Advertisement
Guest User

gtasalog

a guest
Apr 1st, 2021
280
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 202.88 KB | None | 0 0
  1. ======================
  2. Proton: 1612904805 proton-5.13-6
  3. SteamGameId: 12120
  4. Command: ['/media/Games/Steam/steamapps/common/Grand Theft Auto San Andreas/gta-sa.exe']
  5. Options: {'forcelgadd'}
  6. SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
  7. pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
  8. soldier: 0.20210309.0 soldier 0.20210309.0
  9. ======================
  10. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  11. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  12. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  13. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  14. esync: up and running.
  15. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  16. 32370.399:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  17. 32370.399:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  18. 32370.400:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  19. 32370.400:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  20. 32370.400:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  21. 32370.402:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB0F91F0000: builtin
  22. 32370.402:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  23. 32370.402:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB0F9410000: builtin
  24. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  25. 32370.532:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  26. 32370.534:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  27. 32370.534:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  28. 32370.534:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  29. 32370.534:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 32370.538:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F057F2B0000: builtin
  31. 32370.538:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  32. 32370.538:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F057F4C0000: builtin
  33. 32370.539:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  34. 32370.540:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  35. 32370.540:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  36. 32370.541:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  37. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  38. 32370.579:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  39. 32370.580:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  40. 32370.580:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  41. 32370.580:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  42. 32370.580:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  43. 32370.582:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FB53AD10000: builtin
  44. 32370.582:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  45. 32370.582:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FB53AF20000: builtin
  46. 32370.582:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  47. 32370.583:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  48. 32370.583:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  49. 32370.584:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB53A8B0000: builtin
  50. 32370.584:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB53AA70000: builtin
  51. 32371.044:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  52. 32371.044:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  53. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  54. 32371.076:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  55. 32371.077:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  56. 32371.078:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  57. 32371.078:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  58. 32371.078:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  59. 32371.081:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F3B71820000: builtin
  60. 32371.081:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  61. 32371.081:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F3B71A40000: builtin
  62. 32371.083:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F3B71730000: builtin
  63. 32371.083:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  64. 32371.099:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  65. 32371.116:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  66. 32371.121:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F3B716C0000: builtin
  67. 32371.122:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  68. 32371.122:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  69. 32371.125:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  70. 32371.131:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  71. 32371.132:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  72. 32371.133:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  73. 32371.135:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F3B71260000: builtin
  74. 32371.135:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F3B71410000: builtin
  75. 32371.188:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  76. 32371.188:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  77. 32371.189:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  78. 32371.224:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F3B636E0000: builtin
  79. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
  80. 32371.256:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  81. 32371.258:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  82. 32371.258:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  83. 32371.258:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  84. 32371.258:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
  85. 32371.262:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FF7D97A0000: builtin
  86. 32371.262:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  87. 32371.262:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FF7D99C0000: builtin
  88. 32371.263:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FF7D96B0000: builtin
  89. 32371.263:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  90. 32371.278:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  91. 32371.282:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  92. 32371.286:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FF7D9650000: builtin
  93. 32371.296:0088:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  94. 32371.296:0088:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  95. 32371.296:0088:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FF7D8F90000: builtin
  96. 32371.296:0088:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FF7D9150000: builtin
  97. 32371.373:0088:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  98. 32371.373:0088:009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  99. 32371.377:0088:0098:trace:seh:NtQueryInformationThread (0x80,0,0xe8f750,30,(nil))
  100. 32371.387:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FB0F85D0000: builtin
  101. 32371.389:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  102. 32371.392:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  103. 32371.393:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  104. 32371.393:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FB0F8340000: builtin
  105. 32371.393:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  106. 32371.393:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  107. 32371.393:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  108. 32371.393:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FB0F8780000: builtin
  109. 32371.495:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  110. 32371.500:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  111. 32371.501:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  112. 32371.501:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  113. 32371.503:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7ED70000: builtin
  114. 32371.507:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E830000: builtin
  115. 32371.507:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  116. 32371.507:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7ECC0000: builtin
  117. 32371.508:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E6C0000: builtin
  118. 32371.509:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  119. 32371.513:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  120. 32371.513:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  121. 32371.513:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E490000: builtin
  122. 32371.513:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  123. 32371.520:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  124. 32371.520:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  125. 32371.521:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DA80000: builtin
  126. 32371.808:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  127. 32371.814:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  128. 32371.815:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  129. 32371.815:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  130. 32371.815:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  131. 32371.815:00a4:00a8:trace:seh:check_bpf_jit_enable enabled 0x31.
  132. 32371.817:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F2769D30000: builtin
  133. 32371.817:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  134. 32371.817:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F2769F50000: builtin
  135. 32371.817:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F2769B70000: builtin
  136. 32371.817:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  137. 32371.819:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  138. 32371.819:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  139. 32371.819:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F27698E0000: builtin
  140. Setting breakpad minidump AppID = 12120
  141. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198256766411 [API loaded no]
  142. 32371.880:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  143. 32371.880:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  144. 32371.884:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F27695A0000: builtin
  145. 32371.986:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  146. 32371.987:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  147. 32371.987:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  148. 32371.987:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  149. 32371.987:00b0:00b4:trace:seh:check_bpf_jit_enable enabled 0x31.
  150. 32371.990:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F9B1F8B0000: builtin
  151. 32371.990:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  152. 32371.990:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F9B1FAD0000: builtin
  153. 32371.990:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  154. 32371.990:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F9B1F6F0000: builtin
  155. 32371.990:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  156. 32371.990:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F2767680000: builtin
  157. 32371.990:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  158. 32371.993:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  159. 32371.993:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  160. 32371.993:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F9B1F460000: builtin
  161. 32371.994:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  162. 32371.994:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000CA0000: builtin
  163. 32371.996:0020:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5E60000: builtin
  164. 32372.051:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  165. 32372.051:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  166. 32372.055:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F9B1F120000: builtin
  167. 32372.070:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  168. 32372.070:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  169. 32372.071:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F9B1DD00000: builtin
  170. 32372.074:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  171. 32372.074:00b0:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000A90000: builtin
  172. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  173. 32372.117:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  174. 32372.118:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  175. 32372.118:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  176. 32372.193:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\gta-sa.exe" at 00400000: native
  177. 32372.200:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9F0000: builtin
  178. 32372.200:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  179. 32372.200:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAE0000: builtin
  180. 32372.206:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  181. 32372.207:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  182. 32372.207:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  183. 32372.209:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E540000: builtin
  184. 32372.209:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E6A0000: builtin
  185. 32372.209:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 66640000: builtin
  186. 32372.210:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  187. 32372.211:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 639C0000: builtin
  188. 32372.220:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\vorbisfile.dll" at 10000000: native
  189. 32372.224:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 7E990000: builtin
  190. 32372.236:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\EAX.DLL" at 00220000: native
  191. 32372.340:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  192. 32372.365:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\ogg.dll" at 00380000: native
  193. 32372.392:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\vorbis.dll" at 01F00000: native
  194. 32372.392:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\vorbishooked.dll" at 00360000: native
  195. 32372.442:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCRT.dll" at F5F40000: builtin
  196. 32372.442:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\BASS.dll" at 11000000: native
  197. 32372.442:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo.asi" at 02640000: native
  198. 32372.447:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 6E540000: builtin
  199. 32372.447:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 6BA80000: builtin
  200. 32372.447:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 6E8C0000: builtin
  201. 32372.449:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-string-l1-1-0.dll" at 66980000: builtin
  202. 32372.450:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-datetime-l1-1-1.dll" at 66800000: builtin
  203. 32372.451:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-obsolete-l1-2-0.dll" at 61540000: builtin
  204. 32372.461:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.073 Log started."
  205. 32372.461:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  206. 32372.461:00c8:00cc:trace:seh:dispatch_exception info[0]=00000025
  207. 32372.461:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  208. 32372.461:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=026905f8 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  209. 32372.461:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=0023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  210. 32372.461:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  211. 32372.461:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  212. 32372.461:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  213. 32372.461:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  214. 32372.461:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  215. 32372.461:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  216. 32372.461:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  217. 32372.461:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  218. 32372.462:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  219. 32372.462:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  220. 32372.462:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  221. 32372.462:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  222. 32372.462:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=02687784 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  223. 32372.462:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=1770023 ds=002b es=177002b fs=dd9b0063 gs=006b flags=00200213
  224. 32372.462:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  225. 32372.462:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  226. 32372.462:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  227. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  228. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  229. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  230. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  231. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  232. 32372.462:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.073 Unprotecting memory region '.text': 0x00001000 (size: 0x00456000)"
  233. 32372.462:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  234. 32372.462:00c8:00cc:trace:seh:dispatch_exception info[0]=0000005a
  235. 32372.462:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  236. 32372.462:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=026905f8 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  237. 32372.462:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=1770023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  238. 32372.462:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  239. 32372.462:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  240. 32372.462:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  241. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  242. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  243. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  244. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  245. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  246. 32372.462:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  247. 32372.462:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  248. 32372.462:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  249. 32372.462:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  250. 32372.462:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=02687784 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  251. 32372.462:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=1770023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  252. 32372.462:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  253. 32372.462:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  254. 32372.462:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  255. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  256. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  257. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  258. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  259. 32372.462:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  260. 32372.463:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.074 Unprotecting memory region '.rdata': 0x00458000 (size: 0x0004C000)"
  261. 32372.463:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  262. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[0]=0000005b
  263. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  264. 32372.463:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=026905f8 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  265. 32372.463:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=1770023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  266. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  267. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  268. 32372.463:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  269. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  270. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  271. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  272. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  273. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  274. 32372.463:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  275. 32372.463:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  276. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  277. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  278. 32372.463:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=02687784 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  279. 32372.463:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=1770023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  280. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  281. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  282. 32372.463:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  283. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  284. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  285. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  286. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  287. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  288. 32372.463:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.074 Unprotecting memory region '.text': 0x008B1000 (size: 0x0064A000)"
  289. 32372.463:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  290. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[0]=0000005a
  291. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  292. 32372.463:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=026905f8 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  293. 32372.463:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=1770023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  294. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  295. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  296. 32372.463:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  297. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  298. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  299. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  300. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  301. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  302. 32372.463:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  303. 32372.463:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  304. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  305. 32372.463:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  306. 32372.463:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=02687784 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  307. 32372.463:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=1770023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  308. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  309. 32372.463:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  310. 32372.463:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  311. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  312. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  313. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  314. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  315. 32372.463:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  316. 32372.475:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.086 Unloading plugins..."
