Analyzed 10 dump

Top 1: total counts = 2

ChildEBP RetAddr  
05a0fd04 5459368c KERNELBASE!RaiseException+0x64
WARNING: Stack unwind information not available. Following frames may be wrong.
05a0fd9c 7bd72109 NetUL+0x1368c
05a0fda4 7bd6c429 LockScreen!CHttpTaskFactory::CreateTask+0x19
05a0fecc 7bd99958 LockScreen!FullScreenAdConfigTask::Run+0x239
05a0ff10 7bd99bca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
05a0ff30 7bd7082a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
05a0ff38 7be24762 LockScreen!std::_Pad::_Call_func+0xa
05a0ff74 75e45d49 LockScreen!thread_start+0x57
05a0ff84 7780d03b kernel32!BaseThreadInitThunk+0x19
05a0ffdc 7780cfc1 ntdll!__RtlUserThreadStart+0x2b
05a0ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

88b39f5898d1af25f049a48d40eaf5e5_000.dmp
fb05ecce2e8c0cac71bd6311581ec255_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0511fec8 62983e19 NetUL+0x13e19
0511ff74 75f97d59 NetUL+0x13e19
0511ff84 76efb74b kernel32!BaseThreadInitThunk+0x19
0511ffdc 76efb6cf ntdll!__RtlUserThreadStart+0x2b
0511ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

1bd0352a715b43472f4b848f2b303f60_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
0a0efd98 5a9b2109 KERNELBASE!RaiseException+0x62
0a0efe10 77e18094 LockScreen!CHttpTaskFactory::CreateTask+0x19
0a0efec8 5a9d9958 ntdll!RtlpFreeHeapInternal+0x7aa
0a0eff0c 5a9d9bca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0a0eff2c 5a9b082a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
0a0eff34 5aa64762 LockScreen!std::_Pad::_Call_func+0xa
0a0eff70 77c6fcc9 LockScreen!thread_start+0x57
0a0eff80 77df80ce kernel32!BaseThreadInitThunk+0x19
0a0effdc 77df809e ntdll!__RtlUserThreadStart+0x2f
0a0effec 00000000 ntdll!_RtlUserThreadStart+0x1b

5b0c760e2345e10a1a18d8dc12efda96_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019ea60 6d581b5f 0x0
0019ea80 7628eebb atlthunk!AtlThunk_0x0A+0x3f
0019eaac 76285e7a user32!_InternalCallWinProc+0x2b
0019eb90 76285a7a user32!UserCallWinProcCheckWow+0x33a
0019ebf4 7628963f user32!DispatchClientMessage+0xea
0019ec30 77dc4e9d user32!__fnDWORD+0x3f
0019ec68 760d19ac ntdll!KiUserCallbackDispatcher+0x4d
0019ec6c 004ceb43 win32u!NtUserDestroyWindow+0xc
0019ec98 004b4991 birdtray!NewWpService::Unit+0xb3
0019ecd4 004be384 birdtray!CMainFrame::DoDestroy+0x261
0019ed08 0041c127 birdtray!CMainFrame::OnDestroy+0x44
0019ed30 0041f08c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ed80 6d581926 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019eda0 7628eebb atlthunk!AtlThunk_0x03+0x36
0019edcc 76285e7a user32!_InternalCallWinProc+0x2b
0019eeb0 76285a7a user32!UserCallWinProcCheckWow+0x33a
0019ef14 7628963f user32!DispatchClientMessage+0xea
0019ef50 77dc4e9d user32!__fnDWORD+0x3f
0019ef88 760d19ac ntdll!KiUserCallbackDispatcher+0x4d
0019ef8c 00415552 win32u!NtUserDestroyWindow+0xc
0019efbc 0041e3a4 birdtray!CMainFrame::~CMainFrame+0x172
0019fbf8 004206ee birdtray!Run+0x2c4
0019ff24 00580bd4 birdtray!wWinMain+0xade
0019ff70 7784fa29 birdtray!__scrt_common_main_seh+0xf8
0019ff80 77db7a9e kernel32!BaseThreadInitThunk+0x19
0019ffdc 77db7a6e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

d50a7253f34860fa1f8943adb61a4258_000.dmp

Top 5: total counts = 1

0344ff88 75c7386d birdtray!thread_start+0x57
0344ff94 777996f2 kernel32!BaseThreadInitThunk+0xe
0344ffd4 777996c5 ntdll!__RtlUserThreadStart+0x70
0344ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

7100c918a7c5e9fe6998e5c2111d3f25_001.dmp

Top 6: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0443fa2c 759b6308 SogouPY+0x1f3015
0443fa88 0443fab4 user32!_MonitorFromPoint+0x44
0443fa98 103bec94 0x443fab4
0443fa9c 001a40ef SogouPY+0x3bec94
0443faa0 00000000 0x1a40ef

f81b0ff037ad85a2bd90a311882a5542_001.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019ea54 71111c63 0x0
0019ea74 75af3433 atlthunk!AtlThunk_0x0A+0x43
0019eaa0 75ae4236 user32!_InternalCallWinProc+0x2b
0019eb98 75ae3cba user32!UserCallWinProcCheckWow+0x4c6
0019ebfc 75aedc1f user32!DispatchClientMessage+0xea
0019ec38 77e8916d user32!__fnDWORD+0x3f
0019ec70 004ccce3 ntdll!KiUserCallbackDispatcher+0x4d
0019ec9c 004b2f71 birdtray!NewWpService::Unit+0xb3
0019ecd8 004bc9f4 birdtray!CMainFrame::DoDestroy+0x261
0019ed0c 0041a347 birdtray!CMainFrame::OnDestroy+0x44
0019ed34 0041d2ac birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ed84 711119ba birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019eda4 75af3433 atlthunk!AtlThunk_0x03+0x3a
0019edd0 75ae4236 user32!_InternalCallWinProc+0x2b
0019eec8 75ae3cba user32!UserCallWinProcCheckWow+0x4c6
0019ef2c 75aedc1f user32!DispatchClientMessage+0xea
0019ef68 77e8916d user32!__fnDWORD+0x3f
0019efa0 00413772 ntdll!KiUserCallbackDispatcher+0x4d
0019efd0 0041c5c4 birdtray!CMainFrame::~CMainFrame+0x172
0019fbfc 0041e90e birdtray!Run+0x2c4
0019ff28 0057f6a4 birdtray!wWinMain+0xade
0019ff74 76fd7ba9 birdtray!__scrt_common_main_seh+0xf8
0019ff84 77e7c0cb kernel32!BaseThreadInitThunk+0x19
0019ffdc 77e7c04f ntdll!__RtlUserThreadStart+0x2b
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

fa0735646f4ad88bf353decafdc65408_000.dmp

Top 8: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
09650e68 00000000 NetUL+0x13e19

63d203f676e81ee9a50deb4cf5239c1d_000.dmp

Top 9: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
02ccfa80 05cbe742 LevinBoot+0xdd64
02ccfb1c 05cc925f LevinBoot+0xe742
02ccfd3c 05ce10ae LevinBoot+0x1925f
02ccff24 05ce2d1f LevinBoot+0x310ae
02ccff30 05cc35cf LevinBoot+0x32d1f
02ccff38 05db7f16 LevinBoot+0x135cf
02ccff70 7719fcc9 LevinBoot+0x107f16
02ccff80 773682ae kernel32!BaseThreadInitThunk+0x19
02ccffdc 7736827e ntdll!__RtlUserThreadStart+0x2f
02ccffec 00000000 ntdll!_RtlUserThreadStart+0x1b

023bfa60248804e6b8788c4453469d65_000.dmp