. 0 Id: 3dd8.192c Suspend: 1 Teb: 000000b7`7665e000 Unfrozen Child-SP RetAddr Call Site 000000b7`768ff720 00007ffe`89bd24c3 Qt6Guid!std::_Atomic_integral::operator--(void)+0x18 [C:\Program Files (x86)\Microsoft Visual Studio\2019\Professional\VC\Tools\MSVC\14.25.28610\include\atomic @ 1022] 000000b7`768ff750 00007ffe`89bd60b6 Qt6Guid!QAtomicOps::deref(struct std::atomic * _q_value = 0x00000000`00000000)+0x13 [C:\dev\qt-dev\qt-dev\qtbase\src\corelib\thread\qatomic_cxx11.h @ 289] 000000b7`768ff790 00007ffe`89d4a939 Qt6Guid!QBasicAtomicInteger::deref(void)+0x16 [C:\dev\qt-dev\qt-dev\qtbase\src\corelib\thread\qbasicatomic.h @ 119] 000000b7`768ff7c0 00007ffe`891dd242 Qt6Guid!QKeySequence::~QKeySequence(void)+0x19 [C:\dev\qt-dev\qt-dev\qtbase\src\gui\kernel\qkeysequence.cpp @ 900] 000000b7`768ff800 00007ffe`891dcc83 Qt6Widgetsd!QAbstractButton::qt_static_metacall(class QObject * _o = 0x000000b7`768ffbc8, QMetaObject::Call _c = ReadProperty (0n1), int _id = 0n3, void ** _a = 0x000000b7`768ffab0)+0x532 [C:\dev\qt-dev\qt-dev\qtbase\src\widgets\.moc\debug\moc_qabstractbutton.cpp @ 200] 000000b7`768ff8f0 00007ffe`8932aa1f Qt6Widgetsd!QAbstractButton::qt_metacall(QMetaObject::Call _c = ReadProperty (0n1), int _id = 0n3, void ** _a = 0x000000b7`768ffab0)+0xe3 [C:\dev\qt-dev\qt-dev\qtbase\src\widgets\.moc\debug\moc_qabstractbutton.cpp @ 276] 000000b7`768ff920 00007ffe`884a4cb8 Qt6Widgetsd!QPushButton::qt_metacall(QMetaObject::Call _c = ReadProperty (0n1), int _id = 0n63, void ** _a = 0x000000b7`768ffab0)+0x2f [C:\dev\qt-dev\qt-dev\qtbase\src\widgets\.moc\debug\moc_qpushbutton.cpp @ 140] 000000b7`768ff950 00007ffe`884a8449 Qt6Cored!QMetaObject::metacall(class QObject * object = 0x000000b7`768ffbc8, QMetaObject::Call cl = ReadProperty (0n1), int idx = 0n63, void ** argv = 0x000000b7`768ffab0)+0xa8 [C:\dev\qt-dev\qt-dev\qtbase\src\corelib\kernel\qmetaobject.cpp @ 321] 000000b7`768ff9b0 00007ff7`7acf152c Qt6Cored!QMetaProperty::read(class QObject * object = 0x000000b7`768ffbc8)+0x249 [C:\dev\qt-dev\qt-dev\qtbase\src\corelib\kernel\qmetaobject.cpp @ 3097] 000000b7`768ffae0 00007ff7`7acf1b39 mpread!main(int argc = 0n1, char ** argv = 0x00000286`853185d0)+0x18c [C:\dev\projects\mpread\main.cpp @ 16] 000000b7`768ffc90 00007ff7`7acf19de mpread!invoke_main(void)+0x39 [d:\agent\_work\4\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 79] 000000b7`768ffce0 00007ff7`7acf189e mpread!__scrt_common_main_seh(void)+0x12e [d:\agent\_work\4\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 288] 000000b7`768ffd50 00007ff7`7acf1bc9 mpread!__scrt_common_main(void)+0xe [d:\agent\_work\4\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 331] 000000b7`768ffd80 00007ffe`d0e94034 mpread!mainCRTStartup(void)+0x9 [d:\agent\_work\4\s\src\vctools\crt\vcstartup\src\startup\exe_main.cpp @ 17] 000000b7`768ffdb0 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`768ffde0 00000000`00000000 ntdll!RtlUserThreadStart+0x21 1 Id: 3dd8.4768 Suspend: 1 Teb: 000000b7`76660000 Unfrozen Child-SP RetAddr Call Site 000000b7`769ff8f8 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`769ff900 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`769ffbf0 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`769ffc20 00000000`00000000 ntdll!RtlUserThreadStart+0x21 2 Id: 3dd8.3b1c Suspend: 1 Teb: 000000b7`76662000 Unfrozen Child-SP RetAddr Call Site 000000b7`76aff538 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`76aff540 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`76aff830 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`76aff860 00000000`00000000 ntdll!RtlUserThreadStart+0x21 3 Id: 3dd8.3904 Suspend: 1 Teb: 000000b7`76664000 Unfrozen Child-SP RetAddr Call Site 000000b7`76bff688 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`76bff690 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`76bff980 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`76bff9b0 00000000`00000000 ntdll!RtlUserThreadStart+0x21 4 Id: 3dd8.34f8 Suspend: 1 Teb: 000000b7`76666000 Unfrozen Child-SP RetAddr Call Site 000000b7`76cffb28 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`76cffb30 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`76cffe20 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`76cffe50 00000000`00000000 ntdll!RtlUserThreadStart+0x21 5 Id: 3dd8.2b84 Suspend: 1 Teb: 000000b7`76668000 Unfrozen Child-SP RetAddr Call Site 000000b7`76dff848 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`76dff850 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`76dffb40 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`76dffb70 00000000`00000000 ntdll!RtlUserThreadStart+0x21 6 Id: 3dd8.4854 Suspend: 1 Teb: 000000b7`7666a000 Unfrozen Child-SP RetAddr Call Site 000000b7`76eff648 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`76eff650 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`76eff940 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`76eff970 00000000`00000000 ntdll!RtlUserThreadStart+0x21 7 Id: 3dd8.289c Suspend: 1 Teb: 000000b7`7666c000 Unfrozen Child-SP RetAddr Call Site 000000b7`76fff738 00007ffe`d1826866 ntdll!ZwWaitForWorkViaWorkerFactory+0x14 000000b7`76fff740 00007ffe`d0e94034 ntdll!RtlReleaseSRWLockExclusive+0x576 000000b7`76fffa30 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`76fffa60 00000000`00000000 ntdll!RtlUserThreadStart+0x21 8 Id: 3dd8.3a3c Suspend: 1 Teb: 000000b7`7666e000 Unfrozen Child-SP RetAddr Call Site 000000b7`770ff638 00007ffe`ce606069 ntdll!ZwWaitForMultipleObjects+0x14 000000b7`770ff640 00007ffe`d0b97137 KERNELBASE!WaitForMultipleObjectsEx+0xf9 000000b7`770ff940 00007ffe`d0b91610 combase!CoGetProcessIdentifier+0x7387 000000b7`770ffbd0 00007ffe`d0b94591 combase!CoGetProcessIdentifier+0x1860 000000b7`770ffc20 00007ffe`d0c17a6c combase!CoGetProcessIdentifier+0x47e1 000000b7`770ffc80 00007ffe`d0e94034 combase!CoRegisterPSClsid+0x31c 000000b7`770ffcb0 00007ffe`d1873691 KERNEL32!BaseThreadInitThunk+0x14 000000b7`770ffce0 00000000`00000000 ntdll!RtlUserThreadStart+0x21