Analyzed 6 dump

Top 1: total counts = 2

0487fdb8 0fd16fb9 NetULEx+0x11613
0487fee0 0fd32288 LockScreen!FullScreenAdConfigTask::Run+0x239
0487ff24 0fd324ea LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0487ff44 0fd1d2ca LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
0487ff4c 0fd8c872 LockScreen!CImageDownload::DownloadThread+0xa
0487ff88 755b347d LockScreen!thread_start+0x57
0487ff94 770b9732 kernel32!BaseThreadInitThunk+0xe
0487ffd4 770b9705 ntdll!__RtlUserThreadStart+0x70
0487ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

af0fb3614b376714d8eb217bd57bd807_000.dmp
59af16f5e639642a84c8e22e892bbb23_002.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
0476fb48 7788598b ntdll!TppRaiseInvalidParameter+0x37
0476fb60 778824f5 ntdll!TppCancelWait+0xc4
0476fb84 77866430 ntdll!TpSetWaitEx+0x55
0476fbd4 75be3017 ntdll!RtlDeregisterWaitEx+0x70
0476fbe4 7627b882 KERNELBASE!UnregisterWaitEx+0x17
0476fbfc 7625eb5e crypt32!I_UnregisterWaitEx+0x11
0476fc10 7625e528 crypt32!RegStoreProvClose+0xde
0476fc54 7625e3e6 crypt32!CloseStore+0xb8
0476fc70 7625e8a7 crypt32!CertCloseStore+0x86
0476fcb4 7625e3e6 crypt32!CloseStore+0x437
0476fcd0 7625e8a7 crypt32!CertCloseStore+0x86
0476fd14 7625e3e6 crypt32!CloseStore+0x437
0476fd30 762e79a0 crypt32!CertCloseStore+0x86
0476fd48 762e63db crypt32!CCertChainEngine::~CCertChainEngine+0x14f
0476fd5c 762eb915 crypt32!CertFreeCertificateChainEngine+0x2b
0476fd7c 7629c5bc crypt32!CDefaultChainEngineMgr::AutoFlushEngineInfoCallback+0xcd
0476fd94 7787dc8a crypt32!AutoFlushEngineTimerCallback+0x1b5dc
0476fdb8 7787eb27 ntdll!TppTimerpExecuteCallback+0x8a
0476ff74 764a7d59 ntdll!TppWorkerThread+0x727
0476ff84 778ab74b kernel32!BaseThreadInitThunk+0x19
0476ffdc 778ab6cf ntdll!__RtlUserThreadStart+0x2b
0476ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

c484c9956f774f994c9008148aa32915_000.dmp

Top 3: total counts = 1

0019f324 00416571 user32!DispatchMessageW+0x10
WARNING: Stack unwind information not available. Following frames may be wrong.
0019f348 004096ea dolphinsrv+0x16571
0019fe6c 0040911e dolphinsrv+0x96ea
0019ff24 0054c7ec dolphinsrv+0x911e
0019ff70 76defa29 dolphinsrv+0x14c7ec
0019ff80 774b7a9e kernel32!BaseThreadInitThunk+0x19
0019ffdc 774b7a6e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

2002a9696a54be4ac508b4bd589c2b34_000.dmp

Top 4: total counts = 1

0012f374 00416571 user32!DispatchMessageW+0xf
0012f398 004096ea dolphinsrv+0x16571
0012febc 0040911e dolphinsrv+0x96ea
0012ff74 0054c7ec dolphinsrv+0x911e
0012ffc0 7c816037 dolphinsrv+0x14c7ec
0012fff0 00000000 kernel32!BaseProcessStart+0x23

84ac59cbf427a664e0da9336e01ea661_000.dmp

Top 5: total counts = 1

02f1fa94 698f285f urlmon!URLDownloadToCacheFileW+0x84
02f1fef0 698f2574 LockScreen!CLdsStatisticImpl::InternalDownloadFile+0x8f
02f1ff4c 6992c872 LockScreen!CLdsStatisticImpl::DownloadThreadProc+0x124
02f1ff88 75bd343d LockScreen!thread_start+0x57
02f1ff94 77909802 kernel32!BaseThreadInitThunk+0xe
02f1ffd4 779097d5 ntdll!__RtlUserThreadStart+0x70
02f1ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

a92e9898db1592d9b6ef2e5f413ff541_001.dmp