Advertisement
Guest User

Untitled

a guest
Jul 11th, 2022
76
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 131.14 KB | None | 0 0
  1. ======================
  2. Proton: 1655928813 proton-6.3-8f
  3. SteamGameId: 289070
  4. Command: ["/mnt/data/SteamLibrary/steamapps/common/Sid Meier's Civilization VI/2KLauncher/LauncherPatcher.exe", '-steam_auto_login']
  5. Options: {'forcelgadd'}
  6. depot: 0.20220602.55
  7. pressure-vessel: 0.20220601.0
  8. scripts: v0.20220527.0-0-g8669533
  9. soldier: 0.20220601.0 soldier 0.20220601.0
  10. Kernel: Linux 5.18.10-200.fc36.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jul 7 17:21:38 UTC 2022 x86_64
  11. ======================
  12. fsync: up and running.
  13. wine: RLIMIT_NICE is <= 20, unable to use setpriority safely
  14. 30430.843:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
  15. 30430.844:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  16. 30430.844:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  17. 30430.844:0028:002c:trace:seh:install_bpf Installing seccomp filters.
  18. 30430.844:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  19. 30430.845:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  20. 30430.846:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  21. 30430.846:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  22. 30430.846:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  23. 30430.847:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FF520A40000: builtin
  24. 30430.874:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
  25. 30430.875:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  26. 30430.875:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  27. 30430.875:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  28. 30430.875:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  29. 30430.876:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  30. 30430.877:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  31. 30430.877:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  32. 30430.877:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  33. 30430.877:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  34. 30430.879:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  35. 30430.879:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  36. 30430.879:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
  37. 30430.912:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
  38. 30430.913:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  39. 30430.913:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  40. 30430.913:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  41. 30430.913:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  42. 30430.914:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  43. 30430.915:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  44. 30430.915:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  45. 30430.915:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  46. 30430.915:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
  47. 30430.920:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  48. 30430.925:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
  49. 30430.928:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F521F650000: builtin
  50. 30430.933:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  51. 30430.933:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  52. 30430.937:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007F521F2A0000: builtin
  53. 30430.937:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
  54. 30430.961:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
  55. 30430.962:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 30430.962:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  57. 30430.962:005c:0060:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  58. 30430.962:005c:0060:trace:seh:install_bpf Seccomp filters already installed.
  59. 30430.964:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  60. 30430.964:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  61. 30430.964:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  62. 30430.964:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  63. 30430.965:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  64. 30430.965:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  65. 30430.967:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  66. 30430.967:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  67. 30430.967:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  68. 30431.131:005c:0060:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  69. 30431.149:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  70. 30431.149:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  71. 30431.149:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  72. 30431.174:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
  73. 30431.175:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  74. 30431.175:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  75. 30431.175:0074:0078:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  76. 30431.175:0074:0078:trace:seh:install_bpf Seccomp filters already installed.
  77. 30431.176:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  78. 30431.177:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  79. 30431.177:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  80. 30431.177:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  81. 30431.177:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
  82. 30431.182:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  83. 30431.187:0074:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
  84. 30431.190:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F1852330000: builtin
  85. 30431.191:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  86. 30431.191:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  87. 30431.194:0074:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x101f180,30,(nil))
  88. 30431.198:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 000000031DF10000: builtin
  89. 30431.198:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
  90. 30431.201:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
  91. 30431.203:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  92. 30431.203:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  93. 30431.212:0074:0080:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  94. 30431.226:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  95. 30431.226:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  96. 30431.226:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  97. 30431.229:0074:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x1c5f960,30,(nil))
  98. 30431.234:0074:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x226e980,30,(nil))
  99. 30431.240:0074:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x287f960,30,(nil))
  100. 30431.246:0074:00a4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x349f960,30,(nil))
  101. 30431.253:0074:00ac:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x40bf960,30,(nil))
  102. 30431.332:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F1851420000: builtin
  103. 30431.359:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
  104. 30431.360:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  105. 30431.360:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  106. 30431.360:00bc:00c0:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  107. 30431.360:00bc:00c0:trace:seh:install_bpf Seccomp filters already installed.
  108. 30431.362:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  109. 30431.362:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  110. 30431.363:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  111. 30431.363:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  112. 30431.367:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
  113. 30431.368:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  114. 30431.392:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\tabtip.exe" at 0000000140000000: builtin
  115. 30431.393:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  116. 30431.393:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  117. 30431.393:00d0:00d4:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  118. 30431.393:00d0:00d4:trace:seh:install_bpf Seccomp filters already installed.
  119. 30431.395:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  120. 30431.395:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  121. 30431.396:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  122. 30431.396:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  123. 30431.396:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  124. 30431.397:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  125. 30431.398:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  126. 30431.398:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  127. 30431.398:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  128. 30431.398:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  129. 30431.398:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  130. 30431.399:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  131. 30431.399:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  132. 30431.399:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FF124820000: builtin
  133. 30431.412:00d0:00d4:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  134. 30431.425:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  135. 30431.432:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
  136. 30431.432:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  137. 30431.433:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  138. 30431.433:00d8:00dc:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  139. 30431.433:00d8:00dc:trace:seh:install_bpf Seccomp filters already installed.