  317. 32372.475:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  318. 32372.475:00c8:00cc:trace:seh:dispatch_exception info[0]=0000002d
  319. 32372.475:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  320. 32372.475:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=026905f8 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  321. 32372.475:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  322. 32372.475:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  323. 32372.475:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  324. 32372.475:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  325. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  326. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  327. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  328. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  329. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  330. 32372.475:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  331. 32372.475:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  332. 32372.475:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  333. 32372.475:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  334. 32372.475:00c8:00cc:trace:seh:dispatch_exception eax=0177eeb0 ebx=02687784 ecx=00000000 edx=0177eec4 esi=0177ef38 edi=0177eec8
  335. 32372.475:00c8:00cc:trace:seh:dispatch_exception ebp=0177ef08 esp=0177eea4 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  336. 32372.475:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  337. 32372.475:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  338. 32372.475:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  339. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  340. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177ef3c esi=0177eeb0 edi=0177ef3c
  341. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e9f8 esp=0177e9f0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  342. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  343. 32372.475:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  344. 32372.476:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.087 Loading plugin cleo/FileSystemOperations.cleo"
  345. 32372.476:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  346. 32372.476:00c8:00cc:trace:seh:dispatch_exception info[0]=00000046
  347. 32372.476:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  348. 32372.476:00c8:00cc:trace:seh:dispatch_exception eax=0177eaf0 ebx=026905f8 ecx=00000000 edx=0177eb04 esi=0177eb78 edi=0177eb08
  349. 32372.476:00c8:00cc:trace:seh:dispatch_exception ebp=0177eb48 esp=0177eae4 cs=0023 ds=177002b es=268002b fs=0063 gs=177006b flags=00200213
  350. 32372.476:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  351. 32372.476:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  352. 32372.476:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  353. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  354. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177eb7c esi=0177eaf0 edi=0177eb7c
  355. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e638 esp=0177e630 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  356. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  357. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  358. 32372.476:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  359. 32372.476:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  360. 32372.476:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  361. 32372.476:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  362. 32372.476:00c8:00cc:trace:seh:dispatch_exception eax=0177eaf0 ebx=02687784 ecx=00000000 edx=0177eb04 esi=0177eb78 edi=0177eb08
  363. 32372.476:00c8:00cc:trace:seh:dispatch_exception ebp=0177eb48 esp=0177eae4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  364. 32372.476:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  365. 32372.476:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  366. 32372.476:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  367. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  368. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177eb7c esi=0177eaf0 edi=0177eb7c
  369. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e638 esp=0177e630 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  370. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  371. 32372.476:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  372. 32372.492:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo\\FileSystemOperations.cleo" at 00390000: native
  373. 32372.492:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.104 Loading plugin cleo/IniFiles.cleo"
  374. 32372.492:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  375. 32372.492:00c8:00cc:trace:seh:dispatch_exception info[0]=0000003a
  376. 32372.492:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  377. 32372.492:00c8:00cc:trace:seh:dispatch_exception eax=0177eaf0 ebx=026905f8 ecx=00000000 edx=0177eb04 esi=0177eb78 edi=0177eb08
  378. 32372.492:00c8:00cc:trace:seh:dispatch_exception ebp=0177eb48 esp=0177eae4 cs=0023 ds=177002b es=268002b fs=0063 gs=177006b flags=00200213
  379. 32372.492:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  380. 32372.492:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  381. 32372.492:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  382. 32372.492:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  383. 32372.492:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177eb7c esi=0177eaf0 edi=0177eb7c
  384. 32372.492:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e638 esp=0177e630 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  385. 32372.492:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  386. 32372.492:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  387. 32372.493:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  388. 32372.493:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  389. 32372.493:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  390. 32372.493:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  391. 32372.493:00c8:00cc:trace:seh:dispatch_exception eax=0177eaf0 ebx=02687784 ecx=00000000 edx=0177eb04 esi=0177eb78 edi=0177eb08
  392. 32372.493:00c8:00cc:trace:seh:dispatch_exception ebp=0177eb48 esp=0177eae4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  393. 32372.493:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  394. 32372.493:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  395. 32372.493:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  396. 32372.493:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  397. 32372.493:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177eb7c esi=0177eaf0 edi=0177eb7c
  398. 32372.493:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e638 esp=0177e630 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  399. 32372.493:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  400. 32372.493:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  401. 32372.499:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo\\IniFiles.cleo" at 003B0000: native
  402. 32372.499:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.111 Loading plugin cleo/IntOperations.cleo"
  403. 32372.499:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  404. 32372.499:00c8:00cc:trace:seh:dispatch_exception info[0]=0000003f
  405. 32372.499:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  406. 32372.499:00c8:00cc:trace:seh:dispatch_exception eax=0177eaf0 ebx=026905f8 ecx=00000000 edx=0177eb04 esi=0177eb78 edi=0177eb08
  407. 32372.499:00c8:00cc:trace:seh:dispatch_exception ebp=0177eb48 esp=0177eae4 cs=0023 ds=177002b es=268002b fs=0063 gs=177006b flags=00200213
  408. 32372.499:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  409. 32372.499:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  410. 32372.499:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  411. 32372.499:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  412. 32372.499:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177eb7c esi=0177eaf0 edi=0177eb7c
  413. 32372.499:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e638 esp=0177e630 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  414. 32372.499:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  415. 32372.499:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  416. 32372.500:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  417. 32372.500:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  418. 32372.500:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  419. 32372.500:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  420. 32372.500:00c8:00cc:trace:seh:dispatch_exception eax=0177eaf0 ebx=02687784 ecx=00000000 edx=0177eb04 esi=0177eb78 edi=0177eb08
  421. 32372.500:00c8:00cc:trace:seh:dispatch_exception ebp=0177eb48 esp=0177eae4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  422. 32372.500:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  423. 32372.500:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  424. 32372.500:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  425. 32372.500:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  426. 32372.500:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177eb7c esi=0177eaf0 edi=0177eb7c
  427. 32372.500:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e638 esp=0177e630 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  428. 32372.500:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  429. 32372.500:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  430. 32372.511:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo\\IntOperations.cleo" at 003D0000: native
  431. 32372.511:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.122 Started on game of version: SA 1.0 us"
  432. 32372.511:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  433. 32372.511:00c8:00cc:trace:seh:dispatch_exception info[0]=0000003e
  434. 32372.511:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  435. 32372.511:00c8:00cc:trace:seh:dispatch_exception eax=0177f010 ebx=026905f8 ecx=00000000 edx=0177f024 esi=0177f098 edi=0177f028
  436. 32372.511:00c8:00cc:trace:seh:dispatch_exception ebp=0177f068 esp=0177f004 cs=0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  437. 32372.511:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  438. 32372.511:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  439. 32372.511:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  440. 32372.511:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  441. 32372.511:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f09c esi=0177f010 edi=0177f09c
  442. 32372.511:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb58 esp=0177eb50 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  443. 32372.511:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  444. 32372.511:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  445. 32372.512:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  446. 32372.512:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  447. 32372.512:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  448. 32372.512:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  449. 32372.512:00c8:00cc:trace:seh:dispatch_exception eax=0177f010 ebx=02687784 ecx=00000000 edx=0177f024 esi=0177f098 edi=0177f028
  450. 32372.512:00c8:00cc:trace:seh:dispatch_exception ebp=0177f068 esp=0177f004 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  451. 32372.512:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  452. 32372.512:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  453. 32372.512:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  454. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  455. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f09c esi=0177f010 edi=0177f09c
  456. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb58 esp=0177eb50 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  457. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  458. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  459. 32372.512:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.123 Injecting MenuStatusNotifier..."
  460. 32372.512:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  461. 32372.512:00c8:00cc:trace:seh:dispatch_exception info[0]=00000038
  462. 32372.512:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  463. 32372.512:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  464. 32372.512:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=177002b es=268002b fs=0063 gs=177006b flags=00200213
  465. 32372.512:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  466. 32372.512:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  467. 32372.512:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  468. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  469. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  470. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  471. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  472. 32372.512:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  473. 32372.513:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  474. 32372.513:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  475. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  476. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  477. 32372.513:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  478. 32372.513:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  479. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  480. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  481. 32372.513:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  482. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  483. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  484. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  485. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  486. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  487. 32372.513:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.124 Replacing call: 0x0057B9FD"
  488. 32372.513:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  489. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  490. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  491. 32372.513:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  492. 32372.513:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  493. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  494. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  495. 32372.513:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  496. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  497. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  498. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  499. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  500. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  501. 32372.513:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  502. 32372.513:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  503. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  504. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  505. 32372.513:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  506. 32372.513:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  507. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  508. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  509. 32372.513:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  510. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  511. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  512. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  513. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  514. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  515. 32372.513:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.125 Injecting DmaFix..."
  516. 32372.513:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  517. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[0]=0000002c
  518. 32372.513:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  519. 32372.513:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=026905f8 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  520. 32372.513:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=7ffd0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  521. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  522. 32372.513:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  523. 32372.513:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  524. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  525. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  526. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  527. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  528. 32372.513:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  529. 32372.514:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  530. 32372.514:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  531. 32372.514:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  532. 32372.514:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  533. 32372.514:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=02687784 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  534. 32372.514:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=7ffd0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  535. 32372.514:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  536. 32372.514:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  537. 32372.514:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  538. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  539. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  540. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  541. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  542. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  543. 32372.514:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.125 Replacing call: 0x0053E981"
  544. 32372.514:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  545. 32372.514:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  546. 32372.514:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  547. 32372.514:00c8:00cc:trace:seh:dispatch_exception eax=0177f010 ebx=026905f8 ecx=00000000 edx=0177f024 esi=0177f098 edi=0177f028
  548. 32372.514:00c8:00cc:trace:seh:dispatch_exception ebp=0177f068 esp=0177f004 cs=7ffd0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  549. 32372.514:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  550. 32372.514:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  551. 32372.514:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  552. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  553. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f09c esi=0177f010 edi=0177f09c
  554. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb58 esp=0177eb50 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  555. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  556. 32372.514:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  557. 32372.515:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  558. 32372.515:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  559. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  560. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  561. 32372.515:00c8:00cc:trace:seh:dispatch_exception eax=0177f010 ebx=02687784 ecx=00000000 edx=0177f024 esi=0177f098 edi=0177f028
  562. 32372.515:00c8:00cc:trace:seh:dispatch_exception ebp=0177f068 esp=0177f004 cs=7ffd0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  563. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  564. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  565. 32372.515:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  566. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  567. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f09c esi=0177f010 edi=0177f09c
  568. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb58 esp=0177eb50 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  569. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  570. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  571. 32372.515:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.126 Injecting TextManager..."
