Analyzed 7 dump

Top 1: total counts = 3

ChildEBP RetAddr  
00ef6928 00782adc birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00ef6944 0068b928 birdwp!CMultiTabWebWnd::Show+0xbc
00ef6958 007522d0 birdwp!CMainDUIWnd::SelectTab+0xd8
00ef696c 00751999 birdwp!CTopWnd::SetSelectTab+0x20
00ef69bc 0067edf1 birdwp!CTopWnd::OnWndCreate+0x3c9
00ef6a04 007528c3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00ef6a70 00752031 birdwp!CTopWnd::_ProcessWindowMessage+0x43
00ef6a98 0067600c birdwp!CTopWnd::ProcessWindowMessage+0x21
00ef6ae8 68cb1ba3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00ef6b08 75333a0f atlthunk!AtlThunk_0x08+0x43
00ef6b34 753243a6 user32!_InternalCallWinProc+0x2b
00ef6c2c 75323e20 user32!UserCallWinProcCheckWow+0x4c6
00ef6c90 753300c5 user32!DispatchClientMessage+0x190
00ef6cd8 778993fd user32!__fnINLPCREATESTRUCT+0x75
00ef6d58 75cc17ac ntdll!KiUserCallbackDispatcher+0x4d
00ef6d5c 7532699f win32u!NtUserCreateWindowEx+0xc
00ef703c 753272fa user32!VerNtUserCreateWindowEx+0x25f
00ef711c 75327728 user32!CreateWindowInternal+0x32a
00ef715c 00723d69 user32!CreateWindowExW+0x38
00ef760c 00724f99 birdwp!CAppContainerWnd::LoadFlash+0x4c9
00ef7650 0067edf1 birdwp!CAppContainerWnd::OnWndCreate+0x169
00ef7698 0071f4e3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00ef76c8 0067600c birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
00ef7718 68cb19ba birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00ef7738 75333a0f atlthunk!AtlThunk_0x03+0x3a
00ef7764 753243a6 user32!_InternalCallWinProc+0x2b
00ef785c 75323e20 user32!UserCallWinProcCheckWow+0x4c6
00ef78c0 753300c5 user32!DispatchClientMessage+0x190
00ef7908 778993fd user32!__fnINLPCREATESTRUCT+0x75
00ef7988 75cc17ac ntdll!KiUserCallbackDispatcher+0x4d
00ef798c 7532699f win32u!NtUserCreateWindowEx+0xc
00ef7c6c 753272fa user32!VerNtUserCreateWindowEx+0x25f
00ef7d48 75327728 user32!CreateWindowInternal+0x32a
00ef7d88 007207f8 user32!CreateWindowExW+0x38
00ef7e08 0072240a birdwp!Run+0x1a8
00eff7a4 007c940f birdwp!wWinMain+0xada
00eff7f0 76307ba9 birdwp!__scrt_common_main_seh+0xf8
00eff800 7788c36b kernel32!BaseThreadInitThunk+0x19
00eff858 7788c2ef ntdll!__RtlUserThreadStart+0x2b
00eff868 00000000 ntdll!_RtlUserThreadStart+0x1b

a7a6dc0c7f30def67e06156e5d35d633_000.dmp
ba0cb0cafdd29a698b9d60e610c29ac9_000.dmp
fec395ac35a4a73f3f3b183a9afef367_000.dmp

Top 2: total counts = 2

ChildEBP RetAddr  
01846d80 013b2adc birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
01846d9c 012bb928 birdwp!CMultiTabWebWnd::Show+0xbc
01846db0 013822d0 birdwp!CMainDUIWnd::SelectTab+0xd8
01846dc4 01381999 birdwp!CTopWnd::SetSelectTab+0x20
01846e14 012aedf1 birdwp!CTopWnd::OnWndCreate+0x3c9
01846e5c 013828c3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
01846ec8 01382031 birdwp!CTopWnd::_ProcessWindowMessage+0x43
01846ef0 012a600c birdwp!CTopWnd::ProcessWindowMessage+0x21
01846f40 0f5d1a8f birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
01846f60 75965e0b atlthunk!AtlThunk_0x08+0x3f
01846f8c 759568cc user32!_InternalCallWinProc+0x2b
01847070 7595646a user32!UserCallWinProcCheckWow+0x3ac
018470d4 759639a9 user32!DispatchClientMessage+0xea
01847120 772b3e8d user32!__fnINLPCREATESTRUCT+0x69
018471a0 7590326c ntdll!KiUserCallbackDispatcher+0x4d
018471a4 7595236a win32u!NtUserCreateWindowEx+0xc
01847484 75951c1e user32!VerNtUserCreateWindowEx+0x229
0184756c 75951ae8 user32!CreateWindowInternal+0x132
018475ac 01353d69 user32!CreateWindowExW+0x38
01847a5c 01354f99 birdwp!CAppContainerWnd::LoadFlash+0x4c9
01847aa0 012aedf1 birdwp!CAppContainerWnd::OnWndCreate+0x169
01847ae8 0134f4e3 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
01847b18 012a600c birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
01847b68 0f5d18f6 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
01847b88 75965e0b atlthunk!AtlThunk_0x03+0x36
01847bb4 759568cc user32!_InternalCallWinProc+0x2b
01847c98 7595646a user32!UserCallWinProcCheckWow+0x3ac
01847cfc 759639a9 user32!DispatchClientMessage+0xea
01847d48 772b3e8d user32!__fnINLPCREATESTRUCT+0x69
01847dc8 7590326c ntdll!KiUserCallbackDispatcher+0x4d
01847dcc 7595236a win32u!NtUserCreateWindowEx+0xc
018480ac 75951c1e user32!VerNtUserCreateWindowEx+0x229
01848194 75951ae8 user32!CreateWindowInternal+0x132
018481d4 013507f8 user32!CreateWindowExW+0x38
01848254 0135240a birdwp!Run+0x1a8
0184fbf0 013f940f birdwp!wWinMain+0xada
0184fc3c 74a405c9 birdwp!__scrt_common_main_seh+0xf8
0184fc4c 772a7c5d kernel32!BaseThreadInitThunk+0x19
0184fca8 772a7c2d ntdll!__RtlUserThreadStart+0x2f
0184fcb8 00000000 ntdll!_RtlUserThreadStart+0x1b

