Advertisement
Guest User

Kao: The Kangaroo Round 2 - OpenGL

a guest
Dec 8th, 2020
64
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 100.31 KB | None | 0 0
  1. ======================
  2. Proton: 1607363535 proton-5.13-3
  3. SteamGameId: 1048540
  4. Command: ['/z004/sdd1/user/vortex/Spiele/SteamLibrary/steamapps/common/Kao the Kangaroo Round 2/kao2.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20201124.0-0-gd107701
  7. pressure-vessel: 0.20201124.0+srt1 scout 0.20201125.0
  8. soldier: 0.20201124.0 soldier 0.20201124.0
  9. ======================
  10. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  12. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  13. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  14. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  15. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  16. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  17. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  18. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  19. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  20. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  21. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  22. esync: up and running.
  23. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  24. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  25. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  26. 10109.073:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  27. 10109.073:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  28. 10109.073:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  29. 10109.074:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  30. 10109.074:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  31. 10109.076:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FF2B1540000: builtin
  32. 10109.076:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  33. 10109.076:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FF2B1760000: builtin
  34. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  35. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  36. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  37. 10109.434:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  38. 10109.435:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  39. 10109.435:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  40. 10109.436:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  41. 10109.436:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  42. 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F15D0AF0000: builtin
  43. 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  44. 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F15D0D10000: builtin
  45. 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  46. 10109.439:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  47. 10109.439:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  48. 10109.440:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  49. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  50. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  51. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  52. 10109.471:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  53. 10109.471:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  54. 10109.471:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  55. 10109.472:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  56. 10109.472:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  57. 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB0D7760000: builtin
  58. 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  59. 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB0D7980000: builtin
  60. 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  61. 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  62. 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  63. 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB0D7300000: builtin
  64. 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB0D74C0000: builtin
  65. 10109.630:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  66. 10109.630:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  67. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  68. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  69. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  70. 10109.649:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  71. 10109.650:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  72. 10109.650:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  73. 10109.650:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  74. 10109.650:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  75. 10109.652:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F7AD2AD0000: builtin
  76. 10109.652:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  77. 10109.652:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F7AD2CF0000: builtin
  78. 10109.653:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F7AD29E0000: builtin
  79. 10109.653:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  80. 10109.661:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  81. 10109.690:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  82. 10109.693:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F7AD2950000: builtin
  83. 10109.693:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  84. 10109.693:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  85. 10109.695:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  86. 10109.699:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  87. 10109.699:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  88. 10109.700:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  89. 10109.701:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  90. 10109.856:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x14bf360,30,(nil))
  91. 10109.859:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F7AD0FE0000: builtin
  92. 10109.859:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x16cf980,30,(nil))
  93. 10109.876:0058:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x18df980,30,(nil))
  94. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  95. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  96. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  97. 10109.903:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  98. 10109.904:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  99. 10109.904:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  100. 10109.904:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  101. 10109.904:0090:0094:trace:seh:install_bpf Seccomp filters already installed.
  102. 10109.906:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F05BBFB0000: builtin
  103. 10109.906:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  104. 10109.906:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F05BC1D0000: builtin
  105. 10109.907:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F05BBEC0000: builtin
  106. 10109.907:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  107. 10109.917:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  108. 10109.922:0090:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  109. 10109.925:0090:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F05BBE40000: builtin
  110. 10109.929:0090:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  111. 10109.929:0090:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  112. 10109.931:0090:00a0:trace:seh:NtQueryInformationThread (0x60,0,0xe8f750,30,(nil))
  113. 10109.937:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FF2B0900000: builtin
  114. 10109.939:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  115. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  116. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  117. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FF2B0670000: builtin
  118. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  119. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  120. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  121. 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FF2B0AB0000: builtin
  122. 10110.009:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  123. 10110.012:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  124. 10110.013:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  125. 10110.014:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  126. 10110.015:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7ECE0000: builtin
  127. 10110.017:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7EB40000: builtin
  128. 10110.017:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  129. 10110.017:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EC30000: builtin
  130. 10110.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E9D0000: builtin
  131. 10110.019:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  132. 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  133. 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  134. 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E7A0000: builtin
  135. 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  136. 10110.027:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  137. 10110.027:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  138. 10110.027:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DD90000: builtin
  139. 10110.125:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  140. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  141. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  142. 10110.130:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  143. 10110.131:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  144. 10110.131:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  145. 10110.132:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  146. 10110.132:00b0:00b4:trace:seh:check_bpf_jit_enable enabled 0x31.
