Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00dae6b4 00000000 KERNELBASE!RaiseException+0x62

b8760e2d1e8703a776717ff2a78b6d18_000.dmp

Top 2: total counts = 1

0133f2e4 68bf0f37 user32!DispatchMessageW+0x10
0133f368 68bf0df2 node+0x12a0f37
0133f418 68bf0c56 node+0x12a0df2
0133f484 68bf0783 node+0x12a0c56
0133f4c4 68c01fd2 node+0x12a0783
0133f50c 68c01ee2 node+0x12b1fd2
0133f550 6801bd42 node+0x12b1ee2
0133f578 6801d47d node+0x6cbd42
0133f5b8 67f5ed6c node+0x6cd47d
0133f614 67f5f379 node+0x60ed6c
0133f638 67f5ea8a node+0x60f379
0133f6d8 779dc6fe node+0x60ea8a
0133f784 779ea796 ntdll!RtlAllocateHeap+0x3e
0133f860 76457ba9 ntdll!RtlInitializeCriticalSectionEx+0xf6
0133f870 779fc36b kernel32!BaseThreadInitThunk+0x19
0133f8c8 779fc2ef ntdll!__RtlUserThreadStart+0x2b
0133f8d8 00000000 ntdll!_RtlUserThreadStart+0x1b

ed92d3165d9066487308aa9846ee1abe_000.dmp