From: pentisia on
Hi there,
I'm using Debug Diagnostic Tool from IIS Diagnostics to create a
dump file manually when the IIS is hang. I had analyse the dump file
using the tool, only able to find out something from inetinfo.exe.
But, I'm not sure what is the exact problem from the report. Can
someone help me to figure out? Thanks for your all your help in
advance.
Below is the report in text format.


Analysis Summary
Type Description Recommendation
Warning The following threads in
inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
Dump.dmp are calling the Sleep API. The call to this API originated
from aspnet_isapi!ThreadGateThreadProc+6a.

( 21 )

3.13% of threads blocked

The duration of the Sleep call is 3 seconds. Long calls to the Sleep
API can delay the application significantly.

Please follow up with vendor Microsoft Corporation for problem
resolution concerning the following file:
C:\WINNT\Microsoft.NET\Framework\v1.1.4322\aspnet_isapi.dll.


Warning The following threads in
inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
Dump.dmp are calling the Sleep API. The call to this API originated
from aspnet_isapi!MonitorHealth+40.

( 22 )

3.13% of threads blocked

The duration of the Sleep call is 100 miliseconds. Short calls to the
Sleep API often occur inside of a tight loop, which will delay the
application and cause high CPU until the loop is exited.

Please follow up with vendor Microsoft Corporation for problem
resolution concerning the following file:
C:\WINNT\Microsoft.NET\Framework\v1.1.4322\aspnet_isapi.dll.


Warning 37 client connection(s) in
inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
Dump.dmp have been executing a request for more than 90 seconds. Please
see the Client Connections section of this report for more detailed
information about the connection(s).


Information Symbols were not available to resolve the symbol
"comsvcs!g_pAppTrackerObject". The COM+ STA ThreadPool report may not
be accurate. Ensure that a symbol path is configured, enabling the
proper symbols to be loaded.

To modify or view the current symbol path from within DebugDiag, select
Symbol File Path from the File menu. If symbols aren't available and/or
a proper symbol path is already setup, then these threads should be
manually reviewed further to determine what they are doing. For more
information regarding debug symbols for Microsoft components, please
visit the following site:

Debugging Tools and Symbols: Getting Started


Analysis Details
Table Of Contents
inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
Dump.dmp

Top 5 threads by CPU time

Thread report

Well-Known COM STA Threads Report

HTTP Report




Report for
inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
Dump.dmp
Type of Analysis Performed Hang Analysis
Machine Name WSWCMESD532
Operating System Windows 2000 Service Pack 4
Number Of Processors 2
Process ID 5636
Process Image C:\WINNT\system32\inetsrv\inetinfo.exe
System Up-Time 35 day(s) 23:23:49
Process Up-Time 0 day(s) 16:49:00



Top 5 Threads by CPU time
Note - Times include both user mode and kernel mode for each thread
Thread ID: 3 Total CPU Time: 0 day(s) 00:00:29.15 Entry Point
for Thread: msvcrt!_endthreadex+32
Thread ID: 2 Total CPU Time: 0 day(s) 00:00:28.937 Entry Point
for Thread: msvcrt!_endthreadex+32
Thread ID: 18 Total CPU Time: 0 day(s) 00:00:07.93 Entry Point
for Thread: isatq!AtqPoolThread
Thread ID: 8 Total CPU Time: 0 day(s) 00:00:05.906 Entry Point
for Thread: isatq!AtqPoolThread
Thread ID: 7 Total CPU Time: 0 day(s) 00:00:05.406 Entry Point
for Thread: isatq!AtqPoolThread





Thread report

Thread 0 - System ID 4976
Entry point inetinfo!mainCRTStartup
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwReadFile+b
KERNEL32!ReadFile+181
ADVAPI32!ObjectCloseAuditAlarmA+2f
ADVAPI32!ObjectDeleteAuditAlarmW+4
ADVAPI32!`string'
inetinfo!StartDispatchTable+2f1
inetinfo!main+654
inetinfo!mainCRTStartup+ff
KERNEL32!BaseProcessStart+3d




Back to Top


Thread 1 - System ID 6904
Entry point
ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+1f
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.15




Function Source
NTDLL!ZwWaitForSingleObject+b
KERNEL32!WaitForSingleObjectEx+71
KERNEL32!WaitForSingleObject+f
iisadmin!ServiceEntry+156
inetinfo!InetinfoStartService+2bd
ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+2f




Back to Top


Thread 2 - System ID 6760
Entry point msvcrt!_endthreadex+32
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:6.312
Time spent in kernel mode 0 Days 0:0:22.625




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
USER32!__ClientExtTextOutW+3f
USER32!__ClientGetTextExtentPointW+48
iisRtl!SchedulerWorkerThread+a7
msvcrt!_endthreadex+98
KERNEL32!BaseThreadStart+52




Back to Top


Thread 3 - System ID 4004
Entry point msvcrt!_endthreadex+32
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:6.187
Time spent in kernel mode 0 Days 0:0:22.828




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
USER32!__ClientExtTextOutW+3f
USER32!__ClientGetTextExtentPointW+48
iisRtl!SchedulerWorkerThread+a7
msvcrt!_endthreadex+98
KERNEL32!BaseThreadStart+52




Back to Top


Thread 4 - System ID 3780
Create time 12:00:00 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwReplyWaitReceivePortEx+b
rpcrt4!LRPC_ADDRESS::ReceiveLotsaCalls+74
rpcrt4!RecvLotsaCallsWrapper+9
rpcrt4!BaseCachedThreadRoutine+4f
rpcrt4!ThreadStartRoutine+18
KERNEL32!BaseThreadStart+52




Back to Top


Thread 5 - System ID 4584
Entry point
ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+1f
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.31
Time spent in kernel mode 0 Days 0:0:0.31




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
USER32!__ClientExtTextOutW+3f
USER32!__ClientGetTextExtentPointW+48
infocomm!IIS_SERVICE::StartServiceOperation+209
w3svc!ServiceEntry+1b5
inetinfo!InetinfoStartService+2bd
ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+2f




Back to Top


Thread 6 - System ID 3880
Entry point isatq!I_AtqOplockThreadFunc
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!I_AtqOplockThreadFunc+32
KERNEL32!BaseThreadStart+52




Back to Top


Thread 7 - System ID 4608
Entry point isatq!AtqPoolThread
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:3.265
Time spent in kernel mode 0 Days 0:0:2.140




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!AtqPoolThread+40
KERNEL32!BaseThreadStart+52




Back to Top


Thread 8 - System ID 1432
Entry point isatq!AtqPoolThread
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:3.625
Time spent in kernel mode 0 Days 0:0:2.281




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!AtqPoolThread+40
KERNEL32!BaseThreadStart+52




Back to Top


Thread 9 - System ID 4188
Entry point rpcrt4!RPC_SERVER::InquireInterfaceIds+5
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
rpcrt4!COMMON_ProcessCalls+9e
rpcrt4!LOADABLE_TRANSPORT::ProcessIOEvents+99
rpcrt4!ProcessIOEventsWrapper+9
rpcrt4!BaseCachedThreadRoutine+4f
rpcrt4!ThreadStartRoutine+18
KERNEL32!BaseThreadStart+52




Back to Top


Thread 10 - System ID 768
Entry point rtutils!TraceServerThread
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
KERNEL32!WaitForMultipleObjects+17
rtutils!TraceServerThread+de
KERNEL32!BaseThreadStart+52




Back to Top


Thread 11 - System ID 6064
Entry point compfilt!CompressionThread
Create time 4/12/2006 2:05:56 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




This thread is calling an ISAPI Filter compfilt



Function Source
NTDLL!ZwWaitForSingleObject+b
KERNEL32!WaitForSingleObjectEx+71
KERNEL32!WaitForSingleObject+f
compfilt!CompressionThread+29
KERNEL32!BaseThreadStart+52




Back to Top


Thread 12 - System ID 6224
Entry point msvcrt!_endthread+3f
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.46




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
USER32!__ClientExtTextOutW+3f
USER32!__ClientGetTextExtentPointW+48
w3svc!CMTACallbackThread::Thread+42
msvcrt!_endthread+c6
KERNEL32!BaseThreadStart+52




Back to Top


Thread 13 - System ID 3640
Entry point w3svc!OleHackThread
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
USER32!__ClientExtTextOutW+3f
USER32!__ClientGetTextExtentPointW+48
w3svc!OleHackThread+88
KERNEL32!BaseThreadStart+52




Back to Top


Thread 14 - System ID 5048
Entry point inetsloc!SocketListenThread
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




This thread is waiting on data to be returned from another server via
WinSock.



The call to WinSock originated from inetsloc!SocketListenThread+51



Function Source
NTDLL!ZwWaitForSingleObject+b
msafd!SockWaitForSingleObject+1a8
msafd!WSPSelect+24e
ws2_32!select+e7
inetsloc!SocketListenThread+51
KERNEL32!BaseThreadStart+52




Back to Top


Thread 15 - System ID 6924
Entry point isatq!BmonThreadFunc
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




This thread is waiting on data to be returned from another server via
WinSock.



The call to WinSock originated from
isatq!ATQ_BMON_SET::BmonThreadFunc+22



Function Source
NTDLL!ZwWaitForSingleObject+b
msafd!SockWaitForSingleObject+1a8
msafd!WSPSelect+24e
ws2_32!select+e7
isatq!ATQ_BMON_SET::BmonThreadFunc+22
isatq!BmonThreadFunc+9
KERNEL32!BaseThreadStart+52




Back to Top


Thread 16 - System ID 4160
Entry point NTDLL!RtlpWaitThread
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
NTDLL!RtlpWaitThread+1b9
KERNEL32!BaseThreadStart+52




Back to Top


Thread 17 - System ID 5968
Entry point USERENV!NotificationThread
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
KERNEL32!WaitForMultipleObjects+17
USERENV!NotificationThread+5f
KERNEL32!BaseThreadStart+52




Back to Top


Thread 18 - System ID 5824
Entry point isatq!AtqPoolThread
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:4.312
Time spent in kernel mode 0 Days 0:0:2.781




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!AtqPoolThread+40
KERNEL32!BaseThreadStart+52




Back to Top


Thread 19 - System ID 4208
Entry point comsvcs!CEventDispatcher::PushEvents
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
KERNEL32!WaitForMultipleObjects+17
comsvcs!CEventDispatcher::PushEvents+4e
KERNEL32!BaseThreadStart+52




Back to Top


Thread 20 - System ID 5684
Entry point comsvcs!CEventDispatcher::GetEventServerInfoThread
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




This thread is making a COM call to neutral apartment (NA) in process
3468



Function Source
NTDLL!NtRequestWaitReplyPort+b
rpcrt4!LRPC_CCALL::SendReceive+11e
rpcrt4!I_RpcSendReceive+2c
OLE32!ThreadSendReceive+ef
OLE32!CRpcChannelBuffer::SwitchAptAndDispatchCall+14f
OLE32!CRpcChannelBuffer::SendReceive2+96
OLE32!CRpcChannelBuffer::SendReceive+11
OLE32!CAptRpcChnl::SendReceive+a9
OLE32!CCtxComChnl::SendReceive+124
rpcrt4!NdrProxySendReceive+4c
rpcrt4!NdrClientCall2+4f5
rpcrt4!ObjectStublessClient+76
rpcrt4!ObjectStubless+f
comsvcs!CEventDispatcher::GetEventServerInfoThread+152
KERNEL32!BaseThreadStart+52




Back to Top


Thread 21 - System ID 6364
Entry point aspnet_isapi!ThreadGateThreadProc
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




This thread is calling the Sleep API. The call to this API originated
from aspnet_isapi!ThreadGateThreadProc+6a.



Function Source
NTDLL!ZwDelayExecution+b
KERNEL32!SleepEx+32
KERNEL32!Sleep+b
aspnet_isapi!ThreadGateThreadProc+6a
KERNEL32!BaseThreadStart+52




Back to Top


Thread 22 - System ID 3732
Entry point msvcr71!_endthread+3e
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.93




This thread is calling the Sleep API. The call to this API originated
from aspnet_isapi!MonitorHealth+40.



