Analyzed 10 dump
Top 1: total counts = 6
0628fe50 6fa6e6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
0628febc 7644fcc9 node+0x2f3e6e0
0628fecc 772482ae kernel32!BaseThreadInitThunk+0x19
0628ff28 7724827e ntdll!__RtlUserThreadStart+0x2f
0628ff38 00000000 ntdll!_RtlUserThreadStart+0x1b
6e5ddf9296fb08ab84b79c56083bc73b_001.dmp
36d1c649486abcda9fbe4983ef3c936c_004.dmp
190e367d2c7a4dfb7a9b8cde99cc8da9_000.dmp
be5a907c28a8398e3fca4223da2ceebb_000.dmp
de575badb1d5a685d741c9229a22b925_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
003fee38 6ff6d1dd node+0x128dd80
003fef70 7105e32a node+0x128d1dd
003fef74 003fef80 node+0x237e32a
003fef78 000676b8 0x3fef80
003fef80 00000000 0x676b8
5bec9413e06621e19f6fe1c079722b4c_000.dmp
Top 3: total counts = 1
ChildEBP RetAddr
061ff38c 00000000 fse!FileSearchEngine::IsDBLoaded+0x4e
5bbc4a36f5b6acb8cd7273960edf66bb_000.dmp
Top 4: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00d7efe8 5f25d1dd node+0x128dd80
00d7f128 6034e32a node+0x128d1dd
00d7f12c 00d7f138 node+0x237e32a
00d7f130 0024dca4 0xd7f138
00d7f138 00000000 0x24dca4
062102ce717a50a8ed0d6c6487b48bd6_000.dmp
Top 5: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00abf550 3006a095 node+0xc8e44b
00abf574 6bb8ba27 0x3006a095
00abf578 1c140131 node+0x1b8ba27
00abf57c 21704df5 0x1c140131
00abf580 1c1400c5 0x21704df5
00abf584 010c312c 0x1c1400c5
00abf588 010c3110 0x10c312c
00abf58c 00abf584 0x10c3110
00abf590 010c3110 0xabf584
00abf594 6e2b613c 0x10c3110
00abf598 00a87f20 node+0x42b613c
00abf59c 00abf6c8 0xa87f20
00abf5a0 6ac89386 0xabf6c8
00abf6c8 6ac88f44 node+0xc89386
00abf6cc 0109ffd8 node+0xc88f44
00abf6d0 6ab59eac 0x109ffd8
00abf6d4 048f4348 node+0xb59eac
00abf6d8 07780000 0x48f4348
00abf6dc 0109ffd8 0x7780000
00abf6e0 0109ffd8 0x109ffd8
00abf6e4 00c4b710 0x109ffd8
00abf6e8 010c2548 0xc4b710
00abf6ec 00abf790 0x10c2548
00abf6f0 6ab5893b 0xabf790
00abf790 6ab57b35 node+0xb5893b
00abf81c 6ab57d4b node+0xb57b35
00abf8ac 6ab4a4ca node+0xb57d4b
00abf904 6b2de8b9 node+0xb4a4ca
00abf93c 6b2bf812 node+0x12de8b9
00abf9a8 6b2c89e6 node+0x12bf812
00abfa74 6b2c875e node+0x12c89e6
00abfad0 6b2a0ec3 node+0x12c875e
00abfb0c 6b2a0acb node+0x12a0ec3
00abfb4c 6b2b23d2 node+0x12a0acb
00abfb94 6b2b22e2 node+0x12b23d2
00abfbd8 6a6cbd42 node+0x12b22e2
00abfc00 6a6cd47d node+0x6cbd42
00abfc40 6a60ed6c node+0x6cd47d
00abfc9c 6a60f379 node+0x60ed6c
00abfcc0 6a60ea8a node+0x60f379
00abfd58 774360ae node+0x60ea8a
00abfe28 743d6d6f ntdll!RtlAllocateHeap+0x3e
00abff44 763bfcc9 windows_storage!CKnownFolderUrlStub::ParseDisplayName+0x15f
00abff54 774582ae kernel32!BaseThreadInitThunk+0x19
00abffb0 7745827e ntdll!__RtlUserThreadStart+0x2f
00abffc0 00000000 ntdll!_RtlUserThreadStart+0x1b
726b998b0e4dd96984d353bf9f3fa385_000.dmp