Analyzed 3 dump
Top 1: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
08aef7d8 6a903e19 NetUL+0x13e19
08aef880 7707fcc9 NetUL+0x13e19
08aef890 775482ae kernel32!BaseThreadInitThunk+0x19
08aef8ec 7754827e ntdll!__RtlUserThreadStart+0x2f
08aef8fc 00000000 ntdll!_RtlUserThreadStart+0x1b
5770b13c08fe56eb9c77ddb9b8f56a99_000.dmp
Top 2: total counts = 1
170bf864 546f3c9a ntdll!RtlEnterCriticalSection+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
170bf8bc 547d7545 ppromotion+0x33c9a
170bf8f8 75845d49 ppromotion+0x117545
170bf908 76f7d03b kernel32!BaseThreadInitThunk+0x19
170bf960 76f7cfc1 ntdll!__RtlUserThreadStart+0x2b
170bf970 00000000 ntdll!_RtlUserThreadStart+0x1b
15ff891c0c270c33de51ad1f8e084d5a_000.dmp
Top 3: total counts = 1
ChildEBP RetAddr
0abdfad8 778202aa ntdll!RtlpWaitOnCriticalSection+0x93
0abdfb10 778200f9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0abdfbb0 76bafcc9 ntdll!RtlEnterCriticalSection+0x49
0abdfbc0 778482ae kernel32!BaseThreadInitThunk+0x19
0abdfc1c 7784827e ntdll!__RtlUserThreadStart+0x2f
0abdfc2c 00000000 ntdll!_RtlUserThreadStart+0x1b
05c8458f8ab36d13dcb22178e2a12ee5_000.dmp