Advertisement
Guest User

Untitled

a guest
May 19th, 2024
52
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 73.17 KB | None | 0 0
  1. ======================
  2. Proton: 1647272410 proton-5.13-6d
  3. SteamGameId: 1172470
  4. Command: ['/home/chev/.local/share/Steam/steamapps/common/Apex Legends/start_protected_game.exe', '-steam']
  5. Options: {'forcelgadd'}
  6. depot: 0.20240415.84602
  7. pressure-vessel: 0.20240415.0 scout
  8. scripts: 0.20240415.0
  9. soldier: 0.20240415.84602 soldier 0.20240415.84602
  10. ======================
  11. esync: up and running.
  12. 925.894:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  13. 925.896:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  14. 925.896:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  15. 925.897:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
  16. 925.897:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
  17. 925.901:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007A5250100000: builtin
  18. 925.902:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  19. 925.902:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007A5250800000: builtin
  20. 925.973:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  21. 925.975:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  22. 925.975:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  23. 925.977:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
  24. 925.977:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
  25. 925.980:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007959E8C80000: builtin
  26. 925.981:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  27. 925.981:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007959E8EA0000: builtin
  28. 925.982:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  29. 925.984:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  30. 925.984:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  31. 925.985:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
  32. 926.078:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  33. 926.080:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  34. 926.080:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  35. 926.081:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
  36. 926.081:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
  37. 926.085:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0000744AF1D00000: builtin
  38. 926.085:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  39. 926.085:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000744AF2480000: builtin
  40. 926.087:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  41. 926.090:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  42. 926.091:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  43. 926.092:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 0000744AF1860000: builtin
  44. 926.092:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 0000744AF1A20000: builtin
  45. 927.677:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  46. 927.677:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  47. 927.715:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  48. 927.716:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  49. 927.717:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  50. 927.718:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  51. 927.718:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
  52. 927.722:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0000746B53780000: builtin
  53. 927.722:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  54. 927.722:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000746B539A0000: builtin
  55. 927.724:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0000746B53690000: builtin
  56. 927.724:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  57. 927.760:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  58. 927.784:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  59. 927.793:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 0000746B53640000: builtin
  60. 927.795:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  61. 927.795:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  62. 927.803:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc7ef70,30,(nil))
  63. 927.815:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
  64. 927.815:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
  65. 927.820:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
  66. 927.824:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 0000746B53060000: builtin
  67. 927.824:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 0000746B53220000: builtin
  68. 928.248:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  69. 928.248:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  70. 928.252:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x109f980,30,(nil))
  71. 928.352:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 0000746B522A0000: builtin
  72. 928.400:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  73. 928.402:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  74. 928.402:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  75. 928.404:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
  76. 928.404:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
  77. 928.408:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F7844880000: builtin
  78. 928.408:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  79. 928.408:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F7844AA0000: builtin
  80. 928.410:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007F7844790000: builtin
  81. 928.410:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
  82. 928.445:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  83. 928.454:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe8f7b0,30,(nil))
  84. 928.463:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F7845010000: builtin
  85. 928.474:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  86. 928.474:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  87. 928.479:0088:0098:trace:seh:NtQueryInformationThread (0x60,0,0xe8f750,30,(nil))
  88. 928.624:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007A524F460000: builtin
  89. 928.629:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  90. 928.634:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  91. 928.635:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  92. 928.635:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007A524F020000: builtin
  93. 928.635:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  94. 928.635:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  95. 928.635:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  96. 928.636:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007A524F620000: builtin
  97. 929.089:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  98. 929.095:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
  99. 929.097:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
  100. 929.097:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
  101. 929.102:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7E940000: builtin
  102. 929.107:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E4F0000: builtin
  103. 929.108:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
  104. 929.108:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7E5E0000: builtin
  105. 929.109:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E380000: builtin
  106. 929.110:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
  107. 929.115:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
  108. 929.115:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
  109. 929.115:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E150000: builtin
  110. 929.115:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
  111. 929.124:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
  112. 929.125:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
  113. 929.125:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7D740000: builtin
  114. 929.727:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
  115. 929.738:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  116. 929.740:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  117. 929.740:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  118. 929.741:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
  119. 929.741:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
  120. 929.745:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0000722B48880000: builtin
  121. 929.745:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  122. 929.745:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000722B48AA0000: builtin
  123. 929.746:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 0000722B486C0000: builtin
  124. 929.747:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  125. 929.751:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  126. 929.751:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  127. 929.752:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 0000722B48420000: builtin
  128. 930.213:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  129. 930.213:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
  130. 930.220:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 0000722B480F0000: builtin
  131. 931.717:00a8:00b0:err:clipboard:convert_selection Timed out waiting for SelectionNotify event
  132. 932.114:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  133. 932.114:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  134. 932.114:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 0000722B45C20000: builtin
  135. 932.132:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
  136. 932.132:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000DB0000: builtin
  137. 932.265:00a8:00b0:err:clipboard:convert_selection Timed out waiting for SelectionNotify event
  138. 933.250:003c:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x129fd00,4,(nil))
  139. 933.467:0030:0048:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe9fd00,4,(nil))
  140. 934.910:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F0920000: builtin
  141. Setting breakpad minidump AppID = 1172470
  142. Steam_SetMinidumpSteamID: Caching Steam ID: 76561199215062893 [API loaded no]
  143. 937.529:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  144. 937.531:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  145. 937.531:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  146. 937.758:00bc:00c0:trace:loaddll:build_module Loaded L"Z:\\home\\chev\\.local\\share\\Steam\\steamapps\\common\\Apex Legends\\start_protected_game.exe" at 0000000140000000: native
  147. 937.758:00bc:00c0:trace:seh:check_bpf_jit_enable enabled 0x31.
