Analyzed 21 dump
Top 1: total counts = 5
0053f7a4 68ef127f user32!DispatchMessageW+0x10
0053f828 68ef0f9e node+0x12a127f
0053f894 68ef0acb node+0x12a0f9e
0053f8d4 68f023d2 node+0x12a0acb
0053f91c 68f022e2 node+0x12b23d2
0053f960 6831bd42 node+0x12b22e2
0053f988 6831d47d node+0x6cbd42
0053f9c8 6825ed6c node+0x6cd47d
0053fa24 6825f379 node+0x60ed6c
0053fa48 6825ea8a node+0x60f379
0053fae0 77405efe node+0x60ea8a
0053faec 00000000 ntdll!RtlAllocateHeap+0x3e
2e9e86dcf9c529d3d75d5c3fec128a32_000.dmp
1609a45063edd6b15ea24cf5cc34d563_000.dmp
4333a9b86b16d4d1fe1e97eebace3d8e_001.dmp
9dfb4b92a516a2a36b3f705112f35d3a_001.dmp
b620f177b08639fb105b399b4a323dac_001.dmp
Top 2: total counts = 4
0552fc2c 6866e6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
0552fc98 760cfcc9 node+0x2f3e6e0
0552fca8 77d982ae kernel32!BaseThreadInitThunk+0x19
0552fd04 77d9827e ntdll!__RtlUserThreadStart+0x2f
0552fd14 00000000 ntdll!_RtlUserThreadStart+0x1b
b88781f46893f6d0cf0b409fe0fc85b2_003.dmp
afa8f9f30802d4672a9816ca1f3c538c_000.dmp
4ba39f965d6be9ebce1b5872e8a38ea0_000.dmp
79c06b99560747789af15320bfe401c7_000.dmp
Top 3: total counts = 3
004ff4a4 65e3127f user32!DispatchMessageW+0x10
004ff520 65e30f9e node+0x12a127f
004ff58c 65e30acb node+0x12a0f9e
004ff5cc 65e423d2 node+0x12a0acb
004ff614 65e422e2 node+0x12b23d2
004ff658 6525bd42 node+0x12b22e2
004ff680 6525d47d node+0x6cbd42
004ff6c0 6519ed6c node+0x6cd47d
004ff71c 6519f379 node+0x60ed6c
004ff740 6519ea8a node+0x60f379
004ff7e0 7727bfae node+0x60ea8a
004ff88c 7727f056 ntdll!RtlAllocateHeap+0x3e
004ff8a4 72662d00 ntdll!RtlFreeHeap+0x46
004ff8b4 00000000 0x72662d00
c103b1f862624350226bdd170bfbb03d_000.dmp
4d6f33bd488b0a4c65cb4f04a271bc3e_000.dmp
4978c138fb94c9160418a13d9c2c0c1b_000.dmp
Top 4: total counts = 1
0136f9c4 6afe127f user32!DispatchMessageW+0x10
0136fa40 6afe0f9e node+0x12a127f
0136faac 6afe0acb node+0x12a0f9e
0136faec 6aff23d2 node+0x12a0acb
0136fb34 6aff22e2 node+0x12b23d2
0136fb78 6a40bd42 node+0x12b22e2
0136fba0 6a40d47d node+0x6cbd42
0136fbe0 6a34ed6c node+0x6cd47d
0136fc3c 6a34f379 node+0x60ed6c
0136fc60 6a34ea8a node+0x60f379
0136fd00 775ec73e node+0x60ea8a
0136fd0c 0136fd7c ntdll!RtlAllocateHeap+0x3e
00000000 00000000 0x136fd7c
60bd382978d5d74d11d1372f43a7c9bc_000.dmp
Top 5: total counts = 1
006ff614 7075127f user32!DispatchMessageW+0x10
006ff698 70750f9e node+0x12a127f
006ff704 70750acb node+0x12a0f9e
006ff744 707623d2 node+0x12a0acb
006ff78c 707622e2 node+0x12b23d2
006ff7d0 6fb7bd42 node+0x12b22e2
006ff7f8 6fb7d47d node+0x6cbd42
006ff838 6fabed6c node+0x6cd47d
006ff894 6fabf379 node+0x60ed6c
006ff8b8 6fabea8a node+0x60f379
00ac8900 00000000 node+0x60ea8a
3dbc9a11b45c6732dc9b14be2762d2e4_003.dmp
Top 6: total counts = 1
ChildEBP RetAddr
045ff3e4 045ff4c8 KERNELBASE!RaiseException+0x62
WARNING: Frame IP not in any known module. Following frames may be wrong.
045ff3f8 045ff408 0x45ff4c8
045ff3fc b32385fc 0x45ff408
045ff408 00000000 0xb32385fc
c4a5ad4af7244cbd543ee43d7aae61bc_003.dmp
Top 7: total counts = 1
005cf624 680d127f user32!DispatchMessageW+0x10
005cf6a8 680d113a node+0x12a127f
005cf758 680d0f9e node+0x12a113a
005cf7c4 680d0acb node+0x12a0f9e
005cf804 680e23d2 node+0x12a0acb
005cf84c 680e22e2 node+0x12b23d2
005cf890 674fbd42 node+0x12b22e2
005cf8b8 674fd47d node+0x6cbd42
005cf8f8 6743ed6c node+0x6cd47d
005cf954 6743f379 node+0x60ed6c
005cf978 6743ea8a node+0x60f379
005cfa10 77715e1e node+0x60ea8a
005cfac4 77713c56 ntdll!RtlAllocateHeap+0x3e
005cfadc 72662d00 ntdll!RtlFreeHeap+0x46
005cfaec 00000000 0x72662d00
cefc65b79eaf05abecf292ce64ddcc8f_002.dmp
Top 8: total counts = 1
005afd74 00c5266c node+0x111f
005afdc0 75fe5d49 LargeFileClean+0x266c
005afdd0 77c0d1ab kernel32!BaseThreadInitThunk+0x19
005afe28 77c0d131 ntdll!__RtlUserThreadStart+0x2b
005afe38 00000000 ntdll!_RtlUserThreadStart+0x1b
e9b6397661b7d098b08b8d360abdcae3_003.dmp
Top 9: total counts = 1
009af794 6ecc127f user32!DispatchMessageW+0x10
009af818 6ecc0f9e node+0x12a127f
009af884 6ecc0acb node+0x12a0f9e
009af8c4 6ecd23d2 node+0x12a0acb
009af90c 6ecd22e2 node+0x12b23d2
009af950 6e0ebd42 node+0x12b22e2
009af978 6e0ed47d node+0x6cbd42
009af9b8 6e02ed6c node+0x6cd47d
009afa14 6e02f379 node+0x60ed6c
009afa38 6e02ea8a node+0x60f379
009afa3c 6ecaa300 node+0x60ea8a
009afa40 009a0000 node+0x128a300
009afa44 00000000 0x9a0000
5e2f668a1eeca5b1ff27f6af34e88c66_001.dmp
Top 10: total counts = 1
003ef584 1039127f user32!DispatchMessageW+0x10
003ef600 10390f9e node+0x12a127f
003ef66c 10390acb node+0x12a0f9e
003ef6ac 103a23d2 node+0x12a0acb
003ef6f4 103a22e2 node+0x12b23d2
003ef738 0f7bbd42 node+0x12b22e2
003ef760 0f7bd47d node+0x6cbd42
003ef7a0 0f6fed6c node+0x6cd47d
003ef7fc 0f6ff379 node+0x60ed6c
003ef820 0f6fea8a node+0x60f379
003ef8b8 77375dde node+0x60ea8a
003ef96c 77373c16 ntdll!RtlAllocateHeap+0x3e
003ef984 72662d00 ntdll!RtlFreeHeap+0x46
02998cb4 628b8b6b winhttp!WriteWinInetProxySettingsHelper+0x280
00000000 00000000 0x628b8b6b
74d6aa9a234c47cd482bc6399852430e_000.dmp
Top 11: total counts = 1
0018f894 6e99127f user32!DispatchMessageW+0x10
0018f910 6e990f9e node+0x12a127f
0018f97c 6e990acb node+0x12a0f9e
0018f9bc 6e9a23d2 node+0x12a0acb
0018fa04 6e9a22e2 node+0x12b23d2
0018fa48 6ddbbd42 node+0x12b22e2
0018fa70 6ddbd47d node+0x6cbd42
0018fab0 6dcfed6c node+0x6cd47d
0018fb0c 6dcff379 node+0x60ed6c
0018fb30 6dcfea8a node+0x60f379
0018fb90 77ca2bfe node+0x60ea8a
0018fb98 77ca2cf0 ntdll!RtlAllocateHeap+0x2e
0018fbd8 77ca2bfe ntdll!RtlpAllocateHeapInternal+0xd0
0018fbe4 0018fc20 ntdll!RtlAllocateHeap+0x2e
00000000 00000000 0x18fc20
09f2b4478f23072363a7f6c7b349f1ed_000.dmp
Top 12: total counts = 1
004ff8e4 703f127f user32!DispatchMessageW+0x10
004ff968 703f0f9e node+0x12a127f
004ff9d4 703f0acb node+0x12a0f9e
004ffa14 704023d2 node+0x12a0acb
004ffa5c 704022e2 node+0x12b23d2
004ffaa0 6f81bd42 node+0x12b22e2
004ffac8 6f81d47d node+0x6cbd42
004ffb08 6f75ed6c node+0x6cd47d
004ffb64 6f75f379 node+0x60ed6c
004ffb88 6f75ea8a node+0x60f379
004ffc20 76ef60ae node+0x60ea8a
004ffcd4 76ef3ee6 ntdll!RtlAllocateHeap+0x3e
004ffcec 72662d00 ntdll!RtlFreeHeap+0x46
004ffcfc 00000000 node+0x3512d00
9c7904147d6d9d21dcb5693f76fb7180_000.dmp