Function Source
NTDLL!ZwDelayExecution+b
KERNEL32!SleepEx+32
KERNEL32!Sleep+b
aspnet_isapi!MonitorHealth+40
msvcr71!_endthread+aa
KERNEL32!BaseThreadStart+52




Back to Top


Thread 23 - System ID 4504
Entry point aspnet_isapi!ThreadPoolThreadProc
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:1.15
Time spent in kernel mode 0 Days 0:0:0.843




This thread is calling an ISAPI Extension aspnet_isapi



Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
aspnet_isapi!ThreadPoolThreadProc+6e
KERNEL32!BaseThreadStart+52




Back to Top


Thread 24 - System ID 5632
Entry point aspnet_isapi!ThreadPoolThreadProc
Create time 4/12/2006 2:05:57 AM
Time spent in user mode 0 Days 0:0:0.796
Time spent in kernel mode 0 Days 0:0:0.640




This thread is calling an ISAPI Extension aspnet_isapi



Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
aspnet_isapi!ThreadPoolThreadProc+6e
KERNEL32!BaseThreadStart+52




Back to Top


Thread 25 - System ID 4896
Entry point aspnet_isapi!ThreadPoolThreadProc
Create time 4/12/2006 7:16:04 AM
Time spent in user mode 0 Days 0:0:0.890
Time spent in kernel mode 0 Days 0:0:0.765




This thread is calling an ISAPI Extension aspnet_isapi



Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
aspnet_isapi!ThreadPoolThreadProc+6e
KERNEL32!BaseThreadStart+52




Back to Top


Thread 26 - System ID 5620
Entry point isatq!AtqPoolThread
Create time 4/12/2006 5:05:16 PM
Time spent in user mode 0 Days 0:0:0.359
Time spent in kernel mode 0 Days 0:0:0.171




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!AtqPoolThread+40
KERNEL32!BaseThreadStart+52




Back to Top


Thread 27 - System ID 4904
Entry point aspnet_isapi!ThreadPoolThreadProc
Create time 4/12/2006 5:14:50 PM
Time spent in user mode 0 Days 0:0:0.281
Time spent in kernel mode 0 Days 0:0:0.296




This thread is calling an ISAPI Extension aspnet_isapi



Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
aspnet_isapi!ThreadPoolThreadProc+6e
KERNEL32!BaseThreadStart+52




Back to Top


Thread 28 - System ID 4716
Entry point isatq!AtqPoolThread
Create time 4/12/2006 6:13:58 PM
Time spent in user mode 0 Days 0:0:0.78
Time spent in kernel mode 0 Days 0:0:0.15




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!AtqPoolThread+40
KERNEL32!BaseThreadStart+52




Back to Top


Thread 29 - System ID 6712
Entry point isatq!AtqPoolThread
Create time 4/12/2006 6:14:48 PM
Time spent in user mode 0 Days 0:0:0.203
Time spent in kernel mode 0 Days 0:0:0.171




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
isatq!AtqPoolThread+40
KERNEL32!BaseThreadStart+52




Back to Top


Thread 30 - System ID 5616
Create time 12:00:00 AM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwReplyWaitReceivePortEx+b
rpcrt4!LRPC_ADDRESS::ReceiveLotsaCalls+74
rpcrt4!RecvLotsaCallsWrapper+9
rpcrt4!BaseCachedThreadRoutine+11f
rpcrt4!ThreadStartRoutine+18
KERNEL32!BaseThreadStart+52




Back to Top


Thread 31 - System ID 4156
Entry point rpcrt4!RPC_SERVER::InquireInterfaceIds+5
Create time 4/12/2006 6:44:25 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.31




Function Source
NTDLL!ZwDelayExecution+b
rpcrt4!BaseCachedThreadRoutine+c3
rpcrt4!ThreadStartRoutine+18
KERNEL32!BaseThreadStart+52




Back to Top

Well-Known COM STA Threads Report
STA Name Thread ID Thread Status Call Status

Main STA 13 Unknown



HTTP report
IIS ATQ worker thread count 6 Thread(s)
Available ATQ worker thread count 6 Thread(s)
Active client connections 42 client connection(s)



Client Connections
Client connection from 169.190.74.169:1902 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
POST request for
/rbs/case/CaseTransFraudI.aspx?cardnumber=4857380341566976&formmode=1
Mapped To URL /rbs/case/CaseTransFraudI.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:22:14
QueryString cardnumber=4857380341566976&formmode=1
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseTransFraudI.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.142:1723 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for
/rbs/case/CaseAlloc.aspx?search=1&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1

Mapped To URL /rbs/case/CaseAlloc.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:22:08
QueryString
search=1&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1

Request mapped to d:\inetpub\wwwroot\rbs\case\CaseAlloc.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.142:1725 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseMenu.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:22:05
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseMenu.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.142:1677 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseAlloc.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:22:05
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseAlloc.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.78:1335 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.39:1218 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.99:1332 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.98:1254 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.72:1267 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.107:4316 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.109:2912 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:59
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.86:1283 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:54
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.66:1281 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:54
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.142:1710 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:53
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.169:1900 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:53
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.88:2032 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:44
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.68:2041 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:44
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.31:1335 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:21:44
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1493 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:20:43
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1494 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:20:42
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.68:2207 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseAlloc.aspx?status=forward
Mapped To URL /rbs/case/CaseAlloc.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:19:48
QueryString status=forward
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseAlloc.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.142:1728 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
POST request for
/rbs/case/CaseDetailFRAUDI.aspx?id=342752&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1

Mapped To URL /rbs/case/CaseDetailFRAUDI.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:19:23
QueryString
id=342752&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1

Request mapped to d:\inetpub\wwwroot\rbs\case\CaseDetailFRAUDI.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1496 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:19:10
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1498 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:19:09
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1517 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:17:48
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1516 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:17:48
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.33:1655 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:16:43
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.169:1948 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:14:30
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1538 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:10:37
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1536 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:10:36
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.92:3627 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/CaseNotify.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:06:43
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.35:3351 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:03:09
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.35:3360 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:02:56
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.35:3364 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:02:54
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.35:3366 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:02:52
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 163.38.210.35:3373 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:02:48
QueryString
Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.162.151.209:3362 to 169.162.151.209:443
Host Header 169.162.151.209
GET request for /RBS/Case/
Mapped To URL /RBS/Case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:01:45
QueryString
Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.1.205:1996 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /RBS/Case/
Mapped To URL /RBS/Case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:01:23
QueryString
Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1541 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:00:26
QueryString
Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




Client connection from 169.190.74.191:1543 to 169.162.151.209:443
Host Header fraudguard.eur.nsroot.net
GET request for /rbs/case/
Mapped To URL /rbs/case/default.aspx
HTTP Version HTTP/1.1
SSL Request True
Time alive 0 day(s) 00:00:12
QueryString
Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
HTTP Request State HTR_DOVERB
Client Connection State CCS_PROCESSING_CLIENT_REQ
Out of Process ID (WAM) Process 5636




2 connection(s) waiting for the next request.