  147. 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F60D8C40000: builtin
  148. 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  149. 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F60D8E60000: builtin
  150. 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F60D8A80000: builtin
  151. 10110.135:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  152. 10110.137:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  153. 10110.137:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  154. 10110.137:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F60D87F0000: builtin
  155. Setting breakpad minidump AppID = 1048540
  156. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198109214015 [API loaded no]
  157. 10110.208:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  158. 10110.208:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  159. 10110.210:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F60D8450000: builtin
  160. skipping config: /home/vortex/.config/MangoHud/wine-explorer.conf [ not found ]
  161. skipping config: /home/vortex/.local/share/Steam/steamapps/common/Proton 5.13/dist/bin/MangoHud.conf [ not found ]
  162. skipping config: /home/vortex/.config/MangoHud/wine64-preloader.conf [ not found ]
  163. parsing config: /home/vortex/.config/MangoHud/MangoHud.conf [ ok ]
  164. skipping config: /home/vortex/.config/MangoHud/wine-explorer.conf [ not found ]
  165. skipping config: /home/vortex/.local/share/Steam/steamapps/common/Proton 5.13/dist/bin/MangoHud.conf [ not found ]
  166. skipping config: /home/vortex/.config/MangoHud/wine64-preloader.conf [ not found ]
  167. parsing config: /home/vortex/.config/MangoHud/MangoHud.conf [ ok ]
  168. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  169. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  170. 10110.492:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  171. 10110.493:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  172. 10110.493:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  173. 10110.493:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  174. 10110.493:00bc:00c0:trace:seh:check_bpf_jit_enable enabled 0x31.
  175. 10110.495:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F926B320000: builtin
  176. 10110.495:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  177. 10110.495:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F926B530000: builtin
  178. 10110.496:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F926B150000: builtin
  179. 10110.497:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  180. 10110.499:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  181. 10110.499:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  182. 10110.499:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F926AED0000: builtin
  183. 10110.500:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  184. 10110.500:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  185. 10110.500:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F60D6F80000: builtin
  186. 10110.504:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  187. 10110.504:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  188. 10110.506:0020:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5E60000: builtin
  189. 10110.597:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  190. 10110.597:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  191. 10110.601:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F926AB20000: builtin
  192. 10110.623:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  193. 10110.624:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  194. 10110.624:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F9269700000: builtin
  195. 10110.628:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  196. 10110.628:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  197. ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  198. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  199. ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
  200. 10110.652:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  201. 10110.652:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  202. 10110.652:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  203. 10110.655:00d4:00d8:trace:loaddll:build_module Loaded L"Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\kao2.exe" at 00400000: native
  204. 10110.659:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E930000: builtin
  205. 10110.659:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  206. 10110.659:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA90000: builtin
  207. 10110.660:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  208. 10110.660:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  209. 10110.660:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  210. 10110.661:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7C0000: builtin
  211. 10110.661:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 7EB20000: builtin
  212. 10110.662:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OPENGL32.dll" at 7A840000: builtin
  213. 10110.662:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\GLU32.dll" at 7E770000: builtin
  214. 10110.664:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 66640000: builtin
  215. 10110.664:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  216. 10110.664:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 639C0000: builtin
  217. 10110.665:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCRT.dll" at 7E6C0000: builtin
  218. 10110.665:00d4:00d8:trace:loaddll:build_module Loaded L"Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\glut32.dll" at 10000000: native
  219. 10110.666:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DSOUND.dll" at 6D5C0000: builtin
  220. 10110.668:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  221. 10110.669:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
  222. 10110.669:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 6E8C0000: builtin
  223. 10110.669:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVFW32.dll" at 00320000: builtin
  224. 10110.670:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\AVIFIL32.dll" at 6E680000: builtin
  225. 10110.677:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 64D80000: builtin
  226. 10110.677:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 7E630000: builtin
  227. 10110.684:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  228. 10110.684:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  229. 10110.684:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 7C620000: builtin
  230. 10110.685:00d4:00d8:trace:loaddll:build_module Loaded L"Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\steam_api.dll" at 3B400000: native
  231. 10110.686:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winspool.drv" at 7DD00000: builtin
  232. 10110.686:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\COMDLG32.dll" at 6B8C0000: builtin
  233. 10110.687:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 6A300000: builtin
  234. 10110.797:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7D990000: builtin
  235. 10110.813:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 62340000: builtin
  236. 10110.813:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 6E540000: builtin
  237. 10110.814:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 6BA80000: builtin
  238. 10110.814:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 00370000: builtin
  239. 10110.814:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,17,(nil),0)
  240. 10110.914:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at F5E10000: builtin
  241. 10110.914:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient.dll" at 38000000: native
  242. 10111.180:00d4:00d8:warn:seh:OutputDebugStringA "moduleFilePathW="
  243. 10111.180:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  244. 10111.180:00d4:00d8:trace:seh:dispatch_exception info[0]=00000011
  245. 10111.180:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  246. 10111.180:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=0000001d ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  247. 10111.180:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=5c0023 ds=31002b es=7bc2002b fs=0063 gs=31006b flags=00200213
  248. 10111.180:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  249. 10111.180:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  250. 10111.180:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  251. 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  252. 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  253. 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  254. 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  255. 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  256. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\kao2.exe"
  257. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  258. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000060
  259. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  260. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=00000045 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  261. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
  262. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  263. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  264. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  265. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  266. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  267. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  268. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  269. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  270. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "\n"
  271. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  272. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000002
  273. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  274. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=001ca798 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  275. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
  276. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  277. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  278. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  279. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  280. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  281. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  282. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  283. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  284. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "mediaDir="
  285. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  286. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=0000000a
  287. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  288. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=0000001d ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  289. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
  290. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  291. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  292. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  293. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  294. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  295. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  296. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  297. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  298. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\media\\"
  299. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  300. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=0000005e
  301. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  302. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=00005c5c ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  303. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
  304. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  305. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  306. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  307. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  308. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  309. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  310. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  311. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  312. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "\n"
  313. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  314. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000002
  315. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  316. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=001ca798 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  317. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
  318. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  319. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  320. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  321. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  322. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  323. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  324. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  325. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  326. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "saveDir="
  327. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  328. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000009
  329. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  330. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=0000001d ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  331. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=5c0023 ds=002b es=31002b fs=7ffd0063 gs=006b flags=00200213
  332. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  333. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  334. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  335. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  336. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  337. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  338. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  339. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  340. 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "C:\\users\\steamuser\\Local Settings\\Application Data\\Kao - Round 2\\"
  341. 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  342. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000042
  343. 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  344. 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=00005c5c ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  345. 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=006b flags=00200213
  346. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  347. 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  348. 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  349. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  350. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  351. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  352. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  353. 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  354. 10111.182:00d4:00d8:warn:seh:OutputDebugStringA "\n"
  355. 10111.182:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
  356. 10111.182:00d4:00d8:trace:seh:dispatch_exception info[0]=00000002
  357. 10111.182:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
  358. 10111.182:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=001ca798 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
  359. 10111.182:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=006b flags=00200213
  360. 10111.182:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  361. 10111.182:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  362. 10111.182:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
  363. 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  364. 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
  365. 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  366. 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  367. 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  368. 10111.193:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 6AEC0000: builtin
  369. 10111.193:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.dll" at 013F0000: native
  370. 10113.060:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31fcc8,4)
  371. 10113.532:00d4:00d8:fixme:system:SystemParametersInfoW Unimplemented action: 59 (SPI_SETSTICKYKEYS)
  372. 10113.535:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mmdevapi.dll" at 70340000: builtin
  373. 10113.536:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winepulse.drv" at F1410000: builtin
  374. 10113.545:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winealsa.drv" at F13D0000: builtin
  375. 10113.546:00d4:00d8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\winealsa.drv" : builtin
  376. 10113.550:00d4:00d8:trace:seh:NtSetInformationThread (0xbc,3,0x31f58c,4)
  377. 10113.588:00d4:00d8:trace:seh:NtSetInformationThread (0xc4,3,0x31f950,4)
  378. 10113.588:00d4:00e8:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1a6fec4,4,(nil))
  379. 10113.588:00d4:00e4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x195fec4,4,(nil))
  380. 10113.599:00d4:00d8:trace:seh:NtSetInformationThread (0xc4,3,0x31f950,4)
  381. 10113.600:00d4:00f0:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1b7fec4,4,(nil))
  382. 10113.600:00d4:00ec:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1a6fec4,4,(nil))
  383. 10113.611:00d4:00d8:trace:seh:NtSetInformationThread (0xc4,3,0x31fa20,4)
  384. 10113.612:00d4:00d8:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00d8
  385. 10113.612:00d4:00d8:trace:seh:dispatch_exception info[0]=19930520
  386. 10113.612:00d4:00d8:trace:seh:dispatch_exception info[1]=0031fb20
  387. 10113.612:00d4:00d8:trace:seh:dispatch_exception info[2]=00a7d9b0
  388. 10113.612:00d4:00d8:trace:seh:dispatch_exception eax=0031fa70 ebx=00000000 ecx=00000000 edx=0031fa84 esi=0031fafc edi=0031fa8c
  389. 10113.612:00d4:00d8:trace:seh:dispatch_exception ebp=0031fac8 esp=0031fa64 cs=200023 ds=70002b es=6d002b fs=650063 gs=73006b flags=00200213
  390. 10113.612:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  391. 10113.612:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  392. 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 00908F38 code=e06d7363 flags=1
  393. 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 00908F38 returned 1
  394. 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 008F4CEE code=e06d7363 flags=1
  395. 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 008F4CEE returned 1
  396. 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 008F18EA code=e06d7363 flags=1
  397. 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 008F18EA returned 1
  398. 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 00903CEE code=e06d7363 flags=1
  399. 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 00903CEE returned 1
  400. 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 008EB9E0 code=e06d7363 flags=1
  401. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  402. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00a74b60 ecx=006510f6 edx=00000000 esi=0031f628 edi=00a74b70
  403. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f534 esp=0031f520 eip=0064534a cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  404. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  405. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  406. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 00908F38 code=e06d7363 flags=3
  407. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 00908F38 returned 1
  408. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 008F4CEE code=e06d7363 flags=3
  409. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 008F4CEE returned 1
  410. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 008F18EA code=e06d7363 flags=3
  411. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 008F18EA returned 1
  412. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 00903CEE code=e06d7363 flags=3
  413. 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 00903CEE returned 1
  414. 10113.785:00d4:00d8:fixme:rawinput:RegisterRawInputDevices Unhandled flags 0x230 for device 0.
  415. 10114.865:003c:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x129fc50,4,(nil))
  416. 10114.915:0030:0048:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe9fc50,4,(nil))
  417. 10126.666:00d4:00d8:trace:seh:NtSetInformationThread (0xd8,3,0x31f22c,4)
  418. 10130.781:00d4:0100:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x707fea0,4,(nil))
  419. 10130.797:00d4:00d8:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00d8
  420. 10130.797:00d4:00d8:trace:seh:dispatch_exception info[0]=19930520
  421. 10130.797:00d4:00d8:trace:seh:dispatch_exception info[1]=0031fd8f
  422. 10130.797:00d4:00d8:trace:seh:dispatch_exception info[2]=00a8b150
  423. 10130.797:00d4:00d8:trace:seh:dispatch_exception eax=0031fce4 ebx=7ffdf000 ecx=00000000 edx=0031fcf8 esi=0031fd70 edi=0031fd00
  424. 10130.797:00d4:00d8:trace:seh:dispatch_exception ebp=0031fd3c esp=0031fcd8 cs=f7610023 ds=7db0002b es=002b fs=7db00063 gs=f7da006b flags=00200213
  425. 10130.797:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  426. 10130.797:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  427. 10130.797:00d4:00d8:trace:seh:call_stack_handlers calling handler at 00903780 code=e06d7363 flags=1
  428. 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  429. 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00a8b1a8 ecx=006510f6 edx=00000000 esi=0031f898 edi=00a8b194
  430. 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f7a4 esp=0031f790 eip=0064534a cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  431. 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  432. 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  433. 10130.797:00d4:00f8:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1b7fec4,4,(nil))
  434. 10130.797:00d4:00f4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x195fec4,4,(nil))
  435. starting tate:elephant
  436. hasSteamClient=1
  437. steamLanguage=german, id=de
  438. order of files has changed. please rebuild...
  439. expected file:
  440. <misc/powerBars/loading_bar.tga>
  441. - vs -
  442. stream file:
  443. <levels/21_ladownia/loading_pl.bmp>.-----------------------------------------------------------
  444. loading 21_ladownia.ar
  445. order of files has changed. please rebuild...
  446. expected file:
  447. <build/win32/21_ladownia.ar>
  448. - vs -
  449. stream file:
  450. <misc/demo_pc_ml/kao_small_logo_pl.tga>.the End.
  451. 10131.017:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31fdf4,4)
  452. 10131.019:00d4:00d8:trace:seh:NtSetInformationThread (0xbc,3,0x31f8bc,4)
  453. 10131.019:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31f818,4)
  454. 10131.019:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31f820,4)
  455. Setting breakpad minidump AppID = 1048540
  456. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198109214015 [API loaded no]
  457. 10132.079:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  458. 10132.079:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  459. 10132.079:0058:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1aefda0,4,(nil))
  460. 10132.080:0090:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  461. 10132.080:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  462. 10132.080:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  463. 10132.080:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  464. 10132.080:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000061ec8 r11=0000000000e8ecd8
  465. 10132.080:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000065570 r14=0000000000000000 r15=00000000ffba0000
  466. 10132.080:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  467. 10132.080:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  468. 10132.081:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  469. 10132.081:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  470. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  471. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  472. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  473. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  474. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  475. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  476. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  477. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  478. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  479. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  480. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  481. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  482. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  483. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  484. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  485. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  486. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  487. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  488. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  489. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  490. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  491. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  492. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  493. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  494. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  495. 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  496. 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  497. 10132.081:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  498. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  499. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  500. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  501. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  502. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  503. 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  504. 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  505. 10132.081:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  506. 10132.081:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  507. 10132.081:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  508. 10132.081:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  509. 10132.081:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  510. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  511. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  512. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  513. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  514. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  515. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  516. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  517. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  518. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  519. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  520. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  521. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  522. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  523. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  524. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  525. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  526. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  527. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  528. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  529. 10132.081:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  530. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  531. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  532. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  533. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  534. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  535. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  536. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  537. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  538. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  539. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  540. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  541. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  542. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  543. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  544. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  545. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  546. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  547. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  548. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  549. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  550. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  551. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  552. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  553. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  554. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  555. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  556. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  557. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  558. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  559. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  560. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  561. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  562. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  563. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  564. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  565. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  566. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  567. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  568. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  569. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  570. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  571. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  572. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  573. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  574. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  575. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  576. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  577. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  578. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  579. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  580. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  581. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  582. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  583. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  584. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  585. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  586. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  587. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  588. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  589. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  590. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  591. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  592. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  593. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  594. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  595. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  596. 10132.081:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  597. 10132.081:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  598. 10132.081:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  599. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  600. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  601. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  602. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  603. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  604. 10132.081:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  605. 10132.081:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  606. 10132.081:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  607. 10132.081:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  608. 10132.081:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a7c0 rbp=0000000000000000 rsp=0000000000e8eea0
  609. 10132.081:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000102f8 r11=0000000000e8ef18
  610. 10132.081:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000061d90 r14=0000000000000000 r15=00000000ffba0000
  611. 10132.081:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  612. 10132.081:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  613. 10132.081:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  614. 10132.081:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  615. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  616. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  617. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  618. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  619. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  620. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  621. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  622. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  623. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  624. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  625. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  626. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  627. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  628. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  629. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  630. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  631. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  632. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  633. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  634. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  635. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  636. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  637. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  638. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  639. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  640. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  641. 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  642. 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  643. 10132.081:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  644. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  645. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  646. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  647. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  648. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  649. 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  650. 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  651. 10132.081:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  652. 10132.081:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  653. 10132.081:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  654. 10132.081:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  655. 10132.081:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  656. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  657. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  658. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  659. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  660. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  661. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  662. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  663. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  664. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  665. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  666. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  667. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  668. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  669. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  670. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  671. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  672. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  673. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  674. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  675. 10132.081:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  676. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  677. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  678. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  679. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  680. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  681. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  682. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  683. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  684. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  685. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  686. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  687. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  688. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  689. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  690. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  691. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  692. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  693. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  694. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  695. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  696. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  697. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  698. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  699. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  700. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  701. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  702. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  703. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  704. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  705. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  706. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  707. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  708. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  709. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  710. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  711. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  712. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  713. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  714. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  715. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  716. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  717. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  718. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  719. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  720. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  721. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  722. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  723. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  724. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  725. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  726. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  727. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  728. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  729. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  730. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  731. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  732. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  733. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  734. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  735. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  736. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  737. 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  738. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  739. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  740. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  741. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  742. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  743. 10132.081:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  744. 10132.081:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  745. 10132.081:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  746. 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  747. 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  748. 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  749. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  750. 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  751. 10132.081:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  752. 10132.082:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  753. 10132.082:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  754. 10132.082:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  755. 10132.082:0058:0068:trace:seh:dispatch_exception rsi=0000000000000110 rdi=000000000005a7c0 rbp=0000000000000000 rsp=0000000000e8eea0
  756. 10132.082:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000010188 r11=0000000000e8ef18
