Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ======================
- Proton: 1607363535 proton-5.13-3
- SteamGameId: 1048540
- Command: ['/z004/sdd1/user/vortex/Spiele/SteamLibrary/steamapps/common/Kao the Kangaroo Round 2/kao2.exe']
- Options: {'forcelgadd'}
- SteamLinuxRuntime: v0.20201124.0-0-gd107701
- pressure-vessel: 0.20201124.0+srt1 scout 0.20201125.0
- soldier: 0.20201124.0 soldier 0.20201124.0
- ======================
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- esync: up and running.
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10109.073:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10109.073:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10109.073:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10109.074:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
- 10109.074:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
- 10109.076:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FF2B1540000: builtin
- 10109.076:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10109.076:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FF2B1760000: builtin
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10109.434:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10109.435:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10109.435:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10109.436:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
- 10109.436:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
- 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F15D0AF0000: builtin
- 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F15D0D10000: builtin
- 10109.438:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10109.439:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10109.439:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10109.440:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10109.471:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10109.471:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10109.471:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10109.472:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
- 10109.472:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
- 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB0D7760000: builtin
- 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB0D7980000: builtin
- 10109.473:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB0D7300000: builtin
- 10109.475:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB0D74C0000: builtin
- 10109.630:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 10109.630:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10109.649:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10109.650:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10109.650:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10109.650:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
- 10109.650:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
- 10109.652:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F7AD2AD0000: builtin
- 10109.652:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10109.652:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F7AD2CF0000: builtin
- 10109.653:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F7AD29E0000: builtin
- 10109.653:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
- 10109.661:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10109.690:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
- 10109.693:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F7AD2950000: builtin
- 10109.693:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10109.693:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10109.695:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
- 10109.699:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
- 10109.699:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
- 10109.700:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
- 10109.701:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
- 10109.856:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x14bf360,30,(nil))
- 10109.859:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F7AD0FE0000: builtin
- 10109.859:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x16cf980,30,(nil))
- 10109.876:0058:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x18df980,30,(nil))
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10109.903:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10109.904:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10109.904:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10109.904:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
- 10109.904:0090:0094:trace:seh:install_bpf Seccomp filters already installed.
- 10109.906:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F05BBFB0000: builtin
- 10109.906:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10109.906:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F05BC1D0000: builtin
- 10109.907:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F05BBEC0000: builtin
- 10109.907:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
- 10109.917:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10109.922:0090:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
- 10109.925:0090:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F05BBE40000: builtin
- 10109.929:0090:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10109.929:0090:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10109.931:0090:00a0:trace:seh:NtQueryInformationThread (0x60,0,0xe8f750,30,(nil))
- 10109.937:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FF2B0900000: builtin
- 10109.939:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FF2B0670000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 10109.941:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FF2B0AB0000: builtin
- 10110.009:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 10110.012:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
- 10110.013:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
- 10110.014:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
- 10110.015:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7ECE0000: builtin
- 10110.017:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7EB40000: builtin
- 10110.017:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
- 10110.017:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EC30000: builtin
- 10110.018:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E9D0000: builtin
- 10110.019:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
- 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
- 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
- 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E7A0000: builtin
- 10110.021:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
- 10110.027:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
- 10110.027:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
- 10110.027:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DD90000: builtin
- 10110.125:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10110.130:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10110.131:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10110.131:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10110.132:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
- 10110.132:00b0:00b4:trace:seh:check_bpf_jit_enable enabled 0x31.
