Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0019eb9c 004ed759 birdtray!CLoopWallpaper::IsActive
0019ec38 004b5a22 birdtray!CSetWPMgr::SetNextWallpaper+0x209
0019ed60 00413540 birdtray!CMainFrame::OnTimer+0xd72
0019ed88 0041623c birdtray!CMainFrame::ProcessWindowMessage+0x140
0019edd8 726518a6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019edf8 7607635b atlthunk!AtlThunk_0x02+0x36
0019ee24 7606729c user32!_InternalCallWinProc+0x2b
0019ef08 76066e3a user32!UserCallWinProcCheckWow+0x3ac
0019ef6c 760737ef user32!DispatchClientMessage+0xea
0019efa8 77c028ed user32!__fnDWORD+0x3f
0019efe0 769e2b8c ntdll!KiUserCallbackDispatcher+0x4d
0019efe4 76073db0 win32u!NtUserGetMessage+0xc
0019f020 00415355 user32!GetMessageW+0x30
0019fc5c 004173f5 birdtray!Run+0x1b5
0019ff24 005660e4 birdtray!wWinMain+0x8a5
0019ff70 75270179 birdtray!__scrt_common_main_seh+0xf8
0019ff80 77bf662d kernel32!BaseThreadInitThunk+0x19
0019ffdc 77bf65fd ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

851c54603f8558ad13892812d9e0806f_000.dmp