Analyzed 30 dump

Top 1: total counts = 11

ChildEBP RetAddr  
00bde9a4 00000000 KERNELBASE!RaiseException+0x62

3956cb6803f554fd140ff2f60ce7d014_000.dmp
6cfac5f6e9c206b41718ae4cfc23530d_000.dmp
54407736e6d56e342c3db31d67c62dba_003.dmp
5d2b0d667db93b116787cb9b1f23dc8a_000.dmp
70f9fbaa6d2d4ef6adf279c53b6e0aa2_000.dmp

Top 2: total counts = 5

ChildEBP RetAddr  
0023ebac 646de479 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
0023ebc0 005fcff2 node+0x12ae479
0023ebc4 00000000 0x5fcff2

8d4b1d4dfc07f53604b0a4113387c16a_002.dmp
ca4000ce9f0755c463e7958b405b7ef0_000.dmp
516fcc023ce814b2dd67987d1873e31d_000.dmp
e65bbf1c4b04d5e86affbbf00847621d_000.dmp
cd5362cc9f41d6a7544d0e3b6f209755_000.dmp

Top 3: total counts = 4

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x183791d

f98e665e1a823d03649bedb687556621_000.dmp
88ee86b59cb168d7cacbd50927da6541_000.dmp
fd156dffc50280222469081585236188_000.dmp
10ea5ab405c85a0f1b3ff40f97360be0_000.dmp

Top 4: total counts = 2

ChildEBP RetAddr  
002eeafc 56e7e479 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
002eeb10 00193201 node+0x12ae479
002eeb14 00000000 0x193201

170deece25e4f877c499cfda634f70be_000.dmp
7962b22a461caeb45f8d5ca50398aef1_001.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0018f41c 6863533b node+0x12f5573
0018f4b0 686085e6 node+0x12f533b
0018f57c 6860835e node+0x12c85e6
0018f5d8 685e0b7b node+0x12c835e
0018f614 685e0783 node+0x12a0b7b
0018f654 685f1fd2 node+0x12a0783
0018f69c 685f1ee2 node+0x12b1fd2
0018f6e0 67a0bd42 node+0x12b1ee2
0018f708 67a0d47d node+0x6cbd42
0018f748 6794ed6c node+0x6cd47d
0018f7a4 6794f379 node+0x60ed6c
0018f7c8 6794ea8a node+0x60f379
0018f7cc 685ca300 node+0x60ea8a
0018f7d0 00180000 node+0x128a300
0018f7d4 00000000 0x180000

b1edf7129c907732a3fdb834ca5914a5_000.dmp

Top 6: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2522027

0b041afb45320bcbfb5b300abff044ab_000.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0038c1c8 6cd4dc08 node+0x2a2ee0b
0038c4c7 65747320 node+0xb2dc08
0038c4cb 73207370 0x65747320
0038c4cf 65636e69 0x73207370
0038c4d3 61747320 0x65636e69
0038c4d7 6f207472 0x61747320
0038c4db 616d2066 node+0x2fe7472
0038c4df 6e696b72 0x616d2066
0038c4e3 62202c67 node+0x2476b72
0038c4e7 65676769 0x62202c67
0038c4eb 73207473 0x65676769
0038c4ef 20706574 0x73207473
0038c4f3 20342e30 0x20706574
0038c4f7 202c736d 0x20342e30
0038c4fb 6c6c6177 0x202c736d
0038c4ff 656d6974 node+0x4a6177
0038c503 6e697320 0x656d6974
0038c507 73206563 node+0x2477320
0038c50b 74726174 0x73206563
0038c50f 20666f20 0x74726174
0038c513 6b72616d 0x20666f20
0038c517 20676e69 0x6b72616d
0038c51b 6d203835 0x20676e69
0038c51f 28202973 node+0xfe3835
0038c523 72657661 0x28202973
0038c527 20656761 0x72657661
0038c52b 3d20756d 0x20656761
0038c52f 392e3020 0x3d20756d
0038c533 202c3939 0x392e3020
0038c537 72727563 0x202c3939
0038c54f 657a696c ncrypt!_PkcsDecodeDsaPrivateKey+0xa2
0038c563 3532325b 0x657a696c
0038c567 30303a36 0x3532325b
0038c56b 31344542 0x30303a36
0038c56f 205d3038 0x31344542
0038c573 31383931 0x205d3038
0038c577 38363931 0x31383931
0038c57b 736d2036 0x38363931
0038c57f 614d203a 0x736d2036
0038c583 732d6b72 0x614d203a
0038c587 70656577 0x732d6b72
0038c58b 372e3720 node+0x4436577
0038c58f 30312820 0x372e3720
0038c593 2029302e 0x30312820
0038c597 37203e2d 0x2029302e
0038c59b 2820372e 0x37203e2d
0038c59f 302e3031 0x2820372e
0038c5a3 424d2029 0x302e3031
0038c5a7 3331202c 0x424d2029
0038c5ab 2f20372e 0x3331202c
0038c5af 302e3020 0x2f20372e
0038c5b3 20736d20 0x302e3020
0038c5b7 76612820 0x20736d20
0038c5bb 67617265 shell32!__dyn_tls_init_callback  (shell32+0x712820)
0038c5bf 756d2065 0x67617265
0038c5c3 30203d20 crypt32!winreg_bhandle  (crypt32+0xd2065)
0038c5c7 3939392e 0x30203d20
0038c5cb 7563202c 0x3939392e
0038c603 63617073 crypt32!AddContextToStore+0x71
0038c623 31383931 0x63617073
0038c627 30373931 0x31383931
0038c62b 736d2034 0x30373931
0038c62f 614d203a 0x736d2034
0038c633 732d6b72 0x614d203a
0038c637 70656577 0x732d6b72
0038c63b 372e3720 node+0x4436577
0038c63f 30312820 0x372e3720
0038c643 2029302e 0x30312820
0038c647 37203e2d 0x2029302e
0038c64b 2820372e 0x37203e2d
0038c64f 302e3031 0x2820372e
0038c653 424d2029 0x302e3031
0038c657 3831202c 0x424d2029
0038c65b 2f20302e 0x3831202c
0038c65f 302e3020 0x2f20302e
0038c663 20736d20 0x302e3020
0038c667 76612820 0x20736d20
0038c66b 67617265 shell32!__dyn_tls_init_callback  (shell32+0x712820)
0038c66f 756d2065 0x67617265
0038c673 30203d20 crypt32!winreg_bhandle  (crypt32+0xd2065)
0038c677 3739392e 0x30203d20
0038c67b 7563202c 0x3739392e
0038c6b3 63617073 crypt32!AddContextToStore+0x71
0038c6d3 00000000 0x63617073

