Crash in defrag, Analyzed 5 dumps, total processed 457, rate equals 1.09%



Top 1: Version = 1.5024.1000.924, Total count = 5


dump count = 1

ChildEBP RetAddr  
1323deb0 65c70761 KERNELBASE!RaiseException+0x62
1323def4 65c2caad defrag!_CxxThrowException+0x66
1323df10 1323df20 defrag!std::_Xbad_alloc+0x1c
WARNING: Frame IP not in any known module. Following frames may be wrong.
1323df14 65c154a2 0x1323df20
1323df20 65c10dd8 defrag!std::allocator<std::unique_ptr<file_system::FileInfo,std::default_delete<file_system::FileInfo> > >::allocate+0x32
1323df50 65c12457 defrag!std::vector<std::unique_ptr<file_system::FileInfo,std::default_delete<file_system::FileInfo> >,std::allocator<std::unique_ptr<file_system::FileInfo,std::default_delete<file_system::FileInfo> > > >::_Emplace_reallocate<std::unique_ptr<file_system::FileInfo,std::default_delete<file_system::FileInfo> > >+0x68
1323df7c 65c0a475 defrag!file_system::FileSystemData::AppendInfo+0x67
1323dfc8 65c0baac defrag!file_system::FatFS::AppendItem+0x145
1323e49c 65c0b9d0 defrag!file_system::FatFS::ReadDir+0x40c
1323e95c 65c0b9d0 defrag!file_system::FatFS::ReadDir+0x330
1323ee1c 65c0b9d0 defrag!file_system::FatFS::ReadDir+0x330
1323f2dc 65c0b9d0 defrag!file_system::FatFS::ReadDir+0x330
1323f79c 65c0b9d0 defrag!file_system::FatFS::ReadDir+0x330
1323fc5c 65c0bfd6 defrag!file_system::FatFS::ReadDir+0x330
1323fc98 65c2505a defrag!file_system::FatFS::Scan+0x146
1323fd48 65c28faa defrag!<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e>::operator()+0x2ea
1323fd68 65c2246a defrag!std::_LaunchPad<std::unique_ptr<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> >,std::default_delete<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> > > > >::_Go+0x8a
1323fd70 65c7e289 defrag!std::_Pad::_Call_func+0xa
1323fda8 757a7ba9 defrag!thread_start<unsigned int (__stdcall*)(void *)>+0x58
1323fdb8 76f3c36b kernel32!BaseThreadInitThunk+0x19
1323fe10 76f3c2ef ntdll!__RtlUserThreadStart+0x2b
1323fe20 00000000 ntdll!_RtlUserThreadStart+0x1b
27aba99577c812c0b5b99f7c60602dbe_000.dmp

dump count = 1

ChildEBP RetAddr  
144ef270 604eac4b defrag!file_system::ReadMFT::FixupUpdateSequenceArray+0x35
144ef394 604eafa1 defrag!file_system::ReadMFT::ReadRecordFromIndex+0x14b
144ef55c 604ef87c defrag!file_system::ReadMFT::ReadRecordFromRange+0x1e1
144ef6c0 604ee4c2 defrag!file_system::NTFS::ReadRecord+0x83c
144ef8ac 604f0127 defrag!file_system::NTFS::FindFiles+0x4b2
144ef918 604f505a defrag!file_system::NTFS::Scan+0x177
144ef9c8 604f8faa defrag!<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e>::operator()+0x2ea
144ef9e8 604f246a defrag!std::_LaunchPad<std::unique_ptr<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> >,std::default_delete<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> > > > >::_Go+0x8a
144ef9f0 6054e289 defrag!std::_Pad::_Call_func+0xa
144efa28 7675344d defrag!thread_start<unsigned int (__stdcall*)(void *)>+0x58
144efa34 76f79802 kernel32!BaseThreadInitThunk+0xe
144efa74 76f797d5 ntdll!__RtlUserThreadStart+0x70
144efa8c 00000000 ntdll!_RtlUserThreadStart+0x1b
01843ca5eaea649c0d88545c8041abdc_000.dmp

dump count = 1

ChildEBP RetAddr  
0d13f1c4 62eead3e defrag!file_system::ReadMFT::ReadAttr+0x166
0d13f2e0 62eeafa1 defrag!file_system::ReadMFT::ReadRecordFromIndex+0x23e
0d13f4a8 62eef87c defrag!file_system::ReadMFT::ReadRecordFromRange+0x1e1
0d13f60c 62eee4c2 defrag!file_system::NTFS::ReadRecord+0x83c
0d13f7f8 62ef0127 defrag!file_system::NTFS::FindFiles+0x4b2
0d13f864 62ef505a defrag!file_system::NTFS::Scan+0x177
0d13f914 62ef8faa defrag!<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e>::operator()+0x2ea
0d13f934 62ef246a defrag!std::_LaunchPad<std::unique_ptr<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> >,std::default_delete<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> > > > >::_Go+0x8a
0d13f93c 62f4e289 defrag!std::_Pad::_Call_func+0xa
0d13f974 75e9343d defrag!thread_start<unsigned int (__stdcall*)(void *)>+0x58
0d13f980 770e9812 kernel32!BaseThreadInitThunk+0xe
0d13f9c0 770e97e5 ntdll!__RtlUserThreadStart+0x70
0d13f9d8 00000000 ntdll!_RtlUserThreadStart+0x1b
f4f6dab5cc151c3abe17cadad9c5dc0d_000.dmp

dump count = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
0eb0ed8c 7c539c48 0xeb0ed98
0eb0ed98 7c50438f defrag!operator delete+0xb
0eb0eda8 7c513ae4 defrag!std::basic_string<char,std::char_traits<char>,std::allocator<char> >::~basic_string<char,std::char_traits<char>,std::allocator<char> >+0x2f
0eb0ee78 7c51ea40 defrag!file_system::FileSystemData::NotifyFileInfo+0x284
0eb0ee98 7c5266a3 defrag!file_system::NTFS::NotifyFileInfo+0x30
0eb0fa98 7c5201d2 defrag!DefragHelper::OnScanComplete+0x283
0eb0fb08 7c52505a defrag!file_system::NTFS::Scan+0x222
0eb0fbb8 7c528faa defrag!<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e>::operator()+0x2ea
0eb0fbd8 7c52246a defrag!std::_LaunchPad<std::unique_ptr<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> >,std::default_delete<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> > > > >::_Go+0x8a
0eb0fbe0 7c57e289 defrag!std::_Pad::_Call_func+0xa
0eb0fc18 75ee5d49 defrag!thread_start<unsigned int (__stdcall*)(void *)>+0x58
0eb0fc28 772fd03b kernel32!BaseThreadInitThunk+0x19
0eb0fc80 772fcfc1 ntdll!__RtlUserThreadStart+0x2b
0eb0fc90 00000000 ntdll!_RtlUserThreadStart+0x1b
ed9ce1c2d1abae39ddb21a9709d9f7a8_000.dmp

dump count = 1

ChildEBP RetAddr  
0097fbf8 50d31eee defrag!std::default_delete<file_system::FileInfo>::operator()+0x13
0097fc20 50d3c933 defrag!file_system::FileSystemData::~FileSystemData+0x4e
0097fc44 50d3cf0b defrag!file_system::NTFS::~NTFS+0x93
0097fc50 50d44e2f defrag!file_system::NTFS::`scalar deleting destructor'+0xb
0097fd04 50d48faa defrag!<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e>::operator()+0xbf
0097fd24 50d4246a defrag!std::_LaunchPad<std::unique_ptr<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> >,std::default_delete<std::tuple<<lambda_b3dbc8f12ec0ca9ccd3dd5fcb3d7383e> > > > >::_Go+0x8a
0097fd2c 50d9e289 defrag!std::_Pad::_Call_func+0xa
0097fd64 759bfcc9 defrag!thread_start<unsigned int (__stdcall*)(void *)>+0x58
0097fd74 77b982ae kernel32!BaseThreadInitThunk+0x19
0097fdd0 77b9827e ntdll!__RtlUserThreadStart+0x2f
0097fde0 00000000 ntdll!_RtlUserThreadStart+0x1b
9ccb05fb578ae82a280161822e39d036_000.dmp