Analyzed 4 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0559fd98 7a7a2109 KERNELBASE!RaiseException+0x62
0559fe10 77498014 LockScreen!CHttpTaskFactory::CreateTask+0x19
0559fec8 7a7c9958 ntdll!RtlpFreeHeapInternal+0x7aa
0559ff0c 7a7c9bca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0559ff2c 7a7a082a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
0559ff34 7a854762 LockScreen!std::_Pad::_Call_func+0xa
0559ff70 7598fcc9 LockScreen!thread_start+0x57
0559ff80 7747809e kernel32!BaseThreadInitThunk+0x19
0559ffdc 7747806e ntdll!__RtlUserThreadStart+0x2f
0559ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

5ed3285a00cd17ee89e7efe462085f69_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019d8a8 64011acf 0x0
0019d8c8 773de0bb atlthunk!GetAtlThunkData+0x32c
0019d8f4 773e8849 user32!_InternalCallWinProc+0x2b
0019d918 773eb145 user32!InternalCallWinProc+0x20
0019d9e8 773d8503 user32!UserCallWinProcCheckWow+0x1be
0019da50 773d8aa0 user32!DispatchClientMessage+0x1b3
0019da98 77e80bad user32!__fnDWORD+0x50
0019dad0 7485337c ntdll!KiUserCallbackDispatcher+0x4d
0019dad4 004c7c03 win32u!NtUserDestroyWindow+0xc
0019db00 004aeb01 birdtray!NewWpService::Unit+0xb3
0019db3c 004b7bf4 birdtray!CMainFrame::DoDestroy+0x261
0019db70 00416fd7 birdtray!CMainFrame::OnDestroy+0x44
0019db98 00419c5c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019dbe8 64011896 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019dc08 773de0bb atlthunk!GetAtlThunkData+0xf3
0019dc34 773e8849 user32!_InternalCallWinProc+0x2b
0019dc58 773eb145 user32!InternalCallWinProc+0x20
0019dd28 773d8503 user32!UserCallWinProcCheckWow+0x1be
0019dd90 773d8aa0 user32!DispatchClientMessage+0x1b3
0019ddd8 77e80bad user32!__fnDWORD+0x50
0019de14 00410608 ntdll!KiUserCallbackDispatcher+0x4d
0019de44 005efdd7 birdtray!CMainFrame::~CMainFrame+0x148
0019fc58 0041b192 birdtray!_NLG_Return
0019ff34 005754e4 birdtray!wWinMain+0xa52
0019ff80 769a8654 birdtray!__scrt_common_main_seh+0xf8
0019ff94 77e74a47 kernel32!BaseThreadInitThunk+0x24
0019ffdc 77e74a17 ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

