Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00db7074 008716bc birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00db7090 0077a8c8 birdwp!CMultiTabWebWnd::Show+0xbc
00db70a4 00840d40 birdwp!CMainDUIWnd::SelectTab+0xd8
00db70b8 00840409 birdwp!CTopWnd::SetSelectTab+0x20
00db7108 0076dd91 birdwp!CTopWnd::OnWndCreate+0x3c9
00db7150 00841333 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00db71bc 00840aa1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
00db71e4 00764fcc birdwp!CTopWnd::ProcessWindowMessage+0x21
00db7234 75591b0f birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00db7254 76011b7b atlthunk!AtlThunk_0x09+0x3f
00db7280 76007fca user32!_InternalCallWinProc+0x2b
00db7368 76007bca user32!UserCallWinProcCheckWow+0x33a
00db73cc 7600f9b9 user32!DispatchClientMessage+0xea
00db7418 779354ed user32!__fnINLPCREATESTRUCT+0x69
00db7498 7634174c ntdll!KiUserCallbackDispatcher+0x4d
00db749c 760005e4 win32u!NtUserCreateWindowEx+0xc
00db777c 75fffef7 user32!VerNtUserCreateWindowEx+0x229
00db7860 75fffdc8 user32!CreateWindowInternal+0x12b
00db78a0 00813469 user32!CreateWindowExW+0x38
00db7d50 00814699 birdwp!CAppContainerWnd::LoadFlash+0x4c9
00db7d94 0076dd91 birdwp!CAppContainerWnd::OnWndCreate+0x169
00db7ddc 0080eb73 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00db7e0c 00764fcc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
00db7e5c 75591926 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00db7e7c 76011b7b atlthunk!AtlThunk_0x03+0x36
00db7ea8 76007fca user32!_InternalCallWinProc+0x2b
00db7f90 76007bca user32!UserCallWinProcCheckWow+0x33a
00db7ff4 7600f9b9 user32!DispatchClientMessage+0xea
00db8040 779354ed user32!__fnINLPCREATESTRUCT+0x69
00db80c0 7634174c ntdll!KiUserCallbackDispatcher+0x4d
00db80c4 760005e4 win32u!NtUserCreateWindowEx+0xc
00db83a4 75fffef7 user32!VerNtUserCreateWindowEx+0x229
00db848c 75fffdc8 user32!CreateWindowInternal+0x12b
00db84cc 0080fe88 user32!CreateWindowExW+0x38
00db854c 00811b00 birdwp!Run+0x1a8
00dbfee8 008b78af birdwp!wWinMain+0xb40
00dbff34 76dbfcc9 birdwp!__scrt_common_main_seh+0xf8
00dbff44 779280ce kernel32!BaseThreadInitThunk+0x19
00dbffa0 7792809e ntdll!__RtlUserThreadStart+0x2f
00dbffb0 00000000 ntdll!_RtlUserThreadStart+0x1b

7cd939deafc177ce9bcec57474a68977_000.dmp