Analyzed 26 dump

Top 1: total counts = 6

0534f794 7a70aeed rightsmanager!RM_AutorunScan+0x176
0534f890 7727fcc9 ffi_bindings!ffi_call_win32+0x11
0534f8a0 77e77cbe kernel32!BaseThreadInitThunk+0x19
0534f8fc 77e77c8e ntdll!__RtlUserThreadStart+0x2f
0534f90c 00000000 ntdll!_RtlUserThreadStart+0x1b

203d88af7358025dc3ba00827ecd6d91_000.dmp
311e64605b8a67ab677b915cc2cd967b_000.dmp
520f03bfb326b177a0ce3d7d17ec7bce_000.dmp
d5932bceb0db913ac695a88f71f32192_000.dmp
2d68369e34a128d8f24980e72f5ff3f1_001.dmp

Top 2: total counts = 3

0593f86c 5ff2aeed rightsmanager!RM_AutorunScan+0x176
0593f968 767d5d49 ffi_bindings!ffi_call_win32+0x11
0593f978 77d7d1ab kernel32!BaseThreadInitThunk+0x19
0593f9d0 77d7d131 ntdll!__RtlUserThreadStart+0x2b
0593f9e0 00000000 ntdll!_RtlUserThreadStart+0x1b

63807078d63d350fa49386dcf1ec9241_000.dmp
b4895e06a05fed09880357ec6b7f80d8_000.dmp
2da0785d1b9ac2cb64ce8a1fa107b02c_000.dmp

Top 3: total counts = 3

0a95f6fc 507daeed rightsmanager!RM_AutorunScan+0x176
0a95f7f8 768e344d ffi_bindings!ffi_call_win32+0x11
0a95f804 76e19802 kernel32!BaseThreadInitThunk+0xe
0a95f844 76e197d5 ntdll!__RtlUserThreadStart+0x70
0a95f85c 00000000 ntdll!_RtlUserThreadStart+0x1b

812a042db647b785e7fdbda5280160f2_000.dmp
1e219b4ded23220dbe06337e809d4726_000.dmp
2322390bb0e61ad2aea1769be6cfe4c8_000.dmp

Top 4: total counts = 2

ChildEBP RetAddr  
069bf2c0 1480e731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x13
069bf300 1481738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
069bf550 148112a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
069cfb98 1480e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
069cfc10 14847f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
069cfde4 75975d49 rightsmanager!RM_AutorunScan+0x176
069cfdf4 77cfd1ab kernel32!BaseThreadInitThunk+0x19
069cfe4c 77cfd131 ntdll!__RtlUserThreadStart+0x2b
069cfe5c 00000000 ntdll!_RtlUserThreadStart+0x1b

6a6656b4666a437a18b7321b0c2d3c30_000.dmp
e7769a06b82bc6235cb7629487fbc278_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
002ef324 68878d6c node+0x12ae60a
002ef394 66533961 node+0x2a18d6c
002ef408 671289e6 node+0x6d3961
002ef4d4 6712875e node+0x12c89e6
002ef530 67100ec3 node+0x12c875e
002ef56c 67100acb node+0x12a0ec3
002ef5ac 671123d2 node+0x12a0acb
002ef5f4 671122e2 node+0x12b23d2
002ef638 6652bd42 node+0x12b22e2
002ef660 6652d47d node+0x6cbd42
002ef6a0 6646ed6c node+0x6cd47d
002ef6fc 6646f379 node+0x60ed6c
002ef720 6646ea8a node+0x60f379
002ef724 670ea300 node+0x60ea8a
002ef728 002e0000 node+0x128a300
002ef72c 00000000 0x2e0000

d5ee85aea90d3c07075426e26498740a_000.dmp

Top 6: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00b7e198 6f5dd1af node+0x128dd02
00b7e2cc 6f7ced74 node+0x128d1af
00b7e34c 6f7d60bd node+0x147ed74
00b7e3a4 76fa5ef4 node+0x14860bd
00b7e3a8 76fbc4e0 gdi32!IsEdgeGdiProcess+0x14
00b7e3ac 76fa751f gdi32!___PchSym_+0x8
00b7e3b0 00b7e410 gdi32!LpkpInitializeEditControl+0x2f
00b7e3b4 119035f0 0xb7e410
00b7e410 00b7e458 0x119035f0
00b7e414 116b7af0 0xb7e458
00b7e458 1c79f484 0x116b7af0
00b7e470 118eae30 0x1c79f484
00000000 00000000 0x118eae30

f18f19e6e28fccfce5e39f033d3e5da3_000.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
059af060 546ce731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x16
059af0a0 546d738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
059af2f0 546d12a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
059bf938 546ce943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
059bf9b0 54707f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
059bfb84 75b8fcc9 rightsmanager!RM_AutorunScan+0x176
059bfb94 76ec82ae kernel32!BaseThreadInitThunk+0x19
059bfbf0 76ec827e ntdll!__RtlUserThreadStart+0x2f
059bfc00 00000000 ntdll!_RtlUserThreadStart+0x1b

