Analyzed 3 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
02d4f27c 001f0e08 BrowserBasic+0xdf710
02d4f28c 02f2faa8 0x1f0e08
02d4f2a0 02f2f301 BrowserBasic+0xdfaa8
02d4f2b4 02f232fa BrowserBasic+0xdf301
02d4fc18 02f22297 BrowserBasic+0xd32fa
02d4fe3c 02f1efd7 BrowserBasic+0xd2297
02d4fe44 02f1f828 BrowserBasic+0xcefd7
02d4fe58 02f1ef72 BrowserBasic+0xcf828
02d4fe68 02f1f00f BrowserBasic+0xcef72
02d4fe78 02f1eb77 BrowserBasic+0xcf00f
02d4fe9c 02f1ef96 BrowserBasic+0xceb77
02d4fea4 02f1f845 BrowserBasic+0xcef96
02d4feb0 02f1efb5 BrowserBasic+0xcf845
02d4febc 02f28443 BrowserBasic+0xcefb5
02d4fecc 02e58725 BrowserBasic+0xd8443
02d4fedc 02e582f6 BrowserBasic+0x8725
02d4fee8 02e532a6 BrowserBasic+0x82f6
02d4fef0 02e55335 BrowserBasic+0x32a6
02d4fefc 02e532c5 BrowserBasic+0x5335
02d4ff08 02e59a63 BrowserBasic+0x32c5
02d4ff18 02e58725 BrowserBasic+0x9a63
02d4ff28 02e5901c BrowserBasic+0x8725
02d4ff78 02f41fe3 BrowserBasic+0x901c
02d4ffb4 7c80b729 BrowserBasic+0xf1fe3
02d4ffec 00000000 kernel32!BaseThreadStart+0x37

e45b28708376ab0d2535abeceb53e152_000.dmp

Top 2: total counts = 1

ChildEBP RetAddr  
WARNING: Frame IP not in any known module. Following frames may be wrong.
059cf640 5e706e84 0x157ec085
059cf664 5e7022c6 BrowserBasic!WTL::CMessageLoop::Run+0xb4
059cf888 5e6fefd7 BrowserBasic!CBrowserBasicTrayClient::AsyncStart+0x2e6
059cf890 5e6ff828 BrowserBasic!std::_Invoker_pmf_pointer::_Call+0x17
059cf8a4 5e6fef72 BrowserBasic!std::invoke+0x28
059cf8b4 5e6ff00f BrowserBasic!std::_Invoker_ret::_Call+0x22
059cf8c4 5e6feb77 BrowserBasic!std::_Call_binder,std::tuple<> >+0x2f
059cf8e8 5e6fef96 BrowserBasic!std::_Binder::operator()<>+0x37
059cf8f0 5e6ff845 BrowserBasic!std::_Invoker_functor::_Call &>+0x16
059cf8fc 5e6fefb5 BrowserBasic!std::invoke &>+0x15
059cf908 5e708443 BrowserBasic!std::_Invoker_ret::_Call &>+0x15
059cf918 5e638725 BrowserBasic!std::_Func_impl_no_alloc,void>::_Do_call+0x13
059cf928 5e6382f6 BrowserBasic!std::_Func_class::operator()+0x35
059cf934 5e6332a6 BrowserBasic!::operator()+0x16
059cf93c 5e635335 BrowserBasic!std::_Invoker_functor::_Call< &>+0x16
059cf948 5e6332c5 BrowserBasic!std::invoke< &>+0x15
059cf954 5e639a63 BrowserBasic!std::_Invoker_ret::_Call< &>+0x15
059cf964 5e638725 BrowserBasic!std::_Func_impl_no_alloc<,void>::_Do_call+0x13
059cf974 5e63901c BrowserBasic!std::_Func_class::operator()+0x35
059cf9c4 5e721fe3 BrowserBasic!LdsThread::ThreadProc+0xec
059cfa00 751afa29 BrowserBasic!thread_start+0x57
059cfa10 76f77a9e kernel32!BaseThreadInitThunk+0x19
059cfa6c 76f77a6e ntdll!__RtlUserThreadStart+0x2f
059cfa7c 00000000 ntdll!_RtlUserThreadStart+0x1b

e13c289397fbe829f60969312fb0503a_000.dmp

Top 3: total counts = 1

ChildEBP RetAddr  
004ffea4 00eb7c3d dolphin_host!main+0x1c4
004ffeec 76ab7ba9 dolphin_host!__scrt_common_main_seh+0xfa
004ffefc 77bfc3ab kernel32!BaseThreadInitThunk+0x19
004fff54 77bfc32f ntdll!__RtlUserThreadStart+0x2b
004fff64 00000000 ntdll!_RtlUserThreadStart+0x1b

be0b32f96acb8a07ddcca42cfb169231_000.dmp