  572. 32372.515:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  573. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[0]=00000031
  574. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  575. 32372.515:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=026905f8 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  576. 32372.515:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  577. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  578. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  579. 32372.515:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  580. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  581. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  582. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  583. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  584. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  585. 32372.515:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  586. 32372.515:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  587. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  588. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  589. 32372.515:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=02687784 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  590. 32372.515:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  591. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  592. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  593. 32372.515:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  594. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  595. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  596. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  597. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  598. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  599. 32372.515:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.126 Injecting function at: 0x006A0050"
  600. 32372.515:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  601. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[0]=0000003a
  602. 32372.515:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  603. 32372.515:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  604. 32372.515:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=177002b es=268002b fs=190063 gs=177006b flags=00200213
  605. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  606. 32372.515:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  607. 32372.515:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  608. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  609. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  610. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  611. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  612. 32372.515:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  613. 32372.516:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  614. 32372.516:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  615. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  616. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  617. 32372.516:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  618. 32372.516:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=190063 gs=177006b flags=00200213
  619. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  620. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  621. 32372.516:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  622. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  623. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  624. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  625. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  626. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  627. 32372.516:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.127 Injecting SoundSystem..."
  628. 32372.516:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  629. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[0]=00000031
  630. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  631. 32372.516:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=026905f8 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  632. 32372.516:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=7ffd0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  633. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  634. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  635. 32372.516:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  636. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  637. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  638. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  639. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  640. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  641. 32372.516:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  642. 32372.516:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  643. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  644. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  645. 32372.516:00c8:00cc:trace:seh:dispatch_exception eax=0177f000 ebx=02687784 ecx=00000000 edx=0177f014 esi=0177f088 edi=0177f018
  646. 32372.516:00c8:00cc:trace:seh:dispatch_exception ebp=0177f058 esp=0177eff4 cs=7ffd0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  647. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  648. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  649. 32372.516:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  650. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  651. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f08c esi=0177f000 edi=0177f08c
  652. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb48 esp=0177eb40 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  653. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  654. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  655. 32372.516:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.127 Replacing call: 0x007487A8"
  656. 32372.516:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  657. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  658. 32372.516:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  659. 32372.516:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  660. 32372.516:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  661. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  662. 32372.516:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  663. 32372.516:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  664. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  665. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  666. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  667. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  668. 32372.516:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  669. 32372.517:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  670. 32372.517:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  671. 32372.517:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  672. 32372.517:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  673. 32372.517:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  674. 32372.517:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  675. 32372.517:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  676. 32372.517:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  677. 32372.517:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  678. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  679. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  680. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  681. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  682. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  683. 32372.517:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.128 Injecting CustomOpcodeSystem..."
  684. 32372.517:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  685. 32372.517:00c8:00cc:trace:seh:dispatch_exception info[0]=00000038
  686. 32372.517:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  687. 32372.517:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=026905f8 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  688. 32372.517:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  689. 32372.517:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  690. 32372.517:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  691. 32372.517:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  692. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  693. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  694. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  695. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  696. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  697. 32372.517:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  698. 32372.517:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  699. 32372.517:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  700. 32372.517:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  701. 32372.517:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=02687784 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  702. 32372.517:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  703. 32372.517:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  704. 32372.517:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  705. 32372.517:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  706. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  707. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  708. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  709. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  710. 32372.517:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  711. 32372.518:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.129 Injecting ScriptEngine..."
  712. 32372.518:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  713. 32372.518:00c8:00cc:trace:seh:dispatch_exception info[0]=00000032
  714. 32372.518:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  715. 32372.518:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  716. 32372.518:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=177002b es=268002b fs=0063 gs=177006b flags=00200213
  717. 32372.518:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  718. 32372.518:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  719. 32372.518:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  720. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  721. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  722. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  723. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  724. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  725. 32372.518:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  726. 32372.518:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  727. 32372.518:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  728. 32372.518:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  729. 32372.518:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  730. 32372.518:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  731. 32372.518:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  732. 32372.518:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  733. 32372.518:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  734. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  735. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  736. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  737. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  738. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  739. 32372.518:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.129 Replacing call: 0x0046A21B"
  740. 32372.518:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  741. 32372.518:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  742. 32372.518:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  743. 32372.518:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  744. 32372.518:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  745. 32372.518:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  746. 32372.518:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  747. 32372.518:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  748. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  749. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  750. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  751. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  752. 32372.518:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  753. 32372.519:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  754. 32372.519:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  755. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  756. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  757. 32372.519:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  758. 32372.519:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  759. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  760. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  761. 32372.519:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  762. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  763. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  764. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  765. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  766. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  767. 32372.519:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.130 Replacing call: 0x0058D552"
  768. 32372.519:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  769. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  770. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  771. 32372.519:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=026905f8 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  772. 32372.519:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  773. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  774. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  775. 32372.519:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  776. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  777. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  778. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  779. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  780. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  781. 32372.519:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  782. 32372.519:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  783. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  784. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  785. 32372.519:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=02687784 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  786. 32372.519:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  787. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  788. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  789. 32372.519:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  790. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  791. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  792. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  793. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  794. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  795. 32372.519:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.131 Replacing call: 0x0058FCE4"
  796. 32372.519:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  797. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  798. 32372.519:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  799. 32372.519:00c8:00cc:trace:seh:dispatch_exception eax=0177efd0 ebx=026905f8 ecx=00000000 edx=0177efe4 esi=0177f058 edi=0177efe8
  800. 32372.519:00c8:00cc:trace:seh:dispatch_exception ebp=0177f028 esp=0177efc4 cs=0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  801. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  802. 32372.519:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  803. 32372.519:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  804. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  805. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f05c esi=0177efd0 edi=0177f05c
  806. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb18 esp=0177eb10 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  807. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  808. 32372.519:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  809. 32372.520:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  810. 32372.520:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  811. 32372.520:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  812. 32372.520:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  813. 32372.520:00c8:00cc:trace:seh:dispatch_exception eax=0177efd0 ebx=02687784 ecx=00000000 edx=0177efe4 esi=0177f058 edi=0177efe8
  814. 32372.520:00c8:00cc:trace:seh:dispatch_exception ebp=0177f028 esp=0177efc4 cs=0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  815. 32372.520:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  816. 32372.520:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  817. 32372.520:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  818. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  819. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f05c esi=0177efd0 edi=0177f05c
  820. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb18 esp=0177eb10 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  821. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  822. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  823. 32372.520:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.131 Replacing call: 0x0053BDD7"
  824. 32372.520:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  825. 32372.520:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  826. 32372.520:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  827. 32372.520:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  828. 32372.520:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  829. 32372.520:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  830. 32372.520:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  831. 32372.520:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  832. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  833. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  834. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  835. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  836. 32372.520:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  837. 32372.521:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  838. 32372.521:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  839. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  840. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  841. 32372.521:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  842. 32372.521:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  843. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  844. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  845. 32372.521:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  846. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  847. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  848. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  849. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  850. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  851. 32372.521:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.132 Replacing call: 0x005BA340"