0bf76cd58ec04af7a90b059e29b29fdd_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019d4fc 73951b0f 0x0
0019d51c 7631164b atlthunk!AtlThunk_0x09+0x3f
0019d548 76307dba user32!_InternalCallWinProc+0x2b
0019d630 763079ba user32!UserCallWinProcCheckWow+0x33a
0019d694 7630be8f user32!DispatchClientMessage+0xea
0019d6d0 775354bd user32!__fnDWORD+0x3f
0019d708 004c7c03 ntdll!KiUserCallbackDispatcher+0x4d
0019d734 004aeb01 birdtray!NewWpService::Unit+0xb3
0019d770 004b7bf4 birdtray!CMainFrame::DoDestroy+0x261
0019d7a4 00416fd7 birdtray!CMainFrame::OnDestroy+0x44
0019d7cc 00419c5c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019d81c 739518d6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019d83c 7631164b atlthunk!AtlThunk_0x02+0x36
0019d868 76307dba user32!_InternalCallWinProc+0x2b
0019d950 763079ba user32!UserCallWinProcCheckWow+0x33a
0019d9b4 7630be8f user32!DispatchClientMessage+0xea
0019d9f0 775354bd user32!__fnDWORD+0x3f
0019da28 7732107c ntdll!KiUserCallbackDispatcher+0x4d
0019da2c 76306db6 win32u!NtUserMessageCall+0xc
0019dac0 76305ebc user32!RealDefWindowProcWorker+0x277
0019dad8 76306ad6 user32!RealDefWindowProcW+0x2c
0019db28 7631164b user32!DefWindowProcW+0xd6
0019db54 76307dba user32!_InternalCallWinProc+0x2b
0019dc3c 76307576 user32!UserCallWinProcCheckWow+0x33a
0019dc74 76305d9b user32!CallWindowProcAorW+0x7f
0019dc8c 00419c7c user32!CallWindowProcW+0x1b
0019dcd8 73951886 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x8c
0019dcf8 7631164b atlthunk!AtlThunk_0x01+0x36
0019dd24 76307dba user32!_InternalCallWinProc+0x2b
0019de0c 763066f1 user32!UserCallWinProcCheckWow+0x33a
0019de88 76306210 user32!DispatchMessageWorker+0x4d1
0019de94 756e1372 user32!DispatchMessageW+0x10
0019dee4 7568a5d6 shell32!SHProcessMessagesUntilEventsEx+0xfe
0019df14 7568c145 shell32!CShellExecute::_RunThreadMaybeWait+0x7d
0019e01c 756da8d2 shell32!CShellExecute::ExecuteNormal+0x1d8
0019e060 756da397 shell32!ShellExecuteNormal+0xc1
0019e140 00484b4c shell32!ShellExecuteExW+0x97
0019e3b8 76d98082 birdtray!CDbgHelper::_MiniDumpHanlder+0x2ec
0019e454 77570454 KERNELBASE!UnhandledExceptionFilter+0x192
0019e500 77535416 ntdll!LdrpLogFatalUserCallbackException+0x81
0019e50c 77548fb2 ntdll!KiUserCallbackExceptionHandler+0x26
0019e530 77548f84 ntdll!ExecuteHandler2+0x26
0019e5f8 77535506 ntdll!ExecuteHandler+0x24
0019e5f8 00000000 ntdll!KiUserExceptionDispatcher+0x26

13b81cc9c84ef061bfc6275a2663b6d4_002.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
010fe7a0 72351b0f 0x0
010fe7c0 76ce139b atlthunk!AtlThunk_0x09+0x3f
010fe7ec 76cd836a user32!_InternalCallWinProc+0x2b
010fe8d0 76cd7f6a user32!UserCallWinProcCheckWow+0x33a
010fe934 76cdbb2f user32!DispatchClientMessage+0xea
010fe970 770c4f5d user32!__fnDWORD+0x3f
010fe9a8 762a19ac ntdll!KiUserCallbackDispatcher+0x4d
010fe9ac 100c7c43 win32u!NtUserDestroyWindow+0xc
010fe9d8 100aeb41 birdsrv!NewWpService::Unit+0xb3
010fea14 100b7c34 birdsrv!CMainFrame::DoDestroy+0x261
010fea48 10017017 birdsrv!CMainFrame::OnDestroy+0x44
010fea70 10019c9c birdsrv!CMainFrame::ProcessWindowMessage+0xc7
010feac0 723518d6 birdsrv!ATL::CWindowImplBaseT >::WindowProc+0x6c
010feae0 76ce139b atlthunk!AtlThunk_0x02+0x36
010feb0c 76cd836a user32!_InternalCallWinProc+0x2b
010febf0 76cd7f6a user32!UserCallWinProcCheckWow+0x33a
010fec54 76cdbb2f user32!DispatchClientMessage+0xea
010fec90 770c4f5d user32!__fnDWORD+0x3f
010fecc8 10010608 ntdll!KiUserCallbackDispatcher+0x4d
010fecf8 10018fb4 birdsrv!CMainFrame::~CMainFrame+0x148
010ff924 1001b1d2 birdsrv!Run+0x2c4
010ffc00 10015cdc birdsrv!wWinMain+0xa52
010ffc1c 006e10b8 birdsrv!LoadWpSrv+0x2c
010ffca0 006e13d5 BirdWallpaper!wWinMain+0xb8
010ffcec 767800c9 BirdWallpaper!__scrt_common_main_seh+0xf8
010ffcfc 770b7b4e kernel32!BaseThreadInitThunk+0x19
010ffd58 770b7b1e ntdll!__RtlUserThreadStart+0x2f
010ffd68 00000000 ntdll!_RtlUserThreadStart+0x1b

9a33c8296e26a94eb97ddb5d21e37cde_000.dmp