Skip to content

Instantly share code, notes, and snippets.

@Corben78
Created April 28, 2021 18:26
Show Gist options
  • Select an option

  • Save Corben78/ea051dd2a535b7aed6701a1b19a3fb79 to your computer and use it in GitHub Desktop.

Select an option

Save Corben78/ea051dd2a535b7aed6701a1b19a3fb79 to your computer and use it in GitHub Desktop.
======================
Proton: 1619554117 experimental-6.3-20210427b
SteamGameId: 1128920
Command: ['/mnt/data/SteamLibrary/steamapps/common/EVERSPACE™ 2/Everspace2.exe', '-dx11']
Options: {'forcelgadd'}
SteamLinuxRuntime: v0.20210317.0-0-ge09b2e6
pressure-vessel: 0.20210415.0+srt1 scout 0.20210415.0
soldier: 0.20210415.0 soldier 0.20210415.0
======================
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
esync: up and running.
wine: RLIMIT_NICE is <= 20, unable to use setpriority safely
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.165:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
8907.165:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.165:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.166:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
8907.167:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.167:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.167:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.167:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007F37A1F30000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.184:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
8907.184:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.185:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.185:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f597eba089d.
8907.185:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
8907.186:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.186:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.186:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.186:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.187:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.187:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.187:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.205:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
8907.206:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.206:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.206:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fe9711ff89d.
8907.206:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
8907.208:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.208:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.208:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.208:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
8907.209:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
8907.212:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.216:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
8907.218:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FE96E930000: builtin
8907.221:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.221:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.284:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FE96E580000: builtin
8907.284:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.352:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
8907.353:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.353:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.353:0058:005c:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f8eb2a2d89d.
8907.353:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
8907.355:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.355:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.355:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.355:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.355:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.356:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.356:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.356:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
8907.372:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.372:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.372:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.388:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
8907.388:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.388:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.388:0070:0074:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f3dc5c5989d.
8907.388:0070:0074:trace:seh:install_bpf Seccomp filters already installed.
8907.390:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.390:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.390:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.390:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
8907.391:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
8907.393:0070:0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.397:0070:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
8907.399:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F3DC3390000: builtin
8907.400:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.400:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.402:0070:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x101f180,30,(nil))
8907.405:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 000000031DF10000: builtin
8907.405:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
8907.406:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
8907.407:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.407:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
8907.420:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.420:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.420:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
8907.421:0070:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x1c5f960,30,(nil))
8907.446:0070:007c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F3DC1620000: builtin
8907.453:003c:0054:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.453:003c:0054:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.468:003c:0054:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.468:003c:0054:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.468:003c:0054:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
8907.469:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
8907.470:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.470:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.470:00a0:00a4:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f6b02c0889d.
8907.470:00a0:00a4:trace:seh:install_bpf Seccomp filters already installed.
