Analyzed 3 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
04fefec8 71153e19 NetBridge+0x13e19
04feff70 756d05c9 NetBridge+0x13e19
04feff80 773f7c5d kernel32!BaseThreadInitThunk+0x19
04feffdc 773f7c2d ntdll!__RtlUserThreadStart+0x2f
04feffec 00000000 ntdll!_RtlUserThreadStart+0x1b

07579b5188591dd847a7ebd8b7313ed3_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0924fec8 57b53e19 NetUL+0x13e19
0924ff74 74d37ba9 NetUL+0x13e19
0924ff84 770cc36b kernel32!BaseThreadInitThunk+0x19
0924ffdc 770cc2ef ntdll!__RtlUserThreadStart+0x2b
0924ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

cef012683592deb382a90da27218c6c9_000.dmp

Top 3: total counts = 1

0cccfac0 6abb54c6 netul_60d80000+0xe2db
0cccfb0c 6abb3996 tabx_pp+0x254c6
0cccfe24 6ac24e76 tabx_pp+0x23996
0cccff88 7560344d tabx_pp+0x94e76
0cccff94 77ce9802 kernel32!BaseThreadInitThunk+0xe
0cccffd4 77ce97d5 ntdll!__RtlUserThreadStart+0x70
0cccffec 00000000 ntdll!_RtlUserThreadStart+0x1b

5ca541f3805bf5047157ca1339e02bd2_002.dmp