Crash in netul, Analyzed 127 dumps, total processed 489, rate equals 25.97%
Top 1: Version = 1.5024.1010.416, Total count = 124
dump count = 76
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0940fec8 597a3e19 NetUL+0x13e19
0940ff70 7657fa29 NetUL+0x13e19
0940ff80 773a7a7e kernel32!BaseThreadInitThunk+0x19
0940ffdc 773a7a4e ntdll!__RtlUserThreadStart+0x2f
0940ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
656e74a47d925e102ad44b26fc5e0148_000.dmp
7fb69cd150cc636bef6b92bf534287bf_000.dmp
c199a38b4ed30385557cf2a6966ea86a_000.dmp
dump count = 30
0a43f828 5426d03d NetUL+0x11613
0a43f964 5427ff08 corner_show!CornerADConfigTask::Run+0x3cd
0a43f9a8 54277a0a corner_show!ScheduledTasksMgr::TaskDispatcher+0x88
0a43f9c8 542750ea corner_show!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall CornerAdPopTask::*)(void),CornerAdPopTask *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall CornerAdPopTask::*)(void),CornerAdPopTask *> > > > >::_Go+0x8a
0a43f9d0 542c3590 corner_show!std::_Pad::_Call_func+0xa
0a43fa0c 75d2343d corner_show!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0a43fa18 770f9812 kernel32!BaseThreadInitThunk+0xe
0a43fa58 770f97e5 ntdll!__RtlUserThreadStart+0x70
0a43fa70 00000000 ntdll!_RtlUserThreadStart+0x1b
019921722ec8102d85e522ab3517644b_002.dmp
1daf69d60ed42fa42ebee5cc3172d35f_000.dmp
ff54013a0a24b3846d78550a457046e2_000.dmp
dump count = 4
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
072efaec 58a4d03d NetUL+0x134a7
072efc28 58a5ff08 corner_show!CornerADConfigTask::Run+0x3cd
072efc6c 58a57a0a corner_show!ScheduledTasksMgr::TaskDispatcher+0x88
072efc8c 58a550ea corner_show!std::_LaunchPad<std::unique_ptr<std::tuple<std::_Binder<std::_Unforced,void (__thiscall CornerAdPopTask::*)(void),CornerAdPopTask *> >,std::default_delete<std::tuple<std::_Binder<std::_Unforced,void (__thiscall CornerAdPopTask::*)(void),CornerAdPopTask *> > > > >::_Go+0x8a
072efc94 58aa3590 corner_show!std::_Pad::_Call_func+0xa
072efcd0 747a343d corner_show!thread_start<unsigned int (__stdcall*)(void *)>+0x57
072efcdc 77129732 kernel32!BaseThreadInitThunk+0xe
072efd1c 77129705 ntdll!__RtlUserThreadStart+0x70
072efd34 00000000 ntdll!_RtlUserThreadStart+0x1b
4b1e62d625ed225bd69e875206368ffb_010.dmp
c3c0b018d729c89778cf975aa05ff651_000.dmp
cc01826b0e5339d8d6def4056dfde18c_000.dmp
dump count = 3
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0484fec8 7bc53e19 NetUL+0x13e19
0484ff74 75ef6739 NetUL+0x13e19
0484ff84 77358e7f kernel32!BaseThreadInitThunk+0x19
0484ffdc 77358e4d ntdll!__RtlUserThreadStart+0x2b
0484ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
0c1596eead5ab7908daa5397139964b4_000.dmp
b7dc1fecd32865c94ffa7e8760d25a3a_000.dmp
fce591cbe317733a1fc750cb95ffbabc_000.dmp
dump count = 2
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
030fff70 761efa29 NetUL+0x134a7
030fff80 77337a7e kernel32!BaseThreadInitThunk+0x19
030fffdc 77337a4e ntdll!__RtlUserThreadStart+0x2f
030fffec 00000000 ntdll!_RtlUserThreadStart+0x1b
70c7e4c1406fc6d3b99b997d3c5a93b6_001.dmp
df49f3d9ad430852d75be30f3abc915a_000.dmp
dump count = 1
0d5af528 54d5b67f netul_682b0000+0xe2db
0d5af550 54d5c5b9 tabx_pp+0x5b67f
0d5af584 54d4eea1 tabx_pp+0x5c5b9
0d5af83c 54e5b06e tabx_pp+0x4eea1
0d5af99c 55011218 tabx_pp+0x15b06e
0d5af9d4 7651343d tabx_pp+0x311218
0d5af9e0 77b29732 kernel32!BaseThreadInitThunk+0xe
0d5afa20 77b29705 ntdll!__RtlUserThreadStart+0x70
0d5afa38 00000000 ntdll!_RtlUserThreadStart+0x1b
9c5d103927edb94cea4709782478926d_000.dmp
dump count = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0aecff88 7515343d NetUL+0x134a7
0aecff94 773d9812 kernel32!BaseThreadInitThunk+0xe
0aecffd4 773d97e5 ntdll!__RtlUserThreadStart+0x70
0aecffec 00000000 ntdll!_RtlUserThreadStart+0x1b
f7cd8c794c2c24ecef72c3591454cf82_000.dmp
dump count = 1
ChildEBP RetAddr
05e7f3fc 7035368c KERNELBASE!RaiseException+0x62
WARNING: Stack unwind information not available. Following frames may be wrong.
