Analyzed 4 dump
Top 1: total counts = 1
0133eb54 68a5e653 ntdll!RtlQueryPerformanceCounter+0x7c
00000000 00000000 node+0x2f3e653
733969062dd898099b40ab0cdace45fb_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0043c7a0 5d63dc08 node+0x2a2f20b
0043ca9f 614d203a node+0xb2dc08
0043caa3 732d6b72 msimg32!Win32VersionInformation+0x22
0043caa7 70656577 0x732d6b72
0043caab 2e303120 0x70656577
0043caaf 31282039 0x2e303120
0043cab3 29392e32 0x31282039
0043cab7 203e2d20 0x29392e32
0043cabb 392e3031 0x203e2d20
0043cabf 32312820 0x392e3031
0043cac3 2029392e 0x32312820
0043cac7 202c424d 0x2029392e
0043cacb 2e313036 0x202c424d
0043cacf 202f2035 0x2e313036
0043cad3 20302e30 0x202f2035
0043cad7 2020736d 0x20302e30
0043cadb 65766128 0x2020736d
0043cadf 65676172 0x65766128
0043cae3 20756d20 0x65676172
0043cae7 2e30203d 0x20756d20
0043caeb 2c323639 0x2e30203d
0043caef 72756320 0x2c323639
0043caf3 746e6572 0x72756320
0043caf7 20756d20 0x746e6572
0043cafb 2e30203d 0x20756d20
0043caff 29303030 0x2e30203d
0043cb03 776f6c20 0x29303030
0043cb07 6d656d20 0x776f6c20
0043cb0b 2079726f 0x6d656d20
0043cb0f 69746f6e 0x2079726f
0043cb13 61636966 d3d11!ntdll_NULL_THUNK_DATA (d3d11+0x126f6e)
0043cb17 6e6f6974 0x61636966
0043cb1b 20434720 0x6e6f6974
0043cb1f 6f206e69 0x20434720
0043cb23 7320646c 0x6f206e69
0043cb27 65636170 0x7320646c
0043cb2b 71657220 0x65636170
0043cb2f 74736575 0x71657220
0043cb33 5b0a6465 0x74736575
0043cb37 34303431 0x5b0a6465
0043cb3b 3732303a 0x34303431
0043cb3f 31313141 0x3732303a
0043cb43 31205d30 0x31313141
0043cb47 35313731 0x31205d30
0043cb4b 20303033 0x35313731
0043cb4f 203a736d 0x20303033
0043cb53 6b72614d 0x203a736d
0043cb57 6577732d 0x6b72614d
0043cb5b 31207065 0x6577732d
0043cb5f 20372e31 0x31207065
0043cb63 2e323128 0x20372e31
0043cb67 2d202939 0x2e323128
0043cb6b 3031203e 0x2d202939
0043cb6f 2820392e 0x3031203e
0043cb73 392e3231 0x2820392e
0043cb77 424d2029 0x392e3231
0043cb7b 3631202c 0x424d2029
0043cb7f 342e3439 0x3631202c
0043cb83 30202f20 0x342e3439
0043cb87 6d20302e 0x30202f20
0043cb8b 28202073 0x6d20302e
0043cb8f 72657661 0x28202073
0043cb93 20656761 0x72657661
0043cb97 3d20756d 0x20656761
0043cb9b 392e3020 0x3d20756d
0043cb9f 202c3438 0x392e3020
0043cba3 72727563 0x202c3438
0043cba7 20746e65 0x72727563
0043cbab 3d20756d 0x20746e65
0043cbaf 392e3020 0x3d20756d
0043cbb3 20293838 0x392e3020
0043cbb7 20776f6c 0x20293838
0043cbbb 6f6d656d 0x20776f6c
0043cbbf 6e207972 0x6f6d656d
0043cbc3 6669746f 0x6e207972
0043cbc7 74616369 0x6669746f
0043cbcb 206e6f69 0x74616369
0043cbcf 69204347 0x206e6f69
0043cbd3 6c6f206e 0x69204347
0043cbd7 70732064 0x6c6f206e
0043cbdb 20656361 0x70732064
0043cbdf 75716572 0x20656361
0043cc0b 65657773 kernel32!BaseDllWriteKeywordValue+0x1fc
0043cc17 392e3231 0x65657773
0043cc1b 3e2d2029 0x392e3231
0043cc1f 2e303120 0x3e2d2029
0043cc23 31282039 0x2e303120
0043cc27 29392e32 0x31282039
0043cc2b 2c424d20 0x29392e32
0043cc2f 31383320 0x2c424d20
0043cc33 2f20382e 0x31383320
0043cc37 302e3020 0x2f20382e
0043cc3b 20736d20 0x302e3020
0043cc3f 76612820 0x20736d20
0043cc43 67617265 shlwapi!SHExpandEnvironmentStringsForUserW+0x25
0043cc57 6e657272 0x67617265
0043cc5b 756d2074 0x6e657272
0043cc5f 30203d20 msctf!__dyn_tls_init_callback (msctf+0xc2074)
0043cc63 3030302e 0x30203d20
0043cc67 6f6c2029 0x3030302e
0043cc6b 656d2077 0x6f6c2029
0043cc6f 79726f6d 0x656d2077
0043cc73 746f6e20 0x79726f6d
0043cc77 63696669 0x746f6e20
0043cc7b 6f697461 0x63696669
0043cc7f 4347206e 0x6f697461
0043cc83 206e6920 0x4347206e
0043cc87 20646c6f 0x206e6920
0043cc8b 63617073 0x20646c6f
0043cc8f 65722065 0x63617073
0043cc93 73657571 0x65722065
0043cc97 0a646574 0x73657571
0043cc9b 00000000 0xa646574
908033de21609655e4caef25e37efc37_006.dmp
Top 3: total counts = 1
00e3ea44 66c99d80 0xe3eab4
00e3eab4 66c97e0c ffi_bindings!_TI4?AVErrorNapi
00e3eab8 02fd19a0 ffi_bindings!`string'
00e3eabc 10cab9b0 0x2fd19a0
00e3eac0 00000000 0x10cab9b0
e9bb38eaceffb63b748df1a71cc4864e_000.dmp
Top 4: total counts = 1
ChildEBP RetAddr
0030f0d4 128d2d3c KERNELBASE!DebugBreak+0x2
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2a12d3c
8a6a053d344e63c850c5ea8b8916af3f_010.dmp