- 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F60D8C40000: builtin
- 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F60D8E60000: builtin
- 10110.134:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F60D8A80000: builtin
- 10110.135:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10110.137:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10110.137:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10110.137:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F60D87F0000: builtin
- Setting breakpad minidump AppID = 1048540
- Steam_SetMinidumpSteamID: Caching Steam ID: 76561198109214015 [API loaded no]
- 10110.208:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 10110.208:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 10110.210:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F60D8450000: builtin
- skipping config: /home/vortex/.config/MangoHud/wine-explorer.conf [ not found ]
- skipping config: /home/vortex/.local/share/Steam/steamapps/common/Proton 5.13/dist/bin/MangoHud.conf [ not found ]
- skipping config: /home/vortex/.config/MangoHud/wine64-preloader.conf [ not found ]
- parsing config: /home/vortex/.config/MangoHud/MangoHud.conf [ ok ]
- skipping config: /home/vortex/.config/MangoHud/wine-explorer.conf [ not found ]
- skipping config: /home/vortex/.local/share/Steam/steamapps/common/Proton 5.13/dist/bin/MangoHud.conf [ not found ]
- skipping config: /home/vortex/.config/MangoHud/wine64-preloader.conf [ not found ]
- parsing config: /home/vortex/.config/MangoHud/MangoHud.conf [ ok ]
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10110.492:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
- 10110.493:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
- 10110.493:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
- 10110.493:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
- 10110.493:00bc:00c0:trace:seh:check_bpf_jit_enable enabled 0x31.
- 10110.495:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F926B320000: builtin
- 10110.495:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
- 10110.495:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F926B530000: builtin
- 10110.496:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F926B150000: builtin
- 10110.497:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
- 10110.499:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
- 10110.499:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
- 10110.499:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F926AED0000: builtin
- 10110.500:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 10110.500:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 10110.500:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F60D6F80000: builtin
- 10110.504:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
- 10110.504:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
- 10110.506:0020:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5E60000: builtin
- 10110.597:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
- 10110.597:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
- 10110.601:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F926AB20000: builtin
- 10110.623:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
- 10110.624:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
- 10110.624:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F9269700000: builtin
- 10110.628:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
- 10110.628:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
- ERROR: ld.so: object '/home/vortex/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud_dlsym.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- ERROR: ld.so: object '/usr/lib/mangohud/$LIB/libMangoHud.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
- 10110.652:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
- 10110.652:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
- 10110.652:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
- 10110.655:00d4:00d8:trace:loaddll:build_module Loaded L"Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\kao2.exe" at 00400000: native
- 10110.659:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E930000: builtin
- 10110.659:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
- 10110.659:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA90000: builtin
- 10110.660:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
- 10110.660:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
- 10110.660:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
- 10110.661:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7C0000: builtin
- 10110.661:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 7EB20000: builtin
- 10110.662:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OPENGL32.dll" at 7A840000: builtin
- 10110.662:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\GLU32.dll" at 7E770000: builtin
- 10110.664:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 66640000: builtin
- 10110.664:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
- 10110.664:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 639C0000: builtin
- 10110.665:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCRT.dll" at 7E6C0000: builtin
- 10110.665:00d4:00d8:trace:loaddll:build_module Loaded L"Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\glut32.dll" at 10000000: native
- 10110.666:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DSOUND.dll" at 6D5C0000: builtin
- 10110.668:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
- 10110.669:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
- 10110.669:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 6E8C0000: builtin
- 10110.669:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVFW32.dll" at 00320000: builtin
