Analyzed 1 dump
Top 1: total counts = 1
ChildEBP RetAddr
10b5f664 76e01e87 ntdll!RtlpUnWaitCriticalSection+0x41
10b5f67c 6081af89 ntdll!RtlLeaveCriticalSection+0x51
10b5f688 608197ca update!__acrt_unlock+0x15
10b5f690 608197b8 update!__crt_seh_guarded_call::operator()<, &, >+0x49
10b5f6c0 608199a3 update!__crt_seh_guarded_call::operator()<, &, >+0x37
10b5f6e4 608198ca update!destroy_ptd+0xcb
10b5f6f0 76e2d4f7 update!destroy_fls+0x13
10b5f70c 76dff54d ntdll!RtlProcessFlsData+0x57
10b5f7a4 76dff4fb ntdll!LdrShutdownThread+0x35
10b5f7b4 76dff87e ntdll!RtlExitUserThread+0x2a
10b5f900 7595ef3c ntdll!TppWorkerThread+0x846
10b5f90c 76e33618 kernel32!BaseThreadInitThunk+0xe
10b5f94c 76e335eb ntdll!__RtlUserThreadStart+0x70
10b5f964 00000000 ntdll!_RtlUserThreadStart+0x1b
c353495dedee54a32dca94d1f1016138_000.dmp