J'essaye d'exécuter des jeux Steam avec Proton. (Farming Simulator 19 en l'occurence).
Seulement celui-ci ne se lance pas. Dans Steam, lorsque je clique sur "jouer", il est indiqué comme "lancé" pendant quelques secondes (mais rien ne s'ouvre), puis il quitte.
======================
Proton: 1617827925 experimental-6.3-20210407b
SteamGameId: 787860
Command: ['/home/guirec/.local/share/Steam/steamapps/common/Farming Simulator 19/x64/FarmingSimulator2019Game.exe']
Options: {'forcelgadd'}
SteamLinuxRuntime: v0.20210309.0-0-gb38a1fb
pressure-vessel: 0.20210305.0+srt1 scout 0.20210309.0
soldier: 0.20210309.0 soldier 0.20210309.0
======================
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
esync: up and running.
wine: RLIMIT_NICE is <= 20, unable to use setpriority safely
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.220:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
10014.221:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.221:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.221:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x30.
10014.221:0028:002c:err:seh:check_bpf_jit_enable BPF JIT is not enabled in the kernel, enable it to reduce syscall emulation overhead.
10014.223:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.223:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.223:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.224:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FAE1F1C0000: builtin
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.258:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
10014.259:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.259:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.259:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fa78af7ef59.
10014.259:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
10014.261:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.261:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.261:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.261:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.262:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
10014.262:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
10014.262:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.300:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
10014.300:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.300:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.301:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fa2c4fcbf59.
10014.301:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
10014.302:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.302:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.302:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.303:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
10014.303:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
10014.308:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.314:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
10014.332:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FA2C2410000: builtin
10014.343:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
10014.343:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
10014.351:003c:0058:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
10014.351:003c:0058:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
10014.374:003c:0058:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
10014.374:003c:0058:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
10014.374:003c:0058:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
10014.375:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FA2C1B90000: builtin
10014.375:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.402:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
10014.403:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.403:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.403:005c:0060:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f87ff536f59.
10014.403:005c:0060:trace:seh:install_bpf Seccomp filters already installed.
10014.405:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.405:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.405:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.405:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.406:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
10014.407:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
10014.407:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
10014.407:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
10014.430:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
10014.430:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
10014.430:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.461:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
10014.462:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.462:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.462:0074:0078:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fec53d79f59.
10014.462:0074:0078:trace:seh:install_bpf Seccomp filters already installed.
10014.464:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.464:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.464:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.465:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
10014.465:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
10014.470:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.476:0074:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
10014.480:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FEC511C0000: builtin
10014.481:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
10014.481:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
10014.485:0074:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x101f180,30,(nil))
10014.490:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 000000031DF10000: builtin
10014.490:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
10014.492:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
10014.493:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
10014.493:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
10014.513:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
10014.513:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
10014.513:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
10014.515:0074:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x1c5f960,30,(nil))
10014.548:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FEC42E80000: builtin
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.579:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
10014.579:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.580:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.580:00a4:00a8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f56702f3f59.
10014.580:00a4:00a8:trace:seh:install_bpf Seccomp filters already installed.
10014.581:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.582:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.582:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.586:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
10014.587:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.592:003c:0050:trace:seh:NtQueryInformationThread (0xb0,0,0x162f810,30,(nil))
10014.593:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
10014.595:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
10014.596:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FAE1E590000: builtin
10014.616:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
10014.620:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 7E8E0000: builtin
10014.621:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
10014.621:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
10014.623:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
10014.623:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
10014.623:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 61740000: builtin
10014.625:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
10014.626:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
10014.627:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
10014.627:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
10014.627:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 6ED00000: builtin
10014.627:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
10014.627:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
10014.628:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
10014.629:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
10014.629:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DCE0000: builtin
10014.654:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
10014.665:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
10014.667:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.667:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.667:00bc:00c0:trace:seh:check_bpf_jit_enable enabled 0x30.
10014.667:00bc:00c0:err:seh:check_bpf_jit_enable BPF JIT is not enabled in the kernel, enable it to reduce syscall emulation overhead.
10014.668:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.669:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.669:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.669:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
10014.669:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.671:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
10014.671:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
10014.671:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
10014.695:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
10014.695:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
10014.695:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
10014.700:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FC144050000: builtin
Setting breakpad minidump AppID = 787860
Steam_SetMinidumpSteamID: Caching Steam ID: 76561198152304955 [API loaded no]
10014.721:0020:00c4:err:steam:initialize_vr_data Could not load libopenvr_api.so.
