Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save coreybruce/0f2cc4ab7dd46eea762271f2396706e1 to your computer and use it in GitHub Desktop.
Save coreybruce/0f2cc4ab7dd46eea762271f2396706e1 to your computer and use it in GitHub Desktop.
Blood and Steel log proton 6.3-5
======================
Proton: 1624629470 proton-6.3-5
SteamGameId: 567630
Command: ['/mnt/GameDrive/Steam/Steamapps/common/Blood of Steel/x64/BosClient.exe', 'tjxbsteam']
Options: {'forcelgadd'}
depot: 0.20210630.17
pressure-vessel: 0.20210630.0
scripts: v0.20210623.0-0-ga389036
soldier: 0.20210629.0 soldier 0.20210629.0
======================
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
fsync: up and running.
wine: RLIMIT_NICE is <= 20, unable to use setpriority safely
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6486.621:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
6486.621:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6486.621:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6486.621:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
6486.623:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6486.623:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6486.623:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6486.623:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FD3355F0000: builtin
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6486.647:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
6486.648:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6486.648:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6486.648:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f5015c1318d.
6486.648:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
6486.649:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6486.649:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6486.649:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6486.650:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6486.651:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6486.651:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6486.651:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6486.679:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
6486.679:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6486.679:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6486.680:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f4ec181318d.
6486.680:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
6486.681:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6486.681:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6486.681:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6486.682:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
6486.682:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
6486.686:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6486.692:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe1f870,30,(nil))
6486.694:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007F4EBF240000: builtin
6486.698:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6486.698:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6486.716:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
6486.716:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6486.716:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6486.717:0058:005c:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7fe62adc318d.
6486.717:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
6486.718:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6486.718:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6486.718:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6486.719:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
6486.719:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
6486.723:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6486.727:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xe1f870,30,(nil))
6486.729:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FE628800000: builtin
6486.732:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6486.732:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6486.735:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xc0f180,30,(nil))
6486.737:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FE628490000: builtin
6486.744:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 000000031DF10000: builtin
6486.744:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
6486.747:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
6486.749:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
6486.749:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
6487.046:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
6487.046:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
6487.046:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
6487.047:0058:0064:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=0064
6487.047:0058:0064:warn:seh:dispatch_exception unknown exception (code=6ba) raised
6487.047:0058:0064:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=0000000000c0ea68 rcx=0000000000c0e780 rdx=0000000000000000
6487.047:0058:0064:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000002aaa0 rbp=0000000000000050 rsp=0000000000c0e760
6487.047:0058:0064:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000c0e768
6487.047:0058:0064:trace:seh:dispatch_exception r12=0000000000c0ea68 r13=00000000000eaba0 r14=0000000000000000 r15=00000000000eaba0
6487.047:0058:0064:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
6487.047:0058:0064:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
6487.047:0058:0064:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
6487.047:0058:0064:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 0000000000C0E760
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 121f0-12277
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6487.047:0058:0064:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rdi
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 0000000000C0E840
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 42800-42847
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 0000000000C0E870
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 96b0-9737
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6487.047:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rdi
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 0000000000C0E8D0
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 22cf0-22f10
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6487.047:0058:0064:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x7: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x5: pushq %rdi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r12
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r13
6487.047:0058:0064:trace:seh:call_stack_handlers found wine frame 0000000000C0E940 rsp 0000000000C0EC30 handler 00000002279C27B0
6487.047:0058:0064:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=0000000000C0E780, frame=0000000000C0E940 context=0000000000C0DCA0, dispatch=0000000000C0DB70)
6487.047:0058:0064:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 0000000000C0EC30
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6487.047:0058:0064:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rbx
6487.047:0058:0064:trace:seh:call_stack_handlers found wine frame 0000000000C0EC60 rsp 0000000000C0EDA0 handler 00000002279C40A0
6487.047:0058:0064:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=0000000000C0E780, frame=0000000000C0EC60 context=0000000000C0DCA0, dispatch=0000000000C0DB70)
6487.047:0058:0064:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000C0EC60 target_ip=00000002279C403A rip=000000007bc55ef2
6487.047:0058:0064:trace:seh:RtlUnwindEx rax=000000003ffd0000 rbx=0000000000c0e940 rcx=0000000000c0d570 rdx=00000000279c403a
6487.047:0058:0064:trace:seh:RtlUnwindEx rsi=0000000000c0e280 rdi=0000000000c0dca0 rbp=0000000000c0d020 rsp=0000000000c0cea0
6487.047:0058:0064:trace:seh:RtlUnwindEx r8=0000000000c0e780 r9=00000000279c4070 r10=0000000000c0d950 r11=0000000000026590
6487.047:0058:0064:trace:seh:RtlUnwindEx r12=0000000000c0e780 r13=0000000000c0d570 r14=0000000000c0ec60 r15=0000000000c0e780
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC55EF2 rsp 0000000000C0CEA0
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 55ea0-567ae
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E7C0 flags 0 prolog 0x13 bytes function 000000007BC55EA0-000000007BC567AE
6487.047:0058:0064:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.047:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC567CF rsp 0000000000C0D540
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 567b0-567d8
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E7D8 flags 0 prolog 0x7 bytes function 000000007BC567B0-000000007BC567D8
6487.047:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 0000000000C0DA50
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 24020-2403c
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
6487.047:0058:0064:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
6487.047:0058:0064:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rbp
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 0000000000C0DA80
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 24040-2406a
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.047:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x125f960,30,(nil))
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 0000000000C0DAB0
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 240a0-240f5
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
6487.047:0058:0064:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r12
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r13
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r14
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5542F rsp 0000000000C0DB00
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 55150-556a1
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E77C flags 0 prolog 0x13 bytes function 000000007BC55150-000000007BC556A1
6487.047:0058:0064:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.047:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC559B7 rsp 0000000000C0E1C0
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 556b0-55bbf
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E794 flags 0 prolog 0x10 bytes function 000000007BC556B0-000000007BC55BBF