  852. 32372.521:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  853. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  854. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  855. 32372.521:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=026905f8 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  856. 32372.521:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=177002b es=268002b fs=190063 gs=177006b flags=00200213
  857. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  858. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  859. 32372.521:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  860. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  861. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  862. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  863. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  864. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  865. 32372.521:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  866. 32372.521:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  867. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  868. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  869. 32372.521:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=02687784 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  870. 32372.521:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=190063 gs=177006b flags=00200213
  871. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  872. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  873. 32372.521:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  874. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  875. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  876. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  877. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  878. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  879. 32372.521:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.132 Replacing call: 0x005D4FD7"
  880. 32372.521:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  881. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  882. 32372.521:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  883. 32372.521:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=026905f8 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  884. 32372.521:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  885. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  886. 32372.521:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  887. 32372.521:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  888. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  889. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  890. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  891. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  892. 32372.521:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  893. 32372.522:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  894. 32372.522:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  895. 32372.522:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  896. 32372.522:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  897. 32372.522:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=02687784 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  898. 32372.522:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  899. 32372.522:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  900. 32372.522:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  901. 32372.522:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  902. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  903. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  904. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  905. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  906. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  907. 32372.522:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.133 Replacing call: 0x005D18F0"
  908. 32372.522:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  909. 32372.522:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  910. 32372.522:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  911. 32372.522:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=026905f8 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  912. 32372.522:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=7ffd0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  913. 32372.522:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  914. 32372.522:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  915. 32372.522:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  916. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  917. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  918. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  919. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  920. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  921. 32372.522:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  922. 32372.522:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  923. 32372.522:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  924. 32372.522:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  925. 32372.522:00c8:00cc:trace:seh:dispatch_exception eax=0177eff0 ebx=02687784 ecx=00000000 edx=0177f004 esi=0177f078 edi=0177f008
  926. 32372.522:00c8:00cc:trace:seh:dispatch_exception ebp=0177f048 esp=0177efe4 cs=7ffd0023 ds=002b es=177002b fs=2680063 gs=19006b flags=00200213
  927. 32372.522:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  928. 32372.522:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  929. 32372.522:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  930. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  931. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f07c esi=0177eff0 edi=0177f07c
  932. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb38 esp=0177eb30 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  933. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  934. 32372.522:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  935. 32372.523:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.134 Replacing call: 0x005D14D5"
  936. 32372.523:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  937. 32372.523:00c8:00cc:trace:seh:dispatch_exception info[0]=00000033
  938. 32372.523:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  939. 32372.523:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=026905f8 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  940. 32372.523:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=177002b es=268002b fs=190063 gs=177006b flags=00200213
  941. 32372.523:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  942. 32372.523:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  943. 32372.523:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  944. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  945. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  946. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  947. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  948. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  949. 32372.523:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  950. 32372.523:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  951. 32372.523:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  952. 32372.523:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  953. 32372.523:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=02687784 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  954. 32372.523:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=190063 gs=177006b flags=00200213
  955. 32372.523:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  956. 32372.523:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  957. 32372.523:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  958. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  959. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  960. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  961. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  962. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  963. 32372.523:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:27.134 Injecting function at: 0x004667DB"
  964. 32372.523:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  965. 32372.523:00c8:00cc:trace:seh:dispatch_exception info[0]=0000003a
  966. 32372.523:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  967. 32372.523:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=026905f8 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  968. 32372.523:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=002b fs=0063 gs=177006b flags=00200213
  969. 32372.523:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  970. 32372.523:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  971. 32372.523:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  972. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  973. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  974. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  975. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  976. 32372.523:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  977. 32372.524:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  978. 32372.524:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  979. 32372.524:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  980. 32372.524:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  981. 32372.524:00c8:00cc:trace:seh:dispatch_exception eax=0177efe0 ebx=02687784 ecx=00000000 edx=0177eff4 esi=0177f068 edi=0177eff8
  982. 32372.524:00c8:00cc:trace:seh:dispatch_exception ebp=0177f038 esp=0177efd4 cs=0023 ds=002b es=177002b fs=0063 gs=177006b flags=00200213
  983. 32372.524:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  984. 32372.524:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  985. 32372.524:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  986. 32372.524:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  987. 32372.524:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f06c esi=0177efe0 edi=0177f06c
  988. 32372.524:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177eb28 esp=0177eb20 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  989. 32372.524:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  990. 32372.524:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  991. 32372.527:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 6A300000: builtin
  992. 32372.527:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\LanguageLoader.asi" at 027D0000: native
  993. 32372.528:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5E70000: builtin
  994. 32372.585:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\SilentPatchSA.asi" at 02910000: native
  995. 32372.606:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-sysinfo-l1-2-1.dll" at 65880000: builtin
  996. 32372.626:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCR100.dll" at F5D30000: builtin
  997. 32372.626:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\fix.black_roads.asi" at 02960000: native
  998. 32372.643:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\FramerateVigilante.SA.asi" at 02A80000: native
  999. 32372.661:00c8:00cc:trace:seh:dispatch_exception code=c0000005 flags=0 addr=7BC2F64A ip=7bc2f64a tid=00cc
  1000. 32372.661:00c8:00cc:trace:seh:dispatch_exception info[0]=00000000
  1001. 32372.661:00c8:00cc:trace:seh:dispatch_exception info[1]=00000000
  1002. 32372.661:00c8:00cc:trace:seh:dispatch_exception eax=00000000 ebx=0177f1f8 ecx=0177fec0 edx=00000000 esi=c0000135 edi=0177efc0
  1003. 32372.661:00c8:00cc:trace:seh:dispatch_exception ebp=0177ed4c esp=0177ecd4 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00210246
  1004. 32372.661:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=c0000005 flags=0
  1005. 32372.661:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1006. 32372.661:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7BC68D00 code=c0000005 flags=0
  1007. 32372.661:00c8:00cc:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
  1008. 32372.661:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177ec7c ecx=c0000005 edx=0177ecec esi=0177e9b0 edi=0177ecec
  1009. 32372.661:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e8a8 esp=0177e8a0 eip=7bc68bde cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1010. 32372.661:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=c0000005 flags=2
  1011. 32372.661:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1012. 32372.661:00c8:00cc:err:module:import_dll Loading library XINPUT1_3.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\GInputSA.asi") failed (error c000007b).
  1013. 32372.675:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\GTASA.WidescreenFix.asi" at 02B20000: native
  1014. 32372.733:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\III.VC.SA.LimitAdjuster.asi" at 02D90000: native
  1015. 32372.740:00c8:00cc:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
  1016. 32372.777:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\MixSets.asi" at 03040000: native
  1017. 32372.782:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\MobileHud.asi" at 030D0000: native
  1018. 32372.793:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 66400000: builtin
  1019. 32372.800:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  1020. 32372.800:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  1021. 32372.800:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at F5120000: builtin
  1022. 32372.800:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\modloader.asi" at 03130000: native
  1023. 32372.834:00c8:00cc:trace:seh:dispatch_exception code=c0000005 flags=0 addr=7BC2F64A ip=7bc2f64a tid=00cc
  1024. 32372.834:00c8:00cc:trace:seh:dispatch_exception info[0]=00000000
  1025. 32372.834:00c8:00cc:trace:seh:dispatch_exception info[1]=00000000
  1026. 32372.834:00c8:00cc:trace:seh:dispatch_exception eax=00000000 ebx=0177f1f8 ecx=0177fec0 edx=00000000 esi=c0000135 edi=0177efc0
  1027. 32372.834:00c8:00cc:trace:seh:dispatch_exception ebp=0177ed4c esp=0177ecd4 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00210246
  1028. 32372.834:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=c0000005 flags=0
  1029. 32372.834:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1030. 32372.834:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7BC68D00 code=c0000005 flags=0
  1031. 32372.834:00c8:00cc:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
  1032. 32372.834:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177ec7c ecx=c0000005 edx=0177ecec esi=0177e9b0 edi=0177ecec
  1033. 32372.834:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e8a8 esp=0177e8a0 eip=7bc68bde cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1034. 32372.834:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=c0000005 flags=2
  1035. 32372.834:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1036. 32372.834:00c8:00cc:err:module:import_dll Loading library d3dx9_43.dll (which is needed by L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\ped_spec.asi") failed (error c000007b).
  1037. 32372.836:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP100.dll" at 6B100000: builtin
  1038. 32372.844:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\SALodLights.asi" at 03210000: native
  1039. 32372.884:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\skygfx.asi" at 03280000: native
  1040. 32372.884:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03281123, 032C1590, 032C15A8) stub.
  1041. 32372.884:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 032BEAB8, 43) stub
  1042. 32372.913:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\scripts\\skygrad.asi" at 03330000: native
  1043. 32373.041:0088:0098:trace:seh:NtQueryInformationThread (0x80,0,0xe8f750,30,(nil))
  1044. 32373.129:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.asi.dll" at 03460000: native
  1045. 32373.947:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.bank.dll" at 034B0000: native
  1046. 32373.947:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 034B1123, 034F3040, 034F3058) stub.
  1047. 32373.947:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 034EF080, 43) stub
  1048. 32374.028:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.data.dll" at 03500000: native
  1049. 32374.028:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03501123, 037BC230, 037BC248) stub.
  1050. 32374.028:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 03794C80, 43) stub
  1051. 32374.137:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.fx.dll" at 03870000: native
  1052. 32374.137:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03871123, 038C7120, 038C7138) stub.
  1053. 32374.137:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 038C1490, 43) stub
  1054. 32374.158:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.movies.dll" at 038E0000: native
  1055. 32374.158:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 038E1123, 03909040, 03909058) stub.
  1056. 32374.158:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 03906918, 43) stub
  1057. 32374.180:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.scm.dll" at 03910000: native
  1058. 32374.180:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03911123, 039390F0, 03939108) stub.
  1059. 32374.180:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 03936898, 43) stub
  1060. 32374.210:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.sprites.dll" at 03D80000: native
  1061. 32374.210:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03D81123, 03DE80E0, 03DE80F8) stub.
  1062. 32374.210:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 03DE3240, 43) stub
  1063. 32374.241:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.stream.dll" at 03E00000: native
  1064. 32374.288:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.text.dll" at 03EA0000: native
  1065. 32374.288:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03EA1123, 03ED0230, 03ED0248) stub.
  1066. 32374.288:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 03ECCF40, 43) stub
  1067. 32374.320:00c8:00cc:trace:loaddll:build_module Loaded L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.tracks.dll" at 03EE0000: native
  1068. 32374.320:00c8:00cc:fixme:ntdll:EtwEventRegister ({5eec90ab-c022-44b2-a5dd-fd716a222a15}, 03EE1123, 03F10050, 03F10068) stub.