  140. 30431.434:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  141. 30431.435:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  142. 30431.435:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  143. 30431.435:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  144. 30431.435:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  145. 30431.436:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  146. 30431.437:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  147. 30431.437:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  148. 30431.437:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  149. 30431.450:00d8:00dc:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  150. 30431.464:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  151. 30431.464:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  152. 30431.464:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  153. 30431.468:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FC8B13C0000: builtin
  154. 30431.498:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  155. 30431.498:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  156. 30431.498:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FC8AB420000: builtin
  157. 30431.503:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  158. 30431.503:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
  159. 30431.504:00d8:00dc:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01239E ip=000000007B01239E tid=00dc
  160. 30431.504:00d8:00dc:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  161. 30431.504:00d8:00dc:trace:seh:dispatch_exception rax=000000007b012350 rbx=000000000073e9d8 rcx=000000000073e6f0 rdx=0000000000000000
  162. 30431.504:00d8:00dc:trace:seh:dispatch_exception rsi=000000000000006c rdi=000000000023a370 rbp=0000000040010028 rsp=000000000073e6d0
  163. 30431.504:00d8:00dc:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000230020 r11=00000000a55a5aa5
  164. 30431.504:00d8:00dc:trace:seh:dispatch_exception r12=000000000073e9d8 r13=0000000000157da0 r14=0000000000162a50 r15=0000000000000005
  165. 30431.504:00d8:00dc:trace:seh:call_vectored_handlers calling handler at 000000007B00C690 code=6ba flags=0
  166. 30431.504:00d8:00dc:trace:seh:call_vectored_handlers handler at 000000007B00C690 returned 0
  167. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01239E rsp 000000000073E6D0
  168. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 12350-123d7
  169. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  170. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  171. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: pushq %rsi
  172. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rdi
  173. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000073E7B0
  174. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 42800-42847
  175. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  176. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  177. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000073E7E0
  178. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 96b0-9737
  179. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  180. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  181. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x3: pushq %rbx
  182. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %rsi
  183. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x1: pushq %rdi
  184. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 1 rip 0000000327044BF0 rsp 000000000073E840
  185. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 24af0-24d51
  186. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000032705A67C flags 0 prolog 0x10 bytes function 0000000327044AF0-0000000327044D51
  187. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
  188. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rbx
  189. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x8: pushq %rsi
  190. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x7: pushq %rdi
  191. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x6: pushq %r12
  192. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: pushq %r13
  193. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r14
  194. 30431.504:00d8:00dc:trace:seh:call_stack_handlers found wine frame 000000000073E8B0 rsp 000000000073EBB0 handler 0000000327043B30
  195. 30431.504:00d8:00dc:trace:seh:call_teb_handler calling TEB handler 0000000327043B30 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073DC10, dispatch=000000000073DAE0)
  196. 30431.504:00d8:00dc:trace:seh:call_teb_handler handler at 0000000327043B30 returned 1
  197. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 1 rip 00000003270397B7 rsp 000000000073EBB0
  198. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 196d0-197dd
  199. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396D0-00000003270397DD
  200. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
  201. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x3: pushq %rbx
  202. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r12
  203. 30431.504:00d8:00dc:trace:seh:call_stack_handlers found wine frame 000000000073EBF0 rsp 000000000073ED40 handler 0000000327045FB0
  204. 30431.504:00d8:00dc:trace:seh:call_teb_handler calling TEB handler 0000000327045FB0 (rec=000000000073E6F0, frame=000000000073EBF0 context=000000000073DC10, dispatch=000000000073DAE0)
  205. 30431.504:00d8:00dc:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000073EBF0 target_ip=0000000327045F4A rip=000000007bc5ad8d
  206. 30431.504:00d8:00dc:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=000000000073e8b0 rcx=000000000073d4e0 rdx=0000000027045f4a
  207. 30431.504:00d8:00dc:trace:seh:RtlUnwindEx rsi=000000000073cf90 rdi=000000000073dc10 rbp=000000000073d9e0 rsp=000000000073ce20
  208. 30431.504:00d8:00dc:trace:seh:RtlUnwindEx r8=000000000073e6f0 r9=0000000027045f80 r10=000000000073d6d6 r11=0000000000000293
  209. 30431.504:00d8:00dc:trace:seh:RtlUnwindEx r12=000000000073e6f0 r13=000000000073d4e0 r14=000000000073ebf0 r15=000000007bc69930
  210. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AD8D rsp 000000000073CE20
  211. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 5ad40-5b486
  212. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007BC839B4 flags 0 prolog 0x13 bytes function 000000007BC5AD40-000000007BC5B486
  213. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x13: subq $0x648,%rsp
  214. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xc: pushq %rbx
  215. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xb: pushq %rsi
  216. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: pushq %rdi
  217. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rbp
  218. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x8: pushq %r12
  219. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x6: pushq %r13
  220. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: pushq %r14
  221. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r15
  222. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B4AF rsp 000000000073D4B0
  223. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 5b490-5b4b8
  224. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007BC839CC flags 0 prolog 0x7 bytes function 000000007BC5B490-000000007BC5B4B8
  225. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  226. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045F4A rsp 000000000073D9C0
  227. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 25f30-25f4c
  228. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000032705A754 flags 0 prolog 0x8 bytes function 0000000327045F30-0000000327045F4C
  229. 30431.504:00d8:00dc:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  230. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  231. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  232. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x1: pushq %rbp
  233. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045F79 rsp 000000000073D9F0
  234. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 25f50-25f7a
  235. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000032705A760 flags 0 prolog 0x4 bytes function 0000000327045F50-0000000327045F7A
  236. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  237. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327046004 rsp 000000000073DA20
  238. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 25fb0-26005
  239. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000032705A770 flags 0 prolog 0xa bytes function 0000000327045FB0-0000000327046005
  240. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  241. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x6: pushq %r12
  242. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: pushq %r13
  243. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r14
  244. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A0CD rsp 000000000073DA70
  245. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 59e90-5a3a1
  246. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007BC8395C flags 0 prolog 0x13 bytes function 000000007BC59E90-000000007BC5A3A1
  247. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  248. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xc: pushq %rbx
  249. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xb: pushq %rsi
  250. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: pushq %rdi
  251. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rbp
  252. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x8: pushq %r12
  253. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x6: pushq %r13
  254. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: pushq %r14
  255. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r15
  256. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A6B7 rsp 000000000073E130
  257. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 5a3b0-5a8bf
  258. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007BC83974 flags 0 prolog 0x10 bytes function 000000007BC5A3B0-000000007BC5A8BF
  259. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
  260. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xc: pushq %rbx
  261. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xb: pushq %rsi
  262. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: pushq %rdi
  263. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rbp
  264. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x8: pushq %r12
  265. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x6: pushq %r13
  266. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: pushq %r14
  267. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r15
  268. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583E8 rsp 000000000073E1D0
  269. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 58380-583f5
  270. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007BC838C8 flags 0 prolog 0x7 bytes function 000000007BC58380-000000007BC583F5
  271. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  272. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01239E rsp 000000000073E6D0
  273. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 12350-123d7
  274. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  275. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  276. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: pushq %rsi
  277. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rdi
  278. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000073E7B0
  279. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 42800-42847
  280. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  281. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  282. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000073E7E0
  283. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 96b0-9737
  284. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  285. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  286. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x3: pushq %rbx
  287. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %rsi
  288. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x1: pushq %rdi
  289. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327044BF0 rsp 000000000073E840
  290. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 24af0-24d51
  291. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 000000032705A67C flags 0 prolog 0x10 bytes function 0000000327044AF0-0000000327044D51
  292. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
  293. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x9: pushq %rbx
  294. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x8: pushq %rsi
  295. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x7: pushq %rdi
  296. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x6: pushq %r12
  297. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x4: pushq %r13
  298. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r14
  299. 30431.504:00d8:00dc:trace:seh:RtlUnwindEx found builtin frame 000000000073E8B0 handler 0000000327043B30
  300. 30431.504:00d8:00dc:trace:seh:call_teb_unwind_handler calling TEB handler 0000000327043B30 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073D4E0, dispatch=000000000073CEA0)
  301. 30431.504:00d8:00dc:trace:seh:call_teb_unwind_handler handler at 0000000327043B30 returned 1
  302. 30431.504:00d8:00dc:trace:seh:RtlVirtualUnwind type 2 rip 00000003270397B7 rsp 000000000073EBB0
  303. 30431.504:00d8:00dc:trace:seh:dump_unwind_info **** func 196d0-197dd
  304. 30431.504:00d8:00dc:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396D0-00000003270397DD
  305. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
  306. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x3: pushq %rbx
  307. 30431.504:00d8:00dc:trace:seh:dump_unwind_info 0x2: pushq %r12
  308. 30431.504:00d8:00dc:trace:seh:RtlRestoreContext returning to 0000000327045F4A stack 000000000073EBB0
  309. 30431.527:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
  310. 30431.528:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  311. 30431.528:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  312. 30431.528:00ec:00f0:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  313. 30431.528:00ec:00f0:trace:seh:install_bpf Seccomp filters already installed.