10014.721:0020:00c4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x122ff1c,4,(nil))
10014.734:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
10014.734:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
10014.734:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FC142090000: builtin
10014.740:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
10014.740:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
10014.740:00bc:00c0:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=00c0
10014.740:00bc:00c0:warn:seh:dispatch_exception unknown exception (code=6ba) raised
10014.740:00bc:00c0:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=000000000073e9d8 rcx=000000000073e6f0 rdx=0000000000000000
10014.740:00bc:00c0:trace:seh:dispatch_exception rsi=000000000000006c rdi=0000000000231590 rbp=0000000040010028 rsp=000000000073e6d0
10014.740:00bc:00c0:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000001c0020 r11=00000000a55a5aa5
10014.740:00bc:00c0:trace:seh:dispatch_exception r12=000000000073e9d8 r13=0000000000151ce0 r14=0000000000152090 r15=0000000000000005
10014.740:00bc:00c0:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
10014.740:00bc:00c0:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 000000000073E6D0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 121f0-12277
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rdi
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000073E7B0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 42800-42847
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000073E7E0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 96b0-9737
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x1: pushq %rdi
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 0000000327044B50 rsp 000000000073E840
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 24a50-24cb1
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %rdi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r12
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r13
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r14
10014.740:00bc:00c0:trace:seh:call_stack_handlers found wine frame 000000000073E8B0 rsp 000000000073EBB0 handler 0000000327043A90
10014.740:00bc:00c0:trace:seh:call_teb_handler calling TEB handler 0000000327043A90 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073DC10, dispatch=000000000073DAE0)
10014.740:00bc:00c0:trace:seh:call_teb_handler handler at 0000000327043A90 returned 1
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 00000003270397A7 rsp 000000000073EBB0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 196c0-197cd
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r12
10014.740:00bc:00c0:trace:seh:call_stack_handlers found wine frame 000000000073EBF0 rsp 000000000073ED40 handler 0000000327045F10
10014.740:00bc:00c0:trace:seh:call_teb_handler calling TEB handler 0000000327045F10 (rec=000000000073E6F0, frame=000000000073EBF0 context=000000000073DC10, dispatch=000000000073DAE0)
10014.740:00bc:00c0:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000073EBF0 target_ip=0000000327045EAA rip=000000007bc5a932
10014.740:00bc:00c0:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=000000000073e8b0 rcx=000000000073d4e0 rdx=0000000027045eaa
10014.740:00bc:00c0:trace:seh:RtlUnwindEx rsi=000000000073e1f0 rdi=000000000073dc10 rbp=000000000073cf90 rsp=000000000073ce10
10014.740:00bc:00c0:trace:seh:RtlUnwindEx r8=000000000073e6f0 r9=0000000027045ee0 r10=00000000202c3031 r11=0000000000000000
10014.740:00bc:00c0:trace:seh:RtlUnwindEx r12=000000000073e6f0 r13=000000000073d4e0 r14=000000000073ebf0 r15=000000000073e6f0
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A932 rsp 000000000073CE10
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 5a8e0-5b1ee
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC83950 flags 0 prolog 0x13 bytes function 000000007BC5A8E0-000000007BC5B1EE
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B20F rsp 000000000073D4B0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 5b1f0-5b218
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC83968 flags 0 prolog 0x7 bytes function 000000007BC5B1F0-000000007BC5B218
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045EAA rsp 000000000073D9C0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 25e90-25eac
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A748 flags 0 prolog 0x8 bytes function 0000000327045E90-0000000327045EAC
10014.740:00bc:00c0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x1: pushq %rbp
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045ED9 rsp 000000000073D9F0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 25eb0-25eda
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A754 flags 0 prolog 0x4 bytes function 0000000327045EB0-0000000327045EDA
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045F64 rsp 000000000073DA20
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 25f10-25f65
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A764 flags 0 prolog 0xa bytes function 0000000327045F10-0000000327045F65
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r12
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r13
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r14
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC59E6F rsp 000000000073DA70
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 59b90-5a0e1
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC8390C flags 0 prolog 0x13 bytes function 000000007BC59B90-000000007BC5A0E1
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A3F7 rsp 000000000073E130
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 5a0f0-5a5ff
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC83924 flags 0 prolog 0x10 bytes function 000000007BC5A0F0-000000007BC5A5FF
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC58074 rsp 000000000073E1D0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 5800c-58081
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC83874 flags 0 prolog 0x7 bytes function 000000007BC5800C-000000007BC58081
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 000000000073E6D0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 121f0-12277
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rdi
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000073E7B0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 42800-42847
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000073E7E0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 96b0-9737
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x1: pushq %rdi
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327044B50 rsp 000000000073E840
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 24a50-24cb1
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %rsi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %rdi
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r12
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r13
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r14
10014.740:00bc:00c0:trace:seh:RtlUnwindEx found builtin frame 000000000073E8B0 handler 0000000327043A90
10014.740:00bc:00c0:trace:seh:call_teb_unwind_handler calling TEB handler 0000000327043A90 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073D4E0, dispatch=000000000073CEA0)
10014.740:00bc:00c0:trace:seh:call_teb_unwind_handler handler at 0000000327043A90 returned 1
10014.740:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 00000003270397A7 rsp 000000000073EBB0
10014.740:00bc:00c0:trace:seh:dump_unwind_info **** func 196c0-197cd
10014.740:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
10014.740:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r12
10014.740:00bc:00c0:trace:seh:RtlRestoreContext returning to 0000000327045EAA stack 000000000073EBB0
ERROR: ld.so: object '/home/guirec/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
10014.773:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
10014.774:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
10014.774:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
10014.774:00d4:00d8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f59e2114f59.
