Analyzed 5 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00affa30 774b25cb ntdll!TppCleanupGroupMemberDestroy+0x5a
00affa3c 774b1fe0 ntdll!TppFreeWait+0x1b
00affa54 774a8154 ntdll!TpReleaseWait+0x80
00affa98 76c0516b ntdll!RtlDeregisterWaitEx+0xb4
00affaa8 76a4366c KERNELBASE!UnregisterWaitEx+0x1b
00affac0 76a226d0 crypt32!I_UnregisterWaitEx+0x11
00affad0 76a2266b crypt32!CCertChainEngine::~CCertChainEngine+0x4b
00affae4 76ab9a96 crypt32!CertFreeCertificateChainEngine+0x2b
00affb04 76a6dbe1 crypt32!CDefaultChainEngineMgr::AutoFlushEngineInfoCallback+0xcd
00affb1c 774b581a crypt32!AutoFlushEngineTimerCallback+0x1ae81
00affb40 774b5ffe ntdll!TppTimerpExecuteCallback+0x8a
00affcf4 75d3fcc9 ntdll!TppWorkerThread+0x66e
00affd04 774e80ce kernel32!BaseThreadInitThunk+0x19
00affd60 774e809e ntdll!__RtlUserThreadStart+0x2f
00affd70 00000000 ntdll!_RtlUserThreadStart+0x1b

d69aa26e8ecedb7e43e37c14f5bf8247_000.dmp

Top 2: total counts = 1

03bff85c 766b0ec2 netprofm!CPubINetworkListManager::GetNetworks+0x39
03bff8dc 03bff904 wininet!NETWORK_MANAGER::ReadGuidsForConnectedNetworks+0x12d
03bff8f0 03bff978 0x3bff904
00000000 00000000 0x3bff978

1e53e67dbddb341edb7019554b985b20_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
0280e3b0 763f4a64 rpcrt4!NdrClientCall2+0x2b
0280e3c4 73508d0b rpcrt4!NdrClientCall4+0x14
0280e474 734e9c25 dnsapi!SyncResolverQueryRpc+0xb4
0280e4cc 734e7014 dnsapi!Rpc_ResolverQuery+0x98
0280e6ac 734e667f dnsapi!Query_PrivateExW+0x8f4
0280e7a4 770850bc dnsapi!DnsQueryEx+0x25f
0280e7d0 77084e80 ntdll!RtlpQueryInformationActivationContextBasicInformation+0x3c
0280e828 735a4057 ntdll!RtlQueryInformationActivationContext+0x160
0280e96c 767020fb mswsock!Rnr_DoDnsLookup+0x2b6
0280e998 04da5678 ws2_32!WinsockThreadpool_SubmitWork+0x11b
WARNING: Frame IP not in any known module. Following frames may be wrong.
0280e9b0 770d7944 0x4da5678
0280ea04 77093c16 ntdll!RtlpFreeHeapInternal+0x7aa
0280ea20 766fd207 ntdll!RtlFreeHeap+0x46
0280ea70 03133a10 ws2_32!NSSUBJOB::LookupAsyncAndHandleResultsQDNS4F+0xa7
0280eaa4 76708807 0x3133a10
0280eb24 0280eb7c ws2_32!EventWriteWinsockNSPNextStart+0x3c
00000000 00000000 0x280eb7c

7c035f1fdb9bbcc0a4591f47b2bffc69_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
0378ee54 7783111c ntdll!LdrpHandleOldFormatImportDescriptors+0x26
0378eee0 7782e9ca ntdll!LdrpProcessStaticImports+0x25c
0378f05c 7786d42f ntdll!LdrpLoadDll+0x33d
0378f098 762a2e0f ntdll!LdrLoadDll+0xc7
0378f0e0 755c482c KERNELBASE!LoadLibraryExW+0x233
0378f0f4 00c8e07c kernel32!LoadLibraryW+0x11
0378fbb0 00c8dbcb srvhost!CPluginMgr::ScanPluginTpi+0x45c
0378fbd0 00c8e673 srvhost!CPluginMgr::LoadTpiThread+0x2b
0378fc24 00c9efc7 srvhost!LdsThread::ThreadProc+0x123
0378fc60 755c343d srvhost!thread_start+0x57
0378fc6c 77829832 kernel32!BaseThreadInitThunk+0xe
0378fcac 77829805 ntdll!__RtlUserThreadStart+0x70
0378fcc4 00000000 ntdll!_RtlUserThreadStart+0x1b

172726b64673f4a66c5b5f73fd8ac929_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
0349e010 733a07e1 urlmon!CBindCtx::GetObjectParam+0x20
0349e034 733d171f urlmon!GetObjectParam+0x5d
0349e250 733d1582 urlmon!CTransData::GetAcceptStr+0x7d
0349e268 733df186 urlmon!CBinding::GetBindString+0x82
0349e29c 733dd976 urlmon!CTransaction::GetBindString+0x76
0349eaf8 733dd8be urlmon!CINetHttp::INetAsyncOpenRequest+0x86
0349eb24 733dc5bc urlmon!CINet::INetAsyncConnect+0x2ee
0349eb48 733cd04c urlmon!CINet::INetAsyncOpen+0x2c
0349eb88 733ccc9a urlmon!CINet::StartCommon+0x3ac
0349eba4 733b872d urlmon!CINet::StartEx+0x1a
0349ebe0 733ce416 urlmon!COInetProt::StartEx+0x56d
0349f0a0 733d033d urlmon!LegacyTransaction::StartEx+0x1026
0349f1cc 733cbf63 urlmon!CBinding::StartBinding+0x17ed
0349f22c 733cbb13 urlmon!CUrlMon::StartBinding+0x1c3
0349f258 733c17df urlmon!CUrlMon::BindToStorage+0x83
0349f2a4 7346325e urlmon!CBaseBSCB::KickOffDownload+0x8f
0349f4dc 7ba2dcc5 urlmon!URLDownloadToCacheFileW+0x8e
0349f938 7ba2ba49 FalconsHelper!CStatisticImpl::InternalDownloadFile+0xa5
0349f994 7ba76f97 FalconsHelper!CStatisticImpl::DownloadThreadProc+0x139
0349f9cc 752afcc9 FalconsHelper!thread_start+0x58
0349f9dc 774780ce kernel32!BaseThreadInitThunk+0x19
0349fa38 7747809e ntdll!__RtlUserThreadStart+0x2f
0349fa48 00000000 ntdll!_RtlUserThreadStart+0x1b

ac46ea065023a8c86874d3523fa8aeab_000.dmp