Advertisement
Guest User

doom16log

a guest
Apr 1st, 2021
378
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 58.23 KB | None | 0 0
  1. ======================
  2. Proton: 1612904805 proton-5.13-6
  3. SteamGameId: 379720
  4. Command: ['/media/Games/Steam/steamapps/common/DOOM/DOOMx64.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
  7. pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
  8. soldier: 0.20210309.0 soldier 0.20210309.0
  9. ======================
  10. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  12. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  13. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. esync: up and running.
  15. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. 282.405:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  17. 282.407:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 282.407:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  19. 282.408:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  20. 282.408:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  21. 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB5F9E50000: builtin
  22. 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  23. 282.412:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB5FA070000: builtin
  24. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  25. 282.561:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  26. 282.562:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  27. 282.562:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  28. 282.563:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  29. 282.563:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FCCB8500000: builtin
  31. 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  32. 282.566:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FCCB8710000: builtin
  33. 282.567:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  34. 282.568:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  35. 282.568:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  36. 282.569:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  37. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  38. 282.619:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  39. 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  40. 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  41. 282.620:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  42. 282.620:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  43. 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FAAC8E40000: builtin
  44. 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  45. 282.623:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FAAC9050000: builtin
  46. 282.624:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  47. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  48. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  49. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FAAC89E0000: builtin
  50. 282.626:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FAAC8B90000: builtin
  51. 283.176:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  52. 283.176:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  53. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  54. 283.198:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  55. 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  57. 283.199:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  58. 283.200:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  59. 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FE263470000: builtin
  60. 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  61. 283.202:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FE263690000: builtin
  62. 283.203:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FE263380000: builtin
  63. 283.203:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  64. 283.217:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  65. 283.236:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  66. 283.243:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FE263320000: builtin
  67. 283.245:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  68. 283.245:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  69. 283.250:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  70. 283.261:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  71. 283.261:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  72. 283.264:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  73. 283.266:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FE262EB0000: builtin
  74. 283.267:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FE263070000: builtin
  75. 283.336:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  76. 283.336:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  77. 283.337:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  78. 283.377:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FE261330000: builtin
  79. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  80. 283.415:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  81. 283.415:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  82. 283.416:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  83. 283.416:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  84. 283.416:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
  85. 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FC4F3270000: builtin
  86. 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  87. 283.418:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FC4F3480000: builtin
  88. 283.419:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FC4F3170000: builtin
  89. 283.419:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  90. 283.430:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  91. 283.434:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  92. 283.436:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FC4F3110000: builtin
  93. 283.444:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  94. 283.444:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  95. 283.446:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FC4F2A50000: builtin
  96. 283.446:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FC4F2C10000: builtin
  97. 283.532:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  98. 283.532:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  99. 283.536:0088:0098:trace:seh:NtQueryInformationThread (0x88,0,0xe8f750,30,(nil))
  100. 283.548:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB5F9230000: builtin
  101. 283.551:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  102. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  103. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  104. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB5F8FA0000: builtin
  105. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  106. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  107. 283.555:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  108. 283.556:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FB5F93E0000: builtin
  109. 283.645:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  110. 283.648:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  111. 283.649:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  112. 283.649:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  113. 283.650:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EAF0000: builtin
  114. 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E950000: builtin
  115. 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  116. 283.652:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA40000: builtin
  117. 283.653:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7E0000: builtin
  118. 283.654:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  119. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  120. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  121. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E5B0000: builtin
  122. 283.657:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  123. 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  124. 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  125. 283.663:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DAF0000: builtin
  126. 283.996:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  127. 284.005:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  128. 284.006:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  129. 284.006:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  130. 284.007:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  131. 284.007:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
  132. 284.010:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F752DE30000: builtin
  133. 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  134. 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F752E050000: builtin
  135. 284.011:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F752DC70000: builtin
  136. 284.012:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  137. 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  138. 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  139. 284.015:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F752D9E0000: builtin
  140. Setting breakpad minidump AppID = 379720
  141. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
  142. 284.140:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  143. 284.140:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  144. 284.144:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F752D6B0000: builtin
  145. 284.255:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  146. 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  147. 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  148. 284.256:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  149. 284.256:00b4:00b8:trace:seh:check_bpf_jit_enable enabled 0x31.
