Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00d56e54 00ef16bc birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00d56e70 00dfa8c8 birdwp!CMultiTabWebWnd::Show+0xbc
00d56e84 00ec0d40 birdwp!CMainDUIWnd::SelectTab+0xd8
00d56e98 00ec0409 birdwp!CTopWnd::SetSelectTab+0x20
00d56ee8 00dedd91 birdwp!CTopWnd::OnWndCreate+0x3c9
00d56f30 00ec1333 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00d56f9c 00ec0aa1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
00d56fc4 00de4fcc birdwp!CTopWnd::ProcessWindowMessage+0x21
00d57014 6ff11ba3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00d57034 75677cd2 atlthunk!AtlThunk_0x08+0x43
00d57060 7565709a user32!_InternalCallWinProc+0x2a
00d57150 75656b2a user32!UserCallWinProcCheckWow+0x4aa
00d571b4 75660099 user32!DispatchClientMessage+0xea
00d57200 76fa71dc user32!__fnINLPCREATESTRUCT+0x69
00d57280 75f5177c ntdll!KiUserCallbackDispatcher+0x4c
00d57284 7565b76a win32u!NtUserCreateWindowEx+0xc
00d57564 7565b014 user32!VerNtUserCreateWindowEx+0x229
00d57648 7565aed8 user32!CreateWindowInternal+0x132
00d57688 00e93469 user32!CreateWindowExW+0x38
00d57b38 00e94699 birdwp!CAppContainerWnd::LoadFlash+0x4c9
00d57b7c 00dedd91 birdwp!CAppContainerWnd::OnWndCreate+0x169
00d57bc4 00e8eb73 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00d57bf4 00de4fcc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
00d57c44 6ff119ba birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00d57c64 75677cd2 atlthunk!AtlThunk_0x03+0x3a
00d57c90 7565709a user32!_InternalCallWinProc+0x2a
00d57d80 75656b2a user32!UserCallWinProcCheckWow+0x4aa
00d57de4 75660099 user32!DispatchClientMessage+0xea
00d57e30 76fa71dc user32!__fnINLPCREATESTRUCT+0x69
00d57eb0 75f5177c ntdll!KiUserCallbackDispatcher+0x4c
00d57eb4 7565b76a win32u!NtUserCreateWindowEx+0xc
00d58194 7565b014 user32!VerNtUserCreateWindowEx+0x229
00d5827c 7565aed8 user32!CreateWindowInternal+0x132
00d582bc 00e8fe88 user32!CreateWindowExW+0x38
00d5833c 00e91b00 birdwp!Run+0x1a8
00d5fcd8 00f378af birdwp!wWinMain+0xb40
00d5fd24 758b6839 birdwp!__scrt_common_main_seh+0xf8
00d5fd34 76f9906f kernel32!BaseThreadInitThunk+0x19
00d5fd8c 76f9903d ntdll!__RtlUserThreadStart+0x2b
00d5fd9c 00000000 ntdll!_RtlUserThreadStart+0x1b

83b814c9e6b8c16cbe8c9eb599275765_000.dmp