Script Summary
Script Name Status Error Code Error Source Error Description Source
Line
IISAnalysis.asp Completed

From: Pat [MSFT] on
It doesn't look hung. There are worker threads available.

Pat

<pentisia(a)yahoo.com> wrote in message
news:1144907773.152089.96130(a)u72g2000cwu.googlegroups.com...
> Hi there,
> I'm using Debug Diagnostic Tool from IIS Diagnostics to create a
> dump file manually when the IIS is hang. I had analyse the dump file
> using the tool, only able to find out something from inetinfo.exe.
> But, I'm not sure what is the exact problem from the report. Can
> someone help me to figure out? Thanks for your all your help in
> advance.
> Below is the report in text format.
>
>
> Analysis Summary
> Type Description Recommendation
> Warning The following threads in
> inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
> Dump.dmp are calling the Sleep API. The call to this API originated
> from aspnet_isapi!ThreadGateThreadProc+6a.
>
> ( 21 )
>
> 3.13% of threads blocked
>
> The duration of the Sleep call is 3 seconds. Long calls to the Sleep
> API can delay the application significantly.
>
> Please follow up with vendor Microsoft Corporation for problem
> resolution concerning the following file:
> C:\WINNT\Microsoft.NET\Framework\v1.1.4322\aspnet_isapi.dll.
>
>
> Warning The following threads in
> inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
> Dump.dmp are calling the Sleep API. The call to this API originated
> from aspnet_isapi!MonitorHealth+40.
>
> ( 22 )
>
> 3.13% of threads blocked
>
> The duration of the Sleep call is 100 miliseconds. Short calls to the
> Sleep API often occur inside of a tight loop, which will delay the
> application and cause high CPU until the loop is exited.
>
> Please follow up with vendor Microsoft Corporation for problem
> resolution concerning the following file:
> C:\WINNT\Microsoft.NET\Framework\v1.1.4322\aspnet_isapi.dll.
>
>
> Warning 37 client connection(s) in
> inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
> Dump.dmp have been executing a request for more than 90 seconds. Please
> see the Client Connections section of this report for more detailed
> information about the connection(s).
>
>
> Information Symbols were not available to resolve the symbol
> "comsvcs!g_pAppTrackerObject". The COM+ STA ThreadPool report may not
> be accurate. Ensure that a symbol path is configured, enabling the
> proper symbols to be loaded.
>
> To modify or view the current symbol path from within DebugDiag, select
> Symbol File Path from the File menu. If symbols aren't available and/or
> a proper symbol path is already setup, then these threads should be
> manually reviewed further to determine what they are doing. For more
> information regarding debug symbols for Microsoft components, please
> visit the following site:
>
> Debugging Tools and Symbols: Getting Started
>
>
> Analysis Details
> Table Of Contents
> inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
> Dump.dmp
>
> Top 5 threads by CPU time
>
> Thread report
>
> Well-Known COM STA Threads Report
>
> HTTP Report
>
>
>
>
> Report for
> inetinfo.exe__PID__5636__Date__04_12_2006__Time_12_54_55PM__211__Manual
> Dump.dmp
> Type of Analysis Performed Hang Analysis
> Machine Name WSWCMESD532
> Operating System Windows 2000 Service Pack 4
> Number Of Processors 2
> Process ID 5636
> Process Image C:\WINNT\system32\inetsrv\inetinfo.exe
> System Up-Time 35 day(s) 23:23:49
> Process Up-Time 0 day(s) 16:49:00
>
>
>
> Top 5 Threads by CPU time
> Note - Times include both user mode and kernel mode for each thread
> Thread ID: 3 Total CPU Time: 0 day(s) 00:00:29.15 Entry Point
> for Thread: msvcrt!_endthreadex+32
> Thread ID: 2 Total CPU Time: 0 day(s) 00:00:28.937 Entry Point
> for Thread: msvcrt!_endthreadex+32
> Thread ID: 18 Total CPU Time: 0 day(s) 00:00:07.93 Entry Point
> for Thread: isatq!AtqPoolThread
> Thread ID: 8 Total CPU Time: 0 day(s) 00:00:05.906 Entry Point
> for Thread: isatq!AtqPoolThread
> Thread ID: 7 Total CPU Time: 0 day(s) 00:00:05.406 Entry Point
> for Thread: isatq!AtqPoolThread
>
>
>
>
>
> Thread report
>
> Thread 0 - System ID 4976
> Entry point inetinfo!mainCRTStartup
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.15
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwReadFile+b
> KERNEL32!ReadFile+181
> ADVAPI32!ObjectCloseAuditAlarmA+2f
> ADVAPI32!ObjectDeleteAuditAlarmW+4
> ADVAPI32!`string'
> inetinfo!StartDispatchTable+2f1
> inetinfo!main+654
> inetinfo!mainCRTStartup+ff
> KERNEL32!BaseProcessStart+3d
>
>
>
>
> Back to Top
>
>
> Thread 1 - System ID 6904
> Entry point
> ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+1f
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.15
> Time spent in kernel mode 0 Days 0:0:0.15
>
>
>
>
> Function Source
> NTDLL!ZwWaitForSingleObject+b
> KERNEL32!WaitForSingleObjectEx+71
> KERNEL32!WaitForSingleObject+f
> iisadmin!ServiceEntry+156
> inetinfo!InetinfoStartService+2bd
> ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+2f
>
>
>
>
> Back to Top
>
>
> Thread 2 - System ID 6760
> Entry point msvcrt!_endthreadex+32
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:6.312
> Time spent in kernel mode 0 Days 0:0:22.625
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> USER32!__ClientExtTextOutW+3f
> USER32!__ClientGetTextExtentPointW+48
> iisRtl!SchedulerWorkerThread+a7
> msvcrt!_endthreadex+98
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 3 - System ID 4004
> Entry point msvcrt!_endthreadex+32
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:6.187
> Time spent in kernel mode 0 Days 0:0:22.828
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> USER32!__ClientExtTextOutW+3f
> USER32!__ClientGetTextExtentPointW+48
> iisRtl!SchedulerWorkerThread+a7
> msvcrt!_endthreadex+98
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 4 - System ID 3780
> Create time 12:00:00 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwReplyWaitReceivePortEx+b
> rpcrt4!LRPC_ADDRESS::ReceiveLotsaCalls+74
> rpcrt4!RecvLotsaCallsWrapper+9
> rpcrt4!BaseCachedThreadRoutine+4f
> rpcrt4!ThreadStartRoutine+18
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 5 - System ID 4584
> Entry point
> ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+1f
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.31
> Time spent in kernel mode 0 Days 0:0:0.31
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> USER32!__ClientExtTextOutW+3f
> USER32!__ClientGetTextExtentPointW+48
> infocomm!IIS_SERVICE::StartServiceOperation+209
> w3svc!ServiceEntry+1b5
> inetinfo!InetinfoStartService+2bd
> ADVAPI32!AccessCheckByTypeResultListAndAuditAlarmByHandleW+2f
>
>
>
>
> Back to Top
>
>
> Thread 6 - System ID 3880
> Entry point isatq!I_AtqOplockThreadFunc
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!I_AtqOplockThreadFunc+32
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 7 - System ID 4608
> Entry point isatq!AtqPoolThread
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:3.265
> Time spent in kernel mode 0 Days 0:0:2.140
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!AtqPoolThread+40
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 8 - System ID 1432
> Entry point isatq!AtqPoolThread
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:3.625
> Time spent in kernel mode 0 Days 0:0:2.281
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!AtqPoolThread+40
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 9 - System ID 4188
> Entry point rpcrt4!RPC_SERVER::InquireInterfaceIds+5
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> rpcrt4!COMMON_ProcessCalls+9e
> rpcrt4!LOADABLE_TRANSPORT::ProcessIOEvents+99
> rpcrt4!ProcessIOEventsWrapper+9
> rpcrt4!BaseCachedThreadRoutine+4f
> rpcrt4!ThreadStartRoutine+18
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 10 - System ID 768
> Entry point rtutils!TraceServerThread
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> KERNEL32!WaitForMultipleObjects+17
> rtutils!TraceServerThread+de
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 11 - System ID 6064
> Entry point compfilt!CompressionThread
> Create time 4/12/2006 2:05:56 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> This thread is calling an ISAPI Filter compfilt
>
>
>
> Function Source
> NTDLL!ZwWaitForSingleObject+b
> KERNEL32!WaitForSingleObjectEx+71
> KERNEL32!WaitForSingleObject+f
> compfilt!CompressionThread+29
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 12 - System ID 6224
> Entry point msvcrt!_endthread+3f
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.15
> Time spent in kernel mode 0 Days 0:0:0.46
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> USER32!__ClientExtTextOutW+3f
> USER32!__ClientGetTextExtentPointW+48
> w3svc!CMTACallbackThread::Thread+42
> msvcrt!_endthread+c6
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 13 - System ID 3640
> Entry point w3svc!OleHackThread
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> USER32!__ClientExtTextOutW+3f
> USER32!__ClientGetTextExtentPointW+48
> w3svc!OleHackThread+88
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 14 - System ID 5048
> Entry point inetsloc!SocketListenThread
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> This thread is waiting on data to be returned from another server via
> WinSock.
>
>
>
> The call to WinSock originated from inetsloc!SocketListenThread+51
>
>
>
> Function Source
> NTDLL!ZwWaitForSingleObject+b
> msafd!SockWaitForSingleObject+1a8
> msafd!WSPSelect+24e
> ws2_32!select+e7
> inetsloc!SocketListenThread+51
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 15 - System ID 6924
> Entry point isatq!BmonThreadFunc
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> This thread is waiting on data to be returned from another server via
> WinSock.
>
>
>
> The call to WinSock originated from
> isatq!ATQ_BMON_SET::BmonThreadFunc+22
>
>
>
> Function Source
> NTDLL!ZwWaitForSingleObject+b
> msafd!SockWaitForSingleObject+1a8
> msafd!WSPSelect+24e
> ws2_32!select+e7
> isatq!ATQ_BMON_SET::BmonThreadFunc+22
> isatq!BmonThreadFunc+9
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 16 - System ID 4160
> Entry point NTDLL!RtlpWaitThread
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> NTDLL!RtlpWaitThread+1b9
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 17 - System ID 5968
> Entry point USERENV!NotificationThread
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> KERNEL32!WaitForMultipleObjects+17
> USERENV!NotificationThread+5f
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 18 - System ID 5824
> Entry point isatq!AtqPoolThread
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:4.312
> Time spent in kernel mode 0 Days 0:0:2.781
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!AtqPoolThread+40
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 19 - System ID 4208
> Entry point comsvcs!CEventDispatcher::PushEvents
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwWaitForMultipleObjects+b
> KERNEL32!WaitForMultipleObjectsEx+ea
> KERNEL32!WaitForMultipleObjects+17
> comsvcs!CEventDispatcher::PushEvents+4e
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 20 - System ID 5684
> Entry point comsvcs!CEventDispatcher::GetEventServerInfoThread
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> This thread is making a COM call to neutral apartment (NA) in process
> 3468
>
>
>
> Function Source
> NTDLL!NtRequestWaitReplyPort+b
> rpcrt4!LRPC_CCALL::SendReceive+11e
> rpcrt4!I_RpcSendReceive+2c
> OLE32!ThreadSendReceive+ef
> OLE32!CRpcChannelBuffer::SwitchAptAndDispatchCall+14f
> OLE32!CRpcChannelBuffer::SendReceive2+96
> OLE32!CRpcChannelBuffer::SendReceive+11
> OLE32!CAptRpcChnl::SendReceive+a9
> OLE32!CCtxComChnl::SendReceive+124
> rpcrt4!NdrProxySendReceive+4c
> rpcrt4!NdrClientCall2+4f5
> rpcrt4!ObjectStublessClient+76
> rpcrt4!ObjectStubless+f
> comsvcs!CEventDispatcher::GetEventServerInfoThread+152
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 21 - System ID 6364
> Entry point aspnet_isapi!ThreadGateThreadProc
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> This thread is calling the Sleep API. The call to this API originated
> from aspnet_isapi!ThreadGateThreadProc+6a.
>
>
>
> Function Source
> NTDLL!ZwDelayExecution+b
> KERNEL32!SleepEx+32
> KERNEL32!Sleep+b
> aspnet_isapi!ThreadGateThreadProc+6a
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 22 - System ID 3732
> Entry point msvcr71!_endthread+3e
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.93
>
>
>
>
> This thread is calling the Sleep API. The call to this API originated
> from aspnet_isapi!MonitorHealth+40.
>
>
>
> Function Source
> NTDLL!ZwDelayExecution+b
> KERNEL32!SleepEx+32
> KERNEL32!Sleep+b
> aspnet_isapi!MonitorHealth+40
> msvcr71!_endthread+aa
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 23 - System ID 4504
> Entry point aspnet_isapi!ThreadPoolThreadProc
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:1.15
> Time spent in kernel mode 0 Days 0:0:0.843
>
>
>
>
> This thread is calling an ISAPI Extension aspnet_isapi
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> aspnet_isapi!ThreadPoolThreadProc+6e
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 24 - System ID 5632
> Entry point aspnet_isapi!ThreadPoolThreadProc
> Create time 4/12/2006 2:05:57 AM
> Time spent in user mode 0 Days 0:0:0.796
> Time spent in kernel mode 0 Days 0:0:0.640
>
>
>
>
> This thread is calling an ISAPI Extension aspnet_isapi
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> aspnet_isapi!ThreadPoolThreadProc+6e
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 25 - System ID 4896
> Entry point aspnet_isapi!ThreadPoolThreadProc
> Create time 4/12/2006 7:16:04 AM
> Time spent in user mode 0 Days 0:0:0.890
> Time spent in kernel mode 0 Days 0:0:0.765
>
>
>
>
> This thread is calling an ISAPI Extension aspnet_isapi
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> aspnet_isapi!ThreadPoolThreadProc+6e
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 26 - System ID 5620
> Entry point isatq!AtqPoolThread
> Create time 4/12/2006 5:05:16 PM
> Time spent in user mode 0 Days 0:0:0.359
> Time spent in kernel mode 0 Days 0:0:0.171
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!AtqPoolThread+40
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 27 - System ID 4904
> Entry point aspnet_isapi!ThreadPoolThreadProc
> Create time 4/12/2006 5:14:50 PM
> Time spent in user mode 0 Days 0:0:0.281
> Time spent in kernel mode 0 Days 0:0:0.296
>
>
>
>
> This thread is calling an ISAPI Extension aspnet_isapi
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> aspnet_isapi!ThreadPoolThreadProc+6e
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 28 - System ID 4716
> Entry point isatq!AtqPoolThread
> Create time 4/12/2006 6:13:58 PM
> Time spent in user mode 0 Days 0:0:0.78
> Time spent in kernel mode 0 Days 0:0:0.15
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!AtqPoolThread+40
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 29 - System ID 6712
> Entry point isatq!AtqPoolThread
> Create time 4/12/2006 6:14:48 PM
> Time spent in user mode 0 Days 0:0:0.203
> Time spent in kernel mode 0 Days 0:0:0.171
>
>
>
>
> Function Source
> NTDLL!NtRemoveIoCompletion+b
> KERNEL32!GetQueuedCompletionStatus+27
> isatq!AtqPoolThread+40
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 30 - System ID 5616
> Create time 12:00:00 AM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.0
>
>
>
>
> Function Source
> NTDLL!ZwReplyWaitReceivePortEx+b
> rpcrt4!LRPC_ADDRESS::ReceiveLotsaCalls+74
