Analyzed 8 dump

Top 1: total counts = 3

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x183791d

14bbd2166bb13861c7cfa46530f46b2a_000.dmp
3422fd1df3ce390466a314c4473877d8_000.dmp
d641826690aba45ca65f48a34f5673e5_000.dmp

Top 2: total counts = 2

ChildEBP RetAddr  
00cfeacc 00000000 KERNELBASE!RaiseException+0x62

83c18bce353aea9112a04a4c3561f891_001.dmp
25c8debdeec5ce0757ed1f0b524674e3_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
0022ea24 6e5ae479 KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
0022ea38 00193201 node+0x12ae479
0022ea3c 00000000 0x193201

5855a8d681107138e8581331d97b627c_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
0fbfeb28 0f6e6066 rightsextension!ATL::CSimpleStringT::CloneData+0xa
0fbfeb60 0f722618 rightsextension!CSoftInfo::FindSoftNameByPath+0x1d6
0fbfedc0 0f71ddc5 rightsextension!Utils::GetUninstAndAppName+0x98
0fbff244 0f71c09f rightsextension!RightMenuMgr::GetRightMenus+0x1be5
0fbff288 0f71afa0 rightsextension!RightMenuMgr::EnumMenus+0x6f
0fbff2c8 0f6d3809 rightsextension!CRightsManager::ScanAll+0xc0
0fbff7bc 0f6d4624 rightsextension!CAppInstallMonitor::RegChange+0x5d9
0fbff7f0 0f6d85a3 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
0fbff91c 0f6d917a rightsextension!CRegData::MonitorFunction+0x4b3
0fbff93c 0f6d8a1a rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
0fbff944 0f7e864a rightsextension!std::_Pad::_Call_func+0xa
0fbff97c 76d7343d rightsextension!thread_start+0x58
0fbff988 77369832 kernel32!BaseThreadInitThunk+0xe
0fbff9c8 77369805 ntdll!__RtlUserThreadStart+0x70
0fbff9e0 00000000 ntdll!_RtlUserThreadStart+0x1b

a2bd452c263814d88fb9d0c22760bea8_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
00efe454 00000000 KERNELBASE!RaiseException+0x64

87b7c850f0465735b7685948fe5b537e_000.dmp