Analyzed 2 dump

Top 1: total counts = 2

064ff650 79aad0c4 Basic+0x5e479
064ff658 79aad4c4 Misc!std::_Invoker_pmf_pointer::_Call+0x14
064ff668 79aacfd2 Misc!std::invoke+0x24
064ff678 79aad17f Misc!std::_Invoker_ret::_Call+0x22
064ff688 79aacf57 Misc!std::_Call_binder,std::tuple<> >+0x2f
064ff6ac 79aad036 Misc!std::_Binder::operator()<>+0x37
064ff6b4 79aad505 Misc!std::_Invoker_functor::_Call &>+0x16
064ff6c0 79aad055 Misc!std::invoke &>+0x15
064ff6cc 79aaed33 Misc!std::_Invoker_ret::_Call &>+0x15
064ff6dc 79aaf535 Misc!std::_Func_impl_no_alloc,void>::_Do_call+0x13
064ff6ec 79aafdcc Misc!std::_Func_class::operator()+0x35
064ff780 79aafc02 Misc!CWorkThread::_ThreadProc+0xdc
064ff78c 7676fcc9 Misc!CWorkThread::_StaticThreadProc+0x12
064ff79c 77df82ae kernel32!BaseThreadInitThunk+0x19
064ff7f8 77df827e ntdll!__RtlUserThreadStart+0x2f
064ff808 00000000 ntdll!_RtlUserThreadStart+0x1b

06d6748c8ffcfd9d37338cad5fc779a5_000.dmp
50b4b06312579308023253602a093cc0_000.dmp