Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
05a8ef58 76e10fcb KERNELBASE!FindCodePageHashNode+0x27
05a8ef84 76e20096 KERNELBASE!GetCPHashNode+0x97
05a8ef94 76e207a5 KERNELBASE!GET_CP_HASH_NODE+0x95
05a8efd0 75059f16 KERNELBASE!MultiByteToWideChar+0xb7
05a8f208 7505a12a wininet!GetFileExtensionFromMimeType+0x65
05a8fc88 75055103 wininet!HTTP_REQUEST_HANDLE_OBJECT::FHttpBeginCacheWrite+0x2bf
05a8fca4 7505508b wininet!HTTP_REQUEST_HANDLE_OBJECT::HttpSendRequest_Finish+0x7f
05a8fcbc 7505502b wininet!CFsm_HttpSendRequest::RunSM+0x45
05a8fcfc 7504fe55 wininet!CFsm::Run+0x9d
05a8fd48 7689b2b1 wininet!CFsm::RunWorkItem+0xa4
05a8fd58 774a8ddf shlwapi!ExecuteWorkItemThreadProc+0xe
05a8fdcc 774909b1 ntdll!RtlpTpWorkCallback+0x11d
05a8ff1c 752c344d ntdll!TppWorkerThread+0x562
05a8ff28 77479802 kernel32!BaseThreadInitThunk+0xe
05a8ff68 774797d5 ntdll!__RtlUserThreadStart+0x70
05a8ff80 00000000 ntdll!_RtlUserThreadStart+0x1b

ff7228d9837e95f2be9ef7a6a77014e8_000.dmp