Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0019eb98 004ed759 birdtray!CLoopWallpaper::IsActive
0019ec34 004b5a22 birdtray!CSetWPMgr::SetNextWallpaper+0x209
0019ed5c 00413540 birdtray!CMainFrame::OnTimer+0xd72
0019ed84 0041623c birdtray!CMainFrame::ProcessWindowMessage+0x140
0019edd4 730818d6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019edf4 75fe16ab atlthunk!AtlThunk_0x02+0x36
0019ee20 75fd7e1a user32!_InternalCallWinProc+0x2b
0019ef08 75fd7a1a user32!UserCallWinProcCheckWow+0x33a
0019ef6c 75fdbeef user32!DispatchClientMessage+0xea
0019efa8 779954bd user32!__fnDWORD+0x3f
0019efe0 75e6106c ntdll!KiUserCallbackDispatcher+0x4d
0019efe4 75fdbf4e win32u!NtUserGetMessage+0xc
0019f020 00415355 user32!GetMessageW+0x2e
0019fc5c 004173f5 birdtray!Run+0x1b5
0019ff24 005660e4 birdtray!wWinMain+0x8a5
0019ff70 776ffcc9 birdtray!__scrt_common_main_seh+0xf8
0019ff80 7798809e kernel32!BaseThreadInitThunk+0x19
0019ffdc 7798806e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

81b875208fa506b4eb241b8fb168f5c4_000.dmp