Advertisement
aRatherDapperFox

Elden Ring/Proton Crash Log

Jun 25th, 2022
172
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 231.67 KB | None | 0 0
  1. ======================
  2. Proton: 1655841837 experimental-7.0-20220621
  3. SteamGameId: 1245620
  4. Command: ['/home/cujo/.steam/debian-installation/steamapps/common/ELDEN RING/Game/start_protected_game.exe']
  5. Options: {'forcelgadd'}
  6. depot: 0.20220509.53
  7. pressure-vessel: 0.20220420.0
  8. scripts: v0.20220311.0-0-gae4cbed
  9. soldier: 0.20220509.0 soldier 0.20220509.0
  10. Kernel: Linux 5.10.0-15-amd64 #1 SMP Debian 5.10.120-1 (2022-06-09) x86_64
  11. ======================
  12. esync: up and running.
  13. wine: RLIMIT_NICE is <= 20, unable to use setpriority safely
  14. 1047.601:0028:002c:trace:seh:install_bpf Installing seccomp filters.
  15. 1047.601:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  16. 1047.603:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
  17. 1047.604:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 1047.604:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  19. 1047.606:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  20. 1047.608:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  21. 1047.608:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  22. 1047.608:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  23. 1047.608:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00000001EC2B0000: builtin
  24. 1047.643:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  25. 1047.643:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  26. 1047.644:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
  27. 1047.644:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  28. 1047.644:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  29. 1047.645:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  30. 1047.646:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  31. 1047.646:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  32. 1047.646:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  33. 1047.646:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  34. 1047.647:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  35. 1047.647:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  36. 1047.647:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
  37. 1047.680:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  38. 1047.680:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  39. 1047.681:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
  40. 1047.681:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  41. 1047.681:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  42. 1047.682:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  43. 1047.683:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  44. 1047.683:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  45. 1047.683:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  46. 1047.683:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
  47. 1047.688:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  48. 1047.718:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00000001FBAC0000: builtin
  49. 1047.721:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  50. 1047.721:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  51. 1047.741:0060:0064:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  52. 1047.741:0060:0064:trace:seh:install_bpf Seccomp filters already installed.
  53. 1047.741:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
  54. 1047.742:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  55. 1047.742:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  56. 1047.743:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  57. 1047.743:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  58. 1047.743:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  59. 1047.743:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  60. 1047.744:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
  61. 1047.747:0060:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  62. 1047.753:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F474B9B0000: builtin
  63. 1047.756:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  64. 1047.756:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  65. 1047.761:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\hidparse.sys" at 00000002ADF30000: builtin
  66. 1047.761:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00000001C9230000: builtin
  67. 1047.765:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  68. 1047.766:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  69. 1047.766:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  70. 1047.766:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\hidclass.sys" at 000000031DF10000: builtin
  71. 1047.766:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
  72. 1047.783:0060:006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  73. 1047.786:0060:006c:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=006c
  74. 1047.786:0060:006c:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  75. 1047.786:0060:006c:trace:seh:dispatch_exception rax=000000007b012470 rbx=000000000106db78 rcx=000000000106d890 rdx=0000000000000000
  76. 1047.786:0060:006c:trace:seh:dispatch_exception rsi=00000000000000c8 rdi=0000000001750230 rbp=00000001c8e1a170 rsp=000000000106d870
  77. 1047.786:0060:006c:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000011f0020 r11=a55a5aa5a55a5aa5
  78. 1047.786:0060:006c:trace:seh:dispatch_exception r12=000000000106db78 r13=0000000001200050 r14=0000000000000000 r15=0000000001200050
  79. 1047.786:0060:006c:trace:seh:call_vectored_handlers calling handler at 00000002279AD660 code=6ba flags=0
  80. 1047.786:0060:006c:trace:seh:call_vectored_handlers handler at 00000002279AD660 returned 0
  81. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000106D870
  82. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  83. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  84. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  85. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  86. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  87. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231B226C2 rsp 000000000106D950
  88. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  89. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  90. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  91. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000106D980
  92. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  93. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  94. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  95. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  96. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  97. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  98. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279C435D rsp 000000000106D9E0
  99. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  100. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  101. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  102. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  103. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  104. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  105. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  106. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  107. 1047.786:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DA50 rsp 000000000106DD40 handler 00000002279C3D20
  108. 1047.786:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106CDB0, dispatch=000000000106CC80)
  109. 1047.786:0060:006c:trace:seh:call_teb_handler handler at 00000002279C3D20 returned 1
  110. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279BB5B5 rsp 000000000106DD40
  111. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  112. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  113. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  114. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  115. 1047.786:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DD70 rsp 000000000106DEB0 handler 00000002279C5300
  116. 1047.786:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C5300 (rec=000000000106D890, frame=000000000106DD70 context=000000000106CDB0, dispatch=000000000106CC80)
  117. 1047.786:0060:006c:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000106DD70 target_ip=00000002279C529A rip=000000017005af1d
  118. 1047.786:0060:006c:trace:unwind:RtlUnwindEx rax=0000000067fd0000 rbx=000000000106da50 rcx=000000000106c680 rdx=00000002279c529a
  119. 1047.786:0060:006c:trace:unwind:RtlUnwindEx rsi=000000000106c130 rdi=000000000106cdb0 rbp=000000000106cb80 rsp=000000000106bfc0
  120. 1047.786:0060:006c:trace:unwind:RtlUnwindEx r8=000000000106d890 r9=00000002279c52d0 r10=000000000106ca60 r11=0000000000027570
  121. 1047.786:0060:006c:trace:unwind:RtlUnwindEx r12=000000000106d890 r13=000000000106c680 r14=000000000106dd70 r15=000000017006aa30
  122. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000106BFC0
  123. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  124. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  125. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  126. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  127. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  128. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  129. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  130. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  131. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  132. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  133. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  134. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000106C650
  135. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5b610-5b638
  136. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  137. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  138. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C529A rsp 000000000106CB60
  139. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 25280-2529c
  140. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FDC flags 0 prolog 0x8 bytes function 00000002279C5280-00000002279C529C
  141. 1047.786:0060:006c:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  142. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  143. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  144. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  145. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C52C9 rsp 000000000106CB90
  146. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 252a0-252ca
  147. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FE8 flags 0 prolog 0x4 bytes function 00000002279C52A0-00000002279C52CA
  148. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  149. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C5354 rsp 000000000106CBC0
  150. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 25300-25355
  151. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FF8 flags 0 prolog 0xa bytes function 00000002279C5300-00000002279C5355
  152. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  153. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r12
  154. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r13
  155. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r14
  156. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000106CC10
  157. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 59f30-5a441
  158. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  159. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  160. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  161. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  162. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  163. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  164. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  165. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  166. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  167. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  168. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000106D2D0
  169. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  170. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  171. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  172. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  173. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  174. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  175. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  176. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  177. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  178. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  179. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  180. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000106D370
  181. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5843c-584b1
  182. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  183. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  184. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000106D870
  185. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  186. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  187. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  188. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  189. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  190. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231B226C2 rsp 000000000106D950
  191. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  192. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  193. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  194. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000106D980
  195. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  196. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  197. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  198. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  199. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  200. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  201. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C435D rsp 000000000106D9E0
  202. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  203. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  204. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  205. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  206. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  207. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  208. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  209. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  210. 1047.786:0060:006c:trace:unwind:RtlUnwindEx found builtin frame 000000000106DA50 handler 00000002279C3D20
  211. 1047.786:0060:006c:trace:unwind:call_teb_unwind_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106C680, dispatch=000000000106C040)
  212. 1047.786:0060:006c:trace:unwind:call_teb_unwind_handler handler at 00000002279C3D20 returned 1
  213. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279BB5B5 rsp 000000000106DD40
  214. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  215. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  216. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  217. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  218. 1047.786:0060:006c:trace:seh:RtlRestoreContext returning to 00000002279C529A stack 000000000106DD40
  219. 1047.786:0060:006c:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=006c
  220. 1047.786:0060:006c:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  221. 1047.786:0060:006c:trace:seh:dispatch_exception rax=000000007b012470 rbx=000000000106db78 rcx=000000000106d890 rdx=0000000000000000
  222. 1047.786:0060:006c:trace:seh:dispatch_exception rsi=00000000000000c8 rdi=0000000001750230 rbp=00000001c8e1a170 rsp=000000000106d870
  223. 1047.786:0060:006c:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000011f0020 r11=a55a5aa5a55a5aa5
  224. 1047.786:0060:006c:trace:seh:dispatch_exception r12=000000000106db78 r13=0000000001200050 r14=0000000000000000 r15=0000000001200050
  225. 1047.786:0060:006c:trace:seh:call_vectored_handlers calling handler at 00000002279AD660 code=6ba flags=0
  226. 1047.786:0060:006c:trace:seh:call_vectored_handlers handler at 00000002279AD660 returned 0
  227. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000106D870
  228. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  229. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  230. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  231. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  232. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  233. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231B226C2 rsp 000000000106D950
  234. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  235. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  236. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  237. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000106D980
  238. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  239. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  240. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  241. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  242. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  243. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  244. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279C435D rsp 000000000106D9E0
  245. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  246. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  247. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  248. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  249. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  250. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  251. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  252. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  253. 1047.786:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DA50 rsp 000000000106DD40 handler 00000002279C3D20
  254. 1047.786:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106CDB0, dispatch=000000000106CC80)
  255. 1047.786:0060:006c:trace:seh:call_teb_handler handler at 00000002279C3D20 returned 1
  256. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279BB5B5 rsp 000000000106DD40
  257. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  258. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  259. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  260. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  261. 1047.786:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DD70 rsp 000000000106DEB0 handler 00000002279C5300
  262. 1047.786:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C5300 (rec=000000000106D890, frame=000000000106DD70 context=000000000106CDB0, dispatch=000000000106CC80)
  263. 1047.786:0060:006c:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000106DD70 target_ip=00000002279C529A rip=000000017005af1d
  264. 1047.786:0060:006c:trace:unwind:RtlUnwindEx rax=0000000067fd0000 rbx=000000000106da50 rcx=000000000106c680 rdx=00000002279c529a
  265. 1047.786:0060:006c:trace:unwind:RtlUnwindEx rsi=000000000106c130 rdi=000000000106cdb0 rbp=000000000106cb80 rsp=000000000106bfc0
  266. 1047.786:0060:006c:trace:unwind:RtlUnwindEx r8=000000000106d890 r9=00000002279c52d0 r10=00007f474c2b4660 r11=0000000000000000
  267. 1047.786:0060:006c:trace:unwind:RtlUnwindEx r12=000000000106d890 r13=000000000106c680 r14=000000000106dd70 r15=000000017006aa30
  268. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000106BFC0
  269. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  270. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  271. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  272. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  273. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  274. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  275. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  276. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  277. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  278. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  279. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  280. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000106C650
  281. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5b610-5b638
  282. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  283. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  284. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C529A rsp 000000000106CB60
  285. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 25280-2529c
  286. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FDC flags 0 prolog 0x8 bytes function 00000002279C5280-00000002279C529C
  287. 1047.786:0060:006c:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  288. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  289. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  290. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  291. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C52C9 rsp 000000000106CB90
  292. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 252a0-252ca
  293. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FE8 flags 0 prolog 0x4 bytes function 00000002279C52A0-00000002279C52CA
  294. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  295. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C5354 rsp 000000000106CBC0
  296. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 25300-25355
  297. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FF8 flags 0 prolog 0xa bytes function 00000002279C5300-00000002279C5355
  298. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  299. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r12
  300. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r13
  301. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r14
  302. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000106CC10
  303. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 59f30-5a441
  304. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  305. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  306. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  307. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  308. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  309. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  310. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  311. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  312. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  313. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  314. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000106D2D0
  315. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  316. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  317. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  318. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  319. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  320. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  321. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  322. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  323. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  324. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  325. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  326. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000106D370
  327. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 5843c-584b1
  328. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  329. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  330. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000106D870
  331. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  332. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  333. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  334. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  335. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  336. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231B226C2 rsp 000000000106D950
  337. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  338. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  339. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  340. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000106D980
  341. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  342. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  343. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  344. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  345. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  346. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  347. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C435D rsp 000000000106D9E0
  348. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  349. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  350. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  351. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  352. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  353. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  354. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  355. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  356. 1047.786:0060:006c:trace:unwind:RtlUnwindEx found builtin frame 000000000106DA50 handler 00000002279C3D20
  357. 1047.786:0060:006c:trace:unwind:call_teb_unwind_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106C680, dispatch=000000000106C040)
  358. 1047.786:0060:006c:trace:unwind:call_teb_unwind_handler handler at 00000002279C3D20 returned 1
  359. 1047.786:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279BB5B5 rsp 000000000106DD40
  360. 1047.786:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  361. 1047.786:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  362. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  363. 1047.786:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  364. 1047.786:0060:006c:trace:seh:RtlRestoreContext returning to 00000002279C529A stack 000000000106DD40
  365. 1047.791:0060:006c:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=006c
  366. 1047.791:0060:006c:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  367. 1047.791:0060:006c:trace:seh:dispatch_exception rax=000000007b012470 rbx=000000000106db78 rcx=000000000106d890 rdx=0000000000000000
  368. 1047.791:0060:006c:trace:seh:dispatch_exception rsi=00000000000000c8 rdi=0000000001750230 rbp=00000001c8e1a170 rsp=000000000106d870
  369. 1047.791:0060:006c:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000011f0020 r11=a55a5aa5a55a5aa5
  370. 1047.791:0060:006c:trace:seh:dispatch_exception r12=000000000106db78 r13=0000000001200050 r14=0000000000000000 r15=0000000001200050
  371. 1047.791:0060:006c:trace:seh:call_vectored_handlers calling handler at 00000002279AD660 code=6ba flags=0
  372. 1047.791:0060:006c:trace:seh:call_vectored_handlers handler at 00000002279AD660 returned 0
  373. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000106D870
  374. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  375. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  376. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  377. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  378. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  379. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231B226C2 rsp 000000000106D950
  380. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  381. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  382. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  383. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000106D980
  384. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  385. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  386. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  387. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  388. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  389. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  390. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279C435D rsp 000000000106D9E0
  391. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  392. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  393. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  394. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  395. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  396. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  397. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  398. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  399. 1047.791:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DA50 rsp 000000000106DD40 handler 00000002279C3D20
  400. 1047.791:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106CDB0, dispatch=000000000106CC80)
  401. 1047.791:0060:006c:trace:seh:call_teb_handler handler at 00000002279C3D20 returned 1
  402. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279BB5B5 rsp 000000000106DD40
  403. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  404. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  405. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  406. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  407. 1047.791:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DD70 rsp 000000000106DEB0 handler 00000002279C5300
  408. 1047.791:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C5300 (rec=000000000106D890, frame=000000000106DD70 context=000000000106CDB0, dispatch=000000000106CC80)
  409. 1047.791:0060:006c:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000106DD70 target_ip=00000002279C529A rip=000000017005af1d
  410. 1047.791:0060:006c:trace:unwind:RtlUnwindEx rax=0000000067fd0000 rbx=000000000106da50 rcx=000000000106c680 rdx=00000002279c529a
  411. 1047.791:0060:006c:trace:unwind:RtlUnwindEx rsi=000000000106c130 rdi=000000000106cdb0 rbp=000000000106cb80 rsp=000000000106bfc0
  412. 1047.791:0060:006c:trace:unwind:RtlUnwindEx r8=000000000106d890 r9=00000002279c52d0 r10=00007f474c2b4660 r11=0000000000000000
  413. 1047.791:0060:006c:trace:unwind:RtlUnwindEx r12=000000000106d890 r13=000000000106c680 r14=000000000106dd70 r15=000000017006aa30
  414. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000106BFC0
  415. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  416. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  417. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  418. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  419. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  420. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  421. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  422. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  423. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  424. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  425. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  426. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000106C650
  427. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 5b610-5b638
  428. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  429. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  430. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C529A rsp 000000000106CB60
  431. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 25280-2529c
  432. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FDC flags 0 prolog 0x8 bytes function 00000002279C5280-00000002279C529C
  433. 1047.791:0060:006c:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  434. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  435. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  436. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  437. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C52C9 rsp 000000000106CB90
  438. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 252a0-252ca
  439. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FE8 flags 0 prolog 0x4 bytes function 00000002279C52A0-00000002279C52CA
  440. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  441. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C5354 rsp 000000000106CBC0
  442. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 25300-25355
