Analyzed 2 dump

Top 1: total counts = 1

0019eae4 75813773 atlthunk!AtlThunk_0x09+0x43
0019eb10 75804596 user32!_InternalCallWinProc+0x2b
0019ec08 7580401a user32!UserCallWinProcCheckWow+0x4c6
0019ec6c 7580df5f user32!DispatchClientMessage+0xea
0019eca8 7733919d user32!__fnDWORD+0x3f
0019ece0 753019ec ntdll!KiUserCallbackDispatcher+0x4d
0019ece4 004c23b3 win32u!NtUserDestroyWindow+0xc
0019ed10 004a8d3f birdtray!NewWpService::Unit+0xb3
0019ed38 004b2454 birdtray!CMainFrame::DoDestroy+0x25f
0019ed6c 00413f77 birdtray!CMainFrame::OnDestroy+0x44
0019ed94 00416cec birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ede4 70f0195a birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ee04 75813773 atlthunk!AtlThunk_0x02+0x3a
0019ee30 75804596 user32!_InternalCallWinProc+0x2b
0019ef28 7580401a user32!UserCallWinProcCheckWow+0x4c6
0019ef8c 7580df5f user32!DispatchClientMessage+0xea
0019efc8 7733919d user32!__fnDWORD+0x3f
0019f000 753019ec ntdll!KiUserCallbackDispatcher+0x4d
0019f004 0040f158 win32u!NtUserDestroyWindow+0xc
0019f034 00415f14 birdtray!CMainFrame::~CMainFrame+0x148
0019fc60 00417ea5 birdtray!Run+0x2c4
0019ff28 00566c94 birdtray!wWinMain+0x8a5
0019ff74 75707ba9 birdtray!__scrt_common_main_seh+0xf8
0019ff84 7732c10b kernel32!BaseThreadInitThunk+0x19
0019ffdc 7732c08f ntdll!__RtlUserThreadStart+0x2b
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

782cb143af3d17781e68595677474cb8_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
046ffd78 0452250d KERNELBASE!RaiseException+0x62
046ffd98 0445d1b9 LockScreen!_free_base+0x1c
046ffe10 77c77924 LockScreen!CHttpTaskFactory::CreateTask+0x19
046ffec8 04484558 ntdll!RtlpFreeHeapInternal+0x7aa
046fff0c 044847ca LockScreen!ScheduledTasksMgr::TaskDispatcher+0x88
046fff2c 0445b8da LockScreen!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
046fff34 0450edf2 LockScreen!std::_Pad::_Call_func+0xa
046fff70 77a7fa29 LockScreen!thread_start+0x57
046fff80 77c57a7e kernel32!BaseThreadInitThunk+0x19
046fffdc 77c57a4e ntdll!__RtlUserThreadStart+0x2f
046fffec 00000000 ntdll!_RtlUserThreadStart+0x1b

e8f3a415fd3f4f81adf0994a76f3a143_000.dmp