Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
010f6dc0 008e16bc birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
010f6ddc 007ea8c8 birdwp!CMultiTabWebWnd::Show+0xbc
010f6df0 008b0d40 birdwp!CMainDUIWnd::SelectTab+0xd8
010f6e04 008b0409 birdwp!CTopWnd::SetSelectTab+0x20
010f6e54 007ddd91 birdwp!CTopWnd::OnWndCreate+0x3c9
010f6e9c 008b1333 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
010f6f08 008b0aa1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
010f6f30 007d4fcc birdwp!CTopWnd::ProcessWindowMessage+0x21
010f6f80 73c81bf3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
010f6fa0 76b59007 atlthunk!AtlThunk_0x08+0x43
010f6fcc 76b4727d user32!_InternalCallWinProc+0x2b
010f70d4 76b46d10 user32!UserCallWinProcCheckWow+0x49d
010f7138 76b5580f user32!DispatchClientMessage+0x190
010f7180 7789bcd6 user32!__fnINLPCREATESTRUCT+0x6f
010f7200 7606182c ntdll!KiUserCallbackDispatcher+0x36
010f7204 76b4bc1f win32u!NtUserCreateWindowEx+0xc
010f74e4 76b4c71a user32!VerNtUserCreateWindowEx+0x26f
010f75c4 76b4c7a8 user32!CreateWindowInternal+0x32a
010f7604 00883469 user32!CreateWindowExW+0x38
010f7ab4 00884699 birdwp!CAppContainerWnd::LoadFlash+0x4c9
010f7af8 007ddd91 birdwp!CAppContainerWnd::OnWndCreate+0x169
010f7b40 0087eb73 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
010f7b70 007d4fcc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
010f7bc0 73c81a0a birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
010f7be0 76b59007 atlthunk!AtlThunk_0x03+0x3a
010f7c0c 76b4727d user32!_InternalCallWinProc+0x2b
010f7d14 76b46d10 user32!UserCallWinProcCheckWow+0x49d
010f7d78 76b5580f user32!DispatchClientMessage+0x190
010f7dc0 7789bcd6 user32!__fnINLPCREATESTRUCT+0x6f
010f7e40 7606182c ntdll!KiUserCallbackDispatcher+0x36
010f7e44 76b4bc1f win32u!NtUserCreateWindowEx+0xc
010f8124 76b4c71a user32!VerNtUserCreateWindowEx+0x26f
010f8204 76b4c7a8 user32!CreateWindowInternal+0x32a
010f8244 0087fe88 user32!CreateWindowExW+0x38
010f82c4 00881b00 birdwp!Run+0x1a8
010ffc60 009278af birdwp!wWinMain+0xb40
010ffcac 75e25d49 birdwp!__scrt_common_main_seh+0xf8
010ffcbc 7788d03b kernel32!BaseThreadInitThunk+0x19
010ffd14 7788cfc1 ntdll!__RtlUserThreadStart+0x2b
010ffd24 00000000 ntdll!_RtlUserThreadStart+0x1b

ef2226609af3789e04b9c2ed66587e55_000.dmp