> rpcrt4!RecvLotsaCallsWrapper+9
> rpcrt4!BaseCachedThreadRoutine+11f
> rpcrt4!ThreadStartRoutine+18
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
>
> Thread 31 - System ID 4156
> Entry point rpcrt4!RPC_SERVER::InquireInterfaceIds+5
> Create time 4/12/2006 6:44:25 PM
> Time spent in user mode 0 Days 0:0:0.0
> Time spent in kernel mode 0 Days 0:0:0.31
>
>
>
>
> Function Source
> NTDLL!ZwDelayExecution+b
> rpcrt4!BaseCachedThreadRoutine+c3
> rpcrt4!ThreadStartRoutine+18
> KERNEL32!BaseThreadStart+52
>
>
>
>
> Back to Top
>
> Well-Known COM STA Threads Report
> STA Name Thread ID Thread Status Call Status
>
> Main STA 13 Unknown
>
>
>
> HTTP report
> IIS ATQ worker thread count 6 Thread(s)
> Available ATQ worker thread count 6 Thread(s)
> Active client connections 42 client connection(s)
>
>
>
> Client Connections
> Client connection from 169.190.74.169:1902 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> POST request for
> /rbs/case/CaseTransFraudI.aspx?cardnumber=4857380341566976&formmode=1
> Mapped To URL /rbs/case/CaseTransFraudI.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:22:14
> QueryString cardnumber=4857380341566976&formmode=1
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseTransFraudI.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.142:1723 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for
> /rbs/case/CaseAlloc.aspx?search=1&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1
>
> Mapped To URL /rbs/case/CaseAlloc.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:22:08
> QueryString
> search=1&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1
>
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseAlloc.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.142:1725 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseMenu.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:22:05
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseMenu.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.142:1677 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseAlloc.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:22:05
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseAlloc.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.78:1335 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.39:1218 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.99:1332 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.98:1254 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.72:1267 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.107:4316 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.109:2912 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:59
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.86:1283 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:54
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.66:1281 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:54
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.142:1710 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:53
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.169:1900 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:53
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.88:2032 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:44
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.68:2041 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:44
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.31:1335 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:21:44
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1493 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:20:43
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1494 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:20:42
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.68:2207 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseAlloc.aspx?status=forward
> Mapped To URL /rbs/case/CaseAlloc.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:19:48
> QueryString status=forward
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseAlloc.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.142:1728 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> POST request for
> /rbs/case/CaseDetailFRAUDI.aspx?id=342752&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1
>
> Mapped To URL /rbs/case/CaseDetailFRAUDI.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:19:23
> QueryString
> id=342752&status=new,open,forward&todate=4%2f12%2f2006+12%3a26%3a05+PM&operatorserno=127&allocationtype=1
>
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseDetailFRAUDI.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1496 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:19:10
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1498 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:19:09
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1517 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:17:48
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1516 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:17:48
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.33:1655 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:16:43
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.169:1948 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:14:30
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1538 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:10:37
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1536 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:10:36
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.92:3627 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/CaseNotify.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:06:43
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\CaseNotify.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.35:3351 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:03:09
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.35:3360 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:02:56
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.35:3364 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:02:54
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.35:3366 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:02:52
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 163.38.210.35:3373 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:02:48
> QueryString
> Request mapped to d:\inetpub\wwwroot\rbs\case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.162.151.209:3362 to 169.162.151.209:443
> Host Header 169.162.151.209
> GET request for /RBS/Case/
> Mapped To URL /RBS/Case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:01:45
> QueryString
> Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.1.205:1996 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /RBS/Case/
> Mapped To URL /RBS/Case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:01:23
> QueryString
> Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1541 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:00:26
> QueryString
> Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> Client connection from 169.190.74.191:1543 to 169.162.151.209:443
> Host Header fraudguard.eur.nsroot.net
> GET request for /rbs/case/
> Mapped To URL /rbs/case/default.aspx
> HTTP Version HTTP/1.1
> SSL Request True
> Time alive 0 day(s) 00:00:12
> QueryString
> Request mapped to d:\inetpub\wwwroot\RBS\Case\default.aspx
> HTTP Request State HTR_DOVERB
> Client Connection State CCS_PROCESSING_CLIENT_REQ
> Out of Process ID (WAM) Process 5636
>
>
>
>
> 2 connection(s) waiting for the next request.
>
>
>
>
> Script Summary
> Script Name Status Error Code Error Source Error Description Source
> Line
> IISAnalysis.asp Completed
>