  148. 937.769:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 000078151C400000: builtin
  149. 937.769:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  150. 937.769:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 000078151CE20000: builtin
  151. 937.771:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
  152. 937.772:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
  153. 937.772:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
  154. 937.773:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000078151C230000: builtin
  155. 937.773:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 000078151C620000: builtin
  156. 937.784:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
  157. 937.784:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
  158. 937.785:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
  159. 937.785:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 000078151B620000: builtin
  160. 937.787:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
  161. 937.809:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WS2_32.dll" at 000078151C8D0000: builtin
  162. 937.849:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 000078151C0F0000: builtin
  163. 937.849:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 000078151C120000: builtin
  164. 937.853:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IMM32.dll" at 000000006BEC0000: builtin
  165. 937.859:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 0000000066440000: builtin
  166. 937.859:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000000637C0000: builtin
  167. 938.473:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000006E340000: builtin
  168. 938.475:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 000000006B880000: builtin
  169. 938.477:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 000000006E6C0000: builtin
  170. 938.546:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-string-l1-1-0.dll" at 0000000066780000: builtin
  171. 938.560:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-datetime-l1-1-1.dll" at 0000000066600000: builtin
  172. 938.566:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-obsolete-l1-2-0.dll" at 0000000061340000: builtin
  173. 938.571:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 000078151AB10000: builtin
  174. 938.818:00bc:00c0:fixme:win:RegisterTouchWindow (0x10052 00000003): stub
  175. 938.829:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 000078151A9C0000: builtin
  176. 938.849:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\vulkan-1.dll" at 0000000064D40000: builtin
  177. 938.851:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 000078151A940000: builtin
  178. 938.851:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\D3D9.DLL" at 0000000062240000: native
  179. 938.857:00bc:00c0:trace:seh:NtQueryInformationThread (0xbc,0,0x21df60,30,(nil))
  180. info: Game: start_protected_game.exe
  181. info: DXVK: v1.7.3-37-g3f91cdbc
  182. info: Built-in extension providers:
  183. info: Win32 WSI
  184. info: OpenVR
  185. info: OpenXR
  186. 938.869:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\openvr_api_dxvk.dll" at 0000000180000000: native
  187. 938.869:00bc:00c0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,1,0x21dc30,20,(nil))
  188. warn: OpenVR: Failed to initialize OpenVR
  189. 938.880:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\opengl32.dll" at 000000007A850000: builtin
  190. 938.880:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wined3d.dll" at 000078151A3E0000: builtin
  191. 938.880:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 000078151A820000: builtin
  192. 938.880:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineopenxr.dll" at 000078151A910000: builtin
  193. warn: OpenXR: Unable to get required Vulkan instance extensions size
  194. info: Enabled instance extensions:
  195. info: VK_KHR_get_surface_capabilities2
  196. info: VK_KHR_surface
  197. info: VK_KHR_win32_surface
  198. 938.965:00bc:00c0:err:vulkan:wine_vkCreateInstance Failed to create instance, res=-9
  199. 938.965:00bc:00c0:trace:seh:dispatch_exception code=20474343 flags=0 addr=000000007B01193E ip=7b01193e tid=00c0
  200. 938.965:00bc:00c0:trace:seh:dispatch_exception info[0]=00000000009b6e20
  201. 938.965:00bc:00c0:trace:seh:dispatch_exception rax=000000000021e2e0 rbx=00000000009b6e60 rcx=000000000021e2c0 rdx=0000000000000000
  202. 938.965:00bc:00c0:trace:seh:dispatch_exception rsi=000000000021e3b8 rdi=000000000021e2e8 rbp=000000000021e6f0 rsp=000000000021e2a0
  203. 938.965:00bc:00c0:trace:seh:dispatch_exception r8=0000000000000001 r9=000000000021e3b0 r10=00000000000103f8 r11=000000000021e088
  204. 938.965:00bc:00c0:trace:seh:dispatch_exception r12=00000000009b6e20 r13=000000000021e4d0 r14=000000000021e500 r15=000000000021e430
  205. 938.965:00bc:00c0:trace:seh:call_vectored_handlers calling handler at 0000000062321A80 code=20474343 flags=0
  206. 938.965:00bc:00c0:trace:seh:call_vectored_handlers handler at 0000000062321A80 returned 0
  207. 938.965:00bc:00c0:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=20474343 flags=0
  208. 938.965:00bc:00c0:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  209. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp 21e2a0
  210. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 118f0-11977
  211. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  212. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  213. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rsi
  214. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rdi
  215. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 62314d41 rsp 21e380
  216. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func d4cf0-d4d4b
  217. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 00000000624C541C flags 0 prolog 0x4 bytes function 0000000062314CF0-0000000062314D4B
  218. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  219. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 62405413 rsp 21e3b0
  220. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 1c53a0-1c5421
  221. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 00000000624B4C34 flags 0 prolog 0x8 bytes function 00000000624053A0-0000000062405421
  222. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  223. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %rbx
  224. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rsi
  225. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r12
  226. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 62411b27 rsp 21e3f0
  227. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 1d1ab6-1d1c4f
  228. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 00000000624AA704 flags 3 prolog 0x0 bytes function 0000000062411AB6-0000000062411C4F
  229. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %r15,0x1e0(%rsp)
  230. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %r14,0x1d8(%rsp)
  231. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %r13,0x1d0(%rsp)
  232. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %r12,0x1c8(%rsp)
  233. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %rdi,0x1c0(%rsp)
  234. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %rsi,0x1b8(%rsp)
  235. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: movq %rbx,0x1b0(%rsp)
  236. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x0: subq $0x1e8,%rsp
  237. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000062405540 data at 00000000624AA72C
  238. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000062405540 (rec=000000000021E2C0, frame=0x21e3f0 context=000000000021D7F0, dispatch=000000000021D6C0)
  239. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000062405540 returned 1
  240. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 622c381c rsp 21e5e0
  241. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 82b30-83ce3
  242. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 00000000624AA558 flags 3 prolog 0x2c bytes function 00000000622C2B30-00000000622C3CE3
  243. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x2c: movaps %xmm8,0x2b0(%rsp)
  244. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x23: movaps %xmm7,0x2a0(%rsp)
  245. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x1b: movaps %xmm6,0x290(%rsp)
  246. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x2c8,%rsp
  247. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  248. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  249. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  250. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  251. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
  252. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
  253. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
  254. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
  255. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000062405540 data at 00000000624AA580
  256. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000062405540 (rec=000000000021E2C0, frame=0x21e5e0 context=000000000021D7F0, dispatch=000000000021D6C0)
  257. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000062405540 returned 1
  258. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 6224261f rsp 21e8f0
  259. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 25e0-2ae8
  260. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000006249C330 flags 3 prolog 0x13 bytes function 00000000622425E0-0000000062242AE8
  261. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x218,%rsp
  262. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
  263. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
  264. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
  265. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
  266. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
  267. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
  268. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
  269. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
  270. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000062405540 data at 000000006249C34C
  271. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000062405540 (rec=000000000021E2C0, frame=0x21e8f0 context=000000000021D7F0, dispatch=000000000021D6C0)
  272. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000062405540 returned 1
  273. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 6224153f rsp 21eb50
  274. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 1520-157b
  275. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000006249C090 flags 3 prolog 0x8 bytes function 0000000062241520-000000006224157B
  276. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: subq $0x28,%rsp
  277. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r12
  278. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r13
  279. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000062405540 data at 000000006249C0A0
  280. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000062405540 (rec=000000000021E2C0, frame=0x21eb50 context=000000000021D7F0, dispatch=000000000021D6C0)
  281. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000062405540 returned 1
  282. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 400585bf rsp 21eb90
  283. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 585a0-585fe
  284. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140352F38 flags 4 prolog 0x0 bytes function 00000001400585A0-00000001400585FE
  285. 938.965:00bc:00c0:trace:seh:dump_unwind_info chained to function 00000001400584D0-0000000140058575
  286. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140352F10 flags 3 prolog 0x19 bytes function 00000001400584D0-0000000140058575
  287. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: movq %rsi,0x68(%rsp)
  288. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x40,%rsp
  289. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %rdi
  290. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000140159B14 data at 0000000140352F20
  291. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000140159B14 (rec=000000000021E2C0, frame=0x21eb90 context=000000000021D7F0, dispatch=000000000021D6C0)
  292. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000140159B14 returned 1
  293. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 40058cdf rsp 21ebe0
  294. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 58ccf-58d0d
  295. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140353284 flags 4 prolog 0x8 bytes function 0000000140058CCF-0000000140058D0D
  296. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: movq %r14,0x288(%rsp)
  297. 938.965:00bc:00c0:trace:seh:dump_unwind_info chained to function 0000000140058C9D-0000000140058CCF
  298. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140353270 flags 4 prolog 0x8 bytes function 0000000140058C9D-0000000140058CCF
  299. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: movq %rsi,0x280(%rsp)
  300. 938.965:00bc:00c0:trace:seh:dump_unwind_info chained to function 0000000140058C40-0000000140058C9D
  301. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140353254 flags 3 prolog 0x29 bytes function 0000000140058C40-0000000140058C9D
  302. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x18: subq $0x240,%rsp
  303. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %r15
  304. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %r13
  305. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x5: pushq %r12
  306. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rdi
  307. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %rbp
  308. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000140159B14 data at 000000014035326C
  309. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000140159B14 (rec=000000000021E2C0, frame=0x21ebe0 context=000000000021D7F0, dispatch=000000000021D6C0)
  310. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000140159B14 returned 1
  311. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 4007e2ec rsp 21ee50
  312. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 7e24e-7e312
  313. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140355B58 flags 4 prolog 0x5 bytes function 000000014007E24E-000000014007E312
  314. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x5: movq %r12,0x78(%rsp)
  315. 938.965:00bc:00c0:trace:seh:dump_unwind_info chained to function 000000014007E190-000000014007E24E
  316. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140355B44 flags 0 prolog 0x13 bytes function 000000014007E190-000000014007E24E
  317. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x30,%rsp
  318. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xf: pushq %r15
  319. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xd: pushq %r14
  320. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %r13
  321. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rdi
  322. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %rsi
  323. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %rbp
