Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
001d7ce0 00734fae birdwp!CMultiTabWebWnd::NavigateUrl+0xc8
001d7cf8 00580e0e birdwp!CMultiTabWebWnd::Show+0x2e
001d7d88 0059487f birdwp!CStaticMinPage::ShowPage+0x52e
001d7da0 005941a4 birdwp!CLocalWallPaper::ShowStaticPage+0x3f
001d7dd0 005940fa birdwp!CLocalWallPaper::OnShowLocal+0x84
001d7dfc 00595cad birdwp!CLocalWallPaper::OnMenuTab+0x13a
001d7e20 0065f7fd birdwp!CLocalWallPaper::ProcessWindowMessage+0x11d
001d7e68 0058c118 birdwp!CDUIContainer::OnDmMsg+0x9d
001d7e8c 0058be9d birdwp!CDUIContainer::ProcessWindowMessage+0x268
001d7eb8 00578aa7 birdwp!CAppControlWnd::ProcessWindowMessage+0xad
001d7f14 68e31ae3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x67
001d7f34 76a62bc3 atlthunk!AtlThunk_0x06+0x43
001d7f60 76a539b6 user32!_InternalCallWinProc+0x2b
001d8058 76a5343a user32!UserCallWinProcCheckWow+0x4c6
001d80bc 76a5d33f user32!DispatchClientMessage+0xea
001d80f8 77e48d0d user32!__fnDWORD+0x3f
001d8130 777c10ec ntdll!KiUserCallbackDispatcher+0x4d
001d8134 76a52f21 win32u!NtUserMessageCall+0xc
001d8198 76a69338 user32!SendMessageWorker+0x941
001d81b4 68e38000 user32!SendMessageInternal+0x2d
001d81d8 005782ef atlthunk!AtlThunkData
001d81f4 0065b4e1 birdwp!ATL::CWindow::SendMessageW+0x1f
001d822c 0065664d birdwp!CDirectUIWnd::SendMessageW+0x61
001d8244 006549f9 birdwp!SendDUIMessage+0x2d
001d826c 005949ab birdwp!CDUIToolBar::SelectItem+0x59
001d8290 00597c7a birdwp!CLocalWallPaper::ResetView+0x5b
001d82a0 00598423 birdwp!CMainDUIWnd::OnLocalWallPaper+0xea
001d82c0 0058b649 birdwp!CMainDUIWnd::SelectTab+0x173
001d82d0 00697dc6 birdwp!CAppControlWnd::SelectTab+0x19
001d82e0 006e38ec birdwp!CAppContainerWnd::ITopWndEvent_OnTab+0x16
001d82f0 006e67bc birdwp!CTopWnd::SetSelectTab+0x3c
001d8308 006ea7e8 birdwp!CTopWnd::OnTabCheckItem+0xbc
001d8328 006ea502 birdwp!CTopWnd::_ProcessWindowMessage+0xa8
001d8354 00578aa7 birdwp!CTopWnd::ProcessWindowMessage+0x32
001d83b0 68e31ba3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x67
001d83d0 76a62bc3 atlthunk!AtlThunk_0x08+0x43
001d83fc 76a539b6 user32!_InternalCallWinProc+0x2b
001d84f4 76a52275 user32!UserCallWinProcCheckWow+0x4c6
001d8570 76a51dc0 user32!DispatchMessageWorker+0x4a5
001d857c 00695b01 user32!DispatchMessageW+0x10
001d85a0 0068f496 birdwp!WTL::CMessageLoop::Run+0xc1
001d85ec 0068e31e birdwp!Run+0x66
001dfe60 007767e5 birdwp!wWinMain+0x59e
001dfeac 76df7ba9 birdwp!__scrt_common_main_seh+0xf8
001dfebc 77e3bd3b kernel32!BaseThreadInitThunk+0x19
001dff14 77e3bcbf ntdll!__RtlUserThreadStart+0x2b
001dff24 00000000 ntdll!_RtlUserThreadStart+0x1b

6322ac87d916829fb206edef1f458af8_000.dmp