Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0e9af778 76f8ec74 ntdll!RtlpUnWaitCriticalSection+0x41
0e9af790 76f7401d ntdll!RtlLeaveCriticalSection+0x51
0e9af7d0 76f74302 ntdll!RtlInitializeCriticalSectionEx+0x108
0e9af7e4 75c01d82 ntdll!RtlInitializeCriticalSection+0x12
0e9af820 75c11865 urlmon!RegisterBindStatusCallback+0x138
0e9af864 75c12014 urlmon!CBaseBSCB::KickOffDownload+0x65
0e9afa94 0d85b98f urlmon!URLDownloadToCacheFileW+0x84
0e9afef0 0d85b6a4 LockScreen!CLdsStatisticImpl::InternalDownloadFile+0x8f
0e9aff4c 0d8959e2 LockScreen!CLdsStatisticImpl::DownloadThreadProc+0x124
0e9aff88 7620343d LockScreen!thread_start+0x57
0e9aff94 76f79802 kernel32!BaseThreadInitThunk+0xe
0e9affd4 76f797d5 ntdll!__RtlUserThreadStart+0x70
0e9affec 00000000 ntdll!_RtlUserThreadStart+0x1b

e516cdb41f4cda90a0a7c3d4ac5d32af_000.dmp