Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ======================
- Proton: 1612904805 proton-5.13-6
- SteamGameId: 379720
- Command: ['/media/Games/Steam/steamapps/common/DOOM/DOOMx64.exe']
- Options: {'forcelgadd'}
- SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
- pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
- soldier: 0.20210309.0 soldier 0.20210309.0
- ======================
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- esync: up and running.
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- 282.405:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 282.407:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 282.407:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 282.408:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
- 282.408:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
- 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB5F9E50000: builtin
- 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB5FA070000: builtin
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- 282.561:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 282.562:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 282.562:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 282.563:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
- 282.563:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
- 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FCCB8500000: builtin
- 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FCCB8710000: builtin
- 282.567:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 282.568:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 282.568:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 282.569:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- 282.619:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
- 282.620:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
- 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FAAC8E40000: builtin
- 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FAAC9050000: builtin
- 282.624:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FAAC89E0000: builtin
- 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FAAC8B90000: builtin
- 283.176:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 283.176:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- 283.198:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
- 283.200:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
- 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FE263470000: builtin
- 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FE263690000: builtin
- 283.203:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FE263380000: builtin
- 283.203:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
- 283.217:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 283.236:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
- 283.243:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FE263320000: builtin
- 283.245:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 283.245:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 283.250:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
- 283.261:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
- 283.261:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
- 283.264:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
- 283.266:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FE262EB0000: builtin
- 283.267:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FE263070000: builtin
- 283.336:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 283.336:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 283.337:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
- 283.377:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FE261330000: builtin
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- 283.415:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 283.415:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 283.416:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 283.416:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
- 283.416:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
- 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FC4F3270000: builtin
- 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FC4F3480000: builtin
- 283.419:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FC4F3170000: builtin
- 283.419:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
- 283.430:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 283.434:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
- 283.436:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FC4F3110000: builtin
- 283.444:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 283.444:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 283.446:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FC4F2A50000: builtin
- 283.446:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FC4F2C10000: builtin
- 283.532:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 283.532:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 283.536:0088:0098:trace:seh:NtQueryInformationThread (0x88,0,0xe8f750,30,(nil))
- 283.548:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB5F9230000: builtin
- 283.551:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB5F8FA0000: builtin
- 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 283.556:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FB5F93E0000: builtin
- 283.645:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 283.648:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
- 283.649:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
- 283.649:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
- 283.650:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EAF0000: builtin
- 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E950000: builtin
- 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
- 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA40000: builtin
- 283.653:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7E0000: builtin
- 283.654:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
- 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
- 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
- 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E5B0000: builtin
- 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
- 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
- 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
- 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DAF0000: builtin
- 283.996:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
- 284.005:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 284.006:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 284.006:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 284.007:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
- 284.007:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
- 284.010:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F752DE30000: builtin
- 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F752E050000: builtin
- 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F752DC70000: builtin
- 284.012:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F752D9E0000: builtin
- Setting breakpad minidump AppID = 379720
- Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
- 284.140:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 284.140:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 284.144:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F752D6B0000: builtin
- 284.255:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
- 284.256:00b4:00b8:trace:seh:check_bpf_jit_enable enabled 0x31.
- 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F4818DA0000: builtin
- 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F4818FB0000: builtin
- 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F4818BD0000: builtin
- 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F4818940000: builtin
- 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F752B790000: builtin
- 284.265:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
- 284.265:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
- 284.266:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F50000: builtin
- 284.322:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 284.322:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 284.326:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F4818610000: builtin
- 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F48171E0000: builtin
- 284.356:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
- 284.356:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
- ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- 284.399:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 284.401:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 284.401:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 284.433:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe" at 0000000140000000: native
- 284.433:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
- 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FAF3F420000: builtin
- 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FAF3F630000: builtin
- 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FAF3EFC0000: builtin
- 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FAF3F170000: builtin
- 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
- 284.443:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 284.443:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000000637C0000: builtin
- 284.445:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FAF3EF80000: builtin
- 284.446:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FAF3EF20000: builtin
- 284.446:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WSOCK32.dll" at 000000006C0C0000: builtin
- 284.448:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 000000006ACC0000: builtin
- 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007FAF3E4E0000: builtin
- 284.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
- 284.461:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 0000000066200000: builtin
- 284.463:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
- 284.463:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
- 284.463:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
- 284.463:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000031e0c0 rdx=00000000ffffffff
- 284.463:00cc:00d0:trace:seh:dispatch_exception rsi=000000000031e750 rdi=0000000000000000 rbp=000000000031e498 rsp=000000000031e080
- 284.463:00cc:00d0:trace:seh:dispatch_exception r8=000000000031e498 r9=000000000031e4e0 r10=0000000000000000 r11=0000000000000246
- 284.463:00cc:00d0:trace:seh:dispatch_exception r12=0000000000016068 r13=000000000031e4b0 r14=000000000031e4c0 r15=000000000031e498
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 31e080
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
- 284.463:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000031E0A0 rsp 31e1e0 handler 000000007BC6D250
- 284.463:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000031DF40, frame=000000000031E0A0 context=000000000031D4A0, dispatch=000000000031D370)
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000031E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000031e0a0 rcx=000000000031cd90 rdx=000000007bc6d126
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000031da50 rdi=000000000031d4a0 rbp=000000000031c840 rsp=000000000031c6c0
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000031df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
- 284.463:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000031df40 r13=000000000031cd90 r14=000000007bc7f352 r15=000000000031df40
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 31c6c0
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 31cd60
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 31d270
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
- 284.463:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 31d2a0
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 31d2d0
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 31d300
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 31d9c0
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 31da50
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
- 284.463:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
- 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 31e080
- 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
- 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
- 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
- 284.463:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 31e080
- 284.463:00cc:00d0:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe") failed (error c000007b).
- 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
- 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 000000006E6C0000: builtin
- 284.477:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
- 284.477:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007FAF3E460000: builtin
- 284.479:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 0000000071240000: builtin
- 284.479:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 0000000064340000: builtin
- 284.480:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00007FAF3CB30000: builtin
- 284.481:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\bink2w64.dll" at 0000000180000000: native
- 284.481:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\steam_api64.dll" at 000000003B400000: native
- 284.483:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OPENGL32.dll" at 000000007A850000: builtin
- 284.484:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSIMG32.dll" at 000000006AFC0000: builtin
- 284.486:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\UxTheme.dll" at 0000000062140000: builtin
- 284.487:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEACC.dll" at 0000000000320000: builtin
- 284.488:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdiplus.dll" at 000000006F480000: builtin
- 284.490:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINSPOOL.DRV" at 00007FAF3CAD0000: builtin
- 284.490:00cc:00d0:err:module:LdrInitializeThunk Importing dlls for L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe" failed, status c0000135
- 285.506:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
- 285.507:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
- 285.507:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
- 285.508:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
- 285.508:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
- 285.509:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
- 285.509:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
- 285.509:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
- 285.509:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
- 285.509:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000956b8 r11=0000000000e8ecd8
- 285.509:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005e350 r14=0000000000000000 r15=00000000ffba0000
- 285.509:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
- 285.509:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
- 285.509:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
- 285.509:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 285.509:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
- 285.509:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
- 285.509:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 285.509:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
- 285.509:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
- 285.509:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
- 285.509:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
- 285.509:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
- 285.509:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
- 285.509:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
- 285.509:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 285.509:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
- 285.509:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
- 285.509:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
- 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
- 285.509:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 285.509:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
- 285.510:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
- 285.510:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
- 285.510:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a730 rbp=0000000000000000 rsp=0000000000e8eea0
- 285.510:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000103c8 r11=0000000000e8ef18
- 285.510:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000095580 r14=0000000000000000 r15=00000000ffba0000
- 285.510:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
- 285.510:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
- 285.510:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
- 285.510:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 285.510:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
- 285.510:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 285.510:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 285.510:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
- 285.510:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 285.510:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
- 285.510:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
- 285.510:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
- 285.510:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
- 285.510:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
- 285.510:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 285.510:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
- 285.510:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
- 285.510:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
- 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
- 285.510:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 285.510:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
- 285.510:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
- 285.511:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
- 285.511:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
- 285.512:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
- 285.513:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
- 285.515:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
- 285.515:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
- 285.516:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
- 285.610:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
- 285.612:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
- 285.612:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
- 285.612:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
- pid 5470 != 5469, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement