Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00957c90 0020f26c birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00957cac 001f608e birdwp!CMultiTabWebWnd::Show+0xbc
00957cbc 00117077 birdwp!CStaticWallPaperTab::Show+0xe
00957cd0 0011793d birdwp!CMainDUIWnd::OnNetWallPaper+0x47
00957cf0 001df617 birdwp!CMainDUIWnd::SelectTab+0x14d
00957d48 001dece1 birdwp!CTopWnd::_ProcessWindowMessage+0xe7
00957d70 001021dc birdwp!CTopWnd::ProcessWindowMessage+0x21
00957dc0 6a241a6f birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00957de0 7687157b atlthunk!AtlThunk_0x07+0x3f
00957e0c 76867c5a user32!_InternalCallWinProc+0x2b
00957ef4 76866500 user32!UserCallWinProcCheckWow+0x33a
00957f70 76866030 user32!DispatchMessageWorker+0x4c0
00957f7c 001ac4f4 user32!DispatchMessageW+0x10
00957fd0 001ae09a birdwp!Run+0x224
0095f96c 002565bf birdwp!wWinMain+0xada
0095f9b8 7560fcc9 birdwp!__scrt_common_main_seh+0xf8
0095f9c8 775a82ae kernel32!BaseThreadInitThunk+0x19
0095fa24 775a827e ntdll!__RtlUserThreadStart+0x2f
0095fa34 00000000 ntdll!_RtlUserThreadStart+0x1b

2d5a2fdfd642701b8405c5fba097760e_000.dmp