Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019eac4 71f21c03 0x0
0019eae4 7671398f atlthunk!AtlThunk_0x09+0x43
0019eb10 76704376 user32!_InternalCallWinProc+0x2b
0019ec08 76703df0 user32!UserCallWinProcCheckWow+0x4c6
0019ec6c 7670df6f user32!DispatchClientMessage+0x190
0019eca8 779c937d user32!__fnDWORD+0x3f
0019ece0 77591a0c ntdll!KiUserCallbackDispatcher+0x4d
0019ece4 00495e53 win32u!NtUserDestroyWindow+0xc
0019ed10 0047fc6d birdtray!NewWpService::Unit+0xb3
0019ed38 00488d34 birdtray!CMainFrame::DoDestroy+0x26d
0019ed6c 004121e7 birdtray!CMainFrame::OnDestroy+0x44
0019ed94 00414f5c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ede4 71f2195a birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ee04 7671398f atlthunk!AtlThunk_0x02+0x3a
0019ee30 76704376 user32!_InternalCallWinProc+0x2b
0019ef28 76703df0 user32!UserCallWinProcCheckWow+0x4c6
0019ef8c 7670df6f user32!DispatchClientMessage+0x190
0019efc8 779c937d user32!__fnDWORD+0x3f
0019f000 77591a0c ntdll!KiUserCallbackDispatcher+0x4d
0019f004 0040d733 win32u!NtUserDestroyWindow+0xc
0019f034 00414184 birdtray!CMainFrame::~CMainFrame+0x133
0019fc58 00416008 birdtray!Run+0x2c4
0019ff28 0051fb64 birdtray!wWinMain+0x868
0019ff74 763e7ba9 birdtray!__scrt_common_main_seh+0xf8
0019ff84 779bc2eb kernel32!BaseThreadInitThunk+0x19
0019ffdc 779bc26f ntdll!__RtlUserThreadStart+0x2b
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

8c459216ea875ded69d513f07f4fbc49_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
00dcfa60 00f2128f 0x0
00f20000 00000000 BirdWallpaper!__scrt_common_main_seh+0x17b

2a802245efda5055970a963513ae781b_000.dmp