  443. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FF8 flags 0 prolog 0xa bytes function 00000002279C5300-00000002279C5355
  444. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  445. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r12
  446. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r13
  447. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r14
  448. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000106CC10
  449. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 59f30-5a441
  450. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  451. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  452. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  453. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  454. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  455. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  456. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  457. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  458. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  459. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  460. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000106D2D0
  461. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  462. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  463. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  464. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  465. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  466. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  467. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  468. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  469. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  470. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  471. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  472. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000106D370
  473. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 5843c-584b1
  474. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  475. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  476. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000106D870
  477. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  478. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  479. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  480. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  481. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  482. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231B226C2 rsp 000000000106D950
  483. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  484. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  485. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  486. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000106D980
  487. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  488. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  489. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  490. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  491. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  492. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  493. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C435D rsp 000000000106D9E0
  494. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  495. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  496. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  497. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  498. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  499. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  500. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  501. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  502. 1047.791:0060:006c:trace:unwind:RtlUnwindEx found builtin frame 000000000106DA50 handler 00000002279C3D20
  503. 1047.791:0060:006c:trace:unwind:call_teb_unwind_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106C680, dispatch=000000000106C040)
  504. 1047.791:0060:006c:trace:unwind:call_teb_unwind_handler handler at 00000002279C3D20 returned 1
  505. 1047.791:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279BB5B5 rsp 000000000106DD40
  506. 1047.791:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  507. 1047.791:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  508. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  509. 1047.791:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  510. 1047.791:0060:006c:trace:seh:RtlRestoreContext returning to 00000002279C529A stack 000000000106DD40
  511. 1047.792:0060:006c:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=006c
  512. 1047.792:0060:006c:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  513. 1047.792:0060:006c:trace:seh:dispatch_exception rax=000000007b012470 rbx=000000000106db78 rcx=000000000106d890 rdx=0000000000000000
  514. 1047.792:0060:006c:trace:seh:dispatch_exception rsi=00000000000000c8 rdi=0000000001750230 rbp=00000001c8e1a170 rsp=000000000106d870
  515. 1047.792:0060:006c:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000011f0020 r11=a55a5aa5a55a5aa5
  516. 1047.792:0060:006c:trace:seh:dispatch_exception r12=000000000106db78 r13=0000000001200050 r14=0000000000000000 r15=0000000001200050
  517. 1047.792:0060:006c:trace:seh:call_vectored_handlers calling handler at 00000002279AD660 code=6ba flags=0
  518. 1047.792:0060:006c:trace:seh:call_vectored_handlers handler at 00000002279AD660 returned 0
  519. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000106D870
  520. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  521. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  522. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  523. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  524. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  525. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231B226C2 rsp 000000000106D950
  526. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  527. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  528. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  529. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000106D980
  530. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  531. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  532. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  533. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  534. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  535. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  536. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279C435D rsp 000000000106D9E0
  537. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  538. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  539. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  540. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  541. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  542. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  543. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  544. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  545. 1047.792:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DA50 rsp 000000000106DD40 handler 00000002279C3D20
  546. 1047.792:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106CDB0, dispatch=000000000106CC80)
  547. 1047.792:0060:006c:trace:seh:call_teb_handler handler at 00000002279C3D20 returned 1
  548. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 1 rip 00000002279BB5B5 rsp 000000000106DD40
  549. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  550. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  551. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  552. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  553. 1047.792:0060:006c:trace:seh:call_stack_handlers found wine frame 000000000106DD70 rsp 000000000106DEB0 handler 00000002279C5300
  554. 1047.792:0060:006c:trace:seh:call_teb_handler calling TEB handler 00000002279C5300 (rec=000000000106D890, frame=000000000106DD70 context=000000000106CDB0, dispatch=000000000106CC80)
  555. 1047.792:0060:006c:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000106DD70 target_ip=00000002279C529A rip=000000017005af1d
  556. 1047.792:0060:006c:trace:unwind:RtlUnwindEx rax=0000000067fd0000 rbx=000000000106da50 rcx=000000000106c680 rdx=00000002279c529a
  557. 1047.792:0060:006c:trace:unwind:RtlUnwindEx rsi=000000000106c130 rdi=000000000106cdb0 rbp=000000000106cb80 rsp=000000000106bfc0
  558. 1047.792:0060:006c:trace:unwind:RtlUnwindEx r8=000000000106d890 r9=00000002279c52d0 r10=00007f474c2b4660 r11=0000000000000000
  559. 1047.792:0060:006c:trace:unwind:RtlUnwindEx r12=000000000106d890 r13=000000000106c680 r14=000000000106dd70 r15=000000017006aa30
  560. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000106BFC0
  561. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  562. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  563. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  564. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  565. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  566. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  567. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  568. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  569. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  570. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  571. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  572. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000106C650
  573. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 5b610-5b638
  574. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  575. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  576. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C529A rsp 000000000106CB60
  577. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 25280-2529c
  578. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FDC flags 0 prolog 0x8 bytes function 00000002279C5280-00000002279C529C
  579. 1047.792:0060:006c:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  580. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  581. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  582. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  583. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C52C9 rsp 000000000106CB90
  584. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 252a0-252ca
  585. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FE8 flags 0 prolog 0x4 bytes function 00000002279C52A0-00000002279C52CA
  586. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  587. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C5354 rsp 000000000106CBC0
  588. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 25300-25355
  589. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6FF8 flags 0 prolog 0xa bytes function 00000002279C5300-00000002279C5355
  590. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  591. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r12
  592. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r13
  593. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r14
  594. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000106CC10
  595. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 59f30-5a441
  596. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  597. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  598. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  599. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  600. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  601. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  602. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  603. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  604. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  605. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  606. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000106D2D0
  607. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  608. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  609. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  610. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  611. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  612. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  613. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  614. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x8: pushq %r12
  615. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %r13
  616. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r14
  617. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r15
  618. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000106D370
  619. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 5843c-584b1
  620. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  621. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  622. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000106D870
  623. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 12470-124f7
  624. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  625. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  626. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  627. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  628. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231B226C2 rsp 000000000106D950
  629. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 426b0-426f7
  630. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  631. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  632. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000106D980
  633. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 96b0-9737
  634. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  635. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  636. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  637. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  638. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  639. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279C435D rsp 000000000106D9E0
  640. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 24260-24480
  641. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6F24 flags 0 prolog 0xe bytes function 00000002279C4260-00000002279C4480
  642. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0xe: subq $0x330,%rsp
  643. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x7: pushq %rbx
  644. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x6: pushq %rsi
  645. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  646. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x4: pushq %r12
  647. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x2: pushq %r13
  648. 1047.792:0060:006c:trace:unwind:RtlUnwindEx found builtin frame 000000000106DA50 handler 00000002279C3D20
  649. 1047.792:0060:006c:trace:unwind:call_teb_unwind_handler calling TEB handler 00000002279C3D20 (rec=000000000106D890, frame=000000000106DA50 context=000000000106C680, dispatch=000000000106C040)
  650. 1047.792:0060:006c:trace:unwind:call_teb_unwind_handler handler at 00000002279C3D20 returned 1
  651. 1047.792:0060:006c:trace:unwind:RtlVirtualUnwind type 2 rip 00000002279BB5B5 rsp 000000000106DD40
  652. 1047.792:0060:006c:trace:unwind:dump_unwind_info **** func 1b4e0-1b5c6
  653. 1047.792:0060:006c:trace:unwind:dump_unwind_info unwind info at 00000002279D6AA8 flags 0 prolog 0x8 bytes function 00000002279BB4E0-00000002279BB5C6
  654. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x8: subq $0x160,%rsp
  655. 1047.792:0060:006c:trace:unwind:dump_unwind_info 0x1: pushq %rbx
  656. 1047.792:0060:006c:trace:seh:RtlRestoreContext returning to 00000002279C529A stack 000000000106DD40
  657. 1047.886:0090:0094:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  658. 1047.886:0090:0094:trace:seh:install_bpf Seccomp filters already installed.
  659. 1047.887:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
  660. 1047.888:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  661. 1047.889:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  662. 1047.891:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  663. 1047.893:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  664. 1047.893:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  665. 1047.893:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  666. 1047.894:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  667. 1047.896:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  668. 1047.896:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  669. 1047.897:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  670. 1047.898:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  671. 1047.898:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  672. 1047.931:0090:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  673. 1047.942:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\sharedgpures.sys" at 0000000277CF0000: builtin
  674. 1047.973:00a8:00ac:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  675. 1047.973:00a8:00ac:trace:seh:install_bpf Seccomp filters already installed.
  676. 1047.973:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
  677. 1047.974:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  678. 1047.975:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  679. 1047.977:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  680. 1047.979:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  681. 1047.979:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  682. 1047.979:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  683. 1047.988:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
  684. 1047.988:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  685. 1047.997:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\nsiproxy.sys" at 0000000229880000: builtin
  686. 1048.005:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 000000029CFC0000: builtin
  687. 1048.006:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\nsi.dll" at 000000028DFA0000: builtin
  688. 1048.006:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 0000000240030000: builtin
  689. 1048.006:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
  690. 1048.015:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  691. 1048.015:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  692. 1048.019:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  693. 1048.021:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  694. 1048.021:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  695. 1048.021:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  696. 1048.021:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  697. 1048.021:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  698. 1048.022:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  699. 1048.022:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  700. 1048.022:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00000001C69E0000: builtin
  701. 1048.059:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  702. 1048.064:0020:0024:trace:seh:install_bpf Installing seccomp filters.
  703. 1048.064:0020:0024:trace:seh:check_bpf_jit_enable enabled 0x31.
  704. 1048.065:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 00007F0211480000: builtin
  705. 1048.067:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  706. 1048.067:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  707. 1048.069:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  708. 1048.071:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  709. 1048.071:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  710. 1048.071:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  711. 1048.073:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  712. 1048.073:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  713. 1048.074:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  714. 1048.076:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  715. 1048.076:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  716. 1048.076:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  717. 1048.076:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  718. 1048.076:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  719. 1048.078:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  720. 1048.079:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  721. 1048.079:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00000001C69E0000: builtin
  722. 1048.118:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  723. 1048.137:00c4:00c8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  724. 1048.137:00c4:00c8:trace:seh:install_bpf Seccomp filters already installed.
  725. 1048.138:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
  726. 1048.139:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  727. 1048.139:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  728. 1048.142:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  729. 1048.143:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  730. 1048.143:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  731. 1048.143:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  732. 1048.145:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  733. 1048.145:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  734. 1048.146:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  735. 1048.148:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  736. 1048.148:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  737. 1048.148:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  738. Setting breakpad minidump AppID = 1245620
  739. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198053439766 [API loaded no]
  740. 1048.189:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  741. 1048.193:0020:00cc:err:steam:initialize_vr_data Could not load libopenvr_api.so.
  742. 1048.199:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F7675D30000: builtin
  743. 1048.211:00d0:00d4:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  744. 1048.211:00d0:00d4:trace:seh:install_bpf Seccomp filters already installed.
  745. 1048.212:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
  746. 1048.214:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  747. 1048.214:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  748. 1048.217:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  749. 1048.218:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  750. 1048.218:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  751. 1048.218:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  752. 1048.220:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  753. 1048.220:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  754. 1048.221:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  755. 1048.223:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  756. 1048.223:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  757. 1048.223:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  758. 1048.251:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  759. 1048.255:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F0699DC0000: builtin
  760. 1048.266:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
  761. 1048.266:00c4:00c8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\uxtheme.dll" : builtin
  762. 1048.271:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
  763. 1048.272:00d0:00d4:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\uxtheme.dll" : builtin
  764. 1048.291:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  765. 1048.291:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  766. 1048.291:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  767. 1048.291:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  768. 1048.291:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00000001C69E0000: builtin
  769. 1048.295:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  770. 1048.295:00d0:00d4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
  771. 1048.296:00d0:00d4:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=00d4
  772. 1048.296:00d0:00d4:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  773. 1048.296:00d0:00d4:trace:seh:dispatch_exception rax=000000007b012470 rbx=000000000021eb08 rcx=000000000021e820 rdx=0000000000000000
  774. 1048.296:00d0:00d4:trace:seh:dispatch_exception rsi=000000000000006c rdi=00000000003c04b0 rbp=0000000140010028 rsp=000000000021e800
  775. 1048.296:00d0:00d4:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000003c0020 r11=a55a5aa5a55a5aa5
  776. 1048.296:00d0:00d4:trace:seh:dispatch_exception r12=000000000021eb08 r13=00000000003f1200 r14=00000000003a1650 r15=0000000000000001
  777. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000021E800
  778. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 12470-124f7
  779. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  780. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  781. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  782. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  783. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231B226C2 rsp 000000000021E8E0
  784. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 426b0-426f7
  785. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  786. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  787. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000021E910
  788. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 96b0-9737
  789. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  790. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  791. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  792. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  793. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  794. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 1 rip 0000000327044EE0 rsp 000000000021E970
  795. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 24de0-25041
  796. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705B6E0 flags 0 prolog 0x10 bytes function 0000000327044DE0-0000000327045041
  797. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x10: subq $0x338,%rsp
  798. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rbx
  799. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x8: pushq %rsi
  800. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x7: pushq %rdi
  801. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x6: pushq %r12
  802. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: pushq %r13
  803. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r14
  804. 1048.296:00d0:00d4:trace:seh:call_stack_handlers found wine frame 000000000021E9E0 rsp 000000000021ECE0 handler 0000000327043E20
  805. 1048.296:00d0:00d4:trace:seh:call_teb_handler calling TEB handler 0000000327043E20 (rec=000000000021E820, frame=000000000021E9E0 context=000000000021DD40, dispatch=000000000021DC10)
  806. 1048.296:00d0:00d4:trace:seh:call_teb_handler handler at 0000000327043E20 returned 1
  807. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 1 rip 0000000327039DB7 rsp 000000000021ECE0
  808. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 19cd0-19ddd
  809. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705AF30 flags 0 prolog 0xa bytes function 0000000327039CD0-0000000327039DDD
  810. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: subq $0x178,%rsp
  811. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  812. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r12
  813. 1048.296:00d0:00d4:trace:seh:call_stack_handlers found wine frame 000000000021ED20 rsp 000000000021EE70 handler 0000000327046370
  814. 1048.296:00d0:00d4:trace:seh:call_teb_handler calling TEB handler 0000000327046370 (rec=000000000021E820, frame=000000000021ED20 context=000000000021DD40, dispatch=000000000021DC10)
  815. 1048.296:00d0:00d4:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000021ED20 target_ip=000000032704630A rip=000000017005af1d
  816. 1048.296:00d0:00d4:trace:unwind:RtlUnwindEx rax=0000000067fe0000 rbx=000000000021e9e0 rcx=000000000021d610 rdx=000000032704630a
  817. 1048.296:00d0:00d4:trace:unwind:RtlUnwindEx rsi=000000000021d0c0 rdi=000000000021dd40 rbp=000000000021db10 rsp=000000000021cf50
  818. 1048.296:00d0:00d4:trace:unwind:RtlUnwindEx r8=000000000021e820 r9=0000000327046340 r10=00007f069ac15660 r11=0000000000000000
  819. 1048.296:00d0:00d4:trace:unwind:RtlUnwindEx r12=000000000021e820 r13=000000000021d610 r14=000000000021ed20 r15=000000017006aa30
  820. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000021CF50
  821. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  822. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  823. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  824. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  825. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  826. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  827. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  828. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x8: pushq %r12
  829. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x6: pushq %r13
  830. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: pushq %r14
  831. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r15
  832. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000021D5E0
  833. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 5b610-5b638
  834. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  835. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  836. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 000000032704630A rsp 000000000021DAF0
  837. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 262f0-2630c
  838. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705B7C0 flags 0 prolog 0x8 bytes function 00000003270462F0-000000032704630C
  839. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  840. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  841. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  842. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  843. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 0000000327046339 rsp 000000000021DB20
  844. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 26310-2633a
  845. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705B7CC flags 0 prolog 0x4 bytes function 0000000327046310-000000032704633A
  846. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  847. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 00000003270463C4 rsp 000000000021DB50
  848. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 26370-263c5
  849. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705B7DC flags 0 prolog 0xa bytes function 0000000327046370-00000003270463C5
  850. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  851. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x6: pushq %r12
  852. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: pushq %r13
  853. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r14
  854. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000021DBA0
  855. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 59f30-5a441
  856. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  857. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  858. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  859. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  860. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  861. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  862. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x8: pushq %r12
  863. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x6: pushq %r13
  864. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: pushq %r14
  865. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r15
  866. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000021E260
  867. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  868. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  869. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  870. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  871. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  872. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  873. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  874. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x8: pushq %r12
