Analyzed 3 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0b13ed84 77a762bf KERNELBASE!RaiseException+0x62
0b13ee2c 0ab22457 ntdll!RtlpAllocateHeapInternal+0x48f
0b13ee58 0ab1a475 defrag!file_system::FileSystemData::AppendInfo+0x67
0b13eea4 0ab1baac defrag!file_system::FatFS::AppendItem+0x145
0b13f378 0ab1b9d0 defrag!file_system::FatFS::ReadDir+0x40c
0b13f838 0ab1b9d0 defrag!file_system::FatFS::ReadDir+0x330
0b13fcf8 0ab1bfd6 defrag!file_system::FatFS::ReadDir+0x330
0b13fd34 0ab3505a defrag!file_system::FatFS::Scan+0x146
0b13fde4 0ab38faa defrag!::operator()+0x2ea
0b13fe04 0ab3246a defrag!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
0b13fe0c 0ab8e289 defrag!std::_Pad::_Call_func+0xa
0b13fe44 7657fcc9 defrag!thread_start+0x58
0b13fe54 77a97c6e kernel32!BaseThreadInitThunk+0x19
0b13feb0 77a97c3e ntdll!__RtlUserThreadStart+0x2f
0b13fec0 00000000 ntdll!_RtlUserThreadStart+0x1b

916660680e965291f5b98ab7bd318f74_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
00dada40 629f2f60 node+0x12a016c
00dadaac 65dcfb76 node+0x72f60
00dadb0c 64e8e362 node+0x344fb76
00dadba8 75d57893 node+0x250e362
00dadbd4 75d3807a user32!_InternalCallWinProc+0x2b
00dadcc4 75d37b0a user32!UserCallWinProcCheckWow+0x4aa
00dadd28 75d42316 user32!DispatchClientMessage+0xea
00dadd68 771f5d8d user32!__fnEMPTY+0x36
00dadda0 7715102c ntdll!KiUserCallbackDispatcher+0x4d
00dadda4 75d3d53e win32u!NtUserPeekMessage+0xc
00daddf8 75d3d49e user32!_PeekMessage+0x2e
00dade34 76b861f3 user32!PeekMessageW+0x15e
00dade94 76b35248 shell32!SHProcessMessagesUntilEventsEx+0xd2
00dadec4 76b325a7 shell32!CShellExecute::_RunThreadMaybeWait+0x87
00dadfcc 76b331c2 shell32!CShellExecute::ExecuteNormal+0x1d6
00dae018 76b32c3c shell32!ShellExecuteNormal+0xfc
00dae10c 78ff7e32 shell32!ShellExecuteExW+0x9c
00dae478 755f7fa2 nativeutils!CDbgHelper::_MiniDumpHanlder+0x462
00dae514 77234300 KERNELBASE!UnhandledExceptionFilter+0x192
00dae5b8 771f5ce6 ntdll!LdrpLogFatalUserCallbackException+0x7f
00dae5c4 772161f2 ntdll!KiUserCallbackExceptionHandler+0x26
00dae5e8 772161c4 ntdll!ExecuteHandler2+0x26
00dae6b0 771f5dd6 ntdll!ExecuteHandler+0x24
00dae6b0 00000000 ntdll!KiUserExceptionDispatcher+0x26

1d1762d403a6cfede2184768e6c6681c_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
076bf2c8 5ae0a01d defrag!file_system::ReadMFT::FileChangeTime+0x54
076bf3f8 5ae0ad3e defrag!file_system::ReadMFT::ReadAttr+0x11d
076bf514 5ae0afa1 defrag!file_system::ReadMFT::ReadRecordFromIndex+0x23e
076bf6dc 5ae0f87c defrag!file_system::ReadMFT::ReadRecordFromRange+0x1e1
076bf840 5ae0e4c2 defrag!file_system::NTFS::ReadRecord+0x83c
076bfa2c 5ae10127 defrag!file_system::NTFS::FindFiles+0x4b2
076bfa98 5ae1505a defrag!file_system::NTFS::Scan+0x177
076bfb48 5ae18faa defrag!::operator()+0x2ea
076bfb68 5ae1246a defrag!std::_LaunchPad >,std::default_delete > > > >::_Go+0x8a
076bfb70 5ae6e289 defrag!std::_Pad::_Call_func+0xa
076bfba8 7531fa29 defrag!thread_start+0x58
076bfbb8 76fe7a4e kernel32!BaseThreadInitThunk+0x19
076bfc14 76fe7a1e ntdll!__RtlUserThreadStart+0x2f
076bfc24 00000000 ntdll!_RtlUserThreadStart+0x1b

ec209d8ab2664c874656e4cdaa9d218c_000.dmp