  314. 30431.529:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  315. 30431.530:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  316. 30431.530:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  317. 30431.530:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  318. 30431.531:00ec:00f0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  319. 30431.542:0030:00e8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3f8fe2c,4,(nil))
  320. 30431.544:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FF124490000: builtin
  321. 30431.564:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  322. 30431.564:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleacc.dll" at 00000002522E0000: builtin
  323. 30431.564:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uiautomationcore.dll" at 0000000330A70000: builtin
  324. 30431.565:003c:0050:trace:seh:NtQueryInformationThread (0x64,0,0x162f810,30,(nil))
  325. 30431.567:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  326. 30431.568:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  327. 30431.569:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  328. 30431.569:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  329. 30431.569:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  330. 30431.570:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  331. 30431.570:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  332. 30431.570:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  333. 30431.570:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  334. 30431.570:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FF512220000: builtin
  335. 30431.578:0028:002c:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  336. 30431.591:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  337. 30431.594:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 00007FCC83280000: builtin
  338. 30431.595:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  339. 30431.595:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  340. 30431.595:0020:0024:trace:seh:install_bpf Installing seccomp filters.
  341. 30431.595:0020:0024:trace:seh:check_bpf_jit_enable enabled 0x31.
  342. 30431.597:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  343. 30431.598:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  344. 30431.598:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  345. 30431.598:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  346. 30431.599:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  347. 30431.599:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  348. 30431.600:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  349. 30431.601:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  350. 30431.601:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  351. 30431.601:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  352. 30431.601:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  353. 30431.602:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  354. 30431.602:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  355. 30431.602:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FCC82020000: builtin
  356. 30431.614:0020:0024:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  357. 30431.628:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  358. 30431.649:0020:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FCC81ED0000: builtin
  359. Setting breakpad minidump AppID = 289070
  360. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198225982156 [API loaded no]
  361. 30431.666:0020:0120:err:steam:initialize_vr_data Could not load libopenvr_api.so.
  362. 30431.666:0020:0120:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x125fe2c,4,(nil))
  363. 30431.693:0124:0128:trace:loaddll:build_module Loaded L"Z:\\mnt\\data\\SteamLibrary\\steamapps\\common\\Sid Meier's Civilization VI\\2KLauncher\\LauncherPatcher.exe" at 00400000: native
  364. 30431.694:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  365. 30431.694:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
  366. 30431.696:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 6A280000: builtin
  367. 30431.697:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
  368. 30431.697:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
  369. 30431.697:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 61740000: builtin
  370. 30431.697:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
  371. 30431.699:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
  372. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
  373. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
  374. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 6ED00000: builtin
  375. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
  376. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
  377. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
  378. 30431.702:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHLWAPI.dll" at 64A40000: builtin
  379. 30431.703:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 66240000: builtin
  380. 30431.703:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 6E8C0000: builtin
  381. 30431.704:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 7E8D0000: builtin
  382. 30431.705:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WLDAP32.dll" at 7E890000: builtin
  383. 30431.706:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 7DE30000: builtin
  384. 30431.707:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 64EC0000: builtin
  385. 30431.708:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 68080000: builtin
  386. 30431.708:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 69600000: builtin
  387. 30431.709:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 6FA80000: builtin
  388. 30431.710:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINTRUST.dll" at 6F4C0000: builtin
  389. 30431.710:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdiplus.dll" at 00130000: builtin
  390. 30431.711:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 7E860000: builtin
  391. 30431.902:0124:0128:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  392. 30431.916:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
  393. 30431.919:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 6DE80000: builtin
  394. 30431.919:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 6AC80000: builtin
  395. 30431.920:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 62B80000: builtin
  396. 30431.924:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-string-l1-1-0.dll" at 67800000: builtin
  397. 30431.924:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-datetime-l1-1-1.dll" at 6FF80000: builtin
  398. 30431.925:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-obsolete-l1-2-0.dll" at 6B500000: builtin
  399. 30431.957:0124:0128:trace:loaddll:build_module Loaded L"Z:\\mnt\\data\\SteamLibrary\\steamapps\\common\\Sid Meier's Civilization VI\\2KLauncher\\steam_api.dll" at 3B400000: native
  400. 30431.965:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at F5D70000: builtin
  401. 30431.965:0124:0128:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient.dll" at 38000000: native
  402. 30431.965:0124:0128:warn:debugstr:OutputDebugStringA "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient.dll' OK.\n"
  403. 30431.965:0124:0128:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B0110D7 ip=7b0110d7 tid=0128
  404. 30431.965:0124:0128:trace:seh:dispatch_exception info[0]=00000054
  405. 30431.965:0124:0128:trace:seh:dispatch_exception info[1]=00d1ed74
  406. 30431.965:0124:0128:warn:seh:dispatch_exception "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient.dll' OK.\n"
  407. 30431.965:0124:0128:trace:seh:call_vectored_handlers calling handler at 7B00AE30 code=40010006 flags=0
  408. 30431.965:0124:0128:trace:seh:call_vectored_handlers handler at 7B00AE30 returned 0
  409. 30431.965:0124:0128:trace:seh:call_stack_handlers calling handler at 7B632630 code=40010006 flags=0
  410. 30431.965:0124:0128:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  411. 30431.965:0124:0128:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=00d1e7ac esi=00d1e6e0 edi=00d1e7ac
  412. 30431.965:0124:0128:trace:seh:__regs_RtlUnwind ebp=00d1e258 esp=00d1e250 eip=7b6325c6 cs=0023 ds=002b fs=0063 gs=006b flags=00000206
  413. 30431.965:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 7BC585A0 code=40010006 flags=2
  414. 30431.965:0124:0128:trace:seh:__regs_RtlUnwind handler at 7BC585A0 returned 1
  415. 30431.990:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 67840000: builtin
  416. 30431.990:0124:0128:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.dll" at 10000000: native
  417. 30431.998:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\\Program Files (x86)\\Steam\\steamclient.dll" : native
  418. 30431.999:0124:0128:trace:seh:NtSetInformationThread (0xfffffffe,10,0xd1f298,4)
  419. 30431.999:0124:0128:trace:seh:NtSetInformationThread (0xfffffffe,10,0xd1f2a0,4)
  420. 30431.999:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\\Program Files (x86)\\Steam\\steam.dll" : native
  421. 30432.002:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at F60C0000: builtin
  422. 30432.002:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\netapi32.dll" at F60E0000: builtin
  423. 30432.002:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\secur32.dll" at F6120000: builtin
  424. 30432.002:0124:0128:err:winediag:SECUR32_initNTLMSP ntlm_auth was not found or is outdated. Make sure that ntlm_auth >= 3.0.25 is in your path. Usually, you can find it in the winbind package of your distribution.