10014.774:00d4:00d8:trace:seh:install_bpf Seccomp filters already installed.
10014.775:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
10014.776:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
10014.777:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
10014.779:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
10014.801:0030:00d0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3e7fe2c,4,(nil))
10014.804:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F70000: builtin
10015.725:00d4:00f4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x263fe2c,4,(nil))
10015.730:00d4:00ec:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a1fe2c,4,(nil))
10015.732:00d4:00f0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fe2c,4,(nil))
10015.732:0030:00ac:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x386fe2c,4,(nil))
10015.733:0074:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2e8fe2c,4,(nil))
10015.733:005c:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x204fe2c,4,(nil))
10015.734:005c:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a3fe2c,4,(nil))
10015.735:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=0084
10015.735:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
10015.735:0074:0084:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=000000000162f578 rcx=000000000162f2a0 rdx=0000000000000000
10015.735:0074:0084:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000050 rsp=000000000162f280
10015.735:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
10015.735:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0050 r14=0000000000000000 r15=00000000016b0050
10015.735:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
10015.735:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
10015.735:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
10015.735:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 000000000162F280
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 121f0-12277
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
10015.735:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F360
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE98A4 rsp 000000000162F390
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2E8E rsp 000000000162F3E0
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 22cd0-22ef0
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
10015.735:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
10015.735:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C2790
10015.735:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C2790 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E7C0, dispatch=000000000162E690)
10015.735:0074:0084:trace:seh:call_teb_handler handler at 00000002279C2790 returned 1
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
10015.735:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
10015.735:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C4080
10015.735:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C4080 (rec=000000000162F2A0, frame=000000000162F770 context=000000000162E7C0, dispatch=000000000162E690)
10015.735:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C401A rip=000000007bc5a932
10015.735:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e090 rdx=00000000279c401a
10015.735:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162eda0 rdi=000000000162e7c0 rbp=000000000162db40 rsp=000000000162d9c0
10015.735:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f2a0 r9=00000000279c4050 r10=000000000162e470 r11=0000000000026590
10015.735:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f2a0 r13=000000000162e090 r14=000000000162f770 r15=000000000162f2a0
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A932 rsp 000000000162D9C0
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 5a8e0-5b1ee
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83950 flags 0 prolog 0x13 bytes function 000000007BC5A8E0-000000007BC5B1EE
10015.735:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B20F rsp 000000000162E060
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 5b1f0-5b218
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83968 flags 0 prolog 0x7 bytes function 000000007BC5B1F0-000000007BC5B218
10015.735:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C401A rsp 000000000162E570
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 24000-2401c
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4000-00000002279C401C
10015.735:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
10015.735:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4049 rsp 000000000162E5A0
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 24020-2404a
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4020-00000002279C404A
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40D4 rsp 000000000162E5D0
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 24080-240d5
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C4080-00000002279C40D5
10015.735:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC59E6F rsp 000000000162E620
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 59b90-5a0e1
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8390C flags 0 prolog 0x13 bytes function 000000007BC59B90-000000007BC5A0E1
10015.735:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A3F7 rsp 000000000162ECE0
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 5a0f0-5a5ff
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83924 flags 0 prolog 0x10 bytes function 000000007BC5A0F0-000000007BC5A5FF
10015.735:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC58074 rsp 000000000162ED80
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 5800c-58081
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83874 flags 0 prolog 0x7 bytes function 000000007BC5800C-000000007BC58081
10015.735:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 000000000162F280
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 121f0-12277
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
10015.735:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F360
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE98A4 rsp 000000000162F390
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2E8E rsp 000000000162F3E0
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 22cd0-22ef0
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
10015.735:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
10015.735:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
10015.735:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
10015.735:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
10015.735:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C2790
10015.735:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C2790 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E090, dispatch=000000000162DA50)
10015.735:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C2790 returned 1
10015.735:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
10015.735:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
10015.735:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
10015.735:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
10015.735:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
10015.735:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C401A stack 000000000162F740
10015.736:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
10015.736:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=0084
10015.736:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
10015.736:0074:0084:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=000000000162f578 rcx=000000000162f290 rdx=0000000000000000
10015.736:0074:0084:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=0000000001680190 rbp=0000000000000050 rsp=000000000162f270
10015.736:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
10015.736:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0050 r14=0000000000000000 r15=00000000016b0050
10015.736:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
10015.736:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
10015.736:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
10015.736:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 000000000162F270
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 121f0-12277
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
10015.736:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F350
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000162F380
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
10015.736:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DCD rsp 000000000162F3E0
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 22cd0-22ef0
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
10015.736:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
10015.736:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C2790
10015.736:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C2790 (rec=000000000162F290, frame=000000000162F450 context=000000000162E7B0, dispatch=000000000162E680)
10015.736:0074:0084:trace:seh:call_teb_handler handler at 00000002279C2790 returned 1
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
10015.736:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
10015.736:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C4080
10015.736:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C4080 (rec=000000000162F290, frame=000000000162F770 context=000000000162E7B0, dispatch=000000000162E680)
10015.736:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C401A rip=000000007bc5a932
10015.736:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e080 rdx=00000000279c401a
10015.736:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162ed90 rdi=000000000162e7b0 rbp=000000000162db30 rsp=000000000162d9b0
10015.736:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f290 r9=00000000279c4050 r10=00000000202c3042 r11=0000000000000000
10015.736:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f290 r13=000000000162e080 r14=000000000162f770 r15=000000000162f290
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A932 rsp 000000000162D9B0
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 5a8e0-5b1ee
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83950 flags 0 prolog 0x13 bytes function 000000007BC5A8E0-000000007BC5B1EE
10015.736:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
10015.736:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B20F rsp 000000000162E050
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 5b1f0-5b218
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83968 flags 0 prolog 0x7 bytes function 000000007BC5B1F0-000000007BC5B218
10015.736:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C401A rsp 000000000162E560
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 24000-2401c
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4000-00000002279C401C
10015.736:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
10015.736:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4049 rsp 000000000162E590
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 24020-2404a
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4020-00000002279C404A
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40D4 rsp 000000000162E5C0
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 24080-240d5
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C4080-00000002279C40D5
10015.736:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC59E6F rsp 000000000162E610
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 59b90-5a0e1
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8390C flags 0 prolog 0x13 bytes function 000000007BC59B90-000000007BC5A0E1
10015.736:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
10015.736:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A3F7 rsp 000000000162ECD0
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 5a0f0-5a5ff
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83924 flags 0 prolog 0x10 bytes function 000000007BC5A0F0-000000007BC5A5FF
10015.736:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
10015.736:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC58074 rsp 000000000162ED70
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 5800c-58081
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83874 flags 0 prolog 0x7 bytes function 000000007BC5800C-000000007BC58081
10015.736:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 000000000162F270
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 121f0-12277
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
10015.736:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F350
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000162F380
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
10015.736:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DCD rsp 000000000162F3E0
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 22cd0-22ef0
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
10015.736:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
10015.736:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
10015.736:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
10015.736:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
10015.736:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C2790
10015.736:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C2790 (rec=000000000162F290, frame=000000000162F450 context=000000000162E080, dispatch=000000000162DA40)
10015.736:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C2790 returned 1
10015.736:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
10015.736:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
10015.736:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
10015.736:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
10015.736:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
10015.736:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C401A stack 000000000162F740
10015.737:0074:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1c5fe2c,4,(nil))
10015.737:0074:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x226fe2c,4,(nil))
10015.737:0074:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x287fe2c,4,(nil))
10015.738:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
10015.739:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
10015.741:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
10015.741:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
10015.752:0074:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
10015.753:00d4:00e8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x140fe2c,4,(nil))
10015.753:005c:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x142fe2c,4,(nil))
10015.837:0030:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fe2c,4,(nil))
10015.837:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x140fe2c,4,(nil))
10015.844:0030:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2c4fe2c,4,(nil))
10015.844:0030:010c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x5edfe2c,4,(nil))
10015.847:0030:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x325fe2c,4,(nil))
10015.847:0030:00dc:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x448fe2c,4,(nil))
10015.848:0030:0108:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3e7fe2c,4,(nil))
10015.848:0030:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x263fe2c,4,(nil))
10015.848:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xdffe2c,4,(nil))
pid 28011 != 28010, skipping destruction (fork without exec?)