101b9b712e691202749ff11fa74f36be_000.dmp

Top 8: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00f5cc50 1069dc08 node+0x2a2f20b
00f5cf4f 736d2038 node+0xb2dc08
00f5cf53 614d203a wininet!WPP_da6caa0d439733861da0911a41cfb1c1_Traceguids+0xd1b28
00f5cf57 732d6b72 0x614d203a
00f5cf5b 70656577 0x732d6b72
00f5cf5f 2e303120 0x70656577
00f5cf63 31282034 0x2e303120
00f5cf67 29332e32 0x31282034
00f5cf6b 203e2d20 0x29332e32
00f5cf6f 342e3031 0x203e2d20
00f5cf73 32312820 0x342e3031
00f5cf77 2029332e 0x32312820
00f5cf7b 202c424d 0x2029332e
00f5cf7f 20342e38 0x202c424d
00f5cf83 2e30202f 0x20342e38
00f5cf87 736d2030 0x2e30202f
00f5cf8b 61282020 wininet!WPP_da6caa0d439733861da0911a41cfb1c1_Traceguids+0xd1b20
00f5cf8f 61726576 0x61282020
00f5cf93 6d206567 0x61726576
00f5cf97 203d2075 0x6d206567
00f5cf9b 30302e31 0x203d2075
00f5cf9f 63202c30 0x30302e31
00f5cfa3 65727275 0x63202c30
00f5cfa7 6d20746e 0x65727275
00f5cfab 203d2075 0x6d20746e
00f5cfaf 30302e30 0x203d2075
00f5cfb3 6c202933 0x30302e30
00f5cfb7 6d20776f 0x6c202933
00f5cfbb 726f6d65 0x6d20776f
00f5cfbf 6f6e2079 winhttp!WinHttpQueryHeaders+0x43d65
00f5cfc3 69666974 0x6f6e2079
00f5cfc7 69746163 0x69666974
00f5cfcb 47206e6f 0x69746163
00f5cfcf 6e692043 0x47206e6f
00f5cfd3 646c6f20 0x6e692043
00f5cfd7 61707320 0x646c6f20
00f5cfdb 72206563 0x61707320
00f5cfdf 65757165 comctl32!ole32_NULL_THUNK_DATA_DLA  (comctl32+0x1f6563)
00f5cfe3 64657473 0x65757165
00f5cfe7 36385b0a 0x64657473
00f5cfeb 303a3832 0x36385b0a
00f5cfef 36453133 0x303a3832
00f5cff3 5d384632 0x36453133
00f5cff7 32393220 0x5d384632
00f5cffb 31323836 0x32393220
00f5cfff 6d203735 0x31323836
00f5d003 4d203a73 0x6d203735
00f5d007 2d6b7261 0x4d203a73
00f5d00b 65657773 0x2d6b7261
00f5d00f 30312070 0x65657773
00f5d013 2820392e 0x30312070
00f5d017 332e3231 0x2820392e
00f5d01b 3e2d2029 0x332e3231
00f5d01f 2e303120 0x3e2d2029
00f5d023 31282034 0x2e303120
00f5d027 29332e32 0x31282034
00f5d02b 2c424d20 0x29332e32
00f5d02f 322e3720 0x2c424d20
00f5d033 30202f20 0x322e3720
00f5d037 6d20302e 0x30202f20
00f5d03b 28202073 0x6d20302e
00f5d03f 72657661 0x28202073
00f5d043 20656761 0x72657661
00f5d047 3d20756d 0x20656761
00f5d04b 302e3120 0x3d20756d
00f5d04f 202c3030 0x302e3120
00f5d053 72727563 0x202c3030
00f5d07b 206e6f69 winhttp!CompileScript+0x34
00f5d08b 20656361 0x206e6f69
00f5d08f 75716572 0x20656361
00f5d093 65747365 0x75716572
00f5d097 385b0a64 0x65747365
00f5d09b 3a383236 0x385b0a64
00f5d09f 45313330 0x3a383236
00f5d0a3 38463236 0x45313330
00f5d0a7 3932205d 0x38463236
00f5d0ab 32383632 0x3932205d
00f5d0af 20393631 0x32383632
00f5d0b3 203a736d 0x20393631
00f5d0b7 6b72614d 0x203a736d
00f5d0bb 6577732d 0x6b72614d
00f5d0bf 31207065 0x6577732d
00f5d0c3 20342e30 0x31207065
00f5d0c7 2e323128 0x20342e30
00f5d0cb 2d202933 0x2e323128
00f5d0cf 3031203e 0x2d202933
00f5d0d3 2820342e 0x3031203e
00f5d0d7 332e3231 0x2820342e
00f5d0db 424d2029 0x332e3231
00f5d0df 3131202c 0x424d2029
00f5d0e3 2f20352e 0x3131202c
00f5d0e7 302e3020 0x2f20352e
00f5d0eb 20736d20 0x302e3020
00f5d0ef 76612820 0x20736d20
00f5d0f3 67617265 0x76612820
00f5d0f7 756d2065 0x67617265
00f5d0fb 31203d20 bcrypt!`string'+0x55
00f5d0ff 3030302e 0x31203d20
00f5d103 7563202c 0x3030302e
00f5d173 00000000 crypt32!wil::details_abi::FeatureStateData::RecordUsage+0x54

43bf74dc58adee917b5009685f14d553_000.dmp

Top 9: total counts = 1

0043d13b 6c6f206e 0x69204347
0043d13f 70732064 flowcal+0x1206e
0043d143 20656361 node+0x3132064
0043d147 75716572 0x20656361
0043d14b 65747365 shell32!__dyn_tls_init_callback  (shell32+0x6b6572)
0043d14f 315b0a64 0x65747365
0043d153 3a323136 0x315b0a64
0043d157 31413030 0x3a323136
0043d15b 30373739 0x31413030
0043d15f 3831205d 0x30373739
0043d163 32303236 0x3831205d
0043d167 20363631 0x32303236
0043d16b 203a736d 0x20363631
0043d16f 6b72614d 0x203a736d
0043d173 6577732d 0x6b72614d
0043d177 31207065 0x6577732d
0043d17b 20342e30 0x31207065
0043d17f 2e323128 0x20342e30
0043d183 2d202933 0x2e323128
0043d187 3031203e 0x2d202933
0043d18b 2820332e 0x3031203e
0043d18f 352e3231 0x2820332e
0043d193 424d2029 0x352e3231
0043d197 3431202c 0x424d2029
0043d19b 2f20352e 0x3431202c
0043d19f 302e3020 0x2f20352e
0043d1a3 20736d20 0x302e3020
0043d1a7 76612820 0x20736d20
0043d1b3 30203d20 crypt32!CryptSignCertificate+0xb18
0043d1cf 6f6c2029 0x30203d20
0043d1d3 656d2077 node+0x20c2029
0043d1d7 79726f6d 0x656d2077
0043d1db 746f6e20 0x79726f6d
0043d1df 63696669 FWPUCLNT!`string'+0xc14
0043d1e3 6f697461 0x63696669
0043d1e7 4347206e node+0x2097461
0043d1eb 206e6920 0x4347206e
0043d1ef 20646c6f 0x206e6920
0043d1f3 63617073 0x20646c6f
0043d1f7 65722065 0x63617073
0043d1fb 73657571 0x65722065
0043d1ff 0a646574 0x73657571
0043d203 00000000 0xa646574

94e76eac44b3f938441d50f9acfaa0cb_000.dmp

Top 10: total counts = 1

ChildEBP RetAddr  
0632ef24 7b1291a4 rightsmanager!std::basic_string,std::allocator >::basic_string,std::allocator >+0xc
0632ef50 7b121b3e rightsmanager!AutorunItem::AutorunItem+0x34
0633f598 7b11e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x11de
0633f610 7b157f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
0633f7e4 7615fcc9 rightsmanager!RM_AutorunScan+0x176
0633f7f4 775b7c5e kernel32!BaseThreadInitThunk+0x19
0633f850 775b7c2e ntdll!__RtlUserThreadStart+0x2f
0633f860 00000000 ntdll!_RtlUserThreadStart+0x1b

ff726d0c0659666f05dc1dc9f5a57dea_000.dmp

Top 11: total counts = 1

ChildEBP RetAddr  
08dcf2e8 0f1ae731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x16
08dcf328 0f1b738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
08dcf578 0f1b12a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
08ddfbc0 0f1ae943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
08ddfc38 0f1e7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
08ddfe0c 7516344d rightsmanager!RM_AutorunScan+0x176
08ddfe18 77249802 kernel32!BaseThreadInitThunk+0xe
08ddfe58 772497d5 ntdll!__RtlUserThreadStart+0x70
08ddfe70 00000000 ntdll!_RtlUserThreadStart+0x1b

2d51e8d6c96d102d3e5b3b5f3ea59856_000.dmp

Top 12: total counts = 1

ChildEBP RetAddr  
0594ed10 0f7fe731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x16
0594ed50 0f80738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
0594efa0 0f8012a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
0595f5e8 0f7fe943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
0595f660 0f837f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
0595f834 770b7ba9 rightsmanager!RM_AutorunScan+0x176
0595f844 77bdc3ab kernel32!BaseThreadInitThunk+0x19
0595f89c 77bdc32f ntdll!__RtlUserThreadStart+0x2b
0595f8ac 00000000 ntdll!_RtlUserThreadStart+0x1b

169b59e96f5b561e2a413346dbb9070a_000.dmp

Top 13: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
004fef18 0497109d node+0xc8fc07
004fef1c 04940000 0x497109d
004fef20 049710c8 0x4940000
004fef24 6d9742b0 0x49710c8
004fef28 02a12a08 node+0x38242b0
004fef2c 02a350c8 0x2a12a08
004fef30 02a37154 0x2a350c8
004fef34 00000000 0x2a37154

e7806331291f96282ebed135438b772b_000.dmp

Top 14: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00d3c768 67aadc08 node+0x2a2f20b
00d3ca67 203a736d node+0xb2dc08
00d3ca6b 6b72614d 0x203a736d
00d3ca6f 6577732d 0x6b72614d
00d3ca73 31207065 0x6577732d
00d3ca77 20342e30 0x31207065
00d3ca7b 2e323128 0x20342e30
00d3ca7f 2d202933 0x2e323128
00d3ca83 3031203e 0x2d202933
00d3ca87 2820342e 0x3031203e
00d3ca8b 352e3231 0x2820342e
00d3ca8f 424d2029 0x352e3231
00d3ca93 2e39202c 0x424d2029
00d3ca97 202f2035 0x2e39202c
00d3ca9b 20302e30 0x202f2035
00d3ca9f 2020736d 0x20302e30
00d3caa3 65766128 0x2020736d
00d3caa7 65676172 0x65766128
00d3caab 20756d20 0x65676172
00d3caaf 2e31203d 0x20756d20
00d3cab3 2c303030 0x2e31203d
00d3cab7 72756320 0x2c303030
00d3cabb 746e6572 0x72756320
00d3cabf 20756d20 0x746e6572
00d3cac3 2e30203d 0x20756d20
00d3cac7 29333030 0x2e30203d
00d3cacb 776f6c20 0x29333030
00d3cacf 6d656d20 0x776f6c20
00d3cad3 2079726f 0x6d656d20
00d3cad7 69746f6e 0x2079726f
00d3cadb 61636966 node+0x27c6f6e
00d3cadf 6e6f6974 0x61636966
00d3cae3 20434720 0x6e6f6974
00d3cae7 6f206e69 0x20434720
20434720 00000000 dbghelp!Mod1::ExceptionFilter+0x19

f32d1191f219b2f777765d29fb2f45da_000.dmp

Top 15: total counts = 1

006fccd7 6e207972 0x6f6d656d
006fccdb 6669746f 360Base+0x77972
006fccdf 74616369 0x6669746f
006fcce3 206e6f69 sspicli!_NULL_IMPORT_DESCRIPTOR+0xed9
006fcce7 69204347 0x206e6f69
006fcceb 6c6f206e 0x69204347
006fccef 70732064 0x6c6f206e
006fccf3 20656361 node+0xda2064
006fccf7 75716572 0x20656361
006fcd3b 2820342e clbcatq!CComAppl::Init+0x35b
006fcd47 2e35202c 0x2820342e
006fcd4b 202f2035 0x2e35202c
006fcd4f 20302e30 0x202f2035
006fcd53 2020736d 0x20302e30
006fcd57 65766128 0x2020736d
006fcd5b 65676172 0x65766128
006fcd5f 20756d20 0x65676172
006fcd63 2e31203d 0x20756d20
006fcd67 2c303030 0x2e31203d
006fcd6b 72756320 0x2c303030
006fcd6f 746e6572 node+0x2dc6320
006fcd73 20756d20 0x746e6572
006fcd77 2e31203d 0x20756d20
006fcd7b 29303030 0x2e31203d
006fcd7f 776f6c20 0x29303030
006fe93f 00000000 sechost!CreateSystemCapabilitySecurityDescriptor+0x5040

72b4ad0295e286b4c769a8977a153ab5_000.dmp

Top 16: total counts = 1

ChildEBP RetAddr  
055af150 7938e731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x13
055af190 7939738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
055af3e0 793912a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
055bfa28 7938e943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
055bfaa0 793c7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
055bfc74 7621fcc9 rightsmanager!RM_AutorunScan+0x176
055bfc84 77157c6e kernel32!BaseThreadInitThunk+0x19
055bfce0 77157c3e ntdll!__RtlUserThreadStart+0x2f
055bfcf0 00000000 ntdll!_RtlUserThreadStart+0x1b

c26169b54dc822cd02b3989ebff94118_000.dmp