05e7f4e0 77686da3 NetUL+0x1368c
03192174 04830048 ntdll!RtlpAllocateHeapInternal+0xfb3
00000000 00000000 0x4830048
702b80b5daf6802af67c54970a75d9ee_000.dmp
dump count = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
037d0890 037d00c0 NetUL+0x13e19
037d0894 c2796dd3 0x37d00c0
037d0898 0c00113b 0xc2796dd3
037d089c 037d0d30 0xc00113b
037d08a0 037d0d30 0x37d0d30
037d08a4 037d0d30 0x37d0d30
037d08a8 00000000 0x37d0d30
0f8143b2c6e97d7411d0a7cd11b5dc90_000.dmp
dump count = 1
0810f650 0f0cb953 netul_50bd0000+0xd736
0810f67c 0f0ccd2e tabx_pp+0x6b953
0810f6b8 0f0be881 tabx_pp+0x6cd2e
0810f970 0f27cf34 tabx_pp+0x5e881
0810fad8 0f432dd8 tabx_pp+0x21cf34
0810fb10 754d343d tabx_pp+0x3d2dd8
0810fb1c 77839802 kernel32!BaseThreadInitThunk+0xe
0810fb5c 778397d5 ntdll!__RtlUserThreadStart+0x70
0810fb74 00000000 ntdll!_RtlUserThreadStart+0x1b
2b92a9cd05c990ce5ee614bdbf114731_001.dmp
Top 2: Version = 1.5021.1005.723, Total count = 3
dump count = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0940fec8 597a3e19 NetUL+0x13e19
0940ff70 7657fa29 NetUL+0x13e19
0940ff80 773a7a7e kernel32!BaseThreadInitThunk+0x19
0940ffdc 773a7a4e ntdll!__RtlUserThreadStart+0x2f
0940ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
fb76815992f53473172c2988dd89e0cb_000.dmp
dump count = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0aecff88 7515343d NetUL+0x134a7
0aecff94 773d9812 kernel32!BaseThreadInitThunk+0xe
0aecffd4 773d97e5 ntdll!__RtlUserThreadStart+0x70
0aecffec 00000000 ntdll!_RtlUserThreadStart+0x1b
a99f9ba8f2eff018d133c90450a21888_000.dmp
dump count = 1
ChildEBP RetAddr
0750f9bc 6d2c368c KERNELBASE!RaiseException+0x62
WARNING: Stack unwind information not available. Following frames may be wrong.
0750fa7c 77293275 NetUL+0x1368c
0750faf0 77292e6a ntdll!RtlpLowFragHeapAllocFromContext+0x2d5
033f6dd0 033ed558 ntdll!RtlpAllocateHeapInternal+0xda
033f6ddc 033f6d08 0x33ed558
033f6de0 033f6de0 0x33f6d08
033f6de4 00000000 0x33f6de0
3ee60a7d161654590b6b83377ea7c200_000.dmp