Analyzed 5 dump

Top 1: total counts = 1

002bed78 00072b9c 0x2bed80
002bed80 00000000 WXClean+0x12b9c

b03dd3d2cf561fd726595c329bac8bb0_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
010ff028 6575d1dd node+0x128dd80
010ff168 6684e32a node+0x128d1dd
010ff16c 010ff178 node+0x237e32a
010ff170 00000000 0x10ff178

d8ff3d82fd3b21e43060e627a0977ae1_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2a99a6e

5fe78d57e5fadc3d77f951bdb1c486ee_001.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0048cd20 6eb7dc08 node+0x2a2f20b
0048d01f 34313135 node+0xb2dc08
0048d023 3a736d20 0x34313135
0048d027 72614d20 0x3a736d20
0048d02b 77732d6b node+0x45c4d20
0048d02f 20706565 ntdll!GuardCheckLongJumpTargetImpl  (ntdll+0x162d6b)
0048d033 342e3031 0x20706565
0048d037 32312820 0x342e3031
0048d03b 2029332e 0x32312820
0048d03f 31203e2d 0x2029332e
0048d043 20342e30 0x31203e2d
0048d047 2e323128 0x20342e30
0048d04b 4d202933 0x2e323128
0048d04f 33202c42 0x4d202933
0048d053 2f20332e 0x33202c42
0048d057 302e3020 0x2f20332e
0048d05b 20736d20 0x302e3020
0048d05f 76612820 0x20736d20
0048d063 67617265 0x76612820
0048d067 756d2065 0x67617265
0048d06b 31203d20 KERNELBASE!`string'+0x5
0048d06f 3030302e 0x31203d20
0048d073 7563202c 0x3030302e
0048d077 6e657272 KERNELBASE!c_PmapEntries_api_ms_win_devices_query_l1_1_1+0x24
0048d07b 756d2074 node+0x607272
0048d07f 30203d20 KERNELBASE!`string'+0x4
0048d083 3430302e 0x30203d20
0048d087 6f6c2029 0x3430302e
0048d08b 656d2077 node+0x1672029
0048d08f 79726f6d 0x656d2077
0048d093 746f6e20 0x79726f6d
0048d097 63696669 windows_storage!wkscli_NULL_THUNK_DATA_DLA  (windows_storage+0x696e20)
0048d09b 6f697461 0x63696669
0048d09f 4347206e node+0x1647461
0048d0a3 206e6920 0x4347206e
0048d0a7 20646c6f 0x206e6920
0048d0ab 63617073 0x20646c6f
0048d0af 65722065 0x63617073
0048d0b3 73657571 0x65722065
0048d0b7 0a646574 0x73657571
0048d0bb 3130325b 0xa646574
0048d0bf 32303a32 0x3130325b
0048d0c3 37424442 0x32303a32
0048d0c7 205d3837 0x37424442
0048d0cb 32373732 0x205d3837
0048d0cf 38313135 0x32373732
0048d0d3 3a736d20 0x38313135
0048d0d7 72614d20 0x3a736d20
0048d0db 77732d6b node+0x45c4d20
0048d0df 20706565 ntdll!GuardCheckLongJumpTargetImpl  (ntdll+0x162d6b)
0048d0e3 392e3031 0x20706565
0048d0e7 32312820 0x392e3031
0048d0eb 2029332e 0x32312820
0048d0ef 31203e2d 0x2029332e
0048d0f3 20342e30 0x31203e2d
0048d0f7 2e323128 0x20342e30
0048d0fb 4d202933 0x2e323128
0048d0ff 33202c42 0x4d202933
0048d103 2f20392e 0x33202c42
0048d107 302e3020 0x2f20392e
0048d10b 20736d20 0x302e3020
0048d10f 76612820 0x20736d20
0048d113 67617265 0x76612820
0048d117 756d2065 0x67617265
0048d11b 31203d20 KERNELBASE!`string'+0x5
0048d11f 3030302e 0x31203d20
0048d123 7563202c 0x3030302e
0048d127 6e657272 KERNELBASE!c_PmapEntries_api_ms_win_devices_query_l1_1_1+0x24
0048d12b 756d2074 node+0x607272
0048d12f 31203d20 KERNELBASE!`string'+0x4
0048d133 3030302e 0x31203d20
0048d137 6f6c2029 0x3030302e
0048d13b 656d2077 node+0x1672029
0048d13f 79726f6d 0x656d2077
0048d143 746f6e20 0x79726f6d
0048d147 63696669 windows_storage!wkscli_NULL_THUNK_DATA_DLA  (windows_storage+0x696e20)
0048d14b 6f697461 0x63696669
0048d14f 4347206e node+0x1647461
0048d153 206e6920 0x4347206e
0048d157 20646c6f 0x206e6920
0048d15b 63617073 0x20646c6f
0048d15f 65722065 0x63617073
0048d163 73657571 0x65722065
0048d167 0a646574 0x73657571
0048d16b 3130325b 0xa646574
0048d16f 32303a32 0x3130325b
0048d173 37424442 0x32303a32
0048d177 205d3837 0x37424442
0048d17b 32373732 0x205d3837
0048d17f 33323135 0x32373732
0048d183 3a736d20 0x33323135
0048d187 72614d20 0x3a736d20
0048d18b 77732d6b node+0x45c4d20
0048d18f 20706565 ntdll!GuardCheckLongJumpTargetImpl  (ntdll+0x162d6b)
0048d193 342e3031 0x20706565
0048d197 32312820 0x342e3031
0048d19b 2029332e 0x32312820
0048d19f 31203e2d 0x2029332e
0048d1a3 20342e30 0x31203e2d
0048d1a7 2e323128 0x20342e30
0048d1ab 4d202933 0x2e323128
0048d1af 34202c42 0x4d202933
0048d1b3 2f20372e 0x34202c42
0048d1b7 302e3020 0x2f20372e
0048d1bb 20736d20 0x302e3020
0048d1bf 76612820 0x20736d20
0048d1c3 67617265 0x76612820
0048d1c7 756d2065 0x67617265
0048d1cb 31203d20 KERNELBASE!`string'+0x5
0048d1cf 3030302e 0x31203d20
0048d1d3 7563202c 0x3030302e
0048d1d7 6e657272 KERNELBASE!c_PmapEntries_api_ms_win_devices_query_l1_1_1+0x24
0048d1db 756d2074 node+0x607272
0048d1df 30203d20 KERNELBASE!`string'+0x4
0048d1e3 3330302e 0x30203d20
0048d1e7 6f6c2029 0x3330302e
0048d1eb 656d2077 node+0x1672029
0048d1ef 79726f6d 0x656d2077
0048d1f3 746f6e20 0x79726f6d
0048d1f7 63696669 windows_storage!wkscli_NULL_THUNK_DATA_DLA  (windows_storage+0x696e20)
0048d1fb 6f697461 0x63696669
0048d1ff 4347206e node+0x1647461
0048d203 206e6920 0x4347206e
0048d207 20646c6f 0x206e6920
0048d20b 63617073 0x20646c6f
0048d20f 65722065 0x63617073
0048d213 73657571 0x65722065
0048d217 0a646574 0x73657571
0048d21b 00000000 0xa646574