From: Ling on
Hi Pat,
My user create the dump file manually when the page is stop responding
for more than 15 minutes, until the "Page Cannot Be Displayed" error appear
(Sometime it didn't appear, the page just keep loading until no response).
The user can resolve the problem by resetting the IIS. But, is too often,
about 2 to 3 times a week.
We can't generate the dump file using the Hang Rule because they can't
use Anonymous authentication in their IIS, is their policy. I need to know
is manually creating the dump also giving the same result? As I can't trace
any error from all the dumps that created if the dump from inetinfo doesn't
look like hang.
May I know is there any other possibility that cause the problem?
How about connection problem?
Thanks for your attention again. Highly appreciate it.



"Pat [MSFT]" wrote:

> It doesn't look hung. There are worker threads available.
>
> Pat
>
> <pentisia(a)yahoo.com> wrote in message
> news:1144907773.152089.96130(a)u72g2000cwu.googlegroups.com...

From: Pat [MSFT] on
Manually creating a dump should have the same results - it's just a snapshot
of the process. You may need more intense debugging help, so you could
contact MS-Support.

Pat

"Ling" <Ling(a)discussions.microsoft.com> wrote in message
news:3CB06378-BE29-48B5-90F4-9951ADC86D36(a)microsoft.com...
> Hi Pat,
> My user create the dump file manually when the page is stop responding
> for more than 15 minutes, until the "Page Cannot Be Displayed" error
> appear
> (Sometime it didn't appear, the page just keep loading until no response).
> The user can resolve the problem by resetting the IIS. But, is too often,
> about 2 to 3 times a week.
> We can't generate the dump file using the Hang Rule because they can't
> use Anonymous authentication in their IIS, is their policy. I need to
> know
> is manually creating the dump also giving the same result? As I can't
> trace
> any error from all the dumps that created if the dump from inetinfo
> doesn't
> look like hang.
> May I know is there any other possibility that cause the problem?
> How about connection problem?
> Thanks for your attention again. Highly appreciate it.
>
>
>
> "Pat [MSFT]" wrote:
>
>> It doesn't look hung. There are worker threads available.
>>
>> Pat
>>
>> <pentisia(a)yahoo.com> wrote in message
>> news:1144907773.152089.96130(a)u72g2000cwu.googlegroups.com...
>


From: Ling on
Hi Pat,
I am attaching another dump analysis report for dllhost.exe. Hopefully
we can find something here. Thanks for your help again.


Analysis Summary
Type Description Recommendation
Information Symbols were not available to resolve the symbol
"comsvcs!g_pAppTrackerObject". The COM+ STA ThreadPool report may not be
accurate. Ensure that a symbol path is configured, enabling the proper
symbols to be loaded.



To modify or view the current symbol path from within DebugDiag, select
Symbol File Path from the File menu. If symbols aren't available and/or a
proper symbol path is already setup, then these threads should be manually
reviewed further to determine what they are doing. For more information
regarding debug symbols for Microsoft components, please visit the following
site:



Debugging Tools and Symbols: Getting Started






Analysis Details
Table Of Contents
dllhost.exe__System
Application__PID__3468__Date__04_14_2006__Time_10_09_14AM__234__Manual
Dump.dmp

Top 5 threads by CPU time

Thread report

Well-Known COM STA Threads Report




Report for dllhost.exe__System
Application__PID__3468__Date__04_14_2006__Time_10_09_14AM__234__Manual
Dump.dmp
Type of Analysis Performed Hang Analysis
Machine Name WSWCMESD532
Operating System Windows 2000 Service Pack 4
Number Of Processors 2
Process ID 3468
Process Image C:\WINNT\system32\dllhost.exe
System Up-Time 37 day(s) 20:38:11
Process Up-Time 37 day(s) 20:30:18



Top 5 Threads by CPU time
Note - Times include both user mode and kernel mode for each thread Thread
ID: 4 Total CPU Time: 0 day(s) 00:00:09.15 Entry Point for Thread:
msvcrt!_endthreadex+32
Thread ID: 3 Total CPU Time: 0 day(s) 00:00:00.62 Entry Point for
Thread: msvcrt!_endthread+3f
Thread ID: 5 Total CPU Time: 0 day(s) 00:00:00.46 Entry Point for
Thread: comsvcs!CEventServer::DispatchEvents
Thread ID: 7 Total CPU Time: 0 day(s) 00:00:00.46 Entry Point for
Thread: NTDLL!RtlpTimerThread
Thread ID: 8 Total CPU Time: 0 day(s) 00:00:00.46 Entry Point for
Thread: rpcrt4!RPC_SERVER::InquireInterfaceIds+5





Thread report

Thread 0 - System ID 4056
Entry point dllhost!WinMainCRTStartup
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.15




Function Source
NTDLL!ZwWaitForSingleObject+b
KERNEL32!WaitForSingleObjectEx+71
KERNEL32!WaitForSingleObject+f
OLE32!CSurrogateProcessActivator::WaitForSurrogateTimeout+4f
OLE32!CoRegisterSurrogateEx+169
dllhost!WinMain+b0
dllhost!WinMainCRTStartup+156
KERNEL32!BaseProcessStart+3d




