Guest User

re7log

a guest
Apr 1st, 2021
169
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ======================
  2. Proton: 1612904805 proton-5.13-6
  3. SteamGameId: 418370
  4. Command: ['/media/Games/Steam/steamapps/common/RESIDENT EVIL 7 biohazard/re7.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
  7. pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
  8. soldier: 0.20210309.0 soldier 0.20210309.0
  9. ======================
  10. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  12. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  13. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. esync: up and running.
  15. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. 490.233:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  17. 490.234:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 490.234:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  19. 490.235:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  20. 490.235:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  21. 490.239:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F99E79B0000: builtin
  22. 490.239:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  23. 490.239:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F99E7BD0000: builtin
  24. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  25. 490.383:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  26. 490.384:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  27. 490.385:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  28. 490.385:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  29. 490.385:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 490.389:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FA143C70000: builtin
  31. 490.389:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  32. 490.389:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FA143E90000: builtin
  33. 490.390:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  34. 490.392:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  35. 490.392:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  36. 490.393:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  37. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  38. 490.455:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  39. 490.457:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  40. 490.457:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  41. 490.458:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  42. 490.458:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  43. 490.462:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FD4CB830000: builtin
  44. 490.462:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  45. 490.462:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FD4CBA40000: builtin
  46. 490.463:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  47. 490.467:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  48. 490.467:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  49. 490.468:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FD4CB3D0000: builtin
  50. 490.468:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FD4CB590000: builtin
  51. 491.007:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  52. 491.008:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  53. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  54. 491.029:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  55. 491.030:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 491.030:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  57. 491.030:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  58. 491.030:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  59. 491.032:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F1574EE0000: builtin
  60. 491.032:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  61. 491.032:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F15750F0000: builtin
  62. 491.033:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F1574DE0000: builtin
  63. 491.033:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  64. 491.042:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  65. 491.058:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  66. 491.064:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F1574D80000: builtin
  67. 491.065:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  68. 491.065:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  69. 491.069:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  70. 491.075:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  71. 491.075:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  72. 491.077:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  73. 491.079:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F1574910000: builtin
  74. 491.079:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F1574AD0000: builtin
  75. 491.159:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  76. 491.159:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  77. 491.161:0058:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  78. 491.216:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F1566DA0000: builtin
  79. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  80. 491.269:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  81. 491.270:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  82. 491.271:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  83. 491.271:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  84. 491.271:0084:0088:trace:seh:install_bpf Seccomp filters already installed.
  85. 491.275:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F683FE40000: builtin
  86. 491.275:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  87. 491.275:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F6840050000: builtin
  88. 491.276:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F683FD40000: builtin
  89. 491.277:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  90. 491.290:0084:0088:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  91. 491.295:0084:0094:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  92. 491.298:0084:0090:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F683FCE0000: builtin
  93. 491.308:0084:0090:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  94. 491.308:0084:0090:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  95. 491.311:0084:0094:trace:seh:NtQueryInformationThread (0x5c,0,0xe8f750,30,(nil))
  96. 491.313:0084:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F683F620000: builtin
  97. 491.313:0084:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F683F7E0000: builtin
  98. 491.318:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F99E6D90000: builtin
  99. 491.319:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  100. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  101. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  102. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F99E6B00000: builtin
  103. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  104. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  105. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  106. 491.321:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F99E6F40000: builtin
  107. 491.385:0084:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  108. 491.385:0084:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  109. 491.435:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  110. 491.437:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  111. 491.438:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  112. 491.438:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  113. 491.439:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EA00000: builtin
  114. 491.441:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E850000: builtin
  115. 491.441:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  116. 491.441:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7E940000: builtin
  117. 491.441:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E6E0000: builtin
  118. 491.442:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  119. 491.444:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  120. 491.444:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  121. 491.444:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E4B0000: builtin
  122. 491.444:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  123. 491.449:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  124. 491.449:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  125. 491.449:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DAA0000: builtin
  126. 491.698:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  127. 491.706:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  128. 491.707:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  129. 491.707:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  130. 491.707:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  131. 491.707:00a0:00a4:trace:seh:check_bpf_jit_enable enabled 0x31.
