Analyzed 2 dump

Top 1: total counts = 2

ChildEBP RetAddr  
00af6bdc 003b16bc birdwp!CMultiTabWebWnd::NavigateUrl+0x12a
00af6bf8 002ba8c8 birdwp!CMultiTabWebWnd::Show+0xbc
00af6c0c 00380d40 birdwp!CMainDUIWnd::SelectTab+0xd8
00af6c20 00380409 birdwp!CTopWnd::SetSelectTab+0x20
00af6c70 002add91 birdwp!CTopWnd::OnWndCreate+0x3c9
00af6cb8 00381333 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00af6d24 00380aa1 birdwp!CTopWnd::_ProcessWindowMessage+0x43
00af6d4c 002a4fcc birdwp!CTopWnd::ProcessWindowMessage+0x21
00af6d9c 6ba21abf birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00af6dbc 76e0145b atlthunk!AtlThunk_0x08+0x3f
00af6de8 76df7b4a user32!_InternalCallWinProc+0x2b
00af6ed0 76df7760 user32!UserCallWinProcCheckWow+0x33a
00af6f34 76dff249 user32!DispatchClientMessage+0x190
00af6f80 776b56cd user32!__fnINLPCREATESTRUCT+0x69
00af7000 7589174c ntdll!KiUserCallbackDispatcher+0x4d
00af7004 76df0394 win32u!NtUserCreateWindowEx+0xc
00af72e4 76defca7 user32!VerNtUserCreateWindowEx+0x229
00af73c8 76defb78 user32!CreateWindowInternal+0x12b
00af7408 00353469 user32!CreateWindowExW+0x38
00af78b8 00354699 birdwp!CAppContainerWnd::LoadFlash+0x4c9
00af78fc 002add91 birdwp!CAppContainerWnd::OnWndCreate+0x169
00af7944 0034eb73 birdwp!CLayerWindowBase >::_ProcessWindowMessage+0x81
00af7974 002a4fcc birdwp!CAppContainerWnd::ProcessWindowMessage+0x63
00af79c4 6ba21926 birdwp!ATL::CWindowImplBaseT >::WindowProc+0x6c
00af79e4 76e0145b atlthunk!AtlThunk_0x03+0x36
00af7a10 76df7b4a user32!_InternalCallWinProc+0x2b
00af7af8 76df7760 user32!UserCallWinProcCheckWow+0x33a
00af7b5c 76dff249 user32!DispatchClientMessage+0x190
00af7ba8 776b56cd user32!__fnINLPCREATESTRUCT+0x69
00af7c28 7589174c ntdll!KiUserCallbackDispatcher+0x4d
00af7c2c 76df0394 win32u!NtUserCreateWindowEx+0xc
00af7f0c 76defca7 user32!VerNtUserCreateWindowEx+0x229
00af7ff0 76defb78 user32!CreateWindowInternal+0x12b
00af8030 0034fe88 user32!CreateWindowExW+0x38
00af80b0 00351b00 birdwp!Run+0x1a8
00affa4c 003f78af birdwp!wWinMain+0xb40
00affa98 7578fcc9 birdwp!__scrt_common_main_seh+0xf8
00affaa8 776a82ae kernel32!BaseThreadInitThunk+0x19
00affb04 776a827e ntdll!__RtlUserThreadStart+0x2f
00affb14 00000000 ntdll!_RtlUserThreadStart+0x1b

1b215750a40e4f1cda200e128e5f1af0_000.dmp
184866068174f917288521db902bf85b_000.dmp