Guest User

doom16log

a guest
Apr 1st, 2021
255
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ======================
  2. Proton: 1612904805 proton-5.13-6
  3. SteamGameId: 379720
  4. Command: ['/media/Games/Steam/steamapps/common/DOOM/DOOMx64.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
  7. pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
  8. soldier: 0.20210309.0 soldier 0.20210309.0
  9. ======================
  10. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  12. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  13. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. esync: up and running.
  15. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. 282.405:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  17. 282.407:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 282.407:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  19. 282.408:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  20. 282.408:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  21. 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB5F9E50000: builtin
  22. 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  23. 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB5FA070000: builtin
  24. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  25. 282.561:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  26. 282.562:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  27. 282.562:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  28. 282.563:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  29. 282.563:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FCCB8500000: builtin
  31. 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  32. 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FCCB8710000: builtin
  33. 282.567:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  34. 282.568:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  35. 282.568:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  36. 282.569:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  37. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  38. 282.619:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  39. 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  40. 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  41. 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  42. 282.620:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  43. 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FAAC8E40000: builtin
  44. 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  45. 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FAAC9050000: builtin
  46. 282.624:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  47. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  48. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  49. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FAAC89E0000: builtin
  50. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FAAC8B90000: builtin
  51. 283.176:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  52. 283.176:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  53. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  54. 283.198:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  55. 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  57. 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  58. 283.200:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  59. 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FE263470000: builtin
  60. 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  61. 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FE263690000: builtin
  62. 283.203:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FE263380000: builtin
  63. 283.203:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  64. 283.217:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  65. 283.236:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  66. 283.243:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FE263320000: builtin
  67. 283.245:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  68. 283.245:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  69. 283.250:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  70. 283.261:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  71. 283.261:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  72. 283.264:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  73. 283.266:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FE262EB0000: builtin
  74. 283.267:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FE263070000: builtin
  75. 283.336:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  76. 283.336:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  77. 283.337:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  78. 283.377:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FE261330000: builtin
  79. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  80. 283.415:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  81. 283.415:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  82. 283.416:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  83. 283.416:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  84. 283.416:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
  85. 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FC4F3270000: builtin
  86. 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  87. 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FC4F3480000: builtin
  88. 283.419:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FC4F3170000: builtin
  89. 283.419:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  90. 283.430:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  91. 283.434:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  92. 283.436:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FC4F3110000: builtin
  93. 283.444:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  94. 283.444:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  95. 283.446:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FC4F2A50000: builtin
  96. 283.446:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FC4F2C10000: builtin
  97. 283.532:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  98. 283.532:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  99. 283.536:0088:0098:trace:seh:NtQueryInformationThread (0x88,0,0xe8f750,30,(nil))
  100. 283.548:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB5F9230000: builtin
  101. 283.551:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  102. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  103. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  104. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB5F8FA0000: builtin
  105. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  106. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  107. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  108. 283.556:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FB5F93E0000: builtin
  109. 283.645:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  110. 283.648:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  111. 283.649:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  112. 283.649:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  113. 283.650:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EAF0000: builtin
  114. 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E950000: builtin
  115. 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  116. 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA40000: builtin
  117. 283.653:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7E0000: builtin
  118. 283.654:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  119. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  120. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  121. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E5B0000: builtin
  122. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  123. 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  124. 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  125. 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DAF0000: builtin
  126. 283.996:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  127. 284.005:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  128. 284.006:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  129. 284.006:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  130. 284.007:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  131. 284.007:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
  132. 284.010:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F752DE30000: builtin
  133. 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  134. 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F752E050000: builtin
  135. 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F752DC70000: builtin
  136. 284.012:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  137. 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  138. 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  139. 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F752D9E0000: builtin
  140. Setting breakpad minidump AppID = 379720
  141. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
  142. 284.140:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  143. 284.140:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  144. 284.144:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F752D6B0000: builtin
  145. 284.255:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  146. 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  147. 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  148. 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  149. 284.256:00b4:00b8:trace:seh:check_bpf_jit_enable enabled 0x31.
  150. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F4818DA0000: builtin
  151. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  152. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F4818FB0000: builtin
  153. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F4818BD0000: builtin
  154. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  155. 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  156. 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  157. 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F4818940000: builtin
  158. 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  159. 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  160. 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F752B790000: builtin
  161. 284.265:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  162. 284.265:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  163. 284.266:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F50000: builtin
  164. 284.322:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  165. 284.322:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  166. 284.326:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F4818610000: builtin
  167. 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  168. 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  169. 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F48171E0000: builtin
  170. 284.356:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  171. 284.356:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  172. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  173. 284.399:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  174. 284.401:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  175. 284.401:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  176. 284.433:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe" at 0000000140000000: native
  177. 284.433:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
  178. 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FAF3F420000: builtin
  179. 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  180. 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FAF3F630000: builtin
  181. 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  182. 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  183. 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  184. 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FAF3EFC0000: builtin
  185. 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FAF3F170000: builtin
  186. 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
  187. 284.443:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  188. 284.443:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000000637C0000: builtin
  189. 284.445:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FAF3EF80000: builtin
  190. 284.446:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FAF3EF20000: builtin
  191. 284.446:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WSOCK32.dll" at 000000006C0C0000: builtin
  192. 284.448:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 000000006ACC0000: builtin
  193. 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  194. 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  195. 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007FAF3E4E0000: builtin
  196. 284.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
  197. 284.461:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 0000000066200000: builtin
  198. 284.463:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
  199. 284.463:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
  200. 284.463:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
  201. 284.463:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000031e0c0 rdx=00000000ffffffff
  202. 284.463:00cc:00d0:trace:seh:dispatch_exception rsi=000000000031e750 rdi=0000000000000000 rbp=000000000031e498 rsp=000000000031e080
  203. 284.463:00cc:00d0:trace:seh:dispatch_exception r8=000000000031e498 r9=000000000031e4e0 r10=0000000000000000 r11=0000000000000246
  204. 284.463:00cc:00d0:trace:seh:dispatch_exception r12=0000000000016068 r13=000000000031e4b0 r14=000000000031e4c0 r15=000000000031e498
  205. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 31e080
  206. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  207. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  208. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  209. 284.463:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000031E0A0 rsp 31e1e0 handler 000000007BC6D250
  210. 284.463:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000031DF40, frame=000000000031E0A0 context=000000000031D4A0, dispatch=000000000031D370)
  211. 284.463:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000031E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  212. 284.463:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
  213. 284.463:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
  214. 284.463:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000031e0a0 rcx=000000000031cd90 rdx=000000007bc6d126
  215. 284.463:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000031da50 rdi=000000000031d4a0 rbp=000000000031c840 rsp=000000000031c6c0
  216. 284.463:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000031df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  217. 284.463:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000031df40 r13=000000000031cd90 r14=000000007bc7f352 r15=000000000031df40
  218. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 31c6c0
  219. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
  220. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  221. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  222. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  223. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  224. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  225. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  226. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  227. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  228. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  229. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  230. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 31cd60
  231. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
  232. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  233. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  234. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 31d270
  235. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
  236. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  237. 284.463:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  238. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  239. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  240. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
  241. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 31d2a0
  242. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
  243. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  244. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  245. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 31d2d0
  246. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
  247. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  248. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  249. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 31d300
  250. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
  251. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  252. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  253. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  254. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  255. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  256. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  257. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  258. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  259. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  260. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  261. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 31d9c0
  262. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
  263. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  264. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  265. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
  266. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
  267. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  268. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  269. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
  270. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
  271. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
  272. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 31da50
  273. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
  274. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  275. 284.463:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  276. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  277. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  278. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  279. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  280. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 31e080
  281. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  282. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  283. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  284. 284.463:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 31e080
  285. 284.463:00cc:00d0:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe") failed (error c000007b).
