Analyzed 2 dump
Top 1: total counts = 1
ChildEBP RetAddr
0031ecec 6df22d3c KERNELBASE!DebugBreak+0x2
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2a12d3c
2bc8bd82282e21cdb3429cb55fb2dea8_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0022c910 691edc08 node+0x2a2f20b
0022cc0f 4d203a73 node+0xb2dc08
0022cc13 2d6b7261 0x4d203a73
0022cc17 65657773 0x2d6b7261
0022cc1b 30312070 0x65657773
0022cc1f 2820332e 0x30312070
0022cc23 302e3231 0x2820332e
0022cc27 3e2d2029 0x302e3231
0022cc2b 2e303120 0x3e2d2029
0022cc2f 31282033 0x2e303120
0022cc33 29302e32 0x31282033
0022cc37 2c424d20 0x29302e32
0022cc3b 2e383120 0x2c424d20
0022cc3f 202f2033 0x2e383120
0022cc43 20302e30 0x202f2033
0022cc47 2020736d 0x20302e30
0022cc4b 65766128 0x2020736d
0022cc4f 65676172 0x65766128
0022cc53 20756d20 0x65676172
0022cc57 2e30203d 0x20756d20
0022cc5b 2c373939 0x2e30203d
0022cc5f 72756320 0x2c373939
0022cc63 746e6572 winhttp!Microsoft_Windows_Networking_ProviderId (winhttp+0x56320)
0022cc67 20756d20 0x746e6572
0022cc6b 2e30203d 0x20756d20
0022cc6f 29323030 0x2e30203d
0022cc73 776f6c20 0x29323030
0022cc77 6d656d20 0x776f6c20
0022cc7b 2079726f 0x6d656d20
0022cc7f 69746f6e 0x2079726f
0022cc83 61636966 node+0x1086f6e
0022cc87 6e6f6974 0x61636966
0022cc8b 20434720 0x6e6f6974
0022cc8f 6f206e69 0x20434720
0022cc93 7320646c 0x6f206e69
0022cc97 65636170 0x7320646c
0022cc9b 71657220 0x65636170
0022cc9f 74736575 0x71657220
0022cca3 5b0a6465 0x74736575
0022cca7 36353232 0x5b0a6465
0022ccab 3930303a 0x36353232
0022ccaf 35463146 0x3930303a
0022ccb3 33205d30 0x35463146
0022ccb7 39333934 0x33205d30
0022ccbb 32393938 0x39333934
0022ccbf 3a736d20 0x32393938
0022ccc3 72614d20 0x3a736d20
0022ccc7 77732d6b 0x72614d20
0022cccb 20706565 0x77732d6b
0022cccf 382e3031 0x20706565
0022ccd3 32312820 0x382e3031
0022ccd7 2029302e 0x32312820
0022ccdb 31203e2d 0x2029302e
0022ccdf 20332e30 0x31203e2d
0022cce3 2e323128 0x20332e30
0022cce7 4d202930 0x2e323128
0022cceb 33202c42 0x4d202930
0022ccef 342e3830 0x33202c42
0022ccf3 30202f20 0x342e3830
0022ccf7 6d20302e 0x30202f20
0022ccfb 28202073 0x6d20302e
0022ccff 72657661 0x28202073
0022cd03 20656761 0x72657661
0022cd07 3d20756d 0x20656761
0022cd0b 392e3020 0x3d20756d
0022cd0f 202c3539 0x392e3020
0022cd13 72727563 0x202c3539
0022cd23 20293539 winhttp!RtlIpv6StringToAddressExCopyA+0x1a5
0022cd37 74616369 0x20293539
0022cd3b 206e6f69 0x74616369
0022cd3f 69204347 0x206e6f69
0022cd43 6c6f206e node+0xb44347
0022cd47 70732064 node+0x403206e
0022cd4b 20656361 0x70732064
0022cd4f 75716572 0x20656361
0022cd53 65747365 shell32!__dyn_tls_init_callback (shell32+0x756572)
0022cd57 325b0a64 0x65747365
0022cd5b 3a363532 0x325b0a64
0022cd5f 46393030 0x3a363532
0022cd63 30354631 0x46393030
0022cd67 3433205d 0x30354631
0022cd6b 39393339 0x3433205d
0022cd6f 20303830 0x39393339
0022cd73 203a736d 0x20303830
0022cd77 6b72614d 0x203a736d
0022cd7b 6577732d node+0x306614d
0022cd7f 31207065 0x6577732d
0022cd83 20332e30 0x31207065
0022cd87 2e323128 0x20332e30
0022cd8b 2d202930 0x2e323128
0022cd8f 3031203e 0x2d202930
0022cd93 2820332e 0x3031203e
0022cd97 302e3231 0x2820332e
0022cd9b 424d2029 0x302e3231
0022cd9f 3838202c 0x424d2029
0022cda3 2f20312e 0x3838202c
0022cda7 302e3020 0x2f20312e
0022cdab 20736d20 0x302e3020
0022cdaf 76612820 0x20736d20
0022cdb3 67617265 Wldap32!$$VProc_ImageExportDirectory+0x70c
0022cdb7 756d2065 0x67617265
0022cdbb 30203d20 shell32!__dyn_tls_init_callback (shell32+0x712065)
0022cdbf 3339392e 0x30203d20
0022cdc3 7563202c 0x3339392e
0022cdc7 6e657272 shell32!__dyn_tls_init_callback (shell32+0x67202c)
0022cdcb 756d2074 0x6e657272
0022cdcf 30203d20 shell32!__dyn_tls_init_callback (shell32+0x712074)
0022cdd3 3030302e 0x30203d20
0022cdd7 6f6c2029 0x3030302e
0022cddb 656d2077 0x6f6c2029
0022cddf 79726f6d 0x656d2077
0022cde3 746f6e20 0x79726f6d
0022cde7 63696669 0x746f6e20
0022cdeb 6f697461 0x63696669
0022cdef 4347206e 0x6f697461
0022cdf3 206e6920 0x4347206e
0022cdf7 20646c6f 0x206e6920
0022cdfb 63617073 0x20646c6f
0022d0a3 00000000 CursorTheme!Utils::CheckService360SafeAllow+0x63
02b325ded8aa0998dbee80a224d535f3_010.dmp