Guest User

Untitled

a guest
Feb 17th, 2024
33
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 307.73 KB | None | 0 0
  1. ======================
  2. Proton: 1705700124 proton-8.0-5c
  3. SteamGameId: 374320
  4. Command: ['/var/home/foxbox/.local/share/Steam/steamapps/common/DARK SOULS III/Game/DarkSoulsIII.exe']
  5. Options: {'gamedrive', 'forcelgadd'}
  6. depot: 0.20240125.75305
  7. pressure-vessel: 0.20240125.0 scout
  8. scripts: 0.20240125.0
  9. sniper: 0.20240125.75305 sniper 0.20240125.75305
  10. Kernel: Linux 6.7.4-204.fsync.fc39.x86_64 #1 SMP PREEMPT_DYNAMIC Sun Feb 11 21:50:31 UTC 2024 x86_64
  11. Language: LC_ALL None, LC_MESSAGES None, LC_CTYPE None
  12. System WINEDLLOVERRIDES: dxgi=n
  13. Effective WINEDLLOVERRIDES: dxgi=n
  14. Effective WINEDEBUG: +timestamp,+pid,+tid,+seh,+unwind,+threadname,+debugstr,+loaddll,+mscoree
  15. ======================
  16. fsync: up and running.
  17. wine: RLIMIT_NICE is <= 20, unable to use setpriority safely
  18. 2657.953:0028:002c:trace:seh:install_bpf Installing seccomp filters.
  19. 2657.953:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  20. 2657.955:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
  21. 2657.956:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  22. 2657.956:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  23. 2657.960:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  24. 2657.962:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  25. 2657.962:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  26. 2657.962:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  27. 2657.963:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 0000000370F70000: builtin
  28. 2658.032:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  29. 2658.032:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  30. 2658.033:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
  31. 2658.034:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  32. 2658.034:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  33. 2658.036:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  34. 2658.037:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  35. 2658.037:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  36. 2658.037:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  37. 2658.038:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  38. 2658.039:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  39. 2658.039:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000036D860000: builtin
  40. 2658.040:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000244FC0000: builtin
  41. 2658.059:0030:0038:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
  42. 2658.111:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  43. 2658.111:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  44. 2658.113:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
  45. 2658.115:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  46. 2658.115:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  47. 2658.118:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  48. 2658.119:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  49. 2658.119:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  50. 2658.119:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  51. 2658.120:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 000000031CA90000: builtin
  52. 2658.131:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  53. 2658.133:0030:0044:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  54. 2658.135:0030:0048:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
  55. 2658.140:003c:0050:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
  56. 2658.143:0030:0054:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  57. 2658.148:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00000003BE830000: builtin
  58. 2658.157:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  59. 2658.157:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000036D860000: builtin
  60. 2658.207:0064:0068:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  61. 2658.207:0064:0068:trace:seh:install_bpf Seccomp filters already installed.
  62. 2658.210:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
  63. 2658.211:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  64. 2658.211:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  65. 2658.215:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  66. 2658.216:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  67. 2658.216:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  68. 2658.216:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  69. 2658.217:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 000000031CA90000: builtin
  70. 2658.230:0064:0068:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  71. 2658.231:0030:006c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  72. 2658.236:0064:0074:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
  73. 2658.238:0030:0078:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  74. 2658.245:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00000001E58A0000: builtin
  75. 2658.247:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  76. 2658.247:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000036D860000: builtin
  77. 2658.261:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\hidparse.sys" at 00000002AB600000: builtin
  78. 2658.261:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 0000000219DA0000: builtin
  79. 2658.262:0064:007c:fixme:wineusb:query_id Unhandled ID query type 0x5.
  80. 2658.268:0064:0070:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
  81. 2658.277:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  82. 2658.277:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  83. 2658.277:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  84. 2658.277:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\hidclass.sys" at 0000000332E40000: builtin
  85. 2658.278:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000002FE9D0000: builtin
  86. 2658.579:0064:0070:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 0000000393730000: builtin
  87. 2658.582:0064:0070:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
  88. 2658.588:0064:0070:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  89. 2658.588:0064:0070:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  90. 2658.588:0064:0070:trace:seh:dispatch_exception rax=0000000000b2d800 rbx=0000000000b2dae8 rcx=0000000000b2d800 rdx=0000000000000000
  91. 2658.588:0064:0070:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000008f3e40 rbp=0000000000b2d8d0 rsp=0000000000b2d7e0
  92. 2658.588:0064:0070:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008f4160 r11=0000000000000014
  93. 2658.588:0064:0070:trace:seh:dispatch_exception r12=0000000000b2dae8 r13=0000000000f3f4c0 r14=0000000000f3f4c0 r15=00000000000000b8
  94. 2658.588:0064:0070:trace:seh:call_vectored_handlers calling handler at 000000031CAB5D90 code=6ba flags=0
  95. 2658.588:0064:0070:trace:seh:call_vectored_handlers handler at 000000031CAB5D90 returned 0
  96. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp b2d7e0
  97. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  98. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  99. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  100. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  101. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp b2d8b0
  102. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  103. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  104. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  105. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  106. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  107. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  108. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp b2d8e0
  109. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  110. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  111. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  112. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  113. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  114. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  115. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  116. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  117. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  118. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab4e32 rsp b2d950
  119. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  120. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  121. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  122. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  123. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  124. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  125. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  126. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  127. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  128. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  129. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  130. 2658.588:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2D9C0 rsp 0000000000B2DCC0 handler 000000031CAAECE0
  131. 2658.588:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  132. 2658.588:0064:0070:trace:seh:call_teb_handler handler at 000000031CAAECE0 returned 1
  133. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab57f0 rsp b2dcc0
  134. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  135. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  136. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  137. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  138. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  139. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  140. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  141. 2658.588:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2DCF0 rsp 0000000000B2DE40 handler 000000031CAAEF90
  142. 2658.588:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAEF90 (rec=0000000000B2D800, frame=0000000000B2DCF0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  143. 2658.588:0064:0070:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=0000000000B2DCF0 target_ip=000000031CA9D91A rip=0000000170033aa5
  144. 2658.588:0064:0070:trace:unwind:RtlUnwindEx rax=000000007fed0000 rbx=0000000000b2d9c0 rcx=0000000000b2c5f0 rdx=000000031ca9d91a
  145. 2658.588:0064:0070:trace:unwind:RtlUnwindEx rsi=0000000000b2c0a0 rdi=0000000000b2cd30 rbp=0000000000b2bfb0 rsp=0000000000b2bf30
  146. 2658.588:0064:0070:trace:unwind:RtlUnwindEx r8=0000000000b2d800 r9=000000031cab5d60 r10=0000000000b2ca00 r11=0000000000029030
  147. 2658.588:0064:0070:trace:unwind:RtlUnwindEx r12=0000000000b2d800 r13=0000000000b2c5f0 r14=0000000000b2dcf0 r15=000000017006d3b0
  148. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp b2bf30
  149. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 33a50-341b8
  150. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  151. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  152. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  153. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  154. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  155. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  156. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  157. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  158. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  159. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  160. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  161. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  162. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp b2c5c0
  163. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 33a10-33a41
  164. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  165. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  166. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  167. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  168. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  169. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31ca9d91a rsp b2cad0
  170. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func d900-d91c
  171. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA574 flags 0 prolog 0x8 bytes function 000000031CA9D900-000000031CA9D91C
  172. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  173. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  174. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  175. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  176. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab5d5d rsp b2cb00
  177. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 25d30-25d5e
  178. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA580 flags 0 prolog 0x8 bytes function 000000031CAB5D30-000000031CAB5D5E
  179. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  180. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  181. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  182. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  183. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31caaefe8 rsp b2cb30
  184. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 1ef90-1efe9
  185. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA598 flags 0 prolog 0x10 bytes function 000000031CAAEF90-000000031CAAEFE9
  186. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  187. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  188. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  189. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r12
  190. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r13
  191. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r14
  192. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  193. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp b2cb90
  194. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 41e40-42301
  195. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  196. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  197. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  198. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  199. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  200. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  201. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  202. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  203. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  204. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  205. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  206. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  207. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp b2d250
  208. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 44400-449ef
  209. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  210. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  211. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  212. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  213. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  214. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  215. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  216. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  217. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  218. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  219. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  220. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  221. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp b2d2e0
  222. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func f0bc-f138
  223. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  224. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  225. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp b2d7e0
  226. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  227. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  228. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  229. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  230. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp b2d8b0
  231. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  232. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  233. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  234. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  235. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  236. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  237. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp b2d8e0
  238. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  239. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  240. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  241. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  242. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  243. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  244. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  245. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  246. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  247. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab4e32 rsp b2d950
  248. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  249. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  250. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  251. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  252. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  253. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  254. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  255. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  256. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  257. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  258. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  259. 2658.588:0064:0070:trace:unwind:RtlUnwindEx found builtin frame 0000000000B2D9C0 handler 000000031CAAECE0
  260. 2658.588:0064:0070:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2C5F0, dispatch=0000000000B2BFB0)
  261. 2658.588:0064:0070:trace:unwind:call_teb_unwind_handler handler at 000000031CAAECE0 returned 1
  262. 2658.588:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab57f0 rsp b2dcc0
  263. 2658.588:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  264. 2658.588:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  265. 2658.588:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  266. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  267. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  268. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  269. 2658.588:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  270. 2658.588:0064:0070:trace:seh:RtlRestoreContext returning to 000000031CA9D91A stack 0000000000B2DCC0
  271. 2658.590:0064:0070:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  272. 2658.590:0064:0070:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  273. 2658.590:0064:0070:trace:seh:dispatch_exception rax=0000000000b2d800 rbx=0000000000b2dae8 rcx=0000000000b2d800 rdx=0000000000000000
  274. 2658.590:0064:0070:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000008f3e40 rbp=0000000000b2d8d0 rsp=0000000000b2d7e0
  275. 2658.590:0064:0070:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008f4160 r11=0000000000000014
  276. 2658.590:0064:0070:trace:seh:dispatch_exception r12=0000000000b2dae8 r13=0000000000f3f4c0 r14=0000000000f3f4c0 r15=00000000000000b8
  277. 2658.590:0064:0070:trace:seh:call_vectored_handlers calling handler at 000000031CAB5D90 code=6ba flags=0
  278. 2658.590:0064:0070:trace:seh:call_vectored_handlers handler at 000000031CAB5D90 returned 0
  279. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp b2d7e0
  280. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  281. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  282. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  283. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  284. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp b2d8b0
  285. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  286. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  287. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  288. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  289. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  290. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  291. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp b2d8e0
  292. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  293. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  294. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  295. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  296. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  297. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  298. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  299. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  300. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  301. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab4e32 rsp b2d950
  302. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  303. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  304. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  305. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  306. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  307. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  308. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  309. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  310. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  311. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  312. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  313. 2658.590:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2D9C0 rsp 0000000000B2DCC0 handler 000000031CAAECE0
  314. 2658.590:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  315. 2658.590:0064:0070:trace:seh:call_teb_handler handler at 000000031CAAECE0 returned 1
  316. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab57f0 rsp b2dcc0
  317. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  318. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  319. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  320. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  321. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  322. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  323. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  324. 2658.590:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2DCF0 rsp 0000000000B2DE40 handler 000000031CAAEF90
  325. 2658.590:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAEF90 (rec=0000000000B2D800, frame=0000000000B2DCF0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  326. 2658.590:0064:0070:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=0000000000B2DCF0 target_ip=000000031CA9D91A rip=0000000170033aa5
  327. 2658.590:0064:0070:trace:unwind:RtlUnwindEx rax=000000007fed0000 rbx=0000000000b2d9c0 rcx=0000000000b2c5f0 rdx=000000031ca9d91a
  328. 2658.590:0064:0070:trace:unwind:RtlUnwindEx rsi=0000000000b2c0a0 rdi=0000000000b2cd30 rbp=0000000000b2bfb0 rsp=0000000000b2bf30
  329. 2658.590:0064:0070:trace:unwind:RtlUnwindEx r8=0000000000b2d800 r9=000000031cab5d60 r10=00007f3e217f7600 r11=0000000000000202
  330. 2658.590:0064:0070:trace:unwind:RtlUnwindEx r12=0000000000b2d800 r13=0000000000b2c5f0 r14=0000000000b2dcf0 r15=000000017006d3b0
  331. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp b2bf30
  332. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 33a50-341b8
  333. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  334. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  335. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  336. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  337. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  338. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  339. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  340. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  341. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  342. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  343. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  344. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  345. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp b2c5c0
  346. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 33a10-33a41
  347. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  348. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  349. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  350. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  351. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  352. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31ca9d91a rsp b2cad0
  353. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func d900-d91c
  354. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA574 flags 0 prolog 0x8 bytes function 000000031CA9D900-000000031CA9D91C
  355. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  356. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  357. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  358. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  359. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab5d5d rsp b2cb00
  360. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 25d30-25d5e
  361. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA580 flags 0 prolog 0x8 bytes function 000000031CAB5D30-000000031CAB5D5E
  362. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  363. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  364. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  365. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  366. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31caaefe8 rsp b2cb30
  367. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 1ef90-1efe9
  368. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA598 flags 0 prolog 0x10 bytes function 000000031CAAEF90-000000031CAAEFE9
  369. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  370. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  371. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  372. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r12
  373. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r13
  374. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r14
  375. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  376. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp b2cb90
  377. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 41e40-42301
  378. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  379. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  380. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  381. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  382. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  383. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  384. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  385. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  386. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  387. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  388. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  389. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  390. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp b2d250
  391. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 44400-449ef
  392. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  393. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  394. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  395. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  396. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  397. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  398. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  399. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  400. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  401. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  402. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  403. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  404. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp b2d2e0
  405. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func f0bc-f138
  406. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  407. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  408. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp b2d7e0
  409. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  410. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  411. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  412. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  413. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp b2d8b0
  414. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  415. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  416. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  417. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  418. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  419. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  420. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp b2d8e0
  421. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  422. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  423. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  424. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  425. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  426. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  427. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  428. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  429. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  430. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab4e32 rsp b2d950
  431. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  432. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  433. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  434. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  435. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  436. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  437. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  438. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  439. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  440. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  441. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  442. 2658.590:0064:0070:trace:unwind:RtlUnwindEx found builtin frame 0000000000B2D9C0 handler 000000031CAAECE0
  443. 2658.590:0064:0070:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2C5F0, dispatch=0000000000B2BFB0)
  444. 2658.590:0064:0070:trace:unwind:call_teb_unwind_handler handler at 000000031CAAECE0 returned 1
  445. 2658.590:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab57f0 rsp b2dcc0
  446. 2658.590:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  447. 2658.590:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  448. 2658.590:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  449. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  450. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  451. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  452. 2658.590:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  453. 2658.590:0064:0070:trace:seh:RtlRestoreContext returning to 000000031CA9D91A stack 0000000000B2DCC0
  454. 2658.593:0064:0070:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
  455. 2658.597:0064:0070:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
  456. 2658.603:0064:0070:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  457. 2658.603:0064:0070:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  458. 2658.603:0064:0070:trace:seh:dispatch_exception rax=0000000000b2d800 rbx=0000000000b2dae8 rcx=0000000000b2d800 rdx=0000000000000000
  459. 2658.603:0064:0070:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000008f3e40 rbp=0000000000b2d8d0 rsp=0000000000b2d7e0
  460. 2658.603:0064:0070:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008f4750 r11=0000000000000014
  461. 2658.603:0064:0070:trace:seh:dispatch_exception r12=0000000000b2dae8 r13=0000000000f4bb40 r14=0000000000f4bb40 r15=00000000000000b8
  462. 2658.603:0064:0070:trace:seh:call_vectored_handlers calling handler at 000000031CAB5D90 code=6ba flags=0
  463. 2658.603:0064:0070:trace:seh:call_vectored_handlers handler at 000000031CAB5D90 returned 0
  464. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp b2d7e0
  465. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  466. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  467. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  468. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  469. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp b2d8b0
  470. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  471. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  472. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  473. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  474. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  475. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  476. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp b2d8e0
  477. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  478. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  479. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  480. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  481. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  482. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  483. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  484. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  485. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  486. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab4e32 rsp b2d950
  487. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  488. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  489. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  490. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  491. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  492. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  493. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  494. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  495. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  496. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  497. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  498. 2658.603:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2D9C0 rsp 0000000000B2DCC0 handler 000000031CAAECE0
  499. 2658.603:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  500. 2658.603:0064:0070:trace:seh:call_teb_handler handler at 000000031CAAECE0 returned 1
  501. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab57f0 rsp b2dcc0
  502. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  503. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  504. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  505. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  506. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  507. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  508. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  509. 2658.603:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2DCF0 rsp 0000000000B2DE40 handler 000000031CAAEF90
  510. 2658.603:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAEF90 (rec=0000000000B2D800, frame=0000000000B2DCF0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  511. 2658.603:0064:0070:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=0000000000B2DCF0 target_ip=000000031CA9D91A rip=0000000170033aa5
  512. 2658.603:0064:0070:trace:unwind:RtlUnwindEx rax=000000007fed0000 rbx=0000000000b2d9c0 rcx=0000000000b2c5f0 rdx=000000031ca9d91a
  513. 2658.603:0064:0070:trace:unwind:RtlUnwindEx rsi=0000000000b2c0a0 rdi=0000000000b2cd30 rbp=0000000000b2bfb0 rsp=0000000000b2bf30
  514. 2658.603:0064:0070:trace:unwind:RtlUnwindEx r8=0000000000b2d800 r9=000000031cab5d60 r10=00007f3e217f7600 r11=0000000000000202
  515. 2658.603:0064:0070:trace:unwind:RtlUnwindEx r12=0000000000b2d800 r13=0000000000b2c5f0 r14=0000000000b2dcf0 r15=000000017006d3b0
  516. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp b2bf30
  517. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 33a50-341b8
  518. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  519. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  520. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  521. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  522. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  523. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  524. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  525. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  526. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  527. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  528. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  529. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  530. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp b2c5c0
  531. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 33a10-33a41
  532. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  533. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  534. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  535. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  536. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  537. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31ca9d91a rsp b2cad0
  538. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func d900-d91c
  539. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA574 flags 0 prolog 0x8 bytes function 000000031CA9D900-000000031CA9D91C
  540. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  541. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  542. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  543. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  544. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab5d5d rsp b2cb00
  545. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 25d30-25d5e
  546. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA580 flags 0 prolog 0x8 bytes function 000000031CAB5D30-000000031CAB5D5E
  547. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  548. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  549. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  550. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  551. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31caaefe8 rsp b2cb30
  552. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 1ef90-1efe9
  553. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA598 flags 0 prolog 0x10 bytes function 000000031CAAEF90-000000031CAAEFE9
  554. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  555. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  556. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  557. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r12
  558. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r13
  559. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r14
  560. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  561. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp b2cb90
  562. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 41e40-42301
  563. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  564. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  565. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  566. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  567. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  568. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  569. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  570. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  571. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  572. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  573. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  574. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  575. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp b2d250
  576. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 44400-449ef
  577. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  578. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  579. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  580. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  581. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  582. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  583. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  584. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  585. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  586. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  587. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  588. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  589. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp b2d2e0
  590. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func f0bc-f138
  591. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  592. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  593. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp b2d7e0
  594. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  595. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  596. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  597. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  598. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp b2d8b0
  599. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  600. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  601. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  602. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  603. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  604. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  605. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp b2d8e0
  606. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  607. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  608. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  609. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  610. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  611. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  612. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  613. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  614. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  615. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab4e32 rsp b2d950
  616. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  617. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  618. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  619. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  620. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  621. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  622. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  623. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  624. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  625. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  626. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  627. 2658.603:0064:0070:trace:unwind:RtlUnwindEx found builtin frame 0000000000B2D9C0 handler 000000031CAAECE0
  628. 2658.603:0064:0070:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2C5F0, dispatch=0000000000B2BFB0)
  629. 2658.603:0064:0070:trace:unwind:call_teb_unwind_handler handler at 000000031CAAECE0 returned 1
  630. 2658.603:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab57f0 rsp b2dcc0
  631. 2658.603:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  632. 2658.603:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  633. 2658.603:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  634. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  635. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  636. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  637. 2658.603:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  638. 2658.603:0064:0070:trace:seh:RtlRestoreContext returning to 000000031CA9D91A stack 0000000000B2DCC0
  639. 2658.604:0064:0070:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  640. 2658.604:0064:0070:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  641. 2658.604:0064:0070:trace:seh:dispatch_exception rax=0000000000b2d800 rbx=0000000000b2dae8 rcx=0000000000b2d800 rdx=0000000000000000
  642. 2658.604:0064:0070:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000008f3e40 rbp=0000000000b2d8d0 rsp=0000000000b2d7e0
  643. 2658.604:0064:0070:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008f4750 r11=0000000000000014
  644. 2658.604:0064:0070:trace:seh:dispatch_exception r12=0000000000b2dae8 r13=0000000000f4bb40 r14=0000000000f4bb40 r15=00000000000000b8
  645. 2658.604:0064:0070:trace:seh:call_vectored_handlers calling handler at 000000031CAB5D90 code=6ba flags=0
  646. 2658.604:0064:0070:trace:seh:call_vectored_handlers handler at 000000031CAB5D90 returned 0
  647. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp b2d7e0
  648. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  649. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  650. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  651. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  652. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp b2d8b0
  653. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  654. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  655. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  656. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  657. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  658. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  659. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp b2d8e0
  660. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  661. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  662. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  663. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  664. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  665. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  666. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  667. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  668. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  669. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab4e32 rsp b2d950
  670. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  671. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  672. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  673. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  674. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  675. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  676. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  677. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  678. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  679. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  680. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  681. 2658.604:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2D9C0 rsp 0000000000B2DCC0 handler 000000031CAAECE0
  682. 2658.604:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  683. 2658.604:0064:0070:trace:seh:call_teb_handler handler at 000000031CAAECE0 returned 1
  684. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 31cab57f0 rsp b2dcc0
  685. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  686. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  687. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  688. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  689. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  690. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  691. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  692. 2658.604:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000B2DCF0 rsp 0000000000B2DE40 handler 000000031CAAEF90
  693. 2658.604:0064:0070:trace:seh:call_teb_handler calling TEB handler 000000031CAAEF90 (rec=0000000000B2D800, frame=0000000000B2DCF0 context=0000000000B2CD30, dispatch=0000000000B2CC00)
  694. 2658.604:0064:0070:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=0000000000B2DCF0 target_ip=000000031CA9D91A rip=0000000170033aa5
  695. 2658.604:0064:0070:trace:unwind:RtlUnwindEx rax=000000007fed0000 rbx=0000000000b2d9c0 rcx=0000000000b2c5f0 rdx=000000031ca9d91a
  696. 2658.604:0064:0070:trace:unwind:RtlUnwindEx rsi=0000000000b2c0a0 rdi=0000000000b2cd30 rbp=0000000000b2bfb0 rsp=0000000000b2bf30
  697. 2658.604:0064:0070:trace:unwind:RtlUnwindEx r8=0000000000b2d800 r9=000000031cab5d60 r10=00007f3e217f7600 r11=0000000000000202
  698. 2658.604:0064:0070:trace:unwind:RtlUnwindEx r12=0000000000b2d800 r13=0000000000b2c5f0 r14=0000000000b2dcf0 r15=000000017006d3b0
  699. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp b2bf30
  700. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 33a50-341b8
  701. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  702. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  703. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  704. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  705. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  706. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  707. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  708. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  709. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  710. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  711. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  712. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  713. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp b2c5c0
  714. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 33a10-33a41
  715. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  716. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  717. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  718. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  719. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  720. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31ca9d91a rsp b2cad0
  721. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func d900-d91c
  722. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA574 flags 0 prolog 0x8 bytes function 000000031CA9D900-000000031CA9D91C
  723. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  724. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  725. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  726. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  727. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab5d5d rsp b2cb00
  728. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 25d30-25d5e
  729. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA580 flags 0 prolog 0x8 bytes function 000000031CAB5D30-000000031CAB5D5E
  730. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  731. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  732. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  733. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  734. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31caaefe8 rsp b2cb30
  735. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 1ef90-1efe9
  736. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA598 flags 0 prolog 0x10 bytes function 000000031CAAEF90-000000031CAAEFE9
  737. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  738. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  739. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  740. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r12
  741. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r13
  742. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r14
  743. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  744. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp b2cb90
  745. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 41e40-42301
  746. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  747. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  748. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  749. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  750. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  751. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  752. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  753. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  754. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  755. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  756. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  757. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  758. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp b2d250
  759. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 44400-449ef
  760. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  761. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  762. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  763. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  764. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  765. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  766. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  767. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
  768. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
  769. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
  770. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
  771. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  772. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp b2d2e0
  773. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func f0bc-f138
  774. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  775. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  776. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp b2d7e0
  777. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func cd48-cdbf
  778. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  779. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  780. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
  781. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp b2d8b0
  782. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  783. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  784. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  785. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  786. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  787. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  788. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp b2d8e0
  789. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 15ff0-16087
  790. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  791. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  792. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  793. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  794. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  795. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  796. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  797. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  798. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab4e32 rsp b2d950
  799. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 24d40-24f49
  800. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  801. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  802. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  803. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  804. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  805. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  806. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  807. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
  808. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
  809. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  810. 2658.604:0064:0070:trace:unwind:RtlUnwindEx found builtin frame 0000000000B2D9C0 handler 000000031CAAECE0
  811. 2658.604:0064:0070:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031CAAECE0 (rec=0000000000B2D800, frame=0000000000B2D9C0 context=0000000000B2C5F0, dispatch=0000000000B2BFB0)
  812. 2658.604:0064:0070:trace:unwind:call_teb_unwind_handler handler at 000000031CAAECE0 returned 1
  813. 2658.604:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 31cab57f0 rsp b2dcc0
  814. 2658.604:0064:0070:trace:unwind:dump_unwind_info **** func 25720-25801
  815. 2658.604:0064:0070:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  816. 2658.604:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  817. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  818. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  819. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  820. 2658.604:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  821. 2658.604:0064:0070:trace:seh:RtlRestoreContext returning to 000000031CA9D91A stack 0000000000B2DCC0
  822. 2658.841:0064:0090:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
  823. 2658.849:0064:0090:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winexinput.sys" at 00000001D43F0000: builtin
  824. 2658.854:0064:0090:fixme:xinput:pdo_pnp IRP_MN_QUERY_ID type 5, not implemented!
