Analyzed 4 dump
Top 1: total counts = 1
0378d7a8 5f3ad6c0 ntdll!RtlpAllocateHeapInternal+0x11e7
0378d7b4 00000000 LockScreen!FullScreenAdConfigTask::`vftable'
5662810878ab8e063944408ef1b497fa_001.dmp
Top 2: total counts = 1
0345fa94 67d8285f urlmon!URLDownloadToCacheFileW+0x84
0345fef0 67d82574 LockScreen!CLdsStatisticImpl::InternalDownloadFile+0x8f
0345ff4c 67dbc872 LockScreen!CLdsStatisticImpl::DownloadThreadProc+0x124
0345ff88 7470347d LockScreen!thread_start+0x57
0345ff94 76f19732 kernel32!BaseThreadInitThunk+0xe
0345ffd4 76f19705 ntdll!__RtlUserThreadStart+0x70
0345ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
077d6331494b91b890fa075f685b6d2c_001.dmp
Top 3: total counts = 1
ChildEBP RetAddr
02b4f734 73cce200 dnsapi!DnsEtwTraceQueryExStart+0x15
02b4f7cc 73cb89db dnsapi!Query_PrivateExW+0x1b0
02b4f92c 73d7fd42 dnsapi!DnsQueryEx+0x2ab
02b4fa14 73d94e26 mswsock!SaBlob_Query+0x16d
02b4fa8c 73d92eea mswsock!Rnr_DoDnsLookup+0x364
02b4fd18 758bd862 mswsock!Dns_NSPLookupServiceNext+0x2fa
02b4fd44 758ac9e4 ws2_32!NSPROVIDER::NSPLookupServiceNext+0x35
02b4fd98 77d0f10c ws2_32!NSQUERY::LookupServiceNextAsyncCallback+0x134
02b4fdb8 77cdf6c3 ntdll!TppSimplepExecuteCallback+0x7c
02b4ff74 76ab7ba9 ntdll!TppWorkerThread+0x733
02b4ff84 77d0c36b kernel32!BaseThreadInitThunk+0x19
02b4ffdc 77d0c2ef ntdll!__RtlUserThreadStart+0x2b
02b4ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
b1a792d679927973e8de11cc0d584a91_000.dmp
Top 4: total counts = 1
0018f338 00415b4b ntdll!KiUserCallbackDispatcher+0x36
0018f368 0040903a dolphinsrv+0x15b4b
0018fe8c 00408a69 dolphinsrv+0x903a
0018ff34 0054502c dolphinsrv+0x8a69
0018ff80 76fc6a14 dolphinsrv+0x14502c
0018ff94 77a5a9ff kernel32!BaseThreadInitThunk+0x24
0018ffdc 77a5a9ca ntdll!__RtlUserThreadStart+0x2f
0018ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
dccc51b54eca0f4e9ec7b8f81fe3c534_010.dmp