8907.471:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.471:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.471:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.474:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
8907.474:00a0:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.477:003c:0050:trace:seh:NtQueryInformationThread (0x88,0,0x162f810,30,(nil))
8907.478:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
8907.480:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
8907.481:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F37A1300000: builtin
8907.492:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
8907.494:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 7E7E0000: builtin
8907.495:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
8907.495:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
8907.497:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
8907.497:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
8907.497:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 61740000: builtin
8907.497:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
8907.498:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
8907.499:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
8907.499:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
8907.499:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 6ED00000: builtin
8907.499:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
8907.499:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
8907.500:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
8907.500:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
8907.500:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DD00000: builtin
8907.516:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
8907.520:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
8907.521:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.521:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.521:00b8:00bc:trace:seh:check_bpf_jit_enable enabled 0x31.
8907.522:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.522:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.522:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.522:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.523:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.524:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.524:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.524:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
Setting breakpad minidump AppID = 1128920
Steam_SetMinidumpSteamID: Caching Steam ID: 76561197989405827 [API loaded no]
8907.538:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.538:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.538:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
8907.540:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F404C590000: builtin
8907.541:0020:00c0:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x122ff1c,4,(nil))
skipping config: /home/krummen/.config/MangoHud/wine-explorer.conf [ not found ]
skipping config: /mnt/data/SteamLibrary/steamapps/common/Proton - Experimental/files/bin/MangoHud.conf [ not found ]
skipping config: /home/krummen/.config/MangoHud/wine64-preloader.conf [ not found ]
parsing config: /home/krummen/.config/MangoHud/MangoHud.conf [ ok ]
8907.690:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
8907.690:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
8907.690:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F404AFC0000: builtin
8907.690:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
8907.691:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.691:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.691:00c8:00cc:trace:seh:check_bpf_jit_enable enabled 0x31.
8907.692:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
8907.692:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.693:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.693:00b8:00bc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
8907.693:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.693:00b8:00bc:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01236E ip=000000007B01236E tid=00bc
8907.693:00b8:00bc:warn:seh:dispatch_exception unknown exception (code=6ba) raised
8907.693:00b8:00bc:trace:seh:dispatch_exception rax=000000007b012320 rbx=000000000073e9d8 rcx=000000000073e6f0 rdx=0000000000000000
8907.693:00b8:00bc:trace:seh:dispatch_exception rsi=000000000000006c rdi=00000000002325d0 rbp=0000000040010028 rsp=000000000073e6d0
8907.693:00b8:00bc:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000001c0020 r11=00000000a55a5aa5
8907.693:00b8:00bc:trace:seh:dispatch_exception r12=000000000073e9d8 r13=0000000000151f80 r14=0000000000152330 r15=0000000000000005
8907.693:00b8:00bc:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=6ba flags=0
8907.693:00b8:00bc:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 000000000073E6D0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 12320-123a7
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rdi
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000073E7B0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 42800-42847
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000073E7E0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 96b0-9737
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x1: pushq %rdi
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 0000000327044B50 rsp 000000000073E840
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 24a50-24cb1
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x7: pushq %rdi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r12
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r13
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r14
8907.693:00b8:00bc:trace:seh:call_stack_handlers found wine frame 000000000073E8B0 rsp 000000000073EBB0 handler 0000000327043A90
8907.693:00b8:00bc:trace:seh:call_teb_handler calling TEB handler 0000000327043A90 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073DC10, dispatch=000000000073DAE0)
8907.693:00b8:00bc:trace:seh:call_teb_handler handler at 0000000327043A90 returned 1
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 1 rip 00000003270397A7 rsp 000000000073EBB0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 196c0-197cd
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r12
8907.693:00b8:00bc:trace:seh:call_stack_handlers found wine frame 000000000073EBF0 rsp 000000000073ED40 handler 0000000327045F10
8907.693:00b8:00bc:trace:seh:call_teb_handler calling TEB handler 0000000327045F10 (rec=000000000073E6F0, frame=000000000073EBF0 context=000000000073DC10, dispatch=000000000073DAE0)
8907.693:00b8:00bc:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000073EBF0 target_ip=0000000327045EAA rip=000000007bc5a992
8907.693:00b8:00bc:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=000000000073e8b0 rcx=000000000073d4e0 rdx=0000000027045eaa
8907.693:00b8:00bc:trace:seh:RtlUnwindEx rsi=000000000073e1f0 rdi=000000000073dc10 rbp=000000000073cf90 rsp=000000000073ce10
8907.693:00b8:00bc:trace:seh:RtlUnwindEx r8=000000000073e6f0 r9=0000000027045ee0 r10=000000000073d6d6 r11=0000000000000000
8907.693:00b8:00bc:trace:seh:RtlUnwindEx r12=000000000073e6f0 r13=000000000073d4e0 r14=000000000073ebf0 r15=000000000073e6f0
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A992 rsp 000000000073CE10
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 5a940-5b24e
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC83950 flags 0 prolog 0x13 bytes function 000000007BC5A940-000000007BC5B24E
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xc: pushq %rbx
8907.693:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xb: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rdi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %r12
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r13
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r14
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r15
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B26F rsp 000000000073D4B0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 5b250-5b278
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC83968 flags 0 prolog 0x7 bytes function 000000007BC5B250-000000007BC5B278
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045EAA rsp 000000000073D9C0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 25e90-25eac
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A748 flags 0 prolog 0x8 bytes function 0000000327045E90-0000000327045EAC
8907.693:00b8:00bc:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x1: pushq %rbp
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045ED9 rsp 000000000073D9F0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 25eb0-25eda
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A754 flags 0 prolog 0x4 bytes function 0000000327045EB0-0000000327045EDA
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045F64 rsp 000000000073DA20
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 25f10-25f65
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A764 flags 0 prolog 0xa bytes function 0000000327045F10-0000000327045F65
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r12
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r13
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r14
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC59ECF rsp 000000000073DA70
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 59bf0-5a141
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC8390C flags 0 prolog 0x13 bytes function 000000007BC59BF0-000000007BC5A141
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xc: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xb: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rdi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %r12
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r13
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r14
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r15
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A457 rsp 000000000073E130
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 5a150-5a65f
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC83924 flags 0 prolog 0x10 bytes function 000000007BC5A150-000000007BC5A65F
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xc: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xb: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rdi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %r12
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r13
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r14
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r15
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC580D4 rsp 000000000073E1D0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 5806c-580e1
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007BC83874 flags 0 prolog 0x7 bytes function 000000007BC5806C-000000007BC580E1
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 000000000073E6D0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 12320-123a7
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rdi
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000073E7B0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 42800-42847
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000073E7E0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 96b0-9737
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x1: pushq %rdi
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 0000000327044B50 rsp 000000000073E840
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 24a50-24cb1
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x9: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x8: pushq %rsi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x7: pushq %rdi
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x6: pushq %r12
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x4: pushq %r13
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r14
8907.693:00b8:00bc:trace:seh:RtlUnwindEx found builtin frame 000000000073E8B0 handler 0000000327043A90
8907.693:00b8:00bc:trace:seh:call_teb_unwind_handler calling TEB handler 0000000327043A90 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073D4E0, dispatch=000000000073CEA0)
8907.693:00b8:00bc:trace:seh:call_teb_unwind_handler handler at 0000000327043A90 returned 1
8907.693:00b8:00bc:trace:seh:RtlVirtualUnwind type 2 rip 00000003270397A7 rsp 000000000073EBB0
8907.693:00b8:00bc:trace:seh:dump_unwind_info **** func 196c0-197cd
8907.693:00b8:00bc:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x3: pushq %rbx
8907.693:00b8:00bc:trace:seh:dump_unwind_info 0x2: pushq %r12
8907.693:00b8:00bc:trace:seh:RtlRestoreContext returning to 0000000327045EAA stack 000000000073EBB0
8907.693:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.694:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.694:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.694:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.707:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
8907.708:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.708:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.708:00d8:00dc:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f9ca501889d.
8907.708:00d8:00dc:trace:seh:install_bpf Seccomp filters already installed.
