Advertisement
Guest User

darksoulslog

a guest
Apr 1st, 2021
296
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 67.63 KB | None | 0 0
  1. ======================
  2. Proton: 1612904805 proton-5.13-6
  3. SteamGameId: 570940
  4. Command: ['/media/Games/Steam/steamapps/common/DARK SOULS REMASTERED/DarkSoulsRemastered.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
  7. pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
  8. soldier: 0.20210309.0 soldier 0.20210309.0
  9. ======================
  10. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  12. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  13. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. esync: up and running.
  15. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. 360.800:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  17. 360.801:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 360.801:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  19. 360.802:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  20. 360.802:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  21. 360.808:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F32AD170000: builtin
  22. 360.808:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  23. 360.808:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F32AD390000: builtin
  24. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  25. 360.938:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  26. 360.939:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  27. 360.939:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  28. 360.939:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  29. 360.939:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 360.941:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FA42ACC0000: builtin
  31. 360.941:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  32. 360.941:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FA42AED0000: builtin
  33. 360.942:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  34. 360.943:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  35. 360.943:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  36. 360.944:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  37. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  38. 361.003:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  39. 361.005:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  40. 361.005:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  41. 361.006:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  42. 361.006:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  43. 361.009:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F5C2F320000: builtin
  44. 361.009:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  45. 361.009:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F5C2F530000: builtin
  46. 361.010:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  47. 361.013:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  48. 361.013:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  49. 361.014:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F5C2EEC0000: builtin
  50. 361.014:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F5C2F070000: builtin
  51. 361.543:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  52. 361.543:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  53. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  54. 361.565:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  55. 361.566:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 361.566:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  57. 361.567:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  58. 361.567:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  59. 361.569:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F7576970000: builtin
  60. 361.569:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  61. 361.569:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F7576B80000: builtin
  62. 361.571:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F7576870000: builtin
  63. 361.571:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  64. 361.587:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  65. 361.601:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  66. 361.609:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F7576810000: builtin
  67. 361.611:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  68. 361.611:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  69. 361.614:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  70. 361.622:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  71. 361.622:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  72. 361.624:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  73. 361.626:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F75763A0000: builtin
  74. 361.626:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F7576560000: builtin
  75. 361.701:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  76. 361.702:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  77. 361.703:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  78. 361.749:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F7574830000: builtin
  79. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  80. 361.788:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  81. 361.789:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  82. 361.789:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  83. 361.790:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  84. 361.790:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
  85. 361.792:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F6BA6320000: builtin
  86. 361.792:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  87. 361.793:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F6BA6540000: builtin
  88. 361.794:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F6BA6230000: builtin
  89. 361.794:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  90. 361.808:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  91. 361.812:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  92. 361.816:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F6BA61D0000: builtin
  93. 361.827:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  94. 361.827:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  95. 361.829:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F6BA5B00000: builtin
  96. 361.829:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F6BA5CC0000: builtin
  97. 361.830:0088:0098:trace:seh:NtQueryInformationThread (0x64,0,0xe8f750,30,(nil))
  98. 361.835:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F32AC550000: builtin
  99. 361.836:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  100. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  101. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  102. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F32AC2C0000: builtin
  103. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  104. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  105. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  106. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F32AC700000: builtin
  107. 361.932:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  108. 361.932:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  109. 361.999:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  110. 362.003:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  111. 362.005:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  112. 362.005:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  113. 362.007:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EB00000: builtin
  114. 362.011:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E950000: builtin
  115. 362.011:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  116. 362.011:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA40000: builtin
  117. 362.013:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7E0000: builtin
  118. 362.014:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  119. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  120. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  121. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E5B0000: builtin
  122. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  123. 362.029:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  124. 362.029:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  125. 362.029:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DBA0000: builtin
  126. 362.398:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  127. 362.409:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  128. 362.410:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  129. 362.410:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  130. 362.411:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  131. 362.411:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
  132. 362.415:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F55EAA40000: builtin
  133. 362.415:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  134. 362.415:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F55EAC60000: builtin
  135. 362.416:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F55EA880000: builtin
  136. 362.417:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  137. 362.420:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  138. 362.420:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  139. 362.420:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F55EA5F0000: builtin
  140. Setting breakpad minidump AppID = 570940
  141. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
  142. 362.538:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  143. 362.538:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  144. 362.547:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F55EA2C0000: builtin
  145. 362.669:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  146. 362.670:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  147. 362.670:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  148. 362.670:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  149. 362.670:00b4:00b8:trace:seh:check_bpf_jit_enable enabled 0x31.
  150. 362.672:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  151. 362.672:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  152. 362.672:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F55E83A0000: builtin
  153. 362.672:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FD842950000: builtin
  154. 362.672:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  155. 362.673:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FD842B70000: builtin
  156. 362.673:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FD842790000: builtin
  157. 362.673:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  158. 362.675:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  159. 362.675:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  160. 362.675:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FD842500000: builtin
  161. 362.677:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  162. 362.677:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  163. 362.678:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5D60000: builtin
  164. 362.765:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  165. 362.765:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  166. 362.769:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FD8421D0000: builtin
  167. 362.787:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  168. 362.788:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  169. 362.788:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FD840DA0000: builtin
  170. 362.792:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  171. 362.792:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  172. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  173. 362.847:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  174. 362.849:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  175. 362.849:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  176. 363.264:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe" at 0000000140000000: native
  177. 363.264:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
  178. 363.304:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F96C50C0000: builtin
  179. 363.304:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  180. 363.304:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 00007F96C52D0000: builtin
  181. 363.317:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F96C44B0000: builtin
  182. 363.321:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  183. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  184. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  185. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F96C4220000: builtin
  186. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  187. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  188. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  189. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007F96C4660000: builtin
  190. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\steam_api64.dll" at 000000003B400000: native
  191. 363.360:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
  192. 363.360:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
  193. 363.360:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
  194. 363.360:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000021e0c0 rdx=00000000ffffffff
  195. 363.360:00cc:00d0:trace:seh:dispatch_exception rsi=000000000021e750 rdi=0000000000000000 rbp=000000000021e498 rsp=000000000021e080
  196. 363.360:00cc:00d0:trace:seh:dispatch_exception r8=000000000021e498 r9=000000000021e4e0 r10=0000000000000000 r11=0000000000000246
  197. 363.360:00cc:00d0:trace:seh:dispatch_exception r12=00000000000161b8 r13=000000000021e4b0 r14=000000000021e4c0 r15=000000000021e498
  198. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 21e080
  199. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  200. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  201. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  202. 363.360:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000021E0A0 rsp 21e1e0 handler 000000007BC6D250
  203. 363.360:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000021DF40, frame=000000000021E0A0 context=000000000021D4A0, dispatch=000000000021D370)
  204. 363.360:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000021E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  205. 363.360:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
  206. 363.360:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
  207. 363.360:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000021e0a0 rcx=000000000021cd90 rdx=000000007bc6d126
  208. 363.360:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000021da50 rdi=000000000021d4a0 rbp=000000000021c840 rsp=000000000021c6c0
  209. 363.360:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000021df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  210. 363.360:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000021df40 r13=000000000021cd90 r14=000000007bc7f352 r15=000000000021df40
  211. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 21c6c0
  212. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
  213. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  214. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  215. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  216. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  217. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  218. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  219. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  220. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  221. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  222. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  223. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 21cd60
  224. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
  225. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  226. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  227. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 21d270
  228. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
  229. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  230. 363.360:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  231. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  232. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  233. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
  234. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 21d2a0
  235. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
  236. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  237. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  238. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 21d2d0
  239. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
  240. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  241. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  242. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 21d300
  243. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
  244. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  245. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  246. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  247. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  248. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  249. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  250. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  251. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  252. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  253. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  254. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 21d9c0
  255. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
  256. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  257. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  258. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
  259. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
  260. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  261. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  262. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
  263. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
  264. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
  265. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 21da50
  266. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
  267. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  268. 363.360:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  269. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  270. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  271. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  272. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  273. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 21e080
  274. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  275. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  276. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  277. 363.360:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 21e080
  278. 363.360:00cc:00d0:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe") failed (error c000007b).
