Analyzed 4 dump

Top 1: total counts = 1

0043cbc7 69204347 0x206e6f69
0043cbcb 6c6f206e PALMINPUTIME+0x274347
0043cbcf 70732064 0x6c6f206e
0043cbd3 20656361 0x70732064
0043cbd7 75716572 0x20656361
0043cdbb 00000000 ole32!CMStream::MWrite+0x3d8

80684cfac6df1ba63118c75a66f23951_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
004fcdd0 6d22dc08 node+0x2a2f20b
004fd0cf 3a736d20 node+0xb2dc08
004fd0d3 72614d20 0x3a736d20
004fd0d7 77732d6b 0x72614d20
004fd0db 20706565 0x77732d6b
004fd0df 352e3031 0x20706565
004fd0e3 32312820 0x352e3031
004fd0e7 2029382e 0x32312820
004fd0eb 31203e2d 0x2029382e
004fd0ef 20352e30 0x31203e2d
004fd0f3 2e323128 0x20352e30
004fd0f7 4d202938 0x2e323128
004fd0fb 38202c42 0x4d202938
004fd0ff 2f20312e 0x38202c42
004fd103 302e3020 0x2f20312e
004fd107 20736d20 0x302e3020
004fd10b 76612820 0x20736d20
004fd14f 206e6920 windows_storage!Windows::Security::EnterpriseData::ProtectionPolicyManagerStatics::RequestAccessForAppWithAuditingInfoForWindowAsync+0xb0
004fd16f 30373038 0x206e6920
004fd173 205d3833 0x30373038
004fd177 35393433 0x205d3833
004fd17b 31303630 0x35393433
004fd17f 736d2030 0x31303630
004fd183 614d203a 0x736d2030
004fd187 732d6b72 0x614d203a
004fd197 29382e32 wininet!SetUrlCacheEntryGroupA+0xe2
004fd1b7 6d20302e 0x29382e32
004fd1bb 28202073 node+0xb0302e
004fd1bf 72657661 0x28202073
004fd1c3 20656761 0x72657661
004fd1c7 3d20756d 0x20656761
004fd1cb 302e3120 0x3d20756d
004fd1cf 202c3030 0x302e3120
004fd1d3 72727563 0x202c3030
004fd1ef 6e207972 rsaenh!MyCryptProtectData+0x19
004fd207 70732064 node+0x1b07972
004fd20b 20656361 node+0x4032064
004fd20f 75716572 0x20656361
004fd213 65747365 kernel32!___PchSym_+0x5946
004fd217 355b0a64 0x65747365
004fd21b 3a323739 0x355b0a64
004fd21f 30383230 0x3a323739
004fd223 38333037 0x30383230
004fd227 3433205d 0x38333037
004fd22b 36303539 0x3433205d
004fd22f 20323230 0x36303539
004fd233 203a736d 0x20323230
004fd237 6b72614d 0x203a736d
004fd23b 6577732d 0x6b72614d
004fd23f 31207065 0x6577732d
004fd243 20352e30 0x31207065
004fd247 2e323128 0x20352e30
004fd24b 2d202938 0x2e323128
004fd24f 3031203e 0x2d202938
004fd253 2820352e 0x3031203e
004fd257 362e3231 0x2820352e
004fd25b 424d2029 0x362e3231
004fd25f 3231202c 0x424d2029
004fd263 2f20312e 0x3231202c
004fd267 302e3020 0x2f20312e
004fd26b 20736d20 0x302e3020
004fd26f 76612820 0x20736d20
004fd2b3 206e6920 windows_storage!Windows::Security::EnterpriseData::ProtectionPolicyManagerStatics::RequestAccessForAppWithAuditingInfoForWindowAsync+0xb0
004fd2d3 00000000 0x206e6920

87e6b63c184bb5ca9b57d976c1c669fd_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
012fcf08 62ffdc08 node+0x2a2f20b
012fd207 6b72614d node+0xb2dc08
012fd20b 6577732d 0x6b72614d
012fd20f 31207065 node+0x32a732d
012fd213 20362e30 0x31207065
012fd217 2e323128 0x20362e30
012fd21b 2d202938 0x2e323128
012fd21f 3031203e 0x2d202938
012fd223 2820362e 0x3031203e
012fd227 382e3231 0x2820362e
012fd22b 424d2029 0x382e3231
012fd22f 3332202c 0x424d2029
012fd233 2f20342e 0x3332202c
012fd237 302e3020 0x2f20342e
012fd23b 20736d20 0x302e3020
012fd23f 76612820 0x20736d20
012fd243 67617265 advapi32!__CodeAuthzpComputeAccessTokenFromCodeAuthzObject+0x14000
012fd247 756d2065 0x67617265
012fd34b 0a646574 shell32!?SetAppAsDefault@?QIApplicationAssociationRegistration@@CApplicationAssociationRegistration@@UAGJPBG0W4ASSOCIATIONTYPE@@@Z+0xe5
012fd35f 31363120 0xa646574
012fd363 36393934 0x31363120
012fd367 20383638 0x36393934
012fd36b 203a736d 0x20383638
012fd36f 6b72614d 0x203a736d
012fd373 6577732d 0x6b72614d
012fd377 31207065 node+0x32a732d
012fd37b 20362e30 0x31207065
012fd37f 2e323128 0x20362e30
012fd383 2d202938 0x2e323128
012fd387 3031203e 0x2d202938
012fd38b 2820362e 0x3031203e
012fd38f 382e3231 0x2820362e
012fd393 424d2029 0x382e3231
012fd397 3232202c 0x424d2029
012fd39b 2f20372e 0x3232202c
012fd39f 302e3020 0x2f20372e
012fd3a3 20736d20 0x302e3020
012fd3a7 76612820 0x20736d20
012fd3ab 67617265 advapi32!__CodeAuthzpComputeAccessTokenFromCodeAuthzObject+0x14000
012fd3af 756d2065 0x67617265
012fd4b3 00000000 shell32!?SetAppAsDefault@?QIApplicationAssociationRegistration@@CApplicationAssociationRegistration@@UAGJPBG0W4ASSOCIATIONTYPE@@@Z+0xe5

aea88ae58a7236f43c57c5729fc5fdd1_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
0097fbf8 50d31eee defrag!std::default_delete::operator()+0x13
0097fc20 50d3c933 defrag!file_system::FileSystemData::~FileSystemData+0x4e
0097fc44 50d3cf0b defrag!file_system::NTFS::~NTFS+0x93
0097fc50 50d44e2f defrag!file_system::NTFS::`scalar deleting destructor'+0xb
0097fd04 50d48faa defrag!::operator()+0xbf
0097fd24 50d4246a defrag!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
0097fd2c 50d9e289 defrag!std::_Pad::_Call_func+0xa
0097fd64 759bfcc9 defrag!thread_start+0x58
0097fd74 77b982ae kernel32!BaseThreadInitThunk+0x19
0097fdd0 77b9827e ntdll!__RtlUserThreadStart+0x2f
0097fde0 00000000 ntdll!_RtlUserThreadStart+0x1b

9ccb05fb578ae82a280161822e39d036_000.dmp