8907.709:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.709:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.709:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.709:00d8:00dc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.713:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.713:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.714:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
8907.716:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F4766AE0000: builtin
8907.717:0030:00d4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x386fe2c,4,(nil))
8907.718:0020:00b4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F70000: builtin
8907.723:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
8907.723:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
8907.723:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F47655C0000: builtin
8907.725:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
8907.725:00c8:00cc:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
8907.727:00d8:0104:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x325fe2c,4,(nil))
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
8907.739:0108:010c:trace:loaddll:build_module Loaded L"Z:\\mnt\\data\\SteamLibrary\\steamapps\\common\\EVERSPACE\2122 2\\Everspace2.exe" at 0000000140000000: native
8907.740:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
8907.740:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
8907.740:0108:010c:trace:seh:check_bpf_jit_enable enabled 0x31.
8907.742:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
8907.742:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
8907.742:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
8907.742:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
8907.743:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
8907.743:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
8907.744:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
8907.744:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 000000023D820000: builtin
8907.746:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
8907.746:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
8907.746:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
8907.746:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
8907.746:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007F21E9E30000: builtin
8907.761:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
8907.762:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000030C980000: builtin
8907.762:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 00000001D97A0000: builtin
8907.763:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 0000000351680000: builtin
8907.763:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\XINPUT1_3.DLL" at 0000000253CC0000: builtin
8907.764:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F21E99B0000: builtin
8907.772:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 00000002BB750000: builtin
8907.773:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
8911.054:0110:0114:trace:loaddll:build_module Loaded L"Z:\\mnt\\data\\SteamLibrary\\steamapps\\common\\EVERSPACE\2122 2\\Engine\\Extras\\Redist\\en-us\\UE4PrereqSetup_x64.exe" at 00400000: native
8911.055:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
8911.055:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
8911.057:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
8911.057:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
8911.057:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 61740000: builtin
8911.059:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
8911.059:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
8911.060:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
8911.060:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
8911.060:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 6ED00000: builtin
8911.062:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
8911.062:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
8911.062:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 64EC0000: builtin
8911.064:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
8911.064:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
8911.064:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 7DAD0000: builtin
8911.064:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Cabinet.dll" at 6D580000: builtin
8911.066:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 66240000: builtin
8911.066:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 6E8C0000: builtin
8911.067:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
8911.067:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 6CC40000: builtin
8911.067:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 6FA80000: builtin
8911.067:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imagehlp.dll" at 6DB40000: builtin
8911.068:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mspatcha.dll" at 710C0000: builtin
8911.068:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\odbccp32.dll" at 62E00000: builtin
8911.068:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sxs.dll" at 658C0000: builtin
8911.069:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 70940000: builtin
8911.069:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 7E940000: builtin
8911.069:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 61940000: builtin
8911.069:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\urlmon.dll" at 637C0000: builtin
8911.070:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wintrust.dll" at 6F4C0000: builtin
8911.070:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msi.dll" at 65080000: builtin
8911.088:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7D5B0000: builtin
8911.093:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 68700000: builtin
8911.094:0110:0114:fixme:heap:RtlSetHeapInformation unimplemented HeapEnableTerminationOnCorruption
8911.097:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rtworkq.dll" at 66740000: builtin
8911.097:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msxml3.dll" at F60E0000: builtin
8911.099:0110:0118:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x100ff1c,4,(nil))
ERROR: ld.so: object '/home/krummen/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
8911.113:011c:0120:trace:loaddll:build_module Loaded L"Z:\\mnt\\data\\SteamLibrary\\steamapps\\common\\EVERSPACE\2122 2\\Engine\\Extras\\Redist\\en-us\\UE4PrereqSetup_x64.exe" at 00400000: native
8911.113:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
8911.113:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
8911.115:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
8911.115:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
8911.115:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 61740000: builtin
8911.116:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
8911.116:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
8911.117:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
8911.117:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
8911.117:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 6ED00000: builtin
8911.118:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
8911.118:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
8911.118:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 64EC0000: builtin
8911.120:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
8911.120:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
8911.120:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 7DEC0000: builtin
8911.120:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Cabinet.dll" at 6D580000: builtin
8911.121:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 66240000: builtin
8911.121:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 6E8C0000: builtin
8911.122:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
8911.122:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 6CC40000: builtin
8911.122:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 6FA80000: builtin
8911.122:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imagehlp.dll" at 6DB40000: builtin
8911.122:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mspatcha.dll" at 710C0000: builtin
8911.123:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\odbccp32.dll" at 62E00000: builtin
8911.123:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sxs.dll" at 658C0000: builtin
8911.123:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 70940000: builtin
8911.124:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 7DE30000: builtin
8911.124:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 61940000: builtin
8911.124:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\urlmon.dll" at 637C0000: builtin
8911.124:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wintrust.dll" at 6F4C0000: builtin
8911.124:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msi.dll" at 65080000: builtin
8911.141:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7D510000: builtin
8911.147:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 68700000: builtin
8911.148:011c:0120:fixme:heap:RtlSetHeapInformation unimplemented HeapEnableTerminationOnCorruption
8911.151:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rtworkq.dll" at 66740000: builtin
8911.151:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msxml3.dll" at F60A0000: builtin
8911.153:011c:0120:fixme:advapi:DecryptFileW (L"C:\\users\\steamuser\\Temp\\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\\", 00000000): stub
8911.156:011c:0124:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x100ff1c,4,(nil))
8911.156:011c:0120:trace:seh:NtQueryInformationThread (0x98,0,0xabf764,1c,(nil))
8911.257:0110:0114:trace:seh:NtGetContextThread 0xfffffffe: eax=7bc2a7ea ebx=00000000 ecx=0000000a edx=0000004e esi=00abf864 edi=00000088
8911.257:0110:0114:trace:seh:NtGetContextThread 0xfffffffe: ebp=00abf828 esp=00abf7bc eip=7bc0c2dc cs=0023 ss=002b flags=00000246
8911.257:0110:0114:trace:seh:NtGetContextThread 0xfffffffe: ds=002b es=002b fs=0063 gs=006b
8911.264:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\srclient.dll" at 01050000: builtin
8911.264:0110:0114:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sfc_os.dll" at 6C940000: builtin
8911.264:0110:0114:fixme:ole:CoInitializeSecurity 00ABF664, -1, 00000000, 00000000, 6, 2, 00000000, 12288, 00000000 stub
8911.265:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winspool.drv" at F3C80000: builtin
8911.265:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\COMDLG32.dll" at 70D00000: builtin
8911.265:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdiplus.dll" at 01060000: builtin
8911.266:011c:0120:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSIMG32.dll" at 70E80000: builtin
8911.266:011c:0120:trace:loaddll:build_module Loaded L"C:\\users\\steamuser\\Temp\\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\\.ba1\\wixstdba.dll" at 10000000: native
8911.272:011c:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\propsys.dll" at 69940000: builtin
8911.272:011c:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\windowscodecs.dll" at 01240000: builtin
8911.288:011c:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorerframe.dll" at 676C0000: builtin
8911.294:011c:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 6AA40000: builtin
8911.294:011c:0134:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Riched20.dll" at 7AC00000: builtin
8911.297:011c:0134:fixme:shell:SHAutoComplete stub
8911.301:011c:0134:err:richedit:ReadStyleSheet missing style number
8912.423:0058:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x265fd8c,4,(nil))
8912.716:0030:0048:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a1fd8c,4,(nil))
8912.717:0030:00e4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x448fd8c,4,(nil))
8912.726:00d8:00fc:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2c4fd8c,4,(nil))
8913.823:011c:0134:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\Riched20.dll" : builtin
8913.823:011c:0134:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\usp10.dll" : builtin
8913.823:011c:0134:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x11fff1c,4,(nil))
8913.824:011c:0120:trace:loaddll:free_modref Unloaded module L"C:\\users\\steamuser\\Temp\\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\\.ba1\\wixstdba.dll" : native
8913.824:011c:0120:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\MSIMG32.dll" : builtin
8913.824:011c:0120:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\gdiplus.dll" : builtin
8913.824:011c:0120:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\COMDLG32.dll" : builtin
8913.824:011c:0120:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\winspool.drv" : builtin
8913.829:011c:0128:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x191ff1c,4,(nil))
8913.830:0110:0130:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x115ff1c,4,(nil))
8913.830:0110:0114:trace:seh:NtQueryInformationThread (0x90,0,0xabf7a4,1c,(nil))
8913.862:0110:012c:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x191ff1c,4,(nil))
8913.863:0110:0114:trace:seh:NtSetInformationThread (0xfffffffe,10,0xabf8b8,4)
8913.867:0108:010c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 0000000205950000: builtin
8913.867:0108:010c:fixme:kernelbase:AppPolicyGetProcessTerminationMethod FFFFFFFFFFFFFFFA, 00000000010BFD70
8914.873:00d8:00f8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x263fe2c,4,(nil))
8914.875:0070:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2e8fe2c,4,(nil))
8914.875:00d8:00f0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a1fe2c,4,(nil))
8914.875:00d8:00f4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fe2c,4,(nil))
8914.875:0058:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x204fe2c,4,(nil))
8914.875:0058:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a3fe2c,4,(nil))
8914.875:0070:0080:trace:seh:dispatch_exception code=6be flags=0 addr=000000007B01236E ip=000000007B01236E tid=0080
8914.875:0070:0080:warn:seh:dispatch_exception unknown exception (code=6be) raised
8914.875:0070:0080:trace:seh:dispatch_exception rax=000000007b012320 rbx=000000000162f578 rcx=000000000162f2a0 rdx=0000000000000000
8914.875:0070:0080:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000050 rsp=000000000162f280
8914.875:0070:0080:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000000002 r11=00000000a55a5aa5
8914.875:0070:0080:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0050 r14=0000000000000000 r15=00000000016b0050
8914.875:0070:0080:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6be flags=0
8914.875:0070:0080:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
8914.875:0070:0080:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=6be flags=0
8914.875:0070:0080:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
8914.875:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 000000000162F280
8914.875:0070:0080:trace:seh:dump_unwind_info **** func 12320-123a7
8914.875:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
8914.875:0070:0080:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
8914.875:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rsi
8914.875:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rdi
8914.875:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F360
8914.875:0070:0080:trace:seh:dump_unwind_info **** func 42800-42847
8914.875:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
8914.875:0070:0080:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8914.875:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE98A4 rsp 000000000162F390
8914.875:0070:0080:trace:seh:dump_unwind_info **** func 97b0-98a5
8914.875:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
8914.875:0070:0080:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
8914.875:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %rbx
8914.875:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rsi
8914.875:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2E8E rsp 000000000162F3E0
8914.875:0070:0080:trace:seh:dump_unwind_info **** func 22cd0-22ef0
8914.875:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
8914.875:0070:0080:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
8914.875:0070:0080:trace:seh:dump_unwind_info 0x7: pushq %rbx
8914.875:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %rsi
8914.875:0070:0080:trace:seh:dump_unwind_info 0x5: pushq %rdi
8914.875:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r12
8914.875:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r13
8914.875:0070:0080:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C2790
8914.875:0070:0080:trace:seh:call_teb_handler calling TEB handler 00000002279C2790 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E7C0, dispatch=000000000162E690)
8914.875:0070:0080:trace:seh:call_teb_handler handler at 00000002279C2790 returned 1
8914.875:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
8914.875:0070:0080:trace:seh:dump_unwind_info **** func 1ac90-1ad76
8914.875:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
8914.875:0070:0080:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
8914.875:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rbx
8914.875:0070:0080:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C4080
8914.875:0070:0080:trace:seh:call_teb_handler calling TEB handler 00000002279C4080 (rec=000000000162F2A0, frame=000000000162F770 context=000000000162E7C0, dispatch=000000000162E690)
8914.875:0070:0080:trace:seh:RtlUnwindEx code=6be flags=2 end_frame=000000000162F770 target_ip=00000002279C401A rip=000000007bc5a992
8914.876:0070:0080:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e090 rdx=00000000279c401a
8914.876:0070:0080:trace:seh:RtlUnwindEx rsi=000000000162eda0 rdi=000000000162e7c0 rbp=000000000162db40 rsp=000000000162d9c0
8914.876:0070:0080:trace:seh:RtlUnwindEx r8=000000000162f2a0 r9=00000000279c4050 r10=000000000162e470 r11=0000000000026590
8914.876:0070:0080:trace:seh:RtlUnwindEx r12=000000000162f2a0 r13=000000000162e090 r14=000000000162f770 r15=000000000162f2a0
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A992 rsp 000000000162D9C0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5a940-5b24e
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83950 flags 0 prolog 0x13 bytes function 000000007BC5A940-000000007BC5B24E
8914.876:0070:0080:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xc: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0xb: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r14
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r15
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B26F rsp 000000000162E060
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5b250-5b278
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83968 flags 0 prolog 0x7 bytes function 000000007BC5B250-000000007BC5B278
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C401A rsp 000000000162E570
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 24000-2401c
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4000-00000002279C401C
8914.876:0070:0080:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rbp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4049 rsp 000000000162E5A0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 24020-2404a
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4020-00000002279C404A
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40D4 rsp 000000000162E5D0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 24080-240d5
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C4080-00000002279C40D5
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r14
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC59ECF rsp 000000000162E620
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 59bf0-5a141
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC8390C flags 0 prolog 0x13 bytes function 000000007BC59BF0-000000007BC5A141
8914.876:0070:0080:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xc: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0xb: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r14
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r15
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A457 rsp 000000000162ECE0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5a150-5a65f
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83924 flags 0 prolog 0x10 bytes function 000000007BC5A150-000000007BC5A65F
8914.876:0070:0080:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xc: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0xb: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r14
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r15
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC580D4 rsp 000000000162ED80
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5806c-580e1
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83874 flags 0 prolog 0x7 bytes function 000000007BC5806C-000000007BC580E1
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 000000000162F280
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 12320-123a7
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
8914.876:0070:0080:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rdi
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F360
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 42800-42847
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE98A4 rsp 000000000162F390
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 97b0-98a5
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rsi
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2E8E rsp 000000000162F3E0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 22cd0-22ef0
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
8914.876:0070:0080:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x5: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r13
8914.876:0070:0080:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C2790
8914.876:0070:0080:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C2790 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E090, dispatch=000000000162DA50)
8914.876:0070:0080:trace:seh:call_teb_unwind_handler handler at 00000002279C2790 returned 1
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 1ac90-1ad76
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rbx
8914.876:0070:0080:trace:seh:RtlRestoreContext returning to 00000002279C401A stack 000000000162F740
8914.876:0070:0080:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01236E ip=000000007B01236E tid=0080
8914.876:0070:0080:warn:seh:dispatch_exception unknown exception (code=6ba) raised
8914.876:0070:0080:trace:seh:dispatch_exception rax=000000007b012320 rbx=000000000162f578 rcx=000000000162f290 rdx=0000000000000000
8914.876:0070:0080:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=0000000001680190 rbp=0000000000000050 rsp=000000000162f270
8914.876:0070:0080:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000016c0020 r11=00000000a55a5aa5
8914.876:0070:0080:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016b0050 r14=0000000000000000 r15=00000000016b0050
8914.876:0070:0080:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
8914.876:0070:0080:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
8914.876:0070:0080:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=6ba flags=0
8914.876:0070:0080:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 000000000162F270
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 12320-123a7
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
8914.876:0070:0080:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rdi
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F350
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 42800-42847
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000162F380
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 96b0-9737
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x3: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rdi
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DCD rsp 000000000162F3E0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 22cd0-22ef0
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
8914.876:0070:0080:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x5: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r13
8914.876:0070:0080:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C2790
8914.876:0070:0080:trace:seh:call_teb_handler calling TEB handler 00000002279C2790 (rec=000000000162F290, frame=000000000162F450 context=000000000162E7B0, dispatch=000000000162E680)
8914.876:0070:0080:trace:seh:call_teb_handler handler at 00000002279C2790 returned 1
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 1ac90-1ad76
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rbx
8914.876:0070:0080:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C4080
8914.876:0070:0080:trace:seh:call_teb_handler calling TEB handler 00000002279C4080 (rec=000000000162F290, frame=000000000162F770 context=000000000162E7B0, dispatch=000000000162E680)
8914.876:0070:0080:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C401A rip=000000007bc5a992
8914.876:0070:0080:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e080 rdx=00000000279c401a
8914.876:0070:0080:trace:seh:RtlUnwindEx rsi=000000000162ed90 rdi=000000000162e7b0 rbp=000000000162db30 rsp=000000000162d9b0
8914.876:0070:0080:trace:seh:RtlUnwindEx r8=000000000162f290 r9=00000000279c4050 r10=000000000162e276 r11=0000000000000000
8914.876:0070:0080:trace:seh:RtlUnwindEx r12=000000000162f290 r13=000000000162e080 r14=000000000162f770 r15=000000000162f290
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A992 rsp 000000000162D9B0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5a940-5b24e
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83950 flags 0 prolog 0x13 bytes function 000000007BC5A940-000000007BC5B24E
8914.876:0070:0080:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xc: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0xb: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r14
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r15
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B26F rsp 000000000162E050
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5b250-5b278
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83968 flags 0 prolog 0x7 bytes function 000000007BC5B250-000000007BC5B278
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C401A rsp 000000000162E560
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 24000-2401c
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4000-00000002279C401C
8914.876:0070:0080:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rbp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4049 rsp 000000000162E590
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 24020-2404a
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4020-00000002279C404A
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40D4 rsp 000000000162E5C0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 24080-240d5
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C4080-00000002279C40D5
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r14
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC59ECF rsp 000000000162E610
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 59bf0-5a141
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC8390C flags 0 prolog 0x13 bytes function 000000007BC59BF0-000000007BC5A141
8914.876:0070:0080:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xc: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0xb: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r14
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r15
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A457 rsp 000000000162ECD0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5a150-5a65f
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83924 flags 0 prolog 0x10 bytes function 000000007BC5A150-000000007BC5A65F
8914.876:0070:0080:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xc: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0xb: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rbp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %r13
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r14
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r15
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC580D4 rsp 000000000162ED70
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 5806c-580e1
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007BC83874 flags 0 prolog 0x7 bytes function 000000007BC5806C-000000007BC580E1
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 000000000162F270
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 12320-123a7
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
8914.876:0070:0080:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0xa: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x9: pushq %rdi
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F350
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 42800-42847
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000162F380
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 96b0-9737
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x3: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rdi
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DCD rsp 000000000162F3E0
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 22cd0-22ef0
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CD0-00000002279C2EF0
8914.876:0070:0080:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x7: pushq %rbx
8914.876:0070:0080:trace:seh:dump_unwind_info 0x6: pushq %rsi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x5: pushq %rdi
8914.876:0070:0080:trace:seh:dump_unwind_info 0x4: pushq %r12
8914.876:0070:0080:trace:seh:dump_unwind_info 0x2: pushq %r13
8914.876:0070:0080:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C2790
8914.876:0070:0080:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C2790 (rec=000000000162F290, frame=000000000162F450 context=000000000162E080, dispatch=000000000162DA40)
8914.876:0070:0080:trace:seh:call_teb_unwind_handler handler at 00000002279C2790 returned 1
8914.876:0070:0080:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
8914.876:0070:0080:trace:seh:dump_unwind_info **** func 1ac90-1ad76
8914.876:0070:0080:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
8914.876:0070:0080:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
8914.876:0070:0080:trace:seh:dump_unwind_info 0x1: pushq %rbx
8914.876:0070:0080:trace:seh:RtlRestoreContext returning to 00000002279C401A stack 000000000162F740
8914.876:0070:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1c5fe2c,4,(nil))
8914.876:0070:0094:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x226fe2c,4,(nil))
8914.876:0070:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x287fe2c,4,(nil))
8914.909:0030:00a8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x325fe2c,4,(nil))
8914.909:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x142fe2c,4,(nil))
8914.909:0070:0080:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
8914.909:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
8914.910:00d8:00ec:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x140fe2c,4,(nil))
8914.910:0070:0080:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
8914.912:0070:0080:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
8914.912:0070:0080:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
8914.913:0070:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
8914.980:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x140fe2c,4,(nil))
8914.980:0030:0150:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x58cfe2c,4,(nil))
8914.981:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fe2c,4,(nil))
8914.981:0030:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x263fe2c,4,(nil))
8914.981:0030:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2c4fe2c,4,(nil))
8915.014:0030:00e0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3e7fe2c,4,(nil))
8915.014:0030:0154:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x5edfe2c,4,(nil))
8915.015:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xdffe2c,4,(nil))
pid 32515 != 32512, skipping destruction (fork without exec?)
@snorkellingcactus
Copy link
Copy Markdown

Hi. I think i have issues launching some games on steam and i have similar logs to yours

Are you on similar situation ?

Is this file part of a bug report ?

Thanks

@Corben78
Copy link
Copy Markdown
Author

Corben78 commented Jun 5, 2021

Hey there, yes, there was an issue with Pressue Vessel and UTF-8 encoded paths where this report was used.
It got fixed, and the game works for me well.
The Proton log files mostly look similar for different games though. So this report won't help you with other games.

@snorkellingcactus
Copy link
Copy Markdown

snorkellingcactus commented Jun 8, 2021

Hi

Ahh. Got it. Thanks for clarification

I get mine working at the end too, in my case game was trying to use integrated graphics. Noticed it on game prefix logs.

I almost resigned to make it work until my last try:

DXVK_FILTER_DEVICE_NAME="GeForce"

Worked to make it use the nvidia card

Happy playing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment