Analyzed 1 dump
Top 1: total counts = 1
ChildEBP RetAddr
0828fa4c 77b7e0c3 ntdll!RtlpLowFragHeapFree+0xc5
0828fa64 75313d36 ntdll!RtlFreeHeap+0x105
0828fa78 753158dd IPHLPAPI!FreeMibTable+0x1b
0828fa88 753165ef IPHLPAPI!FreeAddressList+0x14
0828fa9c 75316d02 IPHLPAPI!FreeAdaptersAddresses+0x38
0828facc 732547fb IPHLPAPI!GetAdaptersAddresses+0x3ce
0828fb0c 73252d24 winhttp!LoadAdapterTables+0x47
0828fbcc 7325452e winhttp!LoadGatewayMacsByAdapter+0x75
0828fbfc 73252b6e winhttp!WinHttpReadGuidsForConnectedNetworks+0xe9
0828fc20 7325394e winhttp!NETWORK_MANAGER::Init+0x4a
0828fc58 7325467e winhttp!NETWORK_MANAGER::GetWpadInformationForConnectedNetworks+0x60
0828fc80 7324620f winhttp!SWpadAsyncCall::OnWorkItem+0x5b
0828fcc0 7324618d winhttp!HTTP_THREAD_POOL::_WorkItemCallback+0xc1
0828fcc8 77bbfa5f winhttp!HTTP_THREAD_POOL::_StaticWorkItemCallback+0x16
0828fcec 77ba09b1 ntdll!TppWorkpExecuteCallback+0x10f
0828fe3c 7583344d ntdll!TppWorkerThread+0x562
0828fe48 77b89802 kernel32!BaseThreadInitThunk+0xe
0828fe88 77b897d5 ntdll!__RtlUserThreadStart+0x70
0828fea0 00000000 ntdll!_RtlUserThreadStart+0x1b
d21cf7706dc4a84073339220f82815f1_001.dmp