  825. 2658.858:0064:0090:fixme:xinput:pdo_pnp IRP_MN_QUERY_ID type 5, not implemented!
  826. 2658.863:0064:0090:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  827. 2658.863:0064:0090:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  828. 2658.863:0064:0090:trace:seh:dispatch_exception rax=00000000022cdec0 rbx=00000000022ce1a8 rcx=00000000022cdec0 rdx=0000000000000000
  829. 2658.863:0064:0090:trace:seh:dispatch_exception rsi=0000000000000114 rdi=00000000008f3e40 rbp=00000000022cdf90 rsp=00000000022cdea0
  830. 2658.863:0064:0090:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008f5540 r11=0000000000000014
  831. 2658.863:0064:0090:trace:seh:dispatch_exception r12=00000000022ce1a8 r13=0000000000f7b8c0 r14=0000000000f7b8c0 r15=0000000000000100
  832. 2658.863:0064:0090:trace:seh:call_vectored_handlers calling handler at 000000031CAB5D90 code=6ba flags=0
  833. 2658.863:0064:0090:trace:seh:call_vectored_handlers handler at 000000031CAB5D90 returned 0
  834. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp 22cdea0
  835. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func cd48-cdbf
  836. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  837. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  838. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind inside epilog.
  839. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp 22cdf70
  840. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  841. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  842. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  843. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  844. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  845. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  846. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp 22cdfa0
  847. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 15ff0-16087
  848. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  849. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  850. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  851. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  852. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  853. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  854. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  855. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  856. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 31cab4e32 rsp 22ce010
  857. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 24d40-24f49
  858. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  859. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  860. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  861. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  862. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  863. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  864. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  865. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r12
  866. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r13
  867. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  868. 2658.863:0064:0090:trace:seh:call_stack_handlers found wine frame 00000000022CE080 rsp 00000000022CE380 handler 000000031CAAECE0
  869. 2658.863:0064:0090:trace:seh:call_teb_handler calling TEB handler 000000031CAAECE0 (rec=00000000022CDEC0, frame=00000000022CE080 context=00000000022CD3F0, dispatch=00000000022CD2C0)
  870. 2658.863:0064:0090:trace:seh:call_teb_handler handler at 000000031CAAECE0 returned 1
  871. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 31cab57f0 rsp 22ce380
  872. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 25720-25801
  873. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  874. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  875. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  876. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  877. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  878. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  879. 2658.863:0064:0090:trace:seh:call_stack_handlers found wine frame 00000000022CE3B0 rsp 00000000022CE500 handler 000000031CAAEF90
  880. 2658.863:0064:0090:trace:seh:call_teb_handler calling TEB handler 000000031CAAEF90 (rec=00000000022CDEC0, frame=00000000022CE3B0 context=00000000022CD3F0, dispatch=00000000022CD2C0)
  881. 2658.863:0064:0090:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=00000000022CE3B0 target_ip=000000031CA9D91A rip=0000000170033aa5
  882. 2658.863:0064:0090:trace:unwind:RtlUnwindEx rax=000000007fe60000 rbx=00000000022ce080 rcx=00000000022cccb0 rdx=000000031ca9d91a
  883. 2658.863:0064:0090:trace:unwind:RtlUnwindEx rsi=00000000022cc760 rdi=00000000022cd3f0 rbp=00000000022cc670 rsp=00000000022cc5f0
  884. 2658.863:0064:0090:trace:unwind:RtlUnwindEx r8=00000000022cdec0 r9=000000031cab5d60 r10=00007f3e217f7600 r11=0000000000000202
  885. 2658.863:0064:0090:trace:unwind:RtlUnwindEx r12=00000000022cdec0 r13=00000000022cccb0 r14=00000000022ce3b0 r15=000000017006d3b0
  886. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp 22cc5f0
  887. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 33a50-341b8
  888. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  889. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  890. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  891. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  892. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  893. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  894. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  895. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x9: pushq %r12
  896. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r13
  897. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r14
  898. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r15
  899. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  900. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp 22ccc80
  901. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 33a10-33a41
  902. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  903. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  904. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  905. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  906. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  907. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31ca9d91a rsp 22cd190
  908. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func d900-d91c
  909. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA574 flags 0 prolog 0x8 bytes function 000000031CA9D900-000000031CA9D91C
  910. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  911. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  912. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  913. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  914. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31cab5d5d rsp 22cd1c0
  915. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 25d30-25d5e
  916. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA580 flags 0 prolog 0x8 bytes function 000000031CAB5D30-000000031CAB5D5E
  917. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  918. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  919. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  920. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  921. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31caaefe8 rsp 22cd1f0
  922. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 1ef90-1efe9
  923. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA598 flags 0 prolog 0x10 bytes function 000000031CAAEF90-000000031CAAEFE9
  924. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  925. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  926. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  927. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r12
  928. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r13
  929. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r14
  930. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  931. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp 22cd250
  932. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 41e40-42301
  933. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  934. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  935. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  936. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  937. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  938. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  939. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  940. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x9: pushq %r12
  941. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r13
  942. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r14
  943. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r15
  944. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  945. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp 22cd910
  946. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 44400-449ef
  947. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  948. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  949. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  950. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  951. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  952. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  953. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  954. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x9: pushq %r12
  955. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r13
  956. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r14
  957. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r15
  958. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  959. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp 22cd9a0
  960. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func f0bc-f138
  961. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  962. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  963. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp 22cdea0
  964. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func cd48-cdbf
  965. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  966. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  967. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind inside epilog.
  968. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp 22cdf70
  969. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  970. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  971. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  972. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  973. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  974. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  975. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp 22cdfa0
  976. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 15ff0-16087
  977. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  978. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  979. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  980. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  981. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  982. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  983. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  984. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  985. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31cab4e32 rsp 22ce010
  986. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 24d40-24f49
  987. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  988. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  989. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  990. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  991. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  992. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  993. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  994. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r12
  995. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r13
  996. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  997. 2658.863:0064:0090:trace:unwind:RtlUnwindEx found builtin frame 00000000022CE080 handler 000000031CAAECE0
  998. 2658.863:0064:0090:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031CAAECE0 (rec=00000000022CDEC0, frame=00000000022CE080 context=00000000022CCCB0, dispatch=00000000022CC670)
  999. 2658.863:0064:0090:trace:unwind:call_teb_unwind_handler handler at 000000031CAAECE0 returned 1
  1000. 2658.863:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31cab57f0 rsp 22ce380
  1001. 2658.863:0064:0090:trace:unwind:dump_unwind_info **** func 25720-25801
  1002. 2658.863:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  1003. 2658.863:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1004. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  1005. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  1006. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  1007. 2658.863:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1008. 2658.863:0064:0090:trace:seh:RtlRestoreContext returning to 000000031CA9D91A stack 00000000022CE380
  1009. 2658.866:0064:0090:fixme:xinput:pdo_pnp IRP_MN_QUERY_ID type 5, not implemented!
  1010. 2658.870:0064:0090:fixme:xinput:pdo_pnp IRP_MN_QUERY_ID type 5, not implemented!
  1011. 2658.876:0064:0090:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1012. 2658.876:0064:0090:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  1013. 2658.876:0064:0090:trace:seh:dispatch_exception rax=00000000022cdec0 rbx=00000000022ce1a8 rcx=00000000022cdec0 rdx=0000000000000000
  1014. 2658.876:0064:0090:trace:seh:dispatch_exception rsi=0000000000000114 rdi=00000000008f3e40 rbp=00000000022cdf90 rsp=00000000022cdea0
  1015. 2658.876:0064:0090:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008f5540 r11=0000000000000014
  1016. 2658.876:0064:0090:trace:seh:dispatch_exception r12=00000000022ce1a8 r13=0000000000f80040 r14=0000000000f80040 r15=0000000000000100
  1017. 2658.876:0064:0090:trace:seh:call_vectored_handlers calling handler at 000000031CAB5D90 code=6ba flags=0
  1018. 2658.876:0064:0090:trace:seh:call_vectored_handlers handler at 000000031CAB5D90 returned 0
  1019. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp 22cdea0
  1020. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func cd48-cdbf
  1021. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  1022. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  1023. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind inside epilog.
  1024. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp 22cdf70
  1025. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  1026. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  1027. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1028. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1029. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1030. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1031. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp 22cdfa0
  1032. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 15ff0-16087
  1033. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  1034. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1035. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  1036. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  1037. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  1038. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  1039. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  1040. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1041. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 31cab4e32 rsp 22ce010
  1042. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 24d40-24f49
  1043. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  1044. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1045. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  1046. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  1047. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  1048. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  1049. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  1050. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r12
  1051. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r13
  1052. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1053. 2658.876:0064:0090:trace:seh:call_stack_handlers found wine frame 00000000022CE080 rsp 00000000022CE380 handler 000000031CAAECE0
  1054. 2658.876:0064:0090:trace:seh:call_teb_handler calling TEB handler 000000031CAAECE0 (rec=00000000022CDEC0, frame=00000000022CE080 context=00000000022CD3F0, dispatch=00000000022CD2C0)
  1055. 2658.876:0064:0090:trace:seh:call_teb_handler handler at 000000031CAAECE0 returned 1
  1056. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 1 rip 31cab57f0 rsp 22ce380
  1057. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 25720-25801
  1058. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  1059. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1060. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  1061. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  1062. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  1063. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1064. 2658.876:0064:0090:trace:seh:call_stack_handlers found wine frame 00000000022CE3B0 rsp 00000000022CE500 handler 000000031CAAEF90
  1065. 2658.876:0064:0090:trace:seh:call_teb_handler calling TEB handler 000000031CAAEF90 (rec=00000000022CDEC0, frame=00000000022CE3B0 context=00000000022CD3F0, dispatch=00000000022CD2C0)
  1066. 2658.876:0064:0090:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=00000000022CE3B0 target_ip=000000031CA9D91A rip=0000000170033aa5
  1067. 2658.876:0064:0090:trace:unwind:RtlUnwindEx rax=000000007fe60000 rbx=00000000022ce080 rcx=00000000022cccb0 rdx=000000031ca9d91a
  1068. 2658.876:0064:0090:trace:unwind:RtlUnwindEx rsi=00000000022cc760 rdi=00000000022cd3f0 rbp=00000000022cc670 rsp=00000000022cc5f0
  1069. 2658.876:0064:0090:trace:unwind:RtlUnwindEx r8=00000000022cdec0 r9=000000031cab5d60 r10=00007f3e217f7600 r11=0000000000000202
  1070. 2658.876:0064:0090:trace:unwind:RtlUnwindEx r12=00000000022cdec0 r13=00000000022cccb0 r14=00000000022ce3b0 r15=000000017006d3b0
  1071. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp 22cc5f0
  1072. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 33a50-341b8
  1073. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  1074. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1075. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  1076. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  1077. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1078. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1079. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1080. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1081. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1082. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1083. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1084. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1085. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp 22ccc80
  1086. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 33a10-33a41
  1087. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  1088. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1089. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  1090. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  1091. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1092. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31ca9d91a rsp 22cd190
  1093. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func d900-d91c
  1094. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA574 flags 0 prolog 0x8 bytes function 000000031CA9D900-000000031CA9D91C
  1095. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1096. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1097. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1098. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1099. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31cab5d5d rsp 22cd1c0
  1100. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 25d30-25d5e
  1101. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA580 flags 0 prolog 0x8 bytes function 000000031CAB5D30-000000031CAB5D5E
  1102. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1103. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1104. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1105. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1106. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31caaefe8 rsp 22cd1f0
  1107. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 1ef90-1efe9
  1108. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA598 flags 0 prolog 0x10 bytes function 000000031CAAEF90-000000031CAAEFE9
  1109. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  1110. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  1111. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  1112. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r12
  1113. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r13
  1114. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r14
  1115. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1116. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp 22cd250
  1117. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 41e40-42301
  1118. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  1119. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1120. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  1121. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  1122. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1123. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1124. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1125. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1126. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1127. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1128. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1129. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1130. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp 22cd910
  1131. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 44400-449ef
  1132. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  1133. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1134. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  1135. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  1136. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1137. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1138. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1139. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1140. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1141. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1142. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1143. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1144. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp 22cd9a0
  1145. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func f0bc-f138
  1146. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  1147. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1148. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp 22cdea0
  1149. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func cd48-cdbf
  1150. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  1151. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  1152. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind inside epilog.
  1153. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp 22cdf70
  1154. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  1155. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  1156. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1157. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1158. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1159. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1160. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp 22cdfa0
  1161. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 15ff0-16087
  1162. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  1163. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1164. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  1165. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  1166. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  1167. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  1168. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  1169. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1170. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31cab4e32 rsp 22ce010
  1171. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 24d40-24f49
  1172. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CACA490 flags 0 prolog 0x17 bytes function 000000031CAB4D40-000000031CAB4F49
  1173. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1174. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
  1175. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
  1176. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x8: pushq %rbx
  1177. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x7: pushq %rsi
  1178. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x6: pushq %rdi
  1179. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x5: pushq %r12
  1180. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x3: pushq %r13
  1181. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1182. 2658.876:0064:0090:trace:unwind:RtlUnwindEx found builtin frame 00000000022CE080 handler 000000031CAAECE0
  1183. 2658.876:0064:0090:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031CAAECE0 (rec=00000000022CDEC0, frame=00000000022CE080 context=00000000022CCCB0, dispatch=00000000022CC670)
  1184. 2658.876:0064:0090:trace:unwind:call_teb_unwind_handler handler at 000000031CAAECE0 returned 1
  1185. 2658.876:0064:0090:trace:unwind:RtlVirtualUnwind type 2 rip 31cab57f0 rsp 22ce380
  1186. 2658.876:0064:0090:trace:unwind:dump_unwind_info **** func 25720-25801
  1187. 2658.876:0064:0090:trace:unwind:dump_unwind_info unwind info at 000000031CAC9E98 flags 0 prolog 0x11 bytes function 000000031CAB5720-000000031CAB5801
  1188. 2658.876:0064:0090:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1189. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
  1190. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
  1191. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x2: pushq %rbx
  1192. 2658.876:0064:0090:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1193. 2658.876:0064:0090:trace:seh:RtlRestoreContext returning to 000000031CA9D91A stack 00000000022CE380
  1194. 2658.887:0094:0098:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1195. 2658.887:0094:0098:trace:seh:install_bpf Seccomp filters already installed.
  1196. 2658.889:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
  1197. 2658.891:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1198. 2658.891:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1199. 2658.893:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1200. 2658.894:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1201. 2658.894:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1202. 2658.895:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  1203. 2658.895:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1204. 2658.897:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  1205. 2658.897:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  1206. 2658.898:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  1207. 2658.898:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  1208. 2658.967:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 0000000393730000: builtin
  1209. 2658.969:0030:00a4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  1210. 2658.975:0094:00ac:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
  1211. 2658.977:0094:00b0:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
  1212. 2658.982:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\sharedgpures.sys" at 000000029E400000: builtin
  1213. 2659.038:00b4:00b8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1214. 2659.038:00b4:00b8:trace:seh:install_bpf Seccomp filters already installed.
  1215. 2659.040:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
  1216. 2659.041:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1217. 2659.041:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1218. 2659.044:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1219. 2659.046:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1220. 2659.046:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1221. 2659.046:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  1222. 2659.057:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 000000029E840000: builtin
  1223. 2659.058:00b4:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1224. 2659.060:0030:00bc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  1225. 2659.065:00b4:00c4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
  1226. 2659.072:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\nsiproxy.sys" at 000000033BB90000: builtin
  1227. 2659.083:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 0000000296590000: builtin
  1228. 2659.084:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\nsi.dll" at 000000026C190000: builtin
  1229. 2659.085:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00000003982D0000: builtin
  1230. 2659.085:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 0000000212240000: builtin
  1231. 2659.097:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  1232. 2659.098:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  1233. 2659.098:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  1234. 2659.098:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  1235. 2659.100:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000002BDE30000: builtin
  1236. 2659.100:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002A2380000: builtin
  1237. 2659.100:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 000000023BC00000: builtin
  1238. 2659.176:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 0000000393730000: builtin
  1239. 2659.178:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1240. 2659.178:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 000000031C5D0000: builtin
  1241. 2659.178:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 000000020B860000: builtin
  1242. 2659.184:0020:0024:trace:seh:install_bpf Installing seccomp filters.
  1243. 2659.184:0020:0024:trace:seh:check_bpf_jit_enable enabled 0x31.
  1244. 2659.186:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 00007F114F170000: builtin
  1245. 2659.187:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1246. 2659.187:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1247. 2659.190:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1248. 2659.191:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1249. 2659.191:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1250. 2659.191:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  1251. 2659.192:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\cabinet.dll" at 0000000309660000: builtin
  1252. 2659.196:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  1253. 2659.196:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  1254. 2659.197:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  1255. 2659.197:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  1256. 2659.197:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 0000000393730000: builtin
  1257. 2659.197:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002FB3C0000: builtin
  1258. 2659.199:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00000002EE630000: builtin
  1259. 2659.199:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\crypt32.dll" at 00000002964D0000: builtin
  1260. 2659.201:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 000000023ECB0000: builtin
  1261. 2659.201:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imagehlp.dll" at 00000002604A0000: builtin
  1262. 2659.201:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mspatcha.dll" at 0000000311BC0000: builtin
  1263. 2659.202:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\odbccp32.dll" at 00000003681B0000: builtin
  1264. 2659.204:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1265. 2659.205:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 000000031C5D0000: builtin
  1266. 2659.205:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 000000020B860000: builtin
  1267. 2659.205:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000001D0E20000: builtin
  1268. 2659.208:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000002BDE30000: builtin
  1269. 2659.208:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002A2380000: builtin
  1270. 2659.208:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 000000023BC00000: builtin
  1271. 2659.209:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sxs.dll" at 00000002B4DE0000: builtin
  1272. 2659.211:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 0000000250CD0000: builtin
  1273. 2659.212:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 0000000370F70000: builtin
  1274. 2659.212:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 0000000345640000: builtin
  1275. 2659.212:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\urlmon.dll" at 00000001DE160000: builtin
  1276. 2659.213:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wintrust.dll" at 00000002A3D30000: builtin
  1277. 2659.213:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msi.dll" at 0000000392C60000: builtin
  1278. 2659.312:00d4:00d8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1279. 2659.312:00d4:00d8:trace:seh:install_bpf Seccomp filters already installed.
