Crash in 360base, Analyzed 1 dumps, total processed 185, rate equals 0.54%
Top 1: Version = 1.0.0.1395, Total count = 1
dump count = 1
0055c76b 756c6961 0x66206e6f
0055c76f 0a206572 360Base+0x106961
0055c773 3238385b 0xa206572
0055c777 32303a30 0x3238385b
0055c77b 45364138 0x32303a30
0055c77f 205d3839 0x45364138
0055c783 38392020 0x205d3839
0055c787 33383532 0x38392020
0055c78b 3a736d20 0x33383532
0055c78f 61635320 0x3a736d20
0055c793 676e6576 comctl32!RleFile_Draw+0x2e
0055c7a3 342e3432 0x676e6576
0055c7a7 3e2d2029 0x342e3432
0055c7ab 31303120 0x3e2d2029
0055c7af 20312e39 0x31303120
0055c7b3 32303128 0x20312e39
0055c7b7 29372e34 0x32303128
0055c7bb 2c424d20 0x29372e34
0055c7bf 352e3520 0x2c424d20
0055c7c3 30202f20 0x352e3520
0055c7c7 6d20302e 0x30202f20
0055c7cb 28202073 d2d1!ext-ms-win-rtcore-ntuser-dc-access-l1-1-0_NULL_THUNK_DATA_DLA <PERF> (d2d1+0x50302e)
0055c7cf 72657661 0x28202073
0055c7d3 20656761 0x72657661
0055c7d7 3d20756d 0x20656761
0055c7db 332e3020 0x3d20756d
0055c7df 202c3030 0x332e3020
0055c7e3 72727563 0x202c3030
0055c7e7 20746e65 0x72727563
0055c7eb 3d20756d 0x20746e65
0055c7ef 322e3020 0x3d20756d
0055c7f3 20293638 0x322e3020
0055c7f7 6f6c6c61 0x20293638
0055c7fb 69746163 0x6f6c6c61
0055c7ff 66206e6f 0x69746163
0055c803 756c6961 0x66206e6f
0055c807 0a206572 360Base+0x106961
0055c80b 3238385b 0xa206572
0055c80f 32303a30 0x3238385b
0055c813 45364138 0x32303a30
0055c817 205d3839 0x45364138
0055c81b 38392020 0x205d3839
0055c81f 32313732 0x38392020
0055c823 3a736d20 0x32313732
0055c827 61635320 0x3a736d20
0055c82b 676e6576 comctl32!RleFile_Draw+0x2e
0055c83b 372e3432 0x676e6576
0055c83f 3e2d2029 0x372e3432
0055c843 31303120 0x3e2d2029
0055c847 20332e39 0x31303120
0055c84b 32303128 0x20332e39
0055c84f 29392e34 0x32303128
0055c853 2c424d20 0x29392e34
0055c857 392e3320 0x2c424d20
0055c85b 30202f20 0x392e3320
0055c85f 6d20302e 0x30202f20
0055c863 28202073 d2d1!ext-ms-win-rtcore-ntuser-dc-access-l1-1-0_NULL_THUNK_DATA_DLA <PERF> (d2d1+0x50302e)
0055c867 72657661 0x28202073
0055c86b 20656761 0x72657661
0055c86f 3d20756d 0x20656761
0055c873 332e3020 0x3d20756d
0055c877 202c3030 0x332e3020
0055c87b 72727563 0x202c3030
0055c87f 20746e65 0x72727563
0055c883 3d20756d 0x20746e65
0055c887 322e3020 0x3d20756d
0055c88b 20293638 0x322e3020
0055c88f 6f6c6c61 0x20293638
0055c893 69746163 0x6f6c6c61
0055c897 66206e6f 0x69746163
0055c89b 756c6961 0x66206e6f
0055c89f 0a206572 360Base+0x106961
0055c8a3 3238385b 0xa206572
0055c8a7 32303a30 0x3238385b
0055c8ab 45364138 0x32303a30
0055c8af 205d3839 0x45364138
0055c8b3 38392020 0x205d3839
0055c8b7 35343832 0x38392020
0055c8bb 3a736d20 0x35343832
0055c8bf 61635320 0x3a736d20
0055c8c3 676e6576 comctl32!RleFile_Draw+0x2e
0055c8d3 392e3432 0x676e6576
0055c8d7 3e2d2029 0x392e3432
0055c8db 31303120 0x3e2d2029
0055c8df 20342e39 0x31303120
0055c8e3 32303128 0x20342e39
0055c8e7 29322e35 0x32303128
0055c8eb 2c424d20 0x29322e35
0055c8ef 302e3420 0x2c424d20
0055c8f3 30202f20 0x302e3420
0055c8f7 6d20302e 0x30202f20
0055c8fb 28202073 d2d1!ext-ms-win-rtcore-ntuser-dc-access-l1-1-0_NULL_THUNK_DATA_DLA <PERF> (d2d1+0x50302e)
0055c8ff 72657661 0x28202073
0055c903 20656761 0x72657661
0055c907 3d20756d 0x20656761
0055c90b 332e3020 0x3d20756d
0055c90f 202c3030 0x332e3020
0055c913 72727563 0x202c3030
0055c917 20746e65 0x72727563
0055c91b 3d20756d 0x20746e65
0055c91f 322e3020 0x3d20756d
0055c923 20293638 0x322e3020
0055c927 6f6c6c61 0x20293638
0055c92b 69746163 0x6f6c6c61
0055c92f 66206e6f 0x69746163
0055c933 756c6961 0x66206e6f
0055c937 0a206572 360Base+0x106961
0055c93b 00000000 0xa206572
4d68a66fb56cc01a5a783227b6d54b3e_000.dmp