Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
01136d10 0090cb0c birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
01136d2c 0081a548 birdwp!CMultiTabWebWnd::Show+0xbc
01136d40 008dc300 birdwp!CMainDUIWnd::SelectTab+0xd8
01136d54 008db9c9 birdwp!CTopWnd::SetSelectTab+0x20
01136da4 0080da11 birdwp!CTopWnd::OnWndCreate+0x3c9
01136dec 008dc8f3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
01136e58 008dc061 birdwp!CTopWnd::_ProcessWindowMessage+0x43
01136e80 00804c4c birdwp!CTopWnd::ProcessWindowMessage+0x21
01136ed0 73941bf3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
01136ef0 76487dd3 atlthunk!AtlThunk_0x08+0x43
01136f1c 7647644d user32!_InternalCallWinProc+0x2b
01137024 76475ef0 user32!UserCallWinProcCheckWow+0x49d
01137088 7648467f user32!DispatchClientMessage+0x190
011370d0 774cbba6 user32!__fnINLPCREATESTRUCT+0x6f
01137150 767e182c ntdll!KiUserCallbackDispatcher+0x36
01137154 7647adef win32u!NtUserCreateWindowEx+0xc
01137434 7647b8ea user32!VerNtUserCreateWindowEx+0x26f
01137514 7647b978 user32!CreateWindowInternal+0x32a
01137554 008af1c9 user32!CreateWindowExW+0x38
01137a04 008b03f9 birdwp!CAppContainerWnd::LoadFlash+0x4c9
01137a48 0080da11 birdwp!CAppContainerWnd::OnWndCreate+0x169
01137a90 008aa993 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
01137ac0 00804c4c birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
01137b10 73941a0a birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
01137b30 76487dd3 atlthunk!AtlThunk_0x03+0x3a
01137b5c 7647644d user32!_InternalCallWinProc+0x2b
01137c64 76475ef0 user32!UserCallWinProcCheckWow+0x49d
01137cc8 7648467f user32!DispatchClientMessage+0x190
01137d10 774cbba6 user32!__fnINLPCREATESTRUCT+0x6f
01137d90 767e182c ntdll!KiUserCallbackDispatcher+0x36
01137d94 7647adef win32u!NtUserCreateWindowEx+0xc
01138074 7647b8ea user32!VerNtUserCreateWindowEx+0x26f
01138150 7647b978 user32!CreateWindowInternal+0x32a
01138190 008abca8 user32!CreateWindowExW+0x38
01138210 008ad854 birdwp!Run+0x1a8
0113fbac 0095228f birdwp!wWinMain+0xa74
0113fbf8 76635d49 birdwp!__scrt_common_main_seh+0xf8
0113fc08 774bcf0b kernel32!BaseThreadInitThunk+0x19
0113fc60 774bce91 ntdll!__RtlUserThreadStart+0x2b
0113fc70 00000000 ntdll!_RtlUserThreadStart+0x1b

731554533c9084ef603c577ebfc26148_000.dmp