Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
0012e8c8 0040c282 dolphin_host!SerializeMessage::AddData+0xf0
0012fb68 0040d1c4 dolphin_host!RelaunchSelf+0xa2
0012ff78 00417c3d dolphin_host!main+0x234
0012ffc0 7c817077 dolphin_host!__scrt_common_main_seh+0xfa
0012fff0 00000000 kernel32!BaseProcessStart+0x23

27e2eb1e8157c829beeee279f54678f8_000.dmp

Top 2: total counts = 1

07ecf270 65884dcf GdiPlus!GdipCreateFontFamilyFromName+0xa3
WARNING: Stack unwind information not available. Following frames may be wrong.
07ecf294 65894f82 RubBase+0x4dcf
07ecf2dc 65896468 RubBase+0x14f82
07ecf32c 65896c5b RubBase+0x16468
07ecf368 658966f1 RubBase+0x16c5b
07ecf390 6588fffc RubBase+0x166f1
07ecf3e0 76c0c4b7 RubBase+0xfffc
07ecf40c 76c05f77 user32!InternalCallWinProc+0x23
07ecf484 76c04ee6 user32!UserCallWinProcCheckWow+0xe0
07ecf4e0 76bfe95a user32!DispatchClientMessage+0xcf
07ecf510 76fc6b3e user32!__fnINLPCREATESTRUCT+0x8b
07ecf584 76bfeb64 ntdll!KiUserCallbackDispatcher+0x2e
07ecf588 76bfeaf8 user32!NtUserCreateWindowEx+0xc
07ecf82c 76bfec24 user32!VerNtUserCreateWindowEx+0x1a3
07ecf8d8 76bfec7f user32!_CreateWindowEx+0x201
07ecf914 6588bc11 user32!CreateWindowExW+0x33
07ecf9a0 6588afbe RubBase+0xbc11
07ecf9a8 6588af2b RubBase+0xafbe
07ecfa00 6588c0e9 RubBase+0xaf2b
07ecfa50 6588c5ea RubBase+0xc0e9
07ecfa8c 658bf7ff RubBase+0xc5ea
07ecfac8 751fefac RubBase+0x3f7ff
07ecfad4 76fe3618 kernel32!BaseThreadInitThunk+0xe
07ecfb14 76fe35eb ntdll!__RtlUserThreadStart+0x70
07ecfb2c 00000000 ntdll!_RtlUserThreadStart+0x1b

1e49f30b1d0f5624f5e00d29fcac9d5d_000.dmp