Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0019eb98 004ed369 birdtray!CLoopWallpaper::IsActive
0019ec34 004b5632 birdtray!CSetWPMgr::SetNextWallpaper+0x209
0019ed5c 004133e0 birdtray!CMainFrame::OnTimer+0xd72
0019ed84 004160dc birdtray!CMainFrame::ProcessWindowMessage+0x140
0019edd4 6cda18d6 birdtray!ATL::CWindowImplBaseT >::WindowProc+0x6c
0019edf4 7647139b atlthunk!AtlThunk_0x02+0x36
0019ee20 76467b3a user32!_InternalCallWinProc+0x2b
0019ef08 7646773a user32!UserCallWinProcCheckWow+0x33a
0019ef6c 7646bc3f user32!DispatchClientMessage+0xea
0019efa8 7713507d user32!__fnDWORD+0x3f
0019efe0 768a106c ntdll!KiUserCallbackDispatcher+0x4d
0019efe4 7646bc9e win32u!NtUserGetMessage+0xc
0019f020 004151f5 user32!GetMessageW+0x2e
0019fc5c 004171aa birdtray!Run+0x1b5
0019ff24 00563424 birdtray!wWinMain+0x7ba
0019ff70 750efcc9 birdtray!__scrt_common_main_seh+0xf8
0019ff80 77127c5e kernel32!BaseThreadInitThunk+0x19
0019ffdc 77127c2e ntdll!__RtlUserThreadStart+0x2f
0019ffec 00000000 ntdll!_RtlUserThreadStart+0x1b

15729f151d452d3dbb2685e4170eb3de_000.dmp