6487.047:0058:0064:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.047:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53634 rsp 0000000000C0E260
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 535cc-53641
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E6E4 flags 0 prolog 0x7 bytes function 000000007BC535CC-000000007BC53641
6487.047:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 0000000000C0E760
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 121f0-12277
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6487.047:0058:0064:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rdi
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 0000000000C0E840
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 42800-42847
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 0000000000C0E870
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 96b0-9737
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6487.047:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rdi
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 0000000000C0E8D0
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 22cf0-22f10
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6487.047:0058:0064:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x7: pushq %rbx
6487.047:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %rsi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x5: pushq %rdi
6487.047:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r12
6487.047:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r13
6487.047:0058:0064:trace:seh:RtlUnwindEx found builtin frame 0000000000C0E940 handler 00000002279C27B0
6487.047:0058:0064:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=0000000000C0E780, frame=0000000000C0E940 context=0000000000C0D570, dispatch=0000000000C0CF30)
6487.047:0058:0064:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
6487.047:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 0000000000C0EC30
6487.047:0058:0064:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6487.047:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6487.047:0058:0064:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6487.047:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rbx
6487.047:0058:0064:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 0000000000C0EC30
6487.048:0058:0064:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=0064
6487.048:0058:0064:warn:seh:dispatch_exception unknown exception (code=6ba) raised
6487.048:0058:0064:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=0000000000c0ea68 rcx=0000000000c0e780 rdx=0000000000000000
6487.048:0058:0064:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000002aaa0 rbp=0000000000000050 rsp=0000000000c0e760
6487.048:0058:0064:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000000000 r11=0000000000c0e768
6487.048:0058:0064:trace:seh:dispatch_exception r12=0000000000c0ea68 r13=00000000000eaba0 r14=0000000000000000 r15=00000000000eaba0
6487.048:0058:0064:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
6487.048:0058:0064:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
6487.048:0058:0064:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
6487.048:0058:0064:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 0000000000C0E760
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 121f0-12277
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6487.048:0058:0064:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rdi
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 0000000000C0E840
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 42800-42847
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 0000000000C0E870
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 96b0-9737
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6487.048:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rdi
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 0000000000C0E8D0
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 22cf0-22f10
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6487.048:0058:0064:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x7: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x5: pushq %rdi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r12
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r13
6487.048:0058:0064:trace:seh:call_stack_handlers found wine frame 0000000000C0E940 rsp 0000000000C0EC30 handler 00000002279C27B0
6487.048:0058:0064:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=0000000000C0E780, frame=0000000000C0E940 context=0000000000C0DCA0, dispatch=0000000000C0DB70)
6487.048:0058:0064:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 0000000000C0EC30
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6487.048:0058:0064:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rbx
6487.048:0058:0064:trace:seh:call_stack_handlers found wine frame 0000000000C0EC60 rsp 0000000000C0EDA0 handler 00000002279C40A0
6487.048:0058:0064:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=0000000000C0E780, frame=0000000000C0EC60 context=0000000000C0DCA0, dispatch=0000000000C0DB70)
6487.048:0058:0064:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000C0EC60 target_ip=00000002279C403A rip=000000007bc55ef2
6487.048:0058:0064:trace:seh:RtlUnwindEx rax=000000003ffd0000 rbx=0000000000c0e940 rcx=0000000000c0d570 rdx=00000000279c403a
6487.048:0058:0064:trace:seh:RtlUnwindEx rsi=0000000000c0e280 rdi=0000000000c0dca0 rbp=0000000000c0d020 rsp=0000000000c0cea0
6487.048:0058:0064:trace:seh:RtlUnwindEx r8=0000000000c0e780 r9=00000000279c4070 r10=0000000000c0d766 r11=0000000000000293
6487.048:0058:0064:trace:seh:RtlUnwindEx r12=0000000000c0e780 r13=0000000000c0d570 r14=0000000000c0ec60 r15=0000000000c0e780
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC55EF2 rsp 0000000000C0CEA0
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 55ea0-567ae
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E7C0 flags 0 prolog 0x13 bytes function 000000007BC55EA0-000000007BC567AE
6487.048:0058:0064:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.048:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC567CF rsp 0000000000C0D540
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 567b0-567d8
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E7D8 flags 0 prolog 0x7 bytes function 000000007BC567B0-000000007BC567D8
6487.048:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 0000000000C0DA50
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 24020-2403c
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
6487.048:0058:0064:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
6487.048:0058:0064:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rbp
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 0000000000C0DA80
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 24040-2406a
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 0000000000C0DAB0
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 240a0-240f5
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
6487.048:0058:0064:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r12
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r13
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r14
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5542F rsp 0000000000C0DB00
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 55150-556a1
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E77C flags 0 prolog 0x13 bytes function 000000007BC55150-000000007BC556A1
6487.048:0058:0064:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.048:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC559B7 rsp 0000000000C0E1C0
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 556b0-55bbf
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E794 flags 0 prolog 0x10 bytes function 000000007BC556B0-000000007BC55BBF
6487.048:0058:0064:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.048:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53634 rsp 0000000000C0E260
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 535cc-53641
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007BC7E6E4 flags 0 prolog 0x7 bytes function 000000007BC535CC-000000007BC53641
6487.048:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 0000000000C0E760
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 121f0-12277
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6487.048:0058:0064:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0xa: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x9: pushq %rdi
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 0000000000C0E840
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 42800-42847
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 0000000000C0E870
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 96b0-9737
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6487.048:0058:0064:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rdi
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 0000000000C0E8D0
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 22cf0-22f10
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6487.048:0058:0064:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x7: pushq %rbx
6487.048:0058:0064:trace:seh:dump_unwind_info 0x6: pushq %rsi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x5: pushq %rdi
6487.048:0058:0064:trace:seh:dump_unwind_info 0x4: pushq %r12
6487.048:0058:0064:trace:seh:dump_unwind_info 0x2: pushq %r13
6487.048:0058:0064:trace:seh:RtlUnwindEx found builtin frame 0000000000C0E940 handler 00000002279C27B0
6487.048:0058:0064:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=0000000000C0E780, frame=0000000000C0E940 context=0000000000C0D570, dispatch=0000000000C0CF30)
6487.048:0058:0064:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
6487.048:0058:0064:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 0000000000C0EC30
6487.048:0058:0064:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6487.048:0058:0064:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6487.048:0058:0064:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6487.048:0058:0064:trace:seh:dump_unwind_info 0x1: pushq %rbx
6487.048:0058:0064:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 0000000000C0EC30
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6487.091:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
6487.091:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.092:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.092:007c:0080:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f9b54bba18d.
