Analyzed 12 dump

Top 1: total counts = 5

ChildEBP RetAddr  
00b5e6e4 00000000 KERNELBASE!RaiseException+0x62

9307f8eed63c8e5337ed685b1fa825af_000.dmp
d93841dc9239c4549759a9ed1cf60ad7_000.dmp
778e226877fd665ad298bf3b8b28cb9a_000.dmp
c935ed5dc2608c84b56261432242be89_000.dmp
1859fce973f87827b501b104c4f91b03_000.dmp

Top 2: total counts = 3

ChildEBP RetAddr  
0046e534 6849e479 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
0046e548 005fcff0 node+0x12ae479
0046e54c 00000000 0x5fcff0

16f580f482c95907bfd69b254dfd190f_000.dmp
e269d998056e8a929fcdd394f508d8b8_000.dmp
2646753acb3f776c832d7a8c1b4960ab_000.dmp

Top 3: total counts = 2

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x183791d

b3f93da6784bdb048910041ea54b34fc_000.dmp
a16b6dde67723262b51827a630384369_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
1841f250 557a0081 rightsextension!std::_Destroy_range,std::allocator > > >+0x10
1841f28c 557a351f rightsextension!std::vector,std::allocator >,std::allocator,std::allocator > > >::_Assign_range,std::allocator > *>+0x151
1841f78c 557a4624 rightsextension!CAppInstallMonitor::RegChange+0x2ef
1841f7c0 557a85a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
1841f8ec 557a917a rightsextension!CRegData::MonitorFunction+0x4b3
1841f90c 557a8a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
1841f914 558b864a rightsextension!std::_Pad::_Call_func+0xa
1841f94c 75c1fcc9 rightsextension!thread_start+0x58
1841f95c 76f982ae kernel32!BaseThreadInitThunk+0x19
1841f9b8 76f9827e ntdll!__RtlUserThreadStart+0x2f
1841f9c8 00000000 ntdll!_RtlUserThreadStart+0x1b

7586ceabdce057d8aa8ebdab763dd1b8_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
0fa0f4b0 07860081 rightsextension!std::_Destroy_range,std::allocator > > >+0x10
0fa0f4ec 0786351f rightsextension!std::vector,std::allocator >,std::allocator,std::allocator > > >::_Assign_range,std::allocator > *>+0x151
0fa0f9ec 07864624 rightsextension!CAppInstallMonitor::RegChange+0x2ef
0fa0fa20 078685a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
0fa0fb4c 0786917a rightsextension!CRegData::MonitorFunction+0x4b3
0fa0fb6c 07868a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
0fa0fb74 0797864a rightsextension!std::_Pad::_Call_func+0xa
0fa0fbac 77713d12 rightsextension!thread_start+0x58
0fa0fbb8 77d49732 kernel32!BaseThreadInitThunk+0xe
0fa0fbf8 77d49705 ntdll!__RtlUserThreadStart+0x70
0fa0fc10 00000000 ntdll!_RtlUserThreadStart+0x1b

aa8530a81131e8abfc763ae4955cea39_000.dmp