Analyzed 4 dump
Top 1: total counts = 2
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x18378fd
fcf93bab65374f466362afa71bdccce2_000.dmp
ce629f06b1273952e9f5979b8a494aef_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
00d8f534 70ad88c5 node+0x12ae2d2
00d8f5d4 6e793961 node+0x2a188c5
00d8f648 6f3885ca node+0x6d3961
00d8f714 6f388342 node+0x12c85ca
00d8f770 6f360b8b node+0x12c8342
00d8f7ac 6f360793 node+0x12a0b8b
00d8f7ec 6f371fb6 node+0x12a0793
00d8f834 6f371ec6 node+0x12b1fb6
00d8f878 6e78bd42 node+0x12b1ec6
00d8f8a0 6e78d47d node+0x6cbd42
00d8f8e0 6e6ced6c node+0x6cd47d
00d8f93c 6e6cf379 node+0x60ed6c
00d8f960 6e6cea8a node+0x60f379
00d8fa00 770d4b6e node+0x60ea8a
00d8faac 770c6783 ntdll!RtlAllocateHeap+0x3e
00d8fb88 75fc6739 ntdll!RtlInitializeCriticalSectionEx+0xf3
00d8fb98 770f8aff kernel32!BaseThreadInitThunk+0x19
00d8fbf0 770f8acd ntdll!__RtlUserThreadStart+0x2b
00d8fc00 00000000 ntdll!_RtlUserThreadStart+0x1b
f04ca55dc2b497be5395b0c0854a2ddf_000.dmp
Top 3: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
001ec6d0 6879dc08 node+0x2a2ee0b
001ec9cf 74732033 node+0xb2dc08
001ec9d3 20737065 cryptsp!memmove+0xb5
001ec9d7 636e6973 0x20737065
001ec9db 74732065 0x636e6973
001ec9df 20747261 cryptsp!memmove+0xe7
001ec9e3 6d20666f 0x20747261
001ec9e7 696b7261 0x6d20666f
001ec9eb 202c676e node+0x1a47261
001ec9ef 67676962 0x202c676e
001ec9f3 20747365 0x67676962
001ec9f7 70657473 0x20747365
001ec9fb 352e3020 0x70657473
001ec9ff 2c736d20 0x352e3020
001eca03 6c617720 0x2c736d20
001eca07 6d69746c 0x6c617720
001eca0b 69732065 0x6d69746c
001eca0f 2065636e node+0x1ac2065
001eca13 72617473 0x2065636e
001eca17 666f2074 0x72617473
001eca1b 72616d20 0x666f2074
001eca1f 676e696b 0x72616d20
001eca23 20373220 0x676e696b
001eca27 2029736d 0x20373220
001eca2b 65766128 0x2029736d
001eca2f 65676172 0x65766128
001eca33 20756d20 0x65676172
001eca37 2e31203d 0x20756d20
001eca3b 2c303030 0x2e31203d
001eca3f 72756320 0x2c303030
001eca43 746e6572 0x72756320
001ecac3 72657661 mswsock!SockDoConnectReal+0x289
001ecadb 20746e65 0x72657661
001ecadf 3d20756d 0x20746e65
001ecae3 392e3020 0x3d20756d
001ecae7 20293839 0x392e3020
001ecaeb 20776f6c 0x20293839
001ecaef 6f6d656d 0x20776f6c
001ecaf3 6e207972 0x6f6d656d
001ecaf7 6669746f 0x6e207972
001ecafb 74616369 0x6669746f
001ecaff 206e6f69 0x74616369
001ecb03 69204347 0x206e6f69
001ecb07 6c6f206e node+0x1594347
001ecb0b 70732064 0x6c6f206e
001ecb0f 20656361 0x70732064
001ecb13 75716572 0x20656361
001ecb73 67617265 shell32!_PropVariantFromFilterCondition+0x61
001ecb7f 3739392e 0x67617265
001ecb83 7563202c 0x3739392e
001ecb87 6e657272 shell32!CApplicationListsBase::_EnsureAppID+0x9
001ecb8b 756d2074 0x6e657272
001ecbfb 00000000 shell32!CFTAssocInfo::_ClassIDToProgID+0x108
cc8e3efb676756e02d6591404e129846_002.dmp