Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
008fce48 669bdc08 node+0x2a2f20b
008fd147 65636170 node+0xb2dc08
008fd14b 71657220 0x65636170
008fd14f 74736575 0x71657220
008fd153 5b0a6465 0x74736575
008fd1d7 6e6f6974 d3d11!CDevice::CreateHullShader+0x15
008fd1ef 5d303235 0x6e6f6974
008fd1f3 35383220 0x5d303235
008fd1f7 37323739 0x35383220
008fd1fb 736d2030 0x37323739
008fd1ff 614d203a iertutil!SettingStore::s_rgValueTree+0x4820
008fd203 732d6b72 0x614d203a
008fd227 202c424d cryptnet!CTVOAgent::PreFetchCrl+0x7f
008fd22f 2e30202f 0x202c424d
008fd233 736d2030 0x2e30202f
008fd237 61282020 iertutil!SettingStore::s_rgValueTree+0x4820
008fd23b 61726576 0x61282020
008fd23f 6d206567 0x61726576
008fd243 203d2075 0x6d206567
008fd247 30302e31 0x203d2075
008fd24b 63202c30 0x30302e31
008fd24f 65727275 0x63202c30
008fd253 6d20746e 0x65727275
008fd257 203d2075 0x6d20746e
008fd25b 30302e31 0x203d2075
008fd25f 6c202930 0x30302e31
008fd263 6d20776f 0x6c202930
008fd267 726f6d65 0x6d20776f
008fd26b 6f6e2079 0x726f6d65
008fd26f 69666974 0x6f6e2079
008fd273 69746163 node+0x37d6974
008fd277 47206e6f node+0x38b6163
008fd27b 6e692043 0x47206e6f
008fd27f 646c6f20 0x6e692043
008fd283 61707320 0x646c6f20
008fd287 72206563 0x61707320
008fd28b 65757165 0x72206563
008fd28f 64657473 0x65757165
008fd293 33395b0a 0x64657473
008fd297 32303a32 0x33395b0a
008fd29b 35374142 0x32303a32
008fd29f 205d3032 0x35374142
008fd2a3 39353832 0x205d3032
008fd2a7 38373237 0x39353832
008fd2ab 3a736d20 0x38373237
008fd2af 72614d20 0x3a736d20
008fd2b3 77732d6b 0x72614d20
008fd70b 00000000 ntdll!_woutput_s+0x577

4534a177ec784dac291f5d0b99dd395d_000.dmp

Top 2: total counts = 1

0cdbfc90 6873e6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
0cdbfcfc 75b3343d node+0x2f3e6e0
0cdbfd08 77ad9802 kernel32!BaseThreadInitThunk+0xe
0cdbfd48 77ad97d5 ntdll!__RtlUserThreadStart+0x70
0cdbfd60 00000000 ntdll!_RtlUserThreadStart+0x1b

696b51adcbef88dbfeaa65804dd1763c_000.dmp