Crash in falconshelper, Analyzed 2 dumps, total processed 144, rate equals 1.39%
Top 1: Version = 2.7224.1000.625, Total count = 2
dump count = 1
07baf5e4 76a362fa FalconsHelper!FalconsMain::WndPro+0xf7
07baf610 76a36d3a user32!InternalCallWinProc+0x23
07baf688 76a377c4 user32!UserCallWinProcCheckWow+0x109
07baf6e8 76a3788a user32!DispatchMessageWorker+0x3b5
07baf6f8 66bf747c user32!DispatchMessageW+0xf
07baf904 66bf80bf FalconsHelper!FalconsMain::Run+0x31c
07baf90c 66c55ab7 FalconsHelper!FalconsMain::ThreadProc+0xf
07baf944 74f9344d FalconsHelper!thread_start<unsigned int (__stdcall*)(void *)>+0x58
07baf950 773f9802 kernel32!BaseThreadInitThunk+0xe
07baf990 773f97d5 ntdll!__RtlUserThreadStart+0x70
07baf9a8 00000000 ntdll!_RtlUserThreadStart+0x1b
624cba433b2f63103cb0e9bde8ba97cf_000.dmp
dump count = 1
ChildEBP RetAddr
0360e074 732eab1c KERNELBASE!MultiByteToWideChar+0x1b
0360e0a4 73300569 urlmon!WzA2WDynamic+0x1d
0360e2c0 7330039e urlmon!CTransData::GetAcceptStr+0x7b
0360e2d8 73300306 urlmon!CBinding::GetBindString+0x7e
0360e30c 732fdd59 urlmon!CTransaction::GetBindString+0x76
0360eb68 732fdc9e urlmon!CINetHttp::INetAsyncOpenRequest+0x89
0360eb94 732fc93c urlmon!CINet::INetAsyncConnect+0x2ee
0360ebb8 732dd149 urlmon!CINet::INetAsyncOpen+0x2c
0360ec98 732dd5da urlmon!CINet::StartCommon+0x519
0360ecb4 732d2f4e urlmon!CINet::StartEx+0x1a
0360ecf0 732c6054 urlmon!COInetProt::StartEx+0x5ae
0360f1b0 732c7842 urlmon!LegacyTransaction::StartEx+0x1054
0360f290 732cab39 urlmon!CBinding::StartBinding+0x10d2
0360f2f0 732caea3 urlmon!CUrlMon::StartBinding+0x1b9
0360f31c 732f6fad urlmon!CUrlMon::BindToStorage+0x83
0360f368 7338bf9e urlmon!CBaseBSCB::KickOffDownload+0x9d
0360f5a0 63d9dcc5 urlmon!URLDownloadToCacheFileW+0x8e
0360f9fc 63d9ba49 FalconsHelper!CStatisticImpl::InternalDownloadFile+0xa5
0360fa58 63de6f97 FalconsHelper!CStatisticImpl::DownloadThreadProc+0x139
0360fa90 77a005c9 FalconsHelper!thread_start<unsigned int (__stdcall*)(void *)>+0x58
0360faa0 77d97c5d kernel32!BaseThreadInitThunk+0x19
0360fafc 77d97c2d ntdll!__RtlUserThreadStart+0x2f
0360fb0c 00000000 ntdll!_RtlUserThreadStart+0x1b
2f58045ebf938f5424674a55dc7acc1b_001.dmp