I hadn't checked in a while, but there seem to be lots of mod_mbox cores on ajax again. Here's one backtrace:
#0 mbox_cte_escape_html (p=0x6000000000343ca8, s=0x60000000002f5a68 "------_=_NextPart_001_01C3C08D.F854E1E0\nContent-Type: text/html;Content-Transfer-Encoding: quoted-printable\n\n<html xmlns:o=3D\"urn:schemas-microsoft-com:office:office\" =\nxmlns:w=3D\"urn:schemas-microsof"..., len=18446744073709551614, body=0x60000000006f0f88) at mod_mbox_cte.c:82 #1 0x2000000001025620 in mbox_mime_get_body (p=0x6000000000343ca8, m=0x60000000006f0f88) at mod_mbox_mime.c:331 #2 0x2000000001021520 in mbox_static_message (r=0x6000000000343d18, f=0x60000000003590a8) at mod_mbox_out.c:1186 #3 0x200000000101cbc0 in mbox_file_handler (r=0x6000000000343d18) at mod_mbox_file.c:241 #4 0x400000000004cff0 in ap_run_handler (r=0x6000000000343d18) at config.c:158