Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
1923f11c 7aa993ce 0x18110130
1923f14c 7aa9c7c9 ppromotion+0xf93ce
1923f178 7aaf341f ppromotion+0xfc7c9
1923f26c 7aadd154 ppromotion+0x15341f
1923f2c8 7aadb831 ppromotion+0x13d154
1923f30c 7aad56e4 ppromotion+0x13b831
1923f338 7aad5646 ppromotion+0x1356e4
1923f350 7aad553d ppromotion+0x135646
1923f360 7aa9b180 ppromotion+0x13553d
1923f454 7aa9ce7f ppromotion+0xfb180
1923f56c 7aa9d646 ppromotion+0xfce7f
1923f8a0 7aa9db28 ppromotion+0xfd646
1923f8c8 7aab7545 ppromotion+0xfdb28
1923f904 7676fcc9 ppromotion+0x117545
1923f914 776682ae kernel32!BaseThreadInitThunk+0x19
1923f970 7766827e ntdll!__RtlUserThreadStart+0x2f
1923f980 00000000 ntdll!_RtlUserThreadStart+0x1b

d8d4001f7e76811b64dadaff9a3316aa_000.dmp

Top 2: total counts = 1

1741fedc 7afb3c9a ntdll!RtlEnterCriticalSection+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
1741ff34 7b097545 ppromotion+0x33c9a
1741ff70 761e5d49 ppromotion+0x117545
1741ff80 773cd03b kernel32!BaseThreadInitThunk+0x19
1741ffd8 773ccfc1 ntdll!__RtlUserThreadStart+0x2b
1741ffe8 00000000 ntdll!_RtlUserThreadStart+0x1b

4a546c634838ac6281a059e0a1932215_000.dmp