Analyzed 7 dump

Top 1: total counts = 1

04aef82c 53f2aeed rightsmanager!RM_MenuScan+0x183
04aef928 751eefac ffi_bindings!ffi_call_win32+0x11
04aef934 77163618 kernel32!BaseThreadInitThunk+0xe
04aef974 771635eb ntdll!__RtlUserThreadStart+0x70
04aef98c 00000000 ntdll!_RtlUserThreadStart+0x1b

d8cc75143dbe7c99be8029d71e21fffa_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0081c438 6399dc08 node+0x2a2ee0b
0081c737 392e3020 node+0xb2dc08
0081c73b 202c3939 0x392e3020
0081c73f 72727563 0x202c3939
0081c743 20746e65 0x72727563
0081c747 3d20756d 0x20746e65
0081c74b 302e3120 0x3d20756d
0081c74f 20293030 0x302e3120
0081c753 20776f6c 0x20293030
0081c757 6f6d656d 0x20776f6c
0081c75b 6e207972 0x6f6d656d
0081c75f 6669746f 0x6e207972
0081c763 74616369 node+0x382746f
0081c767 206e6f69 0x74616369
0081c76b 69204347 0x206e6f69
0081c76f 6c6f206e 0x69204347
0081c773 70732064 0x6c6f206e
0081c777 20656361 0x70732064
0081c77b 75716572 0x20656361
0081c7b3 372e3928 crypt32!CertDiagWriteBlobToFile+0x77
0081c7b7 3e2d2029 0x372e3928
0081c7bb 372e3720 0x3e2d2029
0081c7bf 2e392820 0x372e3720
0081c7c3 4d202935 0x2e392820
0081c7c7 34202c42 0x4d202935
0081c7cb 20342e37 0x34202c42
0081c7cf 2e30202f 0x20342e37
0081c7d3 736d2030 0x2e30202f
0081c7d7 61282020 urlmon!__volatile_metadata+0x8dc
0081c7db 61726576 0x61282020
0081c7df 6d206567 0x61726576
0081c7e3 203d2075 0x6d206567
0081c7e7 39392e30 0x203d2075
0081c7eb 63202c37 0x39392e30
0081c7ef 65727275 node+0x392c37
0081c7f3 6d20746e node+0x28b7275
0081c7f7 203d2075 0x6d20746e
0081c7fb 30302e30 0x203d2075
0081c7ff 6c202931 0x30302e30
0081c803 6d20776f 0x6c202931
0081c807 726f6d65 0x6d20776f
0081c80f 69666974 mswsock!WPP_SF_qS+0x32
0081c81b 6e692043 0x69666974
0081c81f 646c6f20 0x6e692043
0081c823 61707320 node+0x1856f20
0081c827 72206563 0x61707320
0081d0cf 00000000 GdiPlus!DriverMeta::BrushFillUsingBitmap+0xb9b

62a3fc2967d9383cfcb0dc01e995ef8b_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
010fc898 6dacdc08 node+0x2a2ee0b
010fcb97 31393138 node+0xb2dc08
010fcb9b 20303531 0x31393138
010fcb9f 203a736d 0x20303531
010fcba3 6b72614d 0x203a736d
010fcba7 6577732d 0x6b72614d
010fcbab 37207065 0x6577732d
010fcbaf 2820362e 0x37207065
010fcbb3 29372e39 0x2820362e
010fcbb7 203e2d20 0x29372e39
010fcbbb 20362e37 0x203e2d20
010fcbbf 372e3928 0x20362e37
010fcbc3 424d2029 0x372e3928
010fcbc7 3536202c 0x424d2029
010fcbcb 2f20372e 0x3536202c
010fcbcf 302e3020 0x2f20372e
010fcbd3 20736d20 0x302e3020
010fcbd7 76612820 0x20736d20
010fcbdb 67617265 KERNELBASE!`string'+0x8
010fcbdf 756d2065 0x67617265
010fd6bb 00000000 shell32!CFilePropSheetPage::_InitMultiplePrsht+0x9a52

2ac96f73280ff32b5d0aeb7001059e3e_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2522027

a02c53fa1cd85f9b8a573140259563c1_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
1220f75c 6fff531f node+0x12f5557
1220f790 763a343d node+0x12f531f
1220f79c 77a49812 kernel32!BaseThreadInitThunk+0xe
1220f7dc 77a497e5 ntdll!__RtlUserThreadStart+0x70
1220f7f4 00000000 ntdll!_RtlUserThreadStart+0x1b

5809d34e3f126bad1a485dda1a5baa96_000.dmp

Top 6: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x18378fd

538e11fe34c0b0d78228d040b7b2569e_000.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0021caa0 6c94dc08 node+0x2a2ee0b
0021cd9f 20303431 node+0xb2dc08
0021cda3 203a736d 0x20303431
0021cda7 6b72614d 0x203a736d
0021cdab 6577732d 0x6b72614d
0021cdaf 37207065 0x6577732d
0021cdb3 2820372e 0x37207065
0021cdb7 302e3031 0x2820372e
0021cdbb 3e2d2029 0x302e3031
0021cdbf 372e3720 0x3e2d2029
0021cdc3 30312820 0x372e3720
0021cdc7 2029322e 0x30312820
0021cdcb 202c424d 0x2029322e
0021cdcf 382e3131 0x202c424d
0021cdd3 30202f20 0x382e3131
0021cdd7 6d20302e 0x30202f20
0021cddb 28202073 node+0x13e302e
0021cddf 72657661 0x28202073
0021cdff 302e3020 winhttp!RtlIpv4StringToAddressCopyA+0x1c0
0021ce13 6669746f 0x302e3020
0021ce17 74616369 0x6669746f
0021ce1b 206e6f69 0x74616369
0021ce1f 69204347 0x206e6f69
0021ce23 6c6f206e 0x69204347
0021ce27 70732064 node+0x8d206e
0021ce2b 20656361 0x70732064
0021ce2f 75716572 0x20656361
0021d4bf 00000000 kernel32!BasepGetComputerNameFromNtPath+0x205

578611575f7ad7b30aba4ce7a7a6622a_000.dmp