Analyzed 2 dump

Top 1: total counts = 1

06c4ff0c 06944568 360NetUL+0x11613
06c4ff50 069447ca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
06c4ff70 0692f06a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
06c4ff78 069a0672 LockScreen!CImageDownload::DownloadThread+0xa
06c4ffb4 7c80b729 LockScreen!thread_start+0x57
06c4ffec 00000000 kernel32!BaseThreadStart+0x37

71f63e1e0cd4ddd41285bbcb704eb44c_002.dmp

Top 2: total counts = 1

041dfabc 67578234 kernel32!GetPrivateProfileStringW+0x35
041dfd04 67587317 LockScreen!CConfigMgr::GetRLocalData+0x74
041dfee0 675a4559 LockScreen!FullScreenAdConfigTask::NeedRun+0x77
041dff24 675a47ca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x79
041dff44 6758f06a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
041dff4c 67600672 LockScreen!CImageDownload::DownloadThread+0xa
041dff88 768e336a LockScreen!thread_start+0x57
041dff94 777698f2 kernel32!BaseThreadInitThunk+0xe
041dffd4 777698c5 ntdll!__RtlUserThreadStart+0x70
041dffec 00000000 ntdll!_RtlUserThreadStart+0x1b

da59ddab1d40c9f2a336628f3733bd54_000.dmp