Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
005f7074 0086077c birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
005f7090 0076a8c8 birdwp!CMultiTabWebWnd::Show+0xbc
005f70a4 0082ff50 birdwp!CMainDUIWnd::SelectTab+0xd8
005f70b8 0082f619 birdwp!CTopWnd::SetSelectTab+0x20
005f7108 0075dd91 birdwp!CTopWnd::OnWndCreate+0x3c9
005f7150 00830543 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
005f71bc 0082fcb1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
005f71e4 00754fcc birdwp!CTopWnd::ProcessWindowMessage+0x21
005f7234 6ffe1abf birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
005f7254 7530157b atlthunk!AtlThunk_0x08+0x3f
005f7280 752f7c5a user32!_InternalCallWinProc+0x2b
005f7368 752f7870 user32!UserCallWinProcCheckWow+0x33a
005f73cc 752ff369 user32!DispatchClientMessage+0x190
005f7418 774256cd user32!__fnINLPCREATESTRUCT+0x69
005f7498 7627174c ntdll!KiUserCallbackDispatcher+0x4d
005f749c 752f0494 win32u!NtUserCreateWindowEx+0xc
005f777c 752efda7 user32!VerNtUserCreateWindowEx+0x229
005f7860 752efc78 user32!CreateWindowInternal+0x12b
005f78a0 00802509 user32!CreateWindowExW+0x38
005f7d50 00803739 birdwp!CAppContainerWnd::LoadFlash+0x4c9
005f7d94 0075dd91 birdwp!CAppContainerWnd::OnWndCreate+0x169
005f7ddc 007fdc83 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
005f7e0c 00754fcc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
005f7e5c 6ffe1926 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
005f7e7c 7530157b atlthunk!AtlThunk_0x03+0x36
005f7ea8 752f7c5a user32!_InternalCallWinProc+0x2b
005f7f90 752f7870 user32!UserCallWinProcCheckWow+0x33a
005f7ff4 752ff369 user32!DispatchClientMessage+0x190
005f8040 774256cd user32!__fnINLPCREATESTRUCT+0x69
005f80c0 7627174c ntdll!KiUserCallbackDispatcher+0x4d
005f80c4 752f0494 win32u!NtUserCreateWindowEx+0xc
005f83a4 752efda7 user32!VerNtUserCreateWindowEx+0x229
005f8488 752efc78 user32!CreateWindowInternal+0x12b
005f84c8 007fef98 user32!CreateWindowExW+0x38
005f8548 00800baa birdwp!Run+0x1a8
005ffee4 008a692f birdwp!wWinMain+0xada
005fff30 7657fcc9 birdwp!__scrt_common_main_seh+0xf8
005fff40 774182ae kernel32!BaseThreadInitThunk+0x19
005fff9c 7741827e ntdll!__RtlUserThreadStart+0x2f
005fffac 00000000 ntdll!_RtlUserThreadStart+0x1b

869052cd4365bd2bc6d29b0e679571ae_000.dmp