  150. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F4818DA0000: builtin
  151. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  152. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F4818FB0000: builtin
  153. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F4818BD0000: builtin
  154. 284.258:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  155. 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  156. 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  157. 284.260:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F4818940000: builtin
  158. 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  159. 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  160. 284.261:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F752B790000: builtin
  161. 284.265:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  162. 284.265:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  163. 284.266:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F50000: builtin
  164. 284.322:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  165. 284.322:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  166. 284.326:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F4818610000: builtin
  167. 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  168. 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  169. 284.341:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F48171E0000: builtin
  170. 284.356:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  171. 284.356:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  172. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  173. 284.399:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  174. 284.401:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  175. 284.401:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  176. 284.433:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe" at 0000000140000000: native
  177. 284.433:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
  178. 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FAF3F420000: builtin
  179. 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  180. 284.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FAF3F630000: builtin
  181. 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  182. 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  183. 284.441:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  184. 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FAF3EFC0000: builtin
  185. 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FAF3F170000: builtin
  186. 284.442:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
  187. 284.443:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  188. 284.443:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000000637C0000: builtin
  189. 284.445:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FAF3EF80000: builtin
  190. 284.446:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FAF3EF20000: builtin
  191. 284.446:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WSOCK32.dll" at 000000006C0C0000: builtin
  192. 284.448:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 000000006ACC0000: builtin
  193. 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  194. 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  195. 284.458:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007FAF3E4E0000: builtin
  196. 284.460:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
  197. 284.461:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 0000000066200000: builtin
  198. 284.463:00cc:00d0:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00d0
  199. 284.463:00cc:00d0:trace:seh:dispatch_exception info[0]=0000000000000000
  200. 284.463:00cc:00d0:trace:seh:dispatch_exception info[1]=0000000000000000
  201. 284.463:00cc:00d0:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000031e0c0 rdx=00000000ffffffff
  202. 284.463:00cc:00d0:trace:seh:dispatch_exception rsi=000000000031e750 rdi=0000000000000000 rbp=000000000031e498 rsp=000000000031e080
  203. 284.463:00cc:00d0:trace:seh:dispatch_exception r8=000000000031e498 r9=000000000031e4e0 r10=0000000000000000 r11=0000000000000246
  204. 284.463:00cc:00d0:trace:seh:dispatch_exception r12=0000000000016068 r13=000000000031e4b0 r14=000000000031e4c0 r15=000000000031e498
  205. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 31e080
  206. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  207. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  208. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  209. 284.463:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000031E0A0 rsp 31e1e0 handler 000000007BC6D250
  210. 284.463:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000031DF40, frame=000000000031E0A0 context=000000000031D4A0, dispatch=000000000031D370)
  211. 284.463:00cc:00d0:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000031E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  212. 284.463:00cc:00d0:trace:seh:RtlUnwindEx info[0]=0000000000000000
  213. 284.463:00cc:00d0:trace:seh:RtlUnwindEx info[1]=0000000000000000
  214. 284.463:00cc:00d0:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000031e0a0 rcx=000000000031cd90 rdx=000000007bc6d126
  215. 284.463:00cc:00d0:trace:seh:RtlUnwindEx rsi=000000000031da50 rdi=000000000031d4a0 rbp=000000000031c840 rsp=000000000031c6c0
  216. 284.463:00cc:00d0:trace:seh:RtlUnwindEx r8=000000000031df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  217. 284.463:00cc:00d0:trace:seh:RtlUnwindEx r12=000000000031df40 r13=000000000031cd90 r14=000000007bc7f352 r15=000000000031df40
  218. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 31c6c0
  219. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5fd60-6062e
  220. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  221. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  222. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  223. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  224. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  225. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  226. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  227. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  228. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  229. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  230. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 31cd60
  231. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 60630-60658
  232. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  233. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  234. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 31d270
  235. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d10c-6d128
  236. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  237. 284.463:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  238. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  239. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  240. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x1: pushq %rbp
  241. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 31d2a0
  242. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d130-6d15a
  243. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  244. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  245. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 31d2d0
  246. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 6d250-6d272
  247. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  248. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  249. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 31d300
  250. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5f200-5f741
  251. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  252. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  253. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  254. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  255. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  256. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  257. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %r12
  258. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r13
  259. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r14
  260. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r15
  261. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 31d9c0
  262. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5f750-5fa89
  263. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  264. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  265. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0xa: pushq %rbx
  266. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x9: pushq %rsi
  267. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  268. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  269. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x6: pushq %r12
  270. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x4: pushq %r13
  271. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2: pushq %r14
  272. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 31da50
  273. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 5d964-5d999
  274. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  275. 284.463:00cc:00d0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  276. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  277. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  278. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  279. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  280. 284.463:00cc:00d0:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 31e080
  281. 284.463:00cc:00d0:trace:seh:dump_unwind_info **** func 31830-318da
  282. 284.463:00cc:00d0:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  283. 284.463:00cc:00d0:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  284. 284.463:00cc:00d0:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 31e080
  285. 284.463:00cc:00d0:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe") failed (error c000007b).