  1280. 2659.314:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
  1281. 2659.316:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1282. 2659.316:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1283. 2659.320:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1284. 2659.321:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1285. 2659.321:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1286. 2659.322:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  1287. 2659.324:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  1288. 2659.325:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  1289. 2659.326:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  1290. 2659.326:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  1291. 2659.327:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1292. 2659.406:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 0000000393730000: builtin
  1293. 2659.410:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 0000000251D80000: builtin
  1294. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1295. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1296. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1297. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1298. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1299. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1300. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1301. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1302. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1303. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1304. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1305. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1306. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1307. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1308. 2659.576:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 000000026C230000: builtin
  1309. 2659.614:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000002BDE30000: builtin
  1310. 2659.614:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002A2380000: builtin
  1311. 2659.614:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 000000023BC00000: builtin
  1312. 2659.620:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 000000031C5D0000: builtin
  1313. 2659.620:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 000000020B860000: builtin
  1314. 2659.622:00d4:00e0:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
  1315. 2659.624:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000001D0E20000: builtin
  1316. 2659.625:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000002F3610000: builtin
  1317. 2659.625:00d4:00d8:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1318. 2659.625:00d4:00d8:warn:seh:dispatch_exception unknown exception (code=6ba) raised
  1319. 2659.625:00d4:00d8:trace:seh:dispatch_exception rax=000000000021e7b0 rbx=000000000021ea98 rcx=000000000021e7b0 rdx=0000000000000000
  1320. 2659.625:00d4:00d8:trace:seh:dispatch_exception rsi=000000000000006c rdi=00000000009f3920 rbp=000000000021e880 rsp=000000000021e790
  1321. 2659.625:00d4:00d8:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000009f3a60 r11=0000000000000014
  1322. 2659.625:00d4:00d8:trace:seh:dispatch_exception r12=000000000021ea98 r13=00000000009f24a0 r14=00000000009f0e00 r15=0000000000000001
  1323. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp 21e790
  1324. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func cd48-cdbf
  1325. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  1326. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  1327. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind inside epilog.
  1328. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 1 rip 3684499f6 rsp 21e860
  1329. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  1330. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  1331. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1332. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1333. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1334. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1335. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 1 rip 368436086 rsp 21e890
  1336. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 15ff0-16087
  1337. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  1338. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1339. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  1340. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  1341. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  1342. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  1343. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  1344. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1345. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 1 rip 31c5ee7f5 rsp 21e900
  1346. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 1e700-1e953
  1347. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C610DAC flags 0 prolog 0x19 bytes function 000000031C5EE700-000000031C5EE953
  1348. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1349. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x19: leaq 0x80(%rsp),rbp
  1350. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x11: subq $0x330,%rsp
  1351. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xa: pushq %rbx
  1352. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x9: pushq %rsi
  1353. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: pushq %rdi
  1354. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: pushq %r12
  1355. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x5: pushq %r13
  1356. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r14
  1357. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1358. 2659.625:00d4:00d8:trace:seh:call_stack_handlers found wine frame 000000000021E970 rsp 000000000021EC70 handler 000000031C5E4F90
  1359. 2659.625:00d4:00d8:trace:seh:call_teb_handler calling TEB handler 000000031C5E4F90 (rec=000000000021E7B0, frame=000000000021E970 context=000000000021DCE0, dispatch=000000000021DBB0)
  1360. 2659.625:00d4:00d8:trace:seh:call_teb_handler handler at 000000031C5E4F90 returned 1
  1361. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 1 rip 31c5f18f4 rsp 21ec70
  1362. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 21810-2191a
  1363. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C6103E0 flags 0 prolog 0x13 bytes function 000000031C5F1810-000000031C5F191A
  1364. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1365. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x13: leaq 0x80(%rsp),rbp
  1366. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xb: subq $0x170,%rsp
  1367. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  1368. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r12
  1369. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1370. 2659.625:00d4:00d8:trace:seh:call_stack_handlers found wine frame 000000000021ECB0 rsp 000000000021EE00 handler 000000031C5E5240
  1371. 2659.625:00d4:00d8:trace:seh:call_teb_handler calling TEB handler 000000031C5E5240 (rec=000000000021E7B0, frame=000000000021ECB0 context=000000000021DCE0, dispatch=000000000021DBB0)
  1372. 2659.625:00d4:00d8:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000021ECB0 target_ip=000000031C5D3EAA rip=0000000170033aa5
  1373. 2659.625:00d4:00d8:trace:unwind:RtlUnwindEx rax=000000007fee0000 rbx=000000000021e970 rcx=000000000021d5a0 rdx=000000031c5d3eaa
  1374. 2659.625:00d4:00d8:trace:unwind:RtlUnwindEx rsi=000000000021d050 rdi=000000000021dce0 rbp=000000000021cf60 rsp=000000000021cee0
  1375. 2659.625:00d4:00d8:trace:unwind:RtlUnwindEx r8=000000000021e7b0 r9=000000031c5f5bf0 r10=00007fe81f2c2600 r11=0000000000000202
  1376. 2659.625:00d4:00d8:trace:unwind:RtlUnwindEx r12=000000000021e7b0 r13=000000000021d5a0 r14=000000000021ecb0 r15=000000017006d3b0
  1377. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp 21cee0
  1378. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 33a50-341b8
  1379. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  1380. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1381. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  1382. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  1383. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1384. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1385. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1386. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1387. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1388. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1389. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1390. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1391. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp 21d570
  1392. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 33a10-33a41
  1393. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  1394. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1395. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  1396. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  1397. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1398. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 31c5d3eaa rsp 21da80
  1399. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 3e90-3eac
  1400. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C610EC4 flags 0 prolog 0x8 bytes function 000000031C5D3E90-000000031C5D3EAC
  1401. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1402. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1403. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1404. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1405. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 31c5f5bed rsp 21dab0
  1406. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 25bc0-25bee
  1407. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C610ED0 flags 0 prolog 0x8 bytes function 000000031C5F5BC0-000000031C5F5BEE
  1408. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1409. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1410. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1411. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1412. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 31c5e5298 rsp 21dae0
  1413. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 15240-15299
  1414. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C610EE8 flags 0 prolog 0x10 bytes function 000000031C5E5240-000000031C5E5299
  1415. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  1416. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  1417. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  1418. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: pushq %r12
  1419. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x5: pushq %r13
  1420. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r14
  1421. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1422. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp 21db40
  1423. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 41e40-42301
  1424. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  1425. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1426. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  1427. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  1428. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1429. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1430. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1431. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1432. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1433. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1434. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1435. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1436. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp 21e200
  1437. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 44400-449ef
  1438. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  1439. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1440. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  1441. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  1442. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1443. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1444. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1445. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1446. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1447. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1448. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1449. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1450. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp 21e290
  1451. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func f0bc-f138
  1452. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  1453. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1454. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp 21e790
  1455. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func cd48-cdbf
  1456. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  1457. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  1458. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind inside epilog.
  1459. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 3684499f6 rsp 21e860
  1460. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 299e0-29a2b
  1461. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 0000000368489D04 flags 0 prolog 0x8 bytes function 00000003684499E0-0000000368449A2B
  1462. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1463. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1464. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1465. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1466. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 368436086 rsp 21e890
  1467. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 15ff0-16087
  1468. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 0000000368487444 flags 0 prolog 0xd bytes function 0000000368435FF0-0000000368436087
  1469. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1470. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
  1471. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
  1472. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  1473. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %rsi
  1474. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x2: pushq %rdi
  1475. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1476. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 31c5ee7f5 rsp 21e900
  1477. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 1e700-1e953
  1478. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C610DAC flags 0 prolog 0x19 bytes function 000000031C5EE700-000000031C5EE953
  1479. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1480. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x19: leaq 0x80(%rsp),rbp
  1481. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x11: subq $0x330,%rsp
  1482. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xa: pushq %rbx
  1483. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x9: pushq %rsi
  1484. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x8: pushq %rdi
  1485. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x7: pushq %r12
  1486. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x5: pushq %r13
  1487. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r14
  1488. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1489. 2659.625:00d4:00d8:trace:unwind:RtlUnwindEx found builtin frame 000000000021E970 handler 000000031C5E4F90
  1490. 2659.625:00d4:00d8:trace:unwind:call_teb_unwind_handler calling TEB handler 000000031C5E4F90 (rec=000000000021E7B0, frame=000000000021E970 context=000000000021D5A0, dispatch=000000000021CF60)
  1491. 2659.625:00d4:00d8:trace:unwind:call_teb_unwind_handler handler at 000000031C5E4F90 returned 1
  1492. 2659.625:00d4:00d8:trace:unwind:RtlVirtualUnwind type 2 rip 31c5f18f4 rsp 21ec70
  1493. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info **** func 21810-2191a
  1494. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info unwind info at 000000031C6103E0 flags 0 prolog 0x13 bytes function 000000031C5F1810-000000031C5F191A
  1495. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1496. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x13: leaq 0x80(%rsp),rbp
  1497. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0xb: subq $0x170,%rsp
  1498. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x4: pushq %rbx
  1499. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x3: pushq %r12
  1500. 2659.625:00d4:00d8:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1501. 2659.625:00d4:00d8:trace:seh:RtlRestoreContext returning to 000000031C5D3EAA stack 000000000021EC70
  1502. 2659.628:0030:00e4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  1503. 2659.678:00e8:00ec:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1504. 2659.678:00e8:00ec:trace:seh:install_bpf Seccomp filters already installed.
  1505. 2659.680:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
  1506. 2659.681:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1507. 2659.681:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1508. 2659.683:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1509. 2659.684:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1510. 2659.684:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1511. 2659.684:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  1512. 2659.685:00e8:00ec:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1513. 2659.696:0030:00f0:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  1514. 2659.699:0030:00f4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
  1515. 2659.703:00e8:00fc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
  1516. 2659.705:00e8:0100:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
  1517. 2659.706:00e8:0104:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
  1518. 2659.711:00e8:0108:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  1519. 2659.714:00e8:010c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
  1520. 2659.739:0110:0114:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1521. 2659.739:0110:0114:trace:seh:install_bpf Seccomp filters already installed.
  1522. 2659.741:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\tabtip.exe" at 0000000140000000: builtin
  1523. 2659.743:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1524. 2659.743:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1525. 2659.747:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1526. 2659.749:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1527. 2659.749:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1528. 2659.749:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00000001D8C90000: builtin
  1529. 2659.752:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  1530. 2659.752:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  1531. 2659.753:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  1532. 2659.753:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  1533. 2659.754:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1534. 2659.754:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 000000031C5D0000: builtin
  1535. 2659.754:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 000000020B860000: builtin
  1536. 2659.755:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000001D0E20000: builtin
  1537. 2659.758:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000002BDE30000: builtin
  1538. 2659.758:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002A2380000: builtin
  1539. 2659.758:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 000000023BC00000: builtin
  1540. 2659.842:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 0000000393730000: builtin
  1541. 2659.845:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 0000000251D80000: builtin
  1542. 2659.845:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleacc.dll" at 00000003B8910000: builtin
  1543. 2659.845:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uiautomationcore.dll" at 000000029DB00000: builtin
  1544. 2659.846:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 0000000251D80000: builtin
  1545. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1546. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1547. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1548. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1549. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1550. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1551. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1552. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1553. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1554. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1555. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1556. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1557. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1558. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1559. 2659.928:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 000000026C230000: builtin
  1560. 2659.932:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 000000026C230000: builtin
  1561. 2659.936:0110:0114:fixme:oleacc:find_class_data unhandled window class: L"#32769"
  1562. 2659.936:0110:0114:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
  1563. 2659.937:0110:0114:fixme:uiautomation:msaa_provider_GetPropertyValue Unimplemented propertyId 30024
  1564. 2659.938:0110:011c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
  1565. 2659.941:0110:0114:fixme:uiautomation:msaa_fragment_get_FragmentRoot 0000000000469C68, 000000000021FA90: stub!
  1566. Setting breakpad minidump AppID = 374320
  1567. Steam_SetMinidumpSteamID: Caching Steam ID: 76561198077580653 [API loaded no]
  1568. 2659.957:0020:0024:fixme:steam:setup_steam_registry Game language "english", defaulting LC_CTYPE / LC_MESSAGES to en_US.UTF-8.
  1569. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1570. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1571. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1572. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1573. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1574. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1575. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1576. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1577. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1578. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1579. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1580. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1581. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1582. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1583. 2660.012:0110:0120:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
  1584. 2660.012:0110:0120:fixme:uiautomation:msaa_provider_GetPropertyValue Unimplemented propertyId 30024
  1585. 2660.015:0110:0120:fixme:uiautomation:msaa_fragment_get_FragmentRoot 00000000004CD658, 0000000001B2FAB0: stub!
  1586. 2660.018:0110:0120:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
  1587. 2660.018:0110:0120:fixme:uiautomation:msaa_provider_GetPropertyValue Unimplemented propertyId 30024
  1588. 2660.021:0110:0120:fixme:uiautomation:msaa_fragment_get_FragmentRoot 00000000004CD6D8, 0000000001B2FAB0: stub!
  1589. 2660.234:0134:0138:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
  1590. 2660.234:0134:0138:trace:seh:install_bpf Seccomp filters already installed.
  1591. 2660.236:0134:0138:trace:loaddll:build_module Loaded L"S:\\common\\DARK SOULS III\\Game\\DarkSoulsIII.exe" at 0000000140000000: native
  1592. 2660.237:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  1593. 2660.237:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
  1594. 2660.240:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000000228280000: builtin
  1595. 2660.242:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000002C7470000: builtin
  1596. 2660.242:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 00000001EAF60000: builtin
  1597. 2660.242:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 00000001D8C90000: builtin
  1598. 2660.246:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 000000025DC30000: builtin
  1599. 2660.246:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32u.dll" at 00000002C73A0000: builtin
  1600. 2660.247:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00000002169D0000: builtin
  1601. 2660.247:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00000002BB0A0000: builtin
  1602. 2660.248:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000002BDE30000: builtin
  1603. 2660.248:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002A2380000: builtin
  1604. 2660.248:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 000000023BC00000: builtin
  1605. 2660.248:0134:0138:trace:loaddll:build_module Loaded L"S:\\common\\DARK SOULS III\\Game\\steam_api64.dll" at 000000003B400000: native
  1606. 2660.250:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00000002EDF00000: native
  1607. 2660.257:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 0000000370F70000: builtin
  1608. 2660.261:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 0000000296590000: builtin
  1609. 2660.262:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\nsi.dll" at 000000026C190000: builtin
  1610. 2660.262:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00000003982D0000: builtin
  1611. 2660.262:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WSOCK32.dll" at 00000002C85A0000: builtin
  1612. 2660.264:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000351A60000: builtin
  1613. 2660.266:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000368420000: builtin
  1614. 2660.266:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 000000031C5D0000: builtin
  1615. 2660.266:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 000000020B860000: builtin
  1616. 2660.266:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000002945E0000: builtin
  1617. 2660.266:0134:0138:trace:loaddll:build_module Loaded L"S:\\common\\DARK SOULS III\\Game\\fmodex64.dll" at 0000000180000000: native
  1618. 2660.267:0134:0138:trace:loaddll:build_module Loaded L"S:\\common\\DARK SOULS III\\Game\\fmod_event64.dll" at 0000000000460000: native
  1619. 2660.269:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\secur32.dll" at 00000003AFEF0000: builtin
  1620. 2660.269:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WLDAP32.dll" at 0000000288480000: builtin
  1621. 2660.270:0134:0138:trace:loaddll:build_module Loaded L"S:\\common\\DARK SOULS III\\Game\\binkw64.dll" at 00000000004F0000: native
  1622. 2660.271:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 00000001D0E20000: builtin
  1623. 2660.272:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IMM32.dll" at 0000000393730000: builtin
  1624. 2660.273:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3d11.dll" at 0000000359050000: native
  1625. 2660.277:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3dx11_43.dll" at 0000000000540000: native
  1626. 2660.278:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3d9.dll" at 0000000270F60000: native
  1627. 2660.283:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3dx9_43.dll" at 0000000000590000: native
  1628. 2660.286:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000002E0D50000: builtin
  1629. 2660.287:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000036D860000: builtin
  1630. 2660.287:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\XINPUT1_3.dll" at 00000002E99A0000: builtin
  1631. 2660.289:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002FB3C0000: builtin
  1632. 2660.289:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 0000000267710000: builtin
  1633. 2660.293:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\D3DCOMPILER_43.dll" at 0000000000800000: native
  1634. 2660.385:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Kerberos.dll" at 00000001CE760000: builtin
  1635. 2660.385:0134:0138:err:kerberos:kerberos_LsaApInitializePackage no Kerberos support, expect problems
  1636. 2660.388:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\netapi32.dll" at 00000001D4930000: builtin
  1637. 2660.388:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSV1_0.dll" at 0000000311F40000: builtin
  1638. 2660.388:0134:0138:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
  1639. 2660.388:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\MSV1_0.dll" : builtin
  1640. 2660.397:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\netapi32.dll" : builtin
  1641. 2660.416:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 0000000251D80000: builtin
  1642. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1643. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1644. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1645. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1646. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1647. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1648. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1649. 2660.503:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 000000026C230000: builtin
  1650. 2660.564:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at 00007FA4DEF80000: builtin
  1651. 2660.564:0134:0138:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient64.dll" at 0000000138000000: native
  1652. 2660.565:0134:0138:warn:debugstr:OutputDebugStringA "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient64.dll' OK.\n"
  1653. 2660.565:0134:0138:trace:seh:dispatch_exception code=40010006 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1654. 2660.565:0134:0138:trace:seh:dispatch_exception info[0]=0000000000000056
  1655. 2660.565:0134:0138:trace:seh:dispatch_exception info[1]=000000000011cb90
  1656. 2660.565:0134:0138:warn:seh:dispatch_exception "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient64.dll' OK.\n"
  1657. 2660.565:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=40010006 flags=0
  1658. 2660.565:0134:0138:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned 0
  1659. 2660.565:0134:0138:trace:seh:call_vectored_handlers calling handler at 000000035906B320 code=40010006 flags=0
  1660. 2660.565:0134:0138:trace:seh:call_vectored_handlers handler at 000000035906B320 returned 0
  1661. 2660.565:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000002EDF1C050 code=40010006 flags=0
  1662. 2660.565:0134:0138:trace:seh:call_vectored_handlers handler at 00000002EDF1C050 returned 0
  1663. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 1 rip 7b00cdb7 rsp 11c790
  1664. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func cd48-cdbf
  1665. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  1666. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  1667. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind inside epilog.
  1668. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 1 rip 7b622314 rsp 11c860
  1669. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 22090-22580
  1670. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B63B34C flags 0 prolog 0x21 bytes function 000000007B622090-000000007B622580
  1671. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1672. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x21: leaq 0x80(%rsp),rbp
  1673. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x19: subq $0x2a8,%rsp
  1674. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x12: pushq %rbx
  1675. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x11: pushq %r12
  1676. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xf: pushq %r13
  1677. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xd: pushq %r14
  1678. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xb: pushq %r15
  1679. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1680. 2660.565:0134:0138:trace:seh:call_stack_handlers found wine frame 000000000011C9D0 rsp 000000000011CB40 handler 000000007B629ED0
  1681. 2660.565:0134:0138:trace:seh:call_teb_handler calling TEB handler 000000007B629ED0 (rec=000000000011C7B0, frame=000000000011C9D0 context=000000000011BCE0, dispatch=000000000011BBB0)
  1682. 2660.565:0134:0138:trace:unwind:RtlUnwindEx code=40010006 flags=2 end_frame=000000000011C9D0 target_ip=000000007B61417A rip=0000000170033aa5
  1683. 2660.565:0134:0138:trace:unwind:RtlUnwindEx info[0]=0000000000000056
  1684. 2660.565:0134:0138:trace:unwind:RtlUnwindEx info[1]=000000000011cb90
  1685. 2660.565:0134:0138:trace:unwind:RtlUnwindEx rax=000000007fee0000 rbx=000000000011c9d0 rcx=000000000011b5a0 rdx=000000007b61417a
  1686. 2660.565:0134:0138:trace:unwind:RtlUnwindEx rsi=000000000011b050 rdi=000000000011bce0 rbp=000000000011af60 rsp=000000000011aee0
  1687. 2660.565:0134:0138:trace:unwind:RtlUnwindEx r8=000000000011c7b0 r9=000000007b62cf80 r10=00007fa4ee985600 r11=0000000000000202
  1688. 2660.565:0134:0138:trace:unwind:RtlUnwindEx r12=000000000011c7b0 r13=000000000011b5a0 r14=000000000011c9d0 r15=000000017006d3b0
  1689. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 170033aa5 rsp 11aee0
  1690. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 33a50-341b8
  1691. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000017008E3B0 flags 0 prolog 0x1b bytes function 0000000170033A50-00000001700341B8
  1692. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1693. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  1694. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
  1695. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1696. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1697. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1698. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1699. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1700. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1701. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1702. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1703. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 170033a37 rsp 11b570
  1704. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 33a10-33a41
  1705. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000017008E3CC flags 0 prolog 0x10 bytes function 0000000170033A10-0000000170033A41
  1706. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1707. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
  1708. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
  1709. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1710. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 7b61417a rsp 11ba80
  1711. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 14160-1417c
  1712. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B63CCF4 flags 0 prolog 0x8 bytes function 000000007B614160-000000007B61417C
  1713. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1714. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1715. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1716. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1717. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 7b62cf7d rsp 11bab0
  1718. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 2cf50-2cf7e
  1719. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B63CD00 flags 0 prolog 0x8 bytes function 000000007B62CF50-000000007B62CF7E
  1720. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
  1721. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
  1722. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  1723. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1724. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 7b629f28 rsp 11bae0
  1725. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 29ed0-29f29
  1726. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B63CD18 flags 0 prolog 0x10 bytes function 000000007B629ED0-000000007B629F29
  1727. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
  1728. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
  1729. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
  1730. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x7: pushq %r12
  1731. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x5: pushq %r13
  1732. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x3: pushq %r14
  1733. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1734. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 170042062 rsp 11bb40
  1735. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 41e40-42301
  1736. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000017008E334 flags 0 prolog 0x1b bytes function 0000000170041E40-0000000170042301
  1737. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1738. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
  1739. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
  1740. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1741. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1742. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1743. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1744. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1745. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1746. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1747. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1748. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 170044739 rsp 11c200
  1749. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 44400-449ef
  1750. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000017008E350 flags 0 prolog 0x15 bytes function 0000000170044400-00000001700449EF
  1751. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
  1752. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
  1753. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
  1754. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xc: pushq %rbx
  1755. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xb: pushq %rsi
  1756. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xa: pushq %rdi
  1757. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x9: pushq %r12
  1758. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x7: pushq %r13
  1759. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x5: pushq %r14
  1760. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x3: pushq %r15
  1761. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x1: pushq %rbp
  1762. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 17000f12b rsp 11c290
  1763. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func f0bc-f138
  1764. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000017008E264 flags 0 prolog 0x7 bytes function 000000017000F0BC-000000017000F138
  1765. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
  1766. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 7b00cdb7 rsp 11c790
  1767. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func cd48-cdbf
  1768. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B0AD730 flags 0 prolog 0xf bytes function 000000007B00CD48-000000007B00CDBF
  1769. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
  1770. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind inside epilog.