  757. 10132.082:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000061d90 r14=0000000000000000 r15=00000000ffba0000
  758. 10132.082:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  759. 10132.082:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  760. 10132.082:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  761. 10132.082:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  762. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  763. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  764. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  765. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  766. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  767. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  768. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  769. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  770. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  771. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  772. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  773. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  774. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  775. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  776. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  777. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  778. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  779. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  780. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  781. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  782. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  783. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  784. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  785. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  786. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  787. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  788. 10132.082:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  789. 10132.082:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  790. 10132.082:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  791. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  792. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  793. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  794. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  795. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  796. 10132.082:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  797. 10132.082:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  798. 10132.082:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  799. 10132.082:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  800. 10132.082:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  801. 10132.082:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  802. 10132.082:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  803. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  804. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  805. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  806. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  807. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  808. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  809. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  810. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  811. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  812. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  813. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  814. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  815. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  816. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  817. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  818. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  819. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  820. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  821. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  822. 10132.082:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  823. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  824. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  825. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  826. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  827. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  828. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  829. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  830. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  831. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  832. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  833. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  834. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  835. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  836. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  837. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  838. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  839. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  840. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  841. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  842. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  843. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  844. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  845. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  846. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  847. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  848. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  849. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  850. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  851. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  852. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  853. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  854. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  855. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  856. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  857. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  858. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  859. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  860. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  861. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  862. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  863. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  864. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  865. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  866. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  867. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  868. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  869. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  870. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  871. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  872. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  873. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  874. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  875. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  876. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  877. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  878. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  879. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  880. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  881. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  882. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  883. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  884. 10132.082:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  885. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  886. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  887. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  888. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  889. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  890. 10132.082:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  891. 10132.082:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  892. 10132.082:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  893. 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  894. 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  895. 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  896. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  897. 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  898. 10132.082:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  899. 10132.084:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  900. 10132.084:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  901. 10132.084:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  902. 10132.084:0058:0068:trace:seh:dispatch_exception rsi=0000000000000110 rdi=000000000005a7c0 rbp=0000000000000000 rsp=0000000000e8eea0
  903. 10132.084:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=000000000005c810 r11=0000000000e8ef18
  904. 10132.084:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000061d90 r14=0000000000000000 r15=00000000ffba0000
  905. 10132.084:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  906. 10132.084:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  907. 10132.084:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  908. 10132.084:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  909. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  910. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  911. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  912. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  913. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  914. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  915. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  916. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  917. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  918. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  919. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  920. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  921. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  922. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  923. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  924. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  925. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  926. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  927. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  928. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  929. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  930. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  931. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  932. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  933. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  934. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  935. 10132.084:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  936. 10132.084:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  937. 10132.084:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  938. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  939. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  940. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  941. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  942. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  943. 10132.084:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  944. 10132.084:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  945. 10132.084:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  946. 10132.084:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  947. 10132.084:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  948. 10132.084:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  949. 10132.084:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  950. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  951. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  952. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  953. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  954. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  955. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  956. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  957. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  958. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  959. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  960. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  961. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  962. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  963. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  964. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  965. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  966. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  967. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  968. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  969. 10132.084:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  970. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  971. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  972. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  973. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  974. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  975. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  976. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  977. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  978. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  979. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  980. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  981. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  982. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  983. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  984. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  985. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  986. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  987. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  988. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  989. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  990. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  991. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  992. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  993. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  994. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  995. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  996. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  997. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  998. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  999. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  1000. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  1001. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  1002. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  1003. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  1004. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  1005. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  1006. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  1007. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  1008. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  1009. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  1010. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1011. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  1012. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  1013. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  1014. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1015. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1016. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1017. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  1018. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  1019. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  1020. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1021. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  1022. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  1023. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  1024. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1025. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1026. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1027. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1028. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  1029. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  1030. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  1031. 10132.084:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1032. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1033. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1034. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1035. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  1036. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  1037. 10132.084:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  1038. 10132.084:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  1039. 10132.084:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  1040. 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  1041. 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  1042. 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  1043. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1044. 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1045. 10132.084:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  1046. 10132.085:0058:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x18dfda0,4,(nil))
  1047. 10132.085:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  1048. 10132.085:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  1049. 10132.086:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  1050. 10132.087:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  1051. 10132.089:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  1052. 10132.089:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  1053. 10132.090:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  1054. 10132.182:0030:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  1055. 10132.182:0030:00a4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  1056. 10132.182:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  1057. 10132.183:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  1058. 10132.183:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  1059. 10132.183:0030:0110:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1f1fda0,4,(nil))
  1060. 10132.183:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  1061. pid 11018 != 11017, skipping destruction (fork without exec?)
  1062.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement