Analyzed 1 dump

Top 1: total counts = 1

002df5f4 6b0ef8eb user32!NtUserDestroyWindow+0xc
002df630 6b26b648 node+0x344f8eb
002df664 6b26b3c9 node+0x35cb648
002df6a4 6b26926b node+0x35cb3c9
002df6e8 6b269306 node+0x35c926b
002df718 6b2691d7 node+0x35c9306
002df754 6b269036 node+0x35c91d7
002df798 6b25761c node+0x35c9036
002df7a4 6b2576fb node+0x35b761c
002df7e4 6b25776e node+0x35b76fb
002df7f8 77b08cc8 node+0x35b776e
002df818 77b0e402 ntdll!LdrpCallInitRoutine+0x14
002df8bc 77b0e49d ntdll!LdrShutdownProcess+0x1aa
002df8d0 763fbd26 ntdll!RtlExitUserProcess+0x74
002df97c 763eee6c kernel32!ExitProcessStub+0x12
002df988 77b13ab3 kernel32!BaseThreadInitThunk+0xe
002df9c8 77b13a86 ntdll!__RtlUserThreadStart+0x70
002df9e0 00000000 ntdll!_RtlUserThreadStart+0x1b

c6c3884e92608ad54bd0471b1d886574_000.dmp