  1771. 2660.565:0134:0138:trace:unwind:RtlVirtualUnwind type 2 rip 7b622314 rsp 11c860
  1772. 2660.565:0134:0138:trace:unwind:dump_unwind_info **** func 22090-22580
  1773. 2660.565:0134:0138:trace:unwind:dump_unwind_info unwind info at 000000007B63B34C flags 0 prolog 0x21 bytes function 000000007B622090-000000007B622580
  1774. 2660.565:0134:0138:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
  1775. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x21: leaq 0x80(%rsp),rbp
  1776. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x19: subq $0x2a8,%rsp
  1777. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x12: pushq %rbx
  1778. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x11: pushq %r12
  1779. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xf: pushq %r13
  1780. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xd: pushq %r14
  1781. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0xb: pushq %r15
  1782. 2660.565:0134:0138:trace:unwind:dump_unwind_info 0x9: pushq %rbp
  1783. 2660.565:0134:0138:trace:seh:RtlRestoreContext returning to 000000007B61417A stack 000000000011C860
  1784. 2661.553:0134:0138:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\gameoverlayrenderer64.dll" at 0000000001E10000: native
  1785. 2661.555:0134:0144:fixme:ver:GetCurrentPackageId (000000000209FF50 0000000000000000): stub
  1786. 2661.555:0134:0144:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1787. 2661.555:0134:0144:trace:seh:dispatch_exception info[0]=0000000100001000
  1788. 2661.555:0134:0144:trace:seh:dispatch_exception info[1]=00000000002f8d08
  1789. 2661.555:0134:0144:trace:seh:dispatch_exception info[2]=0000000000000144
  1790. 2661.555:0134:0144:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1791. 2661.555:0134:0144:trace:seh:dispatch_exception rax=000000000209fe20 rbx=00000001447f18f0 rcx=000000000209fdf0 rdx=0000000000000000
  1792. 2661.555:0134:0144:trace:seh:dispatch_exception rsi=0000000000319360 rdi=00000000002f8d08 rbp=000000000209ffa0 rsp=000000000209fdd0
  1793. 2661.555:0134:0144:trace:seh:dispatch_exception r8=0000000000000144 r9=000000000209fed0 r10=0000000144929370 r11=00000001447eb600
  1794. 2661.555:0134:0144:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1795. 2661.555:0134:0144:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1796. 2661.555:0134:0144:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1797. 2661.558:0134:0148:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1798. 2661.558:0134:0148:trace:seh:dispatch_exception info[0]=0000000100001000
  1799. 2661.558:0134:0148:trace:seh:dispatch_exception info[1]=000000000031df58
  1800. 2661.558:0134:0148:trace:seh:dispatch_exception info[2]=0000000000000148
  1801. 2661.558:0134:0148:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1802. 2661.558:0134:0148:trace:seh:dispatch_exception rax=0000000002eefe20 rbx=00000001447f24b0 rcx=0000000002eefdf0 rdx=0000000000000000
  1803. 2661.558:0134:0148:trace:seh:dispatch_exception rsi=000000000031bb20 rdi=000000000031df58 rbp=0000000002eeffa0 rsp=0000000002eefdd0
  1804. 2661.558:0134:0148:trace:seh:dispatch_exception r8=0000000000000148 r9=0000000002eefed0 r10=0000000144929370 r11=00000001447eb600
  1805. 2661.558:0134:0148:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1806. 2661.558:0134:0148:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1807. 2661.558:0134:0148:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1808. 2661.560:0134:014c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1809. 2661.560:0134:014c:trace:seh:dispatch_exception info[0]=00007fff00001000
  1810. 2661.560:0134:014c:trace:seh:dispatch_exception info[1]=00007fff9e001d70
  1811. 2661.560:0134:014c:trace:seh:dispatch_exception info[2]=000000000000014c
  1812. 2661.560:0134:014c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1813. 2661.560:0134:014c:trace:seh:dispatch_exception rax=00000000030efe20 rbx=00007fff9e001cf0 rcx=00000000030efdf0 rdx=0000000000000000
  1814. 2661.560:0134:014c:trace:seh:dispatch_exception rsi=00000000002fa300 rdi=00007fff9e001d70 rbp=00000000030effa0 rsp=00000000030efdd0
  1815. 2661.560:0134:014c:trace:seh:dispatch_exception r8=000000000000014c r9=00000000030efed0 r10=0000000144929370 r11=00000001447f1670
  1816. 2661.560:0134:014c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1817. 2661.560:0134:014c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1818. 2661.560:0134:014c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1819. 2661.560:0134:0150:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1820. 2661.561:0134:0150:trace:seh:dispatch_exception info[0]=00007fff00001000
  1821. 2661.561:0134:0150:trace:seh:dispatch_exception info[1]=00007fff9e001e90
  1822. 2661.561:0134:0150:trace:seh:dispatch_exception info[2]=0000000000000150
  1823. 2661.561:0134:0150:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1824. 2661.561:0134:0150:trace:seh:dispatch_exception rax=00000000032efe20 rbx=00007fff9e001e10 rcx=00000000032efdf0 rdx=0000000000000000
  1825. 2661.561:0134:0150:trace:seh:dispatch_exception rsi=00000000002fd3c0 rdi=00007fff9e001e90 rbp=00000000032effa0 rsp=00000000032efdd0
  1826. 2661.561:0134:0150:trace:seh:dispatch_exception r8=0000000000000150 r9=00000000032efed0 r10=0000000144929370 r11=00000001447f12b0
  1827. 2661.561:0134:0150:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1828. 2661.561:0134:0150:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1829. 2661.561:0134:0150:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1830. 2661.561:0134:0154:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1831. 2661.561:0134:0154:trace:seh:dispatch_exception info[0]=00007fff00001000
  1832. 2661.561:0134:0154:trace:seh:dispatch_exception info[1]=00007fff9e001fb0
  1833. 2661.561:0134:0154:trace:seh:dispatch_exception info[2]=0000000000000154
  1834. 2661.561:0134:0154:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1835. 2661.561:0134:0154:trace:seh:dispatch_exception rax=00000000034efe20 rbx=00007fff9e001f30 rcx=00000000034efdf0 rdx=0000000000000000
  1836. 2661.561:0134:0154:trace:seh:dispatch_exception rsi=0000000000300480 rdi=00007fff9e001fb0 rbp=00000000034effa0 rsp=00000000034efdd0
  1837. 2661.561:0134:0154:trace:seh:dispatch_exception r8=0000000000000154 r9=00000000034efed0 r10=0000000144929370 r11=00000001447f1110
  1838. 2661.561:0134:0154:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1839. 2661.561:0134:0154:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1840. 2661.561:0134:0154:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1841. 2661.561:0134:0158:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1842. 2661.561:0134:0158:trace:seh:dispatch_exception info[0]=00007fff00001000
  1843. 2661.561:0134:0158:trace:seh:dispatch_exception info[1]=00007fff9e0020d0
  1844. 2661.561:0134:0158:trace:seh:dispatch_exception info[2]=0000000000000158
  1845. 2661.561:0134:0158:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1846. 2661.561:0134:0158:trace:seh:dispatch_exception rax=00000000036efe20 rbx=00007fff9e002050 rcx=00000000036efdf0 rdx=0000000000000000
  1847. 2661.561:0134:0158:trace:seh:dispatch_exception rsi=0000000000303540 rdi=00007fff9e0020d0 rbp=00000000036effa0 rsp=00000000036efdd0
  1848. 2661.561:0134:0158:trace:seh:dispatch_exception r8=0000000000000158 r9=00000000036efed0 r10=0000000144929370 r11=00000001447ef9f0
  1849. 2661.561:0134:0158:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1850. 2661.561:0134:0158:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1851. 2661.561:0134:0158:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1852. 2661.562:0134:015c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1853. 2661.562:0134:015c:trace:seh:dispatch_exception info[0]=00007fff00001000
  1854. 2661.562:0134:015c:trace:seh:dispatch_exception info[1]=00007fff9e0021f0
  1855. 2661.562:0134:015c:trace:seh:dispatch_exception info[2]=000000000000015c
  1856. 2661.562:0134:015c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1857. 2661.562:0134:015c:trace:seh:dispatch_exception rax=00000000038efe20 rbx=00007fff9e002170 rcx=00000000038efdf0 rdx=0000000000000000
  1858. 2661.562:0134:015c:trace:seh:dispatch_exception rsi=0000000000306600 rdi=00007fff9e0021f0 rbp=00000000038effa0 rsp=00000000038efdd0
  1859. 2661.562:0134:015c:trace:seh:dispatch_exception r8=000000000000015c r9=00000000038efed0 r10=0000000144929370 r11=00000001447ef3f0
  1860. 2661.562:0134:015c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1861. 2661.562:0134:015c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1862. 2661.562:0134:015c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1863. 2661.562:0134:0160:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1864. 2661.562:0134:0160:trace:seh:dispatch_exception info[0]=00007fff00001000
  1865. 2661.562:0134:0160:trace:seh:dispatch_exception info[1]=00007fff9e002310
  1866. 2661.562:0134:0160:trace:seh:dispatch_exception info[2]=0000000000000160
  1867. 2661.562:0134:0160:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1868. 2661.562:0134:0160:trace:seh:dispatch_exception rax=0000000003aefe20 rbx=00007fff9e002290 rcx=0000000003aefdf0 rdx=0000000000000000
  1869. 2661.562:0134:0160:trace:seh:dispatch_exception rsi=00000000003096c0 rdi=00007fff9e002310 rbp=0000000003aeffa0 rsp=0000000003aefdd0
  1870. 2661.562:0134:0160:trace:seh:dispatch_exception r8=0000000000000160 r9=0000000003aefed0 r10=0000000144929370 r11=00000001447eef10
  1871. 2661.562:0134:0160:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1872. 2661.562:0134:0160:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1873. 2661.562:0134:0160:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1874. info: Game: DarkSoulsIII.exe
  1875. info: DXVK: v2.3-21-g1b31aa5dbca0749
  1876. 2661.571:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 00000002D4AD0000: builtin
  1877. info: Vulkan: Found vkGetInstanceProcAddr in winevulkan.dll @ 0x2d4addb40
  1878. info: Built-in extension providers:
  1879. info: Win32 WSI
  1880. info: OpenVR
  1881. info: OpenXR
  1882. 2661.573:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineopenxr.dll" at 00007FA4DFEC0000: builtin
  1883. warn: OpenXR: Unable to get required Vulkan instance extensions size
  1884. info: Enabled instance extensions:
  1885. info: VK_EXT_surface_maintenance1
  1886. info: VK_KHR_get_surface_capabilities2
  1887. info: VK_KHR_surface
  1888. info: VK_KHR_win32_surface
  1889. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1890. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1891. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1892. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1893. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1894. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1895. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1896. warn: OpenXR: Unable to get required Vulkan Device extensions size
  1897. 2661.637:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\wineopenxr.dll" : builtin
  1898. info: AMD Radeon RX 6700 XT (RADV NAVI22):
  1899. info: Driver : radv 23.3.5
  1900. info: Memory Heap[0]:
  1901. info: Size: 8128 MiB
  1902. info: Flags: 0x0
  1903. info: Memory Type[2]: Property Flags = 0x6
  1904. info: Memory Type[5]: Property Flags = 0xe
  1905. info: Memory Type[6]: Property Flags = 0xe
  1906. info: Memory Type[8]: Property Flags = 0xc6
  1907. info: Memory Type[10]: Property Flags = 0xce
  1908. info: Memory Heap[1]:
  1909. info: Size: 12272 MiB
  1910. info: Flags: 0x1
  1911. info: Memory Type[0]: Property Flags = 0x1
  1912. info: Memory Type[1]: Property Flags = 0x1
  1913. info: Memory Type[3]: Property Flags = 0x7
  1914. info: Memory Type[4]: Property Flags = 0x7
  1915. info: Memory Type[7]: Property Flags = 0xc1
  1916. info: Memory Type[9]: Property Flags = 0xc7
  1917. 2661.639:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011F648 0000000001159500 000000000011F64C 0000000000EC0D20 0000000000000000): semi-stub
  1918. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1919. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1920. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1921. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1922. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1923. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  1924. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  1925. 2661.679:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011F648 0000000001159500 000000000011F64C 0000000000EC0D20 0000000000000000): semi-stub
  1926. 2661.683:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011F6B8 0000000001159500 000000000011F6BC 0000000000EC0D20 0000000000000000): semi-stub
  1927. 2661.685:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011C48C 0000000001159500 000000000011C4F0 0000000000EC0D20 0000000000000000): semi-stub
  1928. 2661.689:0134:0138:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\winevulkan.dll" : builtin
  1929. 2661.711:00d4:00d8:fixme:imm:ImeSetActiveContext (0000000000010026, 0): stub
  1930. 2661.711:00d4:00d8:fixme:imm:ImmReleaseContext (0000000000010020, 0000000000010026): stub
  1931. 2661.792:0110:0120:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
  1932. 2661.792:0110:0120:fixme:uiautomation:msaa_provider_GetPropertyValue Unimplemented propertyId 30024
  1933. 2661.795:0110:0120:fixme:uiautomation:msaa_fragment_get_FragmentRoot 00000000004CF3D8, 0000000001B2FAB0: stub!
  1934. 2661.810:0134:016c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1935. 2661.810:0134:016c:trace:seh:dispatch_exception info[0]=00007fff00001000
  1936. 2661.810:0134:016c:trace:seh:dispatch_exception info[1]=000000000031e318
  1937. 2661.811:0134:016c:trace:seh:dispatch_exception info[2]=000000000000016c
  1938. 2661.811:0134:016c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1939. 2661.811:0134:016c:trace:seh:dispatch_exception rax=0000000003d3fe20 rbx=00007fff9e016780 rcx=0000000003d3fdf0 rdx=0000000000000000
  1940. 2661.811:0134:016c:trace:seh:dispatch_exception rsi=000000000030fbd0 rdi=000000000031e318 rbp=0000000003d3ffa0 rsp=0000000003d3fdd0
  1941. 2661.811:0134:016c:trace:seh:dispatch_exception r8=000000000000016c r9=0000000003d3fed0 r10=0000000144929370 r11=00000001447eebd0
  1942. 2661.811:0134:016c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1943. 2661.811:0134:016c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1944. 2661.811:0134:016c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1945. 2661.811:0134:0170:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1946. 2661.811:0134:0170:trace:seh:dispatch_exception info[0]=00007fff00001000
  1947. 2661.811:0134:0170:trace:seh:dispatch_exception info[1]=0000000000313138
  1948. 2661.811:0134:0170:trace:seh:dispatch_exception info[2]=0000000000000170
  1949. 2661.811:0134:0170:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1950. 2661.811:0134:0170:trace:seh:dispatch_exception rax=0000000003f3fe20 rbx=00007ffffebb0050 rcx=0000000003f3fdf0 rdx=0000000000000000
  1951. 2661.811:0134:0170:trace:seh:dispatch_exception rsi=0000000000310050 rdi=0000000000313138 rbp=0000000003f3ffa0 rsp=0000000003f3fdd0
  1952. 2661.811:0134:0170:trace:seh:dispatch_exception r8=0000000000000170 r9=0000000003f3fed0 r10=0000000144929370 r11=00000001447ee080
  1953. 2661.811:0134:0170:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1954. 2661.811:0134:0170:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1955. 2661.811:0134:0170:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1956. 2661.811:0134:0174:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1957. 2661.811:0134:0174:trace:seh:dispatch_exception info[0]=00007fff00001000
  1958. 2661.811:0134:0174:trace:seh:dispatch_exception info[1]=00000000003131b8
  1959. 2661.811:0134:0174:trace:seh:dispatch_exception info[2]=0000000000000174
  1960. 2661.811:0134:0174:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1961. 2661.811:0134:0174:trace:seh:dispatch_exception rax=000000000413fe20 rbx=00007ffffebb0120 rcx=000000000413fdf0 rdx=0000000000000000
  1962. 2661.811:0134:0174:trace:seh:dispatch_exception rsi=0000000000314aa0 rdi=00000000003131b8 rbp=000000000413ffa0 rsp=000000000413fdd0
  1963. 2661.811:0134:0174:trace:seh:dispatch_exception r8=0000000000000174 r9=000000000413fed0 r10=0000000144929370 r11=00000001447edc20
  1964. 2661.811:0134:0174:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1965. 2661.811:0134:0174:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1966. 2661.811:0134:0174:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1967. 2661.811:0134:017c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1968. 2661.811:0134:017c:trace:seh:dispatch_exception info[0]=00007fff00001000
  1969. 2661.811:0134:017c:trace:seh:dispatch_exception info[1]=00000000003132b8
  1970. 2661.811:0134:017c:trace:seh:dispatch_exception info[2]=000000000000017c
  1971. 2661.811:0134:017c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1972. 2661.811:0134:017c:trace:seh:dispatch_exception rax=000000000453fe20 rbx=00007ffffebb02c0 rcx=000000000453fdf0 rdx=0000000000000000
  1973. 2661.811:0134:017c:trace:seh:dispatch_exception rsi=0000000000336d60 rdi=00000000003132b8 rbp=000000000453ffa0 rsp=000000000453fdd0
  1974. 2661.811:0134:017c:trace:seh:dispatch_exception r8=000000000000017c r9=000000000453fed0 r10=0000000144929370 r11=00000001447ed5a0
  1975. 2661.811:0134:017c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1976. 2661.811:0134:017c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1977. 2661.811:0134:017c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1978. 2661.812:0134:0180:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1979. 2661.812:0134:0188:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  1980. 2661.812:0134:0180:trace:seh:dispatch_exception info[0]=00007fff00001000
  1981. 2661.812:0134:0188:trace:seh:dispatch_exception info[0]=00007fff00001000
  1982. 2661.812:0134:0180:trace:seh:dispatch_exception info[1]=00000000003133b8
  1983. 2661.812:0134:0188:trace:seh:dispatch_exception info[1]=00000000003134b8
  1984. 2661.812:0134:0180:trace:seh:dispatch_exception info[2]=0000000000000180
  1985. 2661.812:0134:0188:trace:seh:dispatch_exception info[2]=0000000000000188
  1986. 2661.812:0134:0180:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1987. 2661.812:0134:0188:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  1988. 2661.812:0134:0180:trace:seh:dispatch_exception rax=000000000473fe20 rbx=00007ffffebb03d0 rcx=000000000473fdf0 rdx=0000000000000000
  1989. 2661.812:0134:0188:trace:seh:dispatch_exception rax=0000000004b3fe20 rbx=00007ffffebb0570 rcx=0000000004b3fdf0 rdx=0000000000000000
  1990. 2661.812:0134:0180:trace:seh:dispatch_exception rsi=0000000000340c80 rdi=00000000003133b8 rbp=000000000473ffa0 rsp=000000000473fdd0
  1991. 2661.812:0134:0188:trace:seh:dispatch_exception rsi=00000000003462d0 rdi=00000000003134b8 rbp=0000000004b3ffa0 rsp=0000000004b3fdd0
  1992. 2661.812:0134:0180:trace:seh:dispatch_exception r8=0000000000000180 r9=000000000473fed0 r10=0000000144929370 r11=00000001447f1980
  1993. 2661.812:0134:0188:trace:seh:dispatch_exception r8=0000000000000188 r9=0000000004b3fed0 r10=0000000144929370 r11=00000001447ec250
  1994. 2661.812:0134:0180:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1995. 2661.812:0134:0188:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  1996. 2661.812:0134:0180:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1997. 2661.812:0134:0188:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  1998. 2661.812:0134:0180:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  1999. 2661.812:0134:0188:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2000. 2661.812:0134:0178:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2001. 2661.812:0134:0178:trace:seh:dispatch_exception info[0]=00007fff00001000
  2002. 2661.812:0134:0178:trace:seh:dispatch_exception info[1]=0000000000313238
  2003. 2661.812:0134:0178:trace:seh:dispatch_exception info[2]=0000000000000178
  2004. 2661.812:0134:0178:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2005. 2661.812:0134:0178:trace:seh:dispatch_exception rax=000000000433fe20 rbx=00007ffffebb01f0 rcx=000000000433fdf0 rdx=0000000000000000
  2006. 2661.812:0134:0178:trace:seh:dispatch_exception rsi=00000000003169b0 rdi=0000000000313238 rbp=000000000433ffa0 rsp=000000000433fdd0
  2007. 2661.813:0134:0178:trace:seh:dispatch_exception r8=0000000000000178 r9=000000000433fed0 r10=0000000144929370 r11=00000001447f27b0
  2008. 2661.813:0134:0178:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2009. 2661.813:0134:0178:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2010. 2661.813:0134:0178:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2011. 2661.813:0134:0190:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2012. 2661.813:0134:0190:trace:seh:dispatch_exception info[0]=00007fff00001000
  2013. 2661.813:0134:0190:trace:seh:dispatch_exception info[1]=00000000003136b8
  2014. 2661.813:0134:0190:trace:seh:dispatch_exception info[2]=0000000000000190
  2015. 2661.813:0134:0198:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2016. 2661.813:0134:0190:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2017. 2661.813:0134:0198:trace:seh:dispatch_exception info[0]=00007fff00001000
  2018. 2661.813:0134:0190:trace:seh:dispatch_exception rax=0000000004f3fe20 rbx=00007ffffebb0790 rcx=0000000004f3fdf0 rdx=0000000000000000
  2019. 2661.813:0134:0198:trace:seh:dispatch_exception info[1]=00000000003138b8
  2020. 2661.813:0134:0190:trace:seh:dispatch_exception rsi=0000000000350670 rdi=00000000003136b8 rbp=0000000004f3ffa0 rsp=0000000004f3fdd0
  2021. 2661.813:0134:0198:trace:seh:dispatch_exception info[2]=0000000000000198
  2022. 2661.813:0134:0190:trace:seh:dispatch_exception r8=0000000000000190 r9=0000000004f3fed0 r10=0000000144929370 r11=00000001447ebad0
  2023. 2661.813:0134:0198:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2024. 2661.813:0134:0184:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2025. 2661.813:0134:0190:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2026. 2661.813:0134:0198:trace:seh:dispatch_exception rax=000000000553fe20 rbx=00007ffffebb09b0 rcx=000000000553fdf0 rdx=0000000000000000
  2027. 2661.813:0134:0184:trace:seh:dispatch_exception info[0]=00007fff00001000
  2028. 2661.813:0134:0190:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2029. 2661.813:0134:0198:trace:seh:dispatch_exception rsi=0000000000358990 rdi=00000000003138b8 rbp=000000000553ffa0 rsp=000000000553fdd0
  2030. 2661.813:0134:0184:trace:seh:dispatch_exception info[1]=0000000000313438
  2031. 2661.813:0134:0190:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2032. 2661.813:0134:0198:trace:seh:dispatch_exception r8=0000000000000198 r9=000000000553fed0 r10=0000000144929370 r11=00000001447eb870
  2033. 2661.813:0134:0184:trace:seh:dispatch_exception info[2]=0000000000000184
  2034. 2661.813:0134:0198:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2035. 2661.813:0134:0184:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2036. 2661.814:0134:0198:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2037. 2661.814:0134:0184:trace:seh:dispatch_exception rax=000000000493fe20 rbx=00007ffffebb04a0 rcx=000000000493fdf0 rdx=0000000000000000
  2038. 2661.814:0134:0198:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2039. 2661.814:0134:0184:trace:seh:dispatch_exception rsi=0000000000341100 rdi=0000000000313438 rbp=000000000493ffa0 rsp=000000000493fdd0
  2040. 2661.814:0134:0194:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2041. 2661.814:0134:0184:trace:seh:dispatch_exception r8=0000000000000184 r9=000000000493fed0 r10=0000000144929370 r11=00000001447eb1f0
  2042. 2661.814:0134:0194:trace:seh:dispatch_exception info[0]=00007fff00001000
  2043. 2661.814:0134:0184:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2044. 2661.814:0134:0194:trace:seh:dispatch_exception info[1]=00000000003137b8
  2045. 2661.814:0134:0184:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2046. 2661.814:0134:0194:trace:seh:dispatch_exception info[2]=0000000000000194
  2047. 2661.814:0134:0184:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2048. 2661.814:0134:0194:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2049. 2661.814:0134:0194:trace:seh:dispatch_exception rax=000000000533fe20 rbx=00007ffffebb08a0 rcx=000000000533fdf0 rdx=0000000000000000
  2050. 2661.814:0134:0194:trace:seh:dispatch_exception rsi=00000000003537c0 rdi=00000000003137b8 rbp=000000000533ffa0 rsp=000000000533fdd0
  2051. 2661.814:0134:018c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2052. 2661.814:0134:0194:trace:seh:dispatch_exception r8=0000000000000194 r9=000000000533fed0 r10=0000000144929370 r11=00000001447f2940
  2053. 2661.814:0134:018c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2054. 2661.814:0134:0194:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2055. 2661.814:0134:018c:trace:seh:dispatch_exception info[1]=00000000003135b8
  2056. 2661.814:0134:0194:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2057. 2661.814:0134:018c:trace:seh:dispatch_exception info[2]=000000000000018c
  2058. 2661.814:0134:0194:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2059. 2661.814:0134:018c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2060. 2661.814:0134:018c:trace:seh:dispatch_exception rax=0000000004d3fe20 rbx=00007ffffebb0680 rcx=0000000004d3fdf0 rdx=0000000000000000
  2061. 2661.814:0134:018c:trace:seh:dispatch_exception rsi=00000000003501f0 rdi=00000000003135b8 rbp=0000000004d3ffa0 rsp=0000000004d3fdd0
  2062. 2661.814:0134:018c:trace:seh:dispatch_exception r8=000000000000018c r9=0000000004d3fed0 r10=0000000144929370 r11=00000001447f2380
  2063. 2661.814:0134:018c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2064. 2661.814:0134:018c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2065. 2661.814:0134:018c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2066. 2661.814:0134:019c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2067. 2661.814:0134:019c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2068. 2661.814:0134:019c:trace:seh:dispatch_exception info[1]=0000000001c94e98
  2069. 2661.814:0134:019c:trace:seh:dispatch_exception info[2]=000000000000019c
  2070. 2661.814:0134:019c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2071. 2661.814:0134:019c:trace:seh:dispatch_exception rax=000000000573fe20 rbx=00007ffffebb0ac0 rcx=000000000573fdf0 rdx=0000000000000000
  2072. 2661.814:0134:019c:trace:seh:dispatch_exception rsi=0000000001c95590 rdi=0000000001c94e98 rbp=000000000573ffa0 rsp=000000000573fdd0
  2073. 2661.814:0134:019c:trace:seh:dispatch_exception r8=000000000000019c r9=000000000573fed0 r10=0000000144929370 r11=00000001447f27d0
  2074. 2661.814:0134:019c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2075. 2661.814:0134:019c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2076. 2661.814:0134:019c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2077. 2661.822:0134:01a0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2078. 2661.822:0134:01a0:trace:seh:dispatch_exception info[0]=0000000100001000
  2079. 2661.822:0134:01a0:trace:seh:dispatch_exception info[1]=0000000001c9b4b8
  2080. 2661.822:0134:01a0:trace:seh:dispatch_exception info[2]=00000000000001a0
  2081. 2661.822:0134:01a0:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2082. 2661.822:0134:01a0:trace:seh:dispatch_exception rax=000000000593fe20 rbx=00000001447f2d20 rcx=000000000593fdf0 rdx=0000000000000000
  2083. 2661.822:0134:01a0:trace:seh:dispatch_exception rsi=0000000001d1d2a0 rdi=0000000001c9b4b8 rbp=000000000593ffa0 rsp=000000000593fdd0
  2084. 2661.822:0134:01a0:trace:seh:dispatch_exception r8=00000000000001a0 r9=000000000593fed0 r10=0000000144929370 r11=00000001447f2870
  2085. 2661.822:0134:01a0:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2086. 2661.822:0134:01a0:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2087. 2661.822:0134:01a0:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2088. 2661.822:0134:01a4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2089. 2661.822:0134:01a4:trace:seh:dispatch_exception info[0]=0000000100001000
  2090. 2661.822:0134:01a4:trace:seh:dispatch_exception info[1]=0000000001d22918
  2091. 2661.822:0134:01a4:trace:seh:dispatch_exception info[2]=00000000000001a4
  2092. 2661.822:0134:01a4:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2093. 2661.822:0134:01a4:trace:seh:dispatch_exception rax=0000000005b3fe20 rbx=00000001447f2df0 rcx=0000000005b3fdf0 rdx=0000000000000000
  2094. 2661.822:0134:01a4:trace:seh:dispatch_exception rsi=0000000001d1d720 rdi=0000000001d22918 rbp=0000000005b3ffa0 rsp=0000000005b3fdd0
  2095. 2661.822:0134:01a4:trace:seh:dispatch_exception r8=00000000000001a4 r9=0000000005b3fed0 r10=0000000144929370 r11=00000001447f28b0
  2096. 2661.822:0134:01a4:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2097. 2661.822:0134:01a4:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2098. 2661.822:0134:01a4:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2099. 2661.822:0134:01a8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2100. 2661.822:0134:01a8:trace:seh:dispatch_exception info[0]=0000000100001000
  2101. 2661.823:0134:01a8:trace:seh:dispatch_exception info[1]=0000000001d22998
  2102. 2661.823:0134:01a8:trace:seh:dispatch_exception info[2]=00000000000001a8
  2103. 2661.823:0134:01a8:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2104. 2661.823:0134:01a8:trace:seh:dispatch_exception rax=0000000005d3fe20 rbx=00000001447f2ec0 rcx=0000000005d3fdf0 rdx=0000000000000000
  2105. 2661.823:0134:01a8:trace:seh:dispatch_exception rsi=0000000001d23c90 rdi=0000000001d22998 rbp=0000000005d3ffa0 rsp=0000000005d3fdd0
  2106. 2661.823:0134:01a8:trace:seh:dispatch_exception r8=00000000000001a8 r9=0000000005d3fed0 r10=0000000144929370 r11=00000001447f28f0
  2107. 2661.823:0134:01a8:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2108. 2661.823:0134:01a8:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2109. 2661.823:0134:01a8:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2110. 2661.842:0134:01ac:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2111. 2661.842:0134:01ac:trace:seh:dispatch_exception info[0]=0000000100001000
  2112. 2661.842:0134:01ac:trace:seh:dispatch_exception info[1]=0000000001d22a18
  2113. 2661.842:0134:01ac:trace:seh:dispatch_exception info[2]=00000000000001ac
  2114. 2661.842:0134:01ac:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2115. 2661.842:0134:01ac:trace:seh:dispatch_exception rax=0000000005f3fe20 rbx=00000001447f2f90 rcx=0000000005f3fdf0 rdx=0000000000000000
  2116. 2661.842:0134:01ac:trace:seh:dispatch_exception rsi=0000000001d2cff0 rdi=0000000001d22a18 rbp=0000000005f3ffa0 rsp=0000000005f3fdd0
  2117. 2661.842:0134:01ac:trace:seh:dispatch_exception r8=00000000000001ac r9=0000000005f3fed0 r10=0000000144929370 r11=00000001447ebc40
  2118. 2661.842:0134:01ac:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2119. 2661.842:0134:01ac:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2120. 2661.842:0134:01ac:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2121. 2661.852:0134:01b0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2122. 2661.852:0134:01b0:trace:seh:dispatch_exception info[0]=0000000100001000
  2123. 2661.852:0134:01b0:trace:seh:dispatch_exception info[1]=0000000001d22a98
  2124. 2661.852:0134:01b0:trace:seh:dispatch_exception info[2]=00000000000001b0
  2125. 2661.852:0134:01b0:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2126. 2661.852:0134:01b0:trace:seh:dispatch_exception rax=000000000613fe20 rbx=00000001447f3060 rcx=000000000613fdf0 rdx=0000000000000000
  2127. 2661.852:0134:01b0:trace:seh:dispatch_exception rsi=0000000001d2d470 rdi=0000000001d22a98 rbp=000000000613ffa0 rsp=000000000613fdd0
  2128. 2661.852:0134:01b0:trace:seh:dispatch_exception r8=00000000000001b0 r9=000000000613fed0 r10=0000000144929370 r11=00000001447f3340
  2129. 2661.852:0134:01b0:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2130. 2661.852:0134:01b0:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2131. 2661.852:0134:01b0:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2132. 2661.853:0134:01b4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2133. 2661.853:0134:01b4:trace:seh:dispatch_exception info[0]=0000000100001000
  2134. 2661.853:0134:01b4:trace:seh:dispatch_exception info[1]=0000000001d22b18
  2135. 2661.853:0134:01b4:trace:seh:dispatch_exception info[2]=00000000000001b4
  2136. 2661.853:0134:01b4:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2137. 2661.853:0134:01b4:trace:seh:dispatch_exception rax=000000000633fe20 rbx=00000001447f3130 rcx=000000000633fdf0 rdx=0000000000000000
  2138. 2661.853:0134:01b4:trace:seh:dispatch_exception rsi=0000000001d35900 rdi=0000000001d22b18 rbp=000000000633ffa0 rsp=000000000633fdd0
  2139. 2661.853:0134:01b4:trace:seh:dispatch_exception r8=00000000000001b4 r9=000000000633fed0 r10=0000000144929370 r11=00000001447f3380
  2140. 2661.853:0134:01b4:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2141. 2661.853:0134:01b4:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2142. 2661.853:0134:01b4:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2143. 2663.799:0110:0120:fixme:uiautomation:uia_element_GetCurrentPropertyValueEx Default property values currently unimplemented
  2144. 2663.799:0110:0120:fixme:uiautomation:uia_element_GetCurrentPropertyValueEx Default property values currently unimplemented
  2145. 2663.799:0110:0120:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 00000000004C04F0, 10002, 0000000001B2ED00: stub
  2146. 2666.017:0134:01b8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2147. 2666.017:0134:01b8:trace:seh:dispatch_exception info[0]=00007fff00001000
  2148. 2666.017:0134:01b8:trace:seh:dispatch_exception info[1]=00007fff1ac10b58
  2149. 2666.017:0134:01b8:trace:seh:dispatch_exception info[2]=00000000000001b8
  2150. 2666.017:0134:01b8:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2151. 2666.017:0134:01b8:trace:seh:dispatch_exception rax=000000000653fe20 rbx=00007fff1ac10ad8 rcx=000000000653fdf0 rdx=0000000000000000
  2152. 2666.017:0134:01b8:trace:seh:dispatch_exception rsi=0000000001d4ca80 rdi=00007fff1ac10b58 rbp=000000000653ffa0 rsp=000000000653fdd0
  2153. 2666.017:0134:01b8:trace:seh:dispatch_exception r8=00000000000001b8 r9=000000000653fed0 r10=0000000144929370 r11=00000001447f33c0
  2154. 2666.017:0134:01b8:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2155. 2666.017:0134:01b8:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2156. 2666.017:0134:01b8:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2157. 2666.018:0134:01b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mmdevapi.dll" at 000000020F400000: builtin
  2158. 2666.019:0134:01b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winepulse.drv" at 00000002EB230000: builtin
  2159. 2666.103:0134:01b8:fixme:pulse:pulse_channel_map_to_channel_mask Unhandled channel aux0
  2160. 2666.103:0134:01b8:fixme:pulse:pulse_channel_map_to_channel_mask Unhandled channel aux1
  2161. 2666.212:0134:01b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winealsa.drv" at 00000002FDA10000: builtin
  2162. 2666.213:0134:01b8:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\winealsa.drv" : builtin
  2163. 2666.248:0134:01bc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_mmdevapi_notification"
  2164. 2666.259:0134:01c0:warn:threadname:NtSetInformationThread Thread renamed to L"winepulse_mainloop"
  2165. 2666.274:0134:01c4:fixme:ver:GetCurrentPackageId (0000000006D6FF50 0000000000000000): stub
  2166. 2666.275:0134:01c4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\avrt.dll" at 000000031B140000: builtin
  2167. 2666.275:0134:01c4:fixme:avrt:AvSetMmThreadCharacteristicsW (L"Audio",0000000006D6FEC8): stub
  2168. 2666.275:0134:01c4:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\avrt.dll" : builtin
  2169. 2666.277:0134:01cc:warn:threadname:NtSetInformationThread Thread renamed to L"winepulse_timer_loop"
  2170. info: Game: DarkSoulsIII.exe
  2171. info: DXVK: v2.3-21-g1b31aa5dbca0749
  2172. 2666.291:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 00000002D4AD0000: builtin
  2173. info: Vulkan: Found vkGetInstanceProcAddr in winevulkan.dll @ 0x2d4addb40
  2174. info: Built-in extension providers:
  2175. info: Win32 WSI
  2176. info: OpenVR
  2177. info: OpenXR
  2178. 2666.293:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineopenxr.dll" at 00007FA4DE7A0000: builtin
  2179. info: Enabled instance extensions:
  2180. info: VK_EXT_surface_maintenance1
  2181. info: VK_KHR_get_surface_capabilities2
  2182. info: VK_KHR_surface
  2183. info: VK_KHR_win32_surface
  2184. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  2185. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  2186. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  2187. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  2188. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  2189. ATTENTION: default value of option vk_khr_present_wait overridden by environment.
  2190. ATTENTION: default value of option vk_xwayland_wait_ready overridden by environment.
  2191. info: AMD Radeon RX 6700 XT (RADV NAVI22):
  2192. info: Driver : radv 23.3.5
  2193. info: Memory Heap[0]:
  2194. info: Size: 8128 MiB
  2195. info: Flags: 0x0
  2196. info: Memory Type[2]: Property Flags = 0x6
  2197. info: Memory Type[5]: Property Flags = 0xe
  2198. info: Memory Type[6]: Property Flags = 0xe
  2199. info: Memory Type[8]: Property Flags = 0xc6
  2200. info: Memory Type[10]: Property Flags = 0xce
  2201. info: Memory Heap[1]:
  2202. info: Size: 12272 MiB
  2203. info: Flags: 0x1
  2204. info: Memory Type[0]: Property Flags = 0x1
  2205. info: Memory Type[1]: Property Flags = 0x1
  2206. info: Memory Type[3]: Property Flags = 0x7
  2207. info: Memory Type[4]: Property Flags = 0x7
  2208. info: Memory Type[7]: Property Flags = 0xc1
  2209. info: Memory Type[9]: Property Flags = 0xc7
  2210. 2666.348:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011ED58 00000000011665F0 000000000011ED5C 0000000000EC0D20 0000000000000000): semi-stub
  2211. 2666.351:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011ED58 00000000011665F0 000000000011ED5C 0000000000EC0D20 0000000000000000): semi-stub
  2212. info: D3D11InternalCreateDevice: Maximum supported feature level: D3D_FEATURE_LEVEL_12_1
  2213. info: D3D11InternalCreateDevice: Using feature level D3D_FEATURE_LEVEL_11_0
  2214. info: Device properties:
  2215. info: Device : AMD Radeon RX 6700 XT (RADV NAVI22)
  2216. info: Driver : radv 23.3.5
  2217. info: Enabled device extensions:
  2218. info: VK_AMD_memory_overallocation_behavior
  2219. info: VK_AMD_shader_fragment_mask
  2220. info: VK_EXT_attachment_feedback_loop_layout
  2221. info: VK_EXT_conservative_rasterization
  2222. info: VK_EXT_custom_border_color
  2223. info: VK_EXT_depth_bias_control
  2224. info: VK_EXT_depth_clip_enable
  2225. info: VK_EXT_extended_dynamic_state3
  2226. info: VK_EXT_fragment_shader_interlock
  2227. info: VK_EXT_graphics_pipeline_library
  2228. info: VK_EXT_hdr_metadata
  2229. info: VK_EXT_memory_priority
  2230. info: VK_EXT_non_seamless_cube_map
  2231. info: VK_EXT_robustness2
  2232. info: VK_EXT_shader_module_identifier
  2233. info: VK_EXT_shader_stencil_export
  2234. info: VK_EXT_transform_feedback
  2235. info: VK_EXT_vertex_attribute_divisor
  2236. info: VK_KHR_external_memory_win32
  2237. info: VK_KHR_external_semaphore_win32
  2238. info: VK_KHR_maintenance5
  2239. info: VK_KHR_pipeline_library
  2240. info: VK_KHR_present_id
  2241. info: VK_KHR_present_wait
  2242. info: VK_KHR_swapchain
  2243. info: VK_KHR_win32_keyed_mutex
  2244. info: Device features:
  2245. info: robustBufferAccess : 1
  2246. info: fullDrawIndexUint32 : 1
  2247. info: imageCubeArray : 1
  2248. info: independentBlend : 1
  2249. info: geometryShader : 1
  2250. info: tessellationShader : 1
  2251. info: sampleRateShading : 1
  2252. info: dualSrcBlend : 1
  2253. info: logicOp : 1
  2254. info: multiDrawIndirect : 1
  2255. info: drawIndirectFirstInstance : 1
  2256. info: depthClamp : 1
  2257. info: depthBiasClamp : 1
  2258. info: fillModeNonSolid : 1
  2259. info: depthBounds : 1
  2260. info: wideLines : 1
  2261. info: multiViewport : 1
  2262. info: samplerAnisotropy : 1
  2263. info: textureCompressionBC : 1
  2264. info: occlusionQueryPrecise : 1
  2265. info: pipelineStatisticsQuery : 1
  2266. info: vertexPipelineStoresAndAtomics : 1
  2267. info: fragmentStoresAndAtomics : 1
  2268. info: shaderImageGatherExtended : 1
  2269. info: shaderClipDistance : 1
  2270. info: shaderCullDistance : 1
  2271. info: shaderFloat64 : 1
  2272. info: shaderInt64 : 1
  2273. info: variableMultisampleRate : 1
  2274. info: shaderResourceResidency : 1
  2275. info: shaderResourceMinLod : 1
  2276. info: sparseBinding : 1
  2277. info: sparseResidencyBuffer : 1
  2278. info: sparseResidencyImage2D : 1
  2279. info: sparseResidencyImage3D : 1
  2280. info: sparseResidency2Samples : 0
  2281. info: sparseResidency4Samples : 0
  2282. info: sparseResidency8Samples : 0
  2283. info: sparseResidency16Samples : 0
  2284. info: sparseResidencyAliased : 1
  2285. info: Vulkan 1.1
  2286. info: shaderDrawParameters : 1
  2287. info: Vulkan 1.2
  2288. info: samplerMirrorClampToEdge : 1
  2289. info: drawIndirectCount : 1
  2290. info: samplerFilterMinmax : 1
  2291. info: hostQueryReset : 1
  2292. info: timelineSemaphore : 1
  2293. info: bufferDeviceAddress : 0
  2294. info: shaderOutputViewportIndex : 1
  2295. info: shaderOutputLayer : 1
  2296. info: vulkanMemoryModel : 1
  2297. info: Vulkan 1.3
  2298. info: robustImageAccess : 0
  2299. info: pipelineCreationCacheControl : 1
  2300. info: shaderDemoteToHelperInvocation : 1
  2301. info: shaderZeroInitializeWorkgroupMemory : 0
  2302. info: synchronization2 : 1
  2303. info: dynamicRendering : 1
  2304. info: VK_AMD_shader_fragment_mask
  2305. info: extension supported : 1
  2306. info: VK_EXT_attachment_feedback_loop_layout
  2307. info: attachmentFeedbackLoopLayout : 0
  2308. info: VK_EXT_conservative_rasterization
  2309. info: extension supported : 1
  2310. info: VK_EXT_custom_border_color
  2311. info: customBorderColors : 1
  2312. info: customBorderColorWithoutFormat : 1
  2313. info: VK_EXT_depth_clip_enable
  2314. info: depthClipEnable : 1
  2315. info: VK_EXT_depth_bias_control
  2316. info: depthBiasControl : 1
  2317. info: leastRepresentableValueForceUnormRepresentation : 1
  2318. info: floatRepresentation : 0
  2319. info: depthBiasExact : 1
  2320. info: VK_EXT_extended_dynamic_state3
  2321. info: extDynamicState3AlphaToCoverageEnable : 1
  2322. info: extDynamicState3DepthClipEnable : 1
  2323. info: extDynamicState3RasterizationSamples : 1
  2324. info: extDynamicState3SampleMask : 1
  2325. info: extDynamicState3LineRasterizationMode : 1
  2326. info: VK_EXT_fragment_shader_interlock
  2327. info: fragmentShaderSampleInterlock : 1
  2328. info: fragmentShaderPixelInterlock : 1
  2329. info: VK_EXT_full_screen_exclusive
  2330. info: extension supported : 0
  2331. info: VK_EXT_graphics_pipeline_library
  2332. info: graphicsPipelineLibrary : 1
  2333. info: VK_EXT_line_rasterization
  2334. info: rectangularLines : 1
  2335. info: smoothLines : 1
  2336. info: VK_EXT_memory_budget
  2337. info: extension supported : 1
  2338. info: VK_EXT_memory_priority
  2339. info: memoryPriority : 1
  2340. info: VK_EXT_non_seamless_cube_map
  2341. info: nonSeamlessCubeMap : 0
  2342. info: VK_EXT_robustness2
  2343. info: robustBufferAccess2 : 1
  2344. info: robustImageAccess2 : 1
  2345. info: nullDescriptor : 1
  2346. info: VK_EXT_shader_module_identifier
  2347. info: shaderModuleIdentifier : 1
  2348. info: VK_EXT_shader_stencil_export
  2349. info: extension supported : 1
  2350. info: VK_EXT_swapchain_colorspace
  2351. info: extension supported : 0
  2352. info: VK_EXT_swapchain_maintenance1
  2353. info: swapchainMaintenance1 : 0
  2354. info: VK_EXT_hdr_metadata
  2355. info: extension supported : 1
  2356. info: VK_EXT_transform_feedback
  2357. info: transformFeedback : 1
  2358. info: geometryStreams : 1
  2359. info: VK_EXT_vertex_attribute_divisor
  2360. info: vertexAttributeInstanceRateDivisor : 1
  2361. info: vertexAttributeInstanceRateZeroDivisor : 1
  2362. info: VK_KHR_external_memory_win32
  2363. info: extension supported : 1
  2364. info: VK_KHR_external_semaphore_win32
  2365. info: extension supported : 1
  2366. info: VK_KHR_maintenance5
  2367. info: maintenance5 : 1
  2368. info: VK_KHR_present_id
  2369. info: presentId : 1
  2370. info: VK_KHR_present_wait
  2371. info: presentWait : 1
  2372. info: VK_NVX_binary_import
  2373. info: extension supported : 0
  2374. info: VK_NVX_image_view_handle
  2375. info: extension supported : 0
  2376. info: VK_KHR_win32_keyed_mutex
  2377. info: extension supported : 1
  2378. info: Queue families:
  2379. info: Graphics : 0
  2380. info: Transfer : 1
  2381. info: Sparse : 0
  2382. Fossilize INFO: Overriding serialization path: "/var/home/foxbox/.local/share/Steam/steamapps/shadercache/374320/fozpipelinesv6/steamapprun_pipeline_cache".