  132. 491.710:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FA872E90000: builtin
  133. 491.710:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  134. 491.710:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FA8730A0000: builtin
  135. 491.710:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FA872CC0000: builtin
  136. 491.711:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  137. 491.713:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  138. 491.713:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  139. 491.713:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FA872A40000: builtin
  140. Setting breakpad minidump AppID = 418370
  141. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
  142. 491.841:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  143. 491.841:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  144. 491.851:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FA872700000: builtin
  145. 491.980:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  146. 491.981:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  147. 491.981:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  148. 491.981:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FA8707E0000: builtin
  149. 491.981:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  150. 491.981:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  151. 491.982:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  152. 491.982:00ac:00b0:trace:seh:check_bpf_jit_enable enabled 0x31.
  153. 491.983:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F21C4220000: builtin
  154. 491.983:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  155. 491.983:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F21C4430000: builtin
  156. 491.984:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F21C4050000: builtin
  157. 491.984:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  158. 491.985:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  159. 491.985:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  160. 491.986:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  161. 491.986:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  162. 491.986:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F21C3DC0000: builtin
  163. 491.987:0020:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5FE0000: builtin
  164. 492.057:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  165. 492.057:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  166. 492.060:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F21C3A90000: builtin
  167. 492.074:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  168. 492.074:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  169. 492.075:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F21C2660000: builtin
  170. 492.077:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  171. 492.078:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  172. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  173. 492.139:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  174. 492.141:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  175. 492.142:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  176. 493.756:00c4:00c8:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\RESIDENT EVIL 7 biohazard\\re7.exe" at 0000000140000000: native
  177. 493.756:00c4:00c8:trace:seh:check_bpf_jit_enable enabled 0x31.
  178. 493.814:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F3AE0470000: builtin
  179. 493.815:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  180. 493.821:00c4:00c8:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00c8
  181. 493.821:00c4:00c8:trace:seh:dispatch_exception info[0]=0000000000000000
  182. 493.821:00c4:00c8:trace:seh:dispatch_exception info[1]=0000000000000000
  183. 493.821:00c4:00c8:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000051d620 rdx=00000000ffffffff
  184. 493.821:00c4:00c8:trace:seh:dispatch_exception rsi=000000000051dcb0 rdi=0000000000000000 rbp=000000000051d9f8 rsp=000000000051d5e0
  185. 493.821:00c4:00c8:trace:seh:dispatch_exception r8=000000000051d9f8 r9=000000000051da40 r10=0000000000000000 r11=0000000000000246
  186. 493.821:00c4:00c8:trace:seh:dispatch_exception r12=0000000000016198 r13=000000000051da10 r14=000000000051da20 r15=000000000051d9f8
  187. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 51d5e0
  188. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  189. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  190. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  191. 493.821:00c4:00c8:trace:seh:call_stack_handlers found wine frame 000000000051D600 rsp 51d740 handler 000000007BC6D250
  192. 493.821:00c4:00c8:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000051D4A0, frame=000000000051D600 context=000000000051CA00, dispatch=000000000051C8D0)
  193. 493.821:00c4:00c8:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000051D600 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  194. 493.821:00c4:00c8:trace:seh:RtlUnwindEx info[0]=0000000000000000
  195. 493.821:00c4:00c8:trace:seh:RtlUnwindEx info[1]=0000000000000000
  196. 493.821:00c4:00c8:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000051d600 rcx=000000000051c2f0 rdx=000000007bc6d126
  197. 493.821:00c4:00c8:trace:seh:RtlUnwindEx rsi=000000000051cfb0 rdi=000000000051ca00 rbp=000000000051bda0 rsp=000000000051bc20
  198. 493.821:00c4:00c8:trace:seh:RtlUnwindEx r8=000000000051d4a0 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  199. 493.821:00c4:00c8:trace:seh:RtlUnwindEx r12=000000000051d4a0 r13=000000000051c2f0 r14=000000007bc7f352 r15=000000000051d4a0
  200. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 51bc20
  201. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 5fd60-6062e
  202. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  203. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  204. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  205. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  206. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  207. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  208. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  209. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  210. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  211. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  212. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 51c2c0
  213. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 60630-60658
  214. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  215. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  216. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 51c7d0
