Stack dump analysis:
Address: 57E400D0h (EmbeddedBrowserWebView+3300D0h), symbol: "GetHandleVerifier" (+BB560h)
Address: 57BA2189h (EmbeddedBrowserWebView+92189h), symbol: "OQS_SIG_verify" (+47CC9h)
Address: 57CE2715h (EmbeddedBrowserWebView+1D2715h), symbol: "DllCanUnloadNow" (+76AE5h)
Address: 6643CD10h (foo_uie_webview+3CD10h), symbol: "foobar2000_get_interface" (+239E0h)
Address: 57C19057h (EmbeddedBrowserWebView+109057h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+22F17h)
Address: 57EFCDF0h (EmbeddedBrowserWebView+3ECDF0h), symbol: "telemetry_client::IDataFieldVisitor::`vftable'" (+61C80h)
Address: 57BF70B6h (EmbeddedBrowserWebView+E70B6h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+F76h)
Address: 57F2DD90h (EmbeddedBrowserWebView+41DD90h), symbol: "telemetry_client::IDataFieldVisitor::`vftable'" (+92C20h)
Address: 57C18F69h (EmbeddedBrowserWebView+108F69h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+22E29h)
Address: 57C18F0Fh (EmbeddedBrowserWebView+108F0Fh), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+22DCFh)
Address: 57C56635h (EmbeddedBrowserWebView+146635h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+604F5h)
Address: 57C56520h (EmbeddedBrowserWebView+146520h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+603E0h)
Address: 57CEBB09h (EmbeddedBrowserWebView+1DBB09h), symbol: "DllCanUnloadNow" (+7FED9h)
Address: 57CEBAE0h (EmbeddedBrowserWebView+1DBAE0h), symbol: "DllCanUnloadNow" (+7FEB0h)
Address: 57CEBB54h (EmbeddedBrowserWebView+1DBB54h), symbol: "DllCanUnloadNow" (+7FF24h)
Address: 57D06BECh (EmbeddedBrowserWebView+1F6BECh), symbol: "DllCanUnloadNow" (+9AFBCh)
Address: 57C56448h (EmbeddedBrowserWebView+146448h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+60308h)
Address: 57C6E0AFh (EmbeddedBrowserWebView+15E0AFh), symbol: "DllCanUnloadNow" (+247Fh)
Address: 57C6DF9Bh (EmbeddedBrowserWebView+15DF9Bh), symbol: "DllCanUnloadNow" (+236Bh)
Address: 57EAAEACh (EmbeddedBrowserWebView+39AEACh), symbol: "telemetry_client::IDataFieldVisitor::`vftable'" (+FD3Ch)
Address: 57EA9EB2h (EmbeddedBrowserWebView+399EB2h), symbol: "telemetry_client::IDataFieldVisitor::`vftable'" (+ED42h)
Address: 57EA9E61h (EmbeddedBrowserWebView+399E61h), symbol: "telemetry_client::IDataFieldVisitor::`vftable'" (+ECF1h)
Address: 57C56448h (EmbeddedBrowserWebView+146448h), symbol: "telemetry_client::IDataFieldVisitor::IDataFieldVisitor" (+60308h)
Address: 61EF46F0h (foo_vis_vumeter+146F0h), symbol: "foobar2000_get_interface" (+9654h)
Address: 57C6D866h (EmbeddedBrowserWebView+15D866h), symbol: "DllCanUnloadNow" (+1C36h)
Address: 77286BDCh (ntdll+76BDCh), symbol: "NtCallbackReturn" (+Ch)
Address: 766AECB4h (USER32+2ECB4h), symbol: "GetWindowThreadProcessId" (+1F4h)
Address: 57D2CBDBh (EmbeddedBrowserWebView+21CBDBh), symbol: "DllCanUnloadNow" (+C0FABh)
Address: 57C6D830h (EmbeddedBrowserWebView+15D830h), symbol: "DllCanUnloadNow" (+1C00h)
Address: 57C6E144h (EmbeddedBrowserWebView+15E144h), symbol: "DllCanUnloadNow" (+2514h)
Address: 57CEC26Ch (EmbeddedBrowserWebView+1DC26Ch), symbol: "DllCanUnloadNow" (+8063Ch)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 57CEBCF8h (EmbeddedBrowserWebView+1DBCF8h), symbol: "DllCanUnloadNow" (+800C8h)
Address: 57E42650h (EmbeddedBrowserWebView+332650h), symbol: "GetHandleVerifier" (+BDAE0h)
Address: 57F26F48h (EmbeddedBrowserWebView+416F48h), symbol: "telemetry_client::IDataFieldVisitor::`vftable'" (+8BDD8h)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 766B3773h (USER32+33773h), symbol: "Ordinal2713" (+6B3h)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 766A4596h (USER32+24596h), symbol: "CallWindowProcW" (+716h)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 766A424Ah (USER32+2424Ah), symbol: "CallWindowProcW" (+3CAh)
Address: 77286BDCh (ntdll+76BDCh), symbol: "NtCallbackReturn" (+Ch)
Address: 766AECB4h (USER32+2ECB4h), symbol: "GetWindowThreadProcessId" (+1F4h)
Address: 772890D0h (ntdll+790D0h), symbol: "KiUserApcDispatcher" (+70h)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 766B6280h (USER32+36280h), symbol: "WindowFromPoint" (+F40h)
Address: 766A2E55h (USER32+22E55h), symbol: "DispatchMessageW" (+4C5h)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 766ACCC0h (USER32+2CCC0h), symbol: "PeekMessageW" (+0h)
Address: 766ACE89h (USER32+2CE89h), symbol: "PeekMessageW" (+1C9h)
Address: 57CEBCB0h (EmbeddedBrowserWebView+1DBCB0h), symbol: "DllCanUnloadNow" (+80080h)
Address: 766B6280h (USER32+36280h), symbol: "WindowFromPoint" (+F40h)
Address: 766A29A0h (USER32+229A0h), symbol: "DispatchMessageW" (+10h)