3c928078499dfa673d626968ff5e3ca2_000.dmp

Top 8: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
040df2a4 0db6b25c node+0xce6c1f
00000000 00000000 0xdb6b25c

ff4d76c16fc164885dc50811df135357_000.dmp

Top 9: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
05d4fbc0 59137452 QQWubi+0x1272a6
05d4fbc8 765ff989 QQWubi+0x127452
05d4fbd8 77b57084 kernel32!BaseThreadInitThunk+0x19
05d4fc34 77b57054 ntdll!__RtlUserThreadStart+0x2f
05d4fc44 00000000 ntdll!_RtlUserThreadStart+0x1b

3509e55c1fc1f4786f654d908185948d_000.dmp

Top 10: total counts = 1

ChildEBP RetAddr  
0052e5fc 00000000 KERNELBASE!RaiseException+0x64

36f28fc01db84687cff70f281d776a4d_000.dmp

Top 11: total counts = 1

ChildEBP RetAddr  
1b00f3ac 0d280081 rightsextension!std::_Destroy_range,std::allocator > > >+0x10
1b00f3e8 0d28351f rightsextension!std::vector,std::allocator >,std::allocator,std::allocator > > >::_Assign_range,std::allocator > *>+0x151
1b00f8e8 0d284624 rightsextension!CAppInstallMonitor::RegChange+0x2ef
1b00f91c 0d2885a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
1b00fa48 0d28917a rightsextension!CRegData::MonitorFunction+0x4b3
1b00fa68 0d288a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
1b00fa70 0d39864a rightsextension!std::_Pad::_Call_func+0xa
1b00faa8 768e344d rightsextension!thread_start+0x58
1b00fab4 76f79802 kernel32!BaseThreadInitThunk+0xe
1b00faf4 76f797d5 ntdll!__RtlUserThreadStart+0x70
1b00fb0c 00000000 ntdll!_RtlUserThreadStart+0x1b

3f22bd214c6c56aa1820168364b12172_000.dmp

Top 12: total counts = 1

0018cbc3 736d2030 0x2e30202f
0018cbc7 2b282020 360Conf+0x22030
0018cbcb 302e3020 0x2b282020
0018cbcf 20736d20 0x302e3020
0018cbd3 32206e69 0x20736d20
0018cbd7 65747320 0x32206e69
0018cbdb 73207370 0x65747320
0018cbdf 65636e69 0x73207370
0018cbe3 61747320 0x65636e69
0018cbe7 6f207472 0x61747320
0018cbeb 616d2066 0x6f207472
0018cbef 6e696b72 0x616d2066
0018cbf3 62202c67 mscms!_CRT_INIT+0xff
0018cc03 20302e30 0x62202c67
0018cc07 202c736d 0x20302e30
0018cc0b 6c6c6177 0x202c736d
0018cc0f 656d6974 0x6c6c6177
0018cc13 6e697320 0x656d6974
0018cc17 73206563 mscms!RangeLMNTag+0x4
0018cc1b 74726174 0x73206563
0018cc1f 20666f20 0x74726174
0018cc23 6b72616d 0x20666f20
0018cc27 20676e69 0x6b72616d
0018cc2b 6d203331 0x20676e69
0018cc2f 28202973 0x6d203331
0018cc33 72657661 0x28202973
0018cc37 20656761 GdiPlus!FullTextImager::GdipLscbkGetRunStrikethroughInfo+0x5d
0018cc4f 3d20756d 0x20656761
0018cc53 302e3120 0x3d20756d
0018cc57 20293030 0x302e3120
0018cc5b 616e6966 0x20293030
0018cc5f 657a696c 0x616e6966
0018cc63 636e6920 0x657a696c
0018cc67 656d6572 0x636e6920
0018cc6b 6c61746e 0x656d6572
0018cc6f 72616d20 0x6c61746e
0018cc7f 5d384133 GdiPlus!OutputNativePostscript::OutputAscii85+0x77
0018cc8b 6d203637 0x5d384133
0018cc8f 4d203a73 0x6d203637
0018cc93 2d6b7261 0x4d203a73
0018cc97 65657773 0x2d6b7261
0018cc9b 2e372070 0x65657773
0018cc9f 31282037 0x2e372070
0018cca3 29302e30 0x31282037
0018d177 00000000 wpdshext!_SwapListItems+0x1e2

120a44a053d2ff110948caaf119ef1a9_001.dmp