  1069. 32374.320:00c8:00cc:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 03F0D3E0, 43) stub
  1070. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1071. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1072. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1073. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1074. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1075. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1076. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1077. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1078. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1079. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1080. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1081. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1082. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1083. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1084. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1085. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1086. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1087. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1088. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1089. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1090. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1091. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1092. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1093. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1094. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1095. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1096. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1097. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1098. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1099. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1100. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1101. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1102. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1103. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1104. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1105. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1106. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1107. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1108. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1109. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1110. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1111. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1112. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1113. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1114. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1115. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1116. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1117. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1118. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1119. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1120. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1121. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1122. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1123. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1124. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1125. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1126. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1127. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1128. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1129. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1130. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1131. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1132. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1133. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1134. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1135. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1136. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1137. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1138. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1139. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1140. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1141. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1142. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1143. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1144. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1145. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1146. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1147. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1148. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1149. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1150. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1151. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1152. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1153. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1154. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1155. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1156. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1157. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1158. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1159. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1160. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1161. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1162. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1163. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1164. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1165. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1166. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1167. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1168. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1169. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1170. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1171. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1172. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1173. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1174. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1175. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1176. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1177. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1178. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1179. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1180. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1181. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1182. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1183. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1184. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1185. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1186. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1187. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1188. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1189. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1190. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1191. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1192. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1193. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1194. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1195. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1196. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1197. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1198. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1199. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1200. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1201. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1202. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1203. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1204. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1205. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1206. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1207. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1208. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1209. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1210. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1211. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1212. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1213. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1214. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1215. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=60023 ds=3a6002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1216. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1217. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1218. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1219. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1220. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1221. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1222. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1223. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1224. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1225. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1226. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f51c
  1227. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1228. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f470 ebx=0177f51c ecx=00000000 edx=0177f484 esi=0177f508 edi=0177f48c
  1229. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4c8 esp=0177f464 cs=7b000023 ds=7bc2002b es=177002b fs=0063 gs=006b flags=00200213
  1230. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1231. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1232. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55D0 code=e06d7363 flags=1
  1233. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1234. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf7d8 esi=0177f028 edi=0177f54c
  1235. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1236. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1237. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1238. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1239. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1240. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f51c
  1241. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1242. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f470 ebx=0177f51c ecx=00000000 edx=0177f484 esi=0177f508 edi=0177f48c
  1243. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4c8 esp=0177f464 cs=7b000023 ds=7bc2002b es=177002b fs=0063 gs=006b flags=00200213
  1244. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1245. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1246. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55D0 code=e06d7363 flags=1
  1247. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1248. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf7d8 esi=0177f028 edi=0177f54c
  1249. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1250. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1251. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1252. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1253. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1254. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f51c
  1255. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1256. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f470 ebx=0177f51c ecx=00000000 edx=0177f484 esi=0177f508 edi=0177f48c
  1257. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4c8 esp=0177f464 cs=7b000023 ds=7bc2002b es=177002b fs=0063 gs=006b flags=00200213
  1258. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1259. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1260. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55D0 code=e06d7363 flags=1
  1261. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1262. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf7d8 esi=0177f028 edi=0177f54c
  1263. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1264. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1265. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1266. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1267. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1268. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f51c
  1269. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1270. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f470 ebx=0177f51c ecx=00000000 edx=0177f484 esi=0177f508 edi=0177f48c
  1271. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4c8 esp=0177f464 cs=7b000023 ds=7bc2002b es=177002b fs=0063 gs=006b flags=00200213
  1272. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1273. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1274. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55D0 code=e06d7363 flags=1
  1275. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1276. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf7d8 esi=0177f028 edi=0177f54c
  1277. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1278. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1279. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1280. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1281. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1282. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f51c
  1283. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1284. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f470 ebx=0177f51c ecx=00000000 edx=0177f484 esi=0177f508 edi=0177f48c
  1285. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4c8 esp=0177f464 cs=7b000023 ds=7bc2002b es=177002b fs=0063 gs=006b flags=00200213
  1286. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1287. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1288. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55D0 code=e06d7363 flags=1
  1289. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1290. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf7d8 esi=0177f028 edi=0177f54c
  1291. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1292. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1293. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1294. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1295. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1296. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f51c
  1297. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1298. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f470 ebx=0177f51c ecx=00000000 edx=0177f484 esi=0177f508 edi=0177f48c
  1299. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4c8 esp=0177f464 cs=7b000023 ds=7bc2002b es=177002b fs=0063 gs=006b flags=00200213
  1300. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1301. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1302. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55D0 code=e06d7363 flags=1
  1303. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1304. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf7d8 esi=0177f028 edi=0177f54c
  1305. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1306. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1307. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1308. 32376.061:00c8:00cc:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1309. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[0]=19930520
  1310. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[1]=0177f520
  1311. 32376.061:00c8:00cc:trace:seh:dispatch_exception info[2]=032bfef4
  1312. 32376.061:00c8:00cc:trace:seh:dispatch_exception eax=0177f474 ebx=0177f520 ecx=00000000 edx=0177f488 esi=0177f50c edi=0177f490
  1313. 32376.061:00c8:00cc:trace:seh:dispatch_exception ebp=0177f4cc esp=0177f468 cs=200023 ds=177002b es=7bc2002b fs=1770063 gs=006b flags=00200213
  1314. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=e06d7363 flags=1
  1315. 32376.061:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1316. 32376.061:00c8:00cc:trace:seh:call_stack_handlers calling handler at 032B55F0 code=e06d7363 flags=1
  1317. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind code=e06d7363 flags=3
  1318. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177f54c ecx=0329d1ce edx=032bf780 esi=0177f028 edi=0177f54c
  1319. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177ef08 esp=0177eef4 eip=0329e167 cs=0023 ds=002b fs=0063 gs=006b flags=00200246
  1320. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=e06d7363 flags=3
  1321. 32376.061:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1322. 32376.190:003c:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x129fd00,4,(nil))
  1323. 32376.367:0030:0048:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe9fd00,4,(nil))
  1324. 32377.000:00c8:00cc:trace:seh:NtQueryInformationThread (0xfffffffe,0,0x177f794,1c,(nil))
  1325. 32377.000:00c8:00cc:trace:seh:NtSetInformationThread (0xc0,3,0x177f7a8,4)
  1326. 32377.098:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\opengl32.dll" at 7A840000: builtin
  1327. 32377.098:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wined3d.dll" at F4D90000: builtin
  1328. 32377.098:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DDRAW.dll" at 66CC0000: builtin
  1329. 32377.520:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxvk_config.dll" at 69240000: native
  1330. 32377.522:00c8:00cc:trace:seh:NtQueryInformationThread (0xd8,0,0x177ee24,1c,(nil))
  1331. 32377.658:00c8:00dc:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x476fe30,4,(nil))
  1332. 32377.668:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DSOUND.dll" at 6D5C0000: builtin
  1333. 32377.683:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mmdevapi.dll" at 70340000: builtin
  1334. 32377.695:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winepulse.drv" at F5040000: builtin
  1335. 32378.530:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winealsa.drv" at F2D10000: builtin
  1336. 32378.530:00c8:00cc:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\winealsa.drv" : builtin
  1337. 32378.557:00c8:00cc:trace:seh:NtSetInformationThread (0xf8,3,0x177f1fc,4)
  1338. 32378.564:00c8:00cc:trace:seh:NtSetInformationThread (0x100,3,0x177f5c0,4)
  1339. 32378.565:00c8:00ec:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x4d9fec4,4,(nil))
  1340. 32378.568:00c8:00e8:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x4b8fec4,4,(nil))
  1341. 32378.595:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.207 Creating main window..."
  1342. 32378.595:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1343. 32378.595:00c8:00cc:trace:seh:dispatch_exception info[0]=00000030
  1344. 32378.595:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1345. 32378.595:00c8:00cc:trace:seh:dispatch_exception eax=0177f570 ebx=026905f8 ecx=00000000 edx=0177f584 esi=0177f5f8 edi=0177f588
  1346. 32378.595:00c8:00cc:trace:seh:dispatch_exception ebp=0177f5c8 esp=0177f564 cs=1770023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  1347. 32378.595:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1348. 32378.595:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1349. 32378.595:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1350. 32378.595:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1351. 32378.595:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1352. 32378.595:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1353. 32378.595:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5fc esi=0177f570 edi=0177f5fc
  1354. 32378.595:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f0b8 esp=0177f0b0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1355. 32378.595:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1356. 32378.595:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1357. 32378.596:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1358. 32378.596:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1359. 32378.596:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1360. 32378.596:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1361. 32378.596:00c8:00cc:trace:seh:dispatch_exception eax=0177f570 ebx=02687784 ecx=00000000 edx=0177f584 esi=0177f5f8 edi=0177f588
  1362. 32378.596:00c8:00cc:trace:seh:dispatch_exception ebp=0177f5c8 esp=0177f564 cs=1770023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  1363. 32378.596:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1364. 32378.596:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1365. 32378.596:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1366. 32378.596:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1367. 32378.596:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1368. 32378.596:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1369. 32378.596:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5fc esi=0177f570 edi=0177f5fc
  1370. 32378.596:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f0b8 esp=0177f0b0 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1371. 32378.596:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1372. 32378.596:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1373. 32378.603:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.214 Found sound device 0: No sound"
  1374. 32378.603:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1375. 32378.603:00c8:00cc:trace:seh:dispatch_exception info[0]=00000037
  1376. 32378.603:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1377. 32378.603:00c8:00cc:trace:seh:dispatch_exception eax=0177f520 ebx=026905f8 ecx=00000000 edx=0177f534 esi=0177f5a8 edi=0177f538
  1378. 32378.603:00c8:00cc:trace:seh:dispatch_exception ebp=0177f578 esp=0177f514 cs=0023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  1379. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1380. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1381. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1382. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1383. 32378.603:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1384. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1385. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5ac esi=0177f520 edi=0177f5ac
  1386. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f068 esp=0177f060 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1387. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1388. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1389. 32378.603:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1390. 32378.603:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1391. 32378.603:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1392. 32378.603:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1393. 32378.603:00c8:00cc:trace:seh:dispatch_exception eax=0177f520 ebx=02687784 ecx=00000000 edx=0177f534 esi=0177f5a8 edi=0177f538
  1394. 32378.603:00c8:00cc:trace:seh:dispatch_exception ebp=0177f578 esp=0177f514 cs=1770023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  1395. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1396. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1397. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1398. 32378.603:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1399. 32378.603:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1400. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1401. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5ac esi=0177f520 edi=0177f5ac
  1402. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f068 esp=0177f060 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1403. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1404. 32378.603:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1405. 32378.604:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.215 Found sound device 1 (default): Pulseaudio"
  1406. 32378.604:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1407. 32378.604:00c8:00cc:trace:seh:dispatch_exception info[0]=00000043
  1408. 32378.604:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1409. 32378.604:00c8:00cc:trace:seh:dispatch_exception eax=0177f520 ebx=026905f8 ecx=00000000 edx=0177f534 esi=0177f5a8 edi=0177f538
  1410. 32378.604:00c8:00cc:trace:seh:dispatch_exception ebp=0177f578 esp=0177f514 cs=1770023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  1411. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1412. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1413. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1414. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1415. 32378.604:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1416. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1417. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5ac esi=0177f520 edi=0177f5ac
  1418. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f068 esp=0177f060 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1419. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1420. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1421. 32378.604:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1422. 32378.604:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1423. 32378.604:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1424. 32378.604:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1425. 32378.604:00c8:00cc:trace:seh:dispatch_exception eax=0177f520 ebx=02687784 ecx=00000000 edx=0177f534 esi=0177f5a8 edi=0177f538
  1426. 32378.604:00c8:00cc:trace:seh:dispatch_exception ebp=0177f578 esp=0177f514 cs=1770023 ds=002b es=177002b fs=2680063 gs=006b flags=00200213
  1427. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1428. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1429. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1430. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1431. 32378.604:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1432. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1433. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5ac esi=0177f520 edi=0177f5ac
  1434. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f068 esp=0177f060 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1435. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1436. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1437. 32378.604:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.215 On system found 2 devices, 2 enabled devices, assuming device to use: 1 (Pulseaudio)"
  1438. 32378.604:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1439. 32378.604:00c8:00cc:trace:seh:dispatch_exception info[0]=0000006d
  1440. 32378.604:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1441. 32378.604:00c8:00cc:trace:seh:dispatch_exception eax=0177f520 ebx=026905f8 ecx=00000000 edx=0177f534 esi=0177f5a8 edi=0177f538
  1442. 32378.604:00c8:00cc:trace:seh:dispatch_exception ebp=0177f578 esp=0177f514 cs=1770023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  1443. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1444. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1445. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1446. 32378.604:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1447. 32378.604:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1448. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1449. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5ac esi=0177f520 edi=0177f5ac
  1450. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f068 esp=0177f060 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1451. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1452. 32378.604:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1453. 32378.605:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1454. 32378.605:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1455. 32378.605:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1456. 32378.605:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1457. 32378.605:00c8:00cc:trace:seh:dispatch_exception eax=0177f520 ebx=02687784 ecx=00000000 edx=0177f534 esi=0177f5a8 edi=0177f538
  1458. 32378.605:00c8:00cc:trace:seh:dispatch_exception ebp=0177f578 esp=0177f514 cs=1770023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  1459. 32378.605:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1460. 32378.605:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1461. 32378.605:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1462. 32378.605:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1463. 32378.605:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1464. 32378.605:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1465. 32378.605:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5ac esi=0177f520 edi=0177f5ac
  1466. 32378.605:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f068 esp=0177f060 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200206
  1467. 32378.605:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1468. 32378.605:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1469. 32378.660:00c8:00cc:trace:seh:NtSetInformationThread (0x100,3,0x177f624,4)
  1470. 32378.665:00c8:00cc:trace:seh:NtSetInformationThread (0x108,3,0x177f688,4)
  1471. 32378.665:00c8:00cc:trace:seh:NtSetInformationThread (0x110,3,0x177f694,4)
  1472. 32378.665:00c8:00cc:trace:seh:NtSetInformationThread (0x114,3,0x177f694,4)
  1473. 32378.665:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.276 SoundSystem initialized"
  1474. 32378.665:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1475. 32378.665:00c8:00cc:trace:seh:dispatch_exception info[0]=00000030
  1476. 32378.665:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1477. 32378.665:00c8:00cc:trace:seh:dispatch_exception eax=0177f530 ebx=026905f8 ecx=00000000 edx=0177f544 esi=0177f5b8 edi=0177f548
  1478. 32378.665:00c8:00cc:trace:seh:dispatch_exception ebp=0177f588 esp=0177f524 cs=0023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  1479. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1480. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1481. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1482. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1483. 32378.665:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1484. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1485. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5bc esi=0177f530 edi=0177f5bc
  1486. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f078 esp=0177f070 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1487. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1488. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1489. 32378.665:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1490. 32378.665:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1491. 32378.665:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1492. 32378.665:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1493. 32378.665:00c8:00cc:trace:seh:dispatch_exception eax=0177f530 ebx=02687784 ecx=00000000 edx=0177f544 esi=0177f5b8 edi=0177f548
  1494. 32378.665:00c8:00cc:trace:seh:dispatch_exception ebp=0177f588 esp=0177f524 cs=1770023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  1495. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1496. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1497. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1498. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1499. 32378.665:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1500. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1501. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5bc esi=0177f530 edi=0177f5bc
  1502. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f078 esp=0177f070 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1503. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1504. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1505. 32378.665:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.276 Floating-point audio supported!"
  1506. 32378.665:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1507. 32378.665:00c8:00cc:trace:seh:dispatch_exception info[0]=00000038
  1508. 32378.665:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1509. 32378.665:00c8:00cc:trace:seh:dispatch_exception eax=0177f530 ebx=026905f8 ecx=00000000 edx=0177f544 esi=0177f5b8 edi=0177f548
  1510. 32378.665:00c8:00cc:trace:seh:dispatch_exception ebp=0177f588 esp=0177f524 cs=0023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  1511. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1512. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1513. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1514. 32378.665:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1515. 32378.665:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1516. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1517. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5bc esi=0177f530 edi=0177f5bc
  1518. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f078 esp=0177f070 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1519. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1520. 32378.665:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1521. 32378.666:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1522. 32378.666:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1523. 32378.666:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1524. 32378.666:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1525. 32378.666:00c8:00cc:trace:seh:dispatch_exception eax=0177f530 ebx=02687784 ecx=00000000 edx=0177f544 esi=0177f5b8 edi=0177f548
  1526. 32378.666:00c8:00cc:trace:seh:dispatch_exception ebp=0177f588 esp=0177f524 cs=1770023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  1527. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1528. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1529. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1530. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1531. 32378.666:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1532. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1533. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5bc esi=0177f530 edi=0177f5bc
  1534. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f078 esp=0177f070 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1535. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1536. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1537. 32378.666:00c8:00cc:warn:debugstr:OutputDebugStringA "01/04/2021 02:05:33.277 Audio hardware acceleration disabled (no EAX)"
  1538. 32378.666:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1539. 32378.666:00c8:00cc:trace:seh:dispatch_exception info[0]=00000046
  1540. 32378.666:00c8:00cc:trace:seh:dispatch_exception info[1]=026905f8
  1541. 32378.666:00c8:00cc:trace:seh:dispatch_exception eax=0177f530 ebx=026905f8 ecx=00000000 edx=0177f544 esi=0177f5b8 edi=0177f548
  1542. 32378.666:00c8:00cc:trace:seh:dispatch_exception ebp=0177f588 esp=0177f524 cs=1770023 ds=002b es=002b fs=1770063 gs=268006b flags=00200213
  1543. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1544. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1545. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1546. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1547. 32378.666:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1548. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1549. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5bc esi=0177f530 edi=0177f5bc
  1550. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f078 esp=0177f070 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1551. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1552. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1553. 32378.666:00c8:00cc:warn:debugstr:OutputDebugStringA "\n"
  1554. 32378.666:00c8:00cc:trace:seh:dispatch_exception code=40010006 flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1555. 32378.666:00c8:00cc:trace:seh:dispatch_exception info[0]=00000002
  1556. 32378.666:00c8:00cc:trace:seh:dispatch_exception info[1]=02687784
  1557. 32378.666:00c8:00cc:trace:seh:dispatch_exception eax=0177f530 ebx=02687784 ecx=00000000 edx=0177f544 esi=0177f5b8 edi=0177f548
  1558. 32378.666:00c8:00cc:trace:seh:dispatch_exception ebp=0177f588 esp=0177f524 cs=1770023 ds=002b es=177002b fs=1770063 gs=268006b flags=00200213
  1559. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=40010006 flags=0
  1560. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1561. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=40010006 flags=0
  1562. 32378.666:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1563. 32378.666:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=40010006 flags=0
  1564. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind code=40010006 flags=2
  1565. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=00000000 ecx=40010006 edx=0177f5bc esi=0177f530 edi=0177f5bc
  1566. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177f078 esp=0177f070 eip=7b6593fe cs=0023 ds=002b fs=0063 gs=006b flags=00200202
  1567. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=40010006 flags=2
  1568. 32378.666:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1569. 32378.682:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
  1570. 32378.682:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 053E0000: builtin
  1571. 32378.684:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 64D80000: builtin
  1572. 32378.684:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at F2520000: builtin
  1573. 32378.687:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 62340000: builtin
  1574. 32378.817:00c8:00cc:trace:seh:dispatch_exception code=c0000005 flags=0 addr=7BC2F64A ip=7bc2f64a tid=00cc
  1575. 32378.817:00c8:00cc:trace:seh:dispatch_exception info[0]=00000000
  1576. 32378.817:00c8:00cc:trace:seh:dispatch_exception info[1]=00000000
  1577. 32378.817:00c8:00cc:trace:seh:dispatch_exception eax=00000000 ebx=0177ead0 ecx=0177f250 edx=00000000 esi=c0000135 edi=0177e898
  1578. 32378.817:00c8:00cc:trace:seh:dispatch_exception ebp=0177e624 esp=0177e5ac cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00210246
  1579. 32378.817:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=c0000005 flags=0
  1580. 32378.817:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1581. 32378.817:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=c0000005 flags=0
  1582. 32378.817:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1583. 32378.817:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7BC68D00 code=c0000005 flags=0
  1584. 32378.817:00c8:00cc:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
  1585. 32378.817:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177e554 ecx=c0000005 edx=0177e5c4 esi=0177e288 edi=0177e5c4
  1586. 32378.817:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e180 esp=0177e178 eip=7bc68bde cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  1587. 32378.817:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=c0000005 flags=2
  1588. 32378.817:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1589. 32378.817:00c8:00cc:err:module:import_dll Loading library vulkan-1.dll (which is needed by L"C:\\windows\\system32\\d3d9.dll") failed (error c000007b).
  1590. 32378.835:00c8:00cc:trace:seh:dispatch_exception code=c0000005 flags=0 addr=7BC2F64A ip=7bc2f64a tid=00cc
  1591. 32378.835:00c8:00cc:trace:seh:dispatch_exception info[0]=00000000
  1592. 32378.835:00c8:00cc:trace:seh:dispatch_exception info[1]=00000000
  1593. 32378.835:00c8:00cc:trace:seh:dispatch_exception eax=00000000 ebx=0177ead0 ecx=0177f250 edx=00000000 esi=c0000135 edi=0177e898
  1594. 32378.835:00c8:00cc:trace:seh:dispatch_exception ebp=0177e624 esp=0177e5ac cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00210246
  1595. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=c0000005 flags=0
  1596. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1597. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=c0000005 flags=0
  1598. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1599. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7BC68D00 code=c0000005 flags=0
  1600. 32378.835:00c8:00cc:trace:seh:__regs_RtlUnwind code=c0000005 flags=2
  1601. 32378.835:00c8:00cc:trace:seh:__regs_RtlUnwind eax=00000000 ebx=0177e554 ecx=c0000005 edx=0177e5c4 esi=0177e288 edi=0177e5c4
  1602. 32378.835:00c8:00cc:trace:seh:__regs_RtlUnwind ebp=0177e180 esp=0177e178 eip=7bc68bde cs=0023 ds=002b fs=0063 gs=006b flags=00200216
  1603. 32378.835:00c8:00cc:trace:seh:__regs_RtlUnwind calling handler at 7BC5B020 code=c0000005 flags=2
  1604. 32378.835:00c8:00cc:trace:seh:__regs_RtlUnwind handler at 7BC5B020 returned 1
  1605. 32378.835:00c8:00cc:err:module:import_dll Loading library vulkan-1.dll (which is needed by L"C:\\windows\\system32\\d3d9.dll") failed (error c000007b).
  1606. 32378.835:00c8:00cc:trace:seh:dispatch_exception code=c06d007e flags=0 addr=7B00FC38 ip=7b00fc38 tid=00cc
  1607. 32378.835:00c8:00cc:trace:seh:dispatch_exception info[0]=0177f274
  1608. 32378.835:00c8:00cc:trace:seh:dispatch_exception eax=0177f1f8 ebx=00000000 ecx=00000000 edx=0177f20c esi=0177f2c4 edi=0177f20c
  1609. 32378.835:00c8:00cc:trace:seh:dispatch_exception ebp=0177f250 esp=0177f1ec cs=0023 ds=6244002b es=002b fs=62440063 gs=006b flags=00200257
  1610. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 692615B0 code=c06d007e flags=0
  1611. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers handler at 692615B0 returned 0
  1612. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers calling handler at 7B637B70 code=c06d007e flags=0
  1613. 32378.835:00c8:00cc:trace:seh:call_vectored_handlers handler at 7B637B70 returned 0
  1614. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A3B58 code=c06d007e flags=0
  1615. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A3B58 returned 1
  1616. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A36B8 code=c06d007e flags=0
  1617. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A36B8 returned 1
  1618. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A3B58 code=c06d007e flags=0
  1619. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A3B58 returned 1
  1620. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A3D4C code=c06d007e flags=0
  1621. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A3D4C returned 1
  1622. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A3B58 code=c06d007e flags=0
  1623. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A3B58 returned 1
  1624. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A36B8 code=c06d007e flags=0
  1625. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A36B8 returned 1
  1626. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A3B58 code=c06d007e flags=0
  1627. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A3B58 returned 1
  1628. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 031A3D4C code=c06d007e flags=0
  1629. 32378.835:00c8:00cc:trace:seh:call_stack_handlers handler at 031A3D4C returned 1
  1630. 32378.835:00c8:00cc:trace:seh:call_stack_handlers calling handler at 00825EA4 code=c06d007e flags=0
  1631. 32378.858:00c8:00cc:err:dbghelp_msc:codeview_process_info Unknown CODEVIEW signature 088d8601 in module L"gta-sa"
  1632. 32379.191:00c8:00cc:trace:seh:NtQueryInformationThread (0xfffffffe,0,0x177e244,1c,(nil))
  1633. 32379.236:00c8:00d4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x411fec4,4,(nil))
  1634. 32379.242:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1635. 32379.242:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1636. 32379.242:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.fx.dll" : native
  1637. 32379.245:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo\\FileSystemOperations.cleo" : native
  1638. 32379.252:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo\\IniFiles.cleo" : native
  1639. 32379.254:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\cleo\\IntOperations.cleo" : native
  1640. 32379.258:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.asi.dll" : native
  1641. 32379.261:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1642. 32379.261:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1643. 32379.261:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.bank.dll" : native
  1644. 32379.264:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1645. 32379.264:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1646. 32379.264:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.data.dll" : native
  1647. 32379.273:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1648. 32379.273:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1649. 32379.273:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.movies.dll" : native
  1650. 32379.276:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1651. 32379.276:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1652. 32379.276:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.scm.dll" : native
  1653. 32379.278:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1654. 32379.278:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1655. 32379.278:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.text.dll" : native
  1656. 32379.281:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1657. 32379.281:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1658. 32379.281:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.tracks.dll" : native
  1659. 32379.284:00c8:00cc:fixme:ntdll:EtwEventUnregister (deadbeef) stub.
  1660. 32379.284:00c8:00cc:fixme:ntdll:EtwEventUnregister (0) stub.
  1661. 32379.284:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.sprites.dll" : native
  1662. 32379.288:00c8:00cc:trace:loaddll:free_modref Unloaded module L"Z:\\media\\Games\\Steam\\steamapps\\common\\Grand Theft Auto San Andreas\\modloader\\.data\\plugins\\gta3\\std.stream.dll" : native
  1663. wine: Unhandled exception 0xc06d007e in thread cc at address 7B00FC38 (thread 00cc), starting debugger...
  1664. 32379.292:00c8:00cc:trace:seh:start_debugger Starting debugger L"winedbg --auto 200 112"
  1665. ERROR: ld.so: object '/home/s/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
  1666. 32379.318:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  1667. 32379.319:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  1668. 32379.319:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  1669. 32379.324:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedbg.exe" at 7EAC0000: builtin
  1670. 32379.326:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9C0000: builtin
  1671. 32379.326:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 66400000: builtin
  1672. 32379.327:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  1673. 32379.327:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7E940000: builtin
  1674. 32379.394:00c8:00cc:trace:seh:call_stack_handlers handler at 00825EA4 returned 1
  1675. 32379.394:00c8:0110:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x365fe34,4,(nil))
  1676. 32379.394:00c8:00cc:trace:seh:call_stack_handlers calling handler at 7B659450 code=c06d007e flags=0
  1677. 32379.394:00c8:00cc:trace:seh:call_stack_handlers handler at 7B659450 returned 1
  1678. 32379.395:0108:010c:trace:seh:NtGetContextThread 0x40: eax=0177f1f8 ebx=00000000 ecx=00000000 edx=0177f20c esi=0177f2c4 edi=0177f20c
  1679. 32379.395:0108:010c:trace:seh:NtGetContextThread 0x40: ebp=0177f250 esp=0177f1ec eip=7b00fc38 cs=0023 ss=177002b flags=00200257
  1680. 32379.395:0108:010c:trace:seh:NtGetContextThread 0x40: ds=6244002b es=002b fs=62440063 gs=006b
  1681. 32379.395:0108:010c:trace:seh:NtGetContextThread 0x40: dr0=00000000 dr1=00000000 dr2=00000000 dr3=00000000 dr6=00000000 dr7=00000000
  1682. Unhandled exception: 0xc06d007e in 32-bit code (0x7b00fc38).
  1683. 32379.395:0108:010c:trace:seh:NtQueryInformationThread (0x40,0,0x31f1e4,1c,(nil))
  1684. 32379.396:0108:010c:err:dbghelp_msc:codeview_process_info Unknown CODEVIEW signature 088d8601 in module L"gta-sa"
  1685. Register dump:
  1686. CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
  1687. EIP:7b00fc38 ESP:0177f1ec EBP:0177f250 EFLAGS:00200257( - -- I Z-A-P-C)
  1688. EAX:0177f1f8 EBX:00000000 ECX:00000000 EDX:0177f20c
  1689. ESI:0177f2c4 EDI:0177f20c
  1690. Stack dump:
  1691. 0x0177f1ec: 00884c30 00000000 03940000 c06d007e
  1692. 0x0177f1fc: 00000000 00000000 7b00fc38 00000001
  1693. 0x0177f20c: 0177f274 0177f224 03485cbb 00110000
  1694. 0x0177f21c: 00000000 03ac86b8 0177f25c 03473980
  1695. 0x0177f22c: 03ac86b8 008a1ee4 01770000 03ac86b8
  1696. 0x0177f23c: 00000104 02ed7320 02ed62e8 008a1ee4
  1697. 32379.397:0108:010c:trace:seh:NtQueryInformationThread (0x40,6,0x31f904,c,(nil))
  1698. Backtrace:
  1699. =>0 0x7b00fc38 EntryPoint+0xffffffff() in kernelbase (0x0177f250)
  1700. 1 0x00820eff EntryPoint+0xffffffff() in gta-sa (0x0177f2b8)
  1701. 0x7b00fc38 EntryPoint+0xffffffff in kernelbase: subl $4,%esp
  1702. Modules:
  1703. Module Address Debug info Name (64 modules)
  1704. PE 220000- 250000 Deferred eax
  1705. PE 360000- 371000 Deferred vorbishooked
  1706. PE 380000- 389000 Deferred ogg
  1707. PE 400000- 1577000 Export gta-sa
  1708. PE 1f00000- 2008000 Deferred vorbis
  1709. PE 2640000- 26bb000 Deferred cleo.asi
  1710. PE 27d0000- 27ec000 Deferred languageloader.asi
  1711. PE 2910000- 2959000 Deferred silentpatchsa.asi
  1712. PE 2960000- 2966000 Deferred fix.black_roads.asi
  1713. PE 2a80000- 2ac3000 Deferred frameratevigilante.sa.asi
  1714. PE 2b20000- 2b74000 Deferred gtasa.widescreenfix.asi
  1715. PE 2d90000- 2df5000 Deferred iii.vc.sa.limitadjuster.asi
  1716. PE 3040000- 30c9000 Deferred mixsets.asi
  1717. PE 30d0000- 3129000 Deferred mobilehud.asi
  1718. PE 3130000- 31e2000 Deferred modloader.asi
  1719. PE 3210000- 3273000 Deferred salodlights.asi
  1720. PE 3280000- 332d000 Deferred skygfx.asi
  1721. PE 3330000- 3337000 Deferred skygrad.asi
  1722. PE 53e0000- 553a000 Deferred comctl32
  1723. PE 10000000-10011000 Deferred vorbisfile
  1724. PE 11000000-1104d000 Deferred bass
  1725. PE 61540000-61547000 Deferred api-ms-win-core-localization-obsolete-l1-2-0
  1726. PE 61b00000-61b2a000 Deferred sechost
  1727. PE 62340000-6236e000 Deferred uxtheme
  1728. PE 62800000-6283b000 Deferred usp10
  1729. PE 639c0000-63a7b000 Deferred winmm
  1730. PE 64b40000-64b59000 Deferred shcore
  1731. PE 64d80000-64d8e000 Deferred hid
  1732. PE 65200000-6534f000 Deferred ole32
  1733. PE 65880000-65888000 Deferred api-ms-win-core-sysinfo-l1-2-1
  1734. PE 65980000-6598d000 Deferred version
  1735. PE 66400000-66464000 Deferred dbghelp
  1736. PE 66640000-66661000 Deferred msacm32
  1737. PE 66800000-66807000 Deferred api-ms-win-core-datetime-l1-1-1
  1738. PE 66980000-66987000 Deferred api-ms-win-core-string-l1-1-0
  1739. PE 66cc0000-66d37000 Deferred ddraw
  1740. PE 68c40000-68c95000 Deferred shlwapi
  1741. PE 69240000-69381000 Deferred dxvk_config
  1742. PE 6a300000-6a41a000 Deferred oleaut32
  1743. PE 6a900000-6a984000 Deferred setupapi
  1744. PE 6b100000-6b1ce000 Deferred msvcp100
  1745. PE 6ba80000-6ba87000 Deferred api-ms-win-core-fibers-l1-1-1
  1746. PE 6c0c0000-6c0da000 Deferred imm32
  1747. PE 6d5c0000-6d618000 Deferred dsound
  1748. PE 6e540000-6e548000 Deferred api-ms-win-core-synch-l1-2-0
  1749. PE 6e8c0000-6e8c8000 Deferred api-ms-win-core-localization-l1-2-1
  1750. PE 6fdc0000-6fe4d000 Deferred rpcrt4
  1751. PE 70340000-7036a000 Deferred mmdevapi
  1752. PE 7a840000-7a844000 Deferred opengl32
  1753. PE 7b000000-7b0d3000 Export kernelbase
  1754. PE 7b620000-7b7dd000 Deferred kernel32
  1755. PE 7bc00000-7bca7000 Deferred ntdll
  1756. PE 7e540000-7e547000 Deferred gdi32
  1757. PE 7e6a0000-7e782000 Deferred user32
  1758. PE 7e990000-7e994000 Deferred ws2_32
  1759. PE 7e9f0000-7e9f4000 Deferred ucrtbase
  1760. PE 7eae0000-7eae4000 Deferred advapi32
  1761. PE f2520000-f252b000 Deferred dinput8
  1762. PE f4d90000-f4d94000 Deferred wined3d
  1763. PE f5040000-f5043000 Deferred winepulse
  1764. PE f5120000-f59f6000 Deferred shell32
  1765. PE f5d30000-f5d34000 Deferred msvcr100
  1766. PE f5e70000-f5e74000 Deferred winex11
  1767. PE f5f40000-f5f44000 Deferred msvcrt
  1768. Threads:
  1769. process tid prio (all id:s are in hex)
  1770. 00000020 steam.exe
  1771. 00000024 0
  1772. 000000a0 0
  1773. 00000030 services.exe
  1774. 00000034 0
  1775. 00000038 0
  1776. 00000044 0
  1777. 00000060 0
  1778. 0000006c 0
  1779. 00000090 0
  1780. 0000003c plugplay.exe
  1781. 00000040 0
  1782. 0000004c 0
  1783. 00000050 0
  1784. 00000054 0
  1785. 00000074 0
  1786. 00000058 winedevice.exe
  1787. 0000005c 0
  1788. 00000064 0
  1789. 00000068 0
  1790. 00000070 0
  1791. 0000007c 0
  1792. 00000080 0
  1793. 00000084 0
  1794. 00000088 winedevice.exe
  1795. 0000008c 0
  1796. 00000094 0
  1797. 00000098 0
  1798. 0000009c 0
  1799. 000000a4 explorer.exe
  1800. 000000a8 0
  1801. 000000ac 0
  1802. 000000b8 0
  1803. 000000bc 0
  1804. 000000c8 (D) Z:\media\Games\Steam\steamapps\common\Grand Theft Auto San Andreas\gta-sa.exe
  1805. 000000cc 0 <==
  1806. 000000d0 0
  1807. 000000d8 0
  1808. 000000e0 0
  1809. 000000e4 15
  1810. 000000f0 0
  1811. 000000f4 15
  1812. 000000f8 15
  1813. 000000fc 2
  1814. 00000100 15
  1815. 00000104 0
  1816. 00000110 0
  1817. System information:
  1818. Wine build: wine-5.13-789-gc14054e6923
  1819. Platform: i386 (WOW64)
  1820. Version: Windows 10
  1821. Host system: Linux
  1822. Host version: 5.11.10-200.fc33.x86_64
  1823. 32380.427:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  1824. 32380.427:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  1825. 32380.427:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  1826. 32380.428:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  1827. 32380.430:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  1828. 32380.430:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  1829. 32380.430:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  1830. 32380.430:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000957e8 r11=0000000000e8ecd8
  1831. 32380.430:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005ca00 r14=0000000000000000 r15=00000000ffba0000
  1832. 32380.430:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  1833. 32380.430:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  1834. 32380.430:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  1835. 32380.430:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  1836. 32380.430:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  1837. 32380.430:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  1838. 32380.430:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  1839. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1840. 32380.430:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1841. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1842. 32380.430:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  1843. 32380.430:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  1844. 32380.430:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  1845. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1846. 32380.430:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  1847. 32380.430:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  1848. 32380.430:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  1849. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  1850. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  1851. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  1852. 32380.430:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  1853. 32380.430:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  1854. 32380.430:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  1855. 32380.430:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1856. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1857. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1858. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1859. 32380.430:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  1860. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  1861. 32380.431:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  1862. 32380.431:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  1863. 32380.431:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  1864. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  1865. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  1866. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  1867. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1868. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1869. 32380.431:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  1870. 32380.431:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  1871. 32380.431:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  1872. 32380.431:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  1873. 32380.431:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  1874. 32380.431:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  1875. 