- 10110.670:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\AVIFIL32.dll" at 6E680000: builtin
- 10110.677:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 64D80000: builtin
- 10110.677:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 7E630000: builtin
- 10110.684:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
- 10110.684:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
- 10110.684:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 7C620000: builtin
- 10110.685:00d4:00d8:trace:loaddll:build_module Loaded L"Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\steam_api.dll" at 3B400000: native
- 10110.686:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winspool.drv" at 7DD00000: builtin
- 10110.686:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\COMDLG32.dll" at 6B8C0000: builtin
- 10110.687:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 6A300000: builtin
- 10110.797:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7D990000: builtin
- 10110.813:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 62340000: builtin
- 10110.813:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 6E540000: builtin
- 10110.814:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 6BA80000: builtin
- 10110.814:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 00370000: builtin
- 10110.814:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,17,(nil),0)
- 10110.914:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at F5E10000: builtin
- 10110.914:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient.dll" at 38000000: native
- 10111.180:00d4:00d8:warn:seh:OutputDebugStringA "moduleFilePathW="
- 10111.180:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.180:00d4:00d8:trace:seh:dispatch_exception info[0]=00000011
- 10111.180:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.180:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=0000001d ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.180:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=5c0023 ds=31002b es=7bc2002b fs=0063 gs=31006b flags=00200213
- 10111.180:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.180:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.180:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.180:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\kao2.exe"
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000060
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=00000045 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "\n"
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000002
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=001ca798 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "mediaDir="
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=0000000a
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=0000001d ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "Z:\\z004\\sdd1\\user\\vortex\\Spiele\\SteamLibrary\\steamapps\\common\\Kao the Kangaroo Round 2\\media\\"
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=0000005e
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=00005c5c ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "\n"
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000002
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=001ca798 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=f605006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "saveDir="
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000009
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=0000001d ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=5c0023 ds=002b es=31002b fs=7ffd0063 gs=006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.181:00d4:00d8:warn:seh:OutputDebugStringA "C:\\users\\steamuser\\Local Settings\\Application Data\\Kao - Round 2\\"
- 10111.181:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[0]=00000042
- 10111.181:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.181:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=00005c5c ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.181:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=006b flags=00200213
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.181:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.181:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.182:00d4:00d8:warn:seh:OutputDebugStringA "\n"
- 10111.182:00d4:00d8:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10111.182:00d4:00d8:trace:seh:dispatch_exception info[0]=00000002
- 10111.182:00d4:00d8:trace:seh:dispatch_exception info[1]=001ca798
- 10111.182:00d4:00d8:trace:seh:dispatch_exception eax=0031f974 ebx=001ca798 ecx=00000000 edx=0031f988 esi=0031fa0c edi=0031f98c
- 10111.182:00d4:00d8:trace:seh:dispatch_exception ebp=0031f9cc esp=0031f968 cs=f7f60023 ds=31002b es=002b fs=310063 gs=006b flags=00200213
- 10111.182:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
- 10111.182:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10111.182:00d4:00d8:trace:seh:call_stack_handlers calling handler at 7B073180 code=40010006 flags=0
- 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind code=40010006 flags=2
- 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0031fa10 esi=0031f974 edi=0031fa10
- 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f4c0 esp=0031f4b8 eip=7b07310e cs=0023 ds=002b fs=0063 gs=006b flags=00200216
- 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
- 10111.182:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10111.193:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 6AEC0000: builtin
- 10111.193:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.dll" at 013F0000: native
- 10113.060:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31fcc8,4)
