Analyzed 63 dump

Top 1: total counts = 19

ChildEBP RetAddr  
0036ea4c 5a47e479 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
0036ea60 005fcff2 node+0x12ae479
0036ea64 00000000 0x5fcff2

e4cbb0b7d7075de3be872d1f747941e6_000.dmp
4c121764519bad55a0cad386249180cb_000.dmp
fbbadd802aea6f977582c36f24092cd5_000.dmp
121318809454c222100cd956e191e883_000.dmp
6fe05d18755bac35aa426d3b34a514cf_000.dmp

Top 2: total counts = 17

ChildEBP RetAddr  
003be6e4 00000000 KERNELBASE!RaiseException+0x62

f0a13ed82f8de12e705e10f7ad3abffc_002.dmp
6a1fa5916a3a533cfa83182fcb9f89be_000.dmp
a66ac604528474d6d399ddd46c292686_000.dmp
1bdcbe65e8ba99530da5ee88cf9a5f01_000.dmp
773d6034889114fe594aa81f02a44fb3_000.dmp

Top 3: total counts = 6

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x183791d

65dbfc2182b9520e07921b7a1767f485_000.dmp
96177759e74d64cb8c1ce59c80fef2e2_000.dmp
16d091da2e8dda59b75f1a7fcc9f99c2_000.dmp
4033a268d57b29e9672d2e77e222e74b_000.dmp
bc664674e3bcaacbb7efcb116ce06c1c_000.dmp

Top 4: total counts = 5

ChildEBP RetAddr  
16bff738 7af30081 rightsextension!std::_Destroy_range,std::allocator > > >+0x10
16bff774 7af3351f rightsextension!std::vector,std::allocator >,std::allocator,std::allocator > > >::_Assign_range,std::allocator > *>+0x151
16bffc74 7af34624 rightsextension!CAppInstallMonitor::RegChange+0x2ef
16bffca8 7af385a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
16bffdd4 7af3917a rightsextension!CRegData::MonitorFunction+0x4b3
16bffdf4 7af38a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
16bffdfc 7b04864a rightsextension!std::_Pad::_Call_func+0xa
16bffe34 7587fcc9 rightsextension!thread_start+0x58
16bffe44 775082ae kernel32!BaseThreadInitThunk+0x19
16bffea0 7750827e ntdll!__RtlUserThreadStart+0x2f
16bffeb0 00000000 ntdll!_RtlUserThreadStart+0x1b

7eb86dd56d0b818fd96fcdd52c1f7636_000.dmp
1fe48558403fe407ae4f82cec6b7037b_000.dmp
96937704c68d27492cecfdc29b55500b_000.dmp
a9a34268b00aedd0b775332f02e3b4d9_001.dmp
78c4d9dd91588d30e87db18967e83fd1_000.dmp

Top 5: total counts = 4

ChildEBP RetAddr  
0090e564 00000000 KERNELBASE!RaiseException+0x64

57ab8eb2db2b951ce9e92444b0d46ef8_000.dmp
2e7805f26d34d06b31bc797370c30faf_000.dmp
fdba1eebb88bae59730b64738ca77f50_000.dmp
4809193b0b2ed33e9be8d2c2a3eaeb44_000.dmp

Top 6: total counts = 2

ChildEBP RetAddr  
002de6d4 662ae479 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
002de6e8 00193201 node+0x12ae479
002de6ec 00000000 0x193201

1cc6d7083c223e81dc50efe6abcf7beb_000.dmp
f51f3ad5b23ac48edc34b1bfd7657434_000.dmp

Top 7: total counts = 1

0056c81f 726f6d65 0x6d20776f
0056c823 6f6e2079 slc+0x6d65
0056c827 69666974 0x6f6e2079
0056c82b 69746163 0x69666974
0056c82f 47206e6f 0x69746163
0056c833 6e692043 0x47206e6f
0056c837 646c6f20 0x6e692043
0056c83b 61707320 node+0x2246f20
0056c83f 72206563 0x61707320
0056c843 65757165 0x72206563
0056c847 64657473 node+0x32d7165
0056c84b 37325b0a node+0x21d7473
0056c84f 303a3434 0x37325b0a
0056c853 37433032 0x303a3434
0056c857 5d303142 0x37433032
0056c85b 38393620 0x5d303142
0056c85f 38333638 0x38393620
0056c863 6d203630 0x38333638
0056c867 4d203a73 0x6d203630
0056c86b 2d6b7261 0x4d203a73
0056c86f 65657773 0x2d6b7261
0056c873 2e372070 node+0x31d7773
0056c877 39282037 0x2e372070
0056c87b 2029372e 0x39282037
0056c87f 37203e2d 0x2029372e
0056c883 2820372e 0x37203e2d
0056c887 302e3031 0x2820372e
0056c88b 424d2029 0x302e3031
0056c88f 3131202c 0x424d2029
0056c893 2f20352e 0x3131202c
0056c897 302e3020 0x2f20352e
0056c89b 20736d20 0x302e3020
0056c89f 76612820 0x20736d20
0056c8a3 67617265 shell32!__dyn_tls_init_callback  (shell32+0x4e2820)
0056c8a7 756d2065 0x67617265
0056c8ab 30203d20 wininet!`string'+0x1c5645
0056c8af 3737392e 0x30203d20
0056c8b3 7563202c 0x3737392e
0056c8b7 6e657272 wininet!`string'+0x12560c
0056c8bb 756d2074 0x6e657272
0056c8bf 30203d20 wininet!`string'+0x1c5654
0056c8c3 3333332e 0x30203d20
0056c8c7 6f6c2029 0x3333332e
0056c8cb 656d2077 0x6f6c2029
0056c8cf 79726f6d node+0x3252077
0056c8d3 746f6e20 0x79726f6d
0056c8d7 63696669 0x746f6e20
0056c8db 6f697461 node+0x1216669
0056c8df 4347206e 0x6f697461
0056c8e3 206e6920 0x4347206e
0056c8e7 20646c6f 0x206e6920
0056c8eb 63617073 0x20646c6f
0056c8ef 65722065 node+0x1197073
0056c8f3 73657571 node+0x32a2065
0056c8f7 0a646574 0x73657571
0056c8fb 00000000 0xa646574

0611e9210327a476bde8e54c85730374_000.dmp

Top 8: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00efc470 1016dc08 node+0x2a2ee0b
00efc7c3 736d2037 node+0xb2dc08
00efc7ef 66202938 wldp!wil::details::ResultFromCaughtExceptionInternal+0x107
00efc7ff 6e656d65 0x66202938
00efc803 206c6174 0x6e656d65
00efc807 395b616d 0x206c6174
00efc80b 30383038 0x395b616d
00efc80f 3133303a 0x30383038
00efc813 37413543 0x3133303a
00efc817 31205d38 0x37413543
00efc917 756d2065 0x31205d38
00efc91b 30203d20 setupapi!ole32_NULL_THUNK_DATA_DLA  (setupapi+0x142065)
00efc91f 3939392e 0x30203d20
00efc923 7563202c 0x3939392e
00efcda7 00000000 setupapi!DoPresenceCheck+0x225

c37dad4033a1920767b289f18775b579_001.dmp

Top 9: total counts = 1

ChildEBP RetAddr  
0fd7ef3c 0a7c6066 rightsextension!ATL::CSimpleStringT::CloneData+0xc
0fd7ef74 0a7f2133 rightsextension!CSoftInfo::FindSoftNameByPath+0x1d6
0fd8f4a8 0a7f09fd rightsextension!CAutorunsCtrl::EnumRegAutorun+0xa33
0fd8f4b8 0a7faf94 rightsextension!CAutorunsCtrl::EnumAutoruns+0x2d
0fd8f4f4 0a7b3809 rightsextension!CRightsManager::ScanAll+0xb4
0fd8f9e8 0a7b4624 rightsextension!CAppInstallMonitor::RegChange+0x5d9
0fd8fa1c 0a7b85a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
0fd8fb48 0a7b917a rightsextension!CRegData::MonitorFunction+0x4b3
0fd8fb68 0a7b8a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
0fd8fb70 0a8c864a rightsextension!std::_Pad::_Call_func+0xa
0fd8fba8 76adef6c rightsextension!thread_start+0x58
0fd8fbb4 77a13618 kernel32!BaseThreadInitThunk+0xe
0fd8fbf4 77a135eb ntdll!__RtlUserThreadStart+0x70
0fd8fc0c 00000000 ntdll!_RtlUserThreadStart+0x1b

acbda703cdb9a6a742c80011162cbef6_000.dmp

Top 10: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2522027

1fdf635f183398531f69e3f68c6428cd_000.dmp

Top 11: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0042c6e0 5331dc08 node+0x2a2ee0b
0042c9df 74732032 node+0xb2dc08
0042c9e3 20737065 0x74732032
0042c9e7 636e6973 0x20737065
0042c9eb 74732065 0x636e6973
0042c9ef 20747261 0x74732065
0042c9f3 6d20666f 0x20747261
0042c9f7 696b7261 0x6d20666f
0042c9fb 202c676e 0x696b7261
0042c9ff 67676962 0x202c676e
0042ca03 20747365 0x67676962
0042ca07 70657473 0x20747365
0042ca0b 362e3520 0x70657473
0042ca0f 2c736d20 0x362e3520
0042ca13 6c617720 0x2c736d20
0042ca17 6d69746c 0x6c617720
0042ca1b 69732065 0x6d69746c
0042ca1f 2065636e 0x69732065
0042ca23 72617473 0x2065636e
0042ca27 666f2074 0x72617473
0042ca2b 72616d20 0x666f2074
0042ca2f 676e696b 0x72616d20
0042ca33 6d203820 0x676e696b
0042ca37 28202973 0x6d203820
0042ca3b 72657661 0x28202973
0042ca3f 20656761 0x72657661
0042ca43 3d20756d 0x20656761
0042ca47 392e3020 0x3d20756d
0042ca4b 202c3939 0x392e3020
0042ca4f 72727563 0x202c3939
0042ca53 20746e65 0x72727563
0042ca57 3d20756d 0x20746e65
0042ca5b 392e3020 0x3d20756d
0042ca5f 20293738 0x392e3020
0042ca63 616e6966 0x20293738
0042ca67 657a696c 0x616e6966
0042ca6b 636e6920 0x657a696c
0042ca6f 656d6572 0x636e6920
0042ca73 6c61746e 0x656d6572
0042ca77 72616d20 0x6c61746e
0042ca7b 5b6e696b 0x72616d20
0042ca7f 3a323936 0x5b6e696b
0042cb7f 76612820 0x3a323936
0042d64b 00000000 msvcrt!_vcwprintf_p_l+0x1242

969388a0631b650adae7a7880668a023_001.dmp

Top 12: total counts = 1

ChildEBP RetAddr  
134df224 0ffe0081 rightsextension!std::_Destroy_range,std::allocator > > >+0x29
134df260 0ffe351f rightsextension!std::vector,std::allocator >,std::allocator,std::allocator > > >::_Assign_range,std::allocator > *>+0x151
134df760 0ffe4624 rightsextension!CAppInstallMonitor::RegChange+0x2ef
134df794 0ffe85a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
134df8c0 0ffe917a rightsextension!CRegData::MonitorFunction+0x4b3
134df8e0 0ffe8a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
134df8e8 100f864a rightsextension!std::_Pad::_Call_func+0xa
134df920 75e2343d rightsextension!thread_start+0x58
134df92c 77389802 kernel32!BaseThreadInitThunk+0xe
134df96c 773897d5 ntdll!__RtlUserThreadStart+0x70
134df984 00000000 ntdll!_RtlUserThreadStart+0x1b

aaa27c8cca1da96839d8920c7d492881_000.dmp

Top 13: total counts = 1

ChildEBP RetAddr  
0f98f740 0f640081 rightsextension!std::_Destroy_range,std::allocator > > >+0x10
0f98f77c 0f64351f rightsextension!std::vector,std::allocator >,std::allocator,std::allocator > > >::_Assign_range,std::allocator > *>+0x151
0f98fc7c 0f644624 rightsextension!CAppInstallMonitor::RegChange+0x2ef
0f98fcb0 0f6485a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
0f98fddc 0f64917a rightsextension!CRegData::MonitorFunction+0x4b3
0f98fdfc 0f648a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
0f98fe04 0f75864a rightsextension!std::_Pad::_Call_func+0xa
0f98fe3c 75d7344d rightsextension!thread_start+0x58
0f98fe48 77a09802 kernel32!BaseThreadInitThunk+0xe
0f98fe88 77a097d5 ntdll!__RtlUserThreadStart+0x70
0f98fea0 00000000 ntdll!_RtlUserThreadStart+0x1b

0d383a809deb97a730936c3abf12d1a6_000.dmp

Top 14: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x24fef1c

67d33de32df8c93dac1d5e4b4070e494_000.dmp

Top 15: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
010fee9c 5598202a 0x80001e00
00000000 00000000 node+0x252202a

f0370604c574c90c11f1bb487cea88db_000.dmp

Top 16: total counts = 1

ChildEBP RetAddr  
1133f58c 00000000 rightsextension!std::_Destroy_range,std::allocator > > >+0x10

9c57ac6cb9f78e33c084097dd7cfc4b6_000.dmp