Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
04aefd20 63e13089 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
04aefd58 63e13040 NetUL+0x13089
04aefd74 63e11613 NetUL+0x13040
04aefee0 0fb19958 NetUL+0x11613
04aeff24 0fb19bca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
04aeff44 0faf082a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
04aeff4c 0fba4762 LockScreen!std::_Pad::_Call_func+0xa
04aeff88 75ff344d LockScreen!thread_start+0x57
04aeff94 77189802 kernel32!BaseThreadInitThunk+0xe
04aeffd4 771897d5 ntdll!__RtlUserThreadStart+0x70
04aeffec 00000000 ntdll!_RtlUserThreadStart+0x1b

625ad593d47fd1b42c01a2203e67ad81_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019ea5c 72181b5f 0x0
0019ea7c 75d7148b atlthunk!AtlThunk_0x0A+0x3f
0019eaa8 75d67b7a user32!_InternalCallWinProc+0x2b
0019eb90 75d67790 user32!UserCallWinProcCheckWow+0x33a
0019ebf4 75d6bc4f user32!DispatchClientMessage+0x190
0019ec30 773e56cd user32!__fnDWORD+0x3f
0019ec68 004ceb43 ntdll!KiUserCallbackDispatcher+0x4d
0019ec94 004b4991 birdtray!NewWpService::Unit+0xb3
0019ecd0 004be384 birdtray!CMainFrame::DoDestroy+0x261
0019ed04 0041c127 birdtray!CMainFrame::OnDestroy+0x44
0019ed2c 0041f08c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ed7c 72181926 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ed9c 75d7148b atlthunk!AtlThunk_0x03+0x36
0019edc8 75d67b7a user32!_InternalCallWinProc+0x2b
0019eeb0 75d67790 user32!UserCallWinProcCheckWow+0x33a
0019ef14 75d6bc4f user32!DispatchClientMessage+0x190
0019ef50 773e56cd user32!__fnDWORD+0x3f
0019ef88 76b019ac ntdll!KiUserCallbackDispatcher+0x4d
0019ef8c 00415552 win32u!NtUserDestroyWindow+0xc
0019efbc 0041e3a4 birdtray!CMainFrame::~CMainFrame+0x172
0019fbf8 004206ee birdtray!Run+0x2c4
0019ff24 00580bd4 birdtray!wWinMain+0xade
0019ff70 757dfcc9 birdtray!__scrt_common_main_seh+0xf8
0019ff80 773d82ae kernel32!BaseThreadInitThunk+0x19
0019ffdc 773d827e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

cb99d583ce8cf75b878d85be61d3a4e6_000.dmp