Crash in netbridge, Analyzed 19 dumps, total processed 279, rate equals 6.81%



Top 1: Version = 1.5024.1010.416, Total count = 19


dump count = 6

ChildEBP RetAddr  
0908fd1c 0f6a3089 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
0908fd54 0f6a3040 NetBridge+0x13089
0908fd70 0f6a1613 NetBridge+0x13040
0908fee0 0f118178 NetBridge+0x11613
0908ff24 0f1183ea LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0908ff44 0f0eef4a LockScreen!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> > > > >::_Go+0x8a
0908ff4c 0f1a4212 LockScreen!std::_Pad::_Call_func+0xa
0908ff88 763e343d LockScreen!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0908ff94 77b69832 kernel32!BaseThreadInitThunk+0xe
0908ffd4 77b69805 ntdll!__RtlUserThreadStart+0x70
0908ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
02433e9d76e00a04354b7e32fd891a26_000.dmp
3dc94cb7711452810d830328b4273f9c_000.dmp
d937f159f1d5d49ff46bc1665e7011c1_000.dmp

dump count = 6

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0528fecc 69913e19 NetBridge+0x13e19
0528ff70 76dffa29 NetBridge+0x13e19
0528ff80 76f67a7e kernel32!BaseThreadInitThunk+0x19
0528ffdc 76f67a4e ntdll!__RtlUserThreadStart+0x2f
0528ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
25223237b6b06482b8fe3aece5a2b58f_000.dmp
ab700f34710587a4101a8ff9bd004076_000.dmp
b2361affa1be65b1269f1eaf922da9a8_000.dmp

dump count = 4

ChildEBP RetAddr  
0511fcfc 6403368c KERNELBASE!RaiseException+0x62
WARNING: Stack unwind information not available. Following frames may be wrong.
0511fd94 64580829 NetBridge+0x1368c
0511fd9c 6457aa99 LockScreen!CHttpTaskFactory::CreateTask+0x19
0511fec8 645a8178 LockScreen!FullScreenAdConfigTask::Run+0x239
0511ff0c 645a83ea LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0511ff2c 6457ef4a LockScreen!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> > > > >::_Go+0x8a
0511ff34 64634212 LockScreen!std::_Pad::_Call_func+0xa
0511ff70 7758fcc9 LockScreen!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0511ff80 77a182ae kernel32!BaseThreadInitThunk+0x19
0511ffdc 77a1827e ntdll!__RtlUserThreadStart+0x2f
0511ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
0add9649da3270b5a037c5810a0a337f_000.dmp
361bfed6b2eeef784abe046ef2328396_000.dmp
79a16827fd5983ba378429fb4312ec9e_000.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
030bdd9c 00000000 NetBridge+0x134a7
b21bc19d764c5edc990e459e074083e3_000.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
032eff70 770b6359 NetBridge+0x134a7
032eff80 77857b74 kernel32!BaseThreadInitThunk+0x19
032effdc 77857b44 ntdll!__RtlUserThreadStart+0x2f
032effec 00000000 ntdll!_RtlUserThreadStart+0x1b
d03b134140e8b2f57f5f4ce1dc3edc1f_000.dmp

dump count = 1

ChildEBP RetAddr  
0418fcd8 0fbc3089 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
0418fd10 0fbc3040 NetBridge+0x13089
0418fd2c 0fbc187b NetBridge+0x13040
0418fdac 042d0829 NetBridge+0x1187b
0418fdb4 042caa99 LockScreen!CHttpTaskFactory::CreateTask+0x19
0418fee0 042f8178 LockScreen!FullScreenAdConfigTask::Run+0x239
0418ff24 042f83ea LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0418ff44 042cef4a LockScreen!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall ScheduledTasksMgr::*)(void),ScheduledTasksMgr *> > > > >::_Go+0x8a
0418ff4c 04384212 LockScreen!std::_Pad::_Call_func+0xa
0418ff88 75d1344d LockScreen!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0418ff94 76f49802 kernel32!BaseThreadInitThunk+0xe
0418ffd4 76f497d5 ntdll!__RtlUserThreadStart+0x70
0418ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
6f2d0f55b29a88915b4384640d9ea793_000.dmp