  217. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 6d10c-6d128
  218. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  219. 493.821:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  220. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  221. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  222. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x1: pushq %rbp
  223. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 51c800
  224. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 6d130-6d15a
  225. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  226. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  227. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 51c830
  228. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 6d250-6d272
  229. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  230. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  231. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 51c860
  232. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 5f200-5f741
  233. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  234. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  235. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  236. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  237. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  238. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  239. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  240. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  241. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  242. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  243. 493.821:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 51cf20
  244. 493.821:00c4:00c8:trace:seh:dump_unwind_info **** func 5f750-5fa89
  245. 493.821:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  246. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  247. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rbx
  248. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rsi
  249. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %rdi
  250. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x7: pushq %rbp
  251. 493.821:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r12
  252. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r13
  253. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r14
  254. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 51cfb0
  255. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 5d964-5d999
  256. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  257. 493.822:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  258. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  259. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  260. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  261. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  262. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 51d5e0
  263. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  264. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  265. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  266. 493.822:00c4:00c8:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 51d5e0
  267. 493.822:00c4:00c8:err:module:import_dll Loading library vulkan-1.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\RESIDENT EVIL 7 biohazard\\amd_ags_x64.dll") failed (error c000007b).
  268. 493.822:00c4:00c8:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00c8
  269. 493.822:00c4:00c8:trace:seh:dispatch_exception info[0]=0000000000000000
  270. 493.822:00c4:00c8:trace:seh:dispatch_exception info[1]=0000000000000000
  271. 493.822:00c4:00c8:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000051e0c0 rdx=00000000ffffffff
  272. 493.822:00c4:00c8:trace:seh:dispatch_exception rsi=000000000051e750 rdi=0000000000000000 rbp=000000000051e498 rsp=000000000051e080
  273. 493.822:00c4:00c8:trace:seh:dispatch_exception r8=000000000051e498 r9=000000000051e4e0 r10=000000000000000a r11=0000000000000246
  274. 493.822:00c4:00c8:trace:seh:dispatch_exception r12=0000000000016198 r13=000000000051e4b0 r14=000000000051e4c0 r15=000000000051e498
  275. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 51e080
  276. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  277. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  278. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  279. 493.822:00c4:00c8:trace:seh:call_stack_handlers found wine frame 000000000051E0A0 rsp 51e1e0 handler 000000007BC6D250
  280. 493.822:00c4:00c8:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000051DF40, frame=000000000051E0A0 context=000000000051D4A0, dispatch=000000000051D370)
  281. 493.822:00c4:00c8:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000051E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  282. 493.822:00c4:00c8:trace:seh:RtlUnwindEx info[0]=0000000000000000
  283. 493.822:00c4:00c8:trace:seh:RtlUnwindEx info[1]=0000000000000000
  284. 493.822:00c4:00c8:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000051e0a0 rcx=000000000051cd90 rdx=000000007bc6d126
  285. 493.822:00c4:00c8:trace:seh:RtlUnwindEx rsi=000000000051da50 rdi=000000000051d4a0 rbp=000000000051c840 rsp=000000000051c6c0
  286. 493.822:00c4:00c8:trace:seh:RtlUnwindEx r8=000000000051df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  287. 493.822:00c4:00c8:trace:seh:RtlUnwindEx r12=000000000051df40 r13=000000000051cd90 r14=000000007bc7f352 r15=000000000051df40
  288. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 51c6c0
  289. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 5fd60-6062e
  290. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  291. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  292. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  293. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  294. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  295. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  296. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  297. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  298. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  299. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  300. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 51cd60
  301. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 60630-60658
  302. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  303. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  304. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 51d270
  305. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 6d10c-6d128
  306. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  307. 493.822:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  308. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  309. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  310. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x1: pushq %rbp
