Skip to content

Instantly share code, notes, and snippets.

@ibrokemypie
Created July 9, 2021 06:12
Show Gist options
  • Save ibrokemypie/fa91733c53411fd3f9a1f5f580774cea to your computer and use it in GitHub Desktop.
Save ibrokemypie/fa91733c53411fd3f9a1f5f580774cea to your computer and use it in GitHub Desktop.
======================
Proton: 1624992881 experimental-6.3-20210629
SteamGameId: 389730
Command: ['/games/steamapps/common/TEKKEN 7/TEKKEN 7.exe']
Options: {'forcelgadd'}
SteamLinuxRuntime: v0.20210317.0-0-ge09b2e6
pressure-vessel: 0.20210415.0+srt1 scout 0.20210415.0
soldier: 0.20210415.0 soldier 0.20210415.0
======================
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
fsync: up and running.
wine: Using setpriority to control niceness in the [-15,15] range
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7570.979:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000140000000: builtin
7570.980:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7570.980:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7570.980:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
7570.981:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7570.981:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7570.981:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7570.981:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007FF6C4810000: builtin
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7570.997:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000140000000: builtin
7570.998:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7570.998:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7570.998:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f973ef7418d.
7570.998:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7570.999:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000388E20000: builtin
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7571.016:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
7571.016:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7571.016:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7571.017:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7ff6ed21a18d.
7571.017:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
7571.017:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7571.017:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7571.017:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7571.018:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
7571.018:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
7571.020:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7571.022:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
7571.024:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FF6EABF0000: builtin
7571.027:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7571.027:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7571.029:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\iphlpapi.dll" at 00007FF6EA840000: builtin
7571.029:003c:004c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\ndis.sys" at 00000001DC4B0000: builtin
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7571.041:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000140000000: builtin
7571.042:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7571.042:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7571.042:005c:0060:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f77ed43218d.
7571.042:005c:0060:trace:seh:install_bpf Seccomp filters already installed.
7571.043:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7571.043:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7571.043:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7571.043:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7571.043:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7571.044:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7571.044:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7571.044:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
7571.262:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7571.262:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7571.262:005c:0060:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7571.276:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000140000000: builtin
7571.276:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7571.277:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7571.277:0074:0078:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f53ec64a18d.
7571.277:0074:0078:trace:seh:install_bpf Seccomp filters already installed.
7571.277:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7571.278:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7571.278:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7571.278:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
7571.278:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 00000002279A0000: builtin
7571.280:0074:0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7571.282:0074:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x162f870,30,(nil))
7571.284:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007F53EA020000: builtin
7571.284:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7571.284:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7571.286:0074:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x101f180,30,(nil))
7571.288:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 000000031DF10000: builtin
7571.288:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 00000003BA2A0000: builtin
7571.289:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
7571.290:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7571.290:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
7571.312:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7571.313:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7571.313:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
7571.314:0074:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x1c5f960,30,(nil))
7572.116:0074:0080:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007F53E82A0000: builtin
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7572.132:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\svchost.exe" at 0000000140000000: builtin
7572.132:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7572.132:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7572.132:00a4:00a8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f238be3c18d.
7572.132:00a4:00a8:trace:seh:install_bpf Seccomp filters already installed.
7572.133:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7572.133:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7572.133:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7572.135:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wevtsvc.dll" at 00000002EBA70000: builtin
7572.135:00a4:00a8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.137:003c:0050:trace:seh:NtQueryInformationThread (0x64,0,0x162f810,30,(nil))
7572.138:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7572.139:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
7572.140:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FF6C3BE0000: builtin
7572.161:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
7572.163:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\steam.exe" at 7E8E0000: builtin
7572.163:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
7572.163:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B600000: builtin
7572.164:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 70B40000: builtin
7572.164:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 6BC00000: builtin
7572.164:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 61740000: builtin
7572.165:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 6C9C0000: builtin
7572.165:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 62FC0000: builtin
7572.166:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 63480000: builtin
7572.166:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6BCC0000: builtin
7572.166:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 6ED00000: builtin
7572.166:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 68500000: builtin
7572.166:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 6A400000: builtin
7572.167:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 63BC0000: builtin
7572.167:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 64A40000: builtin
7572.167:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DE00000: builtin
7572.416:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 71200000: builtin
7572.420:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
7572.420:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7572.420:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7572.420:00bc:00c0:trace:seh:check_bpf_jit_enable enabled 0x31.
7572.421:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7572.421:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7572.421:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7572.421:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7572.421:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.422:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7572.422:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7572.422:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
Setting breakpad minidump AppID = 389730
Steam_SetMinidumpSteamID: Caching Steam ID: 76561198057670172 [API loaded no]
7572.446:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7572.446:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7572.447:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
7572.448:0020:00c4:err:steam:initialize_vr_data Could not load libopenvr_api.so.
7572.449:0020:00c4:trace:seh:NtQueryInformationThread (0xfffffffe,12,0x122ff1c,4,(nil))
7572.449:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F0FECF50000: builtin
7572.497:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
7572.497:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
7572.497:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F0FE0990000: builtin
7572.500:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
7572.500:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
7572.500:00bc:00c0:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01236E ip=000000007B01236E tid=00c0
7572.500:00bc:00c0:warn:seh:dispatch_exception unknown exception (code=6ba) raised
7572.500:00bc:00c0:trace:seh:dispatch_exception rax=000000007b012320 rbx=000000000073e9d8 rcx=000000000073e6f0 rdx=0000000000000000
7572.500:00bc:00c0:trace:seh:dispatch_exception rsi=000000000000006c rdi=000000000020b130 rbp=0000000040010028 rsp=000000000073e6d0
7572.500:00bc:00c0:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000200020 r11=00000000a55a5aa5
7572.500:00bc:00c0:trace:seh:dispatch_exception r12=000000000073e9d8 r13=000000000015b760 r14=000000000016eed0 r15=0000000000000005
7572.500:00bc:00c0:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=6ba flags=0
7572.500:00bc:00c0:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 000000000073E6D0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 12320-123a7
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rdi
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000073E7B0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 42800-42847
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000073E7E0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 96b0-9737
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x1: pushq %rdi
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 0000000327044B50 rsp 000000000073E840
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 24a50-24cb1
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %rdi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r12
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r13
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r14
7572.500:00bc:00c0:trace:seh:call_stack_handlers found wine frame 000000000073E8B0 rsp 000000000073EBB0 handler 0000000327043A90
7572.500:00bc:00c0:trace:seh:call_teb_handler calling TEB handler 0000000327043A90 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073DC10, dispatch=000000000073DAE0)
7572.500:00bc:00c0:trace:seh:call_teb_handler handler at 0000000327043A90 returned 1
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 1 rip 00000003270397A7 rsp 000000000073EBB0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 196c0-197cd
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r12
7572.500:00bc:00c0:trace:seh:call_stack_handlers found wine frame 000000000073EBF0 rsp 000000000073ED40 handler 0000000327045F10
7572.500:00bc:00c0:trace:seh:call_teb_handler calling TEB handler 0000000327045F10 (rec=000000000073E6F0, frame=000000000073EBF0 context=000000000073DC10, dispatch=000000000073DAE0)
7572.500:00bc:00c0:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000073EBF0 target_ip=0000000327045EAA rip=000000007bc5ac72
7572.500:00bc:00c0:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=000000000073e8b0 rcx=000000000073d4e0 rdx=0000000027045eaa
7572.500:00bc:00c0:trace:seh:RtlUnwindEx rsi=000000000073e1f0 rdi=000000000073dc10 rbp=000000000073cf90 rsp=000000000073ce10
7572.500:00bc:00c0:trace:seh:RtlUnwindEx r8=000000000073e6f0 r9=0000000027045ee0 r10=000000000073d6d6 r11=0000000000000293
7572.500:00bc:00c0:trace:seh:RtlUnwindEx r12=000000000073e6f0 r13=000000000073d4e0 r14=000000000073ebf0 r15=000000000073e6f0
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AC72 rsp 000000000073CE10
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 5ac20-5b52e
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC8398C flags 0 prolog 0x13 bytes function 000000007BC5AC20-000000007BC5B52E
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B54F rsp 000000000073D4B0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 5b530-5b558
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC839A4 flags 0 prolog 0x7 bytes function 000000007BC5B530-000000007BC5B558
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045EAA rsp 000000000073D9C0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 25e90-25eac
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A748 flags 0 prolog 0x8 bytes function 0000000327045E90-0000000327045EAC
7572.500:00bc:00c0:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x1: pushq %rbp
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045ED9 rsp 000000000073D9F0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 25eb0-25eda
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A754 flags 0 prolog 0x4 bytes function 0000000327045EB0-0000000327045EDA
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327045F64 rsp 000000000073DA20
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 25f10-25f65
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A764 flags 0 prolog 0xa bytes function 0000000327045F10-0000000327045F65
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r12
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r13
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r14
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A1AF rsp 000000000073DA70
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 59ed0-5a421
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC83948 flags 0 prolog 0x13 bytes function 000000007BC59ED0-000000007BC5A421
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A737 rsp 000000000073E130
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 5a430-5a93f
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC83960 flags 0 prolog 0x10 bytes function 000000007BC5A430-000000007BC5A93F
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xc: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xb: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rdi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %r12
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r13
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r14
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r15
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583B4 rsp 000000000073E1D0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 5834c-583c1
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007BC838B0 flags 0 prolog 0x7 bytes function 000000007BC5834C-000000007BC583C1
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 000000000073E6D0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 12320-123a7
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rdi
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000073E7B0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 42800-42847
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000073E7E0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 96b0-9737
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x1: pushq %rdi
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 0000000327044B50 rsp 000000000073E840
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 24a50-24cb1
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 000000032705A670 flags 0 prolog 0x10 bytes function 0000000327044A50-0000000327044CB1
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x10: subq $0x338,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x9: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x8: pushq %rsi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x7: pushq %rdi
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x6: pushq %r12
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x4: pushq %r13
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r14
7572.500:00bc:00c0:trace:seh:RtlUnwindEx found builtin frame 000000000073E8B0 handler 0000000327043A90
7572.500:00bc:00c0:trace:seh:call_teb_unwind_handler calling TEB handler 0000000327043A90 (rec=000000000073E6F0, frame=000000000073E8B0 context=000000000073D4E0, dispatch=000000000073CEA0)
7572.500:00bc:00c0:trace:seh:call_teb_unwind_handler handler at 0000000327043A90 returned 1
7572.500:00bc:00c0:trace:seh:RtlVirtualUnwind type 2 rip 00000003270397A7 rsp 000000000073EBB0
7572.500:00bc:00c0:trace:seh:dump_unwind_info **** func 196c0-197cd
7572.500:00bc:00c0:trace:seh:dump_unwind_info unwind info at 0000000327059EB0 flags 0 prolog 0xa bytes function 00000003270396C0-00000003270397CD
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0xa: subq $0x178,%rsp
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x3: pushq %rbx
7572.500:00bc:00c0:trace:seh:dump_unwind_info 0x2: pushq %r12
7572.500:00bc:00c0:trace:seh:RtlRestoreContext returning to 0000000327045EAA stack 000000000073EBB0
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7572.511:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000140000000: builtin
7572.511:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7572.511:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7572.511:00dc:00e0:trace:seh:check_bpf_jit_enable enabled 0x31.
7572.512:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7572.512:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7572.512:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7572.512:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7572.513:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.513:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcss.exe" at 0000000140000000: builtin
7572.513:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7572.513:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7572.513:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7572.513:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
7572.513:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7572.513:00d4:00d8:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f6d60f7218d.
7572.513:00d4:00d8:trace:seh:install_bpf Seccomp filters already installed.
7572.514:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7572.514:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7572.514:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7572.515:00d4:00d8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.521:0030:00d0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3e7fe2c,4,(nil))
7572.523:0020:00b8:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F60000: builtin
7572.539:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7572.539:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7572.539:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
7572.542:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007FA5B06A0000: builtin
7572.559:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
7572.559:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
7572.559:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007FA5AF040000: builtin
7572.561:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
7572.561:00dc:00e0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00000001D0830000: builtin
7572.562:00d4:0108:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x325fe2c,4,(nil))
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7572.575:010c:0110:trace:loaddll:build_module Loaded L"Z:\\games\\steamapps\\common\\TEKKEN 7\\TEKKEN 7.exe" at 0000000140000000: native
7572.575:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7572.575:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7572.575:010c:0110:trace:seh:check_bpf_jit_enable enabled 0x31.
7572.576:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7572.576:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7572.576:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7572.577:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7572.577:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.577:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7572.577:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7572.577:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\USER32.dll" at 000000023D820000: builtin
7572.579:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7572.579:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7572.579:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
7572.579:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
7572.579:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\SHELL32.dll" at 00007F2EFFFC0000: builtin
7572.602:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
7572.602:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000030C980000: builtin
7572.602:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 00000001D97A0000: builtin
7572.603:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 0000000351680000: builtin
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000262250000: builtin
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000033EA00000: builtin
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 000000039B510000: builtin
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 000000030A2C0000: builtin
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 0000000350A30000: builtin
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0000000000EF0000: native
7572.604:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000355100000: builtin
7572.605:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000360A80000: builtin
7572.605:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-multibyte-l1-1-0.dll" at 00000002FE110000: builtin
7572.605:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 000000028BA60000: builtin
7572.605:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 0000000344840000: builtin
7572.605:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000241850000: builtin
7572.606:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 00000001CD860000: builtin
7572.606:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.DLL" at 0000000180000000: native
7572.606:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\XINPUT1_3.DLL" at 0000000253CC0000: builtin
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7572.677:0114:0118:trace:loaddll:build_module Loaded L"Z:\\games\\steamapps\\common\\TEKKEN 7\\TekkenGame\\Binaries\\Win64\\TekkenGame-Win64-Shipping.exe" at 0000000140000000: native
7572.677:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7572.677:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7572.677:0114:0118:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f4be3fa618d.
7572.677:0114:0118:trace:seh:install_bpf Seccomp filters already installed.
7572.678:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7572.678:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7572.678:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7572.679:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 0000000350A30000: builtin
7572.679:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000241850000: builtin
7572.679:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 0000000344840000: builtin
7572.679:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 000000039B510000: builtin
7572.679:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000355100000: builtin
7572.679:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000360A80000: builtin
7572.680:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000262250000: builtin
7572.680:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 000000030A2C0000: builtin
7572.680:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000033EA00000: builtin
7572.680:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 000000028BA60000: builtin
7572.680:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 00000001CD860000: builtin
7572.681:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 00000003BE590000: builtin
7572.681:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 000000026B4C0000: builtin
7572.682:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0000000231AE0000: builtin
7572.682:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 00000002F1FA0000: builtin
7572.682:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000021A7E0000: builtin
7572.682:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 000000023D820000: builtin
7572.682:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dwmapi.dll" at 000000025D740000: builtin
7572.682:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0000000000A10000: native
7572.683:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-multibyte-l1-1-0.dll" at 00000002FE110000: builtin
7572.683:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcp140.dll" at 0000000180000000: native
7572.683:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\normaliz.dll" at 00000001E7610000: builtin
7572.683:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 0000000327020000: builtin
7572.683:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 00000002E8F10000: builtin
7572.684:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 00000002739C0000: builtin
7572.684:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\opengl32.dll" at 000000007A850000: builtin
7572.684:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 00000003126F0000: builtin
7572.684:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 00000002E3540000: builtin
7572.685:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F4BE0F60000: builtin
7572.685:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 000000024F470000: builtin
7572.685:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 00007F4BE0E10000: builtin
7572.685:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 00000003A0440000: builtin
7572.686:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msacm32.dll" at 00000001C8B40000: builtin
7572.686:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winmm.dll" at 00000003B8F00000: builtin
7572.691:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00000001C8DB0000: builtin
7572.691:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\x3daudio1_7.dll" at 0000000000A30000: native
7572.713:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 00000003AFD00000: builtin
7572.714:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000030C980000: builtin
7572.714:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 00000001D97A0000: builtin
7572.731:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" at 0000000351680000: builtin
7572.739:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\lsteamclient.dll" at 00007F4BDECE0000: builtin
7572.739:0114:0118:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steamclient64.dll" at 0000000138000000: native
7572.739:0114:0118:warn:debugstr:OutputDebugStringA "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient64.dll' OK.\n"
7572.739:0114:0118:trace:seh:dispatch_exception code=40010006 flags=0 addr=000000007B01236E ip=000000007B01236E tid=0118
7572.739:0114:0118:trace:seh:dispatch_exception info[0]=0000000000000056
7572.739:0114:0118:trace:seh:dispatch_exception info[1]=0000000000a0cbb0
7572.739:0114:0118:warn:seh:dispatch_exception "[S_API] SteamAPI_Init(): Loaded 'C:\\Program Files (x86)\\Steam\\steamclient64.dll' OK.\n"
7572.739:0114:0118:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=40010006 flags=0
7572.739:0114:0118:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 0000000000A0C7B0
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 12320-123a7
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7572.739:0114:0118:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rsi
7572.739:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rdi
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 000000007B613CD3 rsp 0000000000A0C890
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 13a50-13f48
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B63C384 flags 0 prolog 0x18 bytes function 000000007B613A50-000000007B613F48
7572.739:0114:0118:trace:seh:dump_unwind_info 0x18: subq $0x2a0,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x11: pushq %rbx
7572.739:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %r12
7572.739:0114:0118:trace:seh:dump_unwind_info 0xe: pushq %r13
7572.739:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %r14
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %r15
7572.739:0114:0118:trace:seh:call_stack_handlers found wine frame 0000000000A0CA00 rsp 0000000000A0CB60 handler 000000007B6321D0
7572.739:0114:0118:trace:seh:call_teb_handler calling TEB handler 000000007B6321D0 (rec=0000000000A0C7D0, frame=0000000000A0CA00 context=0000000000A0BCF0, dispatch=0000000000A0BBC0)
7572.739:0114:0118:trace:seh:RtlUnwindEx code=40010006 flags=2 end_frame=0000000000A0CA00 target_ip=000000007B63216A rip=000000007bc5ac72
7572.739:0114:0118:trace:seh:RtlUnwindEx info[0]=0000000000000056
7572.739:0114:0118:trace:seh:RtlUnwindEx info[1]=0000000000a0cbb0
7572.739:0114:0118:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=0000000000a0ca00 rcx=0000000000a0b5c0 rdx=000000007b63216a
7572.739:0114:0118:trace:seh:RtlUnwindEx rsi=0000000000a0c2d0 rdi=0000000000a0bcf0 rbp=0000000000a0b070 rsp=0000000000a0aef0
7572.739:0114:0118:trace:seh:RtlUnwindEx r8=0000000000a0c7d0 r9=000000007b6321a0 r10=0000000000a0b7b6 r11=0000000000000246
7572.739:0114:0118:trace:seh:RtlUnwindEx r12=0000000000a0c7d0 r13=0000000000a0b5c0 r14=0000000000a0ca00 r15=0000000000a0c7d0
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AC72 rsp 0000000000A0AEF0
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 5ac20-5b52e
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC8398C flags 0 prolog 0x13 bytes function 000000007BC5AC20-000000007BC5B52E
7572.739:0114:0118:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %rbx
7572.739:0114:0118:trace:seh:dump_unwind_info 0xb: pushq %rsi
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rdi
7572.739:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rbp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %r12
7572.739:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r13
7572.739:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r14
7572.739:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r15
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B54F rsp 0000000000A0B590
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 5b530-5b558
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC839A4 flags 0 prolog 0x7 bytes function 000000007BC5B530-000000007BC5B558
7572.739:0114:0118:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B63216A rsp 0000000000A0BAA0
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 32150-3216c
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B63D7E0 flags 0 prolog 0x8 bytes function 000000007B632150-000000007B63216C
7572.739:0114:0118:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
7572.739:0114:0118:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x1: pushq %rbp
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B632199 rsp 0000000000A0BAD0
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 32170-3219a
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B63D7EC flags 0 prolog 0x4 bytes function 000000007B632170-000000007B63219A
7572.739:0114:0118:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B632224 rsp 0000000000A0BB00
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 321d0-32225
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B63D7FC flags 0 prolog 0xa bytes function 000000007B6321D0-000000007B632225
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r12
7572.739:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r13
7572.739:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r14
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A1AF rsp 0000000000A0BB50
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 59ed0-5a421
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC83948 flags 0 prolog 0x13 bytes function 000000007BC59ED0-000000007BC5A421
7572.739:0114:0118:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %rbx
7572.739:0114:0118:trace:seh:dump_unwind_info 0xb: pushq %rsi
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rdi
7572.739:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rbp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %r12
7572.739:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r13
7572.739:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r14
7572.739:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r15
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A737 rsp 0000000000A0C210
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 5a430-5a93f
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC83960 flags 0 prolog 0x10 bytes function 000000007BC5A430-000000007BC5A93F
7572.739:0114:0118:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %rbx
7572.739:0114:0118:trace:seh:dump_unwind_info 0xb: pushq %rsi
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rdi
7572.739:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rbp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %r12
7572.739:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r13
7572.739:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r14
7572.739:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r15
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583B4 rsp 0000000000A0C2B0
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 5834c-583c1
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC838B0 flags 0 prolog 0x7 bytes function 000000007BC5834C-000000007BC583C1
7572.739:0114:0118:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 0000000000A0C7B0
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 12320-123a7
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7572.739:0114:0118:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rsi
7572.739:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rdi
7572.739:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B613CD3 rsp 0000000000A0C890
7572.739:0114:0118:trace:seh:dump_unwind_info **** func 13a50-13f48
7572.739:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B63C384 flags 0 prolog 0x18 bytes function 000000007B613A50-000000007B613F48
7572.739:0114:0118:trace:seh:dump_unwind_info 0x18: subq $0x2a0,%rsp
7572.739:0114:0118:trace:seh:dump_unwind_info 0x11: pushq %rbx
7572.739:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %r12
7572.739:0114:0118:trace:seh:dump_unwind_info 0xe: pushq %r13
7572.739:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %r14
7572.739:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %r15
7572.739:0114:0118:trace:seh:RtlRestoreContext returning to 000000007B63216A stack 0000000000A0C890
7572.858:0114:0118:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\api-ms-win-core-localization-l1-2-1.dll" : builtin
7572.871:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 00000002BB750000: builtin
7572.871:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 00000001F51E0000: builtin
7572.871:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DINPUT8.dll" at 00007F4BE0940000: builtin
7572.872:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F4BE0200000: builtin
7572.880:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 00000002F7230000: builtin
7572.881:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\DSOUND.dll" at 0000000236DF0000: builtin
7572.881:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\IPHLPAPI.DLL" at 00007F4BE01D0000: builtin
7572.882:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\POWRPROF.dll" at 000000033B9E0000: builtin
7572.882:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\PSAPI.DLL" at 0000000316370000: builtin
7572.883:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WLDAP32.dll" at 00007F4BE0190000: builtin
7572.884:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\XAPOFX1_5.dll" at 0000000001160000: native
7572.885:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\XINPUT1_3.dll" at 0000000253CC0000: builtin
7572.885:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\vulkan-1.dll" at 00000003785E0000: builtin
7572.885:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winevulkan.dll" at 00007F4BDC650000: builtin
7572.885:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgi.dll" at 00000002EDF00000: native
7572.886:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3d11.dll" at 0000000359050000: native
7572.886:0114:0118:trace:seh:NtQueryInformationThread (0xc4,0,0xa0f540,30,(nil))
7572.887:0114:0118:trace:seh:NtQueryInformationThread (0xd8,0,0xa0f5b0,30,(nil))
7572.887:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\d3d9.dll" at 0000000270F60000: native
7572.888:0114:0118:trace:seh:NtQueryInformationThread (0xec,0,0xa0f5b0,30,(nil))
7572.888:0114:0118:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wer.dll" at 00000001E6C10000: builtin
7573.063:0114:0118:trace:loaddll:build_module Loaded L"Z:\\games\\steamapps\\common\\TEKKEN 7\\Engine\\Binaries\\ThirdParty\\Steamworks\\Steamv132\\Win64\\steam_api64.dll" at 000000003B400000: native
7573.071:0114:0118:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\gameoverlayrenderer64.dll" at 0000000001580000: native
7574.930:0114:0118:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
7575.023:0114:0118:trace:seh:NtSetInformationThread (0x1c,3,0xa0fd0c,4)
7575.350:0114:0118:warn:seh:OutputDebugStringA "LowLevelFatalError [File:E:\\ws02\\ue4\\Engine\\Source\\Runtime\\PakFile\\Private\\IPlatformFilePak.cpp] [Line: 3317] \nTrailing magic number (1047947620d) is different than the expected one. Verify your installation.\n"
7575.350:0114:0118:trace:seh:dispatch_exception code=40010006 flags=0 addr=000000007B0136A5 ip=000000007B0136A5 tid=0118
7575.350:0114:0118:trace:seh:dispatch_exception info[0]=00000000000000d2
7575.350:0114:0118:trace:seh:dispatch_exception info[1]=0000000000271e50
7575.350:0114:0118:warn:seh:dispatch_exception "LowLevelFatalError [File:E:\\ws02\\ue4\\Engine\\Source\\Runtime\\PakFile\\Private\\IPlatformFilePak.cpp] [Line: 3317] \nTrailing magic number (1047947620d) is different than the expected one. Verify your installation.\n"
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 000000027103B600 code=40010006 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 000000027103B600 returned 0
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 0000000359141260 code=40010006 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 0000000359141260 returned 0
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 00000002EDF7F590 code=40010006 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 00000002EDF7F590 returned 0
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=40010006 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 000000007B0136A5 rsp 0000000000A0C020
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 133c0-136e0
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A556C flags 0 prolog 0x18 bytes function 000000007B0133C0-000000007B0136E0
7575.350:0114:0118:trace:seh:dump_unwind_info 0x18: subq $0x200,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x11: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0xe: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %r15
7575.350:0114:0118:trace:seh:call_stack_handlers found wine frame 0000000000A0C0F0 rsp 0000000000A0C250 handler 000000007B07D080
7575.350:0114:0118:trace:seh:call_teb_handler calling TEB handler 000000007B07D080 (rec=0000000000A0C050, frame=0000000000A0C0F0 context=0000000000A0B560, dispatch=0000000000A0B430)
7575.350:0114:0118:trace:seh:RtlUnwindEx code=40010006 flags=2 end_frame=0000000000A0C0F0 target_ip=000000007B07D01A rip=000000007bc5ac72
7575.350:0114:0118:trace:seh:RtlUnwindEx info[0]=00000000000000d2
7575.350:0114:0118:trace:seh:RtlUnwindEx info[1]=0000000000271e50
7575.350:0114:0118:trace:seh:RtlUnwindEx rax=000000003ffe0000 rbx=0000000000a0c0f0 rcx=0000000000a0ae30 rdx=000000007b07d01a
7575.350:0114:0118:trace:seh:RtlUnwindEx rsi=0000000000a0bb40 rdi=0000000000a0b560 rbp=0000000000a0a8e0 rsp=0000000000a0a760
7575.350:0114:0118:trace:seh:RtlUnwindEx r8=0000000000a0c050 r9=000000007b07d050 r10=0000000000a0b026 r11=0000000000000293
7575.350:0114:0118:trace:seh:RtlUnwindEx r12=0000000000a0c050 r13=0000000000a0ae30 r14=0000000000a0c0f0 r15=0000000000a0c050
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AC72 rsp 0000000000A0A760
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 5ac20-5b52e
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC8398C flags 0 prolog 0x13 bytes function 000000007BC5AC20-000000007BC5B52E
7575.350:0114:0118:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0xb: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rdi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r15
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B54F rsp 0000000000A0AE00
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 5b530-5b558
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC839A4 flags 0 prolog 0x7 bytes function 000000007BC5B530-000000007BC5B558
7575.350:0114:0118:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B07D01A rsp 0000000000A0B310
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 7d000-7d01c
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A8F5C flags 0 prolog 0x8 bytes function 000000007B07D000-000000007B07D01C
7575.350:0114:0118:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x1: pushq %rbp
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B07D049 rsp 0000000000A0B340
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 7d020-7d04a
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A8F68 flags 0 prolog 0x4 bytes function 000000007B07D020-000000007B07D04A
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B07D0D4 rsp 0000000000A0B370
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 7d080-7d0d5
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A8F78 flags 0 prolog 0xa bytes function 000000007B07D080-000000007B07D0D5
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r14
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A1AF rsp 0000000000A0B3C0
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 59ed0-5a421
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC83948 flags 0 prolog 0x13 bytes function 000000007BC59ED0-000000007BC5A421
7575.350:0114:0118:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0xb: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rdi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r15
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A737 rsp 0000000000A0BA80
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 5a430-5a93f
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC83960 flags 0 prolog 0x10 bytes function 000000007BC5A430-000000007BC5A93F
7575.350:0114:0118:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0xb: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %rdi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x9: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %r15
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583B4 rsp 0000000000A0BB20
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 5834c-583c1
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007BC838B0 flags 0 prolog 0x7 bytes function 000000007BC5834C-000000007BC583C1
7575.350:0114:0118:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 2 rip 000000007B0136A5 rsp 0000000000A0C020
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 133c0-136e0
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 000000007B0A556C flags 0 prolog 0x18 bytes function 000000007B0133C0-000000007B0136E0
7575.350:0114:0118:trace:seh:dump_unwind_info 0x18: subq $0x200,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x11: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0xe: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %r15
7575.350:0114:0118:trace:seh:RtlRestoreContext returning to 000000007B07D01A stack 0000000000A0C020
7575.350:0114:0118:trace:seh:dispatch_exception code=c0000005 flags=0 addr=00000001463DAB14 ip=00000001463DAB14 tid=0118
7575.350:0114:0118:trace:seh:dispatch_exception info[0]=0000000000000000
7575.350:0114:0118:trace:seh:dispatch_exception info[1]=0000000000000000
7575.350:0114:0118:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
7575.350:0114:0118:trace:seh:dispatch_exception rax=00000000000000e3 rbx=0000000000000400 rcx=0000000000000000 rdx=0000000000a0bb60
7575.350:0114:0118:trace:seh:dispatch_exception rsi=0000000000a0bb60 rdi=0000000000000000 rbp=00000000434c8048 rsp=0000000000a0bb30
7575.350:0114:0118:trace:seh:dispatch_exception r8=00000000000000e3 r9=0000000002009f18 r10=0000000000000000 r11=0000000000000061
7575.350:0114:0118:trace:seh:dispatch_exception r12=00000000ffffffff r13=0000000000000000 r14=0000000000000000 r15=0000000002009f10
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 000000027103B600 code=c0000005 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 000000027103B600 returned 0
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 0000000359141260 code=c0000005 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 0000000359141260 returned 0
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 00000002EDF7F590 code=c0000005 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 00000002EDF7F590 returned 0
7575.350:0114:0118:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=c0000005 flags=0
7575.350:0114:0118:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 00000001463DAB14 rsp 0000000000A0BB30
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 63daa00-63dab4a
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001431B0BC8 flags 3 prolog 0x34 bytes function 00000001463DAA00-00000001463DAB4A
7575.350:0114:0118:trace:seh:dump_unwind_info 0x22: subq $0x448,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x1b: pushq %r15
7575.350:0114:0118:trace:seh:dump_unwind_info 0x19: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x17: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0x15: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0x13: pushq %rdi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x12: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x11: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431B0BE4
7575.350:0114:0118:trace:seh:call_handler calling handler 00000001425B64C8 (rec=0000000000A0B920, frame=0000000000A0BB30 context=0000000000A0AE70, dispatch=0000000000A0AD40)
7575.350:0114:0118:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 00000001463B77A8 rsp 0000000000A0BFC0
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 63b7672-63b77bd
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001431B0C40 flags 4 prolog 0x8 bytes function 00000001463B7672-00000001463B77BD
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: movq %rdi,0x3060(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info chained to function 00000001463B7630-00000001463B7672
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001431B0C28 flags 3 prolog 0x29 bytes function 00000001463B7630-00000001463B7672
7575.350:0114:0118:trace:seh:dump_unwind_info 0x17: subq $0x3068,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x7: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431B0C3C
7575.350:0114:0118:trace:seh:call_handler calling handler 00000001425B64C8 (rec=0000000000A0B920, frame=0000000000A0BFC0 context=0000000000A0AE70, dispatch=0000000000A0AD40)
7575.350:0114:0118:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 0000000149E20504 rsp 0000000000A0F050
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 9e20498-9e2051c
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001432D6DBC flags 4 prolog 0x5 bytes function 0000000149E20498-0000000149E2051C
7575.350:0114:0118:trace:seh:dump_unwind_info 0x5: movq %rsi,0x40(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info chained to function 0000000149E20420-0000000149E20498
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001431EBFE8 flags 0 prolog 0xa bytes function 0000000149E20420-0000000149E20498
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: movq %rbx,0x48(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %rdi
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 0000000149E0FAF1 rsp 0000000000A0F090
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 9e0f950-9e0fb0d
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 0000000143182924 flags 0 prolog 0x18 bytes function 0000000149E0F950-0000000149E0FB0D
7575.350:0114:0118:trace:seh:dump_unwind_info 0x18: movq %rsi,0x58(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x18: movq %rbp,0x50(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x18: movq %rbx,0x48(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x18: subq $0x20,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x14: pushq %r15
7575.350:0114:0118:trace:seh:dump_unwind_info 0x12: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %rdi
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 0000000149E238B4 rsp 0000000000A0F0D0
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 9e23891-9e239dd
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001432D703C flags 4 prolog 0x5 bytes function 0000000149E23891-0000000149E239DD
7575.350:0114:0118:trace:seh:dump_unwind_info 0x5: movq %r14,0x68(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info chained to function 0000000149E237F9-0000000149E23891
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001432D7018 flags 4 prolog 0x26 bytes function 0000000149E237F9-0000000149E23891
7575.350:0114:0118:trace:seh:dump_unwind_info 0x26: movq %r15,0x60(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x1c: movq %r13,0x70(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x12: movq %r12,0xa8(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0xb: movq %rdi,0xa0(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: movq %rsi,0x98(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info chained to function 0000000149E237F0-0000000149E237F9
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001432D700C flags 0 prolog 0x9 bytes function 0000000149E237F0-0000000149E237F9
7575.350:0114:0118:trace:seh:dump_unwind_info 0x9: subq $0x78,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x5: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %rbx
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 0000000149E20B69 rsp 0000000000A0F160
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 9e20680-9e20c8e
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 00000001432D6FE8 flags 3 prolog 0x30 bytes function 0000000149E20680-0000000149E20C8E
7575.350:0114:0118:trace:seh:dump_unwind_info 0x1f: movq %rbx,0x228(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x1f: subq $0x1e0,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x10: pushq %r15
7575.350:0114:0118:trace:seh:dump_unwind_info 0xe: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0xc: pushq %r13
7575.350:0114:0118:trace:seh:dump_unwind_info 0xa: pushq %r12
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: pushq %rdi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x7: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x6: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001432D7008
7575.350:0114:0118:trace:seh:call_handler calling handler 00000001425B64C8 (rec=0000000000A0B920, frame=0000000000A0F160 context=0000000000A0AE70, dispatch=0000000000A0AD40)
7575.350:0114:0118:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 0000000144FA37AE rsp 0000000000A0F380
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 4fa3740-4fa38f8
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 0000000143206ABC flags 0 prolog 0x15 bytes function 0000000144FA3740-0000000144FA38F8
7575.350:0114:0118:trace:seh:dump_unwind_info 0x15: movq %rdi,0x40(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x15: movq %rsi,0x38(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x15: movq %rbx,0x30(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x15: subq $0x20,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x11: pushq %r14
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 000000014023CAFB rsp 0000000000A0F3B0
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 23c853-23ccfc
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 0000000143167BFC flags 4 prolog 0x32 bytes function 000000014023C853-000000014023CCFC
7575.350:0114:0118:trace:seh:dump_unwind_info 0x32: movq %r15,0x7e0(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2a: movq %r14,0x7e8(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x22: movq %r13,0x7f0(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x17: movq %r12,0x7f8(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info 0x8: movq %rdi,0x830(%rsp)
7575.350:0114:0118:trace:seh:dump_unwind_info chained to function 000000014023C7F0-000000014023C853
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 0000000143167BE4 flags 3 prolog 0x24 bytes function 000000014023C7F0-000000014023C853
7575.350:0114:0118:trace:seh:dump_unwind_info 0x13: subq $0x800,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x3: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 0000000143167BF8
7575.350:0114:0118:trace:seh:call_handler calling handler 00000001425B64C8 (rec=0000000000A0B920, frame=0000000000A0F3B0 context=0000000000A0AE70, dispatch=0000000000A0AD40)
7575.350:0114:0118:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 000000014023819A rsp 0000000000A0FBD0
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 238090-2381bf
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 0000000143167F48 flags 3 prolog 0x21 bytes function 0000000140238090-00000001402381BF
7575.350:0114:0118:trace:seh:dump_unwind_info 0x13: subq $0x170,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info 0x7: pushq %r14
7575.350:0114:0118:trace:seh:dump_unwind_info 0x5: pushq %rdi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: pushq %rsi
7575.350:0114:0118:trace:seh:dump_unwind_info 0x3: pushq %rbx
7575.350:0114:0118:trace:seh:dump_unwind_info 0x2: pushq %rbp
7575.350:0114:0118:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 0000000143167F60
7575.350:0114:0118:trace:seh:call_handler calling handler 00000001425B64C8 (rec=0000000000A0B920, frame=0000000000A0FBD0 context=0000000000A0AE70, dispatch=0000000000A0AD40)
7575.350:0114:0118:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.350:0114:0118:trace:seh:RtlVirtualUnwind type 1 rip 0000000144FA1E8A rsp 0000000000A0FD70
7575.350:0114:0118:trace:seh:dump_unwind_info **** func 4fa1e70-4fa1ea4
7575.350:0114:0118:trace:seh:dump_unwind_info unwind info at 0000000143168578 flags 1 prolog 0x4 bytes function 0000000144FA1E70-0000000144FA1EA4
7575.350:0114:0118:trace:seh:dump_unwind_info 0x4: subq $0x38,%rsp
7575.350:0114:0118:trace:seh:dump_unwind_info handler 00000001425B83BC data at 0000000143168584
7575.350:0114:0118:trace:seh:call_handler calling handler 00000001425B83BC (rec=0000000000A0B920, frame=0000000000A0FD70 context=0000000000A0AE70, dispatch=0000000000A0AD40)
7575.351:0114:011c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=000000007B01236E ip=000000007B01236E tid=011c
7575.351:0114:011c:trace:seh:dispatch_exception info[0]=0000000000001000
7575.351:0114:011c:trace:seh:dispatch_exception info[1]=000000000267f030
7575.351:0114:011c:trace:seh:dispatch_exception info[2]=0000000000000120
7575.351:0114:011c:warn:seh:dispatch_exception Thread 0120 renamed to "FHeartBeatThread"
7575.351:0114:011c:trace:seh:call_vectored_handlers calling handler at 000000027103B600 code=406d1388 flags=0
7575.351:0114:011c:trace:seh:call_vectored_handlers handler at 000000027103B600 returned ffffffff
7575.351:0114:011c:trace:seh:NtSetInformationThread (0x118,3,0x267efec,4)
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 0, L"Application Name", L"UE4-TekkenGame") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 1, L"Application Version", L"4.13.2") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 2, L"Application Timestamp", L"6086beda") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 3, L"Fault Module Name", L"TekkenGame-Win64-Shipping.exe") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 4, L"Fault Module Version", L"4.13.2") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 5, L"Fault Module Timestamp", L"6086beda") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 6, L"Exception Code", L"c0000005") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 7, L"Exception Offset", L"00000000063DAB14") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 8, L"Commandline", L"!!AssertLog=\"LowLevelFatalError [File:E:\\ws02\\ue4\\Engine\\Source\\Runtime\\PakFile\\Private\\IPlatformFilePak.cpp] [Line: 3317] #Trailing magic number (1047947620d) is different than the expected one. Verify your installation.#\"") :stub
7575.361:0114:011c:fixme:wer:WerReportSetParameter (0000000002710050, 9, L"BranchBaseDir", L"UE4!Z:/games/steamapps/common/TEKKEN 7/TekkenGame/Binaries/Win64/!Game!0") :stub
7575.361:0114:011c:trace:seh:dispatch_exception code=c0000005 flags=0 addr=0000000145F6C722 ip=0000000145F6C722 tid=011c
7575.361:0114:011c:trace:seh:dispatch_exception info[0]=0000000000000000
7575.361:0114:011c:trace:seh:dispatch_exception info[1]=0000000000000038
7575.361:0114:011c:warn:seh:dispatch_exception EXCEPTION_ACCESS_VIOLATION exception (code=c0000005) raised
7575.361:0114:011c:trace:seh:dispatch_exception rax=000000009e70d66a rbx=0000000000000000 rcx=000000000267d5c0 rdx=0000000000000030
7575.361:0114:011c:trace:seh:dispatch_exception rsi=000000000267d5c0 rdi=000000000213c840 rbp=000000000267d670 rsp=000000000267d0a0
7575.361:0114:011c:trace:seh:dispatch_exception r8=0000000000000030 r9=0000000000000000 r10=0000000000000000 r11=000000000267e038
7575.361:0114:011c:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=000000000267dac0
7575.361:0114:011c:trace:seh:call_vectored_handlers calling handler at 000000027103B600 code=c0000005 flags=0
7575.361:0114:011c:trace:seh:call_vectored_handlers handler at 000000027103B600 returned 0
7575.361:0114:011c:trace:seh:call_vectored_handlers calling handler at 0000000359141260 code=c0000005 flags=0
7575.361:0114:011c:trace:seh:call_vectored_handlers handler at 0000000359141260 returned 0
7575.361:0114:011c:trace:seh:call_vectored_handlers calling handler at 00000002EDF7F590 code=c0000005 flags=0
7575.361:0114:011c:trace:seh:call_vectored_handlers handler at 00000002EDF7F590 returned 0
7575.361:0114:011c:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=c0000005 flags=0
7575.361:0114:011c:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 0000000145F6C722 rsp 000000000267D0A0
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 5f6c6f0-5f6c8b6
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431AAB3C flags 3 prolog 0x27 bytes function 0000000145F6C6F0-0000000145F6C8B6
7575.361:0114:011c:trace:seh:dump_unwind_info 0x15: movq %rbp,0x4e8(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x15: movq %rbx,0x4e0(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x15: subq $0x4b0,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0xe: pushq %r14
7575.361:0114:011c:trace:seh:dump_unwind_info 0xc: pushq %rdi
7575.361:0114:011c:trace:seh:dump_unwind_info 0xb: pushq %rsi
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431AAB58
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267D0A0 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 00000001407C6A43 rsp 000000000267D570
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 7c6a00-7c6af7
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431AB994 flags 3 prolog 0x2c bytes function 00000001407C6A00-00000001407C6AF7
7575.361:0114:011c:trace:seh:dump_unwind_info 0x1b: subq $0x4e0,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0xc: pushq %r15
7575.361:0114:011c:trace:seh:dump_unwind_info 0xa: pushq %r14
7575.361:0114:011c:trace:seh:dump_unwind_info 0x8: pushq %r13
7575.361:0114:011c:trace:seh:dump_unwind_info 0x6: pushq %r12
7575.361:0114:011c:trace:seh:dump_unwind_info 0x4: pushq %rdi
7575.361:0114:011c:trace:seh:dump_unwind_info 0x3: pushq %rbx
7575.361:0114:011c:trace:seh:dump_unwind_info 0x2: pushq %rbp
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431AB9B0
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267D570 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 00000001407D8A5A rsp 000000000267DA90
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 7d8a38-7d8aea
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431AB6B8 flags 4 prolog 0xe bytes function 00000001407D8A38-00000001407D8AEA
7575.361:0114:011c:trace:seh:dump_unwind_info 0xe: movq %r15,0x570(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x4: movq %r14,0x578(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info chained to function 00000001407D8A10-00000001407D8A38
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431AB69C flags 3 prolog 0x28 bytes function 00000001407D8A10-00000001407D8A38
7575.361:0114:011c:trace:seh:dump_unwind_info 0x17: subq $0x580,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x9: pushq %r12
7575.361:0114:011c:trace:seh:dump_unwind_info 0x7: pushq %rdi
7575.361:0114:011c:trace:seh:dump_unwind_info 0x6: pushq %rsi
7575.361:0114:011c:trace:seh:dump_unwind_info 0x5: pushq %rbx
7575.361:0114:011c:trace:seh:dump_unwind_info 0x4: pushq %rbp
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431AB6B4
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267DA90 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 0000000145F754F2 rsp 000000000267E040
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 5f74e20-5f755e4
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431AB678 flags 3 prolog 0x32 bytes function 0000000145F74E20-0000000145F755E4
7575.361:0114:011c:trace:seh:dump_unwind_info 0x21: movq %rsi,0x590(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x21: movq %rbx,0x588(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x21: subq $0x550,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x12: pushq %r15
7575.361:0114:011c:trace:seh:dump_unwind_info 0x10: pushq %r14
7575.361:0114:011c:trace:seh:dump_unwind_info 0xe: pushq %r12
7575.361:0114:011c:trace:seh:dump_unwind_info 0xc: pushq %rdi
7575.361:0114:011c:trace:seh:dump_unwind_info 0xb: pushq %rbp
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431AB698
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267E040 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 0000000145F68C18 rsp 000000000267E5C0
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 5f68bc0-5f68c4a
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 0000000143206944 flags 0 prolog 0x5 bytes function 0000000145F68BC0-0000000145F68C4A
7575.361:0114:011c:trace:seh:dump_unwind_info 0x5: subq $0x20,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x1: pushq %rbx
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 00000001407AC604 rsp 000000000267E5F0
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 7abf90-7acef8
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431A8B8C flags 3 prolog 0x38 bytes function 00000001407ABF90-00000001407ACEF8
7575.361:0114:011c:trace:seh:dump_unwind_info 0x27: movq %rdi,0x3b8(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x27: movq %rsi,0x3b0(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x27: movq %rbx,0x3a8(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x27: subq $0x370,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x18: pushq %r15
7575.361:0114:011c:trace:seh:dump_unwind_info 0x16: pushq %r14
7575.361:0114:011c:trace:seh:dump_unwind_info 0x14: pushq %r13
7575.361:0114:011c:trace:seh:dump_unwind_info 0x12: pushq %r12
7575.361:0114:011c:trace:seh:dump_unwind_info 0x10: pushq %rbp
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431A8BB0
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267E5F0 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 0000000145EFA5A5 rsp 000000000267E990
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 5efa590-5efa5cf
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431B5D40 flags 0 prolog 0xa bytes function 0000000145EFA590-0000000145EFA5CF
7575.361:0114:011c:trace:seh:dump_unwind_info 0xa: movq %rbx,0x40(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x6: pushq %rdi
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 000000014644C7FD rsp 000000000267E9D0
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 644c310-644d2fc
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431B4DEC flags 3 prolog 0x30 bytes function 000000014644C310-000000014644D2FC
7575.361:0114:011c:trace:seh:dump_unwind_info 0x1f: movq %rbx,0xb98(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x1f: subq $0xb40,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x10: pushq %r15
7575.361:0114:011c:trace:seh:dump_unwind_info 0xe: pushq %r14
7575.361:0114:011c:trace:seh:dump_unwind_info 0xc: pushq %r13
7575.361:0114:011c:trace:seh:dump_unwind_info 0xa: pushq %r12
7575.361:0114:011c:trace:seh:dump_unwind_info 0x8: pushq %rdi
7575.361:0114:011c:trace:seh:dump_unwind_info 0x7: pushq %rsi
7575.361:0114:011c:trace:seh:dump_unwind_info 0x6: pushq %rbp
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431B4E0C
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267E9D0 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 000000014644259B rsp 000000000267F550
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 6442510-6442778
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 00000001431B4E54 flags 3 prolog 0x2b bytes function 0000000146442510-0000000146442778
7575.361:0114:011c:trace:seh:dump_unwind_info 0x19: movq %rbp,0x8d0(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x19: movq %rbx,0x8c8(%rsp)
7575.361:0114:011c:trace:seh:dump_unwind_info 0x19: subq $0x890,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x12: pushq %r15
7575.361:0114:011c:trace:seh:dump_unwind_info 0x10: pushq %r14
7575.361:0114:011c:trace:seh:dump_unwind_info 0xe: pushq %r12
7575.361:0114:011c:trace:seh:dump_unwind_info 0xc: pushq %rdi
7575.361:0114:011c:trace:seh:dump_unwind_info 0xb: pushq %rsi
7575.361:0114:011c:trace:seh:dump_unwind_info handler 00000001425B64C8 data at 00000001431B4E74
7575.361:0114:011c:trace:seh:call_handler calling handler 00000001425B64C8 (rec=000000000267CEA0, frame=000000000267F550 context=000000000267C3F0, dispatch=000000000267C2C0)
7575.361:0114:011c:trace:seh:call_handler handler at 00000001425B64C8 returned 1
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 000000014644E4A3 rsp 000000000267FE10
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 644e460-644e4bf
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 0000000143206944 flags 0 prolog 0x5 bytes function 000000014644E460-000000014644E4BF
7575.361:0114:011c:trace:seh:dump_unwind_info 0x5: subq $0x20,%rsp
7575.361:0114:011c:trace:seh:dump_unwind_info 0x1: pushq %rbx
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 000000007B62C9A9 rsp 000000000267FE40
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 2c9a0-2c9b2
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 000000007B63D4DC flags 0 prolog 0x4 bytes function 000000007B62C9A0-000000007B62C9B2
7575.361:0114:011c:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7575.361:0114:011c:trace:seh:RtlVirtualUnwind type 1 rip 000000007BC5E693 rsp 000000000267FE70
7575.361:0114:011c:trace:seh:dump_unwind_info **** func 5e610-5e713
7575.361:0114:011c:trace:seh:dump_unwind_info unwind info at 000000007BC83C64 flags 0 prolog 0x7 bytes function 000000007BC5E610-000000007BC5E713
7575.361:0114:011c:trace:seh:dump_unwind_info 0x7: subq $0x168,%rsp
7575.361:0114:011c:trace:seh:call_stack_handlers found wine frame 000000000267FEA0 rsp 000000000267FFE0 handler 000000007BC68390
7575.361:0114:011c:trace:seh:call_teb_handler calling TEB handler 000000007BC68390 (rec=000000000267CEA0, frame=000000000267FEA0 context=000000000267C3F0, dispatch=000000000267C2C0)
wine: Unhandled page fault on read access to 0000000000000038 at address 0000000145F6C722 (thread 011c), starting debugger...
7575.362:0114:011c:trace:seh:start_debugger Starting debugger L"winedbg --auto 276 284"
ERROR: ld.so: object '/home/pie/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
7575.379:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedbg.exe" at 00007F41D1090000: builtin
7575.380:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
7575.380:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B600000: builtin
7575.380:0124:0128:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x7f41d34ce18d.
7575.380:0124:0128:trace:seh:install_bpf Seccomp filters already installed.
7575.381:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00000003AF670000: builtin
7575.381:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dbghelp.dll" at 00000003BE590000: builtin
7575.381:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000032A700000: builtin
7575.381:0124:0128:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 0000000330260000: builtin
7575.383:0124:0128:trace:seh:NtQueryInformationThread (0x48,0,0x63f760,30,(nil))
7575.386:0124:0128:trace:seh:NtQueryInformationThread (0x5c,0,0x63f760,30,(nil))
7575.386:0124:0128:trace:seh:NtQueryInformationThread (0x60,0,0x63f760,30,(nil))
7575.417:0124:0128:trace:seh:NtQueryInformationThread (0x260,0,0x63f760,30,(nil))
7575.417:0114:011c:trace:seh:call_teb_handler handler at 000000007BC68390 returned 1
7575.417:0114:012c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x39cfccc,4,(nil))
7575.417:0114:011c:warn:seh:virtual_unwind exception data not found in L"TekkenGame-Win64-Shipping.exe"
Unhandled exception: page fault on read access to 0x00000038 in 64-bit code (0x0000000145f6c722).
Register dump:
rip:0000000145f6c722 rsp:000000000267d0a0 rbp:000000000267d670 eflags:00010246 ( R- -- I Z- -P- )
rax:000052749e70d66a rbx:0000000000000000 rcx:000000000267d5c0 rdx:0000000000000030
rsi:000000000267d5c0 rdi:000000000213c840 r8:0000000000000030 r9:0000000000000000 r10:0000000000000000
r11:000000000267e038 r12:0000000000000000 r13:0000000000000000 r14:0000000000000000 r15:000000000267dac0
Stack dump:
0x000000000267d0a0: 0000000000010000 0000000000000000
0x000000000267d0b0: 00000000ffffff80 0000000000000000
0x000000000267d0c0: 0000000000000000 00000001407c7ca8
0x000000000267d0d0: 0000000000000000 0000000000000000
0x000000000267d0e0: 000000000000009c 0000000000000000
0x000000000267d0f0: 000000000000005f 0000000000000000
0x000000000267d100: 4f500000746f6f72 0000000000584953
0x000000000267d110: 0000000000000000 0000000000000000
0x000000000267d120: 0000000000000000 0000000000000000
0x000000000267d130: 0000000000000000 0000000000000000
0x000000000267d140: 0000000000000000 0000000000000000
0x000000000267d150: 0000000000000000 0000000000000000
Backtrace:
=>0 0x0000000145f6c722 EntryPoint+0xf9ad6412() in tekkengame-win64-shipping (0x000000000267d670)
1 0x00000001407c6a43 EntryPoint+0xf4330732() in tekkengame-win64-shipping (0x000000000267d670)
2 0x00000001407d8a5a EntryPoint+0xf4342749() in tekkengame-win64-shipping (0x000000000267db90)
3 0x0000000145f754f2 EntryPoint+0xf9adf1e1() in tekkengame-win64-shipping (0x000000000267e140)
4 0x0000000145f68c18 EntryPoint+0xf9ad2907() in tekkengame-win64-shipping (0x000000000267e6f0)
5 0x00000001407ac604 EntryPoint+0xf43162f3() in tekkengame-win64-shipping (0x000000000267e6f0)
6 0x0000000145efa5a5 EntryPoint+0xf9a64294() in tekkengame-win64-shipping (0x000000000267ead0)
7 0x000000014644c7fd EntryPoint+0xf9fb64ec() in tekkengame-win64-shipping (0x000000000267ead0)
8 0x000000014644259b EntryPoint+0xf9fac28a() in tekkengame-win64-shipping (0x0000000000000000)
9 0x000000014644e4a3 EntryPoint+0xf9fb8192() in tekkengame-win64-shipping (0x0000000000000000)
10 0x000000007b62c9a9 EntryPoint+0xffffffffffffffff() in kernel32 (0x0000000000000000)
11 0x000000007bc5e693 EntryPoint+0xffffffffffffffff() in ntdll (0x0000000000000000)
0x0000000145f6c722 EntryPoint+0xf9ad6412 in tekkengame-win64-shipping: cmpl %r14d,0x0000000000000008(%rdx)
Modules:
Module Address Debug info Name (68 modules)
PE a10000- a27000 Deferred vcruntime140
PE a30000- a39000 Deferred x3daudio1_7
PE 1160000- 1175000 Deferred xapofx1_5
PE 1580000- 175b000 Deferred gameoverlayrenderer64
PE 3b400000- 3b437000 Deferred steam_api64
PE 7a850000- 7a854000 Deferred opengl32
PE 7b000000- 7b0d5000 Deferred kernelbase
PE 7b600000- 7b812000 Export kernel32
PE 7bc00000- 7bc9e000 Export ntdll
PE 138000000- 13945b000 Deferred steamclient64
PE 140000000- 14c4cf000 Export tekkengame-win64-shipping
PE 180000000- 18009d000 Deferred msvcp140
PE 1c8b40000- 1c8b60000 Deferred msacm32
PE 1c8db0000- 1c8e3c000 Deferred msvcrt
PE 1cd860000- 1cd868000 Deferred api-ms-win-crt-utility-l1-1-0
PE 1d97a0000- 1d97a7000 Deferred api-ms-win-core-fibers-l1-1-1
PE 1e6c10000- 1e6c1d000 Deferred wer
PE 1e7610000- 1e7617000 Deferred normaliz
PE 1f51e0000- 1f51ef000 Deferred hid
PE 21a7e0000- 21a854000 Deferred setupapi
PE 231ae0000- 231b62000 Deferred rpcrt4
PE 236df0000- 236e49000 Deferred dsound
PE 23d820000- 23da47000 Deferred user32
PE 241850000- 241857000 Deferred api-ms-win-crt-environment-l1-1-0
PE 24f470000- 24f48f000 Deferred mpr
PE 253cc0000- 253cde000 Deferred xinput1_3
PE 25d740000- 25d74e000 Deferred dwmapi
PE 262250000- 262259000 Deferred api-ms-win-crt-runtime-l1-1-0
PE 26b4c0000- 26b642000 Deferred gdi32
PE 270f60000- 2711ee000 Deferred d3d9
PE 2739c0000- 273af6000 Deferred oleaut32
PE 28ba60000- 28ba67000 Deferred api-ms-win-crt-time-l1-1-0
PE 2bb750000- 2bb894000 Deferred comctl32
PE 2e3540000- 2e3591000 Deferred shlwapi
PE 2e8f10000- 2e9028000 Deferred ole32
PE 2edf00000- 2ee0e5000 Deferred dxgi
PE 2f1fa0000- 2f1fad000 Deferred version
PE 2f7230000- 2f725d000 Deferred uxtheme
PE 2fe110000- 2fe11a000 Deferred api-ms-win-crt-multibyte-l1-1-0
PE 30a2c0000- 30a2c9000 Deferred api-ms-win-crt-stdio-l1-1-0
PE 30c980000- 30c988000 Deferred api-ms-win-core-synch-l1-2-0
PE 3126f0000- 312709000 Deferred shcore
PE 316370000- 31637b000 Deferred psapi
PE 327020000- 327072000 Deferred combase
PE 32a700000- 32a729000 Deferred sechost
PE 330260000- 33029f000 Deferred advapi32
PE 33b9e0000- 33b9ed000 Deferred powrprof
PE 33ea00000- 33ea09000 Deferred api-ms-win-crt-string-l1-1-0
PE 344840000- 344848000 Deferred api-ms-win-crt-filesystem-l1-1-0
PE 350a30000- 350a39000 Deferred api-ms-win-crt-convert-l1-1-0
PE 355100000- 355107000 Deferred api-ms-win-crt-locale-l1-1-0
PE 359050000- 35931b000 Deferred d3d11
PE 360a80000- 360a8a000 Deferred api-ms-win-crt-math-l1-1-0
PE 3785e0000- 3785ec000 Deferred vulkan-1
PE 39b510000- 39b518000 Deferred api-ms-win-crt-heap-l1-1-0
PE 3a0440000- 3a04c0000 Deferred wininet
PE 3af670000- 3af728000 Deferred ucrtbase
PE 3afd00000- 3afd1a000 Deferred imm32
PE 3b8f00000- 3b8fb7000 Deferred winmm
PE 3be590000- 3be5f0000 Deferred dbghelp
PE 7f4bdc650000- 7f4bdc654000 Deferred winevulkan
PE 7f4bdece0000- 7f4bdece3000 Deferred lsteamclient
PE 7f4be0190000- 7f4be01ab000 Deferred wldap32
PE 7f4be01d0000- 7f4be01d4000 Deferred iphlpapi
PE 7f4be0200000- 7f4be0204000 Deferred winex11
PE 7f4be0940000- 7f4be094b000 Deferred dinput8
PE 7f4be0e10000- 7f4be0e14000 Deferred ws2_32
PE 7f4be0f60000- 7f4be1837000 Deferred shell32
Threads:
process tid prio (all id:s are in hex)
00000020 steam.exe
00000024 0
000000b8 0
00000030 services.exe
00000034 0
00000038 0
00000044 0
00000048 0
00000054 0
00000064 0
0000007c 0
00000088 0
000000ac 0
000000e4 0
000000e8 0
0000003c winedevice.exe
00000040 0
0000004c 0
00000050 0
00000058 0
0000005c plugplay.exe
00000060 0
00000068 0
0000006c 0
00000070 0
00000090 0
00000094 0
00000074 winedevice.exe
00000078 0
00000080 0
00000084 0
0000008c 0
00000098 0
0000009c 0
000000a0 0
000000a4 svchost.exe
000000a8 0
000000b0 0
000000b4 0
000000bc explorer.exe
000000c0 0
000000c8 0
000000cc 0
000000d4 rpcss.exe
000000d8 0
000000ec 0
000000f0 0
000000f4 0
000000f8 0
000000fc 0
00000100 0
0000010c TEKKEN 7.exe
00000110 0
00000114 (D) Z:\games\steamapps\common\TEKKEN 7\TekkenGame\Binaries\Win64\TekkenGame-Win64-Shipping.exe
00000118 0
0000011c -1 <==
00000120 -1
0000012c 0
System information:
Wine build: wine-6.3
Platform: x86_64
Version: Windows 10
Host system: Linux
Host version: 5.13.1-178-tkg-bmq
7575.431:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 0000000205950000: builtin
7575.431:010c:0110:fixme:kernelbase:AppPolicyGetProcessTerminationMethod FFFFFFFFFFFFFFFA, 0000000000A0FD70
7576.307:005c:0094:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x265fd8c,4,(nil))
7576.434:00d4:00fc:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x263fe2c,4,(nil))
7577.435:00d4:00f4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a1fe2c,4,(nil))
7577.435:0030:00ac:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x386fe2c,4,(nil))
7577.435:00d4:00f8:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fe2c,4,(nil))
7577.436:005c:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x204fe2c,4,(nil))
7577.436:005c:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1a3fe2c,4,(nil))
7577.436:0074:00a0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2e8fe2c,4,(nil))
7577.436:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01236E ip=000000007B01236E tid=0084
7577.436:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
7577.436:0074:0084:trace:seh:dispatch_exception rax=000000007b012320 rbx=000000000162f578 rcx=000000000162f2a0 rdx=0000000000000000
7577.436:0074:0084:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000050 rsp=000000000162f280
7577.436:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
7577.436:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
7577.436:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016a0050 r14=0000000000000000 r15=00000000016a0050
7577.436:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
7577.436:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
7577.436:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=6ba flags=0
7577.436:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7577.436:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 000000000162F280
7577.436:0074:0084:trace:seh:dump_unwind_info **** func 12320-123a7
7577.436:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7577.436:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7577.436:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
7577.436:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
7577.436:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F360
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE98A4 rsp 000000000162F390
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2EAE rsp 000000000162F3E0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
7577.437:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
7577.437:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
7577.437:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E7C0, dispatch=000000000162E690)
7577.437:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
7577.437:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
7577.437:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F2A0, frame=000000000162F770 context=000000000162E7C0, dispatch=000000000162E690)
7577.437:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ac72
7577.437:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e090 rdx=00000000279c403a
7577.437:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162eda0 rdi=000000000162e7c0 rbp=000000000162db40 rsp=000000000162d9c0
7577.437:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f2a0 r9=00000000279c4070 r10=000000000162e470 r11=0000000000026590
7577.437:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f2a0 r13=000000000162e090 r14=000000000162f770 r15=000000000162f2a0
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AC72 rsp 000000000162D9C0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5ac20-5b52e
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8398C flags 0 prolog 0x13 bytes function 000000007BC5AC20-000000007BC5B52E
7577.437:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B54F rsp 000000000162E060
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5b530-5b558
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839A4 flags 0 prolog 0x7 bytes function 000000007BC5B530-000000007BC5B558
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E570
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
7577.437:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E5A0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5D0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A1AF rsp 000000000162E620
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 59ed0-5a421
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83948 flags 0 prolog 0x13 bytes function 000000007BC59ED0-000000007BC5A421
7577.437:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A737 rsp 000000000162ECE0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5a430-5a93f
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83960 flags 0 prolog 0x10 bytes function 000000007BC5A430-000000007BC5A93F
7577.437:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583B4 rsp 000000000162ED80
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5834c-583c1
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838B0 flags 0 prolog 0x7 bytes function 000000007BC5834C-000000007BC583C1
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 000000000162F280
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 12320-123a7
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7577.437:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F360
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE98A4 rsp 000000000162F390
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 97b0-98a5
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B43340 flags 0 prolog 0x6 bytes function 0000000231AE97B0-0000000231AE98A5
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rsi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2EAE rsp 000000000162F3E0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
7577.437:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
7577.437:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
7577.437:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F2A0, frame=000000000162F450 context=000000000162E090, dispatch=000000000162DA50)
7577.437:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
7577.437:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
7577.437:0074:0084:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B01236E ip=000000007B01236E tid=0084
7577.437:0074:0084:warn:seh:dispatch_exception unknown exception (code=6ba) raised
7577.437:0074:0084:trace:seh:dispatch_exception rax=000000007b012320 rbx=000000000162f578 rcx=000000000162f290 rdx=0000000000000000
7577.437:0074:0084:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=0000000001660230 rbp=0000000000000050 rsp=000000000162f270
7577.437:0074:0084:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000c33c3cc3 r11=00000000a55a5aa5
7577.437:0074:0084:trace:seh:dispatch_exception r12=000000000162f578 r13=00000000016a0050 r14=0000000000000000 r15=00000000016a0050
7577.437:0074:0084:trace:seh:call_vectored_handlers calling handler at 00000002279AD540 code=6ba flags=0
7577.437:0074:0084:trace:seh:call_vectored_handlers handler at 00000002279AD540 returned 0
7577.437:0074:0084:trace:seh:call_vectored_handlers calling handler at 000000007B00C660 code=6ba flags=0
7577.437:0074:0084:trace:seh:call_vectored_handlers handler at 000000007B00C660 returned 0
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 000000007B01236E rsp 000000000162F270
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 12320-123a7
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7577.437:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231B22812 rsp 000000000162F350
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 0000000231AE9736 rsp 000000000162F380
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279C2DED rsp 000000000162F3E0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
7577.437:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
7577.437:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F450 rsp 000000000162F740 handler 00000002279C27B0
7577.437:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E7B0, dispatch=000000000162E680)
7577.437:0074:0084:trace:seh:call_teb_handler handler at 00000002279C27B0 returned 1
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 1 rip 00000002279BAD65 rsp 000000000162F740
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
7577.437:0074:0084:trace:seh:call_stack_handlers found wine frame 000000000162F770 rsp 000000000162F8B0 handler 00000002279C40A0
7577.437:0074:0084:trace:seh:call_teb_handler calling TEB handler 00000002279C40A0 (rec=000000000162F290, frame=000000000162F770 context=000000000162E7B0, dispatch=000000000162E680)
7577.437:0074:0084:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=000000000162F770 target_ip=00000002279C403A rip=000000007bc5ac72
7577.437:0074:0084:trace:seh:RtlUnwindEx rax=000000003ffc0000 rbx=000000000162f450 rcx=000000000162e080 rdx=00000000279c403a
7577.437:0074:0084:trace:seh:RtlUnwindEx rsi=000000000162ed90 rdi=000000000162e7b0 rbp=000000000162db30 rsp=000000000162d9b0
7577.437:0074:0084:trace:seh:RtlUnwindEx r8=000000000162f290 r9=00000000279c4070 r10=000000000162e276 r11=0000000000000293
7577.437:0074:0084:trace:seh:RtlUnwindEx r12=000000000162f290 r13=000000000162e080 r14=000000000162f770 r15=000000000162f290
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5AC72 rsp 000000000162D9B0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5ac20-5b52e
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC8398C flags 0 prolog 0x13 bytes function 000000007BC5AC20-000000007BC5B52E
7577.437:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5B54F rsp 000000000162E050
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5b530-5b558
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC839A4 flags 0 prolog 0x7 bytes function 000000007BC5B530-000000007BC5B558
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C403A rsp 000000000162E560
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 24020-2403c
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F68 flags 0 prolog 0x8 bytes function 00000002279C4020-00000002279C403C
7577.437:0074:0084:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C4069 rsp 000000000162E590
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 24040-2406a
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F74 flags 0 prolog 0x4 bytes function 00000002279C4040-00000002279C406A
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C40F4 rsp 000000000162E5C0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 240a0-240f5
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4F84 flags 0 prolog 0xa bytes function 00000002279C40A0-00000002279C40F5
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r14
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A1AF rsp 000000000162E610
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 59ed0-5a421
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83948 flags 0 prolog 0x13 bytes function 000000007BC59ED0-000000007BC5A421
7577.437:0074:0084:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC5A737 rsp 000000000162ECD0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5a430-5a93f
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC83960 flags 0 prolog 0x10 bytes function 000000007BC5A430-000000007BC5A93F
7577.437:0074:0084:trace:seh:dump_unwind_info 0x10: subq $0x58,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xc: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0xb: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rbp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %r13
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r14
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r15
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007BC583B4 rsp 000000000162ED70
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 5834c-583c1
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007BC838B0 flags 0 prolog 0x7 bytes function 000000007BC5834C-000000007BC583C1
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 000000007B01236E rsp 000000000162F270
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 12320-123a7
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 000000007B0A5480 flags 0 prolog 0x11 bytes function 000000007B012320-000000007B0123A7
7577.437:0074:0084:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0xa: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x9: pushq %rdi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231B22812 rsp 000000000162F350
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 42800-42847
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B453C0 flags 0 prolog 0x4 bytes function 0000000231B22800-0000000231B22847
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 0000000231AE9736 rsp 000000000162F380
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 96b0-9737
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 0000000231B4332C flags 0 prolog 0x7 bytes function 0000000231AE96B0-0000000231AE9737
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x3: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rdi
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279C2DED rsp 000000000162F3E0
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 22cf0-22f10
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4EC0 flags 0 prolog 0xe bytes function 00000002279C2CF0-00000002279C2F10
7577.437:0074:0084:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x7: pushq %rbx
7577.437:0074:0084:trace:seh:dump_unwind_info 0x6: pushq %rsi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x5: pushq %rdi
7577.437:0074:0084:trace:seh:dump_unwind_info 0x4: pushq %r12
7577.437:0074:0084:trace:seh:dump_unwind_info 0x2: pushq %r13
7577.437:0074:0084:trace:seh:RtlUnwindEx found builtin frame 000000000162F450 handler 00000002279C27B0
7577.437:0074:0084:trace:seh:call_teb_unwind_handler calling TEB handler 00000002279C27B0 (rec=000000000162F290, frame=000000000162F450 context=000000000162E080, dispatch=000000000162DA40)
7577.437:0074:0084:trace:seh:call_teb_unwind_handler handler at 00000002279C27B0 returned 1
7577.437:0074:0084:trace:seh:RtlVirtualUnwind type 2 rip 00000002279BAD65 rsp 000000000162F740
7577.437:0074:0084:trace:seh:dump_unwind_info **** func 1ac90-1ad76
7577.437:0074:0084:trace:seh:dump_unwind_info unwind info at 00000002279D4A70 flags 0 prolog 0x8 bytes function 00000002279BAC90-00000002279BAD76
7577.437:0074:0084:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
7577.437:0074:0084:trace:seh:dump_unwind_info 0x1: pushq %rbx
7577.437:0074:0084:trace:seh:RtlRestoreContext returning to 00000002279C403A stack 000000000162F740
7577.437:0074:008c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x1c5fe2c,4,(nil))
7577.437:0074:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x226fe2c,4,(nil))
7577.438:0074:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x287fe2c,4,(nil))
7577.451:00d4:00f0:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x140fe2c,4,(nil))
7577.451:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
7577.451:005c:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x142fe2c,4,(nil))
7577.451:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
7577.452:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
7577.452:0074:0084:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
7577.453:0074:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x162fe2c,4,(nil))
7577.537:0030:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x263fe2c,4,(nil))
7577.537:0030:0138:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x52bfe2c,4,(nil))
7577.537:0030:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fe2c,4,(nil))
7577.537:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x140fe2c,4,(nil))
7577.537:0030:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x2c4fe2c,4,(nil))
7577.537:0030:0134:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x3e7fe2c,4,(nil))
7577.537:0030:0088:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x325fe2c,4,(nil))
7577.537:0030:00e4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x448fe2c,4,(nil))
7577.537:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xdffe2c,4,(nil))
pid 366113 != 366112, skipping destruction (fork without exec?)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment