Analyzed 6 dump

Top 1: total counts = 4

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019edc0 6c7a1bff 0x0
0019ede0 757f451b atlthunk!AtlThunk_0x0C+0x3f
0019ee0c 757d504c user32!_InternalCallWinProc+0x2b
0019eef0 757d4bea user32!UserCallWinProcCheckWow+0x3ac
0019ef54 757de23f user32!DispatchClientMessage+0xea
0019ef90 77ea428d user32!__fnDWORD+0x3f
0019efc8 762f353c ntdll!KiUserCallbackDispatcher+0x4d
0019efcc 004cd3d3 win32u!NtUserDestroyWindow+0xc
0019eff8 004bad65 360wpsrv!NewWpService::Unit+0xb3
0019f020 00427527 360wpsrv!CMainFrame::OnDestroy+0x255
0019f048 0042a48c 360wpsrv!CMainFrame::ProcessWindowMessage+0xc7
0019f098 6c7a18d6 360wpsrv!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019f0b8 757f451b atlthunk!AtlThunk_0x02+0x36
0019f0e4 757d504c user32!_InternalCallWinProc+0x2b
0019f1c8 757d4bea user32!UserCallWinProcCheckWow+0x3ac
0019f22c 757de23f user32!DispatchClientMessage+0xea
0019f268 77ea428d user32!__fnDWORD+0x3f
0019f2a0 762f353c ntdll!KiUserCallbackDispatcher+0x4d
0019f2a4 00423103 win32u!NtUserDestroyWindow+0xc
0019f2d4 00429594 360wpsrv!CMainFrame::~CMainFrame+0x133
0019feb8 0042b171 360wpsrv!Run+0x2c4
0019ff24 0057053c 360wpsrv!wWinMain+0x5b1
0019ff70 75b06359 360wpsrv!__scrt_common_main_seh+0xf8
0019ff80 77e97c24 kernel32!BaseThreadInitThunk+0x19
0019ffdc 77e97bf4 ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

c890319446ab062af5ddab3661c40ce3_000.dmp
dcdb170383186bd7305f819740bb7519_000.dmp
a10d8e43ae0399e47c9104fad8c4baf0_000.dmp
40f79792cd4403bd188ddf28793bfd32_000.dmp

Top 2: total counts = 2

ChildEBP RetAddr  
060efb0c 660b3089 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
060efb44 660b3040 NetUL+0x13089
060efb60 660b1613 NetUL+0x13040
060efdb8 648c1b29 NetUL+0x11613
060efee0 648dd088 LockScreen!FullScreenAdConfigTask::Run+0x239
060eff24 648dd2ea LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
060eff44 648c756a LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
060eff4c 64937c72 LockScreen!CImageDownload::DownloadThread+0xa
060eff88 76f4343d LockScreen!thread_start+0x57
060eff94 77599812 kernel32!BaseThreadInitThunk+0xe
060effd4 775997e5 ntdll!__RtlUserThreadStart+0x70
060effec 00000000 ntdll!_RtlUserThreadStart+0x1b

69304d3eadeeffbcf35d2337c7311d21_000.dmp
e5c956202b913ecf376f0a041a88b4a2_000.dmp