  311. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 51d2a0
  312. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 6d130-6d15a
  313. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  314. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  315. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 51d2d0
  316. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 6d250-6d272
  317. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  318. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  319. 493.822:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 51d300
  320. 493.822:00c4:00c8:trace:seh:dump_unwind_info **** func 5f200-5f741
  321. 493.822:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  322. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  323. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  324. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  325. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  326. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  327. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  328. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  329. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  330. 493.822:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  331. 493.823:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 51d9c0
  332. 493.823:00c4:00c8:trace:seh:dump_unwind_info **** func 5f750-5fa89
  333. 493.823:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  334. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  335. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rbx
  336. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rsi
  337. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %rdi
  338. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x7: pushq %rbp
  339. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r12
  340. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r13
  341. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r14
  342. 493.823:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 51da50
  343. 493.823:00c4:00c8:trace:seh:dump_unwind_info **** func 5d964-5d999
  344. 493.823:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  345. 493.823:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  346. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  347. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  348. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  349. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  350. 493.823:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 51e080
  351. 493.823:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  352. 493.823:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  353. 493.823:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  354. 493.823:00c4:00c8:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 51e080
  355. 493.823:00c4:00c8:err:module:import_dll Loading library amd_ags_x64.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\RESIDENT EVIL 7 biohazard\\re7.exe") failed (error c000007b).
  356. 493.831:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000063140000: builtin
  357. 493.832:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 0000000063800000: builtin
  358. 493.834:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000006DD80000: builtin
  359. 493.835:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 0000000069380000: builtin
  360. 493.837:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 000000006D580000: builtin
  361. 493.837:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0000000000520000: native
  362. 493.839:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000061540000: builtin
  363. 493.841:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 00000000620C0000: builtin
  364. 493.842:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 0000000068AC0000: builtin
  365. 493.844:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000069B80000: builtin
  366. 493.845:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000070580000: builtin
  367. 493.847:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 000000006A4C0000: builtin
  368. 493.847:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0000000180000000: native
  369. 493.860:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  370. 493.860:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F3ADFF30000: builtin
  371. 493.860:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F3ADFFA0000: builtin
  372. 493.860:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\opengl32.dll" at 000000007A850000: builtin
  373. 493.866:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  374. 493.866:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  375. 493.866:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F3ADFCA0000: builtin
  376. 493.866:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wined3d.dll" at 00007F3AE0160000: builtin
  377. 493.866:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00007F3AE0310000: builtin
  378. 493.867:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F3ADFBB0000: builtin
  379. 493.870:00c4:00c8:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00c8
  380. 493.870:00c4:00c8:trace:seh:dispatch_exception info[0]=0000000000000000
  381. 493.870:00c4:00c8:trace:seh:dispatch_exception info[1]=0000000000000000
  382. 493.870:00c4:00c8:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000051d840 rdx=00000000ffffffff
  383. 493.870:00c4:00c8:trace:seh:dispatch_exception rsi=000000000051ded0 rdi=0000000000000000 rbp=000000000051dc18 rsp=000000000051d800
  384. 493.870:00c4:00c8:trace:seh:dispatch_exception r8=000000000051dc18 r9=000000000051dc60 r10=0000000000000000 r11=0000000000000246
  385. 493.870:00c4:00c8:trace:seh:dispatch_exception r12=0000000000016198 r13=000000000051dc30 r14=000000000051dc40 r15=000000000051dc18
  386. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 51d800
  387. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  388. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  389. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  390. 493.870:00c4:00c8:trace:seh:call_stack_handlers found wine frame 000000000051D820 rsp 51d960 handler 000000007BC6D250
  391. 493.870:00c4:00c8:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000051D6C0, frame=000000000051D820 context=000000000051CC20, dispatch=000000000051CAF0)
  392. 493.870:00c4:00c8:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000051D820 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  393. 493.870:00c4:00c8:trace:seh:RtlUnwindEx info[0]=0000000000000000
  394. 493.870:00c4:00c8:trace:seh:RtlUnwindEx info[1]=0000000000000000
  395. 493.870:00c4:00c8:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000051d820 rcx=000000000051c510 rdx=000000007bc6d126
  396. 493.870:00c4:00c8:trace:seh:RtlUnwindEx rsi=000000000051d1d0 rdi=000000000051cc20 rbp=000000000051bfc0 rsp=000000000051be40
  397. 493.870:00c4:00c8:trace:seh:RtlUnwindEx r8=000000000051d6c0 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  398. 493.870:00c4:00c8:trace:seh:RtlUnwindEx r12=000000000051d6c0 r13=000000000051c510 r14=000000007bc7f352 r15=000000000051d6c0
  399. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 51be40
  400. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 5fd60-6062e
  401. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  402. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  403. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  404. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  405. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  406. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  407. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  408. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  409. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  410. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  411. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 51c4e0
  412. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 60630-60658
  413. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  414. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  415. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 51c9f0
  416. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 6d10c-6d128
  417. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  418. 493.870:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  419. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  420. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  421. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x1: pushq %rbp
  422. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 51ca20
  423. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 6d130-6d15a
  424. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  425. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  426. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 51ca50
  427. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 6d250-6d272
  428. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  429. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  430. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 51ca80
  431. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 5f200-5f741
  432. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  433. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  434. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  435. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  436. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  437. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  438. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  439. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  440. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  441. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  442. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 51d140
  443. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 5f750-5fa89
  444. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  445. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  446. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rbx
  447. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rsi
  448. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %rdi
  449. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x7: pushq %rbp
  450. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r12
  451. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r13
  452. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r14
  453. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 51d1d0
  454. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 5d964-5d999
  455. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  456. 493.870:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  457. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  458. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  459. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  460. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  461. 493.870:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 51d800
  462. 493.870:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  463. 493.870:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  464. 493.870:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  465. 493.870:00c4:00c8:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 51d800
  466. 493.870:00c4:00c8:err:module:import_dll Loading library vulkan-1.dll (which is needed by L"C:\\windows\\system32\\d3d11.dll") failed (error c000007b).
  467. 493.870:00c4:00c8:err:module:import_dll Library d3d11.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\RESIDENT EVIL 7 biohazard\\re7.exe") not found
  468. 493.894:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  469. 493.898:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  470. 493.898:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\propsys.dll" at 0000000069C80000: builtin
  471. 493.901:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rtworkq.dll" at 0000000065680000: builtin
  472. 493.901:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MFPlat.DLL" at 0000000071200000: builtin
  473. 493.903:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 0000000066200000: builtin
  474. 493.908:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
  475. 493.908:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 0000000000810000: builtin
  476. 493.931:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  477. 493.932:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
  478. 493.932:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 000000006E6C0000: builtin
  479. 493.933:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  480. 493.934:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007F3ADFB30000: builtin
  481. 493.936:00c4:00c8:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007BC31884 ip=7bc31884 tid=00c8
  482. 493.936:00c4:00c8:trace:seh:dispatch_exception info[0]=0000000000000000
  483. 493.936:00c4:00c8:trace:seh:dispatch_exception info[1]=0000000000000000
  484. 493.936:00c4:00c8:trace:seh:dispatch_exception rax=0000000000000000 rbx=00000000c0000135 rcx=000000000051e0c0 rdx=00000000ffffffff
