Analyzed 19 dump
Top 1: total counts = 4
00cff434 5a7c127f user32!DispatchMessageW+0x10
00cff4b0 5a7c0f9e node+0x12a127f
00cff51c 5a7c0acb node+0x12a0f9e
00cff55c 5a7d23d2 node+0x12a0acb
00cff5a4 5a7d22e2 node+0x12b23d2
00cff5e8 59bebd42 node+0x12b22e2
00cff610 59bed47d node+0x6cbd42
00cff650 59b2ed6c node+0x6cd47d
00cff6ac 59b2f379 node+0x60ed6c
00cff6d0 59b2ea8a node+0x60f379
00cff770 77aac73e node+0x60ea8a
00cff81c 77aaf7e6 ntdll!RtlAllocateHeap+0x3e
00cff834 72662d00 ntdll!RtlFreeHeap+0x46
00cff844 00000000 0x72662d00
bb69e1c575dd1f2c8b1e8cacb704284f_000.dmp
8274040e401b30f548a70e494117a7d6_001.dmp
75eff39263bad1babf934555372711cd_000.dmp
fafbb27d770c992712f3cdd3dbc81092_000.dmp
Top 2: total counts = 3
00effeb8 0011266c node+0x111f
00efff04 761d5d49 LargeFileClean+0x266c
00efff14 7746d1ab kernel32!BaseThreadInitThunk+0x19
00efff6c 7746d131 ntdll!__RtlUserThreadStart+0x2b
00efff7c 00000000 ntdll!_RtlUserThreadStart+0x1b
d7d3699d6a8c5515d6212cb184cba05a_000.dmp
6f600a4cf8e4f4acc147b27a5e23559d_000.dmp
6062f19772ecf70e2fbee83178f7bd9d_002.dmp
Top 3: total counts = 2
00aff6e4 53e7127f user32!DispatchMessageW+0x10
00aff760 53e70f9e node+0x12a127f
00aff7cc 53e70acb node+0x12a0f9e
00aff80c 53e823d2 node+0x12a0acb
00aff854 53e822e2 node+0x12b23d2
00aff898 5329bd42 node+0x12b22e2
00aff8c0 5329d47d node+0x6cbd42
00aff900 531ded6c node+0x6cd47d
00aff95c 531df379 node+0x60ed6c
00aff980 531dea8a node+0x60f379
00affa18 775eadee node+0x60ea8a
00affa24 00000000 ntdll!RtlAllocateHeap+0x3e
609db91d28a75a37c9666f0956de65f6_002.dmp
f06ed3d54a711cb7b6a2ed672736d2bf_000.dmp
Top 4: total counts = 2
00cff644 6d54127f user32!DispatchMessageW+0x10
00cff6c8 6d54113a node+0x12a127f
00cff778 6d540f9e node+0x12a113a
00cff7e4 6d540acb node+0x12a0f9e
00cff824 6d5523d2 node+0x12a0acb
00cff86c 6d5522e2 node+0x12b23d2
00cff8b0 6c96bd42 node+0x12b22e2
00cff8d8 6c96d47d node+0x6cbd42
00cff918 6c8aed6c node+0x6cd47d
00cff974 6c8af379 node+0x60ed6c
00cff998 6c8aea8a node+0x60f379
00cffa30 77615eae node+0x60ea8a
00cffa3c 00000000 ntdll!RtlAllocateHeap+0x3e
f05ba7b7ad861017728fb0c865f345f0_000.dmp
3d22b2221ff28847fea7d6ded5ea9c2c_000.dmp
Top 5: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
004fc8f8 107cdc08 node+0x2a2f20b
004fcbf7 3a736d20 node+0xb2dc08
004fcbfb 72614d20 0x3a736d20
004fcbff 77732d6b 0x72614d20
004fd343 00000000 ws2_32!GetAddrInfoW+0x6bb
96f8976d06fcab76c04845c4a528889a_000.dmp
Top 6: total counts = 1
006ff2f4 10f4127f user32!DispatchMessageW+0x10
006ff370 10f40f9e node+0x12a127f
006ff3dc 10f40acb node+0x12a0f9e
006ff41c 10f523d2 node+0x12a0acb
006ff464 10f522e2 node+0x12b23d2
006ff4a8 1036bd42 node+0x12b22e2
006ff4d0 1036d47d node+0x6cbd42
006ff510 102aed6c node+0x6cd47d
006ff56c 102af379 node+0x60ed6c
006ff590 102aea8a node+0x60f379
006ff628 779a03d6 node+0x60ea8a
006ff634 00000000 ntdll!RtlAllocateHeap+0x36
cf41949fb60fd64a92e8c7ac6ca42ba6_000.dmp
Top 7: total counts = 1
005ff4c4 5864127f user32!DispatchMessageW+0x10
005ff540 58640f9e node+0x12a127f
005ff5ac 58640acb node+0x12a0f9e
005ff5ec 586523d2 node+0x12a0acb
005ff634 586522e2 node+0x12b23d2
005ff678 57a6bd42 node+0x12b22e2
005ff6a0 57a6d47d node+0x6cbd42
005ff6e0 579aed6c node+0x6cd47d
005ff73c 579af379 node+0x60ed6c
005ff760 579aea8a node+0x60f379
005ff800 7736c73e node+0x60ea8a
005ff80c 005ff87c ntdll!RtlAllocateHeap+0x3e
00000000 00000000 0x5ff87c
6433bf3d089d4482f3a131d7b6331847_000.dmp
Top 8: total counts = 1
00d6f814 6818127f user32!DispatchMessageW+0x10
00d6f898 68180f9e node+0x12a127f
00d6f904 68180acb node+0x12a0f9e
00d6f944 681923d2 node+0x12a0acb
00d6f98c 681922e2 node+0x12b23d2
00d6f9d0 675abd42 node+0x12b22e2
00d6f9f8 675ad47d node+0x6cbd42
00d6fa38 674eed6c node+0x6cd47d
00d6fa94 674ef379 node+0x60ed6c
00d6fab8 674eea8a node+0x60f379
00d6fb58 7781c73e node+0x60ea8a
00d6fb64 00d6fbd4 ntdll!RtlAllocateHeap+0x3e
00000000 00000000 0xd6fbd4
0d7e4e9595411adae36285790a7caef4_003.dmp
Top 9: total counts = 1
0053f4f4 5e88127f user32!DispatchMessageW+0x10
0053f578 5e880f9e node+0x12a127f
0053f5e4 5e880acb node+0x12a0f9e
0053f624 5e8923d2 node+0x12a0acb
0053f66c 5e8922e2 node+0x12b23d2
0053f6b0 5dcabd42 node+0x12b22e2
0053f6d8 5dcad47d node+0x6cbd42
0053f718 5dbeed6c node+0x6cd47d
0053f774 5dbef379 node+0x60ed6c
0053f798 5dbeea8a node+0x60f379
0053f838 77e6c73e node+0x60ea8a
0053f8e4 77e6f7e6 ntdll!RtlAllocateHeap+0x3e
0053f8fc 72662d00 ntdll!RtlFreeHeap+0x46
0053f90c 00000000 usp10!__security_cookie+0xd00
33d1e412a8f7fd6712cbd1a184dab9f3_001.dmp
Top 10: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00aff048 6bdcd1dd node+0x128dd80
00aff180 6cebe32a node+0x128d1dd
00aff184 00aff190 node+0x237e32a
00aff188 0005b5c0 0xaff190
00aff190 00000000 0x5b5c0
701472d099c4f07ba3c8e6eafc2f610f_004.dmp
Top 11: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
0097f0b8 1030d1dd node+0x128dd80
0097f1f8 113fe32a node+0x128d1dd
0097f298 77e7be5f node+0x237e32a
0097f354 77e63c16 ntdll!RtlWow64GetProcessMachines+0x9f
0097f36c 00000000 ntdll!RtlFreeHeap+0x46
f19d58122c265a4dbcf389b7a3fefe7c_000.dmp
Top 12: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00cff318 61a0d1dd node+0x128dd80
00cff458 62afe32a node+0x128d1dd
00cff45c 00cff468 node+0x237e32a
00cff460 0034ef5c 0xcff468
00cff468 00000000 0x34ef5c
c88208f42192fbf118a1fb367eb10ff8_000.dmp