Analyzed 4 dump
Top 1: total counts = 1
ChildEBP RetAddr
069ef7b4 00000000 ntdll!RtlpWaitOnCriticalSection+0xf6
a5aa54f3a26ed97f68723aa142213eb4_001.dmp
Top 2: total counts = 1
ChildEBP RetAddr
05eefb70 774546a8 ntdll!RtlpWaitOnCriticalSection+0x95
05eefbb8 77454469 ntdll!RtlpEnterCriticalSectionContended+0x228
05eefbbc 05eefbe8 ntdll!RtlEnterCriticalSection+0x49
WARNING: Frame IP not in any known module. Following frames may be wrong.
05eefbc4 00e8cec8 0x5eefbe8
05eefbc8 5c8e51f8 0xe8cec8
05eefbcc 03a057e8 0x5c8e51f8
05eefbd0 00000000 0x3a057e8
926f65552f61c65f78d31efc2507d692_000.dmp
Top 3: total counts = 1
WARNING: Frame IP not in any known module. Following frames may be wrong.
059bf5e4 5c9ed787 0x959030
059bf60c 5c9ee91c NetBridge!CHttpTask::`scalar deleting destructor'+0x47
059bf7cc 5c9ee94f NetBridge!CHttpTask::Release+0x2ec
059bf7d4 5ca475ad NetBridge!CHttpTask::ReleaseThreadProc+0xf
059bf810 76b67ba9 NetBridge!thread_start+0x57
059bf820 7799c36b kernel32!BaseThreadInitThunk+0x19
059bf878 7799c2ef ntdll!__RtlUserThreadStart+0x2b
059bf888 00000000 ntdll!_RtlUserThreadStart+0x1b
18b7b35995b5a2046e18cd1de324d6af_001.dmp
Top 4: total counts = 1
ChildEBP RetAddr
05f5f658 00000000 KERNELBASE!RaiseException+0x62
68c13443a1e4370ceb37db0f6f70577c_009.dmp