Analyzed 7 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0032f3cc 770b5250 SogouPY+0x1f3015
0032f428 0032f454 user32!_MonitorFromPoint+0x44
0032f438 103bec94 0x32f454
0032f43c 001a40ef SogouPY+0x3bec94
0032f440 00000000 0x1a40ef

4dc6973e078706042c0e070a918be769_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
0034f568 688189e6 node+0x2c162a1
0034f634 6881875e node+0x12c89e6
0034f690 687f0ec3 node+0x12c875e
0034f6cc 687f0acb node+0x12a0ec3
0034f70c 688023d2 node+0x12a0acb
0034f754 688022e2 node+0x12b23d2
0034f798 67c1bd42 node+0x12b22e2
0034f7c0 67c1d47d node+0x6cbd42
0034f800 67b5ed6c node+0x6cd47d
0034f85c 67b5f379 node+0x60ed6c
0034f880 67b5ea8a node+0x60f379
0034f884 687da300 node+0x60ea8a
0034f888 00340000 node+0x128a300
0034f88c 00000000 0x340000

b8d1a862d2a69f786ebd24e5564b94b4_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
09d8f6dc 773c2985 comdlg32!McGenControlCallbackV2
09d8f73c 773c28fb ntdll!EventApiCallback+0x8b
09d8f794 773d5971 ntdll!EtwpUpdateEnableInfoAndCallback+0x12c
09d8f7b4 773da126 ntdll!EtwpProcessNotification+0x4c
09d8f7f8 773da080 ntdll!EtwDeliverDataBlock+0x146
09d8f814 76af343d ntdll!EtwpNotificationThread+0x47
09d8f820 773b9832 kernel32!BaseThreadInitThunk+0xe
09d8f860 773b9805 ntdll!__RtlUserThreadStart+0x70
09d8f878 00000000 ntdll!_RtlUserThreadStart+0x1b

07678b5a5b7de91f2d9bd862c0d62e19_000.dmp

Top 4: total counts = 1

ChildEBP RetAddr  
051af988 6ddbe87c KERNELBASE!RaiseException+0x58
WARNING: Stack unwind information not available. Following frames may be wrong.
051afa60 6de089d7 node+0x12ae87c
051afa64 00018494 node+0x12f89d7
051afa68 00acbfc8 0x18494
051afa6c 00000000 0xacbfc8

d6fce68d7d086d2d0f5b4dddac778e46_000.dmp

Top 5: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00000000 00000000 node+0x66ab5e

ec00e59eefbb5a99efc5530a769e9930_000.dmp

Top 6: total counts = 1

004fd13f 79726f6d UIAutomationCore!_CTA2?AVbad_caststd+0x1ae7b
004fd143 746f6e20 base!IID_ITaskFolder+0xd
004fd147 63696669 urlmon!CINetHttpEdge::CallGetBindInfo+0x484a0
004fd14b 6f697461 0x63696669
004fd14f 4347206e 0x6f697461
004fd153 206e6920 0x4347206e
004fd157 20646c6f 0x206e6920
004fd15b 63617073 0x20646c6f
004fd15f 65722065 0x63617073
004fd163 73657571 UIAutomationCore!icu_NULL_THUNK_DATA_DLA  (UIAutomationCore+0x312065)
004fd167 0a646574 0x73657571
004fd16b 00000000 0xa646574

9653fb115a6588778965b76588a876de_000.dmp

Top 7: total counts = 1

ChildEBP RetAddr  
03e6f6e4 5448ac4b defrag!file_system::ReadMFT::FixupUpdateSequenceArray+0x35
03e6f808 5448afa1 defrag!file_system::ReadMFT::ReadRecordFromIndex+0x14b
03e6f9d0 5448f87c defrag!file_system::ReadMFT::ReadRecordFromRange+0x1e1
03e6fb34 5448e4c2 defrag!file_system::NTFS::ReadRecord+0x83c
03e6fd20 54490127 defrag!file_system::NTFS::FindFiles+0x4b2
03e6fd8c 5449505a defrag!file_system::NTFS::Scan+0x177
03e6fe3c 54498faa defrag!::operator()+0x2ea
03e6fe5c 5449246a defrag!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
03e6fe64 544ee289 defrag!std::_Pad::_Call_func+0xa
03e6fe9c 75df7ba9 defrag!thread_start+0x58
03e6feac 778ec36b kernel32!BaseThreadInitThunk+0x19
03e6ff04 778ec2ef ntdll!__RtlUserThreadStart+0x2b
03e6ff14 00000000 ntdll!_RtlUserThreadStart+0x1b

2f4f9b5c988425e1adc93b1f9692ee46_000.dmp