Analyzed 2 dump
Top 1: total counts = 1
ChildEBP RetAddr
008ffce0 7752d4e1 ntdll!RtlpWaitOnCriticalSection+0x93
008ffd18 7752ac69 ntdll!RtlpEnterCriticalSectionContended+0x261
008ffd24 00aa96e7 ntdll!RtlEnterCriticalSection+0x49
008ffd44 00a9092c Screenshot!base::`dynamic atexit destructor for 'statistics_auto_deletor''+0x37
008ffd70 00a90829 Screenshot!::operator()+0x89
008ffda4 00a90877 Screenshot!__crt_seh_guarded_call::operator()<, &, >+0x27
008ffdc4 00a90b31 Screenshot!__acrt_lock_and_call< >+0x24
008ffdd8 00a90482 Screenshot!_execute_onexit_table+0x17
008ffe10 00a90675 Screenshot!common_exit+0xa1
008ffe24 00a7effd Screenshot!exit+0x11
008ffe64 75b66359 Screenshot!__scrt_common_main_seh+0x173
008ffe74 775487a4 kernel32!BaseThreadInitThunk+0x19
008ffed0 77548774 ntdll!__RtlUserThreadStart+0x2f
008ffee0 00000000 ntdll!_RtlUserThreadStart+0x1b
b8a2283c6c7f526e12ad21d347e3646f_000.dmp
Top 2: total counts = 1
ChildEBP RetAddr
007afba0 772002aa ntdll!RtlpWaitOnCriticalSection+0x93
007afbd8 772000f9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
007afbe4 00ac96e7 ntdll!RtlEnterCriticalSection+0x49
007afc04 00ab092c Screenshot!base::`dynamic atexit destructor for 'statistics_auto_deletor''+0x37
007afc30 00ab0829 Screenshot!::operator()+0x89
007afc64 00ab0877 Screenshot!__crt_seh_guarded_call::operator()<, &, >+0x27
007afc84 00ab0b31 Screenshot!__acrt_lock_and_call< >+0x24
007afc98 00ab0482 Screenshot!_execute_onexit_table+0x17
007afcd0 00ab0675 Screenshot!common_exit+0xa1
007afce4 00a9effd Screenshot!exit+0x11
007afd24 7628fcc9 Screenshot!__scrt_common_main_seh+0x173
007afd34 772282ae kernel32!BaseThreadInitThunk+0x19
007afd90 7722827e ntdll!__RtlUserThreadStart+0x2f
007afda0 00000000 ntdll!_RtlUserThreadStart+0x1b
a655811f927fec213927ce7cbfdc342e_000.dmp