- 10113.532:00d4:00d8:fixme:system:SystemParametersInfoW Unimplemented action: 59 (SPI_SETSTICKYKEYS)
- 10113.535:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mmdevapi.dll" at 70340000: builtin
- 10113.536:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winepulse.drv" at F1410000: builtin
- 10113.545:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winealsa.drv" at F13D0000: builtin
- 10113.546:00d4:00d8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\winealsa.drv" : builtin
- 10113.550:00d4:00d8:trace:seh:NtSetInformationThread (0xbc,3,0x31f58c,4)
- 10113.588:00d4:00d8:trace:seh:NtSetInformationThread (0xc4,3,0x31f950,4)
- 10113.588:00d4:00e8:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1a6fec4,4,(nil))
- 10113.588:00d4:00e4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x195fec4,4,(nil))
- 10113.599:00d4:00d8:trace:seh:NtSetInformationThread (0xc4,3,0x31f950,4)
- 10113.600:00d4:00f0:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1b7fec4,4,(nil))
- 10113.600:00d4:00ec:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1a6fec4,4,(nil))
- 10113.611:00d4:00d8:trace:seh:NtSetInformationThread (0xc4,3,0x31fa20,4)
- 10113.612:00d4:00d8:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10113.612:00d4:00d8:trace:seh:dispatch_exception info[0]=19930520
- 10113.612:00d4:00d8:trace:seh:dispatch_exception info[1]=0031fb20
- 10113.612:00d4:00d8:trace:seh:dispatch_exception info[2]=00a7d9b0
- 10113.612:00d4:00d8:trace:seh:dispatch_exception eax=0031fa70 ebx=00000000 ecx=00000000 edx=0031fa84 esi=0031fafc edi=0031fa8c
- 10113.612:00d4:00d8:trace:seh:dispatch_exception ebp=0031fac8 esp=0031fa64 cs=200023 ds=70002b es=6d002b fs=650063 gs=73006b flags=00200213
- 10113.612:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
- 10113.612:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 00908F38 code=e06d7363 flags=1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 00908F38 returned 1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 008F4CEE code=e06d7363 flags=1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 008F4CEE returned 1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 008F18EA code=e06d7363 flags=1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 008F18EA returned 1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 00903CEE code=e06d7363 flags=1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers handler at 00903CEE returned 1
- 10113.612:00d4:00d8:trace:seh:call_stack_handlers calling handler at 008EB9E0 code=e06d7363 flags=1
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00a74b60 ecx=006510f6 edx=00000000 esi=0031f628 edi=00a74b70
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f534 esp=0031f520 eip=0064534a cs=0023 ds=002b fs=0063 gs=006b flags=00200246
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 00908F38 code=e06d7363 flags=3
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 00908F38 returned 1
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 008F4CEE code=e06d7363 flags=3
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 008F4CEE returned 1
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 008F18EA code=e06d7363 flags=3
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 008F18EA returned 1
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 00903CEE code=e06d7363 flags=3
- 10113.612:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 00903CEE returned 1
- 10113.785:00d4:00d8:fixme:rawinput:RegisterRawInputDevices Unhandled flags 0x230 for device 0.
- 10114.865:003c:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x129fc50,4,(nil))
- 10114.915:0030:0048:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe9fc50,4,(nil))
- 10126.666:00d4:00d8:trace:seh:NtSetInformationThread (0xd8,3,0x31f22c,4)
- 10130.781:00d4:0100:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x707fea0,4,(nil))
- 10130.797:00d4:00d8:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00d8
- 10130.797:00d4:00d8:trace:seh:dispatch_exception info[0]=19930520
- 10130.797:00d4:00d8:trace:seh:dispatch_exception info[1]=0031fd8f
- 10130.797:00d4:00d8:trace:seh:dispatch_exception info[2]=00a8b150
- 10130.797:00d4:00d8:trace:seh:dispatch_exception eax=0031fce4 ebx=7ffdf000 ecx=00000000 edx=0031fcf8 esi=0031fd70 edi=0031fd00
- 10130.797:00d4:00d8:trace:seh:dispatch_exception ebp=0031fd3c esp=0031fcd8 cs=f7610023 ds=7db0002b es=002b fs=7db00063 gs=f7da006b flags=00200213
- 10130.797:00d4:00d8:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
- 10130.797:00d4:00d8:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
- 10130.797:00d4:00d8:trace:seh:call_stack_handlers calling handler at 00903780 code=e06d7363 flags=1
- 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
- 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00a8b1a8 ecx=006510f6 edx=00000000 esi=0031f898 edi=00a8b194
- 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind ebp=0031f7a4 esp=0031f790 eip=0064534a cs=0023 ds=002b fs=0063 gs=006b flags=00200246
- 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
- 10130.797:00d4:00d8:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
- 10130.797:00d4:00f8:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x1b7fec4,4,(nil))
- 10130.797:00d4:00f4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x195fec4,4,(nil))
- starting tate:elephant
- hasSteamClient=1
- steamLanguage=german, id=de
- order of files has changed. please rebuild...
- expected file:
- <misc/powerBars/loading_bar.tga>
- - vs -
- stream file:
- <levels/21_ladownia/loading_pl.bmp>.-----------------------------------------------------------
- loading 21_ladownia.ar
- order of files has changed. please rebuild...
- expected file:
- <build/win32/21_ladownia.ar>
- - vs -
- stream file:
- <misc/demo_pc_ml/kao_small_logo_pl.tga>.the End.
- 10131.017:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31fdf4,4)
- 10131.019:00d4:00d8:trace:seh:NtSetInformationThread (0xbc,3,0x31f8bc,4)
- 10131.019:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31f818,4)
- 10131.019:00d4:00d8:trace:seh:NtSetInformationThread (0xfffffffe,10,0x31f820,4)
- Setting breakpad minidump AppID = 1048540
- Steam_SetMinidumpSteamID: Caching Steam ID: 76561198109214015 [API loaded no]
- 10132.079:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
- 10132.079:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
- 10132.079:0058:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1aefda0,4,(nil))
- 10132.080:0090:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
- 10132.080:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
- 10132.080:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
- 10132.080:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
- 10132.080:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000061ec8 r11=0000000000e8ecd8
- 10132.080:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000065570 r14=0000000000000000 r15=00000000ffba0000
- 10132.080:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
- 10132.080:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
- 10132.081:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
- 10132.081:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
- 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
- 10132.081:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
- 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
- 10132.081:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
- 10132.081:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
- 10132.081:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
- 10132.081:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
- 10132.081:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
- 10132.081:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.081:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
- 10132.081:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
- 10132.081:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.081:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
- 10132.081:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
- 10132.081:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
- 10132.081:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
- 10132.081:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a7c0 rbp=0000000000000000 rsp=0000000000e8eea0
- 10132.081:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000102f8 r11=0000000000e8ef18
- 10132.081:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000061d90 r14=0000000000000000 r15=00000000ffba0000
- 10132.081:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
- 10132.081:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
- 10132.081:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
- 10132.081:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
- 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 10132.081:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.081:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
- 10132.081:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 10132.081:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
- 10132.081:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
- 10132.081:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
- 10132.081:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
- 10132.081:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
- 10132.081:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.081:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
- 10132.081:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
- 10132.081:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
- 10132.081:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
- 10132.081:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.081:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.081:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.081:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
- 10132.082:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
- 10132.082:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
- 10132.082:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
- 10132.082:0058:0068:trace:seh:dispatch_exception rsi=0000000000000110 rdi=000000000005a7c0 rbp=0000000000000000 rsp=0000000000e8eea0
- 10132.082:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000010188 r11=0000000000e8ef18
- 10132.082:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000061d90 r14=0000000000000000 r15=00000000ffba0000
- 10132.082:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
- 10132.082:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
- 10132.082:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
- 10132.082:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.082:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
- 10132.082:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 10132.082:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.082:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
- 10132.082:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 10132.082:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
- 10132.082:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
- 10132.082:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
- 10132.082:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
- 10132.082:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
- 10132.082:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.082:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
- 10132.082:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
- 10132.082:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
- 10132.082:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
- 10132.082:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.082:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.082:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.082:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
- 10132.084:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
- 10132.084:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
- 10132.084:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
- 10132.084:0058:0068:trace:seh:dispatch_exception rsi=0000000000000110 rdi=000000000005a7c0 rbp=0000000000000000 rsp=0000000000e8eea0
- 10132.084:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=000000000005c810 r11=0000000000e8ef18
- 10132.084:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=0000000000061d90 r14=0000000000000000 r15=00000000ffba0000
- 10132.084:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
- 10132.084:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
- 10132.084:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
- 10132.084:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.084:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
- 10132.084:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 10132.084:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.084:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
- 10132.084:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
- 10132.084:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
- 10132.084:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
- 10132.084:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
- 10132.084:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
- 10132.084:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
- 10132.084:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
- 10132.084:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
- 10132.084:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
- 10132.084:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
- 10132.084:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
- 10132.084:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
- 10132.084:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
- 10132.084:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
- 10132.084:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
- 10132.085:0058:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x18dfda0,4,(nil))
- 10132.085:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
- 10132.085:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
- 10132.086:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
- 10132.087:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
- 10132.089:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
- 10132.089:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
- 10132.090:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
- 10132.182:0030:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
- 10132.182:0030:00a4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
- 10132.182:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
- 10132.183:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
- 10132.183:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
- 10132.183:0030:0110:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1f1fda0,4,(nil))
- 10132.183:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
- pid 11018 != 11017, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement