Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
004ffd90 7715012a ntdll!RtlpWaitOnCriticalSection+0x93
004ffdc8 7714ff79 ntdll!RtlpEnterCriticalSectionContended+0x1aa
004ffdd0 00e096e7 ntdll!RtlEnterCriticalSection+0x49
004ffdf0 00df092c Screenshot!base::`dynamic atexit destructor for 'statistics_auto_deletor''+0x37
004ffe1c 00df0829 Screenshot!::operator()+0x89
004ffe50 00df0877 Screenshot!__crt_seh_guarded_call::operator()<, &, >+0x27
004ffe70 00df0b31 Screenshot!__acrt_lock_and_call< >+0x24
004ffe84 00df0482 Screenshot!_execute_onexit_table+0x17
004ffebc 00df0675 Screenshot!common_exit+0xa1
004ffed0 00ddeffd Screenshot!exit+0x11
004fff10 76a4fcc9 Screenshot!__scrt_common_main_seh+0x173
004fff20 77177c6e kernel32!BaseThreadInitThunk+0x19
004fff7c 77177c3e ntdll!__RtlUserThreadStart+0x2f
004fff8c 00000000 ntdll!_RtlUserThreadStart+0x1b

b15f85955a50a3bd8045ddc5dfdb99c8_000.dmp