Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
00f7fad8 771402aa ntdll!RtlpWaitOnCriticalSection+0x93
00f7fb10 771400f9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
00f7fb14 003574b8 ntdll!RtlEnterCriticalSection+0x49
00f7fb1c 002f96e7 Screenshot!theApp
00f7fb3c 002e092c Screenshot!base::`dynamic atexit destructor for 'statistics_auto_deletor''+0x37
00f7fb68 002e0829 Screenshot!::operator()+0x89
00f7fb9c 002e0877 Screenshot!__crt_seh_guarded_call::operator()<, &, >+0x27
00f7fbbc 002e0b31 Screenshot!__acrt_lock_and_call< >+0x24
00f7fbd0 002e0482 Screenshot!_execute_onexit_table+0x17
00f7fc08 002e0675 Screenshot!common_exit+0xa1
00f7fc1c 002ceffd Screenshot!exit+0x11
00f7fc5c 754ffcc9 Screenshot!__scrt_common_main_seh+0x173
00f7fc6c 771682ae kernel32!BaseThreadInitThunk+0x19
00f7fcc8 7716827e ntdll!__RtlUserThreadStart+0x2f
00f7fcd8 00000000 ntdll!_RtlUserThreadStart+0x1b

02ee4df16910115cc42a0fde58ba1c9d_000.dmp