Analyzed 4 dump

Top 1: total counts = 1

0653f94c 12a9e6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
0653f9b8 7521fcc9 node+0x2f3e6e0
0653f9c8 77037c6e kernel32!BaseThreadInitThunk+0x19
0653fa24 77037c3e ntdll!__RtlUserThreadStart+0x2f
0653fa34 00000000 ntdll!_RtlUserThreadStart+0x1b

f5887d005c8f705e1dff8eac113b4943_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00aff228 5830d1dd node+0x128dd80
00aff360 593fe32a node+0x128d1dd
00aff364 00aff370 node+0x237e32a
00aff368 00000000 0xaff370

7dbdccda3f918fba1be50ecaa6cd2c1c_000.dmp

Top 3: total counts = 1

002ecdc3 69666974 0x6f6e2079
002ecdc7 69746163 base!`DynamicCall::GetDllImports'::`2'::dll_imports+0x907c
002ecdcb 47206e6f 0x69746163
002ecdcf 6e692043 0x47206e6f
002ecdd3 646c6f20 0x6e692043
002ecdd7 61707320 0x646c6f20
002ecddb 72206563 0x61707320
002ecddf 65757165 0x72206563
002ecde3 64657473 0x65757165
002ecde7 35375b0a 0x64657473
002ecdeb 303a3637 0x35375b0a
002ecdef 43314230 0x303a3637
002ecdf3 5d384333 0x43314230
002ecdf7 34332020 0x5d384333
002ecdfb 33353537 0x34332020
002ecdff 736d2039 0x33353537
002ece03 614d203a 0x736d2039
002ece07 732d6b72 0x614d203a
002ece0b 70656577 0x732d6b72
002ece0f 2e313120 0x70656577
002ece13 31282033 0x2e313120
002ece17 29332e32 0x31282033
002ece1b 203e2d20 0x29332e32
002ece1f 342e3031 0x203e2d20
002ece23 32312820 0x342e3031
002ece27 2029332e 0x32312820
002ece2b 202c424d 0x2029332e
002ece2f 2e353833 0x202c424d
002ece33 202f2036 0x2e353833
002ece37 20302e30 0x202f2036
002ece3b 2020736d 0x20302e30
002ece3f 65766128 0x2020736d
002ece43 65676172 0x65766128
002ece47 20756d20 0x65676172
002ece4b 2e30203d 0x20756d20
002ece4f 2c313939 0x2e30203d
002ece53 72756320 0x2c313939
002ece57 746e6572 0x72756320
002ece5b 20756d20 0x746e6572
002ece5f 2e30203d 0x20756d20
002ece63 29343939 0x2e30203d
002ece67 776f6c20 0x29343939
002ece6b 6d656d20 0x776f6c20
002ece6f 2079726f 0x6d656d20
002ece73 69746f6e 0x2079726f
002ece77 61636966 0x69746f6e
002ece7b 6e6f6974 0x61636966
002ece7f 20434720 0x6e6f6974
002ece83 6f206e69 0x20434720
002ece87 7320646c 0x6f206e69
002ece8b 65636170 0x7320646c
002ece8f 71657220 0x65636170
002ece93 74736575 comctl32!__dyn_tls_init_callback  (comctl32+0x177220)
002ece97 5b0a6465 0x74736575
002ece9b 36373537 0x5b0a6465
002ece9f 4230303a 0x36373537
002ecea3 43334331 0x4230303a
002ecea7 20205d38 0x43334331
002eceab 35373433 0x20205d38
002eceaf 20333735 0x35373433
002eceb3 203a736d 0x20333735
002eceb7 6b72614d 0x203a736d
002ecf1b 656d2077 pdh!PdhiEnumObjectItemsFromWmiLog+0x2f4
002ecf37 20646c6f 0x656d2077
002ecf3b 63617073 0x20646c6f
002ecf3f 65722065 0x63617073
002ecf43 73657571 0x65722065
002ecf47 0a646574 0x73657571
002ecf4b 00000000 0xa646574

48cd31b11e5dbc836550e30fc3c7c76b_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0033f318 1064d1dd node+0x128dd80
0033f450 1173e32a node+0x128d1dd
0033f454 0033f460 node+0x237e32a
0033f458 00000000 0x33f460

d56efd906ece6d2e76a9d07b6fc5a9e2_004.dmp