Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0019eb9c 004ed759 birdtray!CLoopWallpaper::IsActive
0019ec38 004b5a22 birdtray!CSetWPMgr::SetNextWallpaper+0x209
0019ed60 00413540 birdtray!CMainFrame::OnTimer+0xd72
0019ed88 0041623c birdtray!CMainFrame::ProcessWindowMessage+0x140
0019edd8 742318a6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019edf8 76375e3b atlthunk!AtlThunk_0x02+0x36
0019ee24 763669dc user32!_InternalCallWinProc+0x2b
0019ef08 7636657a user32!UserCallWinProcCheckWow+0x3ac
0019ef6c 763732bf user32!DispatchClientMessage+0xea
0019efa8 771728fd user32!__fnDWORD+0x3f
0019efe0 766a2b8c ntdll!KiUserCallbackDispatcher+0x4d
0019efe4 763738c0 win32u!NtUserGetMessage+0xc
0019f020 00415355 user32!GetMessageW+0x30
0019fc5c 004173f5 birdtray!Run+0x1b5
0019ff24 005660e4 birdtray!wWinMain+0x8a5
0019ff70 769f0419 birdtray!__scrt_common_main_seh+0xf8
0019ff80 7716662d kernel32!BaseThreadInitThunk+0x19
0019ffdc 771665fd ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

a0ecf10ec07d05d3e3d37229aa48e009_000.dmp