6c1987f0daae06102aab8bdeeab9e2ae_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0043f7d0 52a9fb6c wetype_tip_core+0x8b68c4
0043f7f8 52a9f945 wetype_tip_core+0x8bfb6c
0043f82c 52a9fc18 wetype_tip_core+0x8bf945
0043f86c 52a9618d wetype_tip_core+0x8bfc18
0043f8ac 52a960f3 wetype_tip_core+0x8b618d
0043f8dc 52a9627b wetype_tip_core+0x8b60f3
0043f918 52a963c4 wetype_tip_core+0x8b627b
0043f960 52a77d28 wetype_tip_core+0x8b63c4
0043f96c 52a77f98 wetype_tip_core+0x897d28
0043f9ac 52a78036 wetype_tip_core+0x897f98
0043f9c0 77d29300 wetype_tip_core+0x898036
0043f9e0 77d49008 ntdll!LdrpCallInitRoutine+0x14
0043fa84 77d48eaa ntdll!LdrShutdownProcess+0x1aa
0043fa98 77397a3c ntdll!RtlExitUserProcess+0x74
0043fb44 7739343d kernel32!ExitProcessStub+0x12
0043fb50 77d298b2 kernel32!BaseThreadInitThunk+0xe
0043fb90 77d29885 ntdll!__RtlUserThreadStart+0x70
0043fba8 00000000 ntdll!_RtlUserThreadStart+0x1b

83a2ec340d4c87975fad00be5cde8b88_003.dmp