32380.431:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  1876. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  1877. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  1878. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  1879. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  1880. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1881. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1882. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1883. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1884. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  1885. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  1886. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  1887. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  1888. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  1889. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  1890. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  1891. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  1892. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  1893. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  1894. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  1895. 32380.431:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1896. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  1897. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1898. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  1899. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  1900. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  1901. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  1902. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1903. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  1904. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  1905. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  1906. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  1907. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  1908. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  1909. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  1910. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  1911. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  1912. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  1913. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  1914. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  1915. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  1916. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  1917. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  1918. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  1919. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  1920. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  1921. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  1922. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  1923. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  1924. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  1925. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  1926. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  1927. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  1928. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  1929. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  1930. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  1931. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  1932. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  1933. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  1934. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  1935. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  1936. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1937. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  1938. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  1939. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  1940. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1941. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1942. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1943. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  1944. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  1945. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  1946. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1947. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  1948. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  1949. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  1950. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  1951. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  1952. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  1953. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  1954. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  1955. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  1956. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  1957. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  1958. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  1959. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  1960. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  1961. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  1962. 32380.431:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  1963. 32380.431:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  1964. 32380.431:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  1965. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  1966. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  1967. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  1968. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  1969. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  1970. 32380.431:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  1971. 32380.431:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  1972. 32380.431:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  1973. 32380.431:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a720 rbp=0000000000000000 rsp=0000000000e8eea0
  1974. 32380.431:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000957e8 r11=0000000000e8ef18
  1975. 32380.431:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005ca00 r14=0000000000000000 r15=00000000ffba0000
  1976. 32380.431:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  1977. 32380.431:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  1978. 32380.431:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  1979. 32380.431:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  1980. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  1981. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  1982. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  1983. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  1984. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  1985. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  1986. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  1987. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  1988. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  1989. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  1990. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  1991. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  1992. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  1993. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  1994. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  1995. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  1996. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  1997. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  1998. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  1999. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  2000. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  2001. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  2002. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  2003. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  2004. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  2005. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  2006. 32380.431:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  2007. 32380.431:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  2008. 32380.431:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  2009. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  2010. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  2011. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  2012. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  2013. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  2014. 32380.431:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  2015. 32380.431:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  2016. 32380.431:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  2017. 32380.431:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  2018. 32380.431:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  2019. 32380.431:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  2020. 32380.431:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  2021. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  2022. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  2023. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  2024. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  2025. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  2026. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  2027. 32380.431:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  2028. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  2029. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  2030. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  2031. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  2032. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  2033. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  2034. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  2035. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  2036. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  2037. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  2038. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  2039. 32380.431:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  2040. 32380.431:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  2041. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  2042. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  2043. 32380.431:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  2044. 32380.431:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  2045. 32380.431:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  2046. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  2047. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  2048. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  2049. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  2050. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  2051. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  2052. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  2053. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  2054. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  2055. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  2056. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  2057. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  2058. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  2059. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  2060. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  2061. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  2062. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  2063. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  2064. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  2065. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  2066. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  2067. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  2068. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  2069. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  2070. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  2071. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  2072. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  2073. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  2074. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  2075. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  2076. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  2077. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  2078. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  2079. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  2080. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  2081. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  2082. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  2083. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  2084. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  2085. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  2086. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  2087. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  2088. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  2089. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  2090. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  2091. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  2092. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  2093. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  2094. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  2095. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  2096. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  2097. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  2098. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  2099. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  2100. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  2101. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  2102. 32380.432:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  2103. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  2104. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  2105. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  2106. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  2107. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  2108. 32380.432:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  2109. 32380.432:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  2110. 32380.432:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  2111. 32380.432:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  2112. 32380.432:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  2113. 32380.432:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  2114. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  2115. 32380.432:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  2116. 32380.432:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  2117. 32380.432:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  2118. 32380.432:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  2119. 32380.433:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  2120. 32380.433:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  2121. 32380.434:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  2122. 32380.436:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  2123. 32380.438:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  2124. 32380.438:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  2125. 32380.439:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  2126. 32380.531:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  2127. 32380.532:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  2128. 32380.532:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  2129. 32380.535:0030:0124:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1f1fda0,4,(nil))
  2130. 32380.535:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  2131. 32380.536:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  2132. pid 94760 != 94759, skipping destruction (fork without exec?)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement