Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00b86940 006bc2ec birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00b8695c 005c9b58 birdwp!CMultiTabWebWnd::Show+0xbc
00b86970 0068baf0 birdwp!CMainDUIWnd::SelectTab+0xd8
00b86984 0068b1b9 birdwp!CTopWnd::SetSelectTab+0x20
00b869d4 005bd001 birdwp!CTopWnd::OnWndCreate+0x3c9
00b86a1c 0068c0e3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00b86a88 0068b851 birdwp!CTopWnd::_ProcessWindowMessage+0x43
00b86ab0 005b423c birdwp!CTopWnd::ProcessWindowMessage+0x21
00b86b00 71071ba3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00b86b20 76573433 atlthunk!AtlThunk_0x08+0x43
00b86b4c 76564236 user32!_InternalCallWinProc+0x2b
00b86c44 76563cba user32!UserCallWinProcCheckWow+0x4c6
00b86ca8 7656fd05 user32!DispatchClientMessage+0xea
00b86cf0 77b1916d user32!__fnINLPCREATESTRUCT+0x75
00b86d70 7587178c ntdll!KiUserCallbackDispatcher+0x4d
00b86d74 7656679f win32u!NtUserCreateWindowEx+0xc
00b87054 765670fa user32!VerNtUserCreateWindowEx+0x25f
00b87134 76567528 user32!CreateWindowInternal+0x32a
00b87174 0065e519 user32!CreateWindowExW+0x38
00b87624 0065f749 birdwp!CAppContainerWnd::LoadFlash+0x4c9
00b87668 005bd001 birdwp!CAppContainerWnd::OnWndCreate+0x169
00b876b0 00659cf3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00b876e0 005b423c birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
00b87730 710719ba birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00b87750 76573433 atlthunk!AtlThunk_0x03+0x3a
00b8777c 76564236 user32!_InternalCallWinProc+0x2b
00b87874 76563cba user32!UserCallWinProcCheckWow+0x4c6
00b878d8 7656fd05 user32!DispatchClientMessage+0xea
00b87920 77b1916d user32!__fnINLPCREATESTRUCT+0x75
00b879a0 7587178c ntdll!KiUserCallbackDispatcher+0x4d
00b879a4 7656679f win32u!NtUserCreateWindowEx+0xc
00b87c84 765670fa user32!VerNtUserCreateWindowEx+0x25f
00b87d64 76567528 user32!CreateWindowInternal+0x32a
00b87da4 0065b008 user32!CreateWindowExW+0x38
00b87e24 0065cbb4 birdwp!Run+0x1a8
00b8f7c0 0070168f birdwp!wWinMain+0xa74
00b8f80c 75fa7ba9 birdwp!__scrt_common_main_seh+0xf8
00b8f81c 77b0c0cb kernel32!BaseThreadInitThunk+0x19
00b8f874 77b0c04f ntdll!__RtlUserThreadStart+0x2b
00b8f884 00000000 ntdll!_RtlUserThreadStart+0x1b

6c3c7041ee4559834a29742bf0adf27c_000.dmp