  425. 30432.005:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Kerberos.dll" at F60A0000: builtin
  426. 30432.006:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-sysinfo-l1-2-1.dll" at 700C0000: builtin
  427. 30432.009:0124:0130:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 66E40000: builtin
  428. 30432.009:0124:0130:fixme:kernelbase:AppPolicyGetThreadInitializationType FFFFFFFA, 013DFEF8
  429. 30432.029:0124:0130:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x13dfe8c,4,(nil))
  430. 30432.038:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\schannel.dll" at 6DD00000: builtin
  431. 30432.086:0124:0128:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient.dll" at 38000000: native
  432. 30432.086:0124:0128:warn:debugstr:OutputDebugStringA "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient.dll' OK.\n"
  433. 30432.086:0124:0128:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B0110D7 ip=7b0110d7 tid=0128
  434. 30432.086:0124:0128:trace:seh:dispatch_exception info[0]=00000054
  435. 30432.086:0124:0128:trace:seh:dispatch_exception info[1]=00d1f03c
  436. 30432.086:0124:0128:warn:seh:dispatch_exception "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient.dll' OK.\n"
  437. 30432.086:0124:0128:trace:seh:call_vectored_handlers calling handler at 7B00AE30 code=40010006 flags=0
  438. 30432.086:0124:0128:trace:seh:call_vectored_handlers handler at 7B00AE30 returned 0
  439. 30432.086:0124:0128:trace:seh:call_stack_handlers calling handler at 7B632630 code=40010006 flags=0
  440. 30432.086:0124:0128:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  441. 30432.086:0124:0128:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=00d1ea6c esi=00d1e9a0 edi=00d1ea6c
  442. 30432.086:0124:0128:trace:seh:__regs_RtlUnwind ebp=00d1e518 esp=00d1e510 eip=7b6325c6 cs=0023 ds=002b fs=0063 gs=006b flags=00000202
  443. 30432.086:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 7BC585A0 code=40010006 flags=2
  444. 30432.086:0124:0128:trace:seh:__regs_RtlUnwind handler at 7BC585A0 returned 1
  445. 30432.099:0124:0128:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.dll" at 10000000: native
  446. 30432.107:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\\Program Files (x86)\\Steam\\steamclient.dll" : native
  447. 30432.108:0124:0128:trace:seh:NtSetInformationThread (0xfffffffe,10,0xd1f568,4)
  448. 30432.108:0124:0128:trace:seh:NtSetInformationThread (0xfffffffe,10,0xd1f570,4)
  449. 30432.108:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\\Program Files (x86)\\Steam\\steam.dll" : native
  450. 30432.111:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imagehlp.dll" at 6DB40000: builtin
  451. 30432.112:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  452. 30432.333:0124:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F3A60000: builtin
  453. 30432.347:0124:0134:fixme:ole:CoInitializeSecurity 00000000, -1, 00000000, 00000000, 6, 3, 00000000, 0, 00000000 stub
  454. 30432.348:0124:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\xmllite.dll" at 68A40000: builtin
  455. 30432.348:0124:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\taskschd.dll" at 69100000: builtin
  456. 30432.349:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef4f0
  457. 30432.349:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef608 esp=014ef4ac eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  458. 30432.349:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  459. 30432.350:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef5c0
  460. 30432.350:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef6d8 esp=014ef57c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  461. 30432.350:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  462. 30432.350:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=3fe00000 edx=00000000 esi=00000001 edi=014ef560
  463. 30432.350:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef678 esp=014ef51c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  464. 30432.350:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  465. 30432.372:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
  466. 30432.373:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  467. 30432.373:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  468. 30432.373:013c:0140:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  469. 30432.373:013c:0140:trace:seh:install_bpf Seccomp filters already installed.
  470. 30432.374:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  471. 30432.375:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  472. 30432.375:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  473. 30432.375:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  474. 30432.380:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  475. 30432.381:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  476. 30432.382:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  477. 30432.382:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  478. 30432.382:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  479. 30432.382:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  480. 30432.382:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  481. 30432.383:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  482. 30432.384:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007F71A1950000: builtin
  483. 30432.384:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 0000000346BA0000: builtin
  484. 30432.384:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winhttp.dll" at 0000000358120000: builtin
  485. 30432.384:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\qmgr.dll" at 00000001FBCF0000: builtin
  486. 30432.393:013c:0140:fixme:font:get_name_record_codepage encoding 20 not handled, platform 1.
  487. 30432.406:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  488. 30432.407:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\fntcache.dll" at 0000000200540000: builtin
  489. 30432.407:013c:0140:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\schedsvc.dll" at 0000000354D70000: builtin
  490. 30432.418:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef5c0
  491. 30432.418:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef6d8 esp=014ef57c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  492. 30432.418:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  493. 30432.418:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef540
  494. 30432.418:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef658 esp=014ef4fc eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  495. 30432.418:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  496. 30432.419:013c:0150:fixme:fsync:__fsync_wait_objects Can't wait on fsync and server objects at the same time!
  497. 30432.420:00ec:0154:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x336fe2c,4,(nil))
  498. 30432.421:00ec:0158:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x397fe2c,4,(nil))
  499. 30433.419:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef540
  500. 30433.419:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef658 esp=014ef4fc eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  501. 30433.419:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  502. 30433.420:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=014ef5c0 ebx=00000001 ecx=002b0023 edx=00000246 esi=00000001 edi=014ef5d0
  503. 30433.420:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef6e8 esp=014ef58c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  504. 30433.420:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  505. 30433.420:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=002b0023 edx=00000246 esi=00000001 edi=014ef5d0
  506. 30433.420:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef6e8 esp=014ef58c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  507. 30433.420:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  508. 30433.421:0030:0138:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x51bfe2c,4,(nil))
  509. 30433.422:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef1b0
  510. 30433.422:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef2c8 esp=014ef16c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  511. 30433.422:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  512. 30433.422:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef280
  513. 30433.422:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef398 esp=014ef23c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  514. 30433.422:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  515. 30433.423:00ec:0164:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x336fe2c,4,(nil))
  516. 30433.423:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef590
  517. 30433.423:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef6a8 esp=014ef54c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  518. 30433.423:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  519. 30433.424:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000007 esi=00000001 edi=014ef660
  520. 30433.424:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef778 esp=014ef61c eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  521. 30433.424:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  522. 30433.425:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000003 edx=014ef6c0 esi=00000001 edi=014ef6f0
  523. 30433.425:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef808 esp=014ef6ac eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  524. 30433.425:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  525. 30433.426:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: eax=00000000 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=014ef740
  526. 30433.426:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ebp=014ef858 esp=014ef6fc eip=7bc0ab8c cs=0023 ss=002b flags=00000246
  527. 30433.426:0124:0134:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  528. 30433.426:0124:0134:fixme:taskschd:Principal_put_RunLevel 02301530,1: stub
  529. 30433.426:0124:0134:fixme:taskschd:Principal_put_LogonType 02301530,3: stub
  530. 30433.426:0124:0134:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x14efe8c,4,(nil))
  531. 30433.426:0124:0128:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
  532. 30433.429:0124:0128:fixme:file:NtLockFile I/O completion on lock not implemented yet
  533. 30433.431:003c:0050:trace:seh:NtQueryInformationThread (0x64,0,0x162f810,30,(nil))
  534. 30433.432:0124:0128:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B0110D7 ip=7b0110d7 tid=0128
  535. 30433.432:0124:0128:trace:seh:dispatch_exception info[0]=19930520
  536. 30433.432:0124:0128:trace:seh:dispatch_exception info[1]=00d1ee38
  537. 30433.432:0124:0128:trace:seh:dispatch_exception info[2]=00562dd8
  538. 30433.432:0124:0128:err:seh:dispatch_exception Fatal EXCEPTION_WINE_CXX_EXCEPTION exception (code=e06d7363) raised
  539. 30433.432:0124:0128:trace:seh:dispatch_exception eax=00d1ed80 ebx=e06d7363 ecx=00000000 edx=00d1ed94 esi=00d1ee1c edi=00d1ed9c
  540. 30433.432:0124:0128:trace:seh:dispatch_exception ebp=00d1ede8 esp=00d1ed74 cs=0023 ds=a000002b es=2b002b fs=f6180063 gs=006b flags=00000203
  541. 30433.432:0124:0128:trace:seh:call_vectored_handlers calling handler at 7B00AE30 code=e06d7363 flags=1
  542. 30433.432:0124:0128:trace:seh:call_vectored_handlers handler at 7B00AE30 returned 0
  543. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051EB4E code=e06d7363 flags=1
  544. 30433.432:0124:0128:trace:seh:call_stack_handlers handler at 0051EB4E returned 1
  545. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051E42F code=e06d7363 flags=1
  546. 30433.432:0124:0128:trace:seh:call_stack_handlers handler at 0051E42F returned 1
  547. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051E1B1 code=e06d7363 flags=1
  548. 30433.432:0124:0128:trace:seh:call_stack_handlers handler at 0051E1B1 returned 1
  549. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051E05D code=e06d7363 flags=1
  550. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  551. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00d1e8a8 ecx=5ee26497 edx=00d1e8a8 esi=00d1e980 edi=00d1f2cc
  552. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind ebp=00d1e834 esp=00d1e820 eip=004f3b1b cs=0023 ds=002b fs=0063 gs=006b flags=00000246
  553. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 7BC585A0 code=e06d7363 flags=3
  554. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 7BC585A0 returned 1
  555. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 0051EB4E code=e06d7363 flags=3
  556. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 0051EB4E returned 1
  557. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 0051E42F code=e06d7363 flags=3
  558. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 0051E42F returned 1
  559. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 0051E1B1 code=e06d7363 flags=3
  560. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 0051E1B1 returned 1
  561. 30433.432:0124:0128:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B0110D7 ip=7b0110d7 tid=0128
  562. 30433.432:0124:0128:trace:seh:dispatch_exception info[0]=19930520
  563. 30433.432:0124:0128:trace:seh:dispatch_exception info[1]=00d1efb8
  564. 30433.432:0124:0128:trace:seh:dispatch_exception info[2]=00562dd8
  565. 30433.432:0124:0128:err:seh:dispatch_exception Fatal EXCEPTION_WINE_CXX_EXCEPTION exception (code=e06d7363) raised
  566. 30433.432:0124:0128:trace:seh:dispatch_exception eax=00d1ef00 ebx=e06d7363 ecx=00000000 edx=00d1ef14 esi=00d1ef9c edi=00d1ef1c
  567. 30433.432:0124:0128:trace:seh:dispatch_exception ebp=00d1ef68 esp=00d1eef4 cs=d10023 ds=d1002b es=002b fs=d10063 gs=006b flags=00000203
  568. 30433.432:0124:0128:trace:seh:call_vectored_handlers calling handler at 7B00AE30 code=e06d7363 flags=1
  569. 30433.432:0124:0128:trace:seh:call_vectored_handlers handler at 7B00AE30 returned 0
  570. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051E42F code=e06d7363 flags=1
  571. 30433.432:0124:0128:trace:seh:call_stack_handlers handler at 0051E42F returned 1
  572. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051E1B1 code=e06d7363 flags=1
  573. 30433.432:0124:0128:trace:seh:call_stack_handlers handler at 0051E1B1 returned 1
  574. 30433.432:0124:0128:trace:seh:call_stack_handlers calling handler at 0051E05D code=e06d7363 flags=1
  575. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  576. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00d1ea28 ecx=5ee26517 edx=00d1ea28 esi=00d1eb00 edi=00d1f2cc
  577. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind ebp=00d1e9b4 esp=00d1e9a0 eip=004f3b1b cs=0023 ds=002b fs=0063 gs=006b flags=00000246
  578. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 7BC585A0 code=e06d7363 flags=3
  579. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 7BC585A0 returned 1
  580. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 0051E42F code=e06d7363 flags=3
  581. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 0051E42F returned 1
  582. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind calling handler at 0051E1B1 code=e06d7363 flags=3
  583. 30433.432:0124:0128:trace:seh:__regs_RtlUnwind handler at 0051E1B1 returned 1
  584. 30433.469:0124:0170:fixme:secur32:schannel_get_cipher_algid unknown algorithm 23
  585. 30433.469:0124:0170:fixme:secur32:schannel_get_mac_algid unknown algorithm 200, cipher 23
  586. 30433.475:0124:0170:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\cryptnet.dll" at 62540000: builtin
  587. 30433.477:0124:0170:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 70940000: builtin
  588. 30433.477:0124:0170:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 61940000: builtin
  589. 30433.564:0124:0170:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x13dff1c,4,(nil))
  590. Program Name : 2K Installer
  591. Program Name : 2K Installer
  592. 30433.570:0124:0128:fixme:kernelbase:AppPolicyGetProcessTerminationMethod FFFFFFFA, 00D1FEAC
  593. Setting breakpad minidump AppID = 289070
  594. SteamInternal_SetMinidumpSteamID: Caching Steam ID: 76561198225982156 [API loaded no]
  595. SteamInternal_SetMinidumpSteamID: Caching Steam ID: 76561198225982156 [API loaded no]
  596. 30433.571:0124:0128:trace:seh:NtSetInformationThread (0xfffffffe,10,0xd1fc2c,4)
  597. 30433.571:013c:0168:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2d7fe2c,4,(nil))
  598. 30434.574:00ec:010c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x274fe2c,4,(nil))
  599. 30435.574:00d0:0118:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x155fe2c,4,(nil))
  600. 30435.576:00d0:0114:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xf4fe2c,4,(nil))
  601. 30435.592:0030:00c4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x397fe2c,4,(nil))
  602. 30435.592:0030:0144:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x53cfe2c,4,(nil))
  603. 30435.592:0074:00b8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x52efe2c,4,(nil))
  604. 30435.592:00ec:0104:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1b2fe2c,4,(nil))
  605. 30435.593:00ec:0108:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x213fe2c,4,(nil))
  606. 30435.593:005c:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x215fe2c,4,(nil))
  607. 30435.594:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x151fe2c,4,(nil))
  608. 30435.595:0030:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x213fe2c,4,(nil))
  609. 30435.595:005c:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1b4fe2c,4,(nil))
  610. 30435.595:0074:0084:err:rpc:I_RpcReceive we got fault packet with status 0x1c010003
  611. 30435.595:0074:0084:trace:seh:dispatch_exception code=6b5 flags=0 addr=000000007B01239E ip=000000007B01239E tid=0084
  612. 30435.595:0074:0084:warn:seh:dispatch_exception unknown exception (code=6b5) raised
  613. 30435.595:0074:0084:trace:seh:dispatch_exception rax=000000007b012350 rbx=000000000162f578 rcx=000000000162f2a0 rdx=0000000000000000
  614. 30435.595:0074:0084:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000050 rsp=000000000162f280
  615. 30435.595:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000001650020 r11=00000000a55a5aa5
  616. 30435.595:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016a0050 r14=0000000000000000 r15=00000000016a0050
  617. 30435.595:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6b5 flags=0
  618. 30435.595:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
  619. 30435.595:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C690 code=6b5 flags=0
  620. 30435.595:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C690 returned 0
  621. 30435.595:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01239E rsp 000000000162F280
  622. 30435.595:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  623. 30435.595:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  624. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  625. 30435.595:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  626. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  627. 30435.595:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F360
  628. 30435.595:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  629. 30435.595:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  630. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  631. 30435.595:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE98A4 rsp 000000000162F390
  632. 30435.595:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
  633. 30435.595:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
  634. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  635. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
  636. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
  637. 30435.595:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2EAE rsp 000000000162F3E0
  638. 30435.595:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  639. 30435.595:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  640. 30435.595:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  641. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  642. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  643. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  644. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  645. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  646. 30435.595:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
  647. 30435.595:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E7C0, dispatch=000000000162E690)
  648. 30435.595:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
  649. 30435.595:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
  650. 30435.595:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  651. 30435.595:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  652. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  653. 30435.595:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  654. 30435.595:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
  655. 30435.595:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F2A0, frame=000000000162F770 context=000000000162E7C0, dispatch=000000000162E690)
  656. 30435.595:0074:0084:trace:seh:RtlUnwindEx code=6b5 flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ad8d
  657. 30435.595:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e090 rdx=00000000279c403a
  658. 30435.595:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162db40 rdi=000000000162e7c0 rbp=000000000162e590 rsp=000000000162d9d0
  659. 30435.595:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f2a0 r9=00000000279c4070 r10=000000000162e470 r11=0000000000026590
  660. 30435.595:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f2a0 r13=000000000162e090 r14=000000000162f770 r15=000000007bc69930
  661. 30435.595:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AD8D rsp 000000000162D9D0
  662. 30435.595:0074:0084:trace:seh:dump_unwind_info **** func 5ad40-5b486
  663. 30435.595:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839B4 flags 0 prolog 0x13 bytes function 000000007BC5AD40-000000007BC5B486
  664. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x648,%rsp
  665. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  666. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  667. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  668. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  669. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  670. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  671. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  672. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  673. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B4AF rsp 000000000162E060
  674. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 5b490-5b4b8
  675. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839CC flags 0 prolog 0x7 bytes function 000000007BC5B490-000000007BC5B4B8
  676. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  677. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E570
  678. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
  679. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
  680. 30435.596:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  681. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  682. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  683. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
  684. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E5A0
  685. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
  686. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
  687. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  688. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5D0
  689. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
  690. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
  691. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  692. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
  693. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
  694. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
  695. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A0CD rsp 000000000162E620
  696. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 59e90-5a3a1
  697. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8395C flags 0 prolog 0x13 bytes function 000000007BC59E90-000000007BC5A3A1
  698. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  699. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  700. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  701. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  702. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  703. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  704. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  705. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  706. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  707. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A6B7 rsp 000000000162ECE0
  708. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 5a3b0-5a8bf
  709. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83974 flags 0 prolog 0x10 bytes function 000000007BC5A3B0-000000007BC5A8BF
  710. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
  711. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  712. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  713. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  714. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  715. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  716. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  717. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  718. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  719. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583E8 rsp 000000000162ED80
  720. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 58380-583f5
  721. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838C8 flags 0 prolog 0x7 bytes function 000000007BC58380-000000007BC583F5
  722. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  723. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01239E rsp 000000000162F280
  724. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  725. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  726. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  727. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  728. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  729. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F360
  730. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  731. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  732. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  733. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE98A4 rsp 000000000162F390
  734. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
  735. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
  736. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  737. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
  738. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
  739. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2EAE rsp 000000000162F3E0
  740. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  741. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  742. 30435.596:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  743. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  744. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  745. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  746. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  747. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  748. 30435.596:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
  749. 30435.596:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E090, dispatch=000000000162DA50)
  750. 30435.596:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
  751. 30435.596:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
  752. 30435.596:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  753. 30435.596:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  754. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  755. 30435.596:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  756. 30435.596:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
  757. 30435.597:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01239E ip=000000007B01239E tid=0084
  758. 30435.597:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  759. 30435.597:0074:0084:trace:seh:dispatch_exception rax=000000007b012350 rbx=000000000162f578 rcx=000000000162f2a0 rdx=0000000000000000
  760. 30435.597:0074:0084:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000050 rsp=000000000162f280
  761. 30435.597:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
  762. 30435.597:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016a0050 r14=0000000000000000 r15=00000000016a0050
  763. 30435.597:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