  286. 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  287. 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
  288. 284.476:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 000000006E6C0000: builtin
  289. 284.477:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  290. 284.477:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007FAF3E460000: builtin
  291. 284.479:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 0000000071240000: builtin
  292. 284.479:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 0000000064340000: builtin
  293. 284.480:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00007FAF3CB30000: builtin
  294. 284.481:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\bink2w64.dll" at 0000000180000000: native
  295. 284.481:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\steam_api64.dll" at 000000003B400000: native
  296. 284.483:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OPENGL32.dll" at 000000007A850000: builtin
  297. 284.484:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSIMG32.dll" at 000000006AFC0000: builtin
  298. 284.486:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\UxTheme.dll" at 0000000062140000: builtin
  299. 284.487:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEACC.dll" at 0000000000320000: builtin
  300. 284.488:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdiplus.dll" at 000000006F480000: builtin
  301. 284.490:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINSPOOL.DRV" at 00007FAF3CAD0000: builtin
  302. 284.490:00cc:00d0:err:module:LdrInitializeThunk Importing dlls for L"Z:\\media\\Games\\Steam\\steamapps\\common\\DOOM\\DOOMx64.exe" failed, status c0000135
  303. 285.506:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  304. 285.507:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  305. 285.507:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  306. 285.508:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  307. 285.508:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  308. 285.509:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  309. 285.509:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  310. 285.509:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  311. 285.509:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  312. 285.509:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000956b8 r11=0000000000e8ecd8
  313. 285.509:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005e350 r14=0000000000000000 r15=00000000ffba0000
  314. 285.509:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  315. 285.509:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  316. 285.509:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  317. 285.509:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  318. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  319. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  320. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  321. 285.509:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  322. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  323. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  324. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  325. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  326. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  327. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  328. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  329. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  330. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  331. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  332. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  333. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  334. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  335. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  336. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  337. 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  338. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  339. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  340. 285.509:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  341. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  342. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  343. 285.509:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  344. 285.509:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  345. 285.509:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  346. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  347. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  348. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  349. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  350. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  351. 285.509:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  352. 285.509:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  353. 285.509:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  354. 285.509:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  355. 285.509:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  356. 285.509:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  357. 285.509:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  358. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  359. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  360. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  361. 285.509:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  362. 285.509:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  363. 285.509:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  364. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  365. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  366. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  367. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  368. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  369. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  370. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  371. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  372. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  373. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  374. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  375. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  376. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  377. 285.509:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  378. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  379. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  380. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  381. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  382. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  383. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  384. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  385. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  386. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  387. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  388. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  389. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  390. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  391. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  392. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  393. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  394. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  395. 285.509:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  396. 285.509:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  397. 285.509:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  398. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  399. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  400. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  401. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  402. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  403. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  404. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  405. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  406. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  407. 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  408. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  409. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  410. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  411. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  412. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  413. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  414. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  415. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  416. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  417. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  418. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  419. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  420. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  421. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  422. 285.509:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  423. 285.509:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  424. 285.509:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  425. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  426. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  427. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  428. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  429. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  430. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  431. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  432. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  433. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  434. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  435. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  436. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  437. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  438. 285.509:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  439. 285.509:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  440. 285.509:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  441. 285.509:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  442. 285.509:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  443. 285.509:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  444. 285.509:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  445. 285.509:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  446. 285.509:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  447. 285.509:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  448. 285.509:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  449. 285.509:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  450. 285.509:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  451. 285.509:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  452. 285.509:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  453. 285.510:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  454. 285.510:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  455. 285.510:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a730 rbp=0000000000000000 rsp=0000000000e8eea0
  456. 285.510:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000103c8 r11=0000000000e8ef18
  457. 285.510:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000095580 r14=0000000000000000 r15=00000000ffba0000
  458. 285.510:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  459. 285.510:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  460. 285.510:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  461. 285.510:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  462. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  463. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  464. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  465. 285.510:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  466. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  467. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  468. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  469. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  470. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  471. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  472. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  473. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  474. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  475. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  476. 285.510:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  477. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  478. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  479. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  480. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  481. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  482. 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  483. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  484. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  485. 285.510:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  486. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  487. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  488. 285.510:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  489. 285.510:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  490. 285.510:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  491. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  492. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  493. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  494. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  495. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  496. 285.510:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  497. 285.510:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  498. 285.510:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  499. 285.510:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  500. 285.510:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  501. 285.510:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  502. 285.510:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  503. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  504. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  505. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  506. 285.510:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  507. 285.510:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  508. 285.510:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  509. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  510. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  511. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  512. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  513. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  514. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  515. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  516. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  517. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  518. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  519. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  520. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  521. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  522. 285.510:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  523. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  524. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  525. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  526. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  527. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  528. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  529. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  530. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  531. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  532. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  533. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  534. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  535. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  536. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  537. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  538. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  539. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  540. 285.510:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  541. 285.510:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  542. 285.510:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  543. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  544. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  545. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  546. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  547. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  548. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  549. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  550. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  551. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  552. 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  553. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  554. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  555. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  556. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  557. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  558. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  559. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  560. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  561. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  562. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  563. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  564. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  565. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  566. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  567. 285.510:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  568. 285.510:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  569. 285.510:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  570. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  571. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  572. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  573. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  574. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  575. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  576. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  577. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  578. 285.510:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  579. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  580. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  581. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  582. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  583. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  584. 285.510:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  585. 285.510:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  586. 285.510:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  587. 285.510:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  588. 285.510:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  589. 285.510:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  590. 285.510:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  591. 285.510:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  592. 285.510:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  593. 285.510:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  594. 285.510:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  595. 285.510:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  596. 285.510:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  597. 285.510:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  598. 285.510:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  599. 285.510:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  600. 285.511:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  601. 285.511:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  602. 285.512:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  603. 285.513:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  604. 285.515:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  605. 285.515:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  606. 285.516:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  607. 285.610:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  608. 285.612:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  609. 285.612:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  610. 285.612:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  611. pid 5470 != 5469, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement