Crash in 360netul, Analyzed 5 dumps, total processed 290, rate equals 1.72%
Top 1: Version = 1.0.0.1033, Total count = 4
dump count = 4
ChildEBP RetAddr
065efd20 0fdc3089 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
065efd58 0fdc3040 360NetUL+0x13089
065efd74 0fdc1613 360NetUL+0x13040
065efee0 0f9935a8 360NetUL+0x11613
065eff24 0f99380a LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
065eff44 0f97547a LockScreen!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> > > > >::_Go+0x8a
065eff4c 0fa055a2 LockScreen!std::_Pad::_Call_func+0xa
065eff88 760aef6c LockScreen!thread_start<unsigned int (__stdcall*)(void *)>+0x57
065eff94 770b3618 kernel32!BaseThreadInitThunk+0xe
065effd4 770b35eb ntdll!__RtlUserThreadStart+0x70
065effec 00000000 ntdll!_RtlUserThreadStart+0x1b
1a5d13a4201cee6c96235f480596db62_000.dmp
4ac0f47e619e41f6da02535aa457dd76_001.dmp
9cc30b8ed5b0b21ee3202bfba9c0240c_002.dmp
Top 2: Version = 1.5021.1005.723, Total count = 1
dump count = 1
ChildEBP RetAddr
05d3fb0c 74743089 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
05d3fb44 74743040 360NetUL+0x13089
05d3fb60 74741613 360NetUL+0x13040
05d3fdb8 651b1319 360NetUL+0x11613
05d3fee0 651cbf78 LockScreen!FullScreenAdConfigTask::Run+0x239
05d3ff24 651cc1da LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
05d3ff44 651b6e5a LockScreen!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> > > > >::_Go+0x8a
05d3ff4c 65225f32 LockScreen!CImageDownload::DownloadThread+0xa
05d3ff88 7721344d LockScreen!thread_start<unsigned int (__stdcall*)(void *)>+0x57
05d3ff94 77ac9802 kernel32!BaseThreadInitThunk+0xe
05d3ffd4 77ac97d5 ntdll!__RtlUserThreadStart+0x70
05d3ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
968489ec05420d05c6a05215b7c697ac_000.dmp