  764. 30435.597:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
  765. 30435.597:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C690 code=6ba flags=0
  766. 30435.597:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C690 returned 0
  767. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01239E rsp 000000000162F280
  768. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  769. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  770. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  771. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  772. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  773. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F360
  774. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  775. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  776. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  777. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE98A4 rsp 000000000162F390
  778. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
  779. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
  780. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  781. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
  782. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
  783. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2EAE rsp 000000000162F3E0
  784. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  785. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  786. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  787. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  788. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  789. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  790. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  791. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  792. 30435.597:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
  793. 30435.597:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E7C0, dispatch=000000000162E690)
  794. 30435.597:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
  795. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
  796. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  797. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  798. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  799. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  800. 30435.597:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
  801. 30435.597:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F2A0, frame=000000000162F770 context=000000000162E7C0, dispatch=000000000162E690)
  802. 30435.597:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ad8d
  803. 30435.597:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e090 rdx=00000000279c403a
  804. 30435.597:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162db40 rdi=000000000162e7c0 rbp=000000000162e590 rsp=000000000162d9d0
  805. 30435.597:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f2a0 r9=00000000279c4070 r10=000000000162e286 r11=0000000000000293
  806. 30435.597:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f2a0 r13=000000000162e090 r14=000000000162f770 r15=000000007bc69930
  807. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AD8D rsp 000000000162D9D0
  808. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 5ad40-5b486
  809. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839B4 flags 0 prolog 0x13 bytes function 000000007BC5AD40-000000007BC5B486
  810. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x648,%rsp
  811. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  812. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  813. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  814. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  815. 30435.597:005c:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x153fe2c,4,(nil))
  816. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  817. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  818. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  819. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  820. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B4AF rsp 000000000162E060
  821. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 5b490-5b4b8
  822. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839CC flags 0 prolog 0x7 bytes function 000000007BC5B490-000000007BC5B4B8
  823. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  824. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E570
  825. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
  826. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
  827. 30435.597:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  828. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  829. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  830. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
  831. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E5A0
  832. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
  833. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
  834. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  835. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5D0
  836. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
  837. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
  838. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  839. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
  840. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
  841. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
  842. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A0CD rsp 000000000162E620
  843. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 59e90-5a3a1
  844. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8395C flags 0 prolog 0x13 bytes function 000000007BC59E90-000000007BC5A3A1
  845. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  846. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  847. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  848. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  849. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  850. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  851. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  852. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  853. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  854. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A6B7 rsp 000000000162ECE0
  855. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 5a3b0-5a8bf
  856. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83974 flags 0 prolog 0x10 bytes function 000000007BC5A3B0-000000007BC5A8BF
  857. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
  858. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  859. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  860. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  861. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  862. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  863. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  864. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  865. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  866. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583E8 rsp 000000000162ED80
  867. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 58380-583f5
  868. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838C8 flags 0 prolog 0x7 bytes function 000000007BC58380-000000007BC583F5
  869. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  870. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01239E rsp 000000000162F280
  871. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  872. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  873. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  874. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  875. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  876. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F360
  877. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  878. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  879. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  880. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE98A4 rsp 000000000162F390
  881. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
  882. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
  883. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  884. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
  885. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
  886. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2EAE rsp 000000000162F3E0
  887. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  888. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  889. 30435.597:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  890. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  891. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  892. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  893. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  894. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  895. 30435.597:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
  896. 30435.597:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E090, dispatch=000000000162DA50)
  897. 30435.597:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
  898. 30435.597:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
  899. 30435.597:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  900. 30435.597:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  901. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  902. 30435.597:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  903. 30435.597:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
  904. 30435.598:0074:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1c5fe2c,4,(nil))
  905. 30435.598:00ec:0100:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x151fe2c,4,(nil))
  906. 30435.599:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01239E ip=000000007B01239E tid=0084
  907. 30435.599:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  908. 30435.599:0074:0084:trace:seh:dispatch_exception rax=000000007b012350 rbx=000000000162f578 rcx=000000000162f290 rdx=0000000000000000
  909. 30435.599:0074:0084:trace:seh:dispatch_exception rsi=00000000000000f2 rdi=0000000001660230 rbp=0000000000000060 rsp=000000000162f270
  910. 30435.599:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
  911. 30435.599:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0150 r14=0000000000000000 r15=00000000016b0150
  912. 30435.599:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
  913. 30435.599:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
  914. 30435.599:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C690 code=6ba flags=0
  915. 30435.599:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C690 returned 0
  916. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01239E rsp 000000000162F270
  917. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  918. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  919. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  920. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  921. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  922. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F350
  923. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  924. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  925. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  926. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000162F380
  927. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
  928. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  929. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  930. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
  931. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
  932. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
  933. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 000000000162F3E0
  934. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  935. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  936. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  937. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  938. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  939. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  940. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  941. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  942. 30435.599:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
  943. 30435.599:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E7B0, dispatch=000000000162E680)
  944. 30435.599:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
  945. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
  946. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  947. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  948. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  949. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  950. 30435.599:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
  951. 30435.599:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F290, frame=000000000162F770 context=000000000162E7B0, dispatch=000000000162E680)
  952. 30435.599:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ad8d
  953. 30435.599:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e080 rdx=00000000279c403a
  954. 30435.599:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162db30 rdi=000000000162e7b0 rbp=000000000162e580 rsp=000000000162d9c0
  955. 30435.599:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f290 r9=00000000279c4070 r10=000000000162e276 r11=0000000000000293
  956. 30435.599:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f290 r13=000000000162e080 r14=000000000162f770 r15=000000007bc69930
  957. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AD8D rsp 000000000162D9C0
  958. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 5ad40-5b486
  959. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839B4 flags 0 prolog 0x13 bytes function 000000007BC5AD40-000000007BC5B486
  960. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x648,%rsp
  961. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  962. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  963. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  964. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  965. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  966. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  967. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  968. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  969. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B4AF rsp 000000000162E050
