Crash in 360base, Analyzed 4 dumps, total processed 287, rate equals 1.39%
Top 1: Version = 1.0.0.1390, Total count = 3
dump count = 1
00f6c4b7 746f6e20 0x79726f6d
00f6c4bb 63696669 360Base+0x26e20
00f6c4bf 6f697461 0x63696669
00f6c4c3 4347206e 0x6f697461
00f6c4c7 206e6920 0x4347206e
00f6c4cb 20646c6f 0x206e6920
00f6c4cf 63617073 0x20646c6f
00f6c4d3 65722065 0x63617073
00f6c4d7 73657571 0x65722065
00f6c4db 0a646574 0x73657571
00f6c4df 3631315b 0xa646574
00f6c4e3 303a3434 0x3631315b
00f6c4e7 42353233 0x303a3434
00f6c4eb 5d304542 0x42353233
00f6c4ef 32363120 0x5d304542
00f6c4f3 37373033 0x32363120
00f6c4f7 20343438 0x37373033
00f6c4fb 203a736d 0x20343438
00f6c4ff 76616353 0x203a736d
00f6c7e3 00000000 comdlg32!NewLineToLocalizedDeliminator+0x122
ed98adc2248406cb1bc2eeba614d59d8_002.dmp
dump count = 1
0073cf0b 7563202c 0x3030302e
0073cf0f 6e657272 360Base+0xe202c
0073cf13 756d2074 0x6e657272
0073cf17 30203d20 0x756d2074
0073cf1b 3430302e 0x30203d20
0073cf1f 6f6c2029 0x3430302e
0073cf23 656d2077 0x6f6c2029
0073cf27 79726f6d 0x656d2077
0073cf2b 746f6e20 0x79726f6d
0073cfcf 00000000 taskschd!std::_Unguarded_partition<_SYSTEMTIME *,SystemTimeLess>+0x23d
95ce9cbcec702dad3b50db7aa7b17a13_000.dmp
dump count = 1
0042cee7 72657661 0x28202073
0042ceeb 20656761 360Base+0xe7661
0042ceef 3d20756d 0x20656761
0042cef3 392e3020 0x3d20756d
0042cef7 202c3939 0x392e3020
0042cefb 72727563 0x202c3939
0042ceff 20746e65 0x72727563
0042cf03 3d20756d 0x20746e65
0042cf07 302e3020 0x3d20756d
0042cf0b 20293230 0x302e3020
0042cf0f 6f6c6c61 0x20293230
0042cf13 69746163 0x6f6c6c61
0042cf17 66206e6f 0x69746163
0042cf1b 756c6961 0x66206e6f
0042cf1f 0a206572 usp10!cdmTable+0x2341
0042cf23 00000000 0xa206572
31e9117736a1ba388cc25797430c7c74_002.dmp
Top 2: Version = 1.0.0.1380, Total count = 1
dump count = 1
00f6d0e7 746f6e20 0x79726f6d
00f6d0eb 63696669 360Base+0x6e20
00f6d0ef 6f697461 0x63696669
00f6d0f3 4347206e 0x6f697461
00f6d0f7 206e6920 0x4347206e
00f6d0fb 20646c6f 0x206e6920
00f6d0ff 63617073 0x20646c6f
00f6d103 65722065 0x63617073
00f6d107 73657571 0x65722065
00f6d10b 0a646574 0x73657571
00f6d10f 3438315b 0xa646574
00f6d113 303a3830 0x3438315b
00f6d117 30423233 0x303a3830
00f6d11b 5d383531 0x30423233
00f6d11f 30313420 node+0x533531
00f6d123 34373132 0x30313420
00f6d127 6d203436 0x34373132
00f6d12b 4d203a73 d2d1!ext-ms-win-rtcore-ntuser-dc-access-l1-1-0_NULL_THUNK_DATA_DLA <PERF> (d2d1+0x4f3436)
00f6d12f 2d6b7261 0x4d203a73
00f6d133 65657773 0x2d6b7261
00f6d137 31312070 0x65657773
00f6d13b 2820372e 0x31312070
00f6d13f 322e3331 0x2820372e
00f6d143 3e2d2029 0x322e3331
00f6d147 2e313120 0x3e2d2029
00f6d14b 31282032 0x2e313120
00f6d14f 29322e33 0x31282032
00f6d153 2c424d20 0x29322e33
00f6d157 342e3520 0x2c424d20
00f6d15b 30202f20 0x342e3520
00f6d15f 6d20302e 0x30202f20
00f6d163 28202073 d2d1!ext-ms-win-rtcore-ntuser-dc-access-l1-1-0_NULL_THUNK_DATA_DLA <PERF> (d2d1+0x4f302e)
00f6d167 72657661 0x28202073
00f6d413 00000000 urlmon!CSecurityManager::ProcessUrlActionEx2Internal+0x431
cbb516d8e994730745db71d4a8f8a552_001.dmp