Analyzed 3 dump
Top 1: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
1735f178 14f65ebd Safelive+0x25580
1735f228 14f4bdc0 Safelive+0x25ebd
1735f244 14f4b678 Safelive+0xbdc0
1735f288 14f4d381 Safelive+0xb678
1735f4ec 14f4d422 Safelive+0xd381
1735f500 14f4d453 Safelive+0xd422
1735f5e8 14f51342 Safelive+0xd453
1735f61c 14f51602 Safelive+0x11342
1735f650 14f51628 Safelive+0x11602
1735f664 14f50aec Safelive+0x11628
1735f6b0 14f62d41 Safelive+0x10aec
1735f6f0 14f618ee Safelive+0x22d41
1735f790 14f61a41 Safelive+0x218ee
1735f7c8 14f6044c Safelive+0x21a41
1735f800 14f604ba Safelive+0x2044c
1735f82c 14f6187c Safelive+0x204ba
1735f958 14f637e2 Safelive+0x2187c
1735f968 14f78079 Safelive+0x237e2
1735f9a4 758efa29 Safelive+0x38079
1735f9b4 77957a7e kernel32!BaseThreadInitThunk+0x19
1735fa10 77957a4e ntdll!__RtlUserThreadStart+0x2f
1735fa20 00000000 ntdll!_RtlUserThreadStart+0x1b
f1d2b6a29e7cab453c18dcbe81ddfec9_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
WARNING: Stack unwind information not available. Following frames may be wrong.
010ff268 5c0dd1dd node+0x128dd80
010ff3a0 5d1ce32a node+0x128d1dd
010ff3a4 010ff3b0 node+0x237e32a
010ff3a8 00000000 0x10ff3b0
863abcf6bf50b4000819a93f2164d920_000.dmp
Top 3: total counts = 1
0020cdf3 736d2030 0x2e30202f
0020cdf7 61282020 360Util+0xb2030
0020cdfb 61726576 0x61282020
0020cdff 6d206567 0x61726576
0020ce03 203d2075 0x6d206567
0020ce07 38392e30 0x203d2075
0020ce0b 63202c31 0x38392e30
0020ce0f 65727275 0x63202c31
0020ce17 203d2075 nativeutils!Concurrency::details::VirtualProcessor::VirtualProcessor+0x3e
0020ce1b 30302e30 0x203d2075
0020ce1f 6c202931 0x30302e30
0020ce23 6d20776f 0x6c202931
0020ce27 726f6d65 0x6d20776f
0020ce2b 6f6e2079 0x726f6d65
0020ce2f 69666974 0x6f6e2079
0020ce33 69746163 0x69666974
0020ce37 47206e6f 0x69746163
0020ce3b 6e692043 0x47206e6f
0020ce3f 646c6f20 0x6e692043
0020ce43 61707320 0x646c6f20
0020ce47 72206563 0x61707320
0020ce4b 65757165 0x72206563
0020ce4f 64657473 nativeutils!__from_strstr_to_strchr+0x2ab7
0020ce53 31315b0a 0x64657473
0020ce57 303a3038 0x31315b0a
0020ce5b 45333333 0x303a3038
0020ce5f 5d303446 0x45333333
0020ce63 35393120 node+0x3523446
0020ce67 32363937 0x35393120
0020cf67 756d2065 0x32363937
0020cfdf 00000000 kernel32!LocalBaseRegOpenKey+0xc
fa5d117d9586032afed22f5fe9f4efdf_000.dmp