Analyzed 2 dump
Top 1: total counts = 1
ChildEBP RetAddr
0589f580 0771e780 KERNELBASE!RaiseException+0x58
0589f5c4 076f94fd rightsmanager!_CxxThrowException+0x66
0589f5e0 076c865a rightsmanager!std::_Xlength_error+0x1f
0589f5e8 076ca4d0 rightsmanager!std::basic_string,std::allocator >::_Xlen+0xa
0589f608 076ae9f3 rightsmanager!std::basic_string,std::allocator >::assign+0x150
0589f688 076e7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x103
0589f85c 760e343d rightsmanager!RM_AutorunScan+0x176
0589f868 774c9802 kernel32!BaseThreadInitThunk+0xe
0589f8a8 774c97d5 ntdll!__RtlUserThreadStart+0x70
0589f8c0 00000000 ntdll!_RtlUserThreadStart+0x1b
48b19792370db4c68d1ffb01c2752d09_001.dmp
Top 2: total counts = 1
ChildEBP RetAddr
063bfba8 6339fe7d rightsmanager!Json::Value::Value+0x58
063bfd6c 633d7f96 rightsmanager!CAutorunsCtrl::ToJson+0x16d
063bff44 74a8344d rightsmanager!RM_AutorunScan+0x186
063bff50 772f9802 kernel32!BaseThreadInitThunk+0xe
063bff90 772f97d5 ntdll!__RtlUserThreadStart+0x70
063bffa8 00000000 ntdll!_RtlUserThreadStart+0x1b
6a228529c056fcafc976a96308ce016c_000.dmp