Analyzed 3 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0019eae4 72951b0f 0x0
0019eb04 77a0148b atlthunk!AtlThunk_0x09+0x3f
0019eb30 779f7b7a user32!_InternalCallWinProc+0x2b
0019ec18 779f7790 user32!UserCallWinProcCheckWow+0x33a
0019ec7c 779fbc4f user32!DispatchClientMessage+0x190
0019ecb8 77be56cd user32!__fnDWORD+0x3f
0019ecf0 779219ac ntdll!KiUserCallbackDispatcher+0x4d
0019ecf4 004c2303 win32u!NtUserDestroyWindow+0xc
0019ed20 004a8c8f birdtray!NewWpService::Unit+0xb3
0019ed48 004b23a4 birdtray!CMainFrame::DoDestroy+0x25f
0019ed7c 00413f77 birdtray!CMainFrame::OnDestroy+0x44
0019eda4 00416cec birdtray!CMainFrame::ProcessWindowMessage+0xc7
0019edf4 729518d6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019ee14 77a0148b atlthunk!AtlThunk_0x02+0x36
0019ee40 779f7b7a user32!_InternalCallWinProc+0x2b
0019ef28 779f7790 user32!UserCallWinProcCheckWow+0x33a
0019ef8c 779fbc4f user32!DispatchClientMessage+0x190
0019efc8 77be56cd user32!__fnDWORD+0x3f
0019f000 0040f158 ntdll!KiUserCallbackDispatcher+0x4d
0019f030 00415f14 birdtray!CMainFrame::~CMainFrame+0x148
0019fc5c 00417ea5 birdtray!Run+0x2c4
0019ff24 00566be4 birdtray!wWinMain+0x8a5
0019ff70 76fbfcc9 birdtray!__scrt_common_main_seh+0xf8
0019ff80 77bd82ae kernel32!BaseThreadInitThunk+0x19
0019ffdc 77bd827e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

050f655eeb5b805a26e6c25418c82ffb_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
006ff884 00f9128f 0x0
00f90000 00000000 BirdWallpaper!__scrt_common_main_seh+0x17b

692d60a8dc3db48069dd5f2b741458fb_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0566ddb4 00000000 NetUL+0x134a7

d36237fd169bff5dfda44041e1091de8_002.dmp