  279. 363.392:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\opengl32.dll" at 000000007A850000: builtin
  280. 363.392:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wined3d.dll" at 00007F96C4020000: builtin
  281. 363.392:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00007F96C41C0000: builtin
  282. 363.394:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F96C3F30000: builtin
  283. 363.412:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
  284. 363.412:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
  285. 363.412:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
  286. 363.412:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000021d840 rdx=00000000ffffffff
  287. 363.412:00cc:00d0:trace:seh:dispatch_exception rsi=000000000021ded0 rdi=0000000000000000 rbp=000000000021dc18 rsp=000000000021d800
  288. 363.412:00cc:00d0:trace:seh:dispatch_exception r8=000000000021dc18 r9=000000000021dc60 r10=0000000000000000 r11=0000000000000246
  289. 363.412:00cc:00d0:trace:seh:dispatch_exception r12=00000000000161b8 r13=000000000021dc30 r14=000000000021dc40 r15=000000000021dc18
  290. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 21d800
  291. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  292. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  293. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  294. 363.412:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000021D820 rsp 21d960 handler 000000007BC6D250
  295. 363.412:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000021D6C0, frame=000000000021D820 context=000000000021CC20, dispatch=000000000021CAF0)
  296. 363.412:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000021D820 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  297. 363.412:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
  298. 363.412:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
  299. 363.412:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000021d820 rcx=000000000021c510 rdx=000000007bc6d126
  300. 363.412:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000021d1d0 rdi=000000000021cc20 rbp=000000000021bfc0 rsp=000000000021be40
  301. 363.412:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000021d6c0 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  302. 363.412:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000021d6c0 r13=000000000021c510 r14=000000007bc7f352 r15=000000000021d6c0
  303. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 21be40
  304. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
  305. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  306. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  307. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  308. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  309. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  310. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  311. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  312. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  313. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  314. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  315. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 21c4e0
  316. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
  317. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  318. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  319. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 21c9f0
  320. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
  321. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  322. 363.412:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  323. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  324. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  325. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
  326. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 21ca20
  327. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
  328. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  329. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  330. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 21ca50
  331. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
  332. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  333. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  334. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 21ca80
  335. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
  336. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  337. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  338. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  339. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  340. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  341. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  342. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  343. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  344. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  345. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  346. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 21d140
  347. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
  348. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  349. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  350. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
  351. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
  352. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  353. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  354. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
  355. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
  356. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
  357. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 21d1d0
  358. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
  359. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  360. 363.412:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  361. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  362. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  363. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  364. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  365. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 21d800
  366. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  367. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  368. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  369. 363.412:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 21d800
  370. 363.412:00cc:00d0:err:module:import_dll Loading library vulkan-1.dll (which is needed by L"C:\\windows\\system32\\d3d11.dll") failed (error c000007b).
  371. 363.412:00cc:00d0:err:module:import_dll Library d3d11.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe") not found
  372. 363.417:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 00007F96C3EE0000: builtin
  373. 363.419:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 00007F96C3EA0000: builtin
  374. 363.455:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WSOCK32.dll" at 000000006C0C0000: builtin
  375. 363.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
  376. 363.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000000637C0000: builtin
  377. 363.460:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\fmodex64.dll" at 0000000180000000: native
  378. 363.463:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\fmod_event64.dll" at 0000000000220000: native
  379. 363.490:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\binkw64.dll" at 00000000002B0000: native
  380. 363.502:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000063140000: builtin
  381. 363.505:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 00000000003C0000: builtin
  382. 363.507:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000006DD80000: builtin
  383. 363.509:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 0000000069380000: builtin
  384. 363.511:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 000000006D580000: builtin
  385. 363.511:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 00000000003A0000: native
  386. 363.513:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000061540000: builtin
  387. 363.515:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 00000000620C0000: builtin
  388. 363.517:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 0000000068AC0000: builtin
  389. 363.519:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000069B80000: builtin
  390. 363.522:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000070580000: builtin
  391. 363.543:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 00000000003D0000: builtin
  392. 363.543:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0000000000300000: native
  393. 363.584:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  394. 363.585:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
  395. 363.586:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 000000006E6C0000: builtin
  396. 363.587:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  397. 363.587:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007F96C3E10000: builtin
  398. 363.590:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
  399. 363.592:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-multibyte-l1-1-0.dll" at 0000000062C40000: builtin
  400. 363.592:00cc:00d0:err:module:LdrInitializeThunk Importing dlls for L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe" failed, status c0000135
  401. 364.612:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  402. 364.612:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  403. 364.612:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  404. 364.614:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  405. 364.614:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  406. 364.614:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  407. 364.614:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000095788 r11=0000000000e8ecd8
  408. 364.614:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005e350 r14=0000000000000000 r15=00000000ffba0000
  409. 364.614:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  410. 364.614:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  411. 364.614:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  412. 364.614:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  413. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  414. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  415. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  416. 364.614:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  417. 364.614:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  418. 364.614:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  419. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  420. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  421. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  422. 364.614:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  423. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  424. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  425. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  426. 364.614:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  427. 364.614:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  428. 364.614:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  429. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  430. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  431. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  432. 364.614:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  433. 364.614:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  434. 364.614:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  435. 364.614:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  436. 364.614:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  437. 364.614:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  438. 364.614:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  439. 364.614:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  440. 364.614:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  441. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  442. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  443. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  444. 364.614:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  445. 364.614:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  446. 364.614:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  447. 364.614:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  448. 364.614:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  449. 364.614:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  450. 364.614:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  451. 364.614:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  452. 364.614:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  453. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  454. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  455. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  456. 364.614:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  457. 364.614:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  458. 364.614:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  459. 364.614:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  460. 364.614:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  461. 364.614:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  462. 364.614:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  463. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  464. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  465. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  466. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  467. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  468. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  469. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  470. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  471. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  472. 364.615:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  473. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  474. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  475. 364.615:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  476. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  477. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  478. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  479. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  480. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  481. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  482. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  483. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  484. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  485. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  486. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  487. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  488. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  489. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  490. 364.615:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  491. 364.615:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  492. 364.615:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  493. 364.615:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  494. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  495. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  496. 364.615:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  497. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  498. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  499. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  500. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  501. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  502. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  503. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  504. 364.615:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  505. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  506. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  507. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  508. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  509. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  510. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  511. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  512. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  513. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  514. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  515. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  516. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  517. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  518. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  519. 364.615:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  520. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  521. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  522. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  523. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  524. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  525. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  526. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  527. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  528. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  529. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  530. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  531. 364.615:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  532. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  533. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  534. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  535. 364.615:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  536. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  537. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  538. 364.615:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  539. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  540. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  541. 364.615:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  542. 364.615:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  543. 364.615:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  544. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  545. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  546. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  547. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  548. 364.615:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  549. 364.615:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  550. 364.615:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  551. 364.615:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  552. 364.615:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  553. 364.615:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a730 rbp=0000000000000000 rsp=0000000000e8eea0
  554. 364.615:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000103c8 r11=0000000000e8ef18
  555. 364.615:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000095650 r14=0000000000000000 r15=00000000ffba0000
  556. 364.615:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  557. 364.615:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  558. 364.615:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  559. 364.615:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  560. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  561. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  562. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  563. 364.615:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  564. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  565. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  566. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  567. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  568. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  569. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  570. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  571. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  572. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  573. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  574. 364.616:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  575. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  576. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  577. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  578. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  579. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  580. 364.616:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  581. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  582. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  583. 364.616:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  584. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  585. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  586. 364.616:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  587. 364.616:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  588. 364.616:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  589. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  590. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  591. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  592. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  593. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  594. 364.616:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  595. 364.616:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  596. 364.616:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  597. 364.616:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  598. 364.616:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  599. 364.616:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  600. 364.616:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  601. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  602. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  603. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  604. 364.616:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  605. 364.616:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  606. 364.616:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  607. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  608. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  609. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  610. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  611. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  612. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  613. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  614. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  615. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  616. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  617. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  618. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  619. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  620. 364.616:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  621. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  622. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  623. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  624. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  625. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  626. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  627. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  628. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  629. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  630. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  631. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  632. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  633. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  634. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  635. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  636. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  637. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  638. 364.616:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  639. 364.616:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  640. 364.616:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  641. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  642. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  643. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  644. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  645. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  646. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  647. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  648. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  649. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  650. 364.616:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  651. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  652. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  653. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  654. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  655. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  656. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  657. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  658. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  659. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  660. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  661. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  662. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  663. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  664. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  665. 364.616:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  666. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  667. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  668. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  669. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  670. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  671. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  672. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  673. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  674. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  675. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  676. 364.616:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  677. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  678. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  679. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  680. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  681. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  682. 364.616:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  683. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  684. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  685. 364.616:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  686. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  687. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  688. 364.616:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  689. 364.616:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  690. 364.616:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  691. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  692. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  693. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  694. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  695. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  696. 364.616:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  697. 364.616:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  698. 364.617:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  699. 364.617:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  700. 364.619:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  701. 364.620:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  702. 364.622:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  703. 364.622:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  704. 364.624:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  705. 364.717:0030:00dc:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1d0fda0,4,(nil))
  706. 364.717:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  707. 364.718:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  708. 364.718:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  709. 364.718:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  710. pid 6461 != 6460, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement