Crash in brobasic, Analyzed 5 dumps, total processed 117, rate equals 4.27%
Top 1: Version = 1.8425.1000.117, Total count = 5
dump count = 1
ChildEBP RetAddr
0486ede0 7641d259 ole32!CComApartment::InitRemoting+0xf6
0486edec 765306fe ole32!CComApartment::StartServer+0x13
0486edfc 764125b3 ole32!InitChannelIfNecessary+0x1e
0486ee04 7652df51 ole32!CoGetPSClsid+0xa
0486ee40 7641f954 ole32!NdrpCreateProxy+0x2f
0486ee64 76bff57c ole32!CreateProxyFromTypeInfo+0xb5
0486ee90 76bfe6e9 oleaut32!CPSFactory::QueryInterface+0x100
0486eeb8 7641fc39 oleaut32!CProxyWrapper::Connect+0x5c
0486eee8 7641fad2 ole32!CStdMarshal::ConnectCliIPIDEntry+0x157
0486ef18 7641fa3e ole32!CStdMarshal::MakeCliIPIDEntry+0x91
0486ef44 7641ffa5 ole32!CStdMarshal::UnmarshalIPID+0x66
0486efb4 764220f9 ole32!CStdMarshal::UnmarshalObjRef+0x113
0486efcc 764220c4 ole32!UnmarshalSwitch+0x25
0486f000 7641f085 ole32!UnmarshalObjRef+0x9f
0486f08c 72d12e0b ole32!CoUnmarshalInterface+0xf3
0486f0ac 72d12f9d oleacc!UnmarshalInterface+0x75
0486f0e4 72d12e5a oleacc!FreeUpSlot+0x1e2
0486f100 72d13460 oleacc!ObjectFromLresult+0x3f
0486f120 72d12b99 oleacc!NativeIAccessibleFromWindow+0x82
0486f13c 72d12ac3 oleacc!ORIGINAL_AccessibleObjectFromWindow+0x18
0486f160 72d17c05 oleacc!AccessibleObjectFromWindow+0x1a
0486f184 72d156f8 oleacc!CWindow::get_accName+0x4b
0486f1ac 72d152ce oleacc!AccWrap_Base::get_accName+0x22
0486f1e4 04e4c728 oleacc!AccWrap_Annotate::get_accName+0x59
0486f310 04e4b822 BroBasic!BrowserChromeBaseImpl::initUrlInfo+0xb8
0486f464 04e54f4c BroBasic!BrowserChromeBaseImpl::GetEventInfo+0x202
0486f8f0 04ee69e7 BroBasic!BrowserMgrImpl::BrowserEventProc+0x73c
0486f918 74f12eef BroBasic!WinEventProc+0x57
0486f948 76e36ace user32!__ClientCallWinEventProc+0x2a
0486f97c 74f1cbd0 ntdll!KiUserCallbackDispatcher+0x2e
0486f980 74f1cc03 user32!NtUserGetMessage+0xc
0486f99c 04ee2b99 user32!GetMessageW+0x33
0486faf0 04e3e073 BroBasic!CBrowserBasicTrayClient::AsyncStart+0x489
0486fb44 04f26a13 BroBasic!LdsThread::ThreadProc+0x123
0486fb80 7565ef3c BroBasic!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0486fb8c 76e5360c kernel32!BaseThreadInitThunk+0xe
0486fbcc 76e535df ntdll!__RtlUserThreadStart+0x70
0486fbe4 00000000 ntdll!_RtlUserThreadStart+0x1b
801870f5b30d86502207fe949b3388c2_001.dmp
dump count = 1
ChildEBP RetAddr
WARNING: Frame IP not in any known module. Following frames may be wrong.
0a85e184 76aaaf79 0x0
0a85e1fc 76aaa546 ole32!CStdMarshal::DisconnectCliIPIDs+0x33e
0a85e22c 76a94997 ole32!CStdMarshal::Disconnect+0x1ba
0a85e240 76aa0024 ole32!CStdMarshal::HandlePendingDisconnect+0x4d
0a85e2a4 76aa2139 ole32!CStdMarshal::UnmarshalObjRef+0x176
0a85e2bc 76aa2104 ole32!UnmarshalSwitch+0x25
0a85e2f0 76a9f0e5 ole32!UnmarshalObjRef+0x9f
0a85e37c 6eae2e0b ole32!CoUnmarshalInterface+0xf3
0a85e39c 6eae2f9d oleacc!UnmarshalInterface+0x75
0a85e3d4 6eae2e5a oleacc!FreeUpSlot+0x1e2
0a85e3f0 6eae3460 oleacc!ObjectFromLresult+0x3f
0a85e410 6eae2b99 oleacc!NativeIAccessibleFromWindow+0x82
0a85e42c 6eae2ac3 oleacc!ORIGINAL_AccessibleObjectFromWindow+0x18
0a85e450 60198cfa oleacc!AccessibleObjectFromWindow+0x1a
0a85e470 6019bddf uiautomationcore!GetIAccessibleForHwnd+0x1f
0a85e4a4 601b1a4c uiautomationcore!CreateMsaaProxy+0x2c
0a85e4c0 601b19ee uiautomationcore!CreateOutOfProcMsaaProxy+0x18
0a85e4d8 601b231d uiautomationcore!CBuiltinProxyFactory::CreateProvider+0x21
0a85eb80 601b24bf uiautomationcore!ClientProxyManager::InternalGetProxyProvider+0x2e6
0a85ebb4 60164e96 uiautomationcore!ClientProxyManager::GetProxyProvider+0x4a
0a85ebf4 6015a748 uiautomationcore!UiaNodeFactory::GetOverrideProviderForHwnd+0x4d
0a85ec34 6015ad44 uiautomationcore!UiaNodeFactory::CompleteNodeInfo+0x281
0a85ec50 6015aad2 uiautomationcore!UiaNodeFactory::FromPartialNodeInfo+0x18
0a85eca0 601a0e7e uiautomationcore!UiaNodeFactory::FromHwnd+0x2a
0a85ecd8 0a08cbdc uiautomationcore!CUIAutomation::ElementFromHandle+0xb5
0a85eec0 0a08c397 BroBasic!BrowserChromeBaseImpl::initUrlPattern+0x18c
0a85f08c 0a08af69 BroBasic!BrowserChromeBaseImpl::getUrl+0x267
0a85f6c4 0a093d2a BroBasic!BrowserChromeBaseImpl::EventProc+0x5c9
0a85f8f0 0a07e073 BroBasic!<lambda_63e9dbefc06103dbcacee24e5f435956>::operator()+0x5ba
0a85f944 0a166a13 BroBasic!LdsThread::ThreadProc+0x123
0a85f980 774b344d BroBasic!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0a85f98c 77c29802 kernel32!BaseThreadInitThunk+0xe
0a85f9cc 77c297d5 ntdll!__RtlUserThreadStart+0x70
0a85f9e4 00000000 ntdll!_RtlUserThreadStart+0x1b
9c308195838a08a0dfeb0c527a6ae116_000.dmp
dump count = 1
ChildEBP RetAddr
0a2ff8fc 77aeeaba ntdll!RtlpWaitOnCriticalSection+0xbd
0a2ff924 0f873807 ntdll!RtlEnterCriticalSection+0x150
0a2ffb40 0f85e073 BroBasic!<lambda_63e9dbefc06103dbcacee24e5f435956>::operator()+0x97
0a2ffb94 0f946a13 BroBasic!LdsThread::ThreadProc+0x123
0a2ffbd0 75cd344d BroBasic!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0a2ffbdc 77ad9802 kernel32!BaseThreadInitThunk+0xe
0a2ffc1c 77ad97d5 ntdll!__RtlUserThreadStart+0x70
0a2ffc34 00000000 ntdll!_RtlUserThreadStart+0x1b
6542e3e206444b62459a68b6eac5d9b0_005.dmp
dump count = 1
ChildEBP RetAddr
04a6fb60 77c701aa ntdll!RtlpWaitOnCriticalSection+0x93
04a6fb98 77c6fff9 ntdll!RtlpEnterCriticalSectionContended+0x1aa
04a6fba4 79023807 ntdll!RtlEnterCriticalSection+0x49
04a6fdc0 7900e073 BroBasic!<lambda_63e9dbefc06103dbcacee24e5f435956>::operator()+0x97
04a6fe14 790f6a13 BroBasic!LdsThread::ThreadProc+0x123
04a6fe50 776600f9 BroBasic!thread_start<unsigned int (__stdcall*)(void *)>+0x57
04a6fe60 77c97bbe kernel32!BaseThreadInitThunk+0x19
04a6febc 77c97b8e ntdll!__RtlUserThreadStart+0x2f
04a6fecc 00000000 ntdll!_RtlUserThreadStart+0x1b
a2c8bd4546f6fc23c8a7c2f5f906f04b_000.dmp
dump count = 1
ChildEBP RetAddr
0b6bfbf4 7716eaba ntdll!RtlpWaitOnCriticalSection+0x210
0b6bfc1c 598a3807 ntdll!RtlEnterCriticalSection+0x150
0b6bfe38 5988e073 BroBasic!<lambda_63e9dbefc06103dbcacee24e5f435956>::operator()+0x97
0b6bfe8c 59976a13 BroBasic!LdsThread::ThreadProc+0x123
0b6bfec8 7668344d BroBasic!thread_start<unsigned int (__stdcall*)(void *)>+0x57
0b6bfed4 77159802 kernel32!BaseThreadInitThunk+0xe
0b6bff14 771597d5 ntdll!__RtlUserThreadStart+0x70
0b6bff2c 00000000 ntdll!_RtlUserThreadStart+0x1b
3537fbb4e3e51da2f9c3166f9e9dc286_000.dmp