Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0c19fd28 77a3e04f ntdll!RtlpWaitOnCriticalSection+0xab
0c19fd5c 6ab998bb ntdll!RtlpEnterCriticalSectionContended+0x9b
0c19fd70 6ab9a102 msctfuimanager!CCommandingUI::_IsCloseOnUIThread+0x11
0c19fd8c 6ab9a3d0 msctfuimanager!CCommandingUI::_Create+0x60
0c19fda4 7616495d msctfuimanager!CCommandingUI::UIThreadProc+0xba
0c19fdb0 77a698ee kernel32!BaseThreadInitThunk+0xe
0c19fdf4 77a698c4 ntdll!__RtlUserThreadStart+0x20
0c19fe04 00000000 ntdll!_RtlUserThreadStart+0x1b

a23cea74f24084d444d2da21fbcad548_000.dmp

Top 2: total counts = 1

003dc51f 67617265 shell32!__dyn_tls_init_callback  (shell32+0x5f2820)
003dc523 756d2065 NetBase+0x37265
003dc527 30203d20 kernel32!$$VProc_ImageExportDirectory+0x1d75
003dc52b 3739392e 0x30203d20
003dc52f 7563202c 0x3739392e
003dc5b3 6d206567 kernel32!RegQueryInfoKeyA+0x71
003dc5e7 5b0a2065 node+0x3626567
003dc5eb 38323733 0x5b0a2065
003dc5ef 3332303a 0x38323733
003dc5f3 31364231 0x3332303a
003dc5f7 32205d38 0x31364231
003dc5fb 32373637 0x32205d38
003dc5ff 38323633 0x32373637
003dc603 3a736d20 0x38323633
003dc607 61635320 0x3a736d20
003dc60b 676e6576 0x61635320
003dc60f 31312065 NetBase+0x106576
003dc613 2820392e 0x31312065
003dc617 302e3331 0x2820392e
003dc61b 3e2d2029 0x302e3331
003dc61f 2e303120 0x3e2d2029
003dc623 31282039 0x2e303120
003dc627 29302e33 0x31282039
003dc62b 2c424d20 0x29302e33
003dc62f 352e3020 0x2c424d20
003dc633 30202f20 0x352e3020
003dc637 6d20302e 0x30202f20
003dc63b 28202073 node+0x362302e
003dc63f 72657661 0x28202073
003dc643 20656761 0x72657661
003dc647 3d20756d 0x20656761
003dc64b 392e3020 0x3d20756d
003dc64f 202c3739 0x392e3020
003dc653 72727563 0x202c3739
003dc657 20746e65 0x72727563
003dc65b 3d20756d 0x20746e65
003dc65f 302e3020 0x3d20756d
003dc663 20293230 0x302e3020
003dc667 6f6c6c61 0x20293230
003dc66b 69746162 0x6f6c6c61
003dc66f 66206e6f nativeutils!std::_Generic_error_category::message+0x42
003dc67b 00000000 0x66206e6f

e9886117b5003af15dbf1b67f9342ace_000.dmp