  875. 1048.296:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  876. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x6: pushq %r13
  877. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: pushq %r14
  878. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r15
  879. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000021E300
  880. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 5843c-584b1
  881. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  882. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  883. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000021E800
  884. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 12470-124f7
  885. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  886. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  887. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  888. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  889. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231B226C2 rsp 000000000021E8E0
  890. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 426b0-426f7
  891. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  892. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  893. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000021E910
  894. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 96b0-9737
  895. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  896. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  897. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  898. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  899. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  900. 1048.296:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  901. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 0000000327044EE0 rsp 000000000021E970
  902. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 24de0-25041
  903. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705B6E0 flags 0 prolog 0x10 bytes function 0000000327044DE0-0000000327045041
  904. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x10: subq $0x338,%rsp
  905. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x9: pushq %rbx
  906. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x8: pushq %rsi
  907. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x7: pushq %rdi
  908. 1048.296:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  909. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x6: pushq %r12
  910. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x4: pushq %r13
  911. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r14
  912. 1048.296:00d0:00d4:trace:unwind:RtlUnwindEx found builtin frame 000000000021E9E0 handler 0000000327043E20
  913. 1048.296:00d0:00d4:trace:unwind:call_teb_unwind_handler calling TEB handler 0000000327043E20 (rec=000000000021E820, frame=000000000021E9E0 context=000000000021D610, dispatch=000000000021CFD0)
  914. 1048.296:00d0:00d4:trace:unwind:call_teb_unwind_handler handler at 0000000327043E20 returned 1
  915. 1048.296:00d0:00d4:trace:unwind:RtlVirtualUnwind type 2 rip 0000000327039DB7 rsp 000000000021ECE0
  916. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info **** func 19cd0-19ddd
  917. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info unwind info at 000000032705AF30 flags 0 prolog 0xa bytes function 0000000327039CD0-0000000327039DDD
  918. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0xa: subq $0x178,%rsp
  919. 1048.296:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  920. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  921. 1048.296:00d0:00d4:trace:unwind:dump_unwind_info 0x2: pushq %r12
  922. 1048.296:00d0:00d4:trace:seh:RtlRestoreContext returning to 000000032704630A stack 000000000021ECE0
  923. 1048.296:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00000001C69E0000: builtin
  924. 1048.302:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  925. 1048.302:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
  926. 1048.302:00c4:00c8:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=00c8
  927. 1048.302:00c4:00c8:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  928. 1048.302:00c4:00c8:trace:seh:dispatch_exception rax=000000007b012470 rbx=000000000021eb08 rcx=000000000021e820 rdx=0000000000000000
  929. 1048.302:00c4:00c8:trace:seh:dispatch_exception rsi=000000000000006c rdi=00000000003c0730 rbp=0000000140010028 rsp=000000000021e800
  930. 1048.302:00c4:00c8:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000003c0020 r11=a55a5aa5a55a5aa5
  931. 1048.302:00c4:00c8:trace:seh:dispatch_exception r12=000000000021eb08 r13=00000000003f1440 r14=00000000003a18d0 r15=0000000000000001
  932. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000021E800
  933. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 12470-124f7
  934. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  935. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  936. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  937. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  938. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231B226C2 rsp 000000000021E8E0
  939. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 426b0-426f7
  940. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  941. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  942. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000021E910
  943. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 96b0-9737
  944. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  945. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  946. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  947. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  948. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  949. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 1 rip 0000000327044EE0 rsp 000000000021E970
  950. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 24de0-25041
  951. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705B6E0 flags 0 prolog 0x10 bytes function 0000000327044DE0-0000000327045041
  952. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x10: subq $0x338,%rsp
  953. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rbx
  954. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x8: pushq %rsi
  955. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x7: pushq %rdi
  956. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x6: pushq %r12
  957. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: pushq %r13
  958. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r14
  959. 1048.302:00c4:00c8:trace:seh:call_stack_handlers found wine frame 000000000021E9E0 rsp 000000000021ECE0 handler 0000000327043E20
  960. 1048.302:00c4:00c8:trace:seh:call_teb_handler calling TEB handler 0000000327043E20 (rec=000000000021E820, frame=000000000021E9E0 context=000000000021DD40, dispatch=000000000021DC10)
  961. 1048.302:00c4:00c8:trace:seh:call_teb_handler handler at 0000000327043E20 returned 1
  962. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 1 rip 0000000327039DB7 rsp 000000000021ECE0
  963. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 19cd0-19ddd
  964. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705AF30 flags 0 prolog 0xa bytes function 0000000327039CD0-0000000327039DDD
  965. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: subq $0x178,%rsp
  966. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  967. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r12
  968. 1048.302:00c4:00c8:trace:seh:call_stack_handlers found wine frame 000000000021ED20 rsp 000000000021EE70 handler 0000000327046370
  969. 1048.302:00c4:00c8:trace:seh:call_teb_handler calling TEB handler 0000000327046370 (rec=000000000021E820, frame=000000000021ED20 context=000000000021DD40, dispatch=000000000021DC10)
  970. 1048.302:00c4:00c8:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000021ED20 target_ip=000000032704630A rip=000000017005af1d
  971. 1048.302:00c4:00c8:trace:unwind:RtlUnwindEx rax=0000000067fe0000 rbx=000000000021e9e0 rcx=000000000021d610 rdx=000000032704630a
  972. 1048.302:00c4:00c8:trace:unwind:RtlUnwindEx rsi=000000000021d0c0 rdi=000000000021dd40 rbp=000000000021db10 rsp=000000000021cf50
  973. 1048.302:00c4:00c8:trace:unwind:RtlUnwindEx r8=000000000021e820 r9=0000000327046340 r10=00007f7676b8a660 r11=0000000000000000
  974. 1048.302:00c4:00c8:trace:unwind:RtlUnwindEx r12=000000000021e820 r13=000000000021d610 r14=000000000021ed20 r15=000000017006aa30
  975. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000021CF50
  976. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  977. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  978. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  979. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  980. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  981. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  982. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  983. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x8: pushq %r12
  984. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x6: pushq %r13
  985. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: pushq %r14
  986. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r15
  987. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000021D5E0
  988. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 5b610-5b638
  989. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  990. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  991. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 000000032704630A rsp 000000000021DAF0
  992. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 262f0-2630c
  993. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705B7C0 flags 0 prolog 0x8 bytes function 00000003270462F0-000000032704630C
  994. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  995. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  996. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  997. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  998. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 0000000327046339 rsp 000000000021DB20
  999. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 26310-2633a
  1000. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705B7CC flags 0 prolog 0x4 bytes function 0000000327046310-000000032704633A
  1001. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  1002. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 00000003270463C4 rsp 000000000021DB50
  1003. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 26370-263c5
  1004. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705B7DC flags 0 prolog 0xa bytes function 0000000327046370-00000003270463C5
  1005. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  1006. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x6: pushq %r12
  1007. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: pushq %r13
  1008. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r14
  1009. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000021DBA0
  1010. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 59f30-5a441
  1011. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  1012. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  1013. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1014. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1015. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1016. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1017. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x8: pushq %r12
  1018. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x6: pushq %r13
  1019. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: pushq %r14
  1020. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r15
  1021. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000021E260
  1022. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  1023. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  1024. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  1025. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1026. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1027. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1028. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1029. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x8: pushq %r12
  1030. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x6: pushq %r13
  1031. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: pushq %r14
  1032. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r15
  1033. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000021E300
  1034. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 5843c-584b1
  1035. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  1036. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1037. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000021E800
  1038. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 12470-124f7
  1039. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  1040. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  1041. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  1042. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  1043. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231B226C2 rsp 000000000021E8E0
  1044. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 426b0-426f7
  1045. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B226B0-0000000231B226F7
  1046. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  1047. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000021E910
  1048. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 96b0-9737
  1049. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
  1050. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x7: subq $0x40,%rsp
  1051. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  1052. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %rsi
  1053. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x1: pushq %rdi
  1054. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 0000000327044EE0 rsp 000000000021E970
  1055. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 24de0-25041
  1056. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705B6E0 flags 0 prolog 0x10 bytes function 0000000327044DE0-0000000327045041
  1057. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x10: subq $0x338,%rsp
  1058. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x9: pushq %rbx
  1059. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x8: pushq %rsi
  1060. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x7: pushq %rdi
  1061. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x6: pushq %r12
  1062. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x4: pushq %r13
  1063. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r14
  1064. 1048.302:00c4:00c8:trace:unwind:RtlUnwindEx found builtin frame 000000000021E9E0 handler 0000000327043E20
  1065. 1048.302:00c4:00c8:trace:unwind:call_teb_unwind_handler calling TEB handler 0000000327043E20 (rec=000000000021E820, frame=000000000021E9E0 context=000000000021D610, dispatch=000000000021CFD0)
  1066. 1048.302:00c4:00c8:trace:unwind:call_teb_unwind_handler handler at 0000000327043E20 returned 1
  1067. 1048.302:00c4:00c8:trace:unwind:RtlVirtualUnwind type 2 rip 0000000327039DB7 rsp 000000000021ECE0
  1068. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info **** func 19cd0-19ddd
  1069. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info unwind info at 000000032705AF30 flags 0 prolog 0xa bytes function 0000000327039CD0-0000000327039DDD
  1070. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0xa: subq $0x178,%rsp
  1071. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  1072. 1048.302:00c4:00c8:trace:unwind:dump_unwind_info 0x2: pushq %r12
  1073. 1048.302:00c4:00c8:trace:seh:RtlRestoreContext returning to 000000032704630A stack 000000000021ECE0
  1074. 1048.318:00e4:00e8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1075. 1048.318:00e4:00e8:trace:seh:install_bpf Seccomp filters already installed.
  1076. 1048.318:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
  1077. 1048.319:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1078. 1048.319:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1079. 1048.320:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  1080. 1048.321:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  1081. 1048.321:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  1082. 1048.321:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  1083. 1048.321:00e4:00e8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  1084. 1048.411:0118:011c:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1085. 1048.411:0118:011c:trace:seh:install_bpf Seccomp filters already installed.
  1086. 1048.413:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\tabtip.exe" at 0000000140000000: builtin
  1087. 1048.414:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1088. 1048.414:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1089. 1048.417:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  1090. 1048.419:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  1091. 1048.419:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  1092. 1048.419:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  1093. 1048.421:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  1094. 1048.421:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  1095. 1048.422:0124:0128:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1096. 1048.422:0124:0128:trace:seh:install_bpf Seccomp filters already installed.
  1097. 1048.422:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  1098. 1048.423:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\tabtip.exe" at 0000000140000000: builtin
  1099. 1048.424:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  1100. 1048.424:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  1101. 1048.424:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1102. 1048.424:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  1103. 1048.425:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  1104. 1048.425:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  1105. 1048.425:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1106. 1048.425:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  1107. 1048.428:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  1108. 1048.428:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  1109. 1048.428:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00000001C69E0000: builtin
  1110. 1048.428:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  1111. 1048.430:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  1112. 1048.430:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  1113. 1048.430:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  1114. 1048.432:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  1115. 1048.432:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  1116. 1048.433:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  1117. 1048.435:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  1118. 1048.435:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  1119. 1048.435:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  1120. 1048.435:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  1121. 1048.435:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  1122. 1048.436:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  1123. 1048.438:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  1124. 1048.438:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  1125. 1048.438:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00000001C69E0000: builtin
  1126. 1048.471:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  1127. 1048.473:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleacc.dll" at 00000002522E0000: builtin
  1128. 1048.473:0118:011c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uiautomationcore.dll" at 0000000330A70000: builtin
  1129. 1048.477:0020:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F02109A0000: builtin
  1130. 1048.478:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
  1131. 1048.481:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleacc.dll" at 00000002522E0000: builtin
  1132. 1048.481:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uiautomationcore.dll" at 0000000330A70000: builtin
  1133. 1048.485:0124:0130:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F38F5FD0000: builtin
  1134. 1048.496:0020:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
  1135. 1048.497:0020:00c0:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\uxtheme.dll" : builtin
  1136. 1048.509:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
  1137. 1048.509:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\uxtheme.dll" : builtin
  1138. 1048.532:0134:0138:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\start_protected_game.exe" at 00400000: native
  1139. 1048.533:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  1140. 1048.533:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
  1141. 1048.536:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 6A280000: builtin
  1142. 1048.537:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
  1143. 1048.537:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
  1144. 1048.537:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 61740000: builtin
  1145. 1048.538:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 66B00000: builtin
  1146. 1048.539:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
  1147. 1048.541:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
  1148. 1048.542:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
  1149. 1048.542:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
  1150. 1048.542:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 6ED00000: builtin
  1151. 1048.547:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 00140000: builtin
  1152. 1048.548:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
  1153. 1048.548:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
  1154. 1048.548:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
  1155. 1048.548:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 67EC0000: builtin
  1156. 1048.551:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 64EC0000: builtin
  1157. 1048.554:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 6D780000: builtin
  1158. 1048.557:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 66240000: builtin
  1159. 1048.557:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 6E8C0000: builtin
  1160. 1048.560:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IMM32.dll" at 71200000: builtin
  1161. 1048.564:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 6A040000: builtin
  1162. 1048.564:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00ED0000: builtin
  1163. 1048.605:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 6DE80000: builtin
  1164. 1048.605:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 6AC80000: builtin
  1165. 1048.605:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 62B80000: builtin
  1166. 1048.606:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-string-l1-1-0.dll" at 67800000: builtin
  1167. 1048.606:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-datetime-l1-1-1.dll" at 6FF80000: builtin
  1168. 1048.607:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-obsolete-l1-2-0.dll" at 6B500000: builtin
  1169. 1048.609:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F6030000: builtin
  1170. 1048.621:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 02830000: builtin
  1171. 1048.621:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\uxtheme.dll" : builtin
  1172. 1048.647:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\vulkan-1.dll" at 69AC0000: builtin
  1173. 1048.648:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 024E0000: builtin
  1174. 1048.648:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\D3D9.DLL" at 62440000: native
  1175. info: Game: start_protected_game.exe
  1176. info: DXVK: v1.10.1
  1177. info: Built-in extension providers:
  1178. info: Win32 WSI
  1179. info: OpenVR
  1180. info: OpenXR
  1181. info: Enabled instance extensions:
  1182. info: VK_KHR_get_surface_capabilities2
  1183. info: VK_KHR_surface
  1184. info: VK_KHR_win32_surface
  1185. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1186. info: D3D9: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  1187. info: AMD RADV POLARIS10 (ACO):
  1188. info: Driver: 20.3.5
  1189. info: Vulkan: 1.2.145
  1190. info: Memory Heap[0]:
  1191. info: Size: 7936 MiB
  1192. info: Flags: 0x1
  1193. info: Memory Type[0]: Property Flags = 0x1
  1194. info: Memory Heap[1]:
  1195. info: Size: 8192 MiB
  1196. info: Flags: 0x0
  1197. info: Memory Type[1]: Property Flags = 0x6
  1198. info: Memory Type[3]: Property Flags = 0xe
  1199. info: Memory Heap[2]:
  1200. info: Size: 256 MiB
  1201. info: Flags: 0x1
  1202. info: Memory Type[2]: Property Flags = 0x7
  1203. info: D3D9: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  1204. info: AMD RADV POLARIS10 (ACO):
  1205. info: Driver: 20.3.5
  1206. info: Vulkan: 1.2.145
  1207. info: Memory Heap[0]:
  1208. info: Size: 7936 MiB
  1209. info: Flags: 0x1
  1210. info: Memory Type[0]: Property Flags = 0x1
  1211. info: Memory Heap[1]:
  1212. info: Size: 8192 MiB
  1213. info: Flags: 0x0
  1214. info: Memory Type[1]: Property Flags = 0x6
  1215. info: Memory Type[3]: Property Flags = 0xe
  1216. info: Memory Heap[2]:
  1217. info: Size: 256 MiB
  1218. info: Flags: 0x1
  1219. info: Memory Type[2]: Property Flags = 0x7
  1220. info: D3D9: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  1221. info: AMD RADV POLARIS10 (ACO):
  1222. info: Driver: 20.3.5
  1223. info: Vulkan: 1.2.145
  1224. info: Memory Heap[0]:
  1225. info: Size: 7936 MiB
  1226. info: Flags: 0x1
  1227. info: Memory Type[0]: Property Flags = 0x1
  1228. info: Memory Heap[1]:
  1229. info: Size: 8192 MiB
  1230. info: Flags: 0x0
  1231. info: Memory Type[1]: Property Flags = 0x6
  1232. info: Memory Type[3]: Property Flags = 0xe
  1233. info: Memory Heap[2]:
  1234. info: Size: 256 MiB
  1235. info: Flags: 0x1
  1236. info: Memory Type[2]: Property Flags = 0x7
  1237. info: Process set as DPI aware
  1238. info: Game: start_protected_game.exe
  1239. info: DXVK: v1.10.1
  1240. info: Built-in extension providers:
  1241. info: Win32 WSI
  1242. info: OpenVR
  1243. info: OpenXR
  1244. info: Enabled instance extensions:
  1245. info: VK_KHR_get_surface_capabilities2
  1246. info: VK_KHR_surface
  1247. info: VK_KHR_win32_surface
  1248. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1249. info: D3D9: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  1250. info: AMD RADV POLARIS10 (ACO):
  1251. info: Driver: 20.3.5
  1252. info: Vulkan: 1.2.145
  1253. info: Memory Heap[0]:
  1254. info: Size: 7936 MiB
  1255. info: Flags: 0x1
  1256. info: Memory Type[0]: Property Flags = 0x1
  1257. info: Memory Heap[1]:
  1258. info: Size: 8192 MiB
  1259. info: Flags: 0x0
  1260. info: Memory Type[1]: Property Flags = 0x6
  1261. info: Memory Type[3]: Property Flags = 0xe
  1262. info: Memory Heap[2]:
  1263. info: Size: 256 MiB
  1264. info: Flags: 0x1
  1265. info: Memory Type[2]: Property Flags = 0x7
  1266. info: D3D9: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  1267. info: AMD RADV POLARIS10 (ACO):
  1268. info: Driver: 20.3.5
  1269. info: Vulkan: 1.2.145
  1270. info: Memory Heap[0]:
  1271. info: Size: 7936 MiB
  1272. info: Flags: 0x1
  1273. info: Memory Type[0]: Property Flags = 0x1
  1274. info: Memory Heap[1]:
  1275. info: Size: 8192 MiB
  1276. info: Flags: 0x0
  1277. info: Memory Type[1]: Property Flags = 0x6
  1278. info: Memory Type[3]: Property Flags = 0xe
  1279. info: Memory Heap[2]:
  1280. info: Size: 256 MiB
  1281. info: Flags: 0x1
  1282. info: Memory Type[2]: Property Flags = 0x7
  1283. info: D3D9: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  1284. info: AMD RADV POLARIS10 (ACO):
  1285. info: Driver: 20.3.5
  1286. info: Vulkan: 1.2.145
  1287. info: Memory Heap[0]:
  1288. info: Size: 7936 MiB
  1289. info: Flags: 0x1
  1290. info: Memory Type[0]: Property Flags = 0x1
  1291. info: Memory Heap[1]:
  1292. info: Size: 8192 MiB
  1293. info: Flags: 0x0
  1294. info: Memory Type[1]: Property Flags = 0x6
  1295. info: Memory Type[3]: Property Flags = 0xe
  1296. info: Memory Heap[2]:
  1297. info: Size: 256 MiB
  1298. info: Flags: 0x1
  1299. info: Memory Type[2]: Property Flags = 0x7
  1300. info: Process set as DPI aware
  1301. info: Device properties:
  1302. info: Device name: : AMD RADV POLARIS10 (ACO)
  1303. info: Driver version : 20.3.5
  1304. info: Enabled device extensions:
  1305. info: VK_AMD_memory_overallocation_behavior
  1306. info: VK_AMD_shader_fragment_mask
  1307. info: VK_EXT_4444_formats
  1308. info: VK_EXT_custom_border_color
  1309. info: VK_EXT_depth_clip_enable
  1310. info: VK_EXT_extended_dynamic_state
  1311. info: VK_EXT_host_query_reset
  1312. info: VK_EXT_memory_priority
  1313. info: VK_EXT_robustness2
  1314. info: VK_EXT_shader_demote_to_helper_invocation
  1315. info: VK_EXT_shader_stencil_export
  1316. info: VK_EXT_shader_viewport_index_layer
  1317. info: VK_EXT_transform_feedback
  1318. info: VK_EXT_vertex_attribute_divisor
  1319. info: VK_KHR_create_renderpass2
  1320. info: VK_KHR_depth_stencil_resolve
  1321. info: VK_KHR_draw_indirect_count
  1322. info: VK_KHR_driver_properties
  1323. info: VK_KHR_external_memory_win32
  1324. info: VK_KHR_image_format_list
  1325. info: VK_KHR_sampler_mirror_clamp_to_edge
  1326. info: VK_KHR_shader_float_controls
  1327. info: VK_KHR_swapchain
  1328. info: Device features:
  1329. info: robustBufferAccess : 1
  1330. info: fullDrawIndexUint32 : 1
  1331. info: imageCubeArray : 1
  1332. info: independentBlend : 1
  1333. info: geometryShader : 1
  1334. info: tessellationShader : 0
  1335. info: sampleRateShading : 1
  1336. info: dualSrcBlend : 0
  1337. info: logicOp : 0
  1338. info: multiDrawIndirect : 0
  1339. info: drawIndirectFirstInstance : 0
  1340. info: depthClamp : 1
  1341. info: depthBiasClamp : 1
  1342. info: fillModeNonSolid : 1
  1343. info: depthBounds : 1
  1344. info: multiViewport : 1
  1345. info: samplerAnisotropy : 1
  1346. info: textureCompressionBC : 1
  1347. info: occlusionQueryPrecise : 1
  1348. info: pipelineStatisticsQuery : 1
  1349. info: vertexPipelineStoresAndAtomics : 1
  1350. info: fragmentStoresAndAtomics : 0
  1351. info: shaderImageGatherExtended : 0
  1352. info: shaderStorageImageExtendedFormats : 0
  1353. info: shaderStorageImageReadWithoutFormat : 0
  1354. info: shaderStorageImageWriteWithoutFormat : 1
  1355. info: shaderClipDistance : 1
  1356. info: shaderCullDistance : 1
  1357. info: shaderFloat64 : 0
  1358. info: shaderInt64 : 0
  1359. info: variableMultisampleRate : 0
  1360. info: VK_EXT_4444_formats
  1361. info: formatA4R4G4B4 : 1
  1362. info: formatA4B4G4R4 : 1
  1363. info: VK_EXT_custom_border_color
  1364. info: customBorderColors : 1
  1365. info: customBorderColorWithoutFormat : 1
  1366. info: VK_EXT_depth_clip_enable
  1367. info: depthClipEnable : 1
  1368. info: VK_EXT_extended_dynamic_state
  1369. info: extendedDynamicState : 1
  1370. info: VK_EXT_host_query_reset
  1371. info: hostQueryReset : 1
  1372. info: VK_EXT_memory_priority
  1373. info: memoryPriority : 1
  1374. info: VK_EXT_robustness2
  1375. info: robustBufferAccess2 : 1
  1376. info: robustImageAccess2 : 0
  1377. info: nullDescriptor : 1
  1378. info: VK_EXT_shader_demote_to_helper_invocation
  1379. info: shaderDemoteToHelperInvocation : 1
  1380. info: VK_EXT_transform_feedback
  1381. info: transformFeedback : 0
  1382. info: geometryStreams : 0
  1383. info: VK_EXT_vertex_attribute_divisor
  1384. info: vertexAttributeInstanceRateDivisor : 1
  1385. info: vertexAttributeInstanceRateZeroDivisor : 1
  1386. info: VK_KHR_buffer_device_address
  1387. info: bufferDeviceAddress : 0
  1388. info: Queue families:
  1389. info: Graphics : 0
  1390. info: Transfer : 1
  1391. Fossilize INFO: Overriding serialization path: "/home/cujo/.steam/debian-installation/steamapps/shadercache/1245620/fozpipelinesv6/steamapprun_pipeline_cache".
  1392. info: DXVK: Read 1 valid state cache entries
  1393. info: D3D9DeviceEx::ResetSwapChain:
  1394. info: Requested Presentation Parameters
  1395. info: - Width: 1
  1396. info: - Height: 1
  1397. info: - Format: D3D9Format::Unknown
  1398. info: - Auto Depth Stencil: false
  1399. info: ^ Format: D3D9Format::Unknown
  1400. info: - Windowed: true
  1401. info: Presenter: Actual swap chain properties:
  1402. info: Format: VK_FORMAT_B8G8R8A8_UNORM
  1403. info: Present mode: VK_PRESENT_MODE_IMMEDIATE_KHR
  1404. info: Buffer size: 1x1
  1405. info: Image count: 3
  1406. info: Exclusive FS: 0
  1407. 1048.821:00c4:00c8:fixme:imm:ImeSetActiveContext (0x4803d0, 0): stub
  1408. 1048.821:00c4:00c8:fixme:imm:ImmReleaseContext (0000000000010020, 00000000004803D0): stub
  1409. 1048.827:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msctf.dll" at 6F900000: builtin
  1410. 1048.828:0134:0138:fixme:imm:ImmReleaseContext (0001006A, 00E80030): stub
  1411. 1048.828:0134:0138:fixme:msctf:ThreadMgr_ActivateEx Unimplemented flags 0x4
  1412. 1048.828:0134:0138:fixme:imm:ImeSetCompositionString PROBLEM: This only sets the wine level string
  1413. 1048.828:0134:0138:fixme:imm:ImeSetCompositionString Reading string unimplemented
  1414. 1048.828:0134:0138:fixme:imm:NotifyIME NI_CLOSECANDIDATE
  1415. 1048.829:0134:0138:fixme:imm:ImeSetActiveContext (0xe80030, 1): stub
  1416. 1048.872:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  1417. 1048.872:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  1418. 1048.889:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\secur32.dll" at 631C0000: builtin
  1419. 1048.892:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Kerberos.dll" at 65F40000: builtin
  1420. 1048.892:0134:0158:err:kerberos:kerberos_LsaApInitializePackage no Kerberos support, expect problems
  1421. 1048.896:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 6E4C0000: builtin
  1422. 1048.899:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\nsi.dll" at 6F480000: builtin
  1423. 1048.899:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 61500000: builtin
  1424. 1048.899:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\netapi32.dll" at 688C0000: builtin
  1425. 1048.899:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSV1_0.dll" at 6D880000: builtin
  1426. 1048.899:0134:0158:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
  1427. 1048.899:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\MSV1_0.dll" : builtin
  1428. 1048.902:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\netapi32.dll" : builtin
  1429. 1048.902:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\iphlpapi.dll" : builtin
  1430. 1048.903:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\nsi.dll" : builtin
  1431. 1048.903:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\dnsapi.dll" : builtin
  1432. 1048.904:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 6E4C0000: builtin
  1433. 1048.905:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\nsi.dll" at 6F480000: builtin
  1434. 1048.906:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 61500000: builtin
  1435. 1048.914:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f950
  1436. 1048.914:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470fa68 esp=0470f90c eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1437. 1048.914:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1438. 1048.920:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=00000036 ebx=04790bf0 ecx=00000000 edx=00000000 esi=00000010 edi=00000018
  1439. 1048.920:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f8d8 esp=0470f86c eip=7bc0b37c cs=0023 ss=002b flags=00000256
  1440. 1048.920:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1441. 1048.921:0134:015c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 66E40000: builtin
  1442. 1048.921:0134:015c:fixme:kernelbase:AppPolicyGetThreadInitializationType FFFFFFFA, 04D6FEF8
  1443. 1048.922:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1444. 1048.922:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1445. 1048.922:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1446. 1048.924:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1447. 1048.924:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1448. 1048.924:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1449. 1048.925:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1450. 1048.925:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1451. 1048.925:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1452. 1048.928:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1453. 1048.928:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1454. 1048.928:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1455. 1048.930:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1456. 1048.930:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1457. 1048.930:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1458. 1048.933:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1459. 1048.933:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1460. 1048.933:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1461. 1048.934:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1462. 1048.934:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1463. 1048.934:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1464. 1048.937:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1465. 1048.937:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1466. 1048.937:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1467. 1048.939:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1468. 1048.939:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1469. 1048.939:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1470. 1048.942:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1471. 1048.942:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1472. 1048.942:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1473. 1048.943:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1474. 1048.943:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1475. 1048.943:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1476. 1048.951:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1477. 1048.951:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1478. 1048.951:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1479. 1048.952:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1480. 1048.952:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1481. 1048.952:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1482. info: D3D9DeviceEx::ResetSwapChain:
  1483. info: Requested Presentation Parameters
  1484. info: - Width: 800
  1485. info: - Height: 450
  1486. info: - Format: D3D9Format::Unknown
  1487. info: - Auto Depth Stencil: false
  1488. info: ^ Format: D3D9Format::Unknown
  1489. info: - Windowed: true
  1490. info: Presenter: Actual swap chain properties:
  1491. info: Format: VK_FORMAT_B8G8R8A8_UNORM
  1492. info: Present mode: VK_PRESENT_MODE_FIFO_KHR
  1493. info: Buffer size: 800x450
  1494. info: Image count: 4
  1495. info: Exclusive FS: 0
  1496. info: DXVK: Using 7 compiler threads
  1497. 1048.965:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1498. 1048.965:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1499. 1048.965:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1500. 1048.966:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  1501. 1048.966:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  1502. 1048.967:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  1503. 1048.967:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  1504. 1048.968:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  1505. 1048.968:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  1506. 1048.968:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  1507. 1048.968:0134:0158:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  1508. 1049.003:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1509. 1049.003:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1510. 1049.003:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1511. 1049.004:0134:0158:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\schannel.dll" at 6DD00000: builtin
  1512. 1049.018:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1513. 1049.018:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1514. 1049.018:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1515. 1049.019:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1516. 1049.019:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1517. 1049.019:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1518. 1049.037:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1519. 1049.037:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1520. 1049.037:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1521. 1049.074:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1522. 1049.074:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00200246
  1523. 1049.074:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1524. 1049.108:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0470f530
  1525. 1049.108:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ebp=0470f648 esp=0470f4ec eip=7bc0bd9c cs=0023 ss=002b flags=00200246
  1526. 1049.108:0134:0158:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1527. 1050.009:0180:0184:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1528. 1050.009:0180:0184:trace:seh:install_bpf Seccomp filters already installed.
  1529. 1050.010:0180:0184:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\eldenring.exe" at 0000000140000000: native
  1530. 1050.011:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1531. 1050.012:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1532. 1050.013:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\vulkan-1.dll" at 00000003785E0000: builtin
  1533. 1050.016:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  1534. 1050.018:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  1535. 1050.019:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  1536. 1050.019:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  1537. 1050.020:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
  1538. 1050.021:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
  1539. 1050.022:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
  1540. 1050.093:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 0000000375610000: builtin
  1541. 1050.094:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
  1542. 1050.094:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
  1543. 1050.094:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 00000003B6DC0000: builtin
  1544. 1050.094:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00000002EDF00000: native
  1545. 1050.094:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3d12.dll" at 000000035E4E0000: native
  1546. 1050.097:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
  1547. 1050.097:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
  1548. 1050.098:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
  1549. 1050.099:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00000001EC2B0000: builtin
  1550. 1050.099:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 0000000346BA0000: builtin
  1551. 1050.099:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 0000000358120000: builtin
  1552. 1050.101:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 00000001C8B40000: builtin
  1553. 1050.101:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000003B8F00000: builtin
  1554. 1050.101:0180:0184:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\bink2w64.dll" at 0000000180000000: native
  1555. 1050.102:0180:0184:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\amd_ags_x64.dll" at 0000000000180000: native
  1556. 1050.103:0180:0184:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\oo2core_6_win64.dll" at 0000000000C70000: native
  1557. 1050.105:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
  1558. 1050.106:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
  1559. 1050.106:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00000001C69E0000: builtin
  1560. 1050.106:0180:0184:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\steam_api64.dll" at 000000013B400000: native
  1561. 1050.107:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00000002D4D40000: builtin
  1562. 1050.107:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 00000001DD3F0000: builtin
  1563. 1050.108:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f710
  1564. 1050.108:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f828 esp=0204f6cc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1565. 1050.108:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1566. 1050.109:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IMM32.dll" at 00000003AFD00000: builtin
  1567. 1050.110:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WLDAP32.dll" at 000000038B5A0000: builtin
  1568. 1050.111:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
  1569. 1050.111:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\XINPUT1_4.dll" at 00000003A93B0000: builtin
  1570. 1050.114:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002BB750000: builtin
  1571. 1050.114:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 0000000308050000: builtin
  1572. 1050.115:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f4c0
  1573. 1050.115:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f5d8 esp=0204f47c eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1574. 1050.115:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1575. 1050.117:0134:0138:fixme:imm:ImeSetCompositionString PROBLEM: This only sets the wine level string
  1576. 1050.117:0134:0138:fixme:imm:ImeSetCompositionString Reading string unimplemented
  1577. 1050.117:0134:0138:fixme:imm:NotifyIME NI_CLOSECANDIDATE
  1578. 1050.118:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1579. 1050.118:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1580. 1050.118:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1581. 1050.119:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1582. 1050.119:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1583. 1050.119:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1584. 1050.120:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1585. 1050.120:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1586. 1050.120:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1587. 1050.122:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1588. 1050.122:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1589. 1050.122:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1590. 1050.123:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1591. 1050.123:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1592. 1050.123:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1593. 1050.127:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1594. 1050.127:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1595. 1050.127:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1596. 1050.128:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1597. 1050.128:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1598. 1050.128:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1599. 1050.136:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1600. 1050.136:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1601. 1050.136:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1602. 1050.137:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1603. 1050.137:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1604. 1050.137:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1605. 1050.146:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1606. 1050.146:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1607. 1050.146:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1608. 1050.147:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000030C980000: builtin
  1609. 1050.147:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 00000001D97A0000: builtin
  1610. 1050.148:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 0000000351680000: builtin
  1611. 1050.150:0180:0184:err:wldap32:DllMain No libldap support, expect problems
  1612. 1050.152:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FDC7C690000: builtin
  1613. 1050.154:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1614. 1050.154:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1615. 1050.154:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1616. 1050.158:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1617. 1050.158:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1618. 1050.158:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1619. 1050.159:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1620. 1050.159:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1621. 1050.159:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1622. 1050.201:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 6FE40000: builtin
  1623. 1050.206:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
  1624. 1050.206:0180:0184:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\uxtheme.dll" : builtin
  1625. 1050.213:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-string-l1-1-0.dll" at 0000000226310000: builtin
  1626. 1050.214:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-datetime-l1-1-1.dll" at 000000029EA80000: builtin
  1627. 1050.214:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-obsolete-l1-2-0.dll" at 00000002FA030000: builtin
  1628. 1050.215:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1629. 1050.215:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1630. 1050.215:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1631. 1050.234:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  1632. 1050.276:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1633. 1050.276:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1634. 1050.276:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1635. 1050.339:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1636. 1050.339:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1637. 1050.339:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1638. 1050.349:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1639. 1050.349:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1640. 1050.349:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1641. 1050.350:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1642. 1050.350:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1643. 1050.350:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1644. 1050.400:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: eax=000000d8 ebx=00000001 ecx=00000000 edx=00000000 esi=00000001 edi=0204f300
  1645. 1050.400:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ebp=0204f418 esp=0204f2bc eip=7bc0bd9c cs=0023 ss=002b flags=00000246
  1646. 1050.400:0134:0148:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
  1647. 1050.414:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\D3D9.DLL" : native
  1648. 1050.414:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\vulkan-1.dll" : builtin
  1649. 1050.415:0134:0138:fixme:kernelbase:AppPolicyGetProcessTerminationMethod FFFFFFFA, 0095FEAC
  1650. 1050.427:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at 00007FDC772A0000: builtin
  1651. 1050.428:0180:0184:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient64.dll" at 0000000138000000: native
  1652. 1050.428:0180:0184:warn:debugstr:OutputDebugStringA "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient64.dll' OK.\n"
  1653. 1050.428:0180:0184:trace:seh:dispatch_exception code=40010006 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0184
  1654. 1050.428:0180:0184:trace:unwind:dispatch_exception info[0]=0000000000000056
  1655. 1050.428:0180:0184:trace:unwind:dispatch_exception info[1]=000000000011f210
  1656. 1050.428:0180:0184:warn:seh:dispatch_exception "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient64.dll' OK.\n"
  1657. 1050.428:0180:0184:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=40010006 flags=0
  1658. 1050.428:0180:0184:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned 0
  1659. 1050.428:0180:0184:trace:seh:call_vectored_handlers calling handler at 00000002EDF85330 code=40010006 flags=0
  1660. 1050.428:0180:0184:trace:seh:call_vectored_handlers handler at 00000002EDF85330 returned 0
  1661. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0124BE rsp 000000000011EE30
  1662. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 12470-124f7
  1663. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  1664. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  1665. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  1666. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  1667. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B613E83 rsp 000000000011EF10
  1668. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 13c00-140f8
  1669. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B63C384 flags 0 prolog 0x18 bytes function 000000007B613C00-000000007B6140F8
  1670. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x18: subq $0x2a0,%rsp
  1671. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x11: pushq %rbx
  1672. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x10: pushq %r12
  1673. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xe: pushq %r13
  1674. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r14
  1675. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r15
  1676. 1050.428:0180:0184:trace:seh:call_stack_handlers found wine frame 000000000011F080 rsp 000000000011F1E0 handler 000000007B6322C0
  1677. 1050.428:0180:0184:trace:seh:call_teb_handler calling TEB handler 000000007B6322C0 (rec=000000000011EE50, frame=000000000011F080 context=000000000011E370, dispatch=000000000011E240)
  1678. 1050.428:0180:0184:trace:unwind:RtlUnwindEx code=40010006 flags=2 end_frame=000000000011F080 target_ip=000000007B63225A rip=000000017005af1d
  1679. 1050.428:0180:0184:trace:unwind:RtlUnwindEx info[0]=0000000000000056
  1680. 1050.428:0180:0184:trace:unwind:RtlUnwindEx info[1]=000000000011f210
  1681. 1050.428:0180:0184:trace:unwind:RtlUnwindEx rax=00000000003e0000 rbx=000000000011f080 rcx=000000000011dc40 rdx=000000007b63225a
  1682. 1050.428:0180:0184:trace:unwind:RtlUnwindEx rsi=000000000011d6f0 rdi=000000000011e370 rbp=000000000011e140 rsp=000000000011d580
  1683. 1050.428:0180:0184:trace:unwind:RtlUnwindEx r8=000000000011ee50 r9=000000007b632290 r10=00007fdc7fd30660 r11=0000000000000000
  1684. 1050.428:0180:0184:trace:unwind:RtlUnwindEx r12=000000000011ee50 r13=000000000011dc40 r14=000000000011f080 r15=000000017006aa30
  1685. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000011D580
  1686. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  1687. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  1688. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  1689. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1690. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1691. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1692. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1693. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r12
  1694. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r13
  1695. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r14
  1696. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r15
  1697. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000011DC10
  1698. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 5b610-5b638
  1699. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  1700. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  1701. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B63225A rsp 000000000011E120
  1702. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 32240-3225c
  1703. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B63D804 flags 0 prolog 0x8 bytes function 000000007B632240-000000007B63225C
  1704. 1050.428:0180:0184:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1705. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1706. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1707. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1708. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B632289 rsp 000000000011E150
  1709. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 32260-3228a
  1710. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B63D810 flags 0 prolog 0x4 bytes function 000000007B632260-000000007B63228A
  1711. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  1712. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B632314 rsp 000000000011E180
  1713. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 322c0-32315
  1714. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B63D820 flags 0 prolog 0xa bytes function 000000007B6322C0-000000007B632315
  1715. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  1716. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r12
  1717. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r13
  1718. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r14
  1719. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000011E1D0
  1720. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 59f30-5a441
  1721. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  1722. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  1723. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1724. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1725. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1726. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1727. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r12
  1728. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r13
  1729. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r14
  1730. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r15
  1731. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000011E890
  1732. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  1733. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  1734. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  1735. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1736. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1737. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1738. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1739. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r12
  1740. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r13
  1741. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r14
  1742. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r15
  1743. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000011E930
  1744. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 5843c-584b1
  1745. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  1746. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1747. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0124BE rsp 000000000011EE30
  1748. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 12470-124f7
  1749. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0A7480 flags 0 prolog 0x11 bytes function 000000007B012470-000000007B0124F7
  1750. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x11: subq $0xc8,%rsp
  1751. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rsi
  1752. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rdi
  1753. 1050.428:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B613E83 rsp 000000000011EF10
  1754. 1050.428:0180:0184:trace:unwind:dump_unwind_info **** func 13c00-140f8
  1755. 1050.428:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B63C384 flags 0 prolog 0x18 bytes function 000000007B613C00-000000007B6140F8
  1756. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x18: subq $0x2a0,%rsp
  1757. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x11: pushq %rbx
  1758. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0x10: pushq %r12
  1759. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xe: pushq %r13
  1760. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r14
  1761. 1050.428:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r15
  1762. 1050.428:0180:0184:trace:seh:RtlRestoreContext returning to 000000007B63225A stack 000000000011EF10
  1763. 1050.480:0180:0184:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\gameoverlayrenderer64.dll" at 0000000002490000: native
  1764. 1050.483:0180:0190:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 0000000205950000: builtin
  1765. 1050.483:0180:0190:fixme:kernelbase:AppPolicyGetThreadInitializationType FFFFFFFFFFFFFFFA, 0000000002B6FF50
  1766. 1050.483:0180:0190:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0190
  1767. 1050.483:0180:0190:trace:unwind:dispatch_exception info[0]=0000000000001000
  1768. 1050.483:0180:0190:trace:unwind:dispatch_exception info[1]=0000000000b94618
  1769. 1050.483:0180:0190:trace:unwind:dispatch_exception info[2]=0000000000000190
  1770. 1050.483:0180:0190:warn:seh:dispatch_exception Thread 0190 renamed to "Core.Logging.BackgroundStrategy"
  1771. 1050.483:0180:0190:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1772. 1050.483:0180:0190:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1773. 1050.491:0180:0194:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0194
  1774. 1050.491:0180:0194:trace:unwind:dispatch_exception info[0]=0000000000001000
  1775. 1050.491:0180:0194:trace:unwind:dispatch_exception info[1]=00007fff9e300078
  1776. 1050.491:0180:0194:trace:unwind:dispatch_exception info[2]=0000000000000194
  1777. 1050.491:0180:0194:warn:seh:dispatch_exception Thread 0194 renamed to "FD4JobWorker:0"
  1778. 1050.491:0180:0194:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1779. 1050.491:0180:0194:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1780. 1050.491:0180:0198:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0198
  1781. 1050.491:0180:0198:trace:unwind:dispatch_exception info[0]=0000000000001000
  1782. 1050.491:0180:0198:trace:unwind:dispatch_exception info[1]=00007fff9e300138
  1783. 1050.491:0180:0198:trace:unwind:dispatch_exception info[2]=0000000000000198
  1784. 1050.491:0180:019c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=019c
  1785. 1050.491:0180:0198:warn:seh:dispatch_exception Thread 0198 renamed to "FD4JobWorker:1"
  1786. 1050.491:0180:0198:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1787. 1050.491:0180:019c:trace:unwind:dispatch_exception info[0]=0000000000001000
  1788. 1050.491:0180:0198:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1789. 1050.491:0180:019c:trace:unwind:dispatch_exception info[1]=00007fff9e3001f8
  1790. 1050.491:0180:019c:trace:unwind:dispatch_exception info[2]=000000000000019c
  1791. 1050.491:0180:019c:warn:seh:dispatch_exception Thread 019c renamed to "FD4JobWorker:2"
  1792. 1050.492:0180:019c:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1793. 1050.492:0180:019c:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1794. 1050.492:0180:01a0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01a0
  1795. 1050.492:0180:01a0:trace:unwind:dispatch_exception info[0]=0000000000001000
  1796. 1050.492:0180:01a0:trace:unwind:dispatch_exception info[1]=00007fff9e3002b8
  1797. 1050.492:0180:01a0:trace:unwind:dispatch_exception info[2]=00000000000001a0
  1798. 1050.492:0180:01a0:warn:seh:dispatch_exception Thread 01a0 renamed to "FD4JobWorker:3"
  1799. 1050.492:0180:01a0:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1800. 1050.492:0180:01a0:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1801. 1050.493:0180:01a8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01a8
  1802. 1050.493:0180:01a8:trace:unwind:dispatch_exception info[0]=0000000000001000
  1803. 1050.493:0180:01a8:trace:unwind:dispatch_exception info[1]=00007fff9e300438
  1804. 1050.493:0180:01a8:trace:unwind:dispatch_exception info[2]=00000000000001a8
  1805. 1050.493:0180:01a8:warn:seh:dispatch_exception Thread 01a8 renamed to "FD4JobWorker:5"
  1806. 1050.493:0180:01a8:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1807. 1050.493:0180:01a4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01a4
  1808. 1050.493:0180:01a8:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1809. 1050.493:0180:01a4:trace:unwind:dispatch_exception info[0]=0000000000001000
  1810. 1050.493:0180:01a4:trace:unwind:dispatch_exception info[1]=00007fff9e300378
  1811. 1050.493:0180:01a4:trace:unwind:dispatch_exception info[2]=00000000000001a4
  1812. 1050.493:0180:01a4:warn:seh:dispatch_exception Thread 01a4 renamed to "FD4JobWorker:4"
  1813. 1050.493:0180:01a4:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1814. 1050.493:0180:01a4:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1815. info: Game: eldenring.exe
  1816. info: DXVK: v1.10.1
  1817. info: Built-in extension providers:
  1818. info: Win32 WSI
  1819. info: OpenVR
  1820. info: OpenXR
  1821. 1050.497:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineopenxr.dll" at 00007FDC7C0A0000: builtin
  1822. warn: OpenXR: Unable to get required Vulkan instance extensions size
  1823. info: Enabled instance extensions:
  1824. info: VK_KHR_get_surface_capabilities2
  1825. info: VK_KHR_surface
  1826. info: VK_KHR_win32_surface
  1827. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1828. warn: OpenXR: Unable to get required Vulkan Device extensions size
  1829. 1050.525:0180:0184:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\wineopenxr.dll" : builtin
  1830. info: AMD RADV POLARIS10 (ACO):
  1831. info: Driver: 20.3.5
  1832. info: Vulkan: 1.2.145
  1833. info: Memory Heap[0]:
  1834. info: Size: 7936 MiB
  1835. info: Flags: 0x1
  1836. info: Memory Type[0]: Property Flags = 0x1
  1837. info: Memory Heap[1]:
  1838. info: Size: 8192 MiB
  1839. info: Flags: 0x0
  1840. info: Memory Type[1]: Property Flags = 0x6
  1841. info: Memory Type[3]: Property Flags = 0xe
  1842. info: Memory Heap[2]:
  1843. info: Size: 256 MiB
  1844. info: Flags: 0x1
  1845. info: Memory Type[2]: Property Flags = 0x7
  1846. info: Game: eldenring.exe
  1847. info: DXVK: v1.10.1
  1848. info: Built-in extension providers:
  1849. info: Win32 WSI
  1850. info: OpenVR
  1851. info: OpenXR
  1852. 1050.530:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineopenxr.dll" at 00007FDC7C0A0000: builtin
  1853. info: Enabled instance extensions:
  1854. info: VK_KHR_get_surface_capabilities2
  1855. info: VK_KHR_surface
  1856. info: VK_KHR_win32_surface
  1857. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1858. info: AMD RADV POLARIS10 (ACO):
  1859. info: Driver: 20.3.5
  1860. info: Vulkan: 1.2.145
  1861. info: Memory Heap[0]:
  1862. info: Size: 7936 MiB
  1863. info: Flags: 0x1
  1864. info: Memory Type[0]: Property Flags = 0x1
  1865. info: Memory Heap[1]:
  1866. info: Size: 8192 MiB
  1867. info: Flags: 0x0
  1868. info: Memory Type[1]: Property Flags = 0x6
  1869. info: Memory Type[3]: Property Flags = 0xe
  1870. info: Memory Heap[2]:
  1871. info: Size: 256 MiB
  1872. info: Flags: 0x1
  1873. info: Memory Type[2]: Property Flags = 0x7
  1874. info: Game: eldenring.exe
  1875. info: DXVK: v1.10.1
  1876. info: Built-in extension providers:
  1877. info: Win32 WSI
  1878. info: OpenVR
  1879. info: OpenXR
  1880. info: Enabled instance extensions:
  1881. info: VK_KHR_get_surface_capabilities2
  1882. info: VK_KHR_surface
  1883. info: VK_KHR_win32_surface
  1884. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1885. info: AMD RADV POLARIS10 (ACO):
  1886. info: Driver: 20.3.5
  1887. info: Vulkan: 1.2.145
  1888. info: Memory Heap[0]:
  1889. info: Size: 7936 MiB
  1890. info: Flags: 0x1
  1891. info: Memory Type[0]: Property Flags = 0x1
  1892. info: Memory Heap[1]:
  1893. info: Size: 8192 MiB
  1894. info: Flags: 0x0
  1895. info: Memory Type[1]: Property Flags = 0x6
  1896. info: Memory Type[3]: Property Flags = 0xe
  1897. info: Memory Heap[2]:
  1898. info: Size: 256 MiB
  1899. info: Flags: 0x1
  1900. info: Memory Type[2]: Property Flags = 0x7
  1901. info: Game: eldenring.exe
  1902. info: DXVK: v1.10.1
  1903. info: Built-in extension providers:
  1904. info: Win32 WSI
  1905. info: OpenVR
  1906. info: OpenXR
  1907. info: Enabled instance extensions:
  1908. info: VK_KHR_get_surface_capabilities2
  1909. info: VK_KHR_surface
  1910. info: VK_KHR_win32_surface
  1911. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1912. info: AMD RADV POLARIS10 (ACO):
  1913. info: Driver: 20.3.5
  1914. info: Vulkan: 1.2.145
  1915. info: Memory Heap[0]:
  1916. info: Size: 7936 MiB
  1917. info: Flags: 0x1
  1918. info: Memory Type[0]: Property Flags = 0x1
  1919. info: Memory Heap[1]:
  1920. info: Size: 8192 MiB
  1921. info: Flags: 0x0
  1922. info: Memory Type[1]: Property Flags = 0x6
  1923. info: Memory Type[3]: Property Flags = 0xe
  1924. info: Memory Heap[2]:
  1925. info: Size: 256 MiB
  1926. info: Flags: 0x1
  1927. info: Memory Type[2]: Property Flags = 0x7
  1928. info: Game: eldenring.exe
  1929. info: DXVK: v1.10.1
  1930. info: Built-in extension providers:
  1931. info: Win32 WSI
  1932. info: OpenVR
  1933. info: OpenXR
  1934. info: Enabled instance extensions:
  1935. info: VK_KHR_get_surface_capabilities2
  1936. info: VK_KHR_surface
  1937. info: VK_KHR_win32_surface
  1938. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  1939. info: AMD RADV POLARIS10 (ACO):
  1940. info: Driver: 20.3.5
  1941. info: Vulkan: 1.2.145
  1942. info: Memory Heap[0]:
  1943. info: Size: 7936 MiB
  1944. info: Flags: 0x1
  1945. info: Memory Type[0]: Property Flags = 0x1
  1946. info: Memory Heap[1]:
  1947. info: Size: 8192 MiB
  1948. info: Flags: 0x0
  1949. info: Memory Type[1]: Property Flags = 0x6
  1950. info: Memory Type[3]: Property Flags = 0xe
  1951. info: Memory Heap[2]:
  1952. info: Size: 256 MiB
  1953. info: Flags: 0x1
  1954. info: Memory Type[2]: Property Flags = 0x7
  1955. 1050.655:0180:01ac:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01ac
  1956. 1050.655:0180:01ac:trace:unwind:dispatch_exception info[0]=0000000000001000
  1957. 1050.655:0180:01ac:trace:unwind:dispatch_exception info[1]=0000000000b9aa98
  1958. 1050.655:0180:01ac:trace:unwind:dispatch_exception info[2]=00000000000001ac
  1959. 1050.655:0180:01ac:warn:seh:dispatch_exception Thread 01ac renamed to "CSPlacementDebugMan1"
  1960. 1050.655:0180:01ac:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  1961. 1050.655:0180:01ac:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  1962. 1050.662:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Normaliz.dll" at 00000001E7610000: builtin
  1963. 1050.663:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 000000029CFC0000: builtin
  1964. 1050.664:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\nsi.dll" at 000000028DFA0000: builtin
  1965. 1050.664:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 0000000240030000: builtin
  1966. 1050.665:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINTRUST.dll" at 00000001FDFD0000: builtin
  1967. 1050.666:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Secur32.dll" at 0000000201CF0000: builtin
  1968. 1050.668:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000262250000: builtin
  1969. 1050.668:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 000000039B510000: builtin
  1970. 1050.669:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000033EA00000: builtin
  1971. 1050.669:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 000000030A2C0000: builtin
  1972. 1050.669:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 0000000350A30000: builtin
  1973. 1050.670:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 00000000083E0000: native
  1974. 1050.670:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140_1.dll" at 00000002F7F20000: builtin
  1975. 1050.671:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000355100000: builtin
  1976. 1050.671:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 0000000344840000: builtin
  1977. 1050.672:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 000000028BA60000: builtin
  1978. 1050.672:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000241850000: builtin
  1979. 1050.673:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000360A80000: builtin
  1980. 1050.673:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 00000001CD860000: builtin
  1981. 1050.673:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0000000008340000: native
  1982. 1050.674:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-conio-l1-1-0.dll" at 00000003738E0000: builtin
  1983. 1050.674:0180:0184:trace:loaddll:build_module Loaded L"Z:\\home\\cujo\\.steam\\debian-installation\\steamapps\\common\\ELDEN RING\\Game\\EOSSDK-Win64-Shipping.dll" at 0000000006D00000: native
  1984. 1050.675:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Kerberos.dll" at 0000000274A50000: builtin
  1985. 1050.675:0180:0184:err:kerberos:kerberos_LsaApInitializePackage no Kerberos support, expect problems
  1986. 1050.677:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\netapi32.dll" at 00000003673D0000: builtin
  1987. 1050.677:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSV1_0.dll" at 000000039C380000: builtin
  1988. 1050.677:0180:0184:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
  1989. 1050.677:0180:0184:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\MSV1_0.dll" : builtin
  1990. 1050.680:0180:0184:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\netapi32.dll" : builtin
  1991. 1050.681:0180:0184:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
  1992. 1050.681:0180:0184:warn:seh:OutputDebugStringA "Shutdown handler: initalize.\n"
  1993. 1050.681:0180:0184:trace:seh:dispatch_exception code=40010006 flags=0 addr=000000007B0137F5 ip=000000007B0137F5 tid=0184
  1994. 1050.681:0180:0184:trace:unwind:dispatch_exception info[0]=000000000000001e
  1995. 1050.681:0180:0184:trace:unwind:dispatch_exception info[1]=0000000000a14b10
  1996. 1050.681:0180:0184:warn:seh:dispatch_exception "Shutdown handler: initalize.\n"
  1997. 1050.681:0180:0184:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=40010006 flags=0
  1998. 1050.681:0180:0184:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned 0
  1999. 1050.681:0180:0184:trace:seh:call_vectored_handlers calling handler at 00000002EDF85330 code=40010006 flags=0
  2000. 1050.681:0180:0184:trace:seh:call_vectored_handlers handler at 00000002EDF85330 returned 0
  2001. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B0137F5 rsp 000000000011F150
  2002. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 13510-13830
  2003. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0A756C flags 0 prolog 0x18 bytes function 000000007B013510-000000007B013830
  2004. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x18: subq $0x200,%rsp
  2005. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x11: pushq %rbx
  2006. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x10: pushq %r12
  2007. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xe: pushq %r13
  2008. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r14
  2009. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r15
  2010. 1050.681:0180:0184:trace:seh:call_stack_handlers found wine frame 000000000011F220 rsp 000000000011F380 handler 000000007B07E310
  2011. 1050.681:0180:0184:trace:seh:call_teb_handler calling TEB handler 000000007B07E310 (rec=000000000011F180, frame=000000000011F220 context=000000000011E690, dispatch=000000000011E560)
  2012. 1050.681:0180:0184:trace:unwind:RtlUnwindEx code=40010006 flags=2 end_frame=000000000011F220 target_ip=000000007B07E2AA rip=000000017005af1d
  2013. 1050.681:0180:0184:trace:unwind:RtlUnwindEx info[0]=000000000000001e
  2014. 1050.681:0180:0184:trace:unwind:RtlUnwindEx info[1]=0000000000a14b10
  2015. 1050.681:0180:0184:trace:unwind:RtlUnwindEx rax=00000000003e0000 rbx=000000000011f220 rcx=000000000011df60 rdx=000000007b07e2aa
  2016. 1050.681:0180:0184:trace:unwind:RtlUnwindEx rsi=000000000011da10 rdi=000000000011e690 rbp=000000000011e460 rsp=000000000011d8a0
  2017. 1050.681:0180:0184:trace:unwind:RtlUnwindEx r8=000000000011f180 r9=000000007b07e2e0 r10=00007fdc7fd30660 r11=0000000000000000
  2018. 1050.681:0180:0184:trace:unwind:RtlUnwindEx r12=000000000011f180 r13=000000000011df60 r14=000000000011f220 r15=000000017006aa30
  2019. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005AF1D rsp 000000000011D8A0
  2020. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 5aed0-5b606
  2021. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000017008596C flags 0 prolog 0x13 bytes function 000000017005AED0-000000017005B606
  2022. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  2023. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  2024. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  2025. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  2026. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  2027. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r12
  2028. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r13
  2029. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r14
  2030. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r15
  2031. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005B62F rsp 000000000011DF30
  2032. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 5b610-5b638
  2033. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085984 flags 0 prolog 0x7 bytes function 000000017005B610-000000017005B638
  2034. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x7: subq $0x508,%rsp
  2035. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B07E2AA rsp 000000000011E440
  2036. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 7e290-7e2ac
  2037. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0AB038 flags 0 prolog 0x8 bytes function 000000007B07E290-000000007B07E2AC
  2038. 1050.681:0180:0184:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  2039. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  2040. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  2041. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  2042. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B07E2D9 rsp 000000000011E470
  2043. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 7e2b0-7e2da
  2044. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0AB044 flags 0 prolog 0x4 bytes function 000000007B07E2B0-000000007B07E2DA
  2045. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  2046. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B07E364 rsp 000000000011E4A0
  2047. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 7e310-7e365
  2048. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0AB054 flags 0 prolog 0xa bytes function 000000007B07E310-000000007B07E365
  2049. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  2050. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r12
  2051. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r13
  2052. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r14
  2053. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A16D rsp 000000000011E4F0
  2054. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 59f30-5a441
  2055. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085904 flags 0 prolog 0x13 bytes function 0000000170059F30-000000017005A441
  2056. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  2057. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  2058. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  2059. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  2060. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  2061. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r12
  2062. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r13
  2063. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r14
  2064. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r15
  2065. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000017005A759 rsp 000000000011EBB0
  2066. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 5a450-5a96f
  2067. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000017008591C flags 0 prolog 0x10 bytes function 000000017005A450-000000017005A96F
  2068. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x10: subq $0x58,%rsp
  2069. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  2070. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  2071. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  2072. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  2073. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r12
  2074. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r13
  2075. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %r14
  2076. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %r15
  2077. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 00000001700584A4 rsp 000000000011EC50
  2078. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 5843c-584b1
  2079. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085878 flags 0 prolog 0x7 bytes function 000000017005843C-00000001700584B1
  2080. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  2081. 1050.681:0180:0184:trace:unwind:RtlVirtualUnwind type 2 rip 000000007B0137F5 rsp 000000000011F150
  2082. 1050.681:0180:0184:trace:unwind:dump_unwind_info **** func 13510-13830
  2083. 1050.681:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B0A756C flags 0 prolog 0x18 bytes function 000000007B013510-000000007B013830
  2084. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x18: subq $0x200,%rsp
  2085. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x11: pushq %rbx
  2086. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0x10: pushq %r12
  2087. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xe: pushq %r13
  2088. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r14
  2089. 1050.681:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r15
  2090. 1050.681:0180:0184:trace:seh:RtlRestoreContext returning to 000000007B07E2AA stack 000000000011F150
  2091. 1050.686:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 00000002DE970000: builtin
  2092. 1050.805:0180:01b0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01b0
  2093. 1050.805:0180:01b0:trace:unwind:dispatch_exception info[0]=0000000000001000
  2094. 1050.805:0180:01b0:trace:unwind:dispatch_exception info[1]=00000000088ffe60
  2095. 1050.805:0180:01b0:trace:unwind:dispatch_exception info[2]=00000000000001b0
  2096. 1050.805:0180:01b0:warn:seh:dispatch_exception Thread 01b0 renamed to "HttpManagerThread"
  2097. 1050.805:0180:01b0:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2098. 1050.805:0180:01b0:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2099. 1050.810:0180:01b4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01b4
  2100. 1050.810:0180:01b4:trace:unwind:dispatch_exception info[0]=0000000000001000
  2101. 1050.810:0180:01b4:trace:unwind:dispatch_exception info[1]=0000000009e5fe60
  2102. 1050.810:0180:01b4:trace:unwind:dispatch_exception info[2]=00000000000001b4
  2103. 1050.810:0180:01b4:warn:seh:dispatch_exception Thread 01b4 renamed to "LibwebsocketsThread"
  2104. 1050.810:0180:01b4:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2105. 1050.810:0180:01b4:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2106. info: Game: eldenring.exe
  2107. info: DXVK: v1.10.1
  2108. info: Built-in extension providers:
  2109. info: Win32 WSI
  2110. info: OpenVR
  2111. info: OpenXR
  2112. info: Enabled instance extensions:
  2113. info: VK_KHR_get_surface_capabilities2
  2114. info: VK_KHR_surface
  2115. info: VK_KHR_win32_surface
  2116. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  2117. info: AMD RADV POLARIS10 (ACO):
  2118. info: Driver: 20.3.5
  2119. info: Vulkan: 1.2.145
  2120. info: Memory Heap[0]:
  2121. info: Size: 7936 MiB
  2122. info: Flags: 0x1
  2123. info: Memory Type[0]: Property Flags = 0x1
  2124. info: Memory Heap[1]:
  2125. info: Size: 8192 MiB
  2126. info: Flags: 0x0
  2127. info: Memory Type[1]: Property Flags = 0x6
  2128. info: Memory Type[3]: Property Flags = 0xe
  2129. info: Memory Heap[2]:
  2130. info: Size: 256 MiB
  2131. info: Flags: 0x1
  2132. info: Memory Type[2]: Property Flags = 0x7
  2133. info: Game: eldenring.exe
  2134. info: DXVK: v1.10.1
  2135. info: Built-in extension providers:
  2136. info: Win32 WSI
  2137. info: OpenVR
  2138. info: OpenXR
  2139. info: Enabled instance extensions:
  2140. info: VK_KHR_get_surface_capabilities2
  2141. info: VK_KHR_surface
  2142. info: VK_KHR_win32_surface
  2143. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  2144. info: AMD RADV POLARIS10 (ACO):
  2145. info: Driver: 20.3.5
  2146. info: Vulkan: 1.2.145
  2147. info: Memory Heap[0]:
  2148. info: Size: 7936 MiB
  2149. info: Flags: 0x1
  2150. info: Memory Type[0]: Property Flags = 0x1
  2151. info: Memory Heap[1]:
  2152. info: Size: 8192 MiB
  2153. info: Flags: 0x0
  2154. info: Memory Type[1]: Property Flags = 0x6
  2155. info: Memory Type[3]: Property Flags = 0xe
  2156. info: Memory Heap[2]:
  2157. info: Size: 256 MiB
  2158. info: Flags: 0x1
  2159. info: Memory Type[2]: Property Flags = 0x7
  2160. 1050.876:0180:01b8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01b8
  2161. 1050.876:0180:01b8:trace:unwind:dispatch_exception info[0]=0000000000001000
  2162. 1050.876:0180:01b8:trace:unwind:dispatch_exception info[1]=000000000861a5b8
  2163. 1050.876:0180:01b8:trace:unwind:dispatch_exception info[2]=00000000000001b8
  2164. 1050.876:0180:01b8:warn:seh:dispatch_exception Thread 01b8 renamed to "CSCheatDetectionTitleModule::Thread"
  2165. 1050.876:0180:01b8:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2166. 1050.876:0180:01b8:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2167. 1050.890:0180:0184:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-sysinfo-l1-2-1.dll" at 000000028EBE0000: builtin
  2168. 1050.903:0180:0184:fixme:thread:NtSetInformationThread Can't set other thread's platform description
  2169. 1050.903:0180:0184:fixme:thread:NtSetInformationThread Can't set other thread's platform description
  2170. 1050.904:0180:0184:fixme:thread:NtSetInformationThread Can't set other thread's platform description
  2171. 1050.904:0180:01bc:fixme:thread:SetThreadIdealProcessor (0000000000000E4C 1): stub
  2172. 1050.904:0180:01c0:fixme:thread:SetThreadIdealProcessor (0000000000000E54 2): stub
  2173. 1050.904:0180:01c4:fixme:thread:SetThreadIdealProcessor (0000000000000E5C 3): stub
  2174. 1050.905:0180:01c8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01c8
  2175. 1050.905:0180:01c8:trace:unwind:dispatch_exception info[0]=0000000000001000
  2176. 1050.905:0180:01c8:trace:unwind:dispatch_exception info[1]=000000000861b098
  2177. 1050.905:0180:01c8:trace:unwind:dispatch_exception info[2]=00000000000001c8
  2178. 1050.905:0180:01c8:warn:seh:dispatch_exception Thread 01c8 renamed to "EzWorkPool_HIGHEST_0"
  2179. 1050.905:0180:01c8:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2180. 1050.905:0180:01c8:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2181. 1050.928:0180:01d0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01d0
  2182. 1050.928:0180:01cc:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01cc
  2183. 1050.928:0180:01d0:trace:unwind:dispatch_exception info[0]=0000000000001000
  2184. 1050.928:0180:01cc:trace:unwind:dispatch_exception info[0]=0000000000001000
  2185. 1050.928:0180:01d0:trace:unwind:dispatch_exception info[1]=000000000861b2d8
  2186. 1050.928:0180:01cc:trace:unwind:dispatch_exception info[1]=000000000861b1b8
  2187. 1050.928:0180:01d0:trace:unwind:dispatch_exception info[2]=00000000000001d0
  2188. 1050.928:0180:01cc:trace:unwind:dispatch_exception info[2]=00000000000001cc
  2189. 1050.928:0180:01d0:warn:seh:dispatch_exception Thread 01d0 renamed to "EzWorkPool_HIGHEST_2"
  2190. 1050.928:0180:01cc:warn:seh:dispatch_exception Thread 01cc renamed to "EzWorkPool_HIGHEST_1"
  2191. 1050.928:0180:01d0:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2192. 1050.928:0180:01cc:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2193. 1050.928:0180:01d0:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2194. 1050.928:0180:01cc:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2195. 1050.929:0180:01d4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01d4
  2196. 1050.929:0180:01d4:trace:unwind:dispatch_exception info[0]=0000000000001000
  2197. 1050.929:0180:01d4:trace:unwind:dispatch_exception info[1]=000000000861b3f8
  2198. 1050.929:0180:01d4:trace:unwind:dispatch_exception info[2]=00000000000001d4
  2199. 1050.929:0180:01d4:warn:seh:dispatch_exception Thread 01d4 renamed to "EzWorkPool_HIGHEST_3"
  2200. 1050.929:0180:01d4:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2201. 1050.929:0180:01d4:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2202. 1050.929:0180:01dc:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01dc
  2203. 1050.929:0180:01dc:trace:unwind:dispatch_exception info[0]=0000000000001000
  2204. 1050.929:0180:01dc:trace:unwind:dispatch_exception info[1]=000000000861b6f8
  2205. 1050.929:0180:01dc:trace:unwind:dispatch_exception info[2]=00000000000001dc
  2206. 1050.929:0180:01dc:warn:seh:dispatch_exception Thread 01dc renamed to "EzWorkPool_HIGHEST_2"
  2207. 1050.929:0180:01dc:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2208. 1050.929:0180:01dc:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2209. 1050.929:0180:01d8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01d8
  2210. 1050.929:0180:01d8:trace:unwind:dispatch_exception info[0]=0000000000001000
  2211. 1050.929:0180:01d8:trace:unwind:dispatch_exception info[1]=000000000861b5d8
  2212. 1050.929:0180:01d8:trace:unwind:dispatch_exception info[2]=00000000000001d8
  2213. 1050.929:0180:01d8:warn:seh:dispatch_exception Thread 01d8 renamed to "EzWorkPool_HIGHEST_1"
  2214. 1050.929:0180:01d8:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2215. 1050.929:0180:01d8:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2216. 1050.929:0180:01e0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01e0
  2217. 1050.929:0180:01e0:trace:unwind:dispatch_exception info[0]=0000000000001000
  2218. 1050.929:0180:01e0:trace:unwind:dispatch_exception info[1]=000000000861b818
  2219. 1050.929:0180:01e0:trace:unwind:dispatch_exception info[2]=00000000000001e0
  2220. 1050.929:0180:01e0:warn:seh:dispatch_exception Thread 01e0 renamed to "EzWorkPool_HIGHEST_3"
  2221. 1050.930:0180:01e0:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2222. 1050.930:0180:01e0:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2223. 1050.930:0180:01e4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01e4
  2224. 1050.930:0180:01e4:trace:unwind:dispatch_exception info[0]=0000000000001000
  2225. 1050.930:0180:01e4:trace:unwind:dispatch_exception info[1]=000000000861b9f8
  2226. 1050.930:0180:01e4:trace:unwind:dispatch_exception info[2]=00000000000001e4
  2227. 1050.930:0180:01e4:warn:seh:dispatch_exception Thread 01e4 renamed to "EzWorkPool_HIGHEST_2"
  2228. 1050.930:0180:01e4:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2229. 1050.930:0180:01e4:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2230. 1050.931:0180:01e8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01e8
  2231. 1050.931:0180:01e8:trace:unwind:dispatch_exception info[0]=0000000000001000
  2232. 1050.931:0180:01e8:trace:unwind:dispatch_exception info[1]=000000000861bbd8
  2233. 1050.931:0180:01e8:trace:unwind:dispatch_exception info[2]=00000000000001e8
  2234. 1050.931:0180:01e8:warn:seh:dispatch_exception Thread 01e8 renamed to "EzWorkPool_LOW_Clus0"
  2235. 1050.931:0180:01e8:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2236. 1050.931:0180:01e8:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2237. 1050.931:0180:01ec:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01ec
  2238. 1050.931:0180:01ec:trace:unwind:dispatch_exception info[0]=0000000000001000
  2239. 1050.931:0180:01ec:trace:unwind:dispatch_exception info[1]=000000000861bcf8
  2240. 1050.931:0180:01ec:trace:unwind:dispatch_exception info[2]=00000000000001ec
  2241. 1050.931:0180:01ec:warn:seh:dispatch_exception Thread 01ec renamed to "EzWorkPool_LOW_Clus1"
  2242. 1050.931:0180:01ec:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2243. 1050.931:0180:01ec:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2244. 1050.931:0180:01f0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01f0
  2245. 1050.931:0180:01f0:trace:unwind:dispatch_exception info[0]=0000000000001000
  2246. 1050.931:0180:01f0:trace:unwind:dispatch_exception info[1]=000000000861be18
  2247. 1050.931:0180:01f0:trace:unwind:dispatch_exception info[2]=00000000000001f0
  2248. 1050.931:0180:01f0:warn:seh:dispatch_exception Thread 01f0 renamed to "EzWorkPool_LOW_Clus2"
  2249. 1050.931:0180:01f0:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2250. 1050.931:0180:01f0:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2251. 1050.931:0180:01f4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01f4
  2252. 1050.931:0180:01f4:trace:unwind:dispatch_exception info[0]=0000000000001000
  2253. 1050.931:0180:01f4:trace:unwind:dispatch_exception info[1]=000000000861bf38
  2254. 1050.931:0180:01f4:trace:unwind:dispatch_exception info[2]=00000000000001f4
  2255. 1050.931:0180:01f4:warn:seh:dispatch_exception Thread 01f4 renamed to "EzWorkPool_LOW_Clus3"
  2256. 1050.931:0180:01f4:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2257. 1050.931:0180:01f4:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2258. 1050.932:0180:01f8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01f8
  2259. 1050.932:0180:01f8:trace:unwind:dispatch_exception info[0]=0000000000001000
  2260. 1050.932:0180:01f8:trace:unwind:dispatch_exception info[1]=000000000861c118
  2261. 1050.932:0180:01f8:trace:unwind:dispatch_exception info[2]=00000000000001f8
  2262. 1050.932:0180:01f8:warn:seh:dispatch_exception Thread 01f8 renamed to "EzWorkPool_LOW_AllC1"
  2263. 1050.932:0180:01f8:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2264. 1050.932:0180:01f8:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2265. 1050.933:0180:0204:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0204
  2266. 1050.933:0180:0204:trace:unwind:dispatch_exception info[0]=0000000000001000
  2267. 1050.933:0180:0204:trace:unwind:dispatch_exception info[1]=000000000861c478
  2268. 1050.933:0180:0204:trace:unwind:dispatch_exception info[2]=0000000000000204
  2269. 1050.933:0180:0204:warn:seh:dispatch_exception Thread 0204 renamed to "EzWorkPool_LOW_AllC4"
  2270. 1050.933:0180:0204:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2271. 1050.933:0180:0204:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2272. 1050.933:0180:01fc:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=01fc
  2273. 1050.933:0180:01fc:trace:unwind:dispatch_exception info[0]=0000000000001000
  2274. 1050.933:0180:01fc:trace:unwind:dispatch_exception info[1]=000000000861c238
  2275. 1050.933:0180:01fc:trace:unwind:dispatch_exception info[2]=00000000000001fc
  2276. 1050.933:0180:01fc:warn:seh:dispatch_exception Thread 01fc renamed to "EzWorkPool_LOW_AllC2"
  2277. 1050.933:0180:01fc:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2278. 1050.933:0180:01fc:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2279. 1050.934:0180:0200:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0200
  2280. 1050.934:0180:0200:trace:unwind:dispatch_exception info[0]=0000000000001000
  2281. 1050.934:0180:0200:trace:unwind:dispatch_exception info[1]=000000000861c358
  2282. 1050.934:0180:0200:trace:unwind:dispatch_exception info[2]=0000000000000200
  2283. 1050.934:0180:0200:warn:seh:dispatch_exception Thread 0200 renamed to "EzWorkPool_LOW_AllC3"
  2284. 1050.934:0180:0200:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2285. 1050.934:0180:0200:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2286. 1050.934:0180:0208:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0208
  2287. 1050.934:0180:0208:trace:unwind:dispatch_exception info[0]=0000000000001000
  2288. 1050.934:0180:0208:trace:unwind:dispatch_exception info[1]=000000000861c598
  2289. 1050.934:0180:0208:trace:unwind:dispatch_exception info[2]=0000000000000208
  2290. 1050.934:0180:0208:warn:seh:dispatch_exception Thread 0208 renamed to "EzWorkPool_LOW_AllC5"
  2291. 1050.934:0180:0208:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2292. 1050.934:0180:0208:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2293. 1050.934:0180:020c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=020c
  2294. 1050.934:0180:020c:trace:unwind:dispatch_exception info[0]=0000000000001000
  2295. 1050.934:0180:020c:trace:unwind:dispatch_exception info[1]=000000000861c778
  2296. 1050.934:0180:020c:trace:unwind:dispatch_exception info[2]=000000000000020c
  2297. 1050.934:0180:020c:warn:seh:dispatch_exception Thread 020c renamed to "EzWorkPool_LOW_Sing1"
  2298. 1050.934:0180:020c:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2299. 1050.934:0180:020c:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2300. 1050.935:0180:0210:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B0124BE ip=000000007B0124BE tid=0210
  2301. 1050.935:0180:0210:trace:unwind:dispatch_exception info[0]=0000000000001000
  2302. 1050.935:0180:0210:trace:unwind:dispatch_exception info[1]=000000000861c958
  2303. 1050.935:0180:0210:trace:unwind:dispatch_exception info[2]=0000000000000210
  2304. 1050.935:0180:0210:warn:seh:dispatch_exception Thread 0210 renamed to "EzWork_LOWEST_Not01"
  2305. 1050.935:0180:0210:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=406d1388 flags=0
  2306. 1050.935:0180:0210:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned ffffffff
  2307. info: Game: eldenring.exe
  2308. info: DXVK: v1.10.1
  2309. info: Built-in extension providers:
  2310. info: Win32 WSI
  2311. info: OpenVR
  2312. info: OpenXR
  2313. info: Enabled instance extensions:
  2314. info: VK_KHR_get_surface_capabilities2
  2315. info: VK_KHR_surface
  2316. info: VK_KHR_win32_surface
  2317. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  2318. info: AMD RADV POLARIS10 (ACO):
  2319. info: Driver: 20.3.5
  2320. info: Vulkan: 1.2.145
  2321. info: Memory Heap[0]:
  2322. info: Size: 7936 MiB
  2323. info: Flags: 0x1
  2324. info: Memory Type[0]: Property Flags = 0x1
  2325. info: Memory Heap[1]:
  2326. info: Size: 8192 MiB
  2327. info: Flags: 0x0
  2328. info: Memory Type[1]: Property Flags = 0x6
  2329. info: Memory Type[3]: Property Flags = 0xe
  2330. info: Memory Heap[2]:
  2331. info: Size: 256 MiB
  2332. info: Flags: 0x1
  2333. info: Memory Type[2]: Property Flags = 0x7
  2334. info: Game: eldenring.exe
  2335. info: DXVK: v1.10.1
  2336. info: Built-in extension providers:
  2337. info: Win32 WSI
  2338. info: OpenVR
  2339. info: OpenXR
  2340. info: Enabled instance extensions:
  2341. info: VK_KHR_get_surface_capabilities2
  2342. info: VK_KHR_surface
  2343. info: VK_KHR_win32_surface
  2344. warn: Skipping Vulkan 1.0 adapter: llvmpipe (LLVM 11.0.1, 256 bits)
  2345. info: AMD RADV POLARIS10 (ACO):
  2346. info: Driver: 20.3.5
  2347. info: Vulkan: 1.2.145
  2348. info: Memory Heap[0]:
  2349. info: Size: 7936 MiB
  2350. info: Flags: 0x1
  2351. info: Memory Type[0]: Property Flags = 0x1
  2352. info: Memory Heap[1]:
  2353. info: Size: 8192 MiB
  2354. info: Flags: 0x0
  2355. info: Memory Type[1]: Property Flags = 0x6
  2356. info: Memory Type[3]: Property Flags = 0xe
  2357. info: Memory Heap[2]:
  2358. info: Size: 256 MiB
  2359. info: Flags: 0x1
  2360. info: Memory Type[2]: Property Flags = 0x7
  2361. 0184:info:vkd3d_instance_apply_application_workarounds: Detected game eldenring.exe, adding config 0x1c00000, removing masks 0x0.
  2362. 0184:info:vkd3d_instance_deduce_config_flags_from_environment: shader_cache is used, global_pipeline_cache is enforced.
  2363. 0184:info:vkd3d_config_flags_init_once: VKD3D_CONFIG=''.
  2364. 0184:info:vkd3d_get_vk_version: vkd3d-proton - applicationVersion: 2.6.0.
  2365. 0184:info:vkd3d_instance_init: vkd3d-proton - build: b849bd425613afa.
  2366. 0184:err:vkd3d_init_device_caps: KHR_dynamic_rendering is not supported by this implementation. This is required for correct operation.
  2367. 1051.027:0180:0184:trace:seh:dispatch_exception code=c0000005 flags=0 addr=0000000141DF399B ip=0000000141DF399B tid=0184
  2368. 1051.027:0180:0184:trace:unwind:dispatch_exception info[0]=0000000000000000
  2369. 1051.027:0180:0184:trace:unwind:dispatch_exception info[1]=0000000000000000
  2370. 1051.027:0180:0184:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
  2371. 1051.027:0180:0184:trace:seh:dispatch_exception rax=0000000000000000 rbx=00007ffefe025340 rcx=0000000000000000 rdx=0000000140000000
  2372. 1051.027:0180:0184:trace:seh:dispatch_exception rsi=00007ffefe025408 rdi=00007ffefe025330 rbp=000000000011ea50 rsp=000000000011e950
  2373. 1051.027:0180:0184:trace:seh:dispatch_exception r8=000000000011eb70 r9=0000000000000008 r10=0000000144498d00 r11=00007ffefe025818
  2374. 1051.027:0180:0184:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=00007ffefe025588 r15=0000000000000000
  2375. 1051.027:0180:0184:trace:seh:call_vectored_handlers calling handler at 000000035E6087D0 code=c0000005 flags=0
  2376. 1051.027:0180:0184:trace:seh:call_vectored_handlers handler at 000000035E6087D0 returned 0
  2377. 1051.027:0180:0184:trace:seh:call_vectored_handlers calling handler at 00000002EDF85330 code=c0000005 flags=0
  2378. 1051.027:0180:0184:trace:seh:call_vectored_handlers handler at 00000002EDF85330 returned 0
  2379. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000141DF399B rsp 000000000011E950
  2380. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 1df3830-1df3b38
  2381. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001438B2804 flags 3 prolog 0x26 bytes function 0000000141DF3830-0000000141DF3B38
  2382. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x15: movq %rbx,0x298(%rsp)
  2383. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x15: subq $0x280,%rsp
  2384. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %rbp
  2385. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014244D2A4 data at 00000001438B2818
  2386. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014244D2A4 (rec=000000000011E720, frame=000000000011E950 context=000000000011DC70, dispatch=000000000011DB40)
  2387. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014244D2A4 returned 1
  2388. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000141A4967B rsp 000000000011EBE0
  2389. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 1a48f30-1a49a3e
  2390. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001437FF668 flags 3 prolog 0x35 bytes function 0000000141A48F30-0000000141A49A3E
  2391. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1c: subq $0x1c8,%rsp
  2392. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xd: pushq %r15
  2393. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %r14
  2394. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x9: pushq %r13
  2395. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x7: pushq %r12
  2396. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  2397. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rsi
  2398. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x3: pushq %rbx
  2399. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rbp
  2400. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014244D320 data at 00000001437FF684
  2401. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014244D320 (rec=000000000011E720, frame=000000000011EBE0 context=000000000011DC70, dispatch=000000000011DB40)
  2402. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014244D320 returned 1
  2403. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000014194DEB1 rsp 000000000011EDF0
  2404. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 194de30-194df1a
  2405. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001437D2CA8 flags 2 prolog 0x19 bytes function 000000014194DE30-000000014194DF1A
  2406. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x19: movq %rsi,0x58(%rsp)
  2407. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x50(%rsp)
  2408. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: subq $0x30,%rsp
  2409. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  2410. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001437D2CBC
  2411. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000141A3EC38 rsp 000000000011EE30
  2412. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 1a3eb50-1a3ecea
  2413. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001437FD8B0 flags 3 prolog 0x2a bytes function 0000000141A3EB50-0000000141A3ECEA
  2414. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1b: movq %rsi,0xa0(%rsp)
  2415. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x17: movq %rbx,0x98(%rsp)
  2416. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xb: subq $0x80,%rsp
  2417. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rdi
  2418. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014244D320 data at 00000001437FD8C4
  2419. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014244D320 (rec=000000000011E720, frame=000000000011EE30 context=000000000011DC70, dispatch=000000000011DB40)
  2420. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014244D320 returned 1
  2421. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000141A3E5B9 rsp 000000000011EEC0
  2422. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 1a3e500-1a3e61a
  2423. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001437FD750 flags 2 prolog 0x26 bytes function 0000000141A3E500-0000000141A3E61A
  2424. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x26: movq %rsi,0x78(%rsp)
  2425. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x21: movq %rbp,0x70(%rsp)
  2426. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1c: movq %rbx,0x68(%rsp)
  2427. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xe: subq $0x40,%rsp
  2428. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r15
  2429. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r14
  2430. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  2431. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001437FD76C
  2432. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000141A3E731 rsp 000000000011EF20
  2433. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 1a3e6b0-1a3e766
  2434. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001437FD820 flags 2 prolog 0x18 bytes function 0000000141A3E6B0-0000000141A3E766
  2435. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x18: movq %rsi,0x68(%rsp)
  2436. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x60(%rsp)
  2437. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x8: subq $0x50,%rsp
  2438. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rdi
  2439. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001437FD834
  2440. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000014194758B rsp 000000000011EF80
  2441. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 1947170-19494af
  2442. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001437D0E58 flags 3 prolog 0x3c bytes function 0000000141947170-00000001419494AF
  2443. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2b: movq %rbx,0x420(%rsp)
  2444. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1b: subq $0x3d0,%rsp
  2445. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r15
  2446. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r14
  2447. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r13
  2448. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r12
  2449. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rdi
  2450. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  2451. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rbp
  2452. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014244D320 data at 00000001437D0E78
  2453. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014244D320 (rec=000000000011E720, frame=000000000011EF80 context=000000000011DC70, dispatch=000000000011DB40)
  2454. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014244D320 returned 1
  2455. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140AA0E9A rsp 000000000011F390
  2456. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func aa08e0-aa102e
  2457. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001435EFBF4 flags 3 prolog 0x3c bytes function 0000000140AA08E0-0000000140AA102E
  2458. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2b: movq %rbx,0x778(%rsp)
  2459. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1b: subq $0x720,%rsp
  2460. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r15
  2461. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r14
  2462. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %r13
  2463. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %r12
  2464. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rdi
  2465. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  2466. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rbp
  2467. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014244D320 data at 00000001435EFC14
  2468. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014244D320 (rec=000000000011E720, frame=000000000011F390 context=000000000011DC70, dispatch=000000000011DB40)
  2469. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014244D320 returned 1
  2470. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140AA49BD rsp 000000000011FAF0
  2471. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func aa4860-aa4a53
  2472. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001435F0E30 flags 2 prolog 0x1f bytes function 0000000140AA4860-0000000140AA4A53
  2473. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1f: movq %rbp,0xc8(%rsp)
  2474. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1b: movq %rbx,0xc0(%rsp)
  2475. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xe: subq $0xa0,%rsp
  2476. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x7: pushq %r14
  2477. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  2478. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rsi
  2479. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001435F0E4C
  2480. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140AA3767 rsp 000000000011FBB0
  2481. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func aa3670-aa38b3
  2482. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001435F0970 flags 3 prolog 0x2a bytes function 0000000140AA3670-0000000140AA38B3
  2483. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1b: movq %rbp,0xa8(%rsp)
  2484. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x17: movq %rbx,0xa0(%rsp)
  2485. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xb: subq $0x70,%rsp
  2486. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x7: pushq %r14
  2487. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x5: pushq %rdi
  2488. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rsi
  2489. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014244D320 data at 00000001435F0988
  2490. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014244D320 (rec=000000000011E720, frame=000000000011FBB0 context=000000000011DC70, dispatch=000000000011DB40)
  2491. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014244D320 returned 1
  2492. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000142628F95 rsp 000000000011FC40
  2493. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 2628f30-2628fa9
  2494. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001439DB2E8 flags 2 prolog 0x14 bytes function 0000000142628F30-0000000142628FA9
  2495. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x50(%rsp)
  2496. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: subq $0x40,%rsp
  2497. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  2498. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001439DB2F8
  2499. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000142629290 rsp 000000000011FC90
  2500. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 2628fb0-2629340
  2501. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001439DB31C flags 2 prolog 0x27 bytes function 0000000142628FB0-0000000142629340
  2502. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x27: movq %rbx,0xa8(%rsp)
  2503. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x17: subq $0x60,%rsp
  2504. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x10: pushq %r15
  2505. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xe: pushq %r14
  2506. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %r13
  2507. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: pushq %r12
  2508. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x8: pushq %rdi
  2509. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  2510. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %rbp
  2511. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001439DB338
  2512. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 00000001425E0322 rsp 000000000011FD30
  2513. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 25dfff0-25e0379
  2514. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001439D0A54 flags 2 prolog 0x26 bytes function 00000001425DFFF0-00000001425E0379
  2515. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x26: movq %rbx,0xb8(%rsp)
  2516. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1a: subq $0x60,%rsp
  2517. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x16: pushq %r15
  2518. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x14: pushq %r14
  2519. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x12: pushq %r13
  2520. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x10: pushq %r12
  2521. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xe: pushq %rdi
  2522. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xd: pushq %rsi
  2523. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xc: pushq %rbp
  2524. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001439D0A70
  2525. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 00000001425A8DDE rsp 000000000011FDD0
  2526. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 25a8d80-25a8e04
  2527. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001439C66F8 flags 0 prolog 0xa bytes function 00000001425A8D80-00000001425A8E04
  2528. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: movq %rbx,0x40(%rsp)
  2529. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  2530. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  2531. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140E1CF14 rsp 000000000011FE10
  2532. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func e1cec0-e1cfd8
  2533. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001436C8820 flags 2 prolog 0xf bytes function 0000000140E1CEC0-0000000140E1CFD8
  2534. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: subq $0x30,%rsp
  2535. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  2536. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001436C882C
  2537. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140D5C784 rsp 000000000011FE50
  2538. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func d5c470-d5c95f
  2539. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001436956E0 flags 2 prolog 0x1a bytes function 0000000140D5C470-0000000140D5C95F
  2540. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x1a: movaps %xmm6,0x40(%rsp)
  2541. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x16: movq %rbx,0x80(%rsp)
  2542. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: subq $0x50,%rsp
  2543. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  2544. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x5: pushq %rsi
  2545. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: pushq %rbp
  2546. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246E678 data at 00000001436956F8
  2547. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140C15145 rsp 000000000011FEC0
  2548. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func c15130-c1531c
  2549. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000014364470C flags 0 prolog 0xb bytes function 0000000140C15130-0000000140C1531C
  2550. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xb: movaps %xmm6,0x20(%rsp)
  2551. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: subq $0x30,%rsp
  2552. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  2553. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 0000000140C154CE rsp 000000000011FF00
  2554. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func c1544f-c154e8
  2555. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001436446E8 flags 4 prolog 0x5 bytes function 0000000140C1544F-0000000140C154E8
  2556. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x5: movq %rdi,0x40(%rsp)
  2557. 1051.027:0180:0184:trace:unwind:dump_unwind_info chained to function 0000000140C15400-0000000140C1544F
  2558. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001436446D8 flags 0 prolog 0xf bytes function 0000000140C15400-0000000140C1544F
  2559. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xf: movq %rbp,0x50(%rsp)
  2560. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xf: movq %rbx,0x48(%rsp)
  2561. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xf: subq $0x30,%rsp
  2562. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  2563. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000014244E10B rsp 000000000011FF40
  2564. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 244dff4-244e160
  2565. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 00000001439A7978 flags 1 prolog 0xa bytes function 000000014244DFF4-000000014244E160
  2566. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: movq %rbx,0x40(%rsp)
  2567. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp
  2568. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  2569. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000014246F578 data at 00000001439A7988
  2570. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000014246F578 (rec=000000000011E720, frame=000000000011FF40 context=000000000011DC70, dispatch=000000000011DB40)
  2571. 1051.027:0180:0184:trace:seh:call_handler handler at 000000014246F578 returned 1
  2572. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000007B62C9E9 rsp 000000000011FF80
  2573. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 2c9e0-2c9f2
  2574. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 000000007B63D4F0 flags 0 prolog 0x4 bytes function 000000007B62C9E0-000000007B62C9F2
  2575. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  2576. 1051.027:0180:0184:trace:unwind:RtlVirtualUnwind type 1 rip 000000017005F5B7 rsp 000000000011FFB0
  2577. 1051.027:0180:0184:trace:unwind:dump_unwind_info **** func 5f5a0-5f5b8
  2578. 1051.027:0180:0184:trace:unwind:dump_unwind_info unwind info at 0000000170085C90 flags 1 prolog 0x4 bytes function 000000017005F5A0-000000017005F5B8
  2579. 1051.027:0180:0184:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp
  2580. 1051.027:0180:0184:trace:unwind:dump_unwind_info handler 000000017005FC20 data at 0000000170085C9C
  2581. 1051.027:0180:0184:trace:seh:call_handler calling handler 000000017005FC20 (rec=000000000011E720, frame=000000000011FFB0 context=000000000011DC70, dispatch=000000000011DB40)
  2582. wine: Unhandled page fault on read access to 0000000000000000 at address 0000000141DF399B (thread 0184), starting debugger...
  2583. 1051.040:0180:0184:trace:seh:start_debugger Starting debugger L"winedbg --auto 384 4128"
  2584. 1051.054:0214:0218:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  2585. 1051.054:0214:0218:trace:seh:install_bpf Seccomp filters already installed.
  2586. 1051.054:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedbg.exe" at 0000000140000000: builtin
  2587. 1051.055:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  2588. 1051.055:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  2589. 1051.056:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
  2590. 1051.056:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
  2591. 1051.056:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
  2592. 1051.057:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
  2593. 1051.057:0214:0218:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 00000003BE590000: builtin
  2594. 1051.126:0180:0184:trace:seh:call_handler handler at 000000017005FC20 returned 1
  2595. Unhandled exception: page fault on read access to 0x0000000000000000 in 64-bit code (0x0000000141df399b).
  2596. Register dump:
  2597. rip:0000000141df399b rsp:000000000011e950 rbp:000000000011ea50 eflags:00010246 ( R- -- I Z- -P- )
  2598. rax:0000000000000000 rbx:00007ffefe025340 rcx:0000000000000000 rdx:0000000140000000
  2599. rsi:00007ffefe025408 rdi:00007ffefe025330 r8:000000000011eb70 r9:0000000000000008 r10:0000000144498d00
  2600. r11:00007ffefe025818 r12:0000000000000000 r13:0000000000000000 r14:00007ffefe025588 r15:0000000000000000
  2601. Stack dump:
  2602. 0x000000000011e950: 0000000000000000 0000000000000000
  2603. 0x000000000011e960: 0000000000000000 0000000000000000
  2604. 0x000000000011e970: 0000000000000000 0000000000000000
  2605. 0x000000000011e980: 0000000000000000 0000000000000000
  2606. 0x000000000011e990: 0000000000000000 0000000000000000
  2607. 0x000000000011e9a0: 0000000000000000 0000000000000000
  2608. 0x000000000011e9b0: 0000000000000000 0000000000000000
  2609. 0x000000000011e9c0: 0000000000000000 0000000000000000
  2610. 0x000000000011e9d0: 0000000000000000 0000000000000000
  2611. 0x000000000011e9e0: 0000000000000000 0000000000000000
  2612. 0x000000000011e9f0: 0000000000000000 0000000000000000
  2613. 0x000000000011ea00: 0000000000000000 0000000000000000
  2614. Backtrace:
  2615. =>0 0x0000000141df399b ??0BufferedFile@Scaleform@@IEAA@XZ+0xc531ab() in eldenring (0x000000000011ea50)
  2616. 1 0x0000000141a4967b ??0BufferedFile@Scaleform@@IEAA@XZ+0x8a8e8b() in eldenring (0x000000000011ece0)
  2617. 2 0x000000014194deb1 ??0BufferedFile@Scaleform@@IEAA@XZ+0x7ad6c1() in eldenring (0x000000000011ef48)
  2618. 3 0x0000000141a3ec38 ??0BufferedFile@Scaleform@@IEAA@XZ+0x89e448() in eldenring (0x000000000011ef48)
  2619. 4 0x0000000141a3e5b9 ??0BufferedFile@Scaleform@@IEAA@XZ+0x89ddc9() in eldenring (0x000000000011ef48)
  2620. 5 0x0000000141a3e731 ??0BufferedFile@Scaleform@@IEAA@XZ+0x89df41() in eldenring (0x000000000011f080)
  2621. 6 0x000000014194758b ??0BufferedFile@Scaleform@@IEAA@XZ+0x7a6d9b() in eldenring (0x000000000011f080)
  2622. 7 0x0000000140aa0e9a ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0x8e926a() in eldenring (0x000000000011f490)
  2623. 8 0x0000000140aa49bd ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0x8ecd8d() in eldenring (0x00007fff9e03fda0)
  2624. 9 0x0000000140aa3767 ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0x8ebb37() in eldenring (0x00000001431af630)
  2625. 10 0x0000000142628f95 EntryPoint+0x1dae35() in eldenring (0x000000000011fcf0)
  2626. 11 0x0000000142629290 EntryPoint+0x1db130() in eldenring (0x000000000011fcf0)
  2627. 12 0x00000001425e0322 EntryPoint+0x1921c2() in eldenring (0x0000000000000060)
  2628. 13 0x00000001425a8dde EntryPoint+0x15ac7e() in eldenring (0x00000001428fddb0)
  2629. 14 0x0000000140e1cf14 ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0xc652e4() in eldenring (0x00000001428fddb0)
  2630. 15 0x0000000140d5c784 ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0xba4b54() in eldenring (0x00000001428fddb0)
  2631. 16 0x0000000140c15145 ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0xa5d515() in eldenring (0x0000000000000000)
  2632. 17 0x0000000140c154ce ??0System@Scaleform@@QEAA@AEBUHeapDesc@MemoryHeap@1@PEAVSysAllocBase@1@@Z+0xa5d89e() in eldenring (0x0000000000000000)
  2633. 18 0x000000014244e10b ??0BufferedFile@Scaleform@@IEAA@XZ+0x12ad91b() in eldenring (0x0000000000000000)
  2634. 19 0x000000007b62c9e9 ActivateActCtx+0x20da5() in kernel32 (0x0000000000000000)
  2635. 20 0x000000017005f5b7 A_SHAFinal+0x3ca37() in ntdll (0x0000000000000000)
  2636. 0x0000000141df399b eldenring+0x1df399b: movq (%rcx),%rax
  2637. Modules:
  2638. Module Address Debug info Name (78 modules)
  2639. PE 0000000000180000-00000000001a0000 Deferred amd_ags_x64
  2640. PE 0000000000c70000-0000000000d7e000 Deferred oo2core_6_win64
  2641. PE 0000000002490000-000000000266d000 Deferred gameoverlayrenderer64
  2642. PE 0000000006d00000-0000000008337000 Deferred eossdk-win64-shipping
  2643. PE 0000000008340000-00000000083d2000 Deferred msvcp140
  2644. PE 00000000083e0000-00000000083f9000 Deferred vcruntime140
  2645. PE 000000007b000000-000000007b0d9000 Deferred kernelbase
  2646. PE 000000007b600000-000000007b812000 Export kernel32
  2647. PE 0000000138000000-0000000139533000 Deferred steamclient64
  2648. PE 000000013b400000-000000013b444000 Deferred steam_api64
  2649. PE 0000000140000000-00000001458d5800 Export eldenring
  2650. PE 0000000170000000-00000001700a1000 Export ntdll
  2651. PE 0000000180000000-0000000180069000 Deferred bink2w64
  2652. PE 00000001c69e0000-00000001c72fc000 Deferred shell32
  2653. PE 00000001c8b40000-00000001c8b60000 Deferred msacm32
  2654. PE 00000001c8db0000-00000001c8e47000 Deferred msvcrt
  2655. PE 00000001cd860000-00000001cd868000 Deferred api-ms-win-crt-utility-l1-1-0
  2656. PE 00000001d97a0000-00000001d97a7000 Deferred api-ms-win-core-fibers-l1-1-1
  2657. PE 00000001dd3f0000-00000001dd4bd000 Deferred crypt32
  2658. PE 00000001e7610000-00000001e7617000 Deferred normaliz
  2659. PE 00000001ec2b0000-00000001ec2d6000 Deferred ws2_32
  2660. PE 00000001f51e0000-00000001f51f0000 Deferred hid
  2661. PE 00000001fdfd0000-00000001fdff8000 Deferred wintrust
  2662. PE 0000000201cf0000-0000000201d0f000 Deferred secur32
  2663. PE 0000000205950000-0000000205958000 Deferred api-ms-win-appmodel-runtime-l1-1-2
  2664. PE 000000021a7e0000-000000021a855000 Deferred setupapi
  2665. PE 0000000226310000-0000000226317000 Deferred api-ms-win-core-string-l1-1-0
  2666. PE 0000000231ae0000-0000000231b62000 Deferred rpcrt4
  2667. PE 000000023d820000-000000023da6e000 Deferred user32
  2668. PE 0000000240030000-000000024005d000 Deferred iphlpapi
  2669. PE 0000000241850000-0000000241857000 Deferred api-ms-win-crt-environment-l1-1-0
  2670. PE 0000000262250000-0000000262259000 Deferred api-ms-win-crt-runtime-l1-1-0
  2671. PE 000000026b4c0000-000000026b53a000 Deferred gdi32
  2672. PE 00000002739c0000-0000000273af7000 Deferred oleaut32
  2673. PE 0000000274a50000-0000000274a5d000 Deferred kerberos
  2674. PE 000000028ba60000-000000028ba67000 Deferred api-ms-win-crt-time-l1-1-0
  2675. PE 000000028dfa0000-000000028dfac000 Deferred nsi
  2676. PE 000000028ebe0000-000000028ebe8000 Deferred api-ms-win-core-sysinfo-l1-2-1
  2677. PE 000000029cfc0000-000000029cfd6000 Deferred dnsapi
  2678. PE 000000029ea80000-000000029ea87000 Deferred api-ms-win-core-datetime-l1-1-1
  2679. PE 00000002bb750000-00000002bb894000 Deferred comctl32
  2680. PE 00000002d4d40000-00000002d4d57000 Deferred bcrypt
  2681. PE 00000002de970000-00000002de9a2000 Deferred rsaenh
  2682. PE 00000002e3540000-00000002e3591000 Deferred shlwapi
  2683. PE 00000002e8f10000-00000002e902a000 Deferred ole32
  2684. PE 00000002edf00000-00000002ee0f0000 Deferred dxgi
  2685. PE 00000002f1fa0000-00000002f1fae000 Deferred version
  2686. PE 00000002f7f20000-00000002f7f2c000 Deferred vcruntime140_1
  2687. PE 00000002fa030000-00000002fa037000 Deferred api-ms-win-core-localization-obsolete-l1-2-0
  2688. PE 0000000308050000-000000030809b000 Deferred dinput8
  2689. PE 000000030a2c0000-000000030a2c9000 Deferred api-ms-win-crt-stdio-l1-1-0
  2690. PE 000000030c980000-000000030c988000 Deferred api-ms-win-core-synch-l1-2-0
  2691. PE 00000003126f0000-0000000312709000 Deferred shcore
  2692. PE 0000000327020000-0000000327073000 Deferred combase
  2693. PE 000000032a700000-000000032a72a000 Deferred sechost
  2694. PE 0000000330260000-00000003302a0000 Deferred advapi32
  2695. PE 000000033ea00000-000000033ea09000 Deferred api-ms-win-crt-string-l1-1-0
  2696. PE 0000000344840000-0000000344848000 Deferred api-ms-win-crt-filesystem-l1-1-0
  2697. PE 0000000346ba0000-0000000346bc1000 Deferred jsproxy
  2698. PE 0000000350a30000-0000000350a39000 Deferred api-ms-win-crt-convert-l1-1-0
  2699. PE 0000000351680000-0000000351688000 Deferred api-ms-win-core-localization-l1-2-1
  2700. PE 0000000355100000-0000000355107000 Deferred api-ms-win-crt-locale-l1-1-0
  2701. PE 0000000358120000-0000000358166000 Deferred winhttp
  2702. PE 000000035e4e0000-000000035e74a000 Deferred d3d12
  2703. PE 0000000360a80000-0000000360a8a000 Deferred api-ms-win-crt-math-l1-1-0
  2704. PE 00000003738e0000-00000003738e8000 Deferred api-ms-win-crt-conio-l1-1-0
  2705. PE 0000000375610000-0000000375648000 Deferred win32u
  2706. PE 00000003785e0000-00000003785ed000 Deferred vulkan-1
  2707. PE 000000038b5a0000-000000038b5f2000 Deferred wldap32
  2708. PE 000000039b510000-000000039b518000 Deferred api-ms-win-crt-heap-l1-1-0
  2709. PE 00000003a93b0000-00000003a93c3000 Deferred xinput1_4
  2710. PE 00000003af670000-00000003af730000 Deferred ucrtbase
  2711. PE 00000003afd00000-00000003afd1a000 Deferred imm32
  2712. PE 00000003b6dc0000-00000003b6de5000 Deferred winevulkan
  2713. PE 00000003b8f00000-00000003b8fc1000 Deferred winmm
  2714. PE 00007fdc772a0000-00007fdc772a3000 Deferred lsteamclient
  2715. PE 00007fdc7c0a0000-00007fdc7c0a3000 Deferred wineopenxr
  2716. PE 00007fdc7c690000-00007fdc7c694000 Deferred winex11
  2717. Threads:
  2718. process tid prio (all id:s are in hex)
  2719. 00000020 steam.exe
  2720. 00000024 0
  2721. 000000c0 0
  2722. 0000013c 0
  2723. 00000030 services.exe
  2724. 00000034 0
  2725. 00000038 0
  2726. 00000044 0
  2727. 00000048 0
  2728. 00000054 0
  2729. 00000068 0
  2730. 00000074 0
  2731. 00000098 0
  2732. 000000b0 0
  2733. 000000f4 0
  2734. 000000f8 0
  2735. 000000fc 0
  2736. 0000003c winedevice.exe
  2737. 00000040 0
  2738. 0000004c 0
  2739. 00000050 0
  2740. 00000058 0
  2741. 0000005c 0
  2742. 000000bc 0
  2743. 00000060 winedevice.exe
  2744. 00000064 0
  2745. 0000006c 0
  2746. 00000070 0
  2747. 00000078 0
  2748. 0000007c 0
  2749. 00000080 0
  2750. 00000084 0
  2751. 0000008c 0
  2752. 00000090 plugplay.exe
  2753. 00000094 0
  2754. 0000009c 0
  2755. 000000a0 0
  2756. 000000a4 0
  2757. 000000a8 svchost.exe
  2758. 000000ac 0
  2759. 000000b4 0
  2760. 000000b8 0
  2761. 000000c4 explorer.exe
  2762. 000000c8 0
  2763. 000000d8 0
  2764. 000000ec 0
  2765. 000000e4 rpcss.exe
  2766. 000000e8 0
  2767. 00000100 0
  2768. 00000104 0
  2769. 00000108 0
  2770. 0000010c 0
  2771. 00000114 0
  2772. 00000120 0
  2773. 00000124 tabtip.exe
  2774. 00000128 0
  2775. 00000130 0
  2776. 00000140 0
  2777. 00000180 (D) Z:\home\cujo\.steam\debian-installation\steamapps\common\ELDEN RING\Game\eldenring.exe
  2778. 00000184 1 <==
  2779. 0000018c 0
  2780. 00000190 0
  2781. 00000194 1
  2782. 00000198 1
  2783. 0000019c 1
  2784. 000001a0 1
  2785. 000001a4 1
  2786. 000001a8 1
  2787. 000001ac -15
  2788. 000001b0 1
  2789. 000001b4 1
  2790. 000001b8 -2
  2791. 000001bc 0
  2792. 000001c0 0
  2793. 000001c4 0
  2794. 000001c8 1
  2795. 000001cc 1
  2796. 000001d0 1
  2797. 000001d4 1
  2798. 000001d8 1
  2799. 000001dc 1
  2800. 000001e0 1
  2801. 000001e4 1
  2802. 000001e8 -1
  2803. 000001ec -1
  2804. 000001f0 -1
  2805. 000001f4 -1
  2806. 000001f8 -1
  2807. 000001fc -1
  2808. 00000200 -1
  2809. 00000204 -1
  2810. 00000208 -1
  2811. 0000020c -1
  2812. 00000210 -1
  2813. System information:
  2814. Wine build: wine-7.0
  2815. Platform: x86_64
  2816. Version: Windows 10
  2817. Host system: Linux
  2818. Host version: 5.10.0-15-amd64
  2819. pid 15852 != 15851, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement