Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
007d6b84 002bc2ec birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
007d6ba0 001c9b58 birdwp!CMultiTabWebWnd::Show+0xbc
007d6bb4 0028baf0 birdwp!CMainDUIWnd::SelectTab+0xd8
007d6bc8 0028b1b9 birdwp!CTopWnd::SetSelectTab+0x20
007d6c18 001bd001 birdwp!CTopWnd::OnWndCreate+0x3c9
007d6c60 0028c0e3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
007d6ccc 0028b851 birdwp!CTopWnd::_ProcessWindowMessage+0x43
007d6cf4 001b423c birdwp!CTopWnd::ProcessWindowMessage+0x21
007d6d44 6a9f1abf birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
007d6d64 7745148b atlthunk!AtlThunk_0x08+0x3f
007d6d90 77447b7a user32!_InternalCallWinProc+0x2b
007d6e78 77447790 user32!UserCallWinProcCheckWow+0x33a
007d6edc 7744f279 user32!DispatchClientMessage+0x190
007d6f28 778056cd user32!__fnINLPCREATESTRUCT+0x69
007d6fa8 7716174c ntdll!KiUserCallbackDispatcher+0x4d
007d6fac 774403c4 win32u!NtUserCreateWindowEx+0xc
007d728c 7743fcd7 user32!VerNtUserCreateWindowEx+0x229
007d7370 7743fba8 user32!CreateWindowInternal+0x12b
007d73b0 0025e519 user32!CreateWindowExW+0x38
007d7860 0025f749 birdwp!CAppContainerWnd::LoadFlash+0x4c9
007d78a4 001bd001 birdwp!CAppContainerWnd::OnWndCreate+0x169
007d78ec 00259cf3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
007d791c 001b423c birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
007d796c 6a9f1926 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
007d798c 7745148b atlthunk!AtlThunk_0x03+0x36
007d79b8 77447b7a user32!_InternalCallWinProc+0x2b
007d7aa0 77447790 user32!UserCallWinProcCheckWow+0x33a
007d7b04 7744f279 user32!DispatchClientMessage+0x190
007d7b50 778056cd user32!__fnINLPCREATESTRUCT+0x69
007d7bd0 7716174c ntdll!KiUserCallbackDispatcher+0x4d
007d7bd4 774403c4 win32u!NtUserCreateWindowEx+0xc
007d7eb4 7743fcd7 user32!VerNtUserCreateWindowEx+0x229
007d7f9c 7743fba8 user32!CreateWindowInternal+0x12b
007d7fdc 0025b008 user32!CreateWindowExW+0x38
007d805c 0025cbb4 birdwp!Run+0x1a8
007df9f8 0030168f birdwp!wWinMain+0xa74
007dfa44 7680fcc9 birdwp!__scrt_common_main_seh+0xf8
007dfa54 777f82ae kernel32!BaseThreadInitThunk+0x19
007dfab0 777f827e ntdll!__RtlUserThreadStart+0x2f
007dfac0 00000000 ntdll!_RtlUserThreadStart+0x1b

366270362c8900d441936b1961004da7_000.dmp