  970. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 5b490-5b4b8
  971. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839CC flags 0 prolog 0x7 bytes function 000000007BC5B490-000000007BC5B4B8
  972. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  973. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E560
  974. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
  975. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
  976. 30435.599:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  977. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  978. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  979. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
  980. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E590
  981. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
  982. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
  983. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  984. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5C0
  985. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
  986. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
  987. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  988. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
  989. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
  990. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
  991. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A0CD rsp 000000000162E610
  992. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 59e90-5a3a1
  993. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8395C flags 0 prolog 0x13 bytes function 000000007BC59E90-000000007BC5A3A1
  994. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  995. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  996. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  997. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  998. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  999. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1000. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1001. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1002. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1003. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A6B7 rsp 000000000162ECD0
  1004. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 5a3b0-5a8bf
  1005. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83974 flags 0 prolog 0x10 bytes function 000000007BC5A3B0-000000007BC5A8BF
  1006. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
  1007. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1008. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1009. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1010. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1011. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1012. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1013. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1014. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1015. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583E8 rsp 000000000162ED70
  1016. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 58380-583f5
  1017. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838C8 flags 0 prolog 0x7 bytes function 000000007BC58380-000000007BC583F5
  1018. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1019. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01239E rsp 000000000162F270
  1020. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  1021. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  1022. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1023. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1024. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1025. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F350
  1026. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  1027. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  1028. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1029. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000162F380
  1030. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
  1031. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  1032. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1033. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1034. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1035. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1036. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 000000000162F3E0
  1037. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  1038. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  1039. 30435.599:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1040. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1041. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1042. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1043. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  1044. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  1045. 30435.599:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
  1046. 30435.599:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E080, dispatch=000000000162DA40)
  1047. 30435.599:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
  1048. 30435.599:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
  1049. 30435.599:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  1050. 30435.599:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  1051. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1052. 30435.599:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1053. 30435.599:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
  1054. 30435.600:0074:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x287fe2c,4,(nil))
  1055. 30435.601:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01239E ip=000000007B01239E tid=0084
  1056. 30435.601:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  1057. 30435.601:0074:0084:trace:seh:dispatch_exception rax=000000007b012350 rbx=000000000162f578 rcx=000000000162f290 rdx=0000000000000000
  1058. 30435.601:0074:0084:trace:seh:dispatch_exception rsi=00000000000000f2 rdi=0000000001660230 rbp=0000000000000060 rsp=000000000162f270
  1059. 30435.601:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
  1060. 30435.601:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0150 r14=0000000000000000 r15=00000000016b0150
  1061. 30435.601:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
  1062. 30435.601:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
  1063. 30435.601:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C690 code=6ba flags=0
  1064. 30435.601:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C690 returned 0
  1065. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01239E rsp 000000000162F270
  1066. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  1067. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  1068. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1069. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1070. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1071. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F350
  1072. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  1073. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  1074. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1075. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000162F380
  1076. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
  1077. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  1078. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1079. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1080. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1081. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1082. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 000000000162F3E0
  1083. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  1084. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  1085. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1086. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1087. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1088. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1089. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  1090. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  1091. 30435.601:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
  1092. 30435.601:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E7B0, dispatch=000000000162E680)
  1093. 30435.601:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
  1094. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
  1095. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  1096. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  1097. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1098. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1099. 30435.601:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
  1100. 30435.601:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F290, frame=000000000162F770 context=000000000162E7B0, dispatch=000000000162E680)
  1101. 30435.601:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ad8d
  1102. 30435.601:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e080 rdx=00000000279c403a
  1103. 30435.601:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162db30 rdi=000000000162e7b0 rbp=000000000162e580 rsp=000000000162d9c0
  1104. 30435.601:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f290 r9=00000000279c4070 r10=000000000162e276 r11=0000000000000293
  1105. 30435.601:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f290 r13=000000000162e080 r14=000000000162f770 r15=000000007bc69930
  1106. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AD8D rsp 000000000162D9C0
  1107. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 5ad40-5b486
  1108. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839B4 flags 0 prolog 0x13 bytes function 000000007BC5AD40-000000007BC5B486
  1109. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x648,%rsp
  1110. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1111. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1112. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1113. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1114. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1115. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1116. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1117. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1118. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B4AF rsp 000000000162E050
  1119. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 5b490-5b4b8
  1120. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839CC flags 0 prolog 0x7 bytes function 000000007BC5B490-000000007BC5B4B8
  1121. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  1122. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E560
  1123. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
  1124. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
  1125. 30435.601:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1126. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  1127. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1128. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
  1129. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E590
  1130. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
  1131. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
  1132. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1133. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5C0
  1134. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
  1135. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
  1136. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  1137. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
  1138. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
  1139. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
  1140. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A0CD rsp 000000000162E610
  1141. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 59e90-5a3a1
  1142. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8395C flags 0 prolog 0x13 bytes function 000000007BC59E90-000000007BC5A3A1
  1143. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  1144. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1145. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1146. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1147. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1148. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1149. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1150. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1151. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1152. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A6B7 rsp 000000000162ECD0
  1153. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 5a3b0-5a8bf
  1154. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83974 flags 0 prolog 0x10 bytes function 000000007BC5A3B0-000000007BC5A8BF
  1155. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
  1156. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1157. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1158. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1159. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1160. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1161. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1162. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1163. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1164. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583E8 rsp 000000000162ED70
  1165. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 58380-583f5
  1166. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838C8 flags 0 prolog 0x7 bytes function 000000007BC58380-000000007BC583F5
  1167. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1168. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01239E rsp 000000000162F270
  1169. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  1170. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  1171. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1172. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1173. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1174. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F350
  1175. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  1176. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  1177. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1178. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000162F380
  1179. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
  1180. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  1181. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1182. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1183. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1184. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1185. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 000000000162F3E0
  1186. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  1187. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  1188. 30435.601:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1189. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1190. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1191. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1192. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  1193. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  1194. 30435.601:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
  1195. 30435.601:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E080, dispatch=000000000162DA40)
  1196. 30435.601:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
  1197. 30435.601:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
  1198. 30435.601:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  1199. 30435.601:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  1200. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1201. 30435.601:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1202. 30435.601:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
  1203. 30435.602:0074:00a4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x349fe2c,4,(nil))
  1204. 30435.603:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01239E ip=000000007B01239E tid=0084
  1205. 30435.603:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  1206. 30435.603:0074:0084:trace:seh:dispatch_exception rax=000000007b012350 rbx=000000000162f578 rcx=000000000162f290 rdx=0000000000000000
  1207. 30435.603:0074:0084:trace:seh:dispatch_exception rsi=00000000000000da rdi=0000000001660230 rbp=0000000000000054 rsp=000000000162f270
  1208. 30435.603:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000016b0020 r11=00000000a55a5aa5
  1209. 30435.603:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0150 r14=0000000000000000 r15=00000000016b0150
  1210. 30435.603:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
  1211. 30435.603:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
  1212. 30435.603:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C690 code=6ba flags=0
  1213. 30435.603:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C690 returned 0
  1214. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01239E rsp 000000000162F270
  1215. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  1216. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  1217. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1218. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1219. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1220. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F350
  1221. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  1222. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  1223. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1224. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000162F380
  1225. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
  1226. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  1227. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1228. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1229. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1230. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1231. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 000000000162F3E0
  1232. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  1233. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  1234. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1235. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1236. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1237. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1238. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  1239. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  1240. 30435.603:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
  1241. 30435.603:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E7B0, dispatch=000000000162E680)
  1242. 30435.603:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
  1243. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
  1244. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  1245. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  1246. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1247. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1248. 30435.603:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
  1249. 30435.603:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F290, frame=000000000162F770 context=000000000162E7B0, dispatch=000000000162E680)
  1250. 30435.603:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ad8d
  1251. 30435.603:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e080 rdx=00000000279c403a
  1252. 30435.603:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162db30 rdi=000000000162e7b0 rbp=000000000162e580 rsp=000000000162d9c0
  1253. 30435.603:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f290 r9=00000000279c4070 r10=000000000162e276 r11=0000000000000293
  1254. 30435.603:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f290 r13=000000000162e080 r14=000000000162f770 r15=000000007bc69930
  1255. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AD8D rsp 000000000162D9C0
  1256. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 5ad40-5b486
  1257. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839B4 flags 0 prolog 0x13 bytes function 000000007BC5AD40-000000007BC5B486
  1258. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x648,%rsp
  1259. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1260. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1261. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1262. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1263. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1264. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1265. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1266. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1267. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B4AF rsp 000000000162E050
  1268. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 5b490-5b4b8
  1269. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839CC flags 0 prolog 0x7 bytes function 000000007BC5B490-000000007BC5B4B8
  1270. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  1271. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E560
  1272. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
  1273. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
  1274. 30435.603:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1275. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  1276. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1277. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
  1278. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E590
  1279. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
  1280. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
  1281. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1282. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5C0
  1283. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
  1284. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
  1285. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  1286. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
  1287. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
  1288. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
  1289. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A0CD rsp 000000000162E610
  1290. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 59e90-5a3a1
  1291. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8395C flags 0 prolog 0x13 bytes function 000000007BC59E90-000000007BC5A3A1
  1292. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  1293. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1294. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1295. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1296. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1297. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1298. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1299. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1300. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1301. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A6B7 rsp 000000000162ECD0
  1302. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 5a3b0-5a8bf
  1303. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83974 flags 0 prolog 0x10 bytes function 000000007BC5A3B0-000000007BC5A8BF
  1304. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
  1305. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1306. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1307. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1308. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1309. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
  1310. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
  1311. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
  1312. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
  1313. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583E8 rsp 000000000162ED70
  1314. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 58380-583f5
  1315. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838C8 flags 0 prolog 0x7 bytes function 000000007BC58380-000000007BC583F5
  1316. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1317. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01239E rsp 000000000162F270
  1318. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 12350-123d7
  1319. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A6480 flags 0 prolog 0x11 bytes function 000000007B012350-000000007B0123D7
  1320. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1321. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1322. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1323. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F350
  1324. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
  1325. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
  1326. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1327. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000162F380
  1328. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
  1329. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  1330. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1331. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1332. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1333. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1334. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 000000000162F3E0
  1335. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
  1336. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
  1337. 30435.603:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1338. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1339. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1340. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1341. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
  1342. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
  1343. 30435.603:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
  1344. 30435.603:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E080, dispatch=000000000162DA40)
  1345. 30435.603:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
  1346. 30435.603:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
  1347. 30435.603:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
  1348. 30435.603:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
  1349. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1350. 30435.603:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1351. 30435.603:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
  1352. 30435.604:0074:00ac:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x40bfe2c,4,(nil))
  1353. 30435.604:0074:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x226fe2c,4,(nil))
  1354. 30435.604:0074:0084:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
  1355. 30435.605:0074:0084:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
  1356. 30435.605:0074:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2e8fe2c,4,(nil))
  1357. 30435.605:0074:0084:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
  1358. 30435.605:0074:0084:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
  1359. 30435.605:0074:00a8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3aafe2c,4,(nil))
  1360. 30435.605:0074:0084:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
  1361. 30435.605:0074:0084:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
  1362. 30435.605:0074:00b0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x46cfe2c,4,(nil))
  1363. 30435.606:0074:00b4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x4cdfe2c,4,(nil))
  1364. 30435.607:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  1365. 30435.608:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  1366. 30435.610:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  1367. 30435.610:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  1368. 30435.611:0074:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
  1369. 30435.695:0030:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2d5fe2c,4,(nil))
  1370. 30435.695:0030:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x336fe2c,4,(nil))
  1371. 30435.697:0030:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x274fe2c,4,(nil))
  1372. 30435.697:0030:00f4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x459fe2c,4,(nil))
  1373. 30435.698:0030:0184:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x151fe2c,4,(nil))
  1374. 30435.698:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xf0fe2c,4,(nil))
  1375. pid 139516 != 139515, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement