Analyzed 4 dump

Top 1: total counts = 2

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019ea5c 73551b5f 0x0
0019ea7c 76fe157b atlthunk!AtlThunk_0x0A+0x3f
0019eaa8 76fd7c5a user32!_InternalCallWinProc+0x2b
0019eb90 76fd7870 user32!UserCallWinProcCheckWow+0x33a
0019ebf4 76fdbd3f user32!DispatchClientMessage+0x190
0019ec30 771e56cd user32!__fnDWORD+0x3f
0019ec68 004ceb43 ntdll!KiUserCallbackDispatcher+0x4d
0019ec94 004b4991 birdtray!NewWpService::Unit+0xb3
0019ecd0 004be384 birdtray!CMainFrame::DoDestroy+0x261
0019ed04 0041c127 birdtray!CMainFrame::OnDestroy+0x44
0019ed2c 0041f08c birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019ed7c 73551926 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ed9c 76fe157b atlthunk!AtlThunk_0x03+0x36
0019edc8 76fd7c5a user32!_InternalCallWinProc+0x2b
0019eeb0 76fd7870 user32!UserCallWinProcCheckWow+0x33a
0019ef14 76fdbd3f user32!DispatchClientMessage+0x190
0019ef50 771e56cd user32!__fnDWORD+0x3f
0019ef88 771419ac ntdll!KiUserCallbackDispatcher+0x4d
0019ef8c 00415552 win32u!NtUserDestroyWindow+0xc
0019efbc 0041e3a4 birdtray!CMainFrame::~CMainFrame+0x172
0019fbf8 004206ee birdtray!Run+0x2c4
0019ff24 00580bd4 birdtray!wWinMain+0xade
0019ff70 764efcc9 birdtray!__scrt_common_main_seh+0xf8
0019ff80 771d82ae kernel32!BaseThreadInitThunk+0x19
0019ffdc 771d827e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

e98c22102e4a1245b22b7647070d0357_000.dmp
cdc1e07fc301e2fd3c773bc190567989_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0285ff80 753c8744 NetUL+0x134a7
0285ff94 77bc582d kernel32!BaseThreadInitThunk+0x24
0285ffdc 77bc57fd ntdll!__RtlUserThreadStart+0x2f
0285ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

b55eb5d511b40225c9bf89a27d5d4088_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
031fddb4 00000000 NetUL+0x134a7

b5bba25e3fee06eb5e1c6d9864b210d1_003.dmp