Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00b76cc0 003ef26c birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00b76cdc 002f78c8 birdwp!CMultiTabWebWnd::Show+0xbc
00b76cf0 003bef80 birdwp!CMainDUIWnd::SelectTab+0xd8
00b76d04 003be649 birdwp!CTopWnd::SetSelectTab+0x20
00b76d54 002ead81 birdwp!CTopWnd::OnWndCreate+0x3c9
00b76d9c 003bf573 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00b76e08 003bece1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
00b76e30 002e21dc birdwp!CTopWnd::ProcessWindowMessage+0x21
00b76e80 6ffc1ba3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00b76ea0 76c42753 atlthunk!AtlThunk_0x08+0x43
00b76ecc 76c334e6 user32!_InternalCallWinProc+0x2b
00b76fc4 76c32f6a user32!UserCallWinProcCheckWow+0x4c6
00b77028 76c3efb5 user32!DispatchClientMessage+0xea
00b77070 77428b0d user32!__fnINLPCREATESTRUCT+0x75
00b770f0 7631178c ntdll!KiUserCallbackDispatcher+0x4d
00b770f4 76c35a6f win32u!NtUserCreateWindowEx+0xc
00b773d4 76c363da user32!VerNtUserCreateWindowEx+0x25f
00b774b4 76c36848 user32!CreateWindowInternal+0x32a
00b774f4 0038f9f9 user32!CreateWindowExW+0x38
00b779a4 00390c29 birdwp!CAppContainerWnd::LoadFlash+0x4c9
00b779e8 002ead81 birdwp!CAppContainerWnd::OnWndCreate+0x169
00b77a30 0038b153 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00b77a60 002e21dc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
00b77ab0 6ffc19ba birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00b77ad0 76c42753 atlthunk!AtlThunk_0x03+0x3a
00b77afc 76c334e6 user32!_InternalCallWinProc+0x2b
00b77bf4 76c32f6a user32!UserCallWinProcCheckWow+0x4c6
00b77c58 76c3efb5 user32!DispatchClientMessage+0xea
00b77ca0 77428b0d user32!__fnINLPCREATESTRUCT+0x75
00b77d20 7631178c ntdll!KiUserCallbackDispatcher+0x4d
00b77d24 76c35a6f win32u!NtUserCreateWindowEx+0xc
00b78004 76c363da user32!VerNtUserCreateWindowEx+0x25f
00b780e0 76c36848 user32!CreateWindowInternal+0x32a
00b78120 0038c478 user32!CreateWindowExW+0x38
00b781a0 0038e09a birdwp!Run+0x1a8
00b7fb3c 004365bf birdwp!wWinMain+0xada
00b7fb88 76437ba9 birdwp!__scrt_common_main_seh+0xf8
00b7fb98 7741bb3b kernel32!BaseThreadInitThunk+0x19
00b7fbf0 7741babf ntdll!__RtlUserThreadStart+0x2b
00b7fc00 00000000 ntdll!_RtlUserThreadStart+0x1b

acca54958622327f1daa64dd65c2b9b3_000.dmp