Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0e93f654 774fe1c2 ntdll!RtlpLowFragHeapAllocFromContext+0x3d8
0e93f6c8 73d53d05 ntdll!RtlAllocateHeap+0x206
0e93f6e0 73d55e36 IPHLPAPI!NetioAllocateMemory+0x1c
0e93f768 73d56a89 IPHLPAPI!AllocateAndGetAdaptersAddresses+0x1c9
0e93f7a0 6eb247fb IPHLPAPI!GetAdaptersAddresses+0x44
0e93f7e0 6eb22d24 winhttp!LoadAdapterTables+0x47
0e93f8a0 6eb2452e winhttp!LoadGatewayMacsByAdapter+0x75
0e93f8d0 6eb22b6e winhttp!WinHttpReadGuidsForConnectedNetworks+0xe9
0e93f8f4 6eb2394e winhttp!NETWORK_MANAGER::Init+0x4a
0e93f92c 6eb2467e winhttp!NETWORK_MANAGER::GetWpadInformationForConnectedNetworks+0x60
0e93f954 6eb1620f winhttp!SWpadAsyncCall::OnWorkItem+0x5b
0e93f994 6eb1618d winhttp!HTTP_THREAD_POOL::_WorkItemCallback+0xc1
0e93f99c 7753fa5f winhttp!HTTP_THREAD_POOL::_StaticWorkItemCallback+0x16
0e93f9c0 77520991 ntdll!TppWorkpExecuteCallback+0x10f
0e93fb10 7687343d ntdll!TppWorkerThread+0x562
0e93fb1c 77509812 kernel32!BaseThreadInitThunk+0xe
0e93fb5c 775097e5 ntdll!__RtlUserThreadStart+0x70
0e93fb74 00000000 ntdll!_RtlUserThreadStart+0x1b

60c14daff8d5cb6bac8ac39a7f4b904d_002.dmp