Analyzed 2 dump

Top 1: total counts = 1

ChildEBP RetAddr  
WARNING: Stack unwind information not available. Following frames may be wrong.
12fdddd4 1042bcc0 KERNELBASE!RaiseException+0x60
12fdde18 1039ae93 ppromotion+0xdbcc0
12fdde34 1038d13f ppromotion+0x4ae93
12fde160 1038b41c ppromotion+0x3d13f
12fde21c 1038c087 ppromotion+0x3b41c
12fde2dc 103917f0 ppromotion+0x3c087
12fde448 103921ab ppromotion+0x417f0
12fde630 10391e8d ppromotion+0x421ab
12fde750 1035b75f ppromotion+0x41e8d
12fde804 1035b222 ppromotion+0xb75f
12fdea30 1035a2d4 ppromotion+0xb222
12fdee4c 103a94c1 ppromotion+0xa2d4
12fdee6c 7625202b ppromotion+0x594c1
12fdee98 7622de58 user32!_InternalCallWinProc+0x2b
12fdeec0 76178620 user32!#_InternalCallWinProc$push_thunk+0x58
12fdef20 76177f94 user32!UserCallWinProcCheckWow+0x600
12fdf030 76226ca4 user32!#DispatchClientMessage+0x164
12fdf140 76cfaddd user32!DispatchClientMessage$pop_thunk+0x28
12fdf150 76cfaddd ntdll!KiUserCallbackDispatcher+0x4d
12fdf1d4 6f88326c ntdll!KiUserCallbackDispatcher+0x4d
12fdf1d8 7622ad90 win32u!NtUserCreateWindowEx+0xc
12fdf220 00000000 user32!$push_thunk$stdcall$u$uuuuuuuuuuuuuuuuu+0x90

3fa79b2a353c5ca936908d420cec85f4_000.dmp

Top 2: total counts = 1

0460f034 72653580 oleacc!AccWrap_Annotate::get_accName+0x59
0460f194 7265cc0d BrowserBasic!BrowserChromeBaseImpl::GetEventInfo+0xf0
0460f61c 726ec987 BrowserBasic!BrowserMgrImpl::BrowserEventProc+0x6ed
0460f644 77b54454 BrowserBasic!WinEventProc+0x57
0460f674 77d96ace user32!__ClientCallWinEventProc+0x2a
0460f6a8 77b58f8f ntdll!KiUserCallbackDispatcher+0x2e
0460f6ac 77b58fc2 user32!NtUserGetMessage+0xc
0460f6c8 726e9ae9 user32!GetMessageW+0x33
0460f808 72646583 BrowserBasic!CBrowserBasicTrayClient::AsyncStart+0x3e9
0460f85c 727046e3 BrowserBasic!LdsThread::ThreadProc+0x123
0460f898 77efef3c BrowserBasic!thread_start+0x57
0460f8a4 77db360c kernel32!BaseThreadInitThunk+0xe
0460f8e4 77db35df ntdll!__RtlUserThreadStart+0x70
0460f8fc 00000000 ntdll!_RtlUserThreadStart+0x1b

0397510ba004e958535f6e0e881fcc5e_000.dmp