Analyzed 19 dump
Top 1: total counts = 8
04fcfda8 122ce6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
04fcfe14 75cafcc9 node+0x2f3e6e0
04fcfe24 77b582ae kernel32!BaseThreadInitThunk+0x19
04fcfe80 77b5827e ntdll!__RtlUserThreadStart+0x2f
04fcfe90 00000000 ntdll!_RtlUserThreadStart+0x1b
aec939b9a820ad99d8a4a442412674c7_000.dmp
62a595da7758f9b95b6fca59eec50eef_000.dmp
b99f1f86d5dea5d0ce7288fc877ee925_000.dmp
2a7ff9b99dec2abcd247add09350e03e_000.dmp
cee9eda837234f2acad5bbbe5cfa7e55_000.dmp
Top 2: total counts = 3
0677f944 6f21e6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
0677f9b0 776d7ba9 node+0x2f3e6e0
0677f9c0 77c2c36b kernel32!BaseThreadInitThunk+0x19
0677fa18 77c2c2ef ntdll!__RtlUserThreadStart+0x2b
0677fa28 00000000 ntdll!_RtlUserThreadStart+0x1b
6483f25ae5a3e0522152957266d75da4_000.dmp
d803248f3ea622fe90a08a3798d7010f_000.dmp
5cf37963519debe146e5873f9e88a073_000.dmp
Top 3: total counts = 1
ChildEBP RetAddr
004bf338 63e1e87c KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
004bf418 63e689d7 node+0x12ae87c
004bf470 63ee4486 node+0x12f89d7
004bf4e8 63ee4308 node+0x1374486
004bf554 63ef0029 node+0x1374308
004bf558 00000000 node+0x1380029
f76e354843c68be2ab07f96d9b5225df_000.dmp
Top 4: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0133edb8 6cc2d1dd node+0x128dd80
0133eef0 6dd1e32a node+0x128d1dd
0133ef90 7709ed81 node+0x237e32a
0133f0f4 43590544 combase!ServerCall::ContextInvoke+0x4d1
0133f0fc 00000000 0x43590544
82829b1f8f227058c9da0838f95058be_000.dmp
Top 5: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0036c040 67eedc08 node+0x2a2f20b
0036c33f 65766128 node+0xb2dc08
0036c343 65676172 0x65766128
0036c347 20756d20 0x65676172
0036c34b 2e30203d 0x20756d20
0036c34f 2c303838 0x2e30203d
0036c353 72756320 0x2c303838
0036c497 6f697461 rsaenh!SHATransformP3+0x13
0036c4a3 5b0a2065 0x6f697461
0036c4a7 30323933 0x5b0a2065
0036c4ab 4530303a 0x30323933
0036c4af 37374437 0x4530303a
0036c4b3 32205d30 0x37374437
0036c4b7 33363630 0x32205d30
0036c4bb 35383033 0x33363630
0036c4bf 736d2031 0x35383033
0036c4c3 6353203a 0x736d2031
0036c4c7 6e657661 0x6353203a
0036c4cb 37206567 0x6e657661
0036c4cf 20362e30 0x37206567
0036c4d3 2e303828 0x20362e30
0036c4d7 2d202931 0x2e303828
0036c4db 3936203e 0x2d202931
0036c4df 2820382e 0x3936203e
0036c4e3 332e3237 0x2820382e
0036c4e7 424d2029 0x332e3237
0036c4eb 3432202c 0x424d2029
0036c4ef 382e3538 0x3432202c
0036c4f3 30202f20 0x382e3538
0036c4f7 6d20302e 0x30202f20
0036c4fb 28202073 0x6d20302e
0036c4ff 72657661 0x28202073
0036c503 20656761 0x72657661
0036c507 3d20756d 0x20656761
0036c50b 382e3020 0x3d20756d
0036c50f 202c3038 0x382e3020
0036c513 72727563 0x202c3038
0036c517 20746e65 0x72727563
0036c51b 3d20756d 0x20746e65
0036c51f 362e3020 0x3d20756d
0036c523 20293839 0x362e3020
0036c527 6f6c6c61 0x20293839
0036c52b 69746163 0x6f6c6c61
0036c52f 66206e6f node+0x2386163
0036c533 756c6961 0x66206e6f
0036c58b 00000000 setupapi!SetupQueueCopySectionW+0x4a7
7c6ce63254606159871ad397783354b6_010.dmp
Top 6: total counts = 1
ChildEBP RetAddr
WARNING: Frame IP not in any known module. Following frames may be wrong.
