Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0589f580 0771e780 KERNELBASE!RaiseException+0x58
0589f5c4 076f94fd rightsmanager!_CxxThrowException+0x66
0589f5e0 076c865a rightsmanager!std::_Xlength_error+0x1f
0589f5e8 076ca4d0 rightsmanager!std::basic_string,std::allocator >::_Xlen+0xa
0589f608 076ae9f3 rightsmanager!std::basic_string,std::allocator >::assign+0x150
0589f688 076e7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x103
0589f85c 760e343d rightsmanager!RM_AutorunScan+0x176
0589f868 774c9802 kernel32!BaseThreadInitThunk+0xe
0589f8a8 774c97d5 ntdll!__RtlUserThreadStart+0x70
0589f8c0 00000000 ntdll!_RtlUserThreadStart+0x1b

48b19792370db4c68d1ffb01c2752d09_001.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
063bfba8 6339fe7d rightsmanager!Json::Value::Value+0x58
063bfd6c 633d7f96 rightsmanager!CAutorunsCtrl::ToJson+0x16d
063bff44 74a8344d rightsmanager!RM_AutorunScan+0x186
063bff50 772f9802 kernel32!BaseThreadInitThunk+0xe
063bff90 772f97d5 ntdll!__RtlUserThreadStart+0x70
063bffa8 00000000 ntdll!_RtlUserThreadStart+0x1b

6a228529c056fcafc976a96308ce016c_000.dmp