Analyzed 4 dump

Top 1: total counts = 1

ChildEBP RetAddr  
069ef7b4 00000000 ntdll!RtlpWaitOnCriticalSection+0xf6

a5aa54f3a26ed97f68723aa142213eb4_001.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
05eefb70 774546a8 ntdll!RtlpWaitOnCriticalSection+0x95
05eefbb8 77454469 ntdll!RtlpEnterCriticalSectionContended+0x228
05eefbbc 05eefbe8 ntdll!RtlEnterCriticalSection+0x49
WARNING: Frame IP not in any known module. Following frames may be wrong.
05eefbc4 00e8cec8 0x5eefbe8
05eefbc8 5c8e51f8 0xe8cec8
05eefbcc 03a057e8 0x5c8e51f8
05eefbd0 00000000 0x3a057e8

926f65552f61c65f78d31efc2507d692_000.dmp

Top 3: total counts = 1

WARNING: Frame IP not in any known module. Following frames may be wrong.
059bf5e4 5c9ed787 0x959030
059bf60c 5c9ee91c NetBridge!CHttpTask::`scalar deleting destructor'+0x47
059bf7cc 5c9ee94f NetBridge!CHttpTask::Release+0x2ec
059bf7d4 5ca475ad NetBridge!CHttpTask::ReleaseThreadProc+0xf
059bf810 76b67ba9 NetBridge!thread_start+0x57
059bf820 7799c36b kernel32!BaseThreadInitThunk+0x19
059bf878 7799c2ef ntdll!__RtlUserThreadStart+0x2b
059bf888 00000000 ntdll!_RtlUserThreadStart+0x1b

18b7b35995b5a2046e18cd1de324d6af_001.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
05f5f658 00000000 KERNELBASE!RaiseException+0x62

68c13443a1e4370ceb37db0f6f70577c_009.dmp