6487.092:007c:0080:trace:seh:install_bpf Seccomp filters already installed.
6487.093:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.093:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.093:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.094:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.095:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
6487.095:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6487.095:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6487.095:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
6487.135:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
6487.135:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
6487.135:007c:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6487.158:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
6487.159:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.159:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.159:0094:0098:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f23257df18d.
6487.159:0094:0098:trace:seh:install_bpf Seccomp filters already installed.
6487.160:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.160:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.161:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.165:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
6487.165:0094:0098:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.170:003c:004c:err:ntoskrnl:ZwLoadDriver failed to create driver L"\\Registry\\Machine\\System\\CurrentControlSet\\Services\\nsiproxy": c0000142
6487.171:0030:0034:fixme:service:scmdatabase_autostart_services Auto-start service L"nsiproxy" failed to start: 1114
6487.173:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007F4EBEE90000: builtin
6487.173:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
6487.176:003c:0050:trace:seh:NtQueryInformationThread (0x5c,0,0xe1f810,30,(nil))
6487.177:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
6487.179:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
6487.180:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FD3349C0000: builtin
6487.215:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
6487.218:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 7E7E0000: builtin
6487.218:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
6487.218:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
6487.220:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
6487.221:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
6487.221:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 61740000: builtin
6487.221:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
6487.222:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
6487.223:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
6487.223:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
6487.223:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 6ED00000: builtin
6487.223:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
6487.223:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
6487.224:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
6487.224:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
6487.224:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DD00000: builtin
6487.518:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
6487.523:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
6487.524:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.524:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.524:00ac:00b0:trace:seh:check_bpf_jit_enable enabled 0x31.
6487.525:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.525:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.525:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.526:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
6487.526:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.527:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6487.527:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6487.527:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
Setting breakpad minidump AppID = 567630
Steam_SetMinidumpSteamID: Caching Steam ID: 76561198014597135 [API loaded no]
6487.557:0020:00b4:err:steam:initialize_vr_data Could not load libopenvr_api.so.
6487.557:0020:00b4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0xa1ff1c,4,(nil))
6487.566:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
6487.566:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
6487.566:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
6487.569:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FEF1FF60000: builtin
skipping config: /home/corey/.config/MangoHud/wine-explorer.conf [ not found ]
skipping config: /mnt/GameDrive/Steam/Steamapps/common/Proton 6.3/dist/bin/MangoHud.conf [ not found ]
skipping config: /home/corey/.config/MangoHud/wine64-preloader.conf [ not found ]
parsing config: /home/corey/.config/MangoHud/MangoHud.conf [ ok ]
6487.745:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
6487.745:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
6487.745:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FEF1E9A0000: builtin
6487.750:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
6487.750:00ac:00b0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
6487.750:00ac:00b0:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=00b0
6487.750:00ac:00b0:warn:seh:dispatch_exception unknown exception (code=6ba) raised
6487.750:00ac:00b0:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=000000000032e9d8 rcx=000000000032e6f0 rdx=0000000000000000
6487.750:00ac:00b0:trace:seh:dispatch_exception rsi=000000000000006c rdi=000000000010bef0 rbp=0000000040010028 rsp=000000000032e6d0
6487.750:00ac:00b0:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000201a8 r11=000000000032e6d8
6487.750:00ac:00b0:trace:seh:dispatch_exception r12=000000000032e9d8 r13=000000000010aa30 r14=000000000010bd60 r15=0000000000000005
6487.750:00ac:00b0:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
6487.750:00ac:00b0:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 000000000032E6D0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 121f0-12277
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rdi
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000032E7B0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 42800-42847
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000032E7E0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 96b0-9737
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x1: pushq %rdi
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 1 rip 0000000327044B50 rsp 000000000032E840
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 24a50-24cb1
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x8: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x7: pushq %rdi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x6: pushq %r12
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: pushq %r13
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r14
6487.750:00ac:00b0:trace:seh:call_stack_handlers found wine frame 000000000032E8B0 rsp 000000000032EBB0 handler 0000000327043A90
6487.750:00ac:00b0:trace:seh:call_teb_handler calling TEB handler 0000000327043A90 (rec=000000000032E6F0, frame=000000000032E8B0 context=000000000032DC10, dispatch=000000000032DAE0)
6487.750:00ac:00b0:trace:seh:call_teb_handler handler at 0000000327043A90 returned 1
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 1 rip 00000003270397A7 rsp 000000000032EBB0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 196c0-197cd
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r12
6487.750:00ac:00b0:trace:seh:call_stack_handlers found wine frame 000000000032EBF0 rsp 000000000032ED40 handler 0000000327045F10
6487.750:00ac:00b0:trace:seh:call_teb_handler calling TEB handler 0000000327045F10 (rec=000000000032E6F0, frame=000000000032EBF0 context=000000000032DC10, dispatch=000000000032DAE0)
6487.750:00ac:00b0:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000032EBF0 target_ip=0000000327045EAA rip=000000007bc55ef2
6487.750:00ac:00b0:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=000000000032e8b0 rcx=000000000032d4e0 rdx=0000000027045eaa
6487.750:00ac:00b0:trace:seh:RtlUnwindEx rsi=000000000032e1f0 rdi=000000000032dc10 rbp=000000000032cf90 rsp=000000000032ce10
6487.750:00ac:00b0:trace:seh:RtlUnwindEx r8=000000000032e6f0 r9=0000000027045ee0 r10=000000000032d6d6 r11=0000000000000293
6487.750:00ac:00b0:trace:seh:RtlUnwindEx r12=000000000032e6f0 r13=000000000032d4e0 r14=000000000032ebf0 r15=000000000032e6f0
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC55EF2 rsp 000000000032CE10
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 55ea0-567ae
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007BC7E7C0 flags 0 prolog 0x13 bytes function 000000007BC55EA0-000000007BC567AE
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC567CF rsp 000000000032D4B0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 567b0-567d8
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007BC7E7D8 flags 0 prolog 0x7 bytes function 000000007BC567B0-000000007BC567D8
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045EAA rsp 000000000032D9C0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 25e90-25eac
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000032705A748 flags 0 prolog 0x8 bytes function 0000000327045E90-0000000327045EAC
6487.750:00ac:00b0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x1: pushq %rbp
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045ED9 rsp 000000000032D9F0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 25eb0-25eda
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000032705A754 flags 0 prolog 0x4 bytes function 0000000327045EB0-0000000327045EDA
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045F64 rsp 000000000032DA20
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 25f10-25f65
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000032705A764 flags 0 prolog 0xa bytes function 0000000327045F10-0000000327045F65
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x6: pushq %r12
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: pushq %r13
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r14
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5542F rsp 000000000032DA70
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 55150-556a1
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007BC7E77C flags 0 prolog 0x13 bytes function 000000007BC55150-000000007BC556A1
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC559B7 rsp 000000000032E130
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 556b0-55bbf
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007BC7E794 flags 0 prolog 0x10 bytes function 000000007BC556B0-000000007BC55BBF
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xc: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xb: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: pushq %rdi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rbp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x8: pushq %r12
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x6: pushq %r13
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: pushq %r14
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r15
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53634 rsp 000000000032E1D0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 535cc-53641
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007BC7E6E4 flags 0 prolog 0x7 bytes function 000000007BC535CC-000000007BC53641
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 000000000032E6D0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 121f0-12277
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rdi
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000032E7B0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 42800-42847
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000032E7E0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 96b0-9737
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x1: pushq %rdi
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327044B50 rsp 000000000032E840
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 24a50-24cb1
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x9: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x8: pushq %rsi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x7: pushq %rdi
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x6: pushq %r12
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x4: pushq %r13
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r14
6487.750:00ac:00b0:trace:seh:RtlUnwindEx found builtin frame 000000000032E8B0 handler 0000000327043A90
6487.750:00ac:00b0:trace:seh:call_teb_unwind_handler calling TEB handler 0000000327043A90 (rec=000000000032E6F0, frame=000000000032E8B0 context=000000000032D4E0, dispatch=000000000032CEA0)
6487.750:00ac:00b0:trace:seh:call_teb_unwind_handler handler at 0000000327043A90 returned 1
6487.750:00ac:00b0:trace:seh:RtlVirtualUnwind type 2 rip 00000003270397A7 rsp 000000000032EBB0
6487.750:00ac:00b0:trace:seh:dump_unwind_info **** func 196c0-197cd
6487.750:00ac:00b0:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x3: pushq %rbx
6487.750:00ac:00b0:trace:seh:dump_unwind_info 0x2: pushq %r12
6487.750:00ac:00b0:trace:seh:RtlRestoreContext returning to 0000000327045EAA stack 000000000032EBB0
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6487.759:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
6487.759:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.759:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.760:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
6487.761:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.761:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.761:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.762:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
6487.762:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.763:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6487.763:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6487.763:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
6487.770:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
6487.770:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.770:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.771:00c4:00c8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f07e24d118d.
6487.771:00c4:00c8:trace:seh:install_bpf Seccomp filters already installed.
6487.772:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.772:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.772:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.773:00c4:00c8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.786:0030:00c0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x164fe2c,4,(nil))
6487.788:0020:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F60000: builtin
6487.802:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
6487.802:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
6487.803:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
6487.806:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F1AFAA60000: builtin
6487.824:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
6487.824:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
6487.824:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F1AF9400000: builtin
6487.829:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
6487.829:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
6487.831:00c4:00f8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x164fe2c,4,(nil))
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6487.851:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\BosClient.exe" at 0000000140000000: native
6487.851:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.851:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.852:00fc:0100:trace:seh:check_bpf_jit_enable enabled 0x31.
