Analyzed 11 dump

Top 1: total counts = 4

057bf83c 7b71aeed rightsmanager!RM_AutorunScan+0x176
057bf938 763dfcc9 ffi_bindings!ffi_call_win32+0x11
057bf948 778082ae kernel32!BaseThreadInitThunk+0x19
057bf9a4 7780827e ntdll!__RtlUserThreadStart+0x2f
057bf9b4 00000000 ntdll!_RtlUserThreadStart+0x1b

8a035fdbd7f148d45e1acac08c547bb5_000.dmp
1f8848ae61301b51e4dbb61486dc538b_001.dmp
f59d593a289eef75e3abf1c5b0ec0162_000.dmp
60f36b5c2628e71b5bfa445ffa3e0980_000.dmp

Top 2: total counts = 1

05dbf6ac 636caeed rightsmanager!RM_AutorunScan+0x176
05dbf7a8 777b7ba9 ffi_bindings!ffi_call_win32+0x11
05dbf7b8 77d3bdab kernel32!BaseThreadInitThunk+0x19
05dbf810 77d3bd2f ntdll!__RtlUserThreadStart+0x2b
05dbf820 00000000 ntdll!_RtlUserThreadStart+0x1b

05d6e470680794da9e2c28efbc5f0547_001.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
063ced78 7a8ce731 rightsmanager!std::_Tree,std::allocator >,long,std::less,std::allocator > >,std::allocator,std::allocator > const ,long> >,0> >::lower_bound+0x16
063cedb8 7a8d738a rightsmanager!CProcessInfo::GetUsageMemory+0x31
063cf008 7a8d12a2 rightsmanager!CAutorunsCtrl::GetMemory+0x3a
063df650 7a8ce943 rightsmanager!CAutorunsCtrl::EnumRegAutorun+0x942
063df6c8 7a907f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x53
063df89c 7649fcc9 rightsmanager!RM_AutorunScan+0x176
063df8ac 777b82ae kernel32!BaseThreadInitThunk+0x19
063df908 777b827e ntdll!__RtlUserThreadStart+0x2f
063df918 00000000 ntdll!_RtlUserThreadStart+0x1b

515b636004630ed7a2ca4b8a5f1f42a7_000.dmp

Top 4: total counts = 1

0695f6bc 6468aeed rightsmanager!RM_AutorunScan+0x176
0695f7b8 7591344d ffi_bindings!ffi_call_win32+0x11
0695f7c4 779b9802 kernel32!BaseThreadInitThunk+0xe
0695f804 779b97d5 ntdll!__RtlUserThreadStart+0x70
0695f81c 00000000 ntdll!_RtlUserThreadStart+0x1b

4a051c0a0eed1ba6547f501c30453559_001.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0032c848 660ddc08 node+0x2a2f20b
0032cb47 736d2032 node+0xb2dc08
0032cb4b 614d203a 0x736d2032
0032cb4f 732d6b72 0x614d203a
0032cb53 70656577 webio!WapUriParseHostStringA+0x40e
0032cb57 2e313120 fse!Crc32Lookup+0x2117
0032cb5b 31282035 0x2e313120
0032cb5f 29392e33 0x31282035
0032cb63 203e2d20 0x29392e33
0032cb67 352e3131 0x203e2d20
0032cb6b 33312820 0x352e3131
0032cb6f 2029392e 0x33312820
0032cb73 202c424d 0x2029392e
0032cb77 362e3831 0x202c424d
0032cb7b 30202f20 0x362e3831
0032cb7f 6d20302e 0x30202f20
0032cb83 28202073 0x6d20302e
0032cb87 72657661 0x28202073
0032cb8b 20656761 0x72657661
0032cb8f 3d20756d 0x20656761
0032cb93 392e3020 0x3d20756d
0032cb97 202c3939 0x392e3020
0032cb9b 72727563 0x202c3939
0032cb9f 20746e65 0x72727563
0032cba3 3d20756d 0x20746e65
0032cba7 302e3020 0x3d20756d
0032cbab 20293230 0x302e3020
0032cbaf 20776f6c 0x20293230
0032cbb3 6f6d656d 0x20776f6c
0032cbc3 206e6f69 CleanEngine!Concurrency::details::SchedulerBase::Finalize+0x33
0032cbc7 69204347 0x206e6f69
0032cbcb 6c6f206e node+0x3c54347
0032cbcf 70732064 0x6c6f206e
0032cbd3 20656361 0x70732064
0032cbd7 75716572 0x20656361
0032cbdb 65747365 ole32!CClientCall::Cancel+0xb
0032cbe7 33323230 node+0x197365
0032cbeb 30393944 0x33323230
0032cbef 3431205d 0x30393944
0032cbf3 30303539 0x3431205d
0032cbf7 6d203439 0x30303539
0032cbfb 4d203a73 0x6d203439
0032cbff 2d6b7261 0x4d203a73
0032cc03 65657773 0x2d6b7261
0032cc07 32312070 node+0xa7773
0032cc0b 2820322e 0x32312070
0032cc0f 392e3331 0x2820322e
0032cc13 3e2d2029 0x392e3331
0032cc17 2e313120 0x3e2d2029
0032cc1b 31282035 0x2e313120
0032cc1f 29392e33 0x31282035
0032cc23 2c424d20 0x29392e33
0032cc27 2e363120 0x2c424d20
0032cc2b 202f2034 0x2e363120
0032cc2f 20302e30 0x202f2034
0032cc33 2020736d 0x20302e30
0032cc37 65766128 0x2020736d
0032cc3b 65676172 node+0x1b6128
0032cc3f 20756d20 node+0xc6172
0032cc43 2e31203d 0x20756d20
0032cc47 2c303030 0x2e31203d
0032cc4b 72756320 0x2c303030
0032cc4f 746e6572 0x72756320
0032cc53 20756d20 0x746e6572
0032cc57 2e31203d 0x20756d20
0032cc5b 29303030 0x2e31203d
0032cc5f 776f6c20 0x29303030
0032cc83 65636170 msctf!CAsyncReconvQueueItem::DoDispatch+0x11a
0032cc8b 74736575 node+0x86170
0032cc8f 5b0a6465 0x74736575
0032cc93 34303731 0x5b0a6465
0032cc97 3232303a 0x34303731
0032cc9b 39394433 0x3232303a
0032cc9f 31205d30 0x39394433
0032cca3 30353934 0x31205d30
0032cca7 20323131 0x30353934
0032ccab 203a736d 0x20323131
0032ccaf 6b72614d 0x203a736d
0032ccb3 6577732d 0x6b72614d
0032ccb7 31207065 node+0x1c732d
0032ccbb 20352e31 0x31207065
0032ccbf 2e333128 0x20352e31
0032ccc3 2d202939 0x2e333128
0032ccc7 3131203e 0x2d202939
0032cccb 2820352e 0x3131203e
0032cccf 392e3331 0x2820352e
0032ccd3 424d2029 0x392e3331
0032ccd7 3831202c 0x424d2029
0032ccdb 2f20322e 0x3831202c
0032ccdf 302e3020 0x2f20322e
0032cce3 20736d20 0x302e3020
0032cce7 76612820 0x20736d20
0032cceb 67617265 crypt32!RegOpenHKCUKeyExU+0xa1
0032ccff 6e657272 node+0x2067265
0032cd03 756d2074 0x6e657272
0032cd6f 00000000 ole32!CStdMarshal::MarshalInterface+0xef

619b2183d72a07037a4cfa9df8e5048d_000.dmp

Top 6: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0045c5a0 692cdc08 node+0x2a2f20b
0045c89f 736d2039 node+0xb2dc08
0045c8a3 614d203a winsta!$$VProc_ImageExportDirectory+0xdc5
0045c8a7 732d6b72 0x614d203a
0045c8ab 70656577 winmm!ole32_NULL_THUNK_DATA_DLN+0x8e
0045c8af 2e313120 0x70656577
0045c8b3 31282031 0x2e313120
0045c8b7 29322e33 0x31282031
0045c8bb 203e2d20 0x29322e33
0045c8bf 312e3131 0x203e2d20
0045c8c3 33312820 0x312e3131
0045c8c7 2029322e 0x33312820
0045c8cb 202c424d 0x2029322e
0045c8cf 342e3431 0x202c424d
0045c8d3 30202f20 0x342e3431
0045c8d7 6d20302e 0x30202f20
0045c8db 28202073 0x6d20302e
0045c8df 72657661 0x28202073
0045c8e3 20656761 0x72657661
0045c8e7 3d20756d 0x20656761
0045c8eb 392e3020 0x3d20756d
0045c8ef 202c3939 0x392e3020
0045c8f3 72727563 0x202c3939
0045c8f7 20746e65 0x72727563
0045c8fb 3d20756d 0x20746e65
0045c8ff 302e3020 0x3d20756d
0045c903 20293230 0x302e3020
0045c907 20776f6c 0x20293230
0045c90b 6f6d656d 0x20776f6c
0045c90f 6e207972 0x6f6d656d
0045c913 6669746f 0x6e207972
0045c917 74616369 0x6669746f
0045c91b 206e6f69 0x74616369
0045c91f 69204347 0x206e6f69
0045c923 6c6f206e node+0xa64347
0045c927 70732064 node+0x3f5206e
0045c92b 20656361 0x70732064
0045c92f 75716572 0x20656361
0045c93b 303a3834 oleaut32!CDateInfo::Create+0x1bd
0045c94f 6d203631 0x303a3834
0045c953 4d203a73 0x6d203631
0045c957 2d6b7261 0x4d203a73
0045c95b 65657773 0x2d6b7261
0045c95f 31312070 0x65657773
0045c963 2820382e 0x31312070
0045c967 322e3331 0x2820382e
0045c96b 3e2d2029 0x322e3331
0045c96f 2e313120 0x3e2d2029
0045c973 31282031 0x2e313120
0045c977 29322e33 0x31282031
0045c97b 2c424d20 0x29322e33
0045c97f 2e333120 0x2c424d20
0045c983 202f2030 0x2e333120
0045c987 20302e30 0x202f2030
0045c98b 2020736d 0x20302e30
0045c98f 65766128 0x2020736d
0045c993 65676172 0x65766128
0045c997 20756d20 0x65676172
0045c99b 2e31203d 0x20756d20
0045c99f 2c303030 0x2e31203d
0045c9a3 72756320 0x2c303030
0045cae7 00000000 rsaenh!SHATransformP3+0x13

19ab5b22f9960da717a1926f2a4b82e3_000.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
060bf800 5241e780 KERNELBASE!RaiseException+0x62
060bf844 523f94fd rightsmanager!_CxxThrowException+0x66
060bf860 523c865a rightsmanager!std::_Xlength_error+0x1f
060bf868 523ca4d0 rightsmanager!std::basic_string,std::allocator >::_Xlen+0xa
060bf888 523ae9f3 rightsmanager!std::basic_string,std::allocator >::assign+0x150
060bf908 523e7f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x103
060bfadc 7722fcc9 rightsmanager!RM_AutorunScan+0x176
060bfaec 77bc82ae kernel32!BaseThreadInitThunk+0x19
060bfb48 77bc827e ntdll!__RtlUserThreadStart+0x2f
060bfb58 00000000 ntdll!_RtlUserThreadStart+0x1b

d78ec4e4ad1aa61479cf20fbc52742f5_001.dmp

Top 8: total counts = 1

ChildEBP RetAddr  
06affc7c 52b4a47b rightsmanager!memcpy+0x4e
06affca8 52b2e9f3 rightsmanager!std::basic_string,std::allocator >::assign+0xfb
06affd28 52b67f86 rightsmanager!CAutorunsCtrl::EnumAutoruns+0x103
06affefc 7677fcc9 rightsmanager!RM_AutorunScan+0x176
06afff0c 77d482ae kernel32!BaseThreadInitThunk+0x19
06afff68 77d4827e ntdll!__RtlUserThreadStart+0x2f
06afff78 00000000 ntdll!_RtlUserThreadStart+0x1b

846ea7ba536b810eb3f7fd82c2707ed9_001.dmp