  2383. info: Memory type mask for sparse resources: 0x7ad
  2384. info: DXVK: Read 15 valid state cache entries
  2385. info: DXVK: Graphics pipeline libraries supported
  2386. info: DXGI: VK_FORMAT_D24_UNORM_S8_UINT -> VK_FORMAT_D32_SFLOAT_S8_UINT
  2387. 2666.377:0134:01d4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-submit"
  2388. info: AMD Radeon RX 6700 XT (RADV NAVI22):
  2389. info: Driver : radv 23.3.5
  2390. 2666.378:0134:01d8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-queue"
  2391. info: Memory Heap[0]:
  2392. info: Size: 8128 MiB
  2393. info: Flags: 0x0
  2394. info: Memory Type[2]: Property Flags = 0x6
  2395. info: Memory Type[5]: Property Flags = 0xe
  2396. info: Memory Type[6]: Property Flags = 0xe
  2397. info: Memory Type[8]: Property Flags = 0xc6
  2398. info: Memory Type[10]: Property Flags = 0xce
  2399. info: Memory Heap[1]:
  2400. info: Size: 12272 MiB
  2401. info: Flags: 0x1
  2402. info: Memory Type[0]: Property Flags = 0x1
  2403. info: Memory Type[1]: Property Flags = 0x1
  2404. info: Memory Type[3]: Property Flags = 0x7
  2405. info: Memory Type[4]: Property Flags = 0x7
  2406. info: Memory Type[7]: Property Flags = 0xc1
  2407. info: Memory Type[9]: Property Flags = 0xc7
  2408. 2666.378:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011EE68 0000000001167AD0 000000000011EE6C 0000000001163C60 0000000000000000): semi-stub
  2409. 2666.378:0134:01dc:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-cs"
  2410. 2666.381:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011EE68 0000000001167AD0 000000000011EE6C 0000000001163C60 0000000000000000): semi-stub
  2411. 2666.384:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011EE38 0000000001167AD0 000000000011EE3C 0000000001163C60 0000000000000000): semi-stub
  2412. 2666.387:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011BC0C 0000000001167AD0 000000000011BC70 0000000001163C60 0000000000000000): semi-stub
  2413. 2666.392:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011EE38 0000000001167AD0 000000000011EE3C 0000000001163C60 0000000000000000): semi-stub
  2414. 2666.395:0134:01e4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
  2415. 2666.395:0134:01e0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
  2416. 2666.396:0134:01e8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
  2417. 2666.396:0134:01ec:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
  2418. 2666.396:0134:01f0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
  2419. 2666.397:0134:01f4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
  2420. 2666.397:0134:01f8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
  2421. 2666.397:0134:01fc:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
  2422. 2666.397:0134:0200:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
  2423. info: DXVK: Using 12 compiler threads
  2424. 2666.397:0134:0204:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
  2425. 2666.398:0134:0208:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
  2426. 2666.398:0134:020c:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
  2427. 2666.399:0134:0210:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2428. 2666.399:0134:0210:trace:seh:dispatch_exception info[0]=00007fff00001000
  2429. 2666.399:0134:0210:trace:seh:dispatch_exception info[1]=00007fff2f2e1bf0
  2430. 2666.399:0134:0210:trace:seh:dispatch_exception info[2]=0000000000000210
  2431. 2666.399:0134:0210:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2432. 2666.399:0134:0210:trace:seh:dispatch_exception rax=000000000936fe20 rbx=00007fff2f2e1b70 rcx=000000000936fdf0 rdx=0000000000000000
  2433. 2666.399:0134:0210:trace:seh:dispatch_exception rsi=0000000001d924c0 rdi=00007fff2f2e1bf0 rbp=000000000936ffa0 rsp=000000000936fdd0
  2434. 2666.399:0134:0210:trace:seh:dispatch_exception r8=0000000000000210 r9=000000000936fed0 r10=0000000144929370 r11=00000001447f3560
  2435. 2666.399:0134:0210:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2436. 2666.399:0134:0210:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2437. 2666.399:0134:0210:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2438. 2666.401:0134:0214:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-frame"
  2439. [Gamescope WSI] Creating Gamescope surface: xid: 0x140003e
  2440. [Gamescope WSI] Atom of T was wrong type. Expected XCB_ATOM_CARDINAL.
  2441. [Gamescope WSI] Made gamescope surface for xid: 0x140003e
  2442. [Gamescope WSI] Surface state:
  2443. steam app id: 374320
  2444. window xid: 0x140003e
  2445. wayland surface res id: 5
  2446. layer client flags: 0x0
  2447. server hdr output enabled: true
  2448. hdr formats exposed to client: true
  2449. info: Presenter: Actual swap chain properties:
  2450. info: Format: VK_FORMAT_R8G8B8A8_UNORM
  2451. info: Color space: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR
  2452. info: Present mode: VK_PRESENT_MODE_MAILBOX_KHR (dynamic: no)
  2453. info: Buffer size: 3840x2160
  2454. info: Image count: 4
  2455. info: Exclusive FS: 1
  2456. [Gamescope WSI] Overriding present mode to FIFO from frame limiter override.
  2457. [Gamescope WSI] Creating swapchain for xid: 0x140003e - minImageCount: 4 - format: VK_FORMAT_R8G8B8A8_UNORM - colorspace: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR - flip: true
  2458. [Gamescope WSI] Created swapchain for xid: 0x140003e - imageCount: 4
  2459. warn: DXGI: MakeWindowAssociation: Ignoring flags
  2460. 2666.453:0134:0218:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2461. 2666.453:0134:0218:trace:seh:dispatch_exception info[0]=00007fff00001000
  2462. 2666.453:0134:0218:trace:seh:dispatch_exception info[1]=00007fff2f4195a0
  2463. 2666.453:0134:0218:trace:seh:dispatch_exception info[2]=0000000000000218
  2464. 2666.453:0134:0218:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2465. 2666.453:0134:0218:trace:seh:dispatch_exception rax=000000000996fe20 rbx=00007fff2f419520 rcx=000000000996fdf0 rdx=0000000000000000
  2466. 2666.453:0134:0218:trace:seh:dispatch_exception rsi=0000000001d9c8b0 rdi=00007fff2f4195a0 rbp=000000000996ffa0 rsp=000000000996fdd0
  2467. 2666.453:0134:0218:trace:seh:dispatch_exception r8=0000000000000218 r9=000000000996fed0 r10=0000000144929370 r11=00000001447f35c0
  2468. 2666.453:0134:0218:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2469. 2666.453:0134:0218:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2470. 2666.453:0134:0218:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2471. 2666.454:0134:021c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2472. 2666.454:0134:021c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2473. 2666.454:0134:021c:trace:seh:dispatch_exception info[1]=00007fff2f479680
  2474. 2666.454:0134:021c:trace:seh:dispatch_exception info[2]=000000000000021c
  2475. 2666.454:0134:021c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2476. 2666.454:0134:021c:trace:seh:dispatch_exception rax=0000000009b6fe20 rbx=00007fff2f479600 rcx=0000000009b6fdf0 rdx=0000000000000000
  2477. 2666.454:0134:021c:trace:seh:dispatch_exception rsi=0000000001d9d630 rdi=00007fff2f479680 rbp=0000000009b6ffa0 rsp=0000000009b6fdd0
  2478. 2666.454:0134:021c:trace:seh:dispatch_exception r8=000000000000021c r9=0000000009b6fed0 r10=0000000144929370 r11=00000001447f3640
  2479. 2666.454:0134:021c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2480. 2666.454:0134:021c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2481. 2666.454:0134:021c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2482. 2666.454:0134:0224:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2483. 2666.454:0134:0224:trace:seh:dispatch_exception info[0]=00007fff00001000
  2484. 2666.454:0134:0224:trace:seh:dispatch_exception info[1]=00007fff2f539840
  2485. 2666.454:0134:0224:trace:seh:dispatch_exception info[2]=0000000000000224
  2486. 2666.454:0134:0224:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2487. 2666.454:0134:0224:trace:seh:dispatch_exception rax=000000000a36fe20 rbx=00007fff2f5397c0 rcx=000000000a36fdf0 rdx=0000000000000000
  2488. 2666.454:0134:0224:trace:seh:dispatch_exception rsi=0000000001d9e830 rdi=00007fff2f539840 rbp=000000000a36ffa0 rsp=000000000a36fdd0
  2489. 2666.454:0134:0224:trace:seh:dispatch_exception r8=0000000000000224 r9=000000000a36fed0 r10=0000000144929370 r11=00000001447f3680
  2490. 2666.454:0134:0224:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2491. 2666.454:0134:0224:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2492. 2666.454:0134:0224:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2493. 2666.454:0134:0220:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2494. 2666.454:0134:0220:trace:seh:dispatch_exception info[0]=00007fff00001000
  2495. 2666.454:0134:0220:trace:seh:dispatch_exception info[1]=00007fff2f4d9760
  2496. 2666.454:0134:0220:trace:seh:dispatch_exception info[2]=0000000000000220
  2497. 2666.454:0134:0220:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2498. 2666.454:0134:0220:trace:seh:dispatch_exception rax=0000000009d6fe20 rbx=00007fff2f4d96e0 rcx=0000000009d6fdf0 rdx=0000000000000000
  2499. 2666.454:0134:0220:trace:seh:dispatch_exception rsi=0000000001d9dab0 rdi=00007fff2f4d9760 rbp=0000000009d6ffa0 rsp=0000000009d6fdd0
  2500. 2666.454:0134:0220:trace:seh:dispatch_exception r8=0000000000000220 r9=0000000009d6fed0 r10=0000000144929370 r11=00000001447f3740
  2501. 2666.454:0134:0220:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2502. 2666.454:0134:0220:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2503. 2666.454:0134:0220:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2504. 2666.455:0134:0228:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2505. 2666.455:0134:0228:trace:seh:dispatch_exception info[0]=00007fff00001000
  2506. 2666.455:0134:0228:trace:seh:dispatch_exception info[1]=00007fff2f599920
  2507. 2666.455:0134:0228:trace:seh:dispatch_exception info[2]=0000000000000228
  2508. 2666.455:0134:0228:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2509. 2666.455:0134:0228:trace:seh:dispatch_exception rax=000000000a56fe20 rbx=00007fff2f5998a0 rcx=000000000a56fdf0 rdx=0000000000000000
  2510. 2666.455:0134:0228:trace:seh:dispatch_exception rsi=0000000001d9feb0 rdi=00007fff2f599920 rbp=000000000a56ffa0 rsp=000000000a56fdd0
  2511. 2666.455:0134:0228:trace:seh:dispatch_exception r8=0000000000000228 r9=000000000a56fed0 r10=0000000144929370 r11=00000001447f37c0
  2512. 2666.455:0134:0228:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2513. 2666.455:0134:0228:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2514. 2666.455:0134:0228:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2515. 2666.455:0134:022c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2516. 2666.455:0134:022c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2517. 2666.455:0134:022c:trace:seh:dispatch_exception info[1]=00007fff2f5f9a00
  2518. 2666.455:0134:022c:trace:seh:dispatch_exception info[2]=000000000000022c
  2519. 2666.455:0134:022c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2520. 2666.455:0134:022c:trace:seh:dispatch_exception rax=000000000a76fe20 rbx=00007fff2f5f9980 rcx=000000000a76fdf0 rdx=0000000000000000
  2521. 2666.455:0134:022c:trace:seh:dispatch_exception rsi=0000000001da0330 rdi=00007fff2f5f9a00 rbp=000000000a76ffa0 rsp=000000000a76fdd0
  2522. 2666.455:0134:022c:trace:seh:dispatch_exception r8=000000000000022c r9=000000000a76fed0 r10=0000000144929370 r11=00000001447f3840
  2523. 2666.455:0134:022c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2524. 2666.455:0134:022c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2525. 2666.455:0134:022c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2526. 2666.455:0134:0230:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2527. 2666.455:0134:0230:trace:seh:dispatch_exception info[0]=00007fff00001000
  2528. 2666.455:0134:0230:trace:seh:dispatch_exception info[1]=00007fff2f659ae0
  2529. 2666.455:0134:0230:trace:seh:dispatch_exception info[2]=0000000000000230
  2530. 2666.455:0134:0230:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2531. 2666.455:0134:0230:trace:seh:dispatch_exception rax=000000000a96fe20 rbx=00007fff2f659a60 rcx=000000000a96fdf0 rdx=0000000000000000
  2532. 2666.455:0134:0230:trace:seh:dispatch_exception rsi=0000000001da19b0 rdi=00007fff2f659ae0 rbp=000000000a96ffa0 rsp=000000000a96fdd0
  2533. 2666.455:0134:0230:trace:seh:dispatch_exception r8=0000000000000230 r9=000000000a96fed0 r10=0000000144929370 r11=00000001447f38c0
  2534. 2666.455:0134:0230:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2535. 2666.455:0134:0230:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2536. 2666.455:0134:0230:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2537. 2666.461:0134:0138:fixme:steamclient:Steam_BGetCallback HACK: Steam overlay deactivated, enabling all input events.
  2538. 2666.461:0134:0138:fixme:steamclient:Steam_BGetCallback Spurious steam overlay deactivate event, skipping.
  2539. info: Presenter: Actual swap chain properties:
  2540. info: Format: VK_FORMAT_R8G8B8A8_UNORM
  2541. info: Color space: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR
  2542. info: Present mode: VK_PRESENT_MODE_FIFO_KHR (dynamic: no)
  2543. info: Buffer size: 3840x2160
  2544. info: Image count: 4
  2545. info: Exclusive FS: 1
  2546. [Gamescope WSI] Overriding present mode to FIFO from frame limiter override.
  2547. [Gamescope WSI] Creating swapchain for xid: 0x140003e - minImageCount: 4 - format: VK_FORMAT_R8G8B8A8_UNORM - colorspace: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR - flip: true
  2548. [Gamescope WSI] Created swapchain for xid: 0x140003e - imageCount: 4
  2549. [Gamescope WSI] Swapchain recieved new refresh cycle: 16.67ms
  2550. 2666.861:0134:0234:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-worker"
  2551. 2668.947:0134:0238:fixme:thread:NtSetInformationThread ThreadIdealProcessor stub!
  2552. 2668.947:0134:023c:fixme:thread:NtSetInformationThread ThreadIdealProcessor stub!
  2553. 2668.947:0134:0244:fixme:thread:NtSetInformationThread ThreadIdealProcessor stub!
  2554. 2668.947:0134:0240:fixme:thread:NtSetInformationThread ThreadIdealProcessor stub!
  2555. 2668.948:0134:0248:fixme:thread:NtSetInformationThread ThreadIdealProcessor stub!
  2556. 2668.965:0134:024c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2557. 2668.965:0134:024c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2558. 2668.965:0134:024c:trace:seh:dispatch_exception info[1]=000000000b151058
  2559. 2668.965:0134:024c:trace:seh:dispatch_exception info[2]=000000000000024c
  2560. 2668.965:0134:024c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2561. 2668.965:0134:024c:trace:seh:dispatch_exception rax=00000000134dfe20 rbx=00007ffffebc6f10 rcx=00000000134dfdf0 rdx=0000000000000000
  2562. 2668.965:0134:024c:trace:seh:dispatch_exception rsi=000000000b1643b0 rdi=000000000b151058 rbp=00000000134dffa0 rsp=00000000134dfdd0
  2563. 2668.965:0134:024c:trace:seh:dispatch_exception r8=000000000000024c r9=00000000134dfed0 r10=0000000144929370 r11=00000001447f3ee0
  2564. 2668.965:0134:024c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2565. 2668.965:0134:024c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2566. 2668.965:0134:024c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2567. 2668.972:0134:0250:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2568. 2668.972:0134:0250:trace:seh:dispatch_exception info[0]=00007fff00001000
  2569. 2668.972:0134:0250:trace:seh:dispatch_exception info[1]=000000000b493708
  2570. 2668.972:0134:0250:trace:seh:dispatch_exception info[2]=0000000000000250
  2571. 2668.972:0134:0250:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2572. 2668.972:0134:0250:trace:seh:dispatch_exception rax=00000000136dfe20 rbx=00007fff9e9c5410 rcx=00000000136dfdf0 rdx=0000000000000000
  2573. 2668.972:0134:0250:trace:seh:dispatch_exception rsi=000000000b1660d0 rdi=000000000b493708 rbp=00000000136dffa0 rsp=00000000136dfdd0
  2574. 2668.973:0134:0250:trace:seh:dispatch_exception r8=0000000000000250 r9=00000000136dfed0 r10=0000000144929370 r11=00000001447eb5c0
  2575. 2668.973:0134:0250:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2576. 2668.973:0134:0250:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2577. 2668.973:0134:0250:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2578. 2668.983:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\compstui.dll" at 0000000313390000: builtin
  2579. 2668.983:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winspool.drv" at 0000000223D50000: builtin
  2580. 2668.983:0134:0138:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wbem\\wbemprox.dll" at 00000001ED480000: builtin
  2581. 2669.248:0134:0138:fixme:wbemprox:client_security_SetBlanket 00000001ED49FE20, 0000000000F050A0, 10, 0, (null), 3, 3, 0000000000000000, 0
  2582. 2669.248:0134:0138:fixme:wbemprox:client_security_Release 00000001ED49FE20
  2583. 2669.323:0134:0138:fixme:wbemprox:enum_class_object_Next timeout not supported
  2584. 2669.387:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011F5E8 0000000001167EE0 000000000011F5EC 00000000011EE470 0000000000000000): semi-stub
  2585. info: Setting display mode: 3840x2160@60
  2586. info: Setting display mode: 3840x2160@60
  2587. 2669.462:0134:0254:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2588. 2669.462:0134:0254:trace:seh:dispatch_exception info[0]=00007fff00001000
  2589. 2669.462:0134:0254:trace:seh:dispatch_exception info[1]=000000000b16cc48
  2590. 2669.462:0134:0254:trace:seh:dispatch_exception info[2]=0000000000000254
  2591. 2669.462:0134:0254:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2592. 2669.462:0134:0254:trace:seh:dispatch_exception rax=00000000138dfe20 rbx=00007fff21d060c0 rcx=00000000138dfdf0 rdx=0000000000000000
  2593. 2669.462:0134:0254:trace:seh:dispatch_exception rsi=000000000b5363e0 rdi=000000000b16cc48 rbp=00000000138dffa0 rsp=00000000138dfdd0
  2594. 2669.462:0134:0254:trace:seh:dispatch_exception r8=0000000000000254 r9=00000000138dfed0 r10=0000000144929370 r11=00000001447f4530
  2595. 2669.462:0134:0254:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2596. 2669.462:0134:0254:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2597. 2669.462:0134:0254:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2598. 2669.462:0134:0258:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2599. 2669.462:0134:0258:trace:seh:dispatch_exception info[0]=00007fff00001000
  2600. 2669.462:0134:0258:trace:seh:dispatch_exception info[1]=00007fff21d06530
  2601. 2669.462:0134:0258:trace:seh:dispatch_exception info[2]=0000000000000258
  2602. 2669.462:0134:0258:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2603. 2669.462:0134:0258:trace:seh:dispatch_exception rax=0000000013adfe20 rbx=00007fff21d064b0 rcx=0000000013adfdf0 rdx=0000000000000000
  2604. 2669.462:0134:0258:trace:seh:dispatch_exception rsi=000000000b156a60 rdi=00007fff21d06530 rbp=0000000013adffa0 rsp=0000000013adfdd0
  2605. 2669.462:0134:0258:trace:seh:dispatch_exception r8=0000000000000258 r9=0000000013adfed0 r10=0000000144929370 r11=00000001447f42a0
  2606. 2669.462:0134:0258:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2607. 2669.462:0134:0258:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2608. 2669.462:0134:0258:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2609. 2669.463:0134:0260:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2610. 2669.463:0134:0260:trace:seh:dispatch_exception info[0]=00007fff00001000
  2611. 2669.463:0134:0260:trace:seh:dispatch_exception info[1]=000000000b16d308
  2612. 2669.463:0134:0260:trace:seh:dispatch_exception info[2]=0000000000000260
  2613. 2669.463:0134:0260:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2614. 2669.463:0134:0260:trace:seh:dispatch_exception rax=0000000013edfe20 rbx=00007fff21d1adc0 rcx=0000000013edfdf0 rdx=0000000000000000
  2615. 2669.463:0134:0260:trace:seh:dispatch_exception rsi=000000000b158e60 rdi=000000000b16d308 rbp=0000000013edffa0 rsp=0000000013edfdd0
  2616. 2669.463:0134:0260:trace:seh:dispatch_exception r8=0000000000000260 r9=0000000013edfed0 r10=0000000144929370 r11=00000001447f4d00
  2617. 2669.463:0134:0260:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2618. 2669.463:0134:0260:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2619. 2669.463:0134:0260:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2620. 2669.463:0134:025c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2621. 2669.463:0134:025c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2622. 2669.463:0134:025c:trace:seh:dispatch_exception info[1]=000000000b16d008
  2623. 2669.463:0134:025c:trace:seh:dispatch_exception info[2]=000000000000025c
  2624. 2669.463:0134:025c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2625. 2669.463:0134:025c:trace:seh:dispatch_exception rax=0000000013cdfe20 rbx=00007fff21d1a760 rcx=0000000013cdfdf0 rdx=0000000000000000
  2626. 2669.463:0134:025c:trace:seh:dispatch_exception rsi=000000000b1580e0 rdi=000000000b16d008 rbp=0000000013cdffa0 rsp=0000000013cdfdd0
  2627. 2669.463:0134:025c:trace:seh:dispatch_exception r8=000000000000025c r9=0000000013cdfed0 r10=0000000144929370 r11=00000001447f4d40
  2628. 2669.463:0134:025c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2629. 2669.463:0134:025c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2630. 2669.463:0134:025c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2631. 2669.464:0134:0264:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2632. 2669.464:0134:0264:trace:seh:dispatch_exception info[0]=0000000100001000
  2633. 2669.464:0134:0264:trace:seh:dispatch_exception info[1]=000000000b159d48
  2634. 2669.464:0134:0264:trace:seh:dispatch_exception info[2]=0000000000000264
  2635. 2669.464:0134:0264:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2636. 2669.464:0134:0264:trace:seh:dispatch_exception rax=00000000140dfe20 rbx=00000001449314f8 rcx=00000000140dfdf0 rdx=0000000000000000
  2637. 2669.464:0134:0264:trace:seh:dispatch_exception rsi=000000000b15a3c0 rdi=000000000b159d48 rbp=00000000140dffa0 rsp=00000000140dfdd0
  2638. 2669.464:0134:0264:trace:seh:dispatch_exception r8=0000000000000264 r9=00000000140dfed0 r10=0000000144929370 r11=00000001447f4460
  2639. 2669.464:0134:0264:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2640. 2669.464:0134:0264:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2641. 2669.464:0134:0264:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2642. 2669.464:0134:0268:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2643. 2669.464:0134:0268:trace:seh:dispatch_exception info[0]=00007fff00001000
  2644. 2669.464:0134:0268:trace:seh:dispatch_exception info[1]=000000000b15a008
  2645. 2669.464:0134:0268:trace:seh:dispatch_exception info[2]=0000000000000268
  2646. 2669.464:0134:0268:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2647. 2669.464:0134:0268:trace:seh:dispatch_exception rax=00000000142dfe20 rbx=00007fff21d3b9e0 rcx=00000000142dfdf0 rdx=0000000000000000
  2648. 2669.464:0134:0268:trace:seh:dispatch_exception rsi=000000000b53d5a0 rdi=000000000b15a008 rbp=00000000142dffa0 rsp=00000000142dfdd0
  2649. 2669.464:0134:0268:trace:seh:dispatch_exception r8=0000000000000268 r9=00000000142dfed0 r10=0000000144929370 r11=00000001447f52a0
  2650. 2669.464:0134:0268:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2651. 2669.464:0134:0268:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2652. 2669.464:0134:0268:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2653. 2669.465:0134:026c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2654. 2669.465:0134:026c:trace:seh:dispatch_exception info[0]=00007fff00001000
  2655. 2669.465:0134:026c:trace:seh:dispatch_exception info[1]=000000000b56c878
  2656. 2669.465:0134:026c:trace:seh:dispatch_exception info[2]=000000000000026c
  2657. 2669.465:0134:026c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2658. 2669.465:0134:026c:trace:seh:dispatch_exception rax=00000000144dfe20 rbx=00007ffffec4af50 rcx=00000000144dfdf0 rdx=0000000000000000
  2659. 2669.465:0134:026c:trace:seh:dispatch_exception rsi=000000000b56fd20 rdi=000000000b56c878 rbp=00000000144dffa0 rsp=00000000144dfdd0
  2660. 2669.465:0134:026c:trace:seh:dispatch_exception r8=000000000000026c r9=00000000144dfed0 r10=0000000144929370 r11=00000001447f5440
  2661. 2669.465:0134:026c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2662. 2669.465:0134:026c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2663. 2669.465:0134:026c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2664. 2669.466:0134:0270:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2665. 2669.466:0134:0270:trace:seh:dispatch_exception info[0]=00007fff00001000
  2666. 2669.466:0134:0270:trace:seh:dispatch_exception info[1]=00007fff9ea0f7a0
  2667. 2669.466:0134:0270:trace:seh:dispatch_exception info[2]=0000000000000270
  2668. 2669.466:0134:0270:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2669. 2669.466:0134:0270:trace:seh:dispatch_exception rax=00000000146dfe20 rbx=00007fff9ea0f720 rcx=00000000146dfdf0 rdx=0000000000000000
  2670. 2669.466:0134:0270:trace:seh:dispatch_exception rsi=000000000b5701a0 rdi=00007fff9ea0f7a0 rbp=00000000146dffa0 rsp=00000000146dfdd0
  2671. 2669.466:0134:0270:trace:seh:dispatch_exception r8=0000000000000270 r9=00000000146dfed0 r10=0000000144929370 r11=00000001447f5440
  2672. 2669.466:0134:0270:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2673. 2669.466:0134:0270:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2674. 2669.466:0134:0270:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2675. 2671.450:0134:0138:fixme:system:QueryDisplayConfig (00000002 000000000011F4D8 0000000001168070 000000000011F4DC 00000000011EE470 0000000000000000): semi-stub
  2676. info: Setting display mode: 3840x2160@60
  2677. info: Setting display mode: 3840x2160@60
  2678. 2672.043:0134:0150:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2679. 2672.043:0134:0150:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000014165D7BC ip=14165d7bb
  2680. 2672.043:0134:0150:trace:seh:dispatch_exception info[0]=0000000018720ca0
  2681. 2672.043:0134:0150:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2682. 2672.043:0134:0150:trace:seh:dispatch_exception rax=0000000018720ca0 rbx=00007fff9e00e540 rcx=00000001700713e0 rdx=0000000000000080
  2683. 2672.043:0134:0150:trace:seh:dispatch_exception rsi=0000000000000001 rdi=00007fff9e01fc30 rbp=00000000032efa40 rsp=00000000032efa20
  2684. 2672.043:0134:0150:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018720ca0 r10=0000000000000008 r11=0000000000251800
  2685. 2672.043:0134:0150:trace:seh:dispatch_exception r12=0000000143d7b920 r13=00007fff9e012430 r14=00000000032efd58 r15=0000000000000000
  2686. 2672.043:0134:0150:trace:seh:call_vectored_handlers calling handler at 0000000144F3991B code=80000003 flags=0
  2687. 2672.043:0134:0150:trace:seh:call_vectored_handlers handler at 0000000144F3991B returned ffffffff
  2688. 2672.303:0134:0274:warn:threadname:NtSetInformationThread Thread renamed to L"wine_xinput_hid_update"
  2689. 2672.306:0134:0278:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_device_notify"
  2690. 2672.308:0094:0280:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
  2691. 2672.310:0094:0284:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
  2692. 2672.318:0110:0120:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
  2693. 2672.318:0110:0120:fixme:uiautomation:msaa_provider_GetPropertyValue Unimplemented propertyId 30024
  2694. 2672.321:0110:0120:fixme:uiautomation:msaa_fragment_get_FragmentRoot 00000000004CF458, 0000000001B2FAB0: stub!
  2695. 2672.323:0110:0120:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
  2696. 2672.324:0110:0120:fixme:uiautomation:msaa_provider_GetPropertyValue Unimplemented propertyId 30024
  2697. 2672.326:0110:0120:fixme:uiautomation:msaa_fragment_get_FragmentRoot 00000000004CF4D8, 0000000001B2FAB0: stub!
  2698. 2672.332:0134:0138:fixme:wbemprox:client_security_SetBlanket 00000001ED49FE20, 0000000000F050A0, 10, 0, (null), 3, 3, 0000000000000000, 0
  2699. 2672.332:0134:0138:fixme:wbemprox:client_security_Release 00000001ED49FE20
  2700. 2672.437:0134:0138:fixme:wbemprox:client_security_SetBlanket 00000001ED49FE20, 0000000000F050A0, 10, 0, (null), 3, 3, 0000000000000000, 0
  2701. 2672.437:0134:0138:fixme:wbemprox:client_security_Release 00000001ED49FE20
  2702. 2672.539:0134:0138:fixme:wbemprox:client_security_SetBlanket 00000001ED49FE20, 0000000000F050A0, 10, 0, (null), 3, 3, 0000000000000000, 0
  2703. 2672.539:0134:0138:fixme:wbemprox:client_security_Release 00000001ED49FE20
  2704. 2678.505:0134:0298:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2705. 2678.505:0134:0298:trace:seh:dispatch_exception info[0]=0000000100001000
  2706. 2678.505:0134:0298:trace:seh:dispatch_exception info[1]=00000001447f6a10
  2707. 2678.505:0134:0298:trace:seh:dispatch_exception info[2]=0000000000000298
  2708. 2678.505:0134:0298:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2709. 2678.505:0134:0298:trace:seh:dispatch_exception rax=000000001b7dfe20 rbx=00000001447f6990 rcx=000000001b7dfdf0 rdx=0000000000000000
  2710. 2678.505:0134:0298:trace:seh:dispatch_exception rsi=00000000188a2500 rdi=00000001447f6a10 rbp=000000001b7dffa0 rsp=000000001b7dfdd0
  2711. 2678.505:0134:0298:trace:seh:dispatch_exception r8=0000000000000298 r9=000000001b7dfed0 r10=0000000144929370 r11=00000001447f5920
  2712. 2678.505:0134:0298:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2713. 2678.505:0134:0298:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2714. 2678.505:0134:0298:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2715. 2678.571:0134:029c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2716. 2678.571:0134:029c:trace:seh:dispatch_exception info[0]=0000000100001000
  2717. 2678.571:0134:029c:trace:seh:dispatch_exception info[1]=00000001447f6a10
  2718. 2678.571:0134:029c:trace:seh:dispatch_exception info[2]=000000000000029c
  2719. 2678.571:0134:029c:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2720. 2678.571:0134:029c:trace:seh:dispatch_exception rax=00000000144dfe20 rbx=00000001447f6990 rcx=00000000144dfdf0 rdx=0000000000000000
  2721. 2678.571:0134:029c:trace:seh:dispatch_exception rsi=000000000b5159b0 rdi=00000001447f6a10 rbp=00000000144dffa0 rsp=00000000144dfdd0
  2722. 2678.571:0134:029c:trace:seh:dispatch_exception r8=000000000000029c r9=00000000144dfed0 r10=0000000144929370 r11=00000001447f5920
  2723. 2678.571:0134:029c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2724. 2678.571:0134:029c:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2725. 2678.571:0134:029c:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2726. 2681.058:0134:02a0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2727. 2681.058:0134:02a0:trace:seh:dispatch_exception info[0]=0000000100001000
  2728. 2681.058:0134:02a0:trace:seh:dispatch_exception info[1]=00000001447f64d0
  2729. 2681.058:0134:02a0:trace:seh:dispatch_exception info[2]=00000000000002a0
  2730. 2681.058:0134:02a0:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2731. 2681.058:0134:02a0:trace:seh:dispatch_exception rax=000000001b7dfe20 rbx=00000001447f6450 rcx=000000001b7dfdf0 rdx=0000000000000000
  2732. 2681.058:0134:02a0:trace:seh:dispatch_exception rsi=000000000b5159b0 rdi=00000001447f64d0 rbp=000000001b7dffa0 rsp=000000001b7dfdd0
  2733. 2681.058:0134:02a0:trace:seh:dispatch_exception r8=00000000000002a0 r9=000000001b7dfed0 r10=0000000144929370 r11=00000001447f6590
  2734. 2681.058:0134:02a0:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2735. 2681.058:0134:02a0:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2736. 2681.058:0134:02a0:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2737. 2681.185:0134:0258:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\NETAPI32.DLL" at 00000001D4930000: builtin
  2738. 2681.186:0134:0258:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\NETAPI32.DLL" : builtin
  2739. 2681.188:0134:0258:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00000002EE630000: builtin
  2740. 2681.190:0134:0258:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\crypt32.dll" at 000000001B8E0000: builtin
  2741. 2681.190:0134:0258:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rsaenh.dll" at 00000001CCDD0000: builtin
  2742. 2681.190:0134:0258:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\rsaenh.dll" : builtin
  2743. 2681.191:0134:0258:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\crypt32.dll" : builtin
  2744. 2681.191:0134:0258:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\bcrypt.dll" : builtin
  2745. 2681.225:0134:0258:fixme:toolhelp:CreateToolhelp32Snapshot Unimplemented: heap list snapshot
  2746. 2681.226:0134:0258:fixme:toolhelp:Heap32ListFirst : stub
  2747. 2681.254:0134:0258:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
  2748. 2684.625:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2749. 2684.625:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000145118DAC ip=145118dab
  2750. 2684.625:0134:0138:trace:seh:dispatch_exception info[0]=0000000018a55520
  2751. 2684.625:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2752. 2684.625:0134:0138:trace:seh:dispatch_exception rax=0000000018a55520 rbx=000000014477d6f0 rcx=00000001700713e0 rdx=0000000000000080
  2753. 2684.625:0134:0138:trace:seh:dispatch_exception rsi=0000000000000000 rdi=0000000000000000 rbp=000000000011ebb0 rsp=000000000011eb80
  2754. 2684.625:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018a55520 r10=0000000000000008 r11=00000000000143e1
  2755. 2684.625:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00000001427457d8 r14=0000000000000000 r15=000000000011f018
  2756. 2684.625:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000144E64F6F code=80000003 flags=0
  2757. 2684.625:0134:0138:trace:seh:call_vectored_handlers handler at 0000000144E64F6F returned ffffffff
  2758. 2684.633:0134:02a4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2759. 2684.633:0134:02a4:trace:seh:dispatch_exception info[0]=0000000100001000
  2760. 2684.633:0134:02a4:trace:seh:dispatch_exception info[1]=00000001447f6b30
  2761. 2684.633:0134:02a4:trace:seh:dispatch_exception info[2]=00000000000002a4
  2762. 2684.633:0134:02a4:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2763. 2684.633:0134:02a4:trace:seh:dispatch_exception rax=00000000144dfe20 rbx=00000001447f6ab0 rcx=00000000144dfdf0 rdx=0000000000000000
  2764. 2684.633:0134:02a4:trace:seh:dispatch_exception rsi=0000000018a57090 rdi=00000001447f6b30 rbp=00000000144dffa0 rsp=00000000144dfdd0
  2765. 2684.633:0134:02a4:trace:seh:dispatch_exception r8=00000000000002a4 r9=00000000144dfed0 r10=0000000144929370 r11=00000001447f56c0
  2766. 2684.633:0134:02a4:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2767. 2684.633:0134:02a4:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2768. 2684.633:0134:02a4:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2769. 2686.493:0134:02a8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2770. 2686.493:0134:02a8:trace:seh:dispatch_exception info[0]=00007fff00001000
  2771. 2686.493:0134:02a8:trace:seh:dispatch_exception info[1]=00000000189681c8
  2772. 2686.493:0134:02a8:trace:seh:dispatch_exception info[2]=00000000000002a8
  2773. 2686.493:0134:02a8:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2774. 2686.493:0134:02a8:trace:seh:dispatch_exception rax=000000001b7dfe20 rbx=00007ffffec4a280 rcx=000000001b7dfdf0 rdx=0000000000000000
  2775. 2686.493:0134:02a8:trace:seh:dispatch_exception rsi=000000000b5159b0 rdi=00000000189681c8 rbp=000000001b7dffa0 rsp=000000001b7dfdd0
  2776. 2686.493:0134:02a8:trace:seh:dispatch_exception r8=00000000000002a8 r9=000000001b7dfed0 r10=0000000144929370 r11=00000001447f56c0
  2777. 2686.493:0134:02a8:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2778. 2686.493:0134:02a8:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2779. 2686.493:0134:02a8:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2780. 2686.592:0134:02ac:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2781. 2686.592:0134:02ac:trace:seh:dispatch_exception info[0]=00007fff00001000
  2782. 2686.592:0134:02ac:trace:seh:dispatch_exception info[1]=00007ffffec5c1c0
  2783. 2686.592:0134:02ac:trace:seh:dispatch_exception info[2]=00000000000002ac
  2784. 2686.592:0134:02ac:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2785. 2686.592:0134:02ac:trace:seh:dispatch_exception rax=000000001bb0fe20 rbx=00007ffffec5c140 rcx=000000001bb0fdf0 rdx=0000000000000000
  2786. 2686.592:0134:02ac:trace:seh:dispatch_exception rsi=0000000018952800 rdi=00007ffffec5c1c0 rbp=000000001bb0ffa0 rsp=000000001bb0fdd0
  2787. 2686.592:0134:02ac:trace:seh:dispatch_exception r8=00000000000002ac r9=000000001bb0fed0 r10=0000000144929370 r11=00000001447f5b60
  2788. 2686.592:0134:02ac:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  2789. 2686.592:0134:02ac:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  2790. 2686.592:0134:02ac:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  2791. 2690.794:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2792. 2690.794:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000145594C63 ip=145594c62
  2793. 2690.794:0134:0138:trace:seh:dispatch_exception info[0]=00000000190078f0
  2794. 2690.794:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2795. 2690.794:0134:0138:trace:seh:dispatch_exception rax=00000000190078f0 rbx=00007ffffecfbce0 rcx=00000001700713e0 rdx=0000000000000080
  2796. 2690.794:0134:0138:trace:seh:dispatch_exception rsi=00007ffffecfbcf0 rdi=0000000000000000 rbp=000000000011ed40 rsp=000000000011ed10
  2797. 2690.794:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000190078f0 r10=0000000000000008 r11=00007fff9e9e1680
  2798. 2690.794:0134:0138:trace:seh:dispatch_exception r12=0000000000001018 r13=00007fffabdd9aa0 r14=00007fffabdd9ac0 r15=0000000000000000
  2799. 2690.794:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001451A3850 code=80000003 flags=0
  2800. 2690.794:0134:0138:trace:seh:call_vectored_handlers handler at 00000001451A3850 returned ffffffff
  2801. 2694.281:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2802. 2694.281:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2803. 2694.281:0134:0138:trace:seh:dispatch_exception info[0]=0000000019400f60
  2804. 2694.281:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2805. 2694.281:0134:0138:trace:seh:dispatch_exception rax=0000000019400f60 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2806. 2694.281:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2807. 2694.281:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000019400f60 r10=0000000000000008 r11=000000000011f9b0
  2808. 2694.282:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2809. 2694.282:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2810. 2694.282:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2811. 2715.186:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2812. 2715.186:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2813. 2715.186:0134:0138:trace:seh:dispatch_exception info[0]=00000000194012c0
  2814. 2715.186:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2815. 2715.186:0134:0138:trace:seh:dispatch_exception rax=00000000194012c0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2816. 2715.186:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2817. 2715.186:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000194012c0 r10=0000000000000008 r11=000000000011f9b0
  2818. 2715.186:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2819. 2715.186:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2820. 2715.186:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2821. 2725.795:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2822. 2725.795:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2823. 2725.795:0134:0138:trace:seh:dispatch_exception info[0]=0000000019018790
  2824. 2725.795:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2825. 2725.795:0134:0138:trace:seh:dispatch_exception rax=0000000019018790 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2826. 2725.795:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2827. 2725.795:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000019018790 r10=0000000000000008 r11=000000000011f9b0
  2828. 2725.795:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2829. 2725.795:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2830. 2725.795:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2831. 2741.203:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2832. 2741.203:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2833. 2741.203:0134:0138:trace:seh:dispatch_exception info[0]=000000001900ee30
  2834. 2741.203:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2835. 2741.203:0134:0138:trace:seh:dispatch_exception rax=000000001900ee30 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2836. 2741.203:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2837. 2741.203:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001900ee30 r10=0000000000000008 r11=000000000011f9b0
  2838. 2741.203:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2839. 2741.203:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2840. 2741.203:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2841. 2745.670:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2842. 2745.670:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2843. 2745.670:0134:0138:trace:seh:dispatch_exception info[0]=00000000193ff8d0
  2844. 2745.670:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2845. 2745.670:0134:0138:trace:seh:dispatch_exception rax=00000000193ff8d0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2846. 2745.670:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2847. 2745.670:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000193ff8d0 r10=0000000000000008 r11=000000000011f9b0
  2848. 2745.670:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2849. 2745.670:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2850. 2745.670:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2851. 2755.887:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2852. 2755.887:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2853. 2755.887:0134:0138:trace:seh:dispatch_exception info[0]=00000000193ff2e0
  2854. 2755.887:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2855. 2755.887:0134:0138:trace:seh:dispatch_exception rax=00000000193ff2e0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2856. 2755.887:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2857. 2755.887:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000193ff2e0 r10=0000000000000008 r11=000000000011f9b0
  2858. 2755.887:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2859. 2755.887:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2860. 2755.887:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2861. 2791.968:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2862. 2791.968:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2863. 2791.968:0134:0138:trace:seh:dispatch_exception info[0]=00000000195d9fc0
  2864. 2791.968:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2865. 2791.968:0134:0138:trace:seh:dispatch_exception rax=00000000195d9fc0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2866. 2791.968:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2867. 2791.968:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000195d9fc0 r10=0000000000000008 r11=000000000011f9b0
  2868. 2791.968:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2869. 2791.968:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2870. 2791.968:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2871. 2801.841:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2872. 2801.841:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001418F277C ip=1418f277b
  2873. 2801.841:0134:0138:trace:seh:dispatch_exception info[0]=000000001958c370
  2874. 2801.841:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2875. 2801.841:0134:0138:trace:seh:dispatch_exception rax=000000001958c370 rbx=00007fffad9fb3e0 rcx=00000001700713e0 rdx=0000000000000080
  2876. 2801.841:0134:0138:trace:seh:dispatch_exception rsi=00007fff9e0003d0 rdi=00007fffabdd64f0 rbp=000000000011f7c0 rsp=000000000011f7a0
  2877. 2801.841:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001958c370 r10=0000000000000008 r11=000000000011fb20
  2878. 2801.841:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e013870 r14=0000000000000000 r15=0000000090000042
  2879. 2801.841:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000145169B87 code=80000003 flags=0
  2880. 2801.841:0134:0138:trace:seh:call_vectored_handlers handler at 0000000145169B87 returned ffffffff
  2881. 2817.653:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2882. 2817.653:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2883. 2817.653:0134:0138:trace:seh:dispatch_exception info[0]=0000000018eb0970
  2884. 2817.653:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2885. 2817.653:0134:0138:trace:seh:dispatch_exception rax=0000000018eb0970 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2886. 2817.653:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2887. 2817.653:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018eb0970 r10=0000000000000008 r11=000000000011f9b0
  2888. 2817.653:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2889. 2817.653:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2890. 2817.653:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2891. 2822.070:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2892. 2822.070:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2893. 2822.070:0134:0138:trace:seh:dispatch_exception info[0]=0000000018f35dd0
  2894. 2822.070:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2895. 2822.070:0134:0138:trace:seh:dispatch_exception rax=0000000018f35dd0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2896. 2822.070:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2897. 2822.070:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018f35dd0 r10=0000000000000008 r11=000000000011f9b0
  2898. 2822.070:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2899. 2822.070:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2900. 2822.070:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2901. 2828.219:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2902. 2828.219:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2903. 2828.219:0134:0138:trace:seh:dispatch_exception info[0]=00000000195da050
  2904. 2828.219:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2905. 2828.219:0134:0138:trace:seh:dispatch_exception rax=00000000195da050 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2906. 2828.219:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2907. 2828.219:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000195da050 r10=0000000000000008 r11=000000000011f9b0
  2908. 2828.219:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2909. 2828.219:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2910. 2828.219:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2911. 2833.641:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2912. 2833.641:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001418F277C ip=1418f277b
  2913. 2833.641:0134:0138:trace:seh:dispatch_exception info[0]=0000000019570ea0
  2914. 2833.641:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2915. 2833.641:0134:0138:trace:seh:dispatch_exception rax=0000000019570ea0 rbx=00007fffad9fb3e0 rcx=00000001700713e0 rdx=0000000000000080
  2916. 2833.641:0134:0138:trace:seh:dispatch_exception rsi=00007fff9e0003d0 rdi=00007fffabdd64f0 rbp=000000000011f7c0 rsp=000000000011f7a0
  2917. 2833.641:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000019570ea0 r10=0000000000000008 r11=000000000011fb20
  2918. 2833.641:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e013870 r14=0000000000000000 r15=0000000090000042
  2919. 2833.641:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000145169B87 code=80000003 flags=0
  2920. 2833.641:0134:0138:trace:seh:call_vectored_handlers handler at 0000000145169B87 returned ffffffff
  2921. 2858.191:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2922. 2858.191:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2923. 2858.191:0134:0138:trace:seh:dispatch_exception info[0]=00000000195f6390
  2924. 2858.191:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2925. 2858.191:0134:0138:trace:seh:dispatch_exception rax=00000000195f6390 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2926. 2858.191:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2927. 2858.191:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000195f6390 r10=0000000000000008 r11=000000000011f9b0
  2928. 2858.191:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2929. 2858.191:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2930. 2858.191:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2931. 2864.500:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2932. 2864.500:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2933. 2864.500:0134:0138:trace:seh:dispatch_exception info[0]=00000000195cb740
  2934. 2864.500:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2935. 2864.500:0134:0138:trace:seh:dispatch_exception rax=00000000195cb740 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2936. 2864.500:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2937. 2864.500:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000195cb740 r10=0000000000000008 r11=000000000011f9b0
  2938. 2864.500:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2939. 2864.500:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2940. 2864.500:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2941. 2880.809:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2942. 2880.809:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2943. 2880.809:0134:0138:trace:seh:dispatch_exception info[0]=00000000195736e0
  2944. 2880.809:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2945. 2880.809:0134:0138:trace:seh:dispatch_exception rax=00000000195736e0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2946. 2880.809:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2947. 2880.809:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000195736e0 r10=0000000000000008 r11=000000000011f9b0
  2948. 2880.809:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2949. 2880.809:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2950. 2880.809:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2951. 2884.191:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2952. 2884.191:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2953. 2884.191:0134:0138:trace:seh:dispatch_exception info[0]=000000001964b9c0
  2954. 2884.191:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2955. 2884.191:0134:0138:trace:seh:dispatch_exception rax=000000001964b9c0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2956. 2884.191:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2957. 2884.191:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001964b9c0 r10=0000000000000008 r11=000000000011f9b0
  2958. 2884.191:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2959. 2884.191:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2960. 2884.191:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2961. 2885.878:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2962. 2885.878:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001418F277C ip=1418f277b
  2963. 2885.878:0134:0138:trace:seh:dispatch_exception info[0]=000000001964bfb0
  2964. 2885.878:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2965. 2885.878:0134:0138:trace:seh:dispatch_exception rax=000000001964bfb0 rbx=00007fffad9fb3e0 rcx=00000001700713e0 rdx=0000000000000080
  2966. 2885.878:0134:0138:trace:seh:dispatch_exception rsi=00007fff9e0003d0 rdi=00007fffabdd64f0 rbp=000000000011f7c0 rsp=000000000011f7a0
  2967. 2885.878:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001964bfb0 r10=0000000000000008 r11=000000000011fb20
  2968. 2885.878:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e013870 r14=0000000000000000 r15=0000000090000042
  2969. 2885.878:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000145169B87 code=80000003 flags=0
  2970. 2885.878:0134:0138:trace:seh:call_vectored_handlers handler at 0000000145169B87 returned ffffffff
  2971. 2908.068:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2972. 2908.068:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  2973. 2908.068:0134:0138:trace:seh:dispatch_exception info[0]=0000000018d41d40
  2974. 2908.068:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2975. 2908.068:0134:0138:trace:seh:dispatch_exception rax=0000000018d41d40 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  2976. 2908.068:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  2977. 2908.068:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018d41d40 r10=0000000000000008 r11=000000000011f9b0
  2978. 2908.068:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  2979. 2908.068:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  2980. 2908.068:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  2981. 2917.902:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  2982. 2917.902:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001451E09B9 ip=1451e09b8
  2983. 2917.902:0134:0138:trace:seh:dispatch_exception info[0]=00000000195e32a0
  2984. 2917.902:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  2985. 2917.902:0134:0138:trace:seh:dispatch_exception rax=00000000195e32a0 rbx=00007ffffdb31cc8 rcx=00000001700713e0 rdx=0000000000000080
  2986. 2917.902:0134:0138:trace:seh:dispatch_exception rsi=0000000000000001 rdi=0000000000000003 rbp=000000000011ed80 rsp=000000000011ed50
  2987. 2917.902:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000195e32a0 r10=0000000000000008 r11=0000000000000040
  2988. 2917.902:0134:0138:trace:seh:dispatch_exception r12=0000000000000001 r13=0000000000000000 r14=0000000000000002 r15=00007ffffdb31cc8
  2989. 2917.902:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000145122C1C code=80000003 flags=0
  2990. 2917.902:0134:0138:trace:seh:call_vectored_handlers handler at 0000000145122C1C returned ffffffff
  2991. 2918.121:0134:02b0:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  2992. 2918.121:0134:02b0:trace:seh:dispatch_exception info[0]=00007fff00001000
  2993. 2918.121:0134:02b0:trace:seh:dispatch_exception info[1]=000000001940ae18
  2994. 2918.121:0134:02b0:trace:seh:dispatch_exception info[2]=00000000000002b0
  2995. 2918.121:0134:02b0:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  2996. 2918.121:0134:02b0:trace:seh:dispatch_exception rax=00000000144dfe20 rbx=00007ffffec4a300 rcx=00000000144dfdf0 rdx=0000000000000000
  2997. 2918.121:0134:02b0:trace:seh:dispatch_exception rsi=0000000018a57090 rdi=000000001940ae18 rbp=00000000144dffa0 rsp=00000000144dfdd0
  2998. 2918.121:0134:02b0:trace:seh:dispatch_exception r8=00000000000002b0 r9=00000000144dfed0 r10=0000000144929370 r11=00000001447f7c10
  2999. 2918.121:0134:02b0:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  3000. 2918.121:0134:02b0:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  3001. 2918.121:0134:02b0:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  3002. 2918.252:0134:02b4:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B00CDB7 ip=7b00cdb7
  3003. 2918.252:0134:02b4:trace:seh:dispatch_exception info[0]=00007fff00001000
  3004. 2918.252:0134:02b4:trace:seh:dispatch_exception info[1]=00007ffffed09130
  3005. 2918.252:0134:02b4:trace:seh:dispatch_exception info[2]=00000000000002b4
  3006. 2918.252:0134:02b4:warn:seh:dispatch_exception EXCEPTION_WINE_NAME_THREAD exception (code=406d1388) raised
  3007. 2918.252:0134:02b4:trace:seh:dispatch_exception rax=000000001bb0fe20 rbx=00007ffffed090b0 rcx=000000001bb0fdf0 rdx=0000000000000000
  3008. 2918.252:0134:02b4:trace:seh:dispatch_exception rsi=0000000018ed80f0 rdi=00007ffffed09130 rbp=000000001bb0ffa0 rsp=000000001bb0fdd0
  3009. 2918.252:0134:02b4:trace:seh:dispatch_exception r8=00000000000002b4 r9=000000001bb0fed0 r10=0000000144929370 r11=00000001447f5af0
  3010. 2918.252:0134:02b4:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  3011. 2918.252:0134:02b4:trace:seh:call_vectored_handlers calling handler at 0000000270F7C760 code=406d1388 flags=0
  3012. 2918.252:0134:02b4:trace:seh:call_vectored_handlers handler at 0000000270F7C760 returned ffffffff
  3013. 2921.134:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3014. 2921.134:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000145594C63 ip=145594c62
  3015. 2921.134:0134:0138:trace:seh:dispatch_exception info[0]=000000001897c7e0
  3016. 2921.134:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3017. 2921.134:0134:0138:trace:seh:dispatch_exception rax=000000001897c7e0 rbx=00007ffffed1f990 rcx=00000001700713e0 rdx=0000000000000080
  3018. 2921.134:0134:0138:trace:seh:dispatch_exception rsi=00007ffffed1f9a0 rdi=0000000000000000 rbp=000000000011ed40 rsp=000000000011ed10
  3019. 2921.134:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001897c7e0 r10=0000000000000008 r11=00007fff9e9e1680
  3020. 2921.134:0134:0138:trace:seh:dispatch_exception r12=0000000000001018 r13=00007fffb39d2550 r14=00007fffb39d2570 r15=0000000000000000
  3021. 2921.134:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001451A3850 code=80000003 flags=0
  3022. 2921.134:0134:0138:trace:seh:call_vectored_handlers handler at 00000001451A3850 returned ffffffff
  3023. 2935.339:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3024. 2935.339:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001418F277C ip=1418f277b
  3025. 2935.339:0134:0138:trace:seh:dispatch_exception info[0]=00000000189c8ef0
  3026. 2935.339:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3027. 2935.339:0134:0138:trace:seh:dispatch_exception rax=00000000189c8ef0 rbx=00007fffb042aaf0 rcx=00000001700713e0 rdx=0000000000000080
  3028. 2935.339:0134:0138:trace:seh:dispatch_exception rsi=00007fff9e0003d0 rdi=00007fffb38eede0 rbp=000000000011f7c0 rsp=000000000011f7a0
  3029. 2935.339:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000189c8ef0 r10=0000000000000008 r11=000000000011fb20
  3030. 2935.339:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e013870 r14=0000000000000000 r15=0000000090000042
  3031. 2935.339:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000145169B87 code=80000003 flags=0
  3032. 2935.339:0134:0138:trace:seh:call_vectored_handlers handler at 0000000145169B87 returned ffffffff
  3033. 2952.208:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3034. 2952.208:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  3035. 2952.208:0134:0138:trace:seh:dispatch_exception info[0]=000000001969ae90
  3036. 2952.208:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3037. 2952.208:0134:0138:trace:seh:dispatch_exception rax=000000001969ae90 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  3038. 2952.208:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  3039. 2952.208:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001969ae90 r10=0000000000000008 r11=000000000011f9b0
  3040. 2952.208:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  3041. 2952.208:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  3042. 2952.208:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  3043. 2970.309:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3044. 2970.309:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  3045. 2970.309:0134:0138:trace:seh:dispatch_exception info[0]=000000001969dba0
  3046. 2970.309:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3047. 2970.309:0134:0138:trace:seh:dispatch_exception rax=000000001969dba0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  3048. 2970.309:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  3049. 2970.309:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001969dba0 r10=0000000000000008 r11=000000000011f9b0
  3050. 2970.309:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  3051. 2970.309:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  3052. 2970.309:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  3053. 2986.733:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3054. 2986.733:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  3055. 2986.733:0134:0138:trace:seh:dispatch_exception info[0]=0000000018be6610
  3056. 2986.733:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3057. 2986.733:0134:0138:trace:seh:dispatch_exception rax=0000000018be6610 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  3058. 2986.733:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  3059. 2986.733:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018be6610 r10=0000000000000008 r11=000000000011f9b0
  3060. 2986.733:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  3061. 2986.733:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  3062. 2986.733:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  3063. 3000.891:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3064. 3000.891:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  3065. 3000.891:0134:0138:trace:seh:dispatch_exception info[0]=00000000193ff010
  3066. 3000.891:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3067. 3000.891:0134:0138:trace:seh:dispatch_exception rax=00000000193ff010 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  3068. 3000.891:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  3069. 3000.891:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000193ff010 r10=0000000000000008 r11=000000000011f9b0
  3070. 3000.891:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  3071. 3000.891:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  3072. 3000.891:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  3073. 3011.115:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3074. 3011.115:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  3075. 3011.115:0134:0138:trace:seh:dispatch_exception info[0]=00000000196885b0
  3076. 3011.115:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3077. 3011.115:0134:0138:trace:seh:dispatch_exception rax=00000000196885b0 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  3078. 3011.115:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  3079. 3011.115:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=00000000196885b0 r10=0000000000000008 r11=000000000011f9b0
  3080. 3011.115:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  3081. 3011.115:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  3082. 3011.115:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  3083. 3014.034:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3084. 3014.034:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=0000000144E55FC4 ip=144e55fc3
  3085. 3014.034:0134:0138:trace:seh:dispatch_exception info[0]=000000001969fc10
  3086. 3014.034:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3087. 3014.034:0134:0138:trace:seh:dispatch_exception rax=000000001969fc10 rbx=00007fff21d17a30 rcx=00000001700713e0 rdx=0000000000000080
  3088. 3014.034:0134:0138:trace:seh:dispatch_exception rsi=000000000011faf8 rdi=00007fff9e9b7310 rbp=000000000011f700 rsp=000000000011f6d0
  3089. 3014.034:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=000000001969fc10 r10=0000000000000008 r11=000000000011f9b0
  3090. 3014.034:0134:0138:trace:seh:dispatch_exception r12=0000000000000000 r13=00007fff9e9dde40 r14=0000000000000000 r15=000000009000000c
  3091. 3014.034:0134:0138:trace:seh:call_vectored_handlers calling handler at 00000001403210E6 code=80000003 flags=0
  3092. 3014.034:0134:0138:trace:seh:call_vectored_handlers handler at 00000001403210E6 returned ffffffff
  3093. 3022.929:0134:0138:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
  3094. 3022.929:0134:0138:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001451E09B9 ip=1451e09b8
  3095. 3022.929:0134:0138:trace:seh:dispatch_exception info[0]=0000000018f1d130
  3096. 3022.929:0134:0138:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
  3097. 3022.929:0134:0138:trace:seh:dispatch_exception rax=0000000018f1d130 rbx=00007ffffdb31cc8 rcx=00000001700713e0 rdx=0000000000000080
  3098. 3022.929:0134:0138:trace:seh:dispatch_exception rsi=0000000000000001 rdi=0000000000000003 rbp=000000000011ed80 rsp=000000000011ed50
  3099. 3022.929:0134:0138:trace:seh:dispatch_exception r8=0000000000251800 r9=0000000018f1d130 r10=0000000000000008 r11=0000000000000080
  3100. 3022.929:0134:0138:trace:seh:dispatch_exception r12=0000000000000001 r13=0000000000000000 r14=0000000000000002 r15=00007ffffdb31cc8
  3101. 3022.929:0134:0138:trace:seh:call_vectored_handlers calling handler at 0000000145122C1C code=80000003 flags=0
  3102. 3022.929:0134:0138:trace:seh:call_vectored_handlers handler at 0000000145122C1C returned ffffffff
  3103. 3022.995:0134:0138:fixme:steamclient:Steam_BGetCallback HACK: Steam overlay activated, disabling all input events.
  3104. 3024.914:0134:0138:fixme:steamclient:Steam_BGetCallback HACK: Steam overlay deactivated, enabling all input events.
  3105. 3024.914:0134:0138:fixme:steamclient:Steam_BGetCallback HACK: Steam overlay activated, disabling all input events.
  3106. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4f06bc750 ip=7fa4f06bc750 tid=01cc
  3107. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000008
  3108. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=00007fa4f06bc750
  3109. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=ffffffffffffe4f0 rbx=000000000726e4f0 rcx=000000000726fd30 rdx=ffffffffffffea10
  3110. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=0000000000000000 rdi=00007fa4efe266e7 rbp=000000000726e670 rsp=000000000726e628
  3111. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=000000000726e8d0 r9=000000000726eae0 r10=0000000000000000 r11=000000000726e590
  3112. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=0000000000000000 r13=0000000007270000 r14=000000000726eae0 r15=00007fa4efe266e7
  3113. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4f06bc750: /usr/lib/pressure-vessel/overrides/lib/x86_64-linux-gnu/libc.so.6 + 0x1bd750.
  3114. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3115. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3116. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3117. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3118. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3119. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726d8e0 rbp=000000000726e120 rsp=000000000726deb8
  3120. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3121. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3122. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3123. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3124. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3125. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3126. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3127. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3128. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3129. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726d170 rbp=000000000726d9b0 rsp=000000000726d748
  3130. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3131. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3132. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3133. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3134. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3135. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3136. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3137. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3138. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3139. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726ca00 rbp=000000000726d240 rsp=000000000726cfd8
  3140. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3141. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3142. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3143. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3144. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3145. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3146. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3147. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3148. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3149. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726c290 rbp=000000000726cad0 rsp=000000000726c868
  3150. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3151. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3152. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3153. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3154. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3155. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3156. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3157. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3158. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3159. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726bb20 rbp=000000000726c360 rsp=000000000726c0f8
  3160. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3161. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3162. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3163. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3164. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3165. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3166. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3167. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3168. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3169. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726b3b0 rbp=000000000726bbf0 rsp=000000000726b988
  3170. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3171. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3172. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3173. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3174. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3175. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3176. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3177. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3178. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3179. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726ac40 rbp=000000000726b480 rsp=000000000726b218
  3180. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3181. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3182. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3183. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3184. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3185. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3186. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3187. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3188. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3189. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=000000000726a4d0 rbp=000000000726ad10 rsp=000000000726aaa8
  3190. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3191. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3192. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3193. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3194. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3195. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3196. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3197. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3198. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3199. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007269d60 rbp=000000000726a5a0 rsp=000000000726a338
  3200. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3201. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3202. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3203. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3204. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3205. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3206. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3207. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3208. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3209. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=00000000072695f0 rbp=0000000007269e30 rsp=0000000007269bc8
  3210. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3211. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3212. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3213. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3214. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3215. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3216. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3217. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3218. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3219. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007268e80 rbp=00000000072696c0 rsp=0000000007269458
  3220. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3221. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3222. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3223. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3224. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3225. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3226. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3227. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3228. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3229. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007268710 rbp=0000000007268f50 rsp=0000000007268ce8
  3230. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3231. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3232. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3233. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3234. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3235. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3236. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3237. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3238. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3239. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007267fa0 rbp=00000000072687e0 rsp=0000000007268578
  3240. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3241. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3242. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3243. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3244. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3245. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3246. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3247. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3248. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3249. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007267830 rbp=0000000007268070 rsp=0000000007267e08
  3250. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3251. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3252. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3253. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3254. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3255. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3256. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3257. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3258. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3259. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=00000000072670c0 rbp=0000000007267900 rsp=0000000007267698
  3260. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3261. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3262. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3263. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3264. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3265. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3266. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3267. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3268. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3269. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007266950 rbp=0000000007267190 rsp=0000000007266f28
  3270. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3271. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3272. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3273. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3274. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3275. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3276. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3277. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3278. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3279. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=00000000072661e0 rbp=0000000007266a20 rsp=00000000072667b8
  3280. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3281. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3282. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3283. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3284. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3285. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3286. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3287. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3288. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3289. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007265a70 rbp=00000000072662b0 rsp=0000000007266048
  3290. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3291. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3292. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3293. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3294. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3295. 3024.931:0134:01cc:trace:seh:handle_syscall_fault code=c0000005 flags=0 addr=0x7fa4ee92ae8e ip=7fa4ee92ae8e tid=01cc
  3296. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[0]=0000000000000000
  3297. 3024.931:0134:01cc:trace:seh:handle_syscall_fault info[1]=ffffffffffffffff
  3298. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rax=0000000000000007 rbx=00007fa4ee92ace0 rcx=000000000726e640 rdx=0000000000000000
  3299. 3024.931:0134:01cc:trace:seh:handle_syscall_fault rsi=00007fa4ee96da94 rdi=0000000007265300 rbp=0000000007265b40 rsp=00000000072658d8
  3300. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r8=0000000000000012 r9=0000000000000000 r10=0000000000000000 r11=00000000c0000005
  3301. 3024.931:0134:01cc:trace:seh:handle_syscall_fault r12=00007fa4ee92af27 r13=0000000007270000 r14=0000000000000003 r15=00007fa4efe266e7
  3302. 3024.931:0134:01cc:warn:seh:handle_syscall_fault backtrace: --- Exception 0xc0000005 at 0x7fa4ee92ae8e: /var/home/foxbox/.local/share/Steam/steamapps/common/Proton 8.0/dist/bin/../lib64/wine/x86_64-unix/ntdll.so + 0x4fe8e.
  3303. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: __wine_syscall_dispatcher.
  3304. 3024.931:0134:01cc:warn:seh:dump_syscall_fault backtrace: returning to user mode ip=00000002eb23988a ret=c0000005
  3305. pid 331276 != 331275, skipping destruction (fork without exec?)
  3306.  
Advertisement
Add Comment
Please, Sign In to add comment