+0x261
07a1f124 7787b095 ntdll!RtlEnterCriticalSection+0x49
069ecc58 00000000 ntdll!RtlpAllocateHeapInternal+0x295

159ebe139fbb5e511e026b7e57c0a4b5_000.dmp