Crash in arctrl, Analyzed 1 dumps, total processed 477, rate equals 0.21%
Top 1: Version = 1.5025.1270.226, Total count = 1
dump count = 1
ChildEBP RetAddr
0348f644 7691d4b1 wininet!HANDLE_OBJECT::RemoveChild+0x2b
0348f66c 7691d71e wininet!HANDLE_OBJECT::~HANDLE_OBJECT+0xe0
0348f688 7691dc19 wininet!INTERNET_CONNECT_HANDLE_OBJECT::~INTERNET_CONNECT_HANDLE_OBJECT+0x209
0348f6a4 7691dad6 wininet!HTTP_REQUEST_HANDLE_OBJECT::~HTTP_REQUEST_HANDLE_OBJECT+0x14a
0348f6b0 7691d327 wininet!HTTP_REQUEST_HANDLE_OBJECT::`scalar deleting destructor'+0xd
0348f6c0 7691adda wininet!HANDLE_OBJECT::Dereference+0x22
0348f6cc 7691d90a wininet!DereferenceObject+0x21
0348f6f4 7691d82c wininet!_InternetCloseHandle+0x9d
0348f734 7691d76b wininet!InternalInternetCloseHandle+0x148
0348f77c 7613e038 wininet!InternetCloseHandle+0x2a
0348f798 7613e3d1 urlmon!CINet::TerminateRequest+0x82
0348f7a4 7613e3b8 urlmon!CINet::MyUnlockRequest+0x10
0348f7b0 7613e39f urlmon!CINetProtImpl::UnlockRequest+0x10
0348f7bc 7613e385 urlmon!CINetEmbdFilter::UnlockRequest+0x11
0348f7c8 7613aeda urlmon!CINet::UnlockRequest+0x13
0348f7d4 7613ae7b urlmon!CMimeFt::UnlockRequest+0x11
0348f7e8 7613adce urlmon!CTransaction::UnlockRequest+0x39
0348f7f4 7613ad7e urlmon!CTransData::~CTransData+0x3a
0348f800 7613ae3b urlmon!CTransData::`scalar deleting destructor'+0xd
0348f818 7613a7fe urlmon!CTransData::Release+0x25
0348f824 7613a744 urlmon!CBinding::~CBinding+0xa9
0348f830 7613a72d urlmon!CBinding::`scalar deleting destructor'+0xd
0348f848 7613b2aa urlmon!CBinding::Release+0x25
0348f878 7613b346 urlmon!CUrlMon::StartBinding+0x1ff
0348f8a0 7615b567 urlmon!CUrlMon::BindToStorage+0x90
0348f8e4 7615b68c urlmon!CBaseBSCB::KickOffDownload+0x193
0348fa94 5813aa25 urlmon!URLDownloadToCacheFileW+0x108
0348fef0 58138789 arctrl!CStatisticImpl::InternalDownloadFile+0xa5
0348ff4c 58192f50 arctrl!CStatisticImpl::DownloadThreadProc+0x139
0348ff88 7659343d arctrl!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0348ff94 771b9802 kernel32!BaseThreadInitThunk+0xe
0348ffd4 771b97d5 ntdll!__RtlUserThreadStart+0x70
0348ffec 00000000 ntdll!_RtlUserThreadStart+0x1b
34bc7de31cc90196daae1550b95f59b3_000.dmp