Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
008f799c 001c20ec birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
008f79b8 000bde33 birdwp!CMultiTabWebWnd::Show+0xbc
008f79dc 000c8749 birdwp!CStaticMinPage::ShowPage+0x2e3
008f79f4 000c7d73 birdwp!CLocalWallPaper::ShowStaticPage+0x29
008f7a34 000c7858 birdwp!CLocalWallPaper::OnShowLocal+0x73
008f7a58 000c822b birdwp!CLocalWallPaper::OnMenuTab+0x98
008f7a78 0014a2db birdwp!CLocalWallPaper::ProcessWindowMessage+0xcb
008f7aa4 000c2bd1 birdwp!CDUIContainer::OnDmMsg+0x5b
008f7ad0 000c2a7d birdwp!CDUIContainer::ProcessWindowMessage+0x141
008f7af8 000b55cc birdwp!CAppControlWnd::ProcessWindowMessage+0xed
008f7b48 72ab19d6 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
008f7b68 766434bb atlthunk!GetAtlThunkData+0x233
008f7b94 76635913 user32!_InternalCallWinProc+0x2b
008f7c7c 7663556a user32!UserCallWinProcCheckWow+0x2d3
008f7ce0 7663f549 user32!DispatchClientMessage+0xea
008f7d20 77dd4a1d user32!__fnDWORD+0x49
008f7d58 75ed296c ntdll!KiUserCallbackDispatcher+0x4d
008f7d5c 766212ae win32u!NtUserMessageCall+0xc
008f7dc0 766210df user32!SendMessageWorker+0x15e
008f7df8 0014d488 user32!SendMessageW+0x13f
008f7e28 0014d41c birdwp!CDirectUIWnd::SendMessageW+0x58
008f7e40 00140cb3 birdwp!SendDUIMessage+0x4c
008f7e8c 000c851e birdwp!CDUIToolBar::SelectItem+0x53
008f7ea8 000ca58f birdwp!CLocalWallPaper::ResetView+0x4e
008f7ebc 000cb3aa birdwp!CMainDUIWnd::OnLocalWallPaper+0xaf
008f7edc 00191f57 birdwp!CMainDUIWnd::SelectTab+0x5aa
008f7f34 00191621 birdwp!CTopWnd::_ProcessWindowMessage+0xe7
008f7f5c 000b55cc birdwp!CTopWnd::ProcessWindowMessage+0x21
008f7fac 72ab1a7f birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
008f7fcc 766434bb atlthunk!GetAtlThunkData+0x2dc
008f7ff8 76635913 user32!_InternalCallWinProc+0x2b
008f80e0 766352a2 user32!UserCallWinProcCheckWow+0x2d3
008f8154 76635070 user32!DispatchMessageWorker+0x222
008f8160 0015fe14 user32!DispatchMessageW+0x10
008f81b4 001619ba birdwp!Run+0x224
008ffb50 0020862f birdwp!wWinMain+0xada
008ffb9c 74ce8744 birdwp!__scrt_common_main_seh+0xf8
008ffbb0 77dc58ed kernel32!BaseThreadInitThunk+0x24
008ffbf8 77dc58bd ntdll!__RtlUserThreadStart+0x2f
008ffc08 00000000 ntdll!_RtlUserThreadStart+0x1b

ac15f6a2d0f5b0085ba03027597a87d2_001.dmp