9948c6677868b0831fe2286ad23f6125_000.dmp
7bdad43e2f5a95927a88f8d20864cf2c_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
009a769c 003e63fc birdwp!cJSON_Parse+0x30
009a789c 003e5ce1 birdwp!CFavMgr::ReadJson+0x14c
009a7adc 003e1a88 birdwp!CFavMgr::Init+0x1a1
009a7c18 0029ed3e birdwp!CFavReadHelper::Init+0x18
009a7c30 003a0388 birdwp!std::_Func_impl_no_alloc const &,std::_Ph<2> const &,std::_Ph<3> const &>,void,wchar_t const * *,unsigned long,wchar_t * &>::_Do_call+0x1e
009a7c90 567ae191 birdwp!CCppWebViewBridge::OnExecute+0x128
009a7e48 567af7d0 WebView!CWebView::OnMsgToStubExecute+0x3d1
009a7ec8 567a944f WebView!CWebView::OnReceiveMessage+0x3b0
009a7ef4 5679b7af WebView!MultiTabWebViewImpl::OnReceiveMessage+0x9f
009a7f40 5679ce2c WebView!CChannelImpl::ProcessCopyData+0xef
009a7f58 5679b911 WebView!CChannelImpl::_ProcessWindowMessage+0x10c
009a7f80 5679c5dc WebView!CChannelImpl::ProcessWindowMessage+0x21
009a7fd0 74f7630a WebView!ATL::CWindowImplBaseT >::WindowProc+0x6c
009a7ffc 74f76d4a user32!InternalCallWinProc+0x23
009a8074 74f777d7 user32!UserCallWinProcCheckWow+0x109
009a80d4 74f7789a user32!DispatchMessageWorker+0x3b5
009a80e4 00340874 user32!DispatchMessageW+0xf
009a8138 0034240a birdwp!Run+0x224
009afad4 003e940f birdwp!wWinMain+0xada
009afb20 759d343d birdwp!__scrt_common_main_seh+0xf8
009afb2c 77869802 kernel32!BaseThreadInitThunk+0xe
009afb6c 778697d5 ntdll!__RtlUserThreadStart+0x70
009afb84 00000000 ntdll!_RtlUserThreadStart+0x1b

657d7cdbb7e57451ee7fbd8db4c214db_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
01736ff0 0101077c birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
0173700c 00f1a8c8 birdwp!CMultiTabWebWnd::Show+0xbc
01737020 00fdff50 birdwp!CMainDUIWnd::SelectTab+0xd8
01737034 00fdf619 birdwp!CTopWnd::SetSelectTab+0x20
01737084 00f0dd91 birdwp!CTopWnd::OnWndCreate+0x3c9
017370cc 00fe0543 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
01737138 00fdfcb1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
01737160 00f04fcc birdwp!CTopWnd::ProcessWindowMessage+0x21
017371b0 67de1bf3 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
017371d0 74df9007 atlthunk!AtlThunk_0x08+0x43
017371fc 74de727d user32!_InternalCallWinProc+0x2b
01737304 74de6d10 user32!UserCallWinProcCheckWow+0x49d
01737368 74df580f user32!DispatchClientMessage+0x190
017373b0 7716bcd6 user32!__fnINLPCREATESTRUCT+0x6f
01737430 74da182c ntdll!KiUserCallbackDispatcher+0x36
01737434 74debc1f win32u!NtUserCreateWindowEx+0xc
01737714 74dec71a user32!VerNtUserCreateWindowEx+0x26f
017377f4 74dec7a8 user32!CreateWindowInternal+0x32a
01737834 00fb2509 user32!CreateWindowExW+0x38
01737ce4 00fb3739 birdwp!CAppContainerWnd::LoadFlash+0x4c9
01737d28 00f0dd91 birdwp!CAppContainerWnd::OnWndCreate+0x169
01737d70 00fadc83 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
01737da0 00f04fcc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
01737df0 67de1a0a birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
01737e10 74df9007 atlthunk!AtlThunk_0x03+0x3a
01737e3c 74de727d user32!_InternalCallWinProc+0x2b
01737f44 74de6d10 user32!UserCallWinProcCheckWow+0x49d
01737fa8 74df580f user32!DispatchClientMessage+0x190
01737ff0 7716bcd6 user32!__fnINLPCREATESTRUCT+0x6f
01738070 74da182c ntdll!KiUserCallbackDispatcher+0x36
01738074 74debc1f win32u!NtUserCreateWindowEx+0xc
01738354 74dec71a user32!VerNtUserCreateWindowEx+0x26f
01738434 74dec7a8 user32!CreateWindowInternal+0x32a
01738474 00faef98 user32!CreateWindowExW+0x38
017384f4 00fb0baa birdwp!Run+0x1a8
0173fe90 0105692f birdwp!wWinMain+0xada
0173fedc 76585d49 birdwp!__scrt_common_main_seh+0xf8
0173feec 7715d03b kernel32!BaseThreadInitThunk+0x19
0173ff44 7715cfc1 ntdll!__RtlUserThreadStart+0x2b
0173ff54 00000000 ntdll!_RtlUserThreadStart+0x1b

1d2a976cfa07945e1807769fbf84fa6d_000.dmp