Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0077f7c0 771a023a ntdll!RtlpWaitOnCriticalSection+0x93
0077f7f8 771a0089 ntdll!RtlpEnterCriticalSectionContended+0x1aa
0077f800 005c96e7 ntdll!RtlEnterCriticalSection+0x49
0077f820 005b092c Screenshot!base::`dynamic atexit destructor for 'statistics_auto_deletor''+0x37
0077f84c 005b0829 Screenshot!::operator()+0x89
0077f880 005b0877 Screenshot!__crt_seh_guarded_call::operator()<, &, >+0x27
0077f8a0 005b0b31 Screenshot!__acrt_lock_and_call< >+0x24
0077f8b4 005b0482 Screenshot!_execute_onexit_table+0x17
0077f8ec 005b0675 Screenshot!common_exit+0xa1
0077f900 0059effd Screenshot!exit+0x11
0077f940 74fffcc9 Screenshot!__scrt_common_main_seh+0x173
0077f950 771c80ce kernel32!BaseThreadInitThunk+0x19
0077f9ac 771c809e ntdll!__RtlUserThreadStart+0x2f
0077f9bc 00000000 ntdll!_RtlUserThreadStart+0x1b

41263c7b15a1bac6a9b2d489537de883_000.dmp