Analyzed 56 dump

Top 1: total counts = 11

061afb4c 7073aeed rightsmanager!RM_AutorunScan+0x176
061afc48 74eb343d ffi_bindings!ffi_call_win32+0x11
061afc54 77839732 kernel32!BaseThreadInitThunk+0xe
061afc94 77839705 ntdll!__RtlUserThreadStart+0x70
061afcac 00000000 ntdll!_RtlUserThreadStart+0x1b

19c79553687a08aba4e0327bbe09d066_000.dmp
7207f0476be497aa0ee4a08aa4df7b81_000.dmp
7b3b98f5c392d911fd02f9476d20d225_000.dmp
dbcee5dbcee68f13aba499fe945cb0e6_000.dmp
680ab83e7ec8ffffa0e9aea5eecde350_000.dmp

Top 2: total counts = 5

ChildEBP RetAddr  
0a84f3e8 0fa5e731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x16
0a84f428 0fa6738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
0a84f678 0fa612a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
0a85fcc0 0fa5e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
0a85fd38 0fa97f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
0a85ff0c 769a344d rightsmanager!RM_AutorunScan+0x176
0a85ff18 77899802 kernel32!BaseThreadInitThunk+0xe
0a85ff58 778997d5 ntdll!__RtlUserThreadStart+0x70
0a85ff70 00000000 ntdll!_RtlUserThreadStart+0x1b

b3139e97b9262348f93a2fe702954a0e_000.dmp
f4f4adeb2e44e735510419b0b098a79b_000.dmp
7d595ba19976729231610290acdf5c80_000.dmp
41220eb3a0bb2d77778c97aa409dc651_000.dmp
0260a61507a24579dfb59c91e8e3a132_000.dmp

Top 3: total counts = 5

ChildEBP RetAddr  
05a2f340 7c2ce731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x13
05a2f380 7c2d738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
05a2f5d0 7c2d12a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
05a3fc18 7c2ce943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
05a3fc90 7c307f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
05a3fe64 76035d49 rightsmanager!RM_AutorunScan+0x176
05a3fe74 7725d03b kernel32!BaseThreadInitThunk+0x19
05a3fecc 7725cfc1 ntdll!__RtlUserThreadStart+0x2b
05a3fedc 00000000 ntdll!_RtlUserThreadStart+0x1b

c2be144393680dba0142dfb44baa9515_000.dmp
724974c95894566d2794481220542fb0_000.dmp
3db08e2b7860c476a43734cfb3eac1ab_000.dmp
01c3e1606053337c03399993284c602f_000.dmp
df52cfb6b2787174e797439cde6e3657_000.dmp

Top 4: total counts = 4

061ffce4 519eaeed rightsmanager!RM_AutorunScan+0x176
061ffde0 762e7ba9 ffi_bindings!ffi_call_win32+0x11
061ffdf0 772abb9b kernel32!BaseThreadInitThunk+0x19
061ffe48 772abb1f ntdll!__RtlUserThreadStart+0x2b
061ffe58 00000000 ntdll!_RtlUserThreadStart+0x1b

968100dc46a61255423560a6a14260f7_000.dmp
a8499b125069c119feeefdd47354f9eb_000.dmp
00e9cc10ef2c490eda4539c5f09c7e34_000.dmp
94f69bf1b04046e372bfbe5374c53053_000.dmp

Top 5: total counts = 4

05b7fddc 79c6aeed rightsmanager!RM_AutorunScan+0x176
05b7fed8 76d300f9 ffi_bindings!ffi_call_win32+0x11
05b7fee8 77ab7bbe kernel32!BaseThreadInitThunk+0x19
05b7ff44 77ab7b8e ntdll!__RtlUserThreadStart+0x2f
05b7ff54 00000000 ntdll!_RtlUserThreadStart+0x1b

496a958081d6b663f66c663c0fcce530_000.dmp
21c6f43962aff02417f33fa0d6e50c2f_000.dmp
ae5a7f733af4a8f9a7b940456d01be68_000.dmp
928aa64f4b4da9b96978b54be23378da_000.dmp

Top 6: total counts = 4

ChildEBP RetAddr  
0653f438 506ae731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x13
0653f478 506b738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
0653f6c8 506b12a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
0654fd10 506ae943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
0654fd88 506e7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
0654ff5c 7633fcc9 rightsmanager!RM_AutorunScan+0x176
0654ff6c 77ad82ae kernel32!BaseThreadInitThunk+0x19
0654ffc8 77ad827e ntdll!__RtlUserThreadStart+0x2f
0654ffd8 00000000 ntdll!_RtlUserThreadStart+0x1b

b0838ef69f8c233db85a7419f573861b_000.dmp
1eff861917a325bc6da654aa6692b6b9_000.dmp
4c1abdba007a7437f5366c4c0f0b9c35_000.dmp
dcf3a26e4279ba53c84698aa95f1d14d_000.dmp

Top 7: total counts = 2

ChildEBP RetAddr  
04ebec68 73d5e731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x13
04ebeca8 73d6738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
04ebeef8 73d612a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
04ecf540 73d5e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
04ecf5b8 73d97f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
04ecf78c 75f0343d rightsmanager!RM_AutorunScan+0x176
04ecf798 771a9732 kernel32!BaseThreadInitThunk+0xe
04ecf7d8 771a9705 ntdll!__RtlUserThreadStart+0x70
04ecf7f0 00000000 ntdll!_RtlUserThreadStart+0x1b

72c920ca683dff40de0853ea41ce1a31_000.dmp
8d8c9e46a8a38a667c8c52a8e100812c_000.dmp

Top 8: total counts = 2

ChildEBP RetAddr  
0562ed98 7958e731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x16
0562edd8 7959738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
0562f028 795912a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
0563f670 7958e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
0563f6e8 795c7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
0563f8bc 7689fcc9 rightsmanager!RM_AutorunScan+0x176
0563f8cc 779182ae kernel32!BaseThreadInitThunk+0x19
0563f928 7791827e ntdll!__RtlUserThreadStart+0x2f
0563f938 00000000 ntdll!_RtlUserThreadStart+0x1b

b35513a703861cd88dc05651aa5d4239_000.dmp
8d0231a42406a28fa355af58f8e47345_000.dmp

Top 9: total counts = 1

ChildEBP RetAddr  
11a9f89c 78a54dcf rightsextension!std::operator<,std::allocator >+0x3a
11a9fd98 78a55fd4 rightsextension!CAppInstallMonitor::RegChange+0x21f
11a9fdcc 78a59f53 rightsextension!std::_Func_impl_no_alloc const &>,void,RegInfo>::_Do_call+0x54
11a9fef8 78a5ab2a rightsextension!CRegData::MonitorFunction+0x4b3
11a9ff18 78a5a3ca rightsextension!std::_LaunchPad,std::default_delete > > >::_Go+0x8a
11a9ff20 78b6f16a rightsextension!std::_Pad::_Call_func+0xa
11a9ff58 75a17ba9 rightsextension!thread_start+0x58
11a9ff68 7704c2eb kernel32!BaseThreadInitThunk+0x19
11a9ffc0 7704c26f ntdll!__RtlUserThreadStart+0x2b
11a9ffd0 00000000 ntdll!_RtlUserThreadStart+0x1b

df4dd74d3d49818df368e24726e42e19_000.dmp

Top 10: total counts = 1

012fce63 6f6d656d 0x20776f6c
012fd087 00000000 context!TaskThread+0xdd

762d3d65befa8d625aa939c969545a3a_000.dmp

Top 11: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0028cbe0 65f1dc08 node+0x2a2f20b
0028cedf 70656577 node+0xb2dc08
0028cee3 2e303120 0x70656577
0028cee7 31282033 0x2e303120
0028ceeb 29372e31 0x31282033
0028ceef 203e2d20 0x29372e31
0028cef3 322e3031 0x203e2d20
0028cef7 31312820 0x322e3031
0028cefb 2029372e 0x31312820
0028ceff 202c424d 0x2029372e
0028cf03 38303531 0x202c424d
0028cf07 2f20312e 0x38303531
0028cf0b 302e3020 0x2f20312e
0028cf0f 20736d20 0x302e3020
0028cf13 76612820 0x20736d20
0028cf17 67617265 wininet!$$VProc_ImageExportDirectory+0x78
0028cf1b 756d2065 node+0x2227265
0028cf1f 30203d20 0x756d2065
0028cf23 3637372e 0x30203d20
0028cf27 7563202c 0x3637372e
0028cf2b 6e657272 crypt32!winreg_bhandle  (crypt32+0xf202c)
0028cf2f 756d2074 0x6e657272
0028cf33 30203d20 0x756d2074
0028cf37 3635352e 0x30203d20
0028cf3b 6f6c2029 0x3635352e
0028cf3f 656d2077 0x6f6c2029
0028cf43 79726f6d node+0x2e2077
0028cf47 746f6e20 0x79726f6d
0028cf4b 63696669 0x746f6e20
0028cf4f 6f697461 0x63696669
0028cf53 4347206e 0x6f697461
0028cf57 206e6920 0x4347206e
0028cf5b 20646c6f 0x206e6920
0028cf5f 63617073 0x20646c6f
0028cf63 65722065 0x63617073
0028cf67 73657571 node+0x332065
0028d06f 34363731 dui70!DirectUI::Element::_GetDependencies+0x211
0028d08b 30203d20 0x34363731
0028d08f 3837342e 0x30203d20
0028d093 7563202c 0x3837342e
0028d097 6e657272 crypt32!winreg_bhandle  (crypt32+0xf202c)
0028d09b 756d2074 0x6e657272
0028d09f 30203d20 0x756d2074
0028d0a3 3137332e 0x30203d20
0028d0a7 6f6c2029 0x3137332e
0028d0ab 656d2077 0x6f6c2029
0028d0af 79726f6d node+0x2e2077
0028d0b3 746f6e20 0x79726f6d
0028d0b7 63696669 0x746f6e20
0028d0bb 6f697461 0x63696669
0028d0bf 4347206e 0x6f697461
0028d0c3 206e6920 0x4347206e
0028d0c7 20646c6f 0x206e6920
0028d0cb 63617073 0x20646c6f
0028d0cf 65722065 0x63617073
0028d0d3 73657571 node+0x332065
0028d1db 00000000 dui70!DirectUI::Element::_GetDependencies+0x211

498b5a1ea6dc39d5c82e4a624fb0a658_000.dmp

Top 12: total counts = 1

ChildEBP RetAddr  
04d7f638 0ff7e731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x13
04d7f678 0ff8738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
04d7f8c8 0ff86a43 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
04d7fc00 0ff7e958 rightsmanager!CAutorunsCtrl::EnumServices+0x593
04d7fc78 0ffb7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x68
04d7fe4c 771162c4 rightsmanager!RM_AutorunScan+0x176
04d7fe60 77b11b69 kernel32!BaseThreadInitThunk+0x24
04d7fea8 77b11b34 ntdll!__RtlUserThreadStart+0x2f
04d7feb8 00000000 ntdll!_RtlUserThreadStart+0x1b

94110cd6a74e97a0e9baa7a441d8aedc_000.dmp

Top 13: total counts = 1

05d1fa64 6a0de6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
WARNING: Stack unwind information not available. Following frames may be wrong.
05d1fadc 77909802 node+0x2f3e6e0
05d1fb1c 779097d5 ntdll!__RtlUserThreadStart+0x70
05d1fb34 00000000 ntdll!_RtlUserThreadStart+0x1b

3742b85980fd56e2abef5138f8459c01_000.dmp

Top 14: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00aff554 5a148cc5 node+0x12ae60a
00aff5f4 57e03961 node+0x2a18cc5
00aff668 589f89e6 node+0x6d3961
00aff734 589f875e node+0x12c89e6
00aff790 589d0ec3 node+0x12c875e
00aff7cc 589d0acb node+0x12a0ec3
00aff80c 589e23d2 node+0x12a0acb
00aff854 589e22e2 node+0x12b23d2
00aff898 57dfbd42 node+0x12b22e2
00aff8c0 57dfd47d node+0x6cbd42
00aff900 57d3ed6c node+0x6cd47d
00aff95c 57d3f379 node+0x60ed6c
00aff980 57d3ea8a node+0x60f379
00affa20 7784c73e node+0x60ea8a
00affa2c 00affa9c ntdll!RtlAllocateHeap+0x3e
00000000 00000000 0xaffa9c

5b08084fdd864ce3fef971c7beb631b8_000.dmp

Top 15: total counts = 1

003cd227 74616369 0x6669746f
003cd22b 206e6f69 binding+0x26369
003cd22f 69204347 0x206e6f69
003cd233 6c6f206e 0x69204347
003cd237 70732064 0x6c6f206e
003cd23b 20656361 wship6!_NULL_IMPORT_DESCRIPTOR+0x9e
003cd23f 75716572 0x20656361
003cdf03 00000000 shell32!RunAsNewUser_RunDLLW+0x95

3fc401becace89fec9ca0a3d59ac47ac_000.dmp

Top 16: total counts = 1

ChildEBP RetAddr  
05f3f2fc 7b1f91a4 rightsmanager!std::basic_string,std::allocator >::basic_string,std::allocator >+0xc
05f3f328 7b1f1b3e rightsmanager!AutorunItem::AutorunItem+0x34
05f4f970 7b1ee943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x11de
05f4f9e8 7b227f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
05f4fbbc 7620fa29 rightsmanager!RM_AutorunScan+0x176
05f4fbcc 77297a9e kernel32!BaseThreadInitThunk+0x19
05f4fc28 77297a6e ntdll!__RtlUserThreadStart+0x2f
05f4fc38 00000000 ntdll!_RtlUserThreadStart+0x1b

2d5725014778667d5501d50835ae9538_000.dmp

Top 17: total counts = 1

ChildEBP RetAddr  
0c8ef688 76b2cd70 msvcrt!_LocaleUpdate::_LocaleUpdate+0x1f
0c8ef918 76b2d220 msvcrt!_output_l+0x73
0c8ef95c 76b2d1c0 msvcrt!_vsnprintf_l+0x8b
0c8ef978 731d54e9 msvcrt!_vsnprintf+0x18
0c8ef99c 731d5469 IPHLPAPI!StringCchPrintfA+0x39
0c8ef9dc 731d5d12 IPHLPAPI!ConvertGuidToStringA+0x56
0c8efa6c 731d6a89 IPHLPAPI!AllocateAndGetAdaptersAddresses+0xb1
0c8efaa4 72fb47fb IPHLPAPI!GetAdaptersAddresses+0x44
0c8efae4 72fb2d24 winhttp!LoadAdapterTables+0x47
0c8efba4 72fb452e winhttp!LoadGatewayMacsByAdapter+0x75
0c8efbd4 72fb2b6e winhttp!WinHttpReadGuidsForConnectedNetworks+0xe9
0c8efbf8 72fb394e winhttp!NETWORK_MANAGER::Init+0x4a
0c8efc30 72fb467e winhttp!NETWORK_MANAGER::GetWpadInformationForConnectedNetworks+0x60
0c8efc58 72fa620f winhttp!SWpadAsyncCall::OnWorkItem+0x5b
0c8efc98 72fa618d winhttp!HTTP_THREAD_POOL::_WorkItemCallback+0xc1
0c8efca0 7726fa5f winhttp!HTTP_THREAD_POOL::_StaticWorkItemCallback+0x16
0c8efcc4 77250991 ntdll!TppWorkpExecuteCallback+0x10f
0c8efe14 75f7343d ntdll!TppWorkerThread+0x562
0c8efe20 77239812 kernel32!BaseThreadInitThunk+0xe
0c8efe60 772397e5 ntdll!__RtlUserThreadStart+0x70
0c8efe78 00000000 ntdll!_RtlUserThreadStart+0x1b

d435ca3708d512d7744d93a2e71a6542_000.dmp

Top 18: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
004fcbb8 615bdc08 node+0x2a2f20b
004fcf6f 732d6b72 node+0xb2dc08
004fd19b 00000000 urlmon!RemoveDNTExceptionFromCache+0x42

8f3e286dd36e27ff0f2b0890e691fd9b_000.dmp

Top 19: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0033f3c4 65558d6c node+0x12ae60a
0033f42c 63213961 node+0x2a18d6c
0033f4a0 63e089e6 node+0x6d3961
0033f56c 63e0875e node+0x12c89e6
0033f5c8 63de0ec3 node+0x12c875e
0033f604 63de0acb node+0x12a0ec3
0033f644 63df23d2 node+0x12a0acb
0033f68c 63df22e2 node+0x12b23d2
0033f6d0 6320bd42 node+0x12b22e2
0033f6f8 6320d47d node+0x6cbd42
0033f738 6314ed6c node+0x6cd47d
0033f794 6314f379 node+0x60ed6c
0033f7b8 6314ea8a node+0x60f379
0033f7bc 63dca300 node+0x60ea8a
0033f7c0 00330000 node+0x128a300
0033f7c4 00000000 0x330000

89b63550ac44cfce20afe92e0bcb6336_000.dmp

Top 20: total counts = 1

ChildEBP RetAddr  
0020eb54 6fed2d3c KERNELBASE!DebugBreak+0x2
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x2a12d3c

2122d21c391b0d20a5ab0f612887f480_000.dmp

Top 21: total counts = 1

0014d0af 63202c37 0x39392e30
0014d0b3 65727275 360UDiskGuard+0x82c37
0014d0b7 6d20746e 0x65727275
0014d0bb 203d2075 context!__acrt_pow_log2_t3+0x2ee
0014d0bf 30302e30 0x203d2075
0014d0c3 6c202931 0x30302e30
0014d0c7 6d20776f 0x6c202931
0014d0cb 726f6d65 context!__acrt_pow_log2_t3+0x5ef
0014d0cf 6f6e2079 0x726f6d65
0014d0d3 69666974 0x6f6e2079
0014d0d7 69746163 0x69666974
0014d0db 47206e6f 0x69746163
0014d0df 6e692043 0x47206e6f
0014d0e3 646c6f20 0x6e692043
0014d0e7 61707320 0x646c6f20
0014d0eb 72206563 node+0x32b7320
0014d0ef 65757165 0x72206563
0014d0f3 64657473 0x65757165
0014d0f7 36325b0a 0x64657473
0014d0fb 303a3432 0x36325b0a
0014d0ff 43453431 0x303a3432
0014d103 5d303337 0x43453431
0014d107 36303620 0x5d303337
0014d10b 35343838 0x36303620
0014d10f 6d203631 0x35343838
0014d113 4d203a73 context!`__crt_strtox::multiply_by_power_of_ten'::`2'::large_power_data+0x8e1
0014d117 2d6b7261 0x4d203a73
0014d11b 65657773 0x2d6b7261
0014d11f 30312070 0x65657773
0014d123 2820382e 0x30312070
0014d127 332e3231 0x2820382e
0014d12b 3e2d2029 0x332e3231
0014d12f 2e303120 0x3e2d2029
0014d133 31282033 0x2e303120
0014d137 29332e32 0x31282033
0014d13b 2c424d20 0x29332e32
0014d13f 38353920 0x2c424d20
0014d143 2f20322e 0x38353920
0014d147 302e3020 0x2f20322e
0014d14b 20736d20 0x302e3020
0014d14f 76612820 0x20736d20
0014d163 7563202c setupapi!pDiamondNotifyFileDone+0x81
0014d16f 30203d20 shell32!__dyn_tls_init_callback  (shell32+0x3f202c)
0014d173 3438392e 0x30203d20
0014d177 6f6c2029 0x3438392e
0014d17b 656d2077 0x6f6c2029
0014d17f 79726f6d 0x656d2077
0014d183 746f6e20 0x79726f6d
0014d187 63696669 0x746f6e20
0014d18b 6f697461 0x63696669
0014d18f 4347206e 0x6f697461
0014d193 206e6920 0x4347206e
0014d197 20646c6f 0x206e6920
0014d19b 63617073 0x20646c6f
0014d19f 65722065 0x63617073
0014d1a3 73657571 0x65722065
0014d1a7 0a646574 dui70!$$VProc_ImageExportDirectory+0x21b3d
0014d1ab 00000000 0xa646574

11cb1e172577770a53b67e4d2413dae8_001.dmp

Top 22: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
003ef854 6f1d8cc5 node+0x12ae60a
003ef8ec 6ce93961 node+0x2a18cc5
003ef960 6da889e6 node+0x6d3961
003efa2c 6da8875e node+0x12c89e6
003efa88 6da60ec3 node+0x12c875e
003efac4 6da60acb node+0x12a0ec3
003efb04 6da723d2 node+0x12a0acb
003efb4c 6da722e2 node+0x12b23d2
003efb90 6ce8bd42 node+0x12b22e2
003efbb8 6ce8d47d node+0x6cbd42
003efbf8 6cdced6c node+0x6cd47d
003efc54 6cdcf379 node+0x60ed6c
003efc78 6cdcea8a node+0x60f379
003efc7c 6da4a300 node+0x60ea8a
003efc80 003e0000 node+0x128a300
003efc84 00000000 0x3e0000

90d985a537072da332553052946c42ea_000.dmp

Top 23: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
010ff484 6dea8d6c node+0x12ae60a
010ff4f4 6bb63961 node+0x2a18d6c
010ff568 6c7589e6 node+0x6d3961
010ff634 6c75875e node+0x12c89e6
010ff690 6c730ec3 node+0x12c875e
010ff6cc 6c730acb node+0x12a0ec3
010ff70c 6c7423d2 node+0x12a0acb
010ff754 6c7422e2 node+0x12b23d2
010ff798 6bb5bd42 node+0x12b22e2
010ff7c0 6bb5d47d node+0x6cbd42
010ff800 6ba9ed6c node+0x6cd47d
010ff85c 6ba9f379 node+0x60ed6c
010ff880 6ba9ea8a node+0x60f379
012bdd00 00000000 node+0x60ea8a

585f129d81dc7c00ef809ca7988fcbee_000.dmp

Top 24: total counts = 1

ChildEBP RetAddr  
05aff26c 7a8191a4 rightsmanager!std::basic_string,std::allocator >::basic_string,std::allocator >+0xc
05aff298 7a811b3e rightsmanager!AutorunItem::AutorunItem+0x34
05b0f8e0 7a80e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x11de
05b0f958 7a847f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
05b0fb2c 759a5d49 rightsmanager!RM_AutorunScan+0x176
05b0fb3c 770bd03b kernel32!BaseThreadInitThunk+0x19
05b0fb94 770bcfc1 ntdll!__RtlUserThreadStart+0x2b
05b0fba4 00000000 ntdll!_RtlUserThreadStart+0x1b

ead21be5e6708e85d1a0f02712e11aae_000.dmp

Top 25: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00def304 11cf8d6c node+0x12ae60a
00def36c 0f9b3961 node+0x2a18d6c
00def3e0 105a89e6 node+0x6d3961
00def4ac 105a875e node+0x12c89e6
00def508 10580ec3 node+0x12c875e
00def544 10580acb node+0x12a0ec3
00def584 105923d2 node+0x12a0acb
00def5cc 105922e2 node+0x12b23d2
00def610 0f9abd42 node+0x12b22e2
00def638 0f9ad47d node+0x6cbd42
00def678 0f8eed6c node+0x6cd47d
00def6d4 0f8ef379 node+0x60ed6c
00def6f8 0f8eea8a node+0x60f379
00def790 76f460ae node+0x60ea8a
00def844 76f43ee6 ntdll!RtlAllocateHeap+0x3e
00def85c 6e652d00 ntdll!RtlFreeHeap+0x46
00def86c 00000000 0x6e652d00

4be403e33d56103c36c76de2de8ea4e4_000.dmp

Top 26: total counts = 1

0686fbc0 709fe6e0 ffi_bindings!FFI::FFI::AsyncFFICall+0x4b
0686fbc8 709fe8c1 node+0x2f3e6e0
0686fbcc 0a6c4ce4 node+0x2f3e8c1
0686fbd0 709fe7dd 0xa6c4ce4
0686fbd4 001be50c node+0x2f3e7dd
0686fbd8 00000000 0x1be50c

59fb77e7a2326e165288a1cb32dcc485_000.dmp

Top 27: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0076ccd8 6029dc08 node+0x2a2f20b
0076d067 71657220 node+0xb2dc08
0076d06b 74736575 d2d1!CRenderOperationResolver::SetUnresolvedOperationsOnRenderInputs+0x73172
0076d06f 5b0a6465 windows_storage!wkscli_NULL_THUNK_DATA_DLA  (windows_storage+0x5e6575)
0076d073 36353238 0x5b0a6465
0076d077 3930303a 0x36353238
0076d07b 45364439 0x3930303a
0076d07f 20205d38 0x45364439
0076d083 30313031 0x20205d38
0076d087 20383331 0x30313031
0076d08b 203a736d 0x20383331
0076d08f 6b72614d 0x203a736d
0076d093 6577732d 0x6b72614d
0076d097 31207065 0x6577732d
0076d09b 20342e30 0x31207065
0076d09f 2e323128 0x20342e30
0076d0a3 2d202930 0x2e323128
0076d0a7 3031203e 0x2d202930
0076d0ab 2820302e 0x3031203e
0076d0af 302e3231 0x2820302e
0076d0b3 424d2029 0x302e3231
0076d0b7 3838202c 0x424d2029
0076d0bb 2f20382e 0x3838202c
0076d0bf 302e3020 0x2f20382e
0076d0c3 20736d20 0x302e3020
0076d0c7 76612820 0x20736d20
0076d0eb 3839392e advapi32!GetAccessPermissionsForObjectA+0xe0
0076d113 63617073 0x3839392e
0076d117 65722065 node+0x3ea7073
0076d11b 73657571 0x65722065
0076d11f 0a646574 0x73657571
0076d123 3532385b 0xa646574
0076d127 30303a36 0x3532385b
0076d12b 36443939 0x30303a36
0076d12f 205d3845 0x36443939
0076d133 31303120 0x205d3845
0076d137 36343130 0x31303120
0076d13b 3a736d20 0x36343130
0076d13f 72614d20 0x3a736d20
0076d143 77732d6b 0x72614d20
0076d147 20706565 0x77732d6b
0076d14b 302e3031 0x20706565
0076d14f 32312820 0x302e3031
0076d153 2029302e 0x32312820
0076d157 31203e2d 0x2029302e
0076d15b 20302e30 0x31203e2d
0076d15f 2e323128 0x20302e30
0076d163 4d202930 0x2e323128
0076d167 37202c42 0x4d202930
0076d16b 2f20352e 0x37202c42
0076d16f 302e3020 0x2f20352e
0076d173 20736d20 0x302e3020
0076d177 76612820 0x20736d20
0076d19b 3330302e advapi32!GetAccessPermissionsForObjectA+0xe0
0076d1c3 63617073 0x3330302e
0076d1c7 65722065 node+0x3ea7073
0076d1cb 73657571 0x65722065
0076d1cf 0a646574 0x73657571
0076d1d3 00000000 0xa646574

ac4277b889c00f820046f8c83cc8b2ca_000.dmp