  286. 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  287. 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
  288. 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 000000006E6C0000: builtin
  289. 284.477:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  290. 284.477:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007FAF3E460000: builtin
  291. 284.479:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 0000000071240000: builtin
  292. 284.479:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 0000000064340000: builtin
  293. 284.480:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00007FAF3CB30000: builtin
  294. 284.481:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\bink2w64.dll" at 0000000180000000: native
  295. 284.481:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\steam_api64.dll" at 000000003B400000: native
  296. 284.483:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OPENGL32.dll" at 000000007A850000: builtin
  297. 284.484:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSIMG32.dll" at 000000006AFC0000: builtin
  298. 284.486:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\UxTheme.dll" at 0000000062140000: builtin
  299. 284.487:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEACC.dll" at 0000000000320000: builtin
  300. 284.488:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdiplus.dll" at 000000006F480000: builtin
  301. 284.490:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINSPOOL.DRV" at 00007FAF3CAD0000: builtin
  302. 284.490:00cc:00d0:err:module:LdrInitializeThunk Importing dlls for L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe" failed, status c0000135
  303. 285.506:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  304. 285.507:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  305. 285.507:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  306. 285.508:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  307. 285.508:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  308. 285.509:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  309. 285.509:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  310. 285.509:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  311. 285.509:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  312. 285.509:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000956b8 r11=0000000000e8ecd8
  313. 285.509:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005e350 r14=0000000000000000 r15=00000000ffba0000
  314. 285.509:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  315. 285.509:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  316. 285.509:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  317. 285.509:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  318. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  319. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  320. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  321. 285.509:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  322. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  323. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  324. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  325. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  326. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  327. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  328. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  329. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  330. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  331. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  332. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  333. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  334. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  335. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  336. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  337. 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  338. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  339. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  340. 285.509:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  341. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  342. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  343. 285.509:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  344. 285.509:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  345. 285.509:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  346. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  347. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  348. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  349. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  350. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  351. 285.509:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  352. 285.509:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  353. 285.509:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  354. 285.509:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  355. 285.509:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  356. 285.509:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  357. 285.509:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  358. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  359. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  360. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  361. 285.509:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  362. 285.509:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  363. 285.509:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  364. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  365. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  366. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  367. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  368. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  369. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  370. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  371. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  372. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  373. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  374. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  375. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  376. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  377. 285.509:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  378. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  379. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  380. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  381. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  382. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  383. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  384. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  385. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  386. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  387. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  388. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  389. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  390. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  391. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  392. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  393. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  394. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  395. 285.509:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  396. 285.509:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  397. 285.509:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  398. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  399. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  400. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  401. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  402. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  403. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  404. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  405. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  406. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  407. 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  408. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  409. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  410. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  411. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  412. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  413. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  414. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  415. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  416. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  417. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  418. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  419. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  420. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  421. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  422. 285.509:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  423. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  424. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  425. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  426. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  427. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  428. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  429. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  430. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  431. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  432. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  433. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  434. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  435. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  436. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  437. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  438. 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  439. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  440. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  441. 285.509:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  442. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  443. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  444. 285.509:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  445. 285.509:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  446. 285.509:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  447. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  448. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  449. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  450. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  451. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  452. 285.509:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  453. 285.510:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  454. 285.510:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  455. 285.510:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a730 rbp=0000000000000000 rsp=0000000000e8eea0
  456. 285.510:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000103c8 r11=0000000000e8ef18
  457. 285.510:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000095580 r14=0000000000000000 r15=00000000ffba0000
  458. 285.510:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  459. 285.510:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  460. 285.510:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  461. 285.510:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  462. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  463. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  464. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  465. 285.510:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  466. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  467. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  468. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  469. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  470. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  471. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  472. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  473. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  474. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  475. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  476. 285.510:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  477. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  478. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  479. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  480. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  481. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  482. 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  483. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  484. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  485. 285.510:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  486. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  487. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  488. 285.510:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  489. 285.510:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  490. 285.510:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  491. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  492. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  493. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  494. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  495. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  496. 285.510:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  497. 285.510:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  498. 285.510:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  499. 285.510:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  500. 285.510:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  501. 285.510:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  502. 285.510:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  503. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  504. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  505. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  506. 285.510:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  507. 285.510:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  508. 285.510:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  509. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  510. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  511. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  512. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  513. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  514. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  515. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  516. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  517. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  518. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  519. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  520. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  521. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  522. 285.510:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  523. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  524. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  525. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  526. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  527. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  528. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  529. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  530. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  531. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  532. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  533. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  534. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  535. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  536. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  537. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  538. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  539. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  540. 285.510:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  541. 285.510:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  542. 285.510:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  543. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  544. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  545. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  546. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  547. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  548. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  549. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  550. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  551. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  552. 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  553. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  554. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  555. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  556. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  557. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  558. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  559. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  560. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  561. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  562. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  563. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  564. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  565. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  566. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  567. 285.510:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  568. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  569. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  570. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  571. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  572. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  573. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  574. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  575. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  576. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  577. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  578. 285.510:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  579. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  580. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  581. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  582. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  583. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  584. 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  585. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  586. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  587. 285.510:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  588. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  589. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  590. 285.510:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  591. 285.510:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  592. 285.510:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  593. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  594. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  595. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  596. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  597. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  598. 285.510:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  599. 285.510:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  600. 285.511:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  601. 285.511:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  602. 285.512:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  603. 285.513:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  604. 285.515:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  605. 285.515:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  606. 285.516:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  607. 285.610:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  608. 285.612:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  609. 285.612:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  610. 285.612:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  611. pid 5470 != 5469, skipping destruction (fork without exec?)
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×