Back to Top


Thread 1 - System ID 1248
Entry point OLE32!CRpcThreadCache::RpcWorkerThreadEntry
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
USER32!ExitWindowsWorker+7e
OLE32!CDllHost::STAWorkerLoop+40
OLE32!CDllHost::WorkerThread+c2
OLE32!DLLHostThreadEntry+9
OLE32!CRpcThread::WorkerLoop+22
OLE32!CRpcThreadCache::RpcWorkerThreadEntry+1a
KERNEL32!BaseThreadStart+52




Back to Top


Thread 2 - System ID 4344
Entry point txfaux!WORK_QUEUE::ThreadLoop
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.15




Function Source
NTDLL!NtRemoveIoCompletion+b
KERNEL32!GetQueuedCompletionStatus+27
txfaux!WORK_QUEUE::WorkerLoop+a0
txfaux!WORK_QUEUE::ThreadLoop+58
KERNEL32!BaseThreadStart+52




Back to Top


Thread 3 - System ID 4044
Entry point msvcrt!_endthread+3f
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.46




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
KERNEL32!WaitForMultipleObjects+17
comsvcs!CRMRecoveryClerk::RecoveryThread+49d
comsvcs!RecoveryThreadFunction+8e
msvcrt!_endthread+c6
KERNEL32!BaseThreadStart+52




Back to Top


Thread 4 - System ID 3568
Entry point msvcrt!_endthreadex+32
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:5.546
Time spent in kernel mode 0 Days 0:0:3.468




Function Source
NTDLL!ZwDelayExecution+b
KERNEL32!SleepEx+32
KERNEL32!Sleep+b
comsvcs!PostData+f2
msvcrt!_endthreadex+c1
KERNEL32!BaseThreadStart+52




Back to Top


Thread 5 - System ID 4356
Entry point comsvcs!CEventServer::DispatchEvents
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:0.31
Time spent in kernel mode 0 Days 0:0:0.15




This thread is making a COM call to neutral apartment (NA) within the same
process



Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
KERNEL32!WaitForMultipleObjects+17
comsvcs!CLceDisp::DoWork+ab
rpcrt4!Invoke+30
rpcrt4!NdrStubCall2+664
rpcrt4!CStdStubBuffer_Invoke+ec
OLE32!SyncStubInvoke+61
OLE32!StubInvoke+a8
OLE32!CCtxComChnl::ContextInvoke+bb
OLE32!MTAInvoke+18
OLE32!AppInvoke+b5
OLE32!ComInvokeWithLockAndIPID+297
OLE32!ComInvoke+41
OLE32!ThreadDispatch+21
OLE32!DispatchCall+24
OLE32!CRpcChannelBuffer::SwitchAptAndDispatchCall+34
OLE32!CRpcChannelBuffer::SendReceive2+96
OLE32!CRpcChannelBuffer::SendReceive+11
OLE32!CAptRpcChnl::SendReceive+a9
OLE32!CCtxComChnl::SendReceive+124
rpcrt4!NdrProxySendReceive+4c
rpcrt4!NdrClientCall2+4f5
rpcrt4!ObjectStublessClient+76
rpcrt4!ObjectStubless+f
comsvcs!CEventServer::DispatchEvents+83
KERNEL32!BaseThreadStart+52




Back to Top


Thread 6 - System ID 3980
Entry point NTDLL!RtlpWaitThread
Create time 3/7/2006 7:38:56 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
NTDLL!RtlpWaitThread+1b9
KERNEL32!BaseThreadStart+52




Back to Top


Thread 7 - System ID 1864
Entry point NTDLL!RtlpTimerThread
Create time 3/7/2006 7:45:33 PM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.31




Function Source
NTDLL!ZwDelayExecution+b
NTDLL!RtlpTimerThread+42
KERNEL32!BaseThreadStart+52




Back to Top


Thread 8 - System ID 6824
Entry point rpcrt4!RPC_SERVER::InquireInterfaceIds+5
Create time 4/10/2006 3:52:31 PM
Time spent in user mode 0 Days 0:0:0.15
Time spent in kernel mode 0 Days 0:0:0.31




Function Source
NTDLL!ZwReplyWaitReceivePortEx+b
rpcrt4!LRPC_ADDRESS::ReceiveLotsaCalls+74
rpcrt4!RecvLotsaCallsWrapper+9
rpcrt4!BaseCachedThreadRoutine+11f
rpcrt4!ThreadStartRoutine+18
KERNEL32!BaseThreadStart+52




Back to Top


Thread 9 - System ID 4632
Entry point rtutils!TraceServerThread
Create time 4/12/2006 4:07:32 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForMultipleObjects+b
KERNEL32!WaitForMultipleObjectsEx+ea
KERNEL32!WaitForMultipleObjects+17
rtutils!TraceServerThread+de
KERNEL32!BaseThreadStart+52




Back to Top


Thread 10 - System ID 3660
Entry point msdtcprx!CConnectionManager::TimerProc
Create time 4/12/2006 4:07:32 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwWaitForSingleObject+b
KERNEL32!WaitForSingleObjectEx+71
KERNEL32!WaitForSingleObject+f
msdtcprx!CConnectionManager::TimerProcForNonGuardedUser+e6
msdtcprx!CConnectionManager::TimerProc+1b
KERNEL32!BaseThreadStart+52




Back to Top


Thread 11 - System ID 3704
Entry point msvcrt!_endthread+3f
Create time 4/12/2006 4:07:33 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwDelayExecution+b
KERNEL32!SleepEx+32
KERNEL32!Sleep+b
catsrv!RegSrvrPump+33
catsrv!RunService+5d
msvcrt!_endthread+c6
KERNEL32!BaseThreadStart+52




Back to Top


Thread 12 - System ID 4600
Entry point rpcrt4!RPC_SERVER::InquireInterfaceIds+5
Create time 4/14/2006 4:08:27 PM
Time spent in user mode 0 Days 0:0:0.0
Time spent in kernel mode 0 Days 0:0:0.0




Function Source
NTDLL!ZwReplyWaitReceivePortEx+b
rpcrt4!LRPC_ADDRESS::ReceiveLotsaCalls+74
rpcrt4!RecvLotsaCallsWrapper+9
rpcrt4!BaseCachedThreadRoutine+4f
rpcrt4!ThreadStartRoutine+18
KERNEL32!BaseThreadStart+52




Back to Top

Well-Known COM STA Threads Report
STA Name Thread ID Thread Status Call Status

Main STA 1 Idle (N/A)
Apartment-threaded host for MTA clients 1 Idle (N/A)






Script Summary
Script Name Status Error Code Error Source Error Description Source Line
IISAnalysis.asp Completed