  485. 493.936:00c4:00c8:trace:seh:dispatch_exception rsi=000000000051e750 rdi=0000000000000000 rbp=000000000051e498 rsp=000000000051e080
  486. 493.936:00c4:00c8:trace:seh:dispatch_exception r8=000000000051e498 r9=000000000051e4e0 r10=0000000000000000 r11=0000000000000246
  487. 493.936:00c4:00c8:trace:seh:dispatch_exception r12=0000000000016198 r13=000000000051e4b0 r14=000000000051e4c0 r15=000000000051e498
  488. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 1 rip 7bc31884 rsp 51e080
  489. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  490. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  491. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  492. 493.936:00c4:00c8:trace:seh:call_stack_handlers found wine frame 000000000051E0A0 rsp 51e1e0 handler 000000007BC6D250
  493. 493.936:00c4:00c8:trace:seh:call_teb_handler calling TEB handler 000000007BC6D250 (rec=000000000051DF40, frame=000000000051E0A0 context=000000000051D4A0, dispatch=000000000051D370)
  494. 493.936:00c4:00c8:trace:seh:RtlUnwindEx code=c0000005 flags=2 end_frame=000000000051E0A0 target_ip=000000007BC6D126 rip=000000007bc5fdb2
  495. 493.936:00c4:00c8:trace:seh:RtlUnwindEx info[0]=0000000000000000
  496. 493.936:00c4:00c8:trace:seh:RtlUnwindEx info[1]=0000000000000000
  497. 493.936:00c4:00c8:trace:seh:RtlUnwindEx rax=000000003fff8000 rbx=000000000051e0a0 rcx=000000000051cd90 rdx=000000007bc6d126
  498. 493.936:00c4:00c8:trace:seh:RtlUnwindEx rsi=000000000051da50 rdi=000000000051d4a0 rbp=000000000051c840 rsp=000000000051c6c0
  499. 493.936:00c4:00c8:trace:seh:RtlUnwindEx r8=000000000051df40 r9=000000007bc6d160 r10=000000000000000a r11=0000000000000246
  500. 493.936:00c4:00c8:trace:seh:RtlUnwindEx r12=000000000051df40 r13=000000000051cd90 r14=000000007bc7f352 r15=000000000051df40
  501. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp 51c6c0
  502. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 5fd60-6062e
  503. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  504. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  505. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  506. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  507. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  508. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  509. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  510. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  511. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  512. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  513. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp 51cd60
  514. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 60630-60658
  515. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  516. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  517. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d126 rsp 51d270
  518. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 6d10c-6d128
  519. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0C4 flags 0 prolog 0x8 bytes function 000000007BC6D10C-000000007BC6D128
  520. 493.936:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  521. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  522. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  523. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x1: pushq %rbp
  524. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d159 rsp 51d2a0
  525. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 6d130-6d15a
  526. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0D0 flags 0 prolog 0x4 bytes function 000000007BC6D130-000000007BC6D15A
  527. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  528. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc6d271 rsp 51d2d0
  529. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 6d250-6d272
  530. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8B0F8 flags 0 prolog 0x4 bytes function 000000007BC6D250-000000007BC6D272
  531. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  532. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp 51d300
  533. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 5f200-5f741
  534. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  535. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  536. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xc: pushq %rbx
  537. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xb: pushq %rsi
  538. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rdi
  539. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rbp
  540. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %r12
  541. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r13
  542. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r14
  543. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r15
  544. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp 51d9c0
  545. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 5f750-5fa89
  546. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  547. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  548. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0xa: pushq %rbx
  549. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x9: pushq %rsi
  550. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x8: pushq %rdi
  551. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x7: pushq %rbp
  552. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x6: pushq %r12
  553. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x4: pushq %r13
  554. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2: pushq %r14
  555. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc5d998 rsp 51da50
  556. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 5d964-5d999
  557. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC8A678 flags 0 prolog 0x2f bytes function 000000007BC5D964-000000007BC5D999
  558. 493.936:00c4:00c8:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  559. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2f: leaq 0x0(%rsp),rbp
  560. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rsi
  561. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rdi
  562. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x2f: pushq %rbp
  563. 493.936:00c4:00c8:trace:seh:RtlVirtualUnwind type 2 rip 7bc31884 rsp 51e080
  564. 493.936:00c4:00c8:trace:seh:dump_unwind_info **** func 31830-318da
  565. 493.936:00c4:00c8:trace:seh:dump_unwind_info unwind info at 000000007BC88DD8 flags 0 prolog 0x7 bytes function 000000007BC31830-000000007BC318DA
  566. 493.936:00c4:00c8:trace:seh:dump_unwind_info 0x7: subq $0x158,%rsp
  567. 493.936:00c4:00c8:trace:seh:RtlRestoreContext returning to 7bc6d126 stack 51e080
  568. 493.936:00c4:00c8:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\RESIDENT EVIL 7 biohazard\\re7.exe") failed (error c000007b).
