Analyzed 2 dump
Top 1: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
112bf64c 79f2c7c9 ppromotion+0xf93cc
112bf678 79f8341f ppromotion+0xfc7c9
112bf76c 79f81b0b ppromotion+0x15341f
112bf79c 79f6cdf5 ppromotion+0x151b0b
112bf804 79f6b831 ppromotion+0x13cdf5
112bf848 79f656e4 ppromotion+0x13b831
112bf874 79f65646 ppromotion+0x1356e4
112bf88c 79f6553d ppromotion+0x135646
112bf89c 79f2b180 ppromotion+0x13553d
112bf990 79f2ce7f ppromotion+0xfb180
112bfaa8 79f2d646 ppromotion+0xfce7f
112bfddc 79f2db28 ppromotion+0xfd646
112bfe04 79f47545 ppromotion+0xfdb28
112bfe40 76ff7ba9 ppromotion+0x117545
112bfe50 7795c3ab kernel32!BaseThreadInitThunk+0x19
112bfea8 7795c32f ntdll!__RtlUserThreadStart+0x2b
112bfeb8 00000000 ntdll!_RtlUserThreadStart+0x1b
5da0acb7c5ce9508cdca0fc7fcde4b0d_000.dmp
Top 2: total counts = 1
09fefbc8 7a6d3c9a ntdll!RtlEnterCriticalSection+0x63
WARNING: Stack unwind information not available. Following frames may be wrong.
09fefc20 7a7b7545 ppromotion+0x33c9a
09fefc5c 754a5d49 ppromotion+0x117545
09fefc6c 7767d1ab kernel32!BaseThreadInitThunk+0x19
09fefcc4 7767d131 ntdll!__RtlUserThreadStart+0x2b
09fefcd4 00000000 ntdll!_RtlUserThreadStart+0x1b
c842585e2fe0dd2b0a30fd5b83e3cb66_000.dmp