Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0563fd04 526b368c KERNELBASE!RaiseException+0x62
WARNING: Stack unwind information not available. Following frames may be wrong.
0563fd9c 51082109 NetUL+0x1368c
0563fda4 5107c429 LockScreen!CHttpTaskFactory::CreateTask+0x19
0563fecc 510a9958 LockScreen!FullScreenAdConfigTask::Run+0x239
0563ff10 510a9bca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
0563ff30 5108082a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
0563ff38 51134762 LockScreen!std::_Pad::_Call_func+0xa
0563ff74 76a17ba9 LockScreen!thread_start+0x57
0563ff84 7796c3ab kernel32!BaseThreadInitThunk+0x19
0563ffdc 7796c32f ntdll!__RtlUserThreadStart+0x2b
0563ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

fb7a2c56758c59f44706f1507e377c18_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019ea00 6ebd1cb3 0x0
0019ea20 74d49007 atlthunk!AtlThunk_0x0A+0x43
0019ea4c 74d3727d user32!_InternalCallWinProc+0x2b
0019eb50 74d36d10 user32!UserCallWinProcCheckWow+0x49d
0019ebb4 74d43609 user32!DispatchClientMessage+0x190
0019ebf0 7723bcd6 user32!__fnDWORD+0x39
0019ec28 6e494530 ntdll!KiUserCallbackDispatcher+0x36
0019ec3c 004cb0d3 apphelp!DWM8AND16BitHook_DestroyWindow+0x20
0019ec68 004b0de1 birdtray!NewWpService::Unit+0xb3
0019eca4 004ba884 birdtray!CMainFrame::DoDestroy+0x261
0019ecd8 00417e17 birdtray!CMainFrame::OnDestroy+0x44
0019ed00 0041ad7c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ed50 6ebd1a0a birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ed70 74d49007 atlthunk!AtlThunk_0x03+0x3a
0019ed9c 74d3727d user32!_InternalCallWinProc+0x2b
0019eea0 74d36d10 user32!UserCallWinProcCheckWow+0x49d
0019ef04 74d43609 user32!DispatchClientMessage+0x190
0019ef40 7723bcd6 user32!__fnDWORD+0x39
0019ef78 75191a8c ntdll!KiUserCallbackDispatcher+0x36
0019ef7c 6e494530 win32u!NtUserDestroyWindow+0xc
0019ef90 00411242 apphelp!DWM8AND16BitHook_DestroyWindow+0x20
0019efc0 0041a094 birdtray!CMainFrame::~CMainFrame+0x172
0019fbfc 0041c3de birdtray!Run+0x2c4
0019ff28 0057d754 birdtray!wWinMain+0xade
0019ff74 751c5d49 birdtray!__scrt_common_main_seh+0xf8
0019ff84 7722d03b kernel32!BaseThreadInitThunk+0x19
0019ffdc 7722cfc1 ntdll!__RtlUserThreadStart+0x2b
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

1f397f1b5810ca8ef16da880dd76c184_002.dmp