Analyzed 5 dump

Top 1: total counts = 1

0027f5c4 67c70d4f user32!NtUserDestroyWindow+0xc
0027f600 67debb07 node+0x3450d4f
0027f634 67deb888 node+0x35cbb07
0027f674 67de9735 node+0x35cb888
0027f6b4 67de97d0 node+0x35c9735
0027f6e4 67de96a4 node+0x35c97d0
0027f720 67de950d node+0x35c96a4
0027f764 67dd8a7c node+0x35c950d
0027f770 67dd8b5b node+0x35b8a7c
0027f7b0 67dd8bce node+0x35b8b5b
0027f7c4 772587cc node+0x35b8bce
0027f7e4 7725df0a ntdll!LdrpCallInitRoutine+0x14
0027f888 7725dfa5 ntdll!LdrShutdownProcess+0x1aa
0027f89c 76d3bee6 ntdll!RtlExitUserProcess+0x74
0027f948 76d2efac kernel32!ExitProcessStub+0x12
0027f954 77263618 kernel32!BaseThreadInitThunk+0xe
0027f994 772635eb ntdll!__RtlUserThreadStart+0x70
0027f9ac 00000000 ntdll!_RtlUserThreadStart+0x1b

9cf6a17f21a4664046f273f266eba97a_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0461fe28 635fe8da node+0xc6bd50
0461fe7c 64ad93e5 node+0xcee8da
0461fec8 75e57ba9 node+0x21c93e5
0461fed8 774ac3ab kernel32!BaseThreadInitThunk+0x19
0461ff30 774ac32f ntdll!__RtlUserThreadStart+0x2b
0461ff40 00000000 ntdll!_RtlUserThreadStart+0x1b

0c9858b91a786973be95d394944cad70_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
002cca08 682ddc08 node+0x2a2f20b
002ccd07 74736575 node+0xb2dc08
002ccd0f 38383332 userenv!_IsProfileTempFile+0x17
002ccd17 39394442 0x38383332
002ccd1b 20205d38 0x39394442
002ccd1f 32393933 0x20205d38
002ccd23 20343739 0x32393933
002ccd27 203a736d 0x20343739
002ccd2b 76616353 0x203a736d
002ccd2f 65676e65 shell32!__dyn_tls_init_callback  (shell32+0x5d6353)
002ccd33 2e303120 0x65676e65
002ccd37 31282037 0x2e303120
002ccd3b 29372e31 0x31282037
002ccd3f 203e2d20 0x29372e31
002ccd43 322e3031 0x203e2d20
002ccd47 31312820 0x322e3031
002ccd4b 2029372e 0x31312820
002cce4b 74736575 0x2029372e
002ccec3 756d2074 userenv!_IsProfileTempFile+0x17
002ccee7 4347206e msvcrt!_mbscat_s_l+0x98
002ccefb 73657571 0x4347206e
002cceff 0a646574 WindowsCodecs!$$VProc_ImageExportDirectory+0x40d
002ccf03 00000000 0xa646574

ba266c31066c7f1b9b03d4cafa296a70_000.dmp

Top 4: total counts = 1

0019e9e4 685e4502 0x19ea28
0019ea28 6859926c node+0x10a4502
0019ea44 6865d663 node+0x105926c
0019ea78 6859cd50 node+0x111d663
0019eaa0 6859733c node+0x105cd50
0019eabc 6859cd50 node+0x105733c
0019eb08 06bb1cee node+0x105cd50
0019eb3c 6859733c 0x6bb1cee
0019eb5c 6859cd50 node+0x105733c
0019ebb8 6859cd50 node+0x105cd50
0019ec0c 6859ac3f node+0x105cd50
0019ec44 6859aa5b node+0x105ac3f
0019ec70 68184534 node+0x105aa5b
0019ed04 6816ad6d node+0xc44534
0019ed14 040d5d30 node+0xc2ad6d
0019ed18 00000000 0x40d5d30

b235bb5b74bc92da9ec77c830da3af70_000.dmp

Top 5: total counts = 1

0032f4b4 6cb7127f user32!DispatchMessageW+0xf
0032f538 6cb7113a node+0x12a127f
0032f5e0 6cb70f9e node+0x12a113a
0032f64c 6cb70acb node+0x12a0f9e
0032f68c 6cb823d2 node+0x12a0acb
0032f6d4 6cb822e2 node+0x12b23d2
0032f718 6bf9bd42 node+0x12b22e2
0032f740 6bf9d47d node+0x6cbd42
0032f780 6beded6c node+0x6cd47d
0032f7dc 6bedf379 node+0x60ed6c
0032f800 6bedea8a node+0x60f379
0032f804 6cb5a300 node+0x60ea8a
0032f808 00320000 node+0x128a300
0032f80c 00000000 0x320000

51d28413a7717025d3bf89cf846edde7_000.dmp