  569. 493.938:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 00007F3ADE1C0000: builtin
  570. 493.941:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 00000000008D0000: builtin
  571. 493.941:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 0000000064340000: builtin
  572. 493.942:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CONCRT140.dll" at 00000000008F0000: native
  573. 493.945:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MFReadWrite.dll" at 000000006CD80000: builtin
  574. 493.955:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  575. 493.955:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  576. 493.955:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007F3ADD790000: builtin
  577. 493.958:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 00007F3ADD750000: builtin
  578. 493.958:00c4:00c8:err:module:LdrInitializeThunk Importing dlls for L"Z:\\media\\Games\\Steam\\steamapps\\common\\RESIDENT EVIL 7 biohazard\\re7.exe" failed, status c0000135
  579. 494.985:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  580. 494.986:003c:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  581. 494.986:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  582. 494.987:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  583. 494.987:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  584. 494.987:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  585. 494.987:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000095528 r11=0000000000e8ecd8
  586. 494.987:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005c7c0 r14=0000000000000000 r15=00000000ffba0000
  587. 494.987:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  588. 494.987:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  589. 494.987:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  590. 494.987:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  591. 494.987:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  592. 494.987:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  593. 494.987:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  594. 494.987:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  595. 494.987:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  596. 494.987:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  597. 494.987:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  598. 494.987:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  599. 494.987:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  600. 494.987:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  601. 494.987:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  602. 494.987:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  603. 494.987:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  604. 494.987:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  605. 494.987:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  606. 494.987:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  607. 494.987:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  608. 494.987:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  609. 494.987:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  610. 494.987:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  611. 494.987:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  612. 494.987:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  613. 494.987:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  614. 494.987:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  615. 494.987:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  616. 494.987:0084:0094:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  617. 494.987:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  618. 494.987:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  619. 494.987:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  620. 494.987:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  621. 494.987:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  622. 494.987:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  623. 494.987:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  624. 494.987:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  625. 494.987:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  626. 494.987:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  627. 494.988:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  628. 494.988:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  629. 494.988:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  630. 494.988:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  631. 494.988:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  632. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  633. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  634. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  635. 494.988:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  636. 494.988:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  637. 494.988:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  638. 494.988:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  639. 494.988:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  640. 494.988:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  641. 494.988:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  642. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  643. 494.988:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  644. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  645. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  646. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  647. 494.988:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  648. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  649. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  650. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  651. 494.988:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  652. 494.988:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  653. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  654. 494.988:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  655. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  656. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  657. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  658. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  659. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  660. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  661. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  662. 494.988:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  663. 494.988:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  664. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  665. 494.988:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  666. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  667. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  668. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  669. 494.988:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  670. 494.988:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  671. 494.988:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  672. 494.988:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  673. 494.988:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  674. 494.988:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  675. 494.988:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  676. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  677. 494.988:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  678. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  679. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  680. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  681. 494.988:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  682. 494.988:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  683. 494.988:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  684. 494.988:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  685. 494.988:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  686. 494.988:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  687. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  688. 494.988:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  689. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  690. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  691. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  692. 494.988:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  693. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  694. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  695. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  696. 494.988:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  697. 494.988:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  698. 494.988:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  699. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  700. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  701. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  702. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  703. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  704. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  705. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  706. 494.988:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  707. 494.988:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  708. 494.988:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  709. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  710. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  711. 494.988:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  712. 494.988:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  713. 494.988:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  714. 494.988:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  715. 494.988:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  716. 494.988:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  717. 494.988:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  718. 494.988:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  719. 494.988:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  720. 494.988:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  721. 494.988:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  722. 494.988:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  723. 494.989:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  724. 494.989:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  725. 494.989:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  726. 494.989:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  727. 494.989:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  728. 494.989:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  729. 494.989:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a550 rbp=0000000000000000 rsp=0000000000e8eea0
