Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019eac0 74061b0f 0x0
0019eae0 758910db atlthunk!AtlThunk_0x09+0x3f
0019eb0c 758880aa user32!_InternalCallWinProc+0x2b
0019ebf0 75887caa user32!UserCallWinProcCheckWow+0x33a
0019ec54 7588b86f user32!DispatchClientMessage+0xea
0019ec90 77a24f3d user32!__fnDWORD+0x3f
0019ecc8 776719ac ntdll!KiUserCallbackDispatcher+0x4d
0019eccc 757e5e10 win32u!NtUserDestroyWindow+0xc
0019ece0 004a2c73 apphelp!DWM8AND16BitHook_DestroyWindow+0x20
0019ed0c 0048cb3f birdtray!NewWpService::Unit+0xb3
0019ed34 00495d24 birdtray!CMainFrame::DoDestroy+0x25f
0019ed68 004124e7 birdtray!CMainFrame::OnDestroy+0x44
0019ed90 0041525c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ede0 740618d6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ee00 758910db atlthunk!AtlThunk_0x02+0x36
0019ee2c 758880aa user32!_InternalCallWinProc+0x2b
0019ef10 75887caa user32!UserCallWinProcCheckWow+0x33a
0019ef74 7588b86f user32!DispatchClientMessage+0xea
0019efb0 77a24f3d user32!__fnDWORD+0x3f
0019efe8 776719ac ntdll!KiUserCallbackDispatcher+0x4d
0019efec 757e5e10 win32u!NtUserDestroyWindow+0xc
0019f000 0040da33 apphelp!DWM8AND16BitHook_DestroyWindow+0x20
0019f030 00414484 birdtray!CMainFrame::~CMainFrame+0x133
0019fc54 00416308 birdtray!Run+0x2c4
0019ff24 005391b4 birdtray!wWinMain+0x868
0019ff70 776b00c9 birdtray!__scrt_common_main_seh+0xf8
0019ff80 77a17b1e kernel32!BaseThreadInitThunk+0x19
0019ffdc 77a17aee ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

4d7c51553993b08027c0b45c0ebd526e_000.dmp