012ff480 00000000 0x1000000
83375164adc127cd57922a7428a72de6_000.dmp
Top 7: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0048c9b8 6e81dc08 node+0x2a2f20b
0048ccb7 3a736d20 node+0xb2dc08
0048ccbb 72614d20 0x3a736d20
0048ccbf 77732d6b 0x72614d20
0048ce57 76612820 ntdll!RtlpFreeHeap+0x182
0048cef3 00000000 shell32!CHWNDView::Create+0x97
1bdd583f928b62ccc2c1966ae9703121_000.dmp
Top 8: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0036bdf8 6417dc08 node+0x2a2f20b
0036c0f7 736d2030 node+0xb2dc08
0036c0fb 61282020 winmm!$$VProc_ImageExportDirectory+0xd14
0036c0ff 61726576 0x61282020
0036c103 6d206567 0x61726576
0036c107 203d2075 0x6d206567
0036c10b 32392e30 0x203d2075
0036c10f 63202c36 0x32392e30
0036c113 65727275 gpapi!_imp__DsFreeNameResultW+0x2
0036c117 6d20746e node+0x20d7275
0036c11b 203d2075 0x6d20746e
0036c11f 31392e30 0x203d2075
0036c123 61202938 0x31392e30
0036c127 636f6c6c 0x61202938
0036c12b 6f697461 node+0xa6c6c
0036c12f 6166206e 0x6f697461
0036c133 72756c69 SensApi!_FindPESection+0x7
0036c13f 3032303a 0x72756c69
0036c143 46414133 0x3032303a
0036c147 31205d30 0x46414133
0036c14b 37353039 0x31205d30
0036c14f 35353930 0x37353039
0036c153 736d2038 0x35353930
0036c157 6353203a winmm!$$VProc_ImageExportDirectory+0xd1c
0036c257 756c6961 0x6353203a
0036c2eb 756c6961 shell32!__dyn_tls_init_callback (shell32+0x546961)
0036c2ef 0a206572 shell32!__dyn_tls_init_callback (shell32+0x546961)
0036c2f3 00000000 0xa206572
cac2d539832bcac35a7afd87bfcff503_000.dmp
Top 9: total counts = 1
079bf3c8 582f410b 0x79bf454
079bf44c 582ee89b node+0x7410b
079bf48c 582ee79f node+0x6e89b
079bf580 772d0cb4 node+0x6e79f
079bf5d0 079bf640 ntdll!RtlpFreeHeapInternal+0x7bd
079bf5e0 079bf724 0x79bf640
079bf5e4 5954bfdb 0x79bf724
079bf724 5955056f node+0x12cbfdb
079bf76c 595503cb node+0x12d056f
079bf794 75227ba9 node+0x12d03cb
079bf7a4 772ac2eb kernel32!BaseThreadInitThunk+0x19
079bf7fc 772ac26f ntdll!__RtlUserThreadStart+0x2b
079bf80c 00000000 ntdll!_RtlUserThreadStart+0x1b
ea187355ad7c52815c92861d08afb4bc_001.dmp
Top 10: total counts = 1
0730f46c 702c554d dhcpcsvc!DhcpRequestParams+0x238
WARNING: Stack unwind information not available. Following frames may be wrong.
0730f5b0 702c5461 node+0x317554d
0730f618 6e42cedb node+0x3175461
0730f648 6fd775b0 node+0x12dcedb
0730f67c 6fd643d2 node+0x2c275b0
0730f690 6fd643af node+0x2c143d2
0730f714 6e41c6d4 node+0x2c143af
0730f7d4 6e41bfdb node+0x12cc6d4
0730f914 6e42056f node+0x12cbfdb
0730f960 6e4203cb node+0x12d056f
0730f988 7687343d node+0x12d03cb
0730f994 77c99802 kernel32!BaseThreadInitThunk+0xe
0730f9d4 77c997d5 ntdll!__RtlUserThreadStart+0x70
0730f9ec 00000000 ntdll!_RtlUserThreadStart+0x1b
4a1996f3b16a541bae681f5ae50523b4_009.dmp