6487.853:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.854:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.854:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.855:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
6487.855:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
6487.856:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
6487.856:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
6487.856:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
6487.856:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
6487.856:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
6487.857:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IMM32.dll" at 00000003AFD00000: builtin
6487.858:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
6487.858:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
6487.858:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007FDBEE880000: builtin
6487.859:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 00000002739C0000: builtin
6487.860:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 00000001C8B40000: builtin
6487.860:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINMM.dll" at 00000003B8F00000: builtin
6487.860:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdiplus.dll" at 0000000243540000: builtin
6487.861:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\dbghelp.dll" at 00000003BE590000: builtin
6487.861:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imagehlp.dll" at 00000002BC640000: builtin
6487.882:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USP10.dll" at 00000002A9540000: builtin
6487.883:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 0000000316370000: builtin
6487.884:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINSPOOL.DRV" at 00007FDBEE730000: builtin
6487.885:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 00000002BB750000: builtin
6487.885:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\COMDLG32.dll" at 000000031F800000: builtin
6487.887:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FDBEE6E0000: builtin
6487.887:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\jsproxy.dll" at 0000000346BA0000: builtin
6487.887:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINHTTP.dll" at 0000000358120000: builtin
6487.887:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USERENV.dll" at 0000000388E20000: builtin
6487.888:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 000000024F470000: builtin
6487.889:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 00000003A0440000: builtin
6487.889:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\urlmon.dll" at 00000003422E0000: builtin
6487.889:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dhcpcsvc.DLL" at 00000003AA4C0000: builtin
6487.890:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WTSAPI32.dll" at 00000002A4090000: builtin
6487.890:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEACC.dll" at 00000002522E0000: builtin
6487.892:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FDBEE630000: builtin
6487.892:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dnsapi.dll" at 00007FDBEE5F0000: builtin
6487.892:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\netapi32.dll" at 00007FDBEE660000: builtin
6487.892:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Secur32.dll" at 00007FDBEE6A0000: builtin
6487.893:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00000002D4D40000: builtin
6487.893:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\CRYPT32.dll" at 00000001DD3F0000: builtin
6487.893:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\libcef.dll" at 0000000180000000: native
6487.894:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\PhysX3_x64.dll" at 0000000000230000: native
6487.895:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\PhysX3Common_x64.dll" at 0000000000560000: native
6487.896:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\fmod64.dll" at 0000000000780000: native
6487.897:00fc:0100:trace:loaddll:build_module Loaded L"Z:\\mnt\\GameDrive\\Steam\\Steamapps\\common\\Blood of Steel\\x64\\fmodstudio64.dll" at 0000000000970000: native
6487.898:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WLDAP32.dll" at 00007FDBEE580000: builtin
6487.938:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FDBEE190000: builtin
6487.946:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
6487.947:00fc:0100:err:winediag:SECUR32_initNTLMSP ntlm_auth was not found or is outdated. Make sure that ntlm_auth >= 3.0.25 is in your path. Usually, you can find it in the winbind package of your distribution.
6487.952:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\Kerberos.dll" at 00007FDBED170000: builtin
6487.952:00fc:0100:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSV1_0.dll" at 000000039C380000: builtin
6487.952:00fc:0100:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
6487.952:00fc:0100:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\MSV1_0.dll" : builtin
6487.953:00fc:0100:fixme:heap:RtlSetHeapInformation 0000000000020000 0 000000000022EC30 4 stub
6487.954:00fc:0100:trace:seh:dispatch_exception code=c0000005 flags=0 addr=000000007B632184 ip=000000007B632184 tid=0100
6487.954:00fc:0100:trace:seh:dispatch_exception info[0]=0000000000000000
6487.954:00fc:0100:trace:seh:dispatch_exception info[1]=00000000ffffffff
6487.954:00fc:0100:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
6487.954:00fc:0100:trace:seh:dispatch_exception rax=000000007b62ed70 rbx=0000000000000000 rcx=000000000022fcd8 rdx=000000000022fcb8
6487.954:00fc:0100:trace:seh:dispatch_exception rsi=0000000000000000 rdi=0000000000000000 rbp=0000000000000000 rsp=000000000022fc90
6487.954:00fc:0100:trace:seh:dispatch_exception r8=000000003ffff000 r9=000000007bc73880 r10=0000000000000000 r11=0000000000000000
6487.954:00fc:0100:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
6487.954:00fc:0100:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=c0000005 flags=0
6487.954:00fc:0100:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
6487.954:00fc:0100:trace:seh:RtlVirtualUnwind type 1 rip 000000007B632184 rsp 000000000022FC90
6487.954:00fc:0100:trace:seh:dump_unwind_info **** func 32150-321da
6487.954:00fc:0100:trace:seh:dump_unwind_info unwind info at 000000007B63D834 flags 0 prolog 0x0 bytes function 000000007B632150-000000007B6321DA
6487.954:00fc:0100:trace:seh:RtlVirtualUnwind type 1 rip 000000007B62ED70 rsp 000000000022FC98
6487.954:00fc:0100:trace:seh:dump_unwind_info **** func 2ed30-2edec
6487.954:00fc:0100:trace:seh:dump_unwind_info unwind info at 000000007B63D698 flags 0 prolog 0x9 bytes function 000000007B62ED30-000000007B62EDEC
6487.954:00fc:0100:trace:seh:dump_unwind_info 0x9: subq $0x158,%rsp
6487.954:00fc:0100:trace:seh:dump_unwind_info 0x2: pushq %rbx
6487.954:00fc:0100:trace:seh:dump_unwind_info 0x1: pushq %rsi
6487.954:00fc:0100:warn:seh:virtual_unwind exception data not found in L"BosClient.exe"
6487.954:00fc:0100:warn:seh:virtual_unwind exception data not found in L"BosClient.exe"
6487.954:00fc:0100:trace:seh:RtlVirtualUnwind type 1 rip 000000007B62C809 rsp 000000000022FE40
6487.954:00fc:0100:trace:seh:dump_unwind_info **** func 2c800-2c812
6487.954:00fc:0100:trace:seh:dump_unwind_info unwind info at 000000007B63D4DC flags 0 prolog 0x4 bytes function 000000007B62C800-000000007B62C812
6487.954:00fc:0100:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6487.954:00fc:0100:trace:seh:RtlVirtualUnwind type 1 rip 000000007BC59803 rsp 000000000022FE70
6487.954:00fc:0100:trace:seh:dump_unwind_info **** func 59780-59883
6487.954:00fc:0100:trace:seh:dump_unwind_info unwind info at 000000007BC7EA98 flags 0 prolog 0x7 bytes function 000000007BC59780-000000007BC59883
6487.954:00fc:0100:trace:seh:dump_unwind_info 0x7: subq $0x168,%rsp
6487.954:00fc:0100:trace:seh:call_stack_handlers found wine frame 000000000022FEA0 rsp 000000000022FFE0 handler 000000007BC63330
6487.954:00fc:0100:trace:seh:call_teb_handler calling TEB handler 000000007BC63330 (rec=000000000022FA60, frame=000000000022FEA0 context=000000000022EFB0, dispatch=000000000022EE80)
wine: Unhandled page fault on read access to FFFFFFFFFFFFFFFF at address 000000007B632184 (thread 0100), starting debugger...
6487.954:00fc:0100:trace:seh:start_debugger Starting debugger L"winedbg --auto 252 172"
ERROR: ld.so: object '/home/corey/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
6487.975:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedbg.exe" at 00007F7AB5440000: builtin
6487.975:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
6487.975:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
6487.976:0104:0108:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f7ab782718d.
6487.976:0104:0108:trace:seh:install_bpf Seccomp filters already installed.
6487.977:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
6487.977:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 00000003BE590000: builtin
6487.978:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
6487.978:0104:0108:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
6487.983:0104:0108:trace:seh:NtQueryInformationThread (0x48,0,0x22f760,30,(nil))
6488.029:0104:0108:trace:seh:NtQueryInformationThread (0x1d4,0,0x22f760,30,(nil))
6488.029:00fc:0100:trace:seh:call_teb_handler handler at 000000007BC63330 returned 1
6488.030:00fc:010c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x168fccc,4,(nil))
6488.030:00fc:0100:warn:seh:virtual_unwind exception data not found in L"BosClient.exe"
Unhandled exception: page fault on read access to 0xffffffffffffffff in 64-bit code (0x000000007b632184).
Register dump:
rip:000000007b632184 rsp:000000000022fc90 rbp:0000000000000000 eflags:00010212 ( R- -- I -A- - )
rax:000000007b62ed70 rbx:0000000000000000 rcx:000000000022fcd8 rdx:000000000022fcb8
rsi:0000000000000000 rdi:0000000000000000 r8:000000013ffff000 r9:000000007bc73880 r10:0000000000000000
r11:0000000000000000 r12:0000000000000000 r13:0000000000000000 r14:0000000000000000 r15:0000000000000000
Stack dump:
0x000000000022fc90: 000000007b62ed70 0000000000000000
0x000000000022fca0: 0000000000000000 0000000000000000
0x000000000022fcb0: 0000000000000000 0000000000000000
0x000000000022fcc0: 000000007b632000 000000007b62e5c0
0x000000000022fcd0: 0000000000000000 000000000022fcb8
0x000000000022fce0: 0000000000000000 000000000022fc98
0x000000000022fcf0: 0000000000000000 0000000000000000
0x000000000022fd00: 0000000000000000 0000000000000000
0x000000000022fd10: 0000000000000000 0000000000000000
0x000000000022fd20: 0000000000000000 000000007b62ed70
0x000000000022fd30: 0000000000000000 0000000000000000
0x000000000022fd40: 0000000000000000 0000000000000000
Backtrace:
=>0 0x000000007b632184 EntryPoint+0x214() in kernel32 (0x0000000000000000)
1 0x000000007b62ed70 EntryPoint+0xffffffffffffffff() in kernel32 (0x0000000000000000)
2 0x0000000140b9dff1 in bosclient (+0xb9dff0) (0x0000000000000000)
0x000000007b632184 EntryPoint+0x214 in kernel32: movq %mm1,%mm6
Modules:
Module Address Debug info Name (54 modules)
PE 230000- 55e000 Deferred physx3_x64
PE 560000- 780000 Deferred physx3common_x64
PE 780000- 964000 Deferred fmod64
PE 970000- b34000 Deferred fmodstudio64
PE 7b000000- 7b0d3000 Deferred kernelbase
PE 7b600000- 7b812000 Export kernel32
PE 7bc00000- 7bc99000 Deferred ntdll
PE 140000000- 142ea3000 Export bosclient
PE 180000000- 183fae000 Deferred libcef
PE 1c8b40000- 1c8b60000 Deferred msacm32
PE 1dd3f0000- 1dd4bd000 Deferred crypt32
PE 21a7e0000- 21a854000 Deferred setupapi
PE 231ae0000- 231b62000 Deferred rpcrt4
PE 23d820000- 23da47000 Deferred user32
PE 243540000- 2435c6000 Deferred gdiplus
PE 24f470000- 24f48f000 Deferred mpr
PE 2522e0000- 252332000 Deferred oleacc
PE 26b4c0000- 26b642000 Deferred gdi32
PE 2739c0000- 273af6000 Deferred oleaut32
PE 2a4090000- 2a409d000 Deferred wtsapi32
PE 2a9540000- 2a9548000 Deferred usp10
PE 2bb750000- 2bb894000 Deferred comctl32
PE 2bc640000- 2bc650000 Deferred imagehlp
PE 2d4d40000- 2d4d57000 Deferred bcrypt
PE 2e3540000- 2e3591000 Deferred shlwapi
PE 2e8f10000- 2e9028000 Deferred ole32
PE 2f1fa0000- 2f1fad000 Deferred version
PE 2f7230000- 2f725d000 Deferred uxtheme
PE 3126f0000- 312709000 Deferred shcore
PE 316370000- 31637b000 Deferred psapi
PE 31f800000- 31f8ff000 Deferred comdlg32
PE 327020000- 327072000 Deferred combase
PE 32a700000- 32a729000 Deferred sechost
PE 330260000- 33029f000 Deferred advapi32
PE 3422e0000- 342379000 Deferred urlmon
PE 346ba0000- 346bc0000 Deferred jsproxy
PE 358120000- 358164000 Deferred winhttp
PE 388e20000- 388e2e000 Deferred userenv
PE 3a0440000- 3a04c0000 Deferred wininet
PE 3aa4c0000- 3aa4cc000 Deferred dhcpcsvc
PE 3af670000- 3af728000 Deferred ucrtbase
PE 3afd00000- 3afd1a000 Deferred imm32
PE 3b8f00000- 3b8fb7000 Deferred winmm
PE 3be590000- 3be6b5000 Deferred dbghelp
PE 7fdbed170000- 7fdbed173000 Deferred kerberos
PE 7fdbee190000- 7fdbee194000 Deferred winex11
PE 7fdbee580000- 7fdbee59b000 Deferred wldap32
PE 7fdbee5f0000- 7fdbee5f4000 Deferred dnsapi
PE 7fdbee630000- 7fdbee634000 Deferred iphlpapi
PE 7fdbee660000- 7fdbee663000 Deferred netapi32
PE 7fdbee6a0000- 7fdbee6a3000 Deferred secur32
PE 7fdbee6e0000- 7fdbee6e4000 Deferred ws2_32
PE 7fdbee730000- 7fdbee73b000 Deferred winspool
PE 7fdbee880000- 7fdbef157000 Deferred shell32
Threads:
process tid prio (all id:s are in hex)
00000020 steam.exe
00000024 0
000000a8 0
00000030 services.exe
00000034 0
00000038 0
00000044 0
00000048 0
00000060 0
00000084 0
0000009c 0
000000d4 0
000000d8 0
0000003c winedevice.exe
00000040 0
0000004c 0
00000050 0
00000054 0
00000058 winedevice.exe
0000005c 0
00000064 0
00000068 0
0000006c 0
00000070 0
00000074 0
00000078 0
0000007c plugplay.exe
00000080 0
00000088 0
0000008c 0
00000090 0
00000094 svchost.exe
00000098 0
000000a0 0
000000a4 0
000000ac explorer.exe
000000b0 0
000000b8 0
000000bc 0
000000c4 rpcss.exe
000000c8 0
000000dc 0
000000e0 0
000000e4 0
000000e8 0
000000ec 0
000000f0 0
000000fc (D) Z:\mnt\GameDrive\Steam\Steamapps\common\Blood of Steel\x64\BosClient.exe
00000100 0 <==
0000010c 0
System information:
Wine build: wine-6.3
Platform: x86_64
Version: Windows 10
Host system: Linux
Host version: 5.10.52-1-MANJARO
6489.046:00c4:00ec:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x122fe2c,4,(nil))
6490.048:00c4:00e4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe0fe2c,4,(nil))
6490.051:00c4:00e8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x101fe2c,4,(nil))
6490.051:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x143fe2c,4,(nil))
6490.054:007c:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe2fe2c,4,(nil))
6490.054:0058:0068:err:rpc:RpcAssoc_BindConnection receive failed with error 1726
6490.054:0058:0068:trace:seh:dispatch_exception code=6be flags=0 addr=000000007B01223E ip=000000007B01223E tid=0068
6490.054:0058:0068:warn:seh:dispatch_exception unknown exception (code=6be) raised
6490.054:0058:0068:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=0000000000e1f578 rcx=0000000000e1f290 rdx=0000000000000000
6490.054:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000002aaa0 rbp=0000000000000050 rsp=0000000000e1f270
6490.054:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000020258 r11=0000000000e1f278
6490.054:0058:0068:trace:seh:dispatch_exception r12=0000000000e1f578 r13=000000000002cca0 r14=0000000000000000 r15=000000000002cca0
6490.054:0058:0068:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6be flags=0
6490.054:0058:0068:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
6490.054:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6be flags=0
6490.054:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 0000000000E1F270
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 121f0-12277
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6490.054:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 0000000000E1F350
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 42800-42847
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 0000000000E1F380
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 96b0-9737
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6490.054:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 0000000000E1F3E0
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 22cf0-22f10
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6490.054:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
6490.054:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E1F450 rsp 0000000000E1F740 handler 00000002279C27B0
6490.054:0058:0068:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=0000000000E1F290, frame=0000000000E1F450 context=0000000000E1E7B0, dispatch=0000000000E1E680)
6490.054:0058:0068:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 0000000000E1F740
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6490.054:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
6490.054:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E1F770 rsp 0000000000E1F8B0 handler 00000002279C40A0
6490.054:0058:0068:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=0000000000E1F290, frame=0000000000E1F770 context=0000000000E1E7B0, dispatch=0000000000E1E680)
6490.054:0058:0068:trace:seh:RtlUnwindEx code=6be flags=2 end_frame=0000000000E1F770 target_ip=00000002279C403A rip=000000007bc55ef2
6490.054:0058:0068:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=0000000000e1f450 rcx=0000000000e1e080 rdx=00000000279c403a
6490.054:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e1ed90 rdi=0000000000e1e7b0 rbp=0000000000e1db30 rsp=0000000000e1d9b0
6490.054:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e1f290 r9=00000000279c4070 r10=0000000000e1e276 r11=0000000000000293
6490.054:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e1f290 r13=0000000000e1e080 r14=0000000000e1f770 r15=0000000000e1f290
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC55EF2 rsp 0000000000E1D9B0
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 55ea0-567ae
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E7C0 flags 0 prolog 0x13 bytes function 000000007BC55EA0-000000007BC567AE
6490.054:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
6490.054:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC567CF rsp 0000000000E1E050
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 567b0-567d8
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E7D8 flags 0 prolog 0x7 bytes function 000000007BC567B0-000000007BC567D8
6490.054:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 0000000000E1E560
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 24020-2403c
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
6490.054:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
6490.054:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 0000000000E1E590
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 24040-2406a
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 0000000000E1E5C0
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 240a0-240f5
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
6490.054:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5542F rsp 0000000000E1E610
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 55150-556a1
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E77C flags 0 prolog 0x13 bytes function 000000007BC55150-000000007BC556A1
6490.054:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
6490.054:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC559B7 rsp 0000000000E1ECD0
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 556b0-55bbf
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E794 flags 0 prolog 0x10 bytes function 000000007BC556B0-000000007BC55BBF
6490.054:0058:0068:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
6490.054:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53634 rsp 0000000000E1ED70
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 535cc-53641
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E6E4 flags 0 prolog 0x7 bytes function 000000007BC535CC-000000007BC53641
6490.054:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 0000000000E1F270
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 121f0-12277
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6490.054:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 0000000000E1F350
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 42800-42847
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 0000000000E1F380
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 96b0-9737
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6490.054:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 0000000000E1F3E0
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 22cf0-22f10
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6490.054:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
6490.054:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
6490.054:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
6490.054:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
6490.054:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E1F450 handler 00000002279C27B0
6490.054:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=0000000000E1F290, frame=0000000000E1F450 context=0000000000E1E080, dispatch=0000000000E1DA40)
6490.054:0058:0068:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
6490.054:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 0000000000E1F740
6490.054:0058:0068:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6490.054:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6490.054:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6490.054:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
6490.054:0058:0068:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 0000000000E1F740
6490.055:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01223E ip=000000007B01223E tid=0068
6490.055:0058:0068:warn:seh:dispatch_exception unknown exception (code=6ba) raised
6490.055:0058:0068:trace:seh:dispatch_exception rax=000000007b0121f0 rbx=0000000000e1f578 rcx=0000000000e1f290 rdx=0000000000000000
6490.055:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=000000000002aaa0 rbp=0000000000000050 rsp=0000000000e1f270
6490.055:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000000203c8 r11=0000000000e1f278
6490.055:0058:0068:trace:seh:dispatch_exception r12=0000000000e1f578 r13=000000000002cca0 r14=0000000000000000 r15=000000000002cca0
6490.055:0058:0068:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
6490.055:0058:0068:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
6490.055:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B00C530 code=6ba flags=0
6490.055:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B00C530 returned 0
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01223E rsp 0000000000E1F270
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 121f0-12277
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6490.055:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 0000000000E1F350
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 42800-42847
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 0000000000E1F380
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 96b0-9737
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6490.055:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 0000000000E1F3E0
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 22cf0-22f10
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6490.055:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
6490.055:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E1F450 rsp 0000000000E1F740 handler 00000002279C27B0
6490.055:0058:0068:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=0000000000E1F290, frame=0000000000E1F450 context=0000000000E1E7B0, dispatch=0000000000E1E680)
6490.055:0058:0068:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 0000000000E1F740
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6490.055:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
6490.055:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000E1F770 rsp 0000000000E1F8B0 handler 00000002279C40A0
6490.055:0058:0068:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=0000000000E1F290, frame=0000000000E1F770 context=0000000000E1E7B0, dispatch=0000000000E1E680)
6490.055:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000E1F770 target_ip=00000002279C403A rip=000000007bc55ef2
6490.055:0058:0068:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=0000000000e1f450 rcx=0000000000e1e080 rdx=00000000279c403a
6490.055:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000e1ed90 rdi=0000000000e1e7b0 rbp=0000000000e1db30 rsp=0000000000e1d9b0
6490.055:0058:0068:trace:seh:RtlUnwindEx r8=0000000000e1f290 r9=00000000279c4070 r10=0000000000e1e276 r11=0000000000000293
6490.055:0058:0068:trace:seh:RtlUnwindEx r12=0000000000e1f290 r13=0000000000e1e080 r14=0000000000e1f770 r15=0000000000e1f290
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC55EF2 rsp 0000000000E1D9B0
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 55ea0-567ae
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E7C0 flags 0 prolog 0x13 bytes function 000000007BC55EA0-000000007BC567AE
6490.055:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
6490.055:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC567CF rsp 0000000000E1E050
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 567b0-567d8
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E7D8 flags 0 prolog 0x7 bytes function 000000007BC567B0-000000007BC567D8
6490.055:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 0000000000E1E560
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 24020-2403c
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
6490.055:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
6490.055:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 0000000000E1E590
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 24040-2406a
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 0000000000E1E5C0
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 240a0-240f5
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
6490.055:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5542F rsp 0000000000E1E610
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 55150-556a1
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E77C flags 0 prolog 0x13 bytes function 000000007BC55150-000000007BC556A1
6490.055:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
6490.055:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC559B7 rsp 0000000000E1ECD0
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 556b0-55bbf
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E794 flags 0 prolog 0x10 bytes function 000000007BC556B0-000000007BC55BBF
6490.055:0058:0068:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
6490.055:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC53634 rsp 0000000000E1ED70
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 535cc-53641
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC7E6E4 flags 0 prolog 0x7 bytes function 000000007BC535CC-000000007BC53641
6490.055:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01223E rsp 0000000000E1F270
6490.055:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe1fe2c,4,(nil))
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 121f0-12277
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A3480 flags 0 prolog 0x11 bytes function 000000007B0121F0-000000007B012277
6490.055:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 0000000000E1F350
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 42800-42847
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 0000000000E1F380
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 96b0-9737
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
6490.055:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 0000000000E1F3E0
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 22cf0-22f10
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
6490.055:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
6490.055:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
6490.055:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
6490.055:00c4:00e0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xbffe2c,4,(nil))
6490.055:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
6490.055:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
6490.055:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000E1F450 handler 00000002279C27B0
6490.055:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=0000000000E1F290, frame=0000000000E1F450 context=0000000000E1E080, dispatch=0000000000E1DA40)
6490.055:0058:0068:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
6490.055:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 0000000000E1F740
6490.055:0058:0068:trace:seh:dump_unwind_info **** func 1ac90-1ad76
6490.055:0058:0068:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
6490.055:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
6490.055:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
6490.055:0058:0068:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 0000000000E1F740
6490.055:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x125fe2c,4,(nil))
6490.055:007c:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xc1fe2c,4,(nil))
6490.055:0058:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x146fe2c,4,(nil))
6490.056:0058:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x167fe2c,4,(nil))
6490.057:0058:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x102fe2c,4,(nil))
6490.058:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
6490.058:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
6490.070:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
6490.070:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
6490.072:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xe1fe2c,4,(nil))
6490.155:0030:00d4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x185fe2c,4,(nil))
6490.155:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xbffe2c,4,(nil))
6490.155:0030:0118:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1e8fe2c,4,(nil))
6490.155:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x101fe2c,4,(nil))
6490.158:0030:0124:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x24bfe2c,4,(nil))
6490.158:0030:011c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x209fe2c,4,(nil))
6490.158:0030:0114:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x164fe2c,4,(nil))
6490.159:0030:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x122fe2c,4,(nil))
6490.159:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x9efe2c,4,(nil))
pid 17209 != 17208, skipping destruction (fork without exec?)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment