Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019eb3c 71b61bff 0x0
0019eb5c 776015eb atlthunk!AtlThunk_0x0C+0x3f
0019eb88 775f7cda user32!_InternalCallWinProc+0x2b
0019ec70 775f78f0 user32!UserCallWinProcCheckWow+0x33a
0019ecd4 775fbdaf user32!DispatchClientMessage+0x190
0019ed10 77e656cd user32!__fnDWORD+0x3f
0019ed48 75ed19ac ntdll!KiUserCallbackDispatcher+0x4d
0019ed4c 75be7760 win32u!NtUserDestroyWindow+0xc
0019ed60 004cdef3 apphelp!DWM8AND16BitHook_DestroyWindow+0x20
0019ed8c 004bb765 birdsrv!NewWpService::Unit+0xb3
0019edb4 004277a7 birdsrv!CMainFrame::OnDestroy+0x255
0019eddc 0042a87c birdsrv!CMainFrame::ProcessWindowMessage+0xc7
0019ee2c 71b618d6 birdsrv!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ee4c 776015eb atlthunk!AtlThunk_0x02+0x36
0019ee78 775f7cda user32!_InternalCallWinProc+0x2b
0019ef60 775f78f0 user32!UserCallWinProcCheckWow+0x33a
0019efc4 775fbdaf user32!DispatchClientMessage+0x190
0019f000 77e656cd user32!__fnDWORD+0x3f
0019f038 75be7760 ntdll!KiUserCallbackDispatcher+0x4d
0019f04c 004232c3 apphelp!DWM8AND16BitHook_DestroyWindow+0x20
0019f07c 00429984 birdsrv!CMainFrame::~CMainFrame+0x133
0019fc60 0042b70b birdsrv!Run+0x2c4
0019ff24 0057123c birdsrv!wWinMain+0x75b
0019ff70 7662fcc9 birdsrv!__scrt_common_main_seh+0xf8
0019ff80 77e582ae kernel32!BaseThreadInitThunk+0x19
0019ffdc 77e5827e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

9f9c1c2a2ace931fe0de955b1e90e95c_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
09760860 097600c0 NetUL+0x13e19
097629bc 00000000 0x97600c0

0e8d544fc7e805f88466d489087e76c3_000.dmp