Analyzed 4 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0485fec8 7abe3e19 NetUL+0x13e19
0485ff70 746c6359 NetUL+0x13e19
0485ff80 76f27b74 kernel32!BaseThreadInitThunk+0x19
0485ffdc 76f27b44 ntdll!__RtlUserThreadStart+0x2f
0485ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

b9cf69d142118ef57204d95e654871d0_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019ea60 74131b7f 0x0
0019ea80 75bb5d1b atlthunk!AtlThunk_0x0B+0x3f
0019eaac 75ba682c user32!_InternalCallWinProc+0x2b
0019eb90 75ba63ca user32!UserCallWinProcCheckWow+0x3ac
0019ebf4 75bb318f user32!DispatchClientMessage+0xea
0019ec30 779e3a1d user32!__fnDWORD+0x3f
0019ec68 778634cc ntdll!KiUserCallbackDispatcher+0x4d
0019ec6c 004d9a53 win32u!NtUserDestroyWindow+0xc
0019ec98 004bfdbd birdtray!NewWpService::Unit+0xb3
0019ecd4 004c9084 birdtray!CMainFrame::DoDestroy+0x26d
0019ed08 00418377 birdtray!CMainFrame::OnDestroy+0x44
0019ed30 0041b2dc birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ed80 741318f6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019eda0 75bb5d1b atlthunk!AtlThunk_0x03+0x36
0019edcc 75ba682c user32!_InternalCallWinProc+0x2b
0019eeb0 75ba63ca user32!UserCallWinProcCheckWow+0x3ac
0019ef14 75bb318f user32!DispatchClientMessage+0xea
0019ef50 779e3a1d user32!__fnDWORD+0x3f
0019ef88 778634cc ntdll!KiUserCallbackDispatcher+0x4d
0019ef8c 00411732 win32u!NtUserDestroyWindow+0xc
0019efbc 0041a5f4 birdtray!CMainFrame::~CMainFrame+0x172
0019fbf8 0041c93e birdtray!Run+0x2c4
0019ff24 005914e4 birdtray!wWinMain+0xade
0019ff70 75ee0419 birdtray!__scrt_common_main_seh+0xf8
0019ff80 779d77fd kernel32!BaseThreadInitThunk+0x19
0019ffdc 779d77cd ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

30f5956a02c80033602594d429fffa1e_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
051efec8 5b6a3e19 NetUL+0x13e19
051eff74 75a37ba9 NetUL+0x13e19
051eff84 7760c3ab kernel32!BaseThreadInitThunk+0x19
051effdc 7760c32f ntdll!__RtlUserThreadStart+0x2b
051effec 00000000 ntdll!_RtlUserThreadStart+0x1b

dcd67965170844b78db35b676ebeeeb0_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
04c2fd04 68f4368c KERNELBASE!RaiseException+0x64
WARNING: Stack unwind information not available. Following frames may be wrong.
04c2fd9c 6339f4c9 NetUL+0x1368c
04c2fda4 633997d9 LockScreen!CHttpTaskFactory::CreateTask+0x19
04c2fecc 633c6d08 LockScreen!FullScreenAdConfigTask::Run+0x239
04c2ff10 633c6f7a LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
04c2ff30 6339dbda LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
04c2ff38 634528e2 LockScreen!std::_Pad::_Call_func+0xa
04c2ff74 75825d49 LockScreen!thread_start+0x57
04c2ff84 778cd1ab kernel32!BaseThreadInitThunk+0x19
04c2ffdc 778cd131 ntdll!__RtlUserThreadStart+0x2b
04c2ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

668f356eac5413d703e8524446b84eb4_000.dmp