  324. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %rbx
  325. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 40032cf6 rsp 21eec0
  326. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 32580-32f3c
  327. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140350D00 flags 3 prolog 0x2c bytes function 0000000140032580-0000000140032F3C
  328. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x1e: movq %rsi,0x188(%rsp)
  329. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x1e: movq %rbx,0x180(%rsp)
  330. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x1e: subq $0x140,%rsp
  331. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x12: pushq %r15
  332. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x10: pushq %r14
  333. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xe: pushq %r12
  334. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rdi
  335. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rbp
  336. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000140159D94 data at 0000000140350D20
  337. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000140159D94 (rec=000000000021E2C0, frame=0x21eec0 context=000000000021D7F0, dispatch=000000000021D6C0)
  338. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000140159D94 returned 1
  339. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 40043b93 rsp 21f030
  340. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 43350-442f9
  341. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140352754 flags 3 prolog 0x2a bytes function 0000000140043350-00000001400442F9
  342. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x18: movq %rdi,0x970(%rsp)
  343. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x18: movq %rsi,0x968(%rsp)
  344. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x18: movq %rbx,0x960(%rsp)
  345. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x18: subq $0x950,%rsp
  346. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x11: pushq %r14
  347. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 0000000140159D94 data at 0000000140352770
  348. 938.965:00bc:00c0:trace:seh:call_handler calling handler 0000000140159D94 (rec=000000000021E2C0, frame=0x21f030 context=000000000021D7F0, dispatch=000000000021D6C0)
  349. 938.965:00bc:00c0:trace:seh:call_handler handler at 0000000140159D94 returned 1
  350. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 402110c2 rsp 21f990
  351. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 210f90-211139
  352. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000140356B50 flags 0 prolog 0x14 bytes function 0000000140210F90-0000000140211139
  353. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x14: movq %rbx,0x70(%rsp)
  354. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x14: subq $0x20,%rsp
  355. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x10: pushq %r15
  356. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xe: pushq %r14
  357. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %r13
  358. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %r12
  359. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %rdi
  360. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %rsi
  361. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %rbp
  362. 938.965:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 40159a92 rsp 21f9f0
  363. 938.965:00bc:00c0:trace:seh:dump_unwind_info **** func 15998c-159afd
  364. 938.965:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000014035F76C flags 1 prolog 0xa bytes function 000000014015998C-0000000140159AFD
  365. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: movq %rbx,0x40(%rsp)
  366. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  367. 938.965:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %rdi
  368. 938.965:00bc:00c0:trace:seh:dump_unwind_info handler 000000014015B0CC data at 000000014035F77C
  369. 938.965:00bc:00c0:trace:seh:call_handler calling handler 000000014015B0CC (rec=000000000021E2C0, frame=0x21f9f0 context=000000000021D7F0, dispatch=000000000021D6C0)
  370. 938.965:00bc:00c0:trace:seh:call_handler handler at 000000014015B0CC returned 1
  371. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind function 7b64ae76 base 0x7b64aa80 cie 0x7b67c998 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
  372. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa80: DW_CFA_def_cfa %rsp, 8
  373. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa80: DW_CFA_offset %rip, -8
  374. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind fde 0x7b6909e0 len 60 personality (nil) lsda (nil) code 7b64aa80-7b64b0a1
  375. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa80: DW_CFA_advance_loc 1
  376. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa81: DW_CFA_def_cfa_offset 16
  377. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa81: DW_CFA_offset %rbp, -16
  378. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa81: DW_CFA_advance_loc 3
  379. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa84: DW_CFA_def_cfa_register %rbp
  380. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aa84: DW_CFA_advance_loc 32
  381. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaa4: DW_CFA_expression %xmm6 7b6909fc-7b6909ff
  382. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaa4: DW_CFA_offset %rdi, -24
  383. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaa4: DW_CFA_offset %rsi, -32
  384. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaa4: DW_CFA_advance_loc 8
  385. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaac: DW_CFA_expression %xmm7 7b690a07-7b690a0a
  386. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaac: DW_CFA_advance_loc 9
  387. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aab5: DW_CFA_expression %xmm8 7b690a0e-7b690a11
  388. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aab5: DW_CFA_advance_loc 9
  389. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aabe: DW_CFA_expression %xmm9 7b690a15-7b690a18
  390. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aabe: DW_CFA_advance_loc 9
  391. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aac7: DW_CFA_expression %xmm10 7b690a1c-7b690a1f
  392. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aac7: DW_CFA_advance_loc 9
  393. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aad0: DW_CFA_expression %xmm11 7b690a23-7b690a26
  394. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aad0: DW_CFA_advance_loc 9
  395. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aad9: DW_CFA_expression %xmm12 7b690a2a-7b690a2d
  396. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aad9: DW_CFA_advance_loc 9
  397. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aae2: DW_CFA_expression %xmm13 7b690a31-7b690a34
  398. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aae2: DW_CFA_advance_loc 9
  399. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaeb: DW_CFA_expression %xmm14 7b690a38-7b690a3b
  400. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaeb: DW_CFA_advance_loc 9
  401. 938.965:00bc:00c0:trace:seh:execute_cfa_instructions 7b64aaf4: DW_CFA_expression %xmm15 7b690a3f-7b690a42
  402. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind next function rip=0000000000000000
  403. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind rax=000000000021e2e0 rbx=0000000000000000 rcx=000000000021e2c0 rdx=0000000000000000
  404. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind rsi=0000000000000000 rdi=0000000000000000 rbp=0000000000000000 rsp=000000000021ffe0
  405. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind r8=0000000000000001 r9=000000000021e3b0 r10=00000000000103f8 r11=000000000021e088
  406. 938.965:00bc:00c0:trace:seh:dwarf_virtual_unwind r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
  407. 938.965:00bc:00c0:trace:seh:call_stack_handlers found wine frame 000000000021FDF0 rsp 21ffe0 handler 000000007B662350
  408. 938.965:00bc:00c0:trace:seh:call_teb_handler calling TEB handler 000000007B662350 (rec=000000000021E2C0, frame=000000000021FDF0 context=000000000021D7F0, dispatch=000000000021D6C0)
  409. wine: Unhandled exception 0x20474343 in thread c0 at address 000000007B01193E (thread 00c0), starting debugger...
  410. 938.971:00bc:00c0:trace:seh:start_debugger Starting debugger L"winedbg --auto 188 196"
  411. 939.014:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
  412. 939.016:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
  413. 939.016:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
  414. 939.017:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedbg.exe" at 00007D8F15B80000: builtin
  415. 939.017:00cc:00d0:trace:seh:install_bpf Seccomp filters already installed.
  416. 939.021:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007D8F15960000: builtin
  417. 939.021:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 0000000066200000: builtin
  418. 939.023:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
  419. 939.023:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007D8F158D0000: builtin
  420. 939.182:00bc:00c0:trace:seh:call_teb_handler handler at 000000007B662350 returned 1
  421. 939.182:00bc:00d4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xbcfc40,4,(nil))
  422. 939.182:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 40159b00 rsp 21ffe8
  423. 939.182:00bc:00c0:trace:seh:dump_unwind_info **** func 159b00-159b12
  424. 939.182:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000014034B5DC flags 0 prolog 0x4 bytes function 0000000140159B00-0000000140159B12
  425. 939.182:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  426. Unhandled exception: 0x20474343 in 64-bit code (0x000000007b01193e).
  427. 939.188:00cc:00d0:fixme:dbghelp:interpret_function_table_entry PUSH_MACHFRAME 8
  428. 939.188:00cc:00d0:fixme:dbghelp:interpret_function_table_entry PUSH_MACHFRAME 7
  429. 939.188:00cc:00d0:fixme:dbghelp:interpret_function_table_entry PUSH_MACHFRAME 6
  430. Register dump:
  431. rip:000000007b01193e rsp:000000000021e2a0 rbp:000000000021e6f0 eflags:00000206 ( - -- I - -P- )
  432. rax:000000000021e2e0 rbx:00000000009b6e60 rcx:000000000021e2c0 rdx:0000000000000000
  433. rsi:000000000021e3b8 rdi:000000000021e2e8 r8:0000000000000001 r9:000000000021e3b0 r10:00000000000103f8
  434. r11:000000000021e088 r12:00000000009b6e20 r13:000000000021e4d0 r14:000000000021e500 r15:000000000021e430
  435. Stack dump:
  436. 0x000000000021e2a0: 000000000021e2c0 000000006247ed10
  437. 0x000000000021e2b0: 000000006247f1e0 00000000623222a3
  438. 0x000000000021e2c0: 0000000020474343 0000000000000000
  439. 0x000000000021e2d0: 000000007b01193e 0000000000000001
  440. 0x000000000021e2e0: 00000000009b6e20 0000000000000000
  441. 0x000000000021e2f0: 0000000000000000 0000000000000000
  442. 0x000000000021e300: 0000000000000000 0000000000000000
  443. 0x000000000021e310: 0000000062474520 00000000009b4da0
  444. 0x000000000021e320: 000000000000007a 0000000062322ea6
  445. 0x000000000021e330: 0000000000000043 000000006243aec0
  446. 0x000000000021e340: 000000006243af03 00000000009b6e60
  447. 0x000000000021e350: 00000000009b6e60 0000000062474520
  448. Backtrace:
  449. =>0 0x000000007b01193e EntryPoint+0xffffffffffffffff() in kernelbase (0x000000000021e6f0)
  450. 1 0x0000000062314d41 EntryPoint+0xd39f0() in d3d9 (0x000000000021e6f0)
  451. 2 0x0000000062405413 EntryPoint+0x1c40c2() in d3d9 (0x000000000021e6f0)
  452. 3 0x0000000062411b27 EntryPoint+0x1d07d6() in d3d9 (0x000000000021e6f0)
  453. 4 0x00000000622c381c EntryPoint+0x824cb() in d3d9 (0x000000000021e6f0)
  454. 0x000000007b01193e EntryPoint+0xffffffffffffffff in kernelbase: nop
  455. Modules:
  456. Module Address Debug info Name (39 modules)
  457. PE 61340000- 61347000 Deferred api-ms-win-core-localization-obsolete-l1-2-0
  458. PE 61900000- 6192b000 Deferred sechost
  459. PE 62240000- 624d1000 Export d3d9
  460. PE 637c0000- 6387a000 Deferred winmm
  461. PE 64940000- 64959000 Deferred shcore
  462. PE 64d40000- 64d4f000 Deferred vulkan-1
  463. PE 65000000- 65143000 Deferred ole32
  464. PE 65780000- 6578e000 Deferred version
  465. PE 66440000- 66461000 Deferred msacm32
  466. PE 66600000- 66607000 Deferred api-ms-win-core-datetime-l1-1-1
  467. PE 66780000- 66787000 Deferred api-ms-win-core-string-l1-1-0
  468. PE 68a40000- 68a94000 Deferred shlwapi
  469. PE 6a100000- 6a231000 Deferred oleaut32
  470. PE 6a700000- 6a77f000 Deferred setupapi
  471. PE 6b880000- 6b887000 Deferred api-ms-win-core-fibers-l1-1-1
  472. PE 6bec0000- 6bed9000 Deferred imm32
  473. PE 6e340000- 6e348000 Deferred api-ms-win-core-synch-l1-2-0
  474. PE 6e6c0000- 6e6c8000 Deferred api-ms-win-core-localization-l1-2-1
  475. PE 6fbc0000- 6fc46000 Deferred rpcrt4
  476. PE 7a850000- 7a854000 Deferred opengl32
  477. PE 7b000000- 7b0d1000 Export kernelbase
  478. PE 7b610000- 7b7cd000 Deferred kernel32
  479. PE 7bc00000- 7bca5000 Deferred ntdll
  480. PE 140000000- 1403be000 Deferred start_protected_game
  481. PE 180000000- 180097000 Deferred openvr_api_dxvk
  482. PE 78151a3e0000- 78151a3e4000 Deferred wined3d
  483. PE 78151a820000- 78151a824000 Deferred dxgi
  484. PE 78151a910000- 78151a913000 Deferred wineopenxr
  485. PE 78151a940000- 78151a944000 Deferred winevulkan
  486. PE 78151a9c0000- 78151a9c4000 Deferred msvcrt
  487. PE 78151ab10000- 78151ab14000 Deferred winex11
  488. PE 78151b620000- 78151bef6000 Deferred shell32
  489. PE 78151c0f0000- 78151c0f4000 Deferred bcrypt
  490. PE 78151c120000- 78151c164000 Deferred crypt32
  491. PE 78151c230000- 78151c237000 Deferred gdi32
  492. PE 78151c400000- 78151c404000 Deferred ucrtbase
  493. PE 78151c620000- 78151c702000 Deferred user32
  494. PE 78151c8d0000- 78151c8d4000 Deferred ws2_32
  495. PE 78151ce20000- 78151ce24000 Deferred advapi32
  496. Threads:
  497. process tid prio (all id:s are in hex)
  498. 00000020 steam.exe
  499. 00000024 0
  500. 000000a4 0
  501. 00000030 services.exe
  502. 00000034 0
  503. 00000038 0
  504. 00000044 0
  505. 00000060 0
  506. 0000006c 0
  507. 00000090 0
  508. 0000009c 0
  509. 0000003c plugplay.exe
  510. 00000040 0
  511. 0000004c 0
  512. 00000050 0
  513. 00000054 0
  514. 00000074 0
  515. 00000058 winedevice.exe
  516. 0000005c 0
  517. 00000064 0
  518. 00000068 0
  519. 00000070 0
  520. 0000007c 0
  521. 00000080 0
  522. 00000084 0
  523. 00000088 winedevice.exe
  524. 0000008c 0
  525. 00000094 0
  526. 00000098 0
  527. 000000a0 0
  528. 000000a8 explorer.exe
  529. 000000ac 0
  530. 000000b0 0
  531. 000000b4 0
  532. 000000b8 0
  533. 000000bc (D) Z:\home\chev\.local\share\Steam\steamapps\common\Apex Legends\start_protected_game.exe
  534. 000000c0 0 <==
  535. 000000c4 0
  536. 000000c8 0
  537. 000000d4 0
  538. System information:
  539. Wine build: wine-5.13-789-gc14054e6923
  540. Platform: x86_64
  541. Version: Windows 10
  542. Host system: Linux
  543. Host version: 6.8.7-arch1-1
  544. 940.271:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x108fda0,4,(nil))
  545. 940.271:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe7fda0,4,(nil))
  546. 940.272:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16cfda0,4,(nil))
  547. 940.275:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  548. 940.278:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc6fda0,4,(nil))
  549. 940.278:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  550. 940.278:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eed0 rdx=0000000000000000
  551. 940.278:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000e8eeb0
  552. 940.278:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000de5d8 r11=0000000000e8ecd8
  553. 940.278:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=000000000005e370 r14=0000000000000000 r15=00000000ffba0000
  554. 940.278:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  555. 940.278:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  556. 940.278:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  557. 940.278:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  558. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eeb0
  559. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  560. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  561. 940.278:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  562. 940.278:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  563. 940.278:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  564. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef90
  565. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  566. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  567. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  568. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp e8efc0
  569. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  570. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  571. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  572. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  573. 940.278:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  574. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21c9e rsp e8f010
  575. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  576. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  577. 940.278:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  578. 940.278:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  579. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  580. 940.278:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  581. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  582. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  583. 940.278:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  584. 940.278:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  585. 940.278:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  586. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  587. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  588. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  589. 940.278:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  590. 940.278:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  591. 940.278:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  592. 940.278:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EED0, frame=0000000000E8F3A0 context=0000000000E8E400, dispatch=0000000000E8E2D0)
  593. 940.278:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  594. 940.278:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcd0 rdx=0000000067a22ee6
  595. 940.278:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9d0 rdi=0000000000e8e400 rbp=0000000000e8d780 rsp=0000000000e8d600
  596. 940.278:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eed0 r9=0000000067a22f20 r10=0000000000e8e0e0 r11=0000000000025590
  597. 940.278:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eed0 r13=0000000000e8dcd0 r14=0000000000e8f3a0 r15=0000000000e8eed0
  598. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d600
  599. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  600. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  601. 940.278:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  602. 940.278:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  603. 940.278:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  604. 940.278:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  605. 940.278:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  606. 940.278:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  607. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  608. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  609. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  610. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dca0
  611. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  612. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  613. 940.278:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  614. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1b0
  615. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  616. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  617. 940.278:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  618. 940.278:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  619. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  620. 940.278:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  621. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1e0
  622. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  623. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  624. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  625. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e210
  626. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  627. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  628. 940.278:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  629. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  630. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  631. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  632. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e260
  633. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  634. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  635. 940.278:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  636. 940.278:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  637. 940.278:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  638. 940.278:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  639. 940.278:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  640. 940.278:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  641. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  642. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  643. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  644. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e920
  645. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  646. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  647. 940.278:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  648. 940.278:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  649. 940.278:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  650. 940.278:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  651. 940.278:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  652. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  653. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  654. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  655. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9b0
  656. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  657. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  658. 940.278:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  659. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eeb0
  660. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  661. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  662. 940.278:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  663. 940.278:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  664. 940.278:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  665. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef90
  666. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  667. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  668. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  669. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp e8efc0
  670. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
  671. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
  672. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
  673. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
  674. 940.278:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
  675. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21c9e rsp e8f010
  676. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  677. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  678. 940.278:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  679. 940.278:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  680. 940.278:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  681. 940.278:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  682. 940.278:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  683. 940.278:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  684. 940.278:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  685. 940.278:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EED0, frame=0000000000E8F080 context=0000000000E8DCD0, dispatch=0000000000E8D690)
  686. 940.278:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  687. 940.278:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  688. 940.278:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  689. 940.278:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  690. 940.278:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  691. 940.278:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  692. 940.278:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  693. 940.280:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01193E ip=7b01193e tid=0068
  694. 940.280:0058:0068:trace:seh:dispatch_exception rax=000000007b0118f0 rbx=0000000000e8f1a8 rcx=0000000000e8eec0 rdx=0000000000000000
  695. 940.280:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000005a750 rbp=0000000000000000 rsp=0000000000e8eea0
  696. 940.280:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000103c8 r11=0000000000e8ef18
  697. 940.280:0058:0068:trace:seh:dispatch_exception r12=0000000000e8f1a8 r13=00000000000de460 r14=0000000000000000 r15=00000000ffba0000
  698. 940.280:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
  699. 940.280:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
  700. 940.280:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636530 code=6ba flags=0
  701. 940.280:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636530 returned 0
  702. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b01193e rsp e8eea0
  703. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  704. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  705. 940.280:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  706. 940.280:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  707. 940.280:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  708. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp e8ef80
  709. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  710. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  711. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  712. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp e8efb0
  713. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  714. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  715. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  716. 940.280:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  717. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  718. 940.280:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  719. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a21bdd rsp e8f010
  720. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  721. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  722. 940.280:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  723. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  724. 940.280:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  725. 940.280:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  726. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  727. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  728. 940.280:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F080 rsp e8f370 handler 0000000067A215A0
  729. 940.280:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  730. 940.280:0058:0068:trace:seh:call_teb_handler handler at 0000000067A215A0 returned 1
  731. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19f95 rsp e8f370
  732. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  733. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  734. 940.280:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  735. 940.280:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  736. 940.280:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E8F3A0 rsp e8f4e0 handler 0000000067A22F50
  737. 940.280:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22F50 (rec=0000000000E8EEC0, frame=0000000000E8F3A0 context=0000000000E8E3F0, dispatch=0000000000E8E2C0)
  738. 940.280:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E8F3A0 target_ip=0000000067A22EE6 rip=000000007bc5fdb2
  739. 940.280:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000e8f080 rcx=0000000000e8dcc0 rdx=0000000067a22ee6
  740. 940.280:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e8e9c0 rdi=0000000000e8e3f0 rbp=0000000000e8d770 rsp=0000000000e8d5f0
  741. 940.280:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e8eec0 r9=0000000067a22f20 r10=000000000000000a r11=0000000000000293
  742. 940.280:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e8eec0 r13=0000000000e8dcc0 r14=0000000000e8f3a0 r15=0000000000e8eec0
  743. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5fdb2 rsp e8d5f0
  744. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 5fd60-6062e
  745. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A798 flags 0 prolog 0x13 bytes function 000000007BC5FD60-000000007BC6062E
  746. 940.280:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
  747. 940.280:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  748. 940.280:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  749. 940.280:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  750. 940.280:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  751. 940.280:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  752. 940.280:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  753. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  754. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  755. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc6064f rsp e8dc90
  756. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 60630-60658
  757. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A7B0 flags 0 prolog 0x7 bytes function 000000007BC60630-000000007BC60658
  758. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
  759. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22ee6 rsp e8e1a0
  760. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 22ecc-22ee8
  761. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E90 flags 0 prolog 0x8 bytes function 0000000067A22ECC-0000000067A22EE8
  762. 940.280:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
  763. 940.280:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
  764. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
  765. 940.280:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
  766. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22f19 rsp e8e1d0
  767. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 22ef0-22f1a
  768. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33E9C flags 0 prolog 0x4 bytes function 0000000067A22EF0-0000000067A22F1A
  769. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  770. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22fa4 rsp e8e200
  771. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 22f50-22fa5
  772. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33EAC flags 0 prolog 0xa bytes function 0000000067A22F50-0000000067A22FA5
  773. 940.280:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
  774. 940.280:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  775. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  776. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  777. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp e8e250
  778. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 5f200-5f741
  779. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A758 flags 0 prolog 0x13 bytes function 000000007BC5F200-000000007BC5F741
  780. 940.280:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
  781. 940.280:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
  782. 940.280:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
  783. 940.280:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
  784. 940.280:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
  785. 940.280:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
  786. 940.280:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
  787. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
  788. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
  789. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f81e rsp e8e910
  790. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 5f750-5fa89
  791. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A770 flags 0 prolog 0xe bytes function 000000007BC5F750-000000007BC5FA89
  792. 940.280:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
  793. 940.280:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
  794. 940.280:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
  795. 940.280:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
  796. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
  797. 940.280:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
  798. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
  799. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
  800. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5dab8 rsp e8e9a0
  801. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 5da50-5dac5
  802. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC8A6D8 flags 0 prolog 0x7 bytes function 000000007BC5DA50-000000007BC5DAC5
  803. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
  804. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b01193e rsp e8eea0
  805. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 118f0-11977
  806. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A23A8 flags 0 prolog 0x11 bytes function 000000007B0118F0-000000007B011977
  807. 940.280:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
  808. 940.280:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
  809. 940.280:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
  810. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp e8ef80
  811. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
  812. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
  813. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
  814. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp e8efb0
  815. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
  816. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
  817. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
  818. 940.280:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
  819. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
  820. 940.280:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
  821. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a21bdd rsp e8f010
  822. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 21ae0-21d00
  823. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A33DE4 flags 0 prolog 0xe bytes function 0000000067A21AE0-0000000067A21D00
  824. 940.280:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
  825. 940.280:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
  826. 940.280:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
  827. 940.280:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
  828. 940.280:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
  829. 940.280:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
  830. 940.280:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E8F080 handler 0000000067A215A0
  831. 940.280:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A215A0 (rec=0000000000E8EEC0, frame=0000000000E8F080 context=0000000000E8DCC0, dispatch=0000000000E8D680)
  832. 940.280:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A215A0 returned 1
  833. 940.280:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19f95 rsp e8f370
  834. 940.280:0058:0068:trace:seh:dump_unwind_info **** func 19ec0-19fa6
  835. 940.280:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A339E0 flags 0 prolog 0x8 bytes function 0000000067A19EC0-0000000067A19FA6
  836. 940.280:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
  837. 940.280:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
  838. 940.280:0058:0068:trace:seh:RtlRestoreContext returning to 67a22ee6 stack e8f370
  839. 940.281:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x109fda0,4,(nil))
  840. 940.282:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12afda0,4,(nil))
  841. 940.283:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14bfda0,4,(nil))
  842. 940.286:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
  843. 940.290:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
  844. 940.294:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
  845. 940.294:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
  846. 940.298:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe8fda0,4,(nil))
  847. 940.377:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x16dfda0,4,(nil))
  848. 940.379:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x14cfda0,4,(nil))
  849. 940.384:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc8fda0,4,(nil))
  850. 940.386:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x12bfda0,4,(nil))
  851. 940.386:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x10afda0,4,(nil))
  852. 940.387:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xa7fda0,4,(nil))
  853. pid 6815 != 6814, skipping destruction (fork without exec?)
  854.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement