Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00ef8448 72d416d7 atlthunk!AtlThunkData+0x10
00ef8474 72d41946 atlthunk!AtlThunk_Call+0x72
00ef8484 746bd2d3 atlthunk!AtlThunk_0x12+0x16
00ef84b0 7469d30a user32!_InternalCallWinProc+0x2b
00ef8598 7469cf30 user32!UserCallWinProcCheckWow+0x30a
00ef85f8 746a7e49 user32!DispatchClientMessage+0xf0
00ef8638 776b0d96 user32!__fnDWORD+0x49
00ef8670 74e12e4c ntdll!KiUserCallbackDispatcher+0x36
00ef8674 003b49b4 win32u!NtUserDestroyWindow+0xc
00ef8684 00413cd2 birdwp!ATL::CWindowImplBaseT >::DestroyWindow+0x14
00ef8694 00413bb9 birdwp!CMemberSummaryPage::Unit+0x52
00ef86a0 00521643 birdwp!CMemberSummaryPage::~CMemberSummaryPage+0x39
00ef86b0 004cedf7 birdwp!CTopWnd::~CTopWnd+0x133
00ef86bc 004cc1c8 birdwp!CAppContainerWnd::~CAppContainerWnd+0xb7
00efff34 005b1425 birdwp!wWinMain+0x5d8
00efff80 770d62c4 birdwp!__scrt_common_main_seh+0xf8
00efff94 776a1b69 kernel32!BaseThreadInitThunk+0x24
00efffdc 776a1b34 ntdll!__RtlUserThreadStart+0x2f
00efffec 00000000 ntdll!_RtlUserThreadStart+0x1b

12372d424fb4338ace50504a1acb4cf0_000.dmp