Analyzed 2 dump

Top 1: total counts = 1

002fd017 75716572 0x20656361
002fd01b 65747365 urlmon!`string'+0x2a
002fd01f 335b0a64 0x65747365
002fd023 3a303632 0x335b0a64
002fd027 33453030 0x3a303632
002fd02b 30394638 0x33453030
002fd02f 3134205d 0x30394638
002fd033 39323432 0x3134205d
002fd037 20303637 0x39323432
002fd03b 203a736d 0x20303637
002fd03f 6b72614d 0x203a736d
002fd043 6577732d 0x6b72614d
002fd047 31207065 0x6577732d
002fd04b 20342e30 0x31207065
002fd04f 2e323128 0x20342e30
002fd053 2d202933 0x2e323128
002fd057 3031203e 0x2d202933
002fd05b 2820342e 0x3031203e
002fd05f 332e3231 0x2820342e
002fd063 424d2029 0x332e3231
002fd067 3431202c 0x424d2029
002fd06b 2f20312e 0x3431202c
002fd06f 302e3020 0x2f20312e
002fd073 20736d20 0x302e3020
002fd077 76612820 0x20736d20
002fd07b 67617265 shell32!__dyn_tls_init_callback  (shell32+0x922820)
002fd07f 756d2065 0x67617265
002fd083 30203d20 urlmon!CBSCNode::CallOnResponse+0x1c
002fd09f 6f6c2029 0x30203d20
002fd0a3 656d2077 0x6f6c2029
002fd0a7 79726f6d 0x656d2077
002fd0ab 746f6e20 0x79726f6d
002fd0af 63696669 0x746f6e20
002fd0b3 6f697461 0x63696669
002fd0b7 4347206e 0x6f697461
002fd0bb 206e6920 0x4347206e
002fd0bf 20646c6f 0x206e6920
002fd0c3 63617073 0x20646c6f
002fd0c7 65722065 0x63617073
002fd0cb 73657571 0x65722065
002fd0cf 0a646574 0x73657571
002fd0d3 00000000 0xa646574

be8525811f64787a31bdbfa6cac23f43_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
1484eef8 0cdea01d defrag!file_system::ReadMFT::FileChangeTime+0x72
1484f028 0cdead3e defrag!file_system::ReadMFT::ReadAttr+0x11d
1484f144 0cdeafa1 defrag!file_system::ReadMFT::ReadRecordFromIndex+0x23e
1484f30c 0cdef87c defrag!file_system::ReadMFT::ReadRecordFromRange+0x1e1
1484f470 0cdee4c2 defrag!file_system::NTFS::ReadRecord+0x83c
1484f65c 0cdf0127 defrag!file_system::NTFS::FindFiles+0x4b2
1484f6c8 0cdf505a defrag!file_system::NTFS::Scan+0x177
1484f778 0cdf8faa defrag!::operator()+0x2ea
1484f798 0cdf246a defrag!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
1484f7a0 0ce4e289 defrag!std::_Pad::_Call_func+0xa
1484f7d8 76f2347d defrag!thread_start+0x58
1484f7e4 77569852 kernel32!BaseThreadInitThunk+0xe
1484f824 77569825 ntdll!__RtlUserThreadStart+0x70
1484f83c 00000000 ntdll!_RtlUserThreadStart+0x1b

4a1bf4697b018738d6239f51dfaa5b2f_000.dmp