Analyzed 1 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0075f7d8 776e6585 ntdll!RtlpWaitOnCriticalSection+0x74
0075f7f8 776e64a5 ntdll!RtlpEnterCriticalSectionContended+0xd5
0075f804 003096e7 ntdll!RtlEnterCriticalSection+0x45
0075f824 002f092c Screenshot!base::`dynamic atexit destructor for 'statistics_auto_deletor''+0x37
0075f850 002f0829 Screenshot!::operator()+0x89
0075f884 002f0877 Screenshot!__crt_seh_guarded_call::operator()<, &, >+0x27
0075f8a4 002f0b31 Screenshot!__acrt_lock_and_call< >+0x24
0075f8b8 002f0482 Screenshot!_execute_onexit_table+0x17
0075f8f0 002f0675 Screenshot!common_exit+0xa1
0075f904 002deffd Screenshot!exit+0x11
0075f944 76a862c4 Screenshot!__scrt_common_main_seh+0x173
0075f958 777108b9 kernel32!BaseThreadInitThunk+0x24
0075f9a0 77710884 ntdll!__RtlUserThreadStart+0x2f
0075f9b0 00000000 ntdll!_RtlUserThreadStart+0x1b

f1122ee5a36bc9bdf4e8febaadb1dab8_000.dmp