  730. 494.989:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000095528 r11=0000000000e8ef18
  731. 494.989:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005c7c0 r14=0000000000000000 r15=00000000ffba0000
  732. 494.989:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  733. 494.989:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  734. 494.989:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  735. 494.989:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  736. 494.989:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  737. 494.989:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  738. 494.989:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  739. 494.989:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  740. 494.989:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  741. 494.989:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  742. 494.989:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  743. 494.989:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  744. 494.989:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  745. 494.989:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  746. 494.989:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  747. 494.989:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  748. 494.989:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  749. 494.989:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  750. 494.989:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  751. 494.989:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  752. 494.989:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  753. 494.989:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  754. 494.989:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  755. 494.989:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  756. 494.989:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  757. 494.989:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  758. 494.989:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  759. 494.989:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  760. 494.989:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  761. 494.989:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  762. 494.989:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  763. 494.989:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  764. 494.989:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  765. 494.989:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  766. 494.989:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  767. 494.989:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  768. 494.990:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  769. 494.990:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  770. 494.990:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  771. 494.990:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  772. 494.990:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  773. 494.990:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  774. 494.990:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  775. 494.990:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  776. 494.990:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  777. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  778. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  779. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  780. 494.990:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  781. 494.990:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  782. 494.990:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  783. 494.990:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  784. 494.990:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  785. 494.990:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  786. 494.990:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  787. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  788. 494.990:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  789. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  790. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  791. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  792. 494.990:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  793. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  794. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  795. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  796. 494.990:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  797. 494.990:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  798. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  799. 494.990:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  800. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  801. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  802. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  803. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  804. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  805. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  806. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  807. 494.990:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  808. 494.990:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  809. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  810. 494.990:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  811. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  812. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  813. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  814. 494.990:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  815. 494.990:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  816. 494.990:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  817. 494.990:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  818. 494.990:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  819. 494.990:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  820. 494.990:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  821. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  822. 494.990:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  823. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  824. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  825. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  826. 494.990:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  827. 494.990:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  828. 494.990:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  829. 494.990:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  830. 494.990:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  831. 494.990:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  832. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  833. 494.990:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  834. 494.990:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  835. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  836. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  837. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  838. 494.990:0030:00d0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  839. 494.990:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  840. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  841. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  842. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  843. 494.990:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  844. 494.990:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  845. 494.990:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  846. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  847. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  848. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  849. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  850. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  851. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  852. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  853. 494.990:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  854. 494.990:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  855. 494.990:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  856. 494.990:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  857. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  858. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  859. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  860. 494.990:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  861. 494.990:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  862. 494.990:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  863. 494.990:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  864. 494.990:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  865. 494.990:0030:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  866. 494.990:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  867. 494.990:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  868. 494.990:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  869. 494.990:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  870. 494.990:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  871. 494.990:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  872. 494.990:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  873. 494.990:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  874. 494.990:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  875. 494.990:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  876. 494.991:0058:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  877. 494.991:0058:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  878. 494.991:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  879. 494.993:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  880. 494.994:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  881. 494.995:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  882. 494.995:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  883. 494.997:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  884. 495.090:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  885. 495.090:0030:00e0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1f1fda0,4,(nil))
  886. 495.091:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  887. 495.091:0030:00e8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  888. 495.091:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  889. pid 8311 != 8310, skipping destruction (fork without exec?)
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×