Guest User

darksoulslog

a guest
Apr 1st, 2021
165
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ======================
  2. Proton: 1612904805 proton-5.13-6
  3. SteamGameId: 570940
  4. Command: ['/media/Games/Steam/steamapps/common/DARK SOULS REMASTERED/DarkSoulsRemastered.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
  7. pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
  8. soldier: 0.20210309.0 soldier 0.20210309.0
  9. ======================
  10. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  12. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  13. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. esync: up and running.
  15. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. 360.800:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  17. 360.801:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 360.801:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  19. 360.802:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  20. 360.802:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  21. 360.808:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F32AD170000: builtin
  22. 360.808:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  23. 360.808:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F32AD390000: builtin
  24. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  25. 360.938:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  26. 360.939:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  27. 360.939:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  28. 360.939:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  29. 360.939:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 360.941:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FA42ACC0000: builtin
  31. 360.941:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  32. 360.941:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FA42AED0000: builtin
  33. 360.942:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  34. 360.943:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  35. 360.943:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  36. 360.944:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  37. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  38. 361.003:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  39. 361.005:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  40. 361.005:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  41. 361.006:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  42. 361.006:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  43. 361.009:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F5C2F320000: builtin
  44. 361.009:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  45. 361.009:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F5C2F530000: builtin
  46. 361.010:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  47. 361.013:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  48. 361.013:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  49. 361.014:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F5C2EEC0000: builtin
  50. 361.014:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F5C2F070000: builtin
  51. 361.543:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  52. 361.543:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  53. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  54. 361.565:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  55. 361.566:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 361.566:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  57. 361.567:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  58. 361.567:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  59. 361.569:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F7576970000: builtin
  60. 361.569:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  61. 361.569:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F7576B80000: builtin
  62. 361.571:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F7576870000: builtin
  63. 361.571:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  64. 361.587:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  65. 361.601:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  66. 361.609:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F7576810000: builtin
  67. 361.611:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  68. 361.611:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  69. 361.614:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  70. 361.622:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  71. 361.622:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  72. 361.624:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  73. 361.626:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F75763A0000: builtin
  74. 361.626:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F7576560000: builtin
  75. 361.701:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  76. 361.702:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  77. 361.703:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  78. 361.749:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F7574830000: builtin
  79. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  80. 361.788:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  81. 361.789:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  82. 361.789:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  83. 361.790:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  84. 361.790:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
  85. 361.792:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F6BA6320000: builtin
  86. 361.792:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  87. 361.793:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F6BA6540000: builtin
  88. 361.794:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F6BA6230000: builtin
  89. 361.794:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  90. 361.808:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  91. 361.812:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  92. 361.816:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F6BA61D0000: builtin
  93. 361.827:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  94. 361.827:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  95. 361.829:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F6BA5B00000: builtin
  96. 361.829:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F6BA5CC0000: builtin
  97. 361.830:0088:0098:trace:seh:NtQueryInformationThread (0x64,0,0xe8f750,30,(nil))
  98. 361.835:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F32AC550000: builtin
  99. 361.836:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  100. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  101. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  102. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F32AC2C0000: builtin
  103. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  104. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  105. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  106. 361.838:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F32AC700000: builtin
  107. 361.932:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  108. 361.932:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  109. 361.999:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  110. 362.003:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  111. 362.005:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  112. 362.005:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  113. 362.007:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EB00000: builtin
  114. 362.011:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E950000: builtin
  115. 362.011:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  116. 362.011:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA40000: builtin
  117. 362.013:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7E0000: builtin
  118. 362.014:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  119. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  120. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  121. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E5B0000: builtin
  122. 362.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  123. 362.029:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  124. 362.029:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  125. 362.029:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DBA0000: builtin
  126. 362.398:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  127. 362.409:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  128. 362.410:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  129. 362.410:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  130. 362.411:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  131. 362.411:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
  132. 362.415:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F55EAA40000: builtin
  133. 362.415:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  134. 362.415:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F55EAC60000: builtin
  135. 362.416:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F55EA880000: builtin
  136. 362.417:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  137. 362.420:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  138. 362.420:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  139. 362.420:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F55EA5F0000: builtin
  140. Setting breakpad minidump AppID = 570940
  141. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
  142. 362.538:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  143. 362.538:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  144. 362.547:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F55EA2C0000: builtin
  145. 362.669:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  146. 362.670:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  147. 362.670:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  148. 362.670:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  149. 362.670:00b4:00b8:trace:seh:check_bpf_jit_enable enabled 0x31.
  150. 362.672:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  151. 362.672:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  152. 362.672:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F55E83A0000: builtin
  153. 362.672:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FD842950000: builtin
  154. 362.672:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  155. 362.673:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FD842B70000: builtin
  156. 362.673:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FD842790000: builtin
  157. 362.673:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  158. 362.675:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  159. 362.675:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  160. 362.675:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FD842500000: builtin
  161. 362.677:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  162. 362.677:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  163. 362.678:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5D60000: builtin
  164. 362.765:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  165. 362.765:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  166. 362.769:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FD8421D0000: builtin
  167. 362.787:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  168. 362.788:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  169. 362.788:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FD840DA0000: builtin
  170. 362.792:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  171. 362.792:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  172. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  173. 362.847:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  174. 362.849:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  175. 362.849:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  176. 363.264:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe" at 0000000140000000: native
  177. 363.264:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
  178. 363.304:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F96C50C0000: builtin
  179. 363.304:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  180. 363.304:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 00007F96C52D0000: builtin
  181. 363.317:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F96C44B0000: builtin
  182. 363.321:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  183. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  184. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  185. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F96C4220000: builtin
  186. 363.326:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  187. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  188. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  189. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007F96C4660000: builtin
  190. 363.327:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\steam_api64.dll" at 000000003B400000: native
  191. 363.360:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
  192. 363.360:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
  193. 363.360:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
  194. 363.360:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000021e0c0 rdx=00000000ffffffff
  195. 363.360:00cc:00d0:trace:seh:dispatch_exception rsi=000000000021e750 rdi=0000000000000000 rbp=000000000021e498 rsp=000000000021e080
  196. 363.360:00cc:00d0:trace:seh:dispatch_exception r8=000000000021e498 r9=000000000021e4e0 r10=0000000000000000 r11=0000000000000246
  197. 363.360:00cc:00d0:trace:seh:dispatch_exception r12=00000000000161b8 r13=000000000021e4b0 r14=000000000021e4c0 r15=000000000021e498
  198. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 21e080
  199. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  200. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  201. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  202. 363.360:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000021E0A0 rsp 21e1e0 handler 000000007BC6D250
  203. 363.360:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000021DF40, frame=000000000021E0A0 context=000000000021D4A0, dispatch=000000000021D370)
  204. 363.360:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000021E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  205. 363.360:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
  206. 363.360:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
  207. 363.360:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000021e0a0 rcx=000000000021cd90 rdx=000000007bc6d126
  208. 363.360:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000021da50 rdi=000000000021d4a0 rbp=000000000021c840 rsp=000000000021c6c0
  209. 363.360:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000021df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  210. 363.360:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000021df40 r13=000000000021cd90 r14=000000007bc7f352 r15=000000000021df40
  211. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 21c6c0
  212. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
  213. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  214. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  215. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  216. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  217. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  218. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  219. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  220. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  221. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  222. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  223. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 21cd60
  224. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
  225. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  226. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  227. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 21d270
  228. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
  229. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  230. 363.360:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  231. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  232. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  233. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
  234. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 21d2a0
  235. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
  236. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  237. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  238. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 21d2d0
  239. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
  240. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  241. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  242. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 21d300
  243. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
  244. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  245. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  246. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  247. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  248. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  249. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  250. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  251. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  252. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  253. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  254. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 21d9c0
  255. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
  256. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  257. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  258. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
  259. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
  260. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  261. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  262. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
  263. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
  264. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
  265. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 21da50
  266. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
  267. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  268. 363.360:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  269. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  270. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  271. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  272. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  273. 363.360:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 21e080
  274. 363.360:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  275. 363.360:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  276. 363.360:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  277. 363.360:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 21e080
  278. 363.360:00cc:00d0:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe") failed (error c000007b).
  279. 363.392:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\opengl32.dll" at 000000007A850000: builtin
  280. 363.392:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wined3d.dll" at 00007F96C4020000: builtin
  281. 363.392:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00007F96C41C0000: builtin
  282. 363.394:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F96C3F30000: builtin
  283. 363.412:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
  284. 363.412:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
  285. 363.412:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
  286. 363.412:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000021d840 rdx=00000000ffffffff
  287. 363.412:00cc:00d0:trace:seh:dispatch_exception rsi=000000000021ded0 rdi=0000000000000000 rbp=000000000021dc18 rsp=000000000021d800
  288. 363.412:00cc:00d0:trace:seh:dispatch_exception r8=000000000021dc18 r9=000000000021dc60 r10=0000000000000000 r11=0000000000000246
  289. 363.412:00cc:00d0:trace:seh:dispatch_exception r12=00000000000161b8 r13=000000000021dc30 r14=000000000021dc40 r15=000000000021dc18
  290. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 21d800
  291. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  292. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  293. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  294. 363.412:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000021D820 rsp 21d960 handler 000000007BC6D250
  295. 363.412:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000021D6C0, frame=000000000021D820 context=000000000021CC20, dispatch=000000000021CAF0)
  296. 363.412:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000021D820 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  297. 363.412:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
  298. 363.412:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
  299. 363.412:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000021d820 rcx=000000000021c510 rdx=000000007bc6d126
  300. 363.412:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000021d1d0 rdi=000000000021cc20 rbp=000000000021bfc0 rsp=000000000021be40
  301. 363.412:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000021d6c0 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  302. 363.412:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000021d6c0 r13=000000000021c510 r14=000000007bc7f352 r15=000000000021d6c0
  303. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 21be40
  304. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
  305. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  306. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  307. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  308. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  309. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  310. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  311. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  312. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  313. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  314. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  315. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 21c4e0
  316. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
  317. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  318. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  319. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 21c9f0
  320. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
  321. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  322. 363.412:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  323. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  324. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  325. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
  326. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 21ca20
  327. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
  328. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  329. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  330. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 21ca50
  331. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
  332. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  333. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  334. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 21ca80
  335. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
  336. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  337. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  338. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  339. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  340. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  341. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  342. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  343. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  344. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  345. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  346. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 21d140
  347. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
  348. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  349. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  350. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
  351. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
  352. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  353. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  354. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
  355. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
  356. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
  357. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 21d1d0
  358. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
  359. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  360. 363.412:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  361. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  362. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  363. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  364. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  365. 363.412:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 21d800
  366. 363.412:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  367. 363.412:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  368. 363.412:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  369. 363.412:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 21d800
  370. 363.412:00cc:00d0:err:module:import_dll Loading library vulkan-1.dll (which is needed by L"C:\\windows\\system32\\d3d11.dll") failed (error c000007b).
  371. 363.412:00cc:00d0:err:module:import_dll Library d3d11.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe") not found
  372. 363.417:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 00007F96C3EE0000: builtin
  373. 363.419:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 00007F96C3EA0000: builtin
  374. 363.455:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WSOCK32.dll" at 000000006C0C0000: builtin
  375. 363.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
  376. 363.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000000637C0000: builtin
  377. 363.460:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\fmodex64.dll" at 0000000180000000: native
  378. 363.463:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\fmod_event64.dll" at 0000000000220000: native
  379. 363.490:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\binkw64.dll" at 00000000002B0000: native
  380. 363.502:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000063140000: builtin
  381. 363.505:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 00000000003C0000: builtin
  382. 363.507:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000006DD80000: builtin
  383. 363.509:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 0000000069380000: builtin
  384. 363.511:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 000000006D580000: builtin
  385. 363.511:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 00000000003A0000: native
  386. 363.513:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000061540000: builtin
  387. 363.515:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 00000000620C0000: builtin
  388. 363.517:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 0000000068AC0000: builtin
  389. 363.519:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000069B80000: builtin
  390. 363.522:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000070580000: builtin
  391. 363.543:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 00000000003D0000: builtin
  392. 363.543:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0000000000300000: native
  393. 363.584:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  394. 363.585:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
  395. 363.586:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 000000006E6C0000: builtin
  396. 363.587:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  397. 363.587:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007F96C3E10000: builtin
  398. 363.590:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
  399. 363.592:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-multibyte-l1-1-0.dll" at 0000000062C40000: builtin
  400. 363.592:00cc:00d0:err:module:LdrInitializeThunk Importing dlls for L"Z:\\media\\Games\\Steam\\steamapps\\common\\DARK SOULS REMASTERED\\DarkSoulsRemastered.exe" failed, status c0000135
  401. 364.612:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  402. 364.612:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  403. 364.612:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  404. 364.614:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  405. 364.614:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  406. 364.614:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  407. 364.614:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000095788 r11=0000000000e8ecd8
  408. 364.614:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005e350 r14=0000000000000000 r15=00000000ffba0000
  409. 364.614:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  410. 364.614:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  411. 364.614:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  412. 364.614:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  413. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  414. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  415. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  416. 364.614:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  417. 364.614:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  418. 364.614:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  419. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  420. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  421. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  422. 364.614:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  423. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  424. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  425. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  426. 364.614:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  427. 364.614:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  428. 364.614:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  429. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  430. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  431. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  432. 364.614:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  433. 364.614:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  434. 364.614:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  435. 364.614:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  436. 364.614:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  437. 364.614:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  438. 364.614:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  439. 364.614:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  440. 364.614:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  441. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  442. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  443. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  444. 364.614:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  445. 364.614:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  446. 364.614:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  447. 364.614:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  448. 364.614:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  449. 364.614:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  450. 364.614:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  451. 364.614:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  452. 364.614:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  453. 364.614:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  454. 364.614:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  455. 364.614:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  456. 364.614:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  457. 364.614:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  458. 364.614:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  459. 364.614:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  460. 364.614:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  461. 364.614:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  462. 364.614:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  463. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  464. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  465. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  466. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  467. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  468. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  469. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  470. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  471. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  472. 364.615:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  473. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  474. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  475. 364.615:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  476. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  477. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  478. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  479. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  480. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  481. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  482. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  483. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  484. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  485. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  486. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  487. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  488. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  489. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  490. 364.615:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  491. 364.615:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  492. 364.615:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  493. 364.615:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  494. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  495. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  496. 364.615:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  497. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  498. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  499. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  500. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  501. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  502. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  503. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  504. 364.615:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  505. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  506. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  507. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  508. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  509. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  510. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  511. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  512. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  513. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  514. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  515. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  516. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  517. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  518. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  519. 364.615:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  520. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  521. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  522. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  523. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  524. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  525. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  526. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  527. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  528. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  529. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  530. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  531. 364.615:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  532. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  533. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  534. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  535. 364.615:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  536. 364.615:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  537. 364.615:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  538. 364.615:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  539. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  540. 364.615:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  541. 364.615:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  542. 364.615:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  543. 364.615:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  544. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  545. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  546. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  547. 364.615:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  548. 364.615:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  549. 364.615:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  550. 364.615:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  551. 364.615:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  552. 364.615:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  553. 364.615:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a730 rbp=0000000000000000 rsp=0000000000e8eea0
  554. 364.615:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000103c8 r11=0000000000e8ef18
  555. 364.615:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000095650 r14=0000000000000000 r15=00000000ffba0000
  556. 364.615:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  557. 364.615:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  558. 364.615:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  559. 364.615:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  560. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  561. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  562. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  563. 364.615:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  564. 364.615:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  565. 364.615:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  566. 364.615:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  567. 364.615:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  568. 364.615:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  569. 364.615:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  570. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  571. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  572. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  573. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  574. 364.616:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  575. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  576. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  577. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  578. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  579. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  580. 364.616:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  581. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  582. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  583. 364.616:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  584. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  585. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  586. 364.616:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  587. 364.616:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  588. 364.616:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  589. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  590. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  591. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  592. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  593. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  594. 364.616:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  595. 364.616:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  596. 364.616:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  597. 364.616:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  598. 364.616:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  599. 364.616:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  600. 364.616:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  601. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  602. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  603. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  604. 364.616:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  605. 364.616:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  606. 364.616:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  607. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  608. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  609. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  610. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  611. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  612. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  613. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  614. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  615. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  616. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  617. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  618. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  619. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  620. 364.616:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  621. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  622. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  623. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  624. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  625. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  626. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  627. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  628. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  629. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  630. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  631. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  632. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  633. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  634. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  635. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  636. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  637. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  638. 364.616:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  639. 364.616:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  640. 364.616:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  641. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  642. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  643. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  644. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  645. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  646. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  647. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  648. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  649. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  650. 364.616:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  651. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  652. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  653. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  654. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  655. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  656. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  657. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  658. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  659. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  660. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  661. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  662. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  663. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  664. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  665. 364.616:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  666. 364.616:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  667. 364.616:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  668. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  669. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  670. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  671. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  672. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  673. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  674. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  675. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  676. 364.616:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  677. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  678. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  679. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  680. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  681. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  682. 364.616:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  683. 364.616:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  684. 364.616:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  685. 364.616:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  686. 364.616:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  687. 364.616:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  688. 364.616:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  689. 364.616:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  690. 364.616:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  691. 364.616:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  692. 364.616:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  693. 364.616:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  694. 364.616:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  695. 364.616:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  696. 364.616:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  697. 364.616:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  698. 364.617:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  699. 364.617:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  700. 364.619:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  701. 364.620:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  702. 364.622:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  703. 364.622:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  704. 364.624:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  705. 364.717:0030:00dc:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1d0fda0,4,(nil))
  706. 364.717:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  707. 364.718:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  708. 364.718:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  709. 364.718:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  710. pid 6461 != 6460, skipping destruction (fork without exec?)
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×