======================
Proton: 1722141596 GE-Proton9-10-18-g3763cd3a
SteamGameId: 311210
Command: ['/home/yui/.local/share/Steam/steamapps/common/Call of Duty Black Ops III/BlackOps3.exe']
Options: {'forcelgadd'}
depot: 0.20240618.92328
pressure-vessel: 0.20240610.0 scout
scripts: 0.20240610.0
sniper: 0.20240618.92328 sniper 0.20240618.92328
Kernel: Linux 6.10.1 #1-NixOS SMP PREEMPT_DYNAMIC Wed Jul 24 13:54:07 UTC 2024 x86_64
Language: LC_ALL None, LC_MESSAGES None, LC_CTYPE None
Effective WINEDEBUG: +timestamp,+pid,+tid,+seh,+unwind,+threadname,+debugstr,+loaddll,+mscoree
======================
wine: using kernel write watches, use_kernel_writewatch 1.
fsync: up and running.
wine: using kernel write watches, use_kernel_writewatch 1.
17578.463:0028:002c:trace:seh:install_bpf Installing seccomp filters.
17578.463:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
17578.465:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\wineboot.exe" at 0000000140000000: builtin
17578.466:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17578.466:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17578.468:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17578.470:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17578.470:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17578.470:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17578.470:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\ws2_32.dll" at 00006FFFFF9A0000: builtin
17578.471:0028:002c:fixme:winediag:loader_init wine-staging 9.0 is a testing version containing experimental patches.
17578.471:0028:002c:fixme:winediag:loader_init Please mention your exact version when filing bug reports on winehq.org.
wine: using kernel write watches, use_kernel_writewatch 1.
17578.518:0030:0034:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17578.518:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
17578.519:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\services.exe" at 0000000140000000: builtin
17578.520:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17578.520:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17578.522:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17578.523:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17578.523:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17578.523:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17578.524:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17578.525:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\setupapi.dll" at 00006FFFFF890000: builtin
17578.525:0030:0034:trace:loaddll:build_module Loaded L"C:\windows\system32\userenv.dll" at 00006FFFFF870000: builtin
17578.548:0030:0038:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
wine: using kernel write watches, use_kernel_writewatch 1.
17578.581:003c:0040:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17578.581:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
17578.582:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\winedevice.exe" at 0000000140000000: builtin
17578.583:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17578.583:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17578.585:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17578.586:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17578.586:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17578.586:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17578.587:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\ntoskrnl.exe" at 00006FFFFF800000: builtin
17578.599:003c:0040:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17578.600:0030:0044:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17578.601:0030:0048:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
17578.605:003c:0050:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
17578.606:003c:0050:trace:loaddll:build_module Loaded L"C:\windows\system32\win32k.sys" at 00006FFFFF7E0000: builtin
17578.607:003c:0050:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\dxgkrnl.sys" at 00006FFFFF7C0000: builtin
17578.607:003c:0050:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\dxgmms1.sys" at 00006FFFFF7A0000: builtin
17578.609:0030:0054:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17578.613:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\mountmgr.sys" at 00006FFFFF780000: builtin
17578.616:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\setupapi.dll" at 00006FFFFF890000: builtin
17578.621:003c:0058:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17578.621:003c:0058:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17578.621:003c:0058:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
wine: using kernel write watches, use_kernel_writewatch 1.
17578.646:0064:0068:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17578.646:0064:0068:trace:seh:install_bpf Seccomp filters already installed.
17578.647:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\winedevice.exe" at 0000000140000000: builtin
17578.648:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17578.648:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17578.650:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17578.651:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17578.651:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17578.651:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17578.652:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\ntoskrnl.exe" at 00006FFFFF800000: builtin
17578.663:0064:0068:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17578.664:0030:006c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17578.668:0064:0074:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
17578.669:0064:0074:trace:loaddll:build_module Loaded L"C:\windows\system32\win32k.sys" at 00006FFFFF7E0000: builtin
17578.670:0064:0074:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\dxgkrnl.sys" at 00006FFFFF7C0000: builtin
17578.671:0064:0074:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\dxgmms1.sys" at 00006FFFFF7A0000: builtin
17578.672:0030:0078:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17578.676:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\wineusb.sys" at 00006FFFFF4C0000: builtin
17578.677:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\setupapi.dll" at 00006FFFFF890000: builtin
17578.688:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\hidparse.sys" at 00006FFFFF470000: builtin
17578.688:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\winebus.sys" at 00006FFFFF4A0000: builtin
17578.690:0064:007c:fixme:wineusb:add_usb_device Interface 0 has 2 alternate settings; using the first one.
17578.691:0064:007c:fixme:wineusb:query_id Unhandled ID query type 0x5.
17578.693:0064:0070:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
17578.700:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17578.700:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17578.700:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
17578.700:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\hidclass.sys" at 00006FFFFF430000: builtin
17578.700:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\winehid.sys" at 00006FFFFF450000: builtin
17578.825:003c:0058:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17578.833:0064:0070:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17578.835:0064:0070:fixme:hid:handle_IRP_MN_QUERY_ID Unhandled type 00000005
17578.838:0064:0070:trace:seh:dispatch_exception code=6ba flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17578.838:0064:0070:warn:seh:dispatch_exception RPC_S_SERVER_UNAVAILABLE exception (code=6ba) raised
17578.838:0064:0070:trace:seh:dispatch_exception rax=0000000000a2d7d0 rbx=0000000000a2dab8 rcx=0000000000a2d7d0 rdx=0000000000000000
17578.838:0064:0070:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000007f5b70 rbp=0000000000a2d8a0 rsp=0000000000a2d7b0
17578.838:0064:0070:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000007fa990 r11=0000000000000015
17578.838:0064:0070:trace:seh:dispatch_exception r12=0000000000a2dab8 r13=0000000000e33140 r14=0000000000e33140 r15=00000000000000b8
17578.838:0064:0070:trace:seh:call_vectored_handlers calling handler at 00006FFFFF825A00 code=6ba flags=0
17578.838:0064:0070:trace:seh:call_vectored_handlers handler at 00006FFFFF825A00 returned 0
17578.838:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffffc1ce87 rsp a2d7b0
17578.838:0064:0070:trace:unwind:dump_unwind_info * func ce18-ce8f
17578.838:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFCC9C9C flags 0 prolog 0xf bytes function 00006FFFFFC1CE18-00006FFFFFC1CE8F
17578.838:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
17578.838:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
17578.838:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff9407e6 rsp a2d880
17578.838:0064:0070:trace:unwind:dump_unwind_info func 307d0-3081b
17578.838:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF98582C flags 0 prolog 0x8 bytes function 00006FFFFF9407D0-00006FFFFF94081B
17578.838:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.838:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff92d086 rsp a2d8b0
17578.838:0064:0070:trace:unwind:dump_unwind_info * func 1cff0-1d087
17578.838:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF982F9C flags 0 prolog 0xd bytes function 00006FFFFF92CFF0-00006FFFFF92D087
17578.838:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17578.838:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.838:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff824a72 rsp a2d920
17578.838:0064:0070:trace:unwind:dump_unwind_info func 24980-24b89
17578.838:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843A14 flags 0 prolog 0x17 bytes function 00006FFFFF824980-00006FFFFF824B89
17578.838:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
17578.838:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
17578.838:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.838:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000A2D990 rsp 0000000000A2DC90 handler 00006FFFFF81EB00
17578.838:0064:0070:trace:seh:call_teb_handler calling TEB handler 00006FFFFF81EB00 (rec=0000000000A2D7D0, frame=0000000000A2D990 context=0000000000A2CD00, dispatch=0000000000A2CBD0)
17578.838:0064:0070:trace:seh:call_teb_handler handler at 00006FFFFF81EB00 returned 1
17578.838:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff825430 rsp a2dc90fo at 00006FFFFF982F9C flags 0 prolog 0xd bytes function 00006FFFFF92CFF0-00006FFFFF92D087
17578.847:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17578.847:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.847:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff824a72 rsp a2d920
17578.847:0064:0070:trace:unwind:dump_unwind_info * func 24980-24b89
17578.847:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843A14 flags 0 prolog 0x17 bytes function 00006FFFFF824980-00006FFFFF824B89
17578.847:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
17578.847:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.847:0064:0070:trace:unwind:RtlUnwindEx found builtin frame 0000000000A2D990 handler 00006FFFFF81EB00
17578.847:0064:0070:trace:unwind:call_teb_unwind_handler calling TEB handler 00006FFFFF81EB00 (rec=0000000000A2D7D0, frame=0000000000A2D990 context=0000000000A2C5C0, dispatch=0000000000A2BF80)
17578.847:0064:0070:trace:unwind:call_teb_unwind_handler handler at 00006FFFFF81EB00 returned 1
17578.847:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff825430 rsp a2dc90
17578.847:0064:0070:trace:unwind:dump_unwind_info func 25360-25441
17578.847:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843410 flags 0 prolog 0x11 bytes function 00006FFFFF825360-00006FFFFF825441
17578.847:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
17578.847:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.847:0064:0070:trace:seh:RtlRestoreContext returning to 00006FFFFF80D98A stack 0000000000A2DC90
17578.848:0064:0070:trace:seh:dispatch_exception code=6ba flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17578.848:0064:0070:warn:seh:dispatch_exception RPC_S_SERVER_UNAVAILABLE exception (code=6ba) raised
17578.848:0064:0070:trace:seh:dispatch_exception rax=0000000000a2d7d0 rbx=0000000000a2dab8 rcx=0000000000a2d7d0 rdx=0000000000000000
17578.848:0064:0070:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000007f5b70 rbp=0000000000a2d8a0 rsp=0000000000a2d7b0
17578.848:0064:0070:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000007fc4a0 r11=0000000000000016
17578.848:0064:0070:trace:seh:dispatch_exception r12=0000000000a2dab8 r13=0000000000e33aa0 r14=0000000000e33aa0 r15=00000000000000b8
17578.848:0064:0070:trace:seh:call_vectored_handlers calling handler at 00006FFFFF825A00 code=6ba flags=0
17578.848:0064:0070:trace:seh:call_vectored_handlers handler at 00006FFFFF825A00 returned 0
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffffc1ce87 rsp a2d7b0
17578.848:0064:0070:trace:unwind:dump_unwind_info * func ce18-ce8f
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFCC9C9C flags 0 prolog 0xf bytes function 00006FFFFFC1CE18-00006FFFFFC1CE8F
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff9407e6 rsp a2d880
17578.848:0064:0070:trace:unwind:dump_unwind_info func 307d0-3081b
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF98582C flags 0 prolog 0x8 bytes function 00006FFFFF9407D0-00006FFFFF94081B
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff92d086 rsp a2d8b0
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 1cff0-1d087
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF982F9C flags 0 prolog 0xd bytes function 00006FFFFF92CFF0-00006FFFFF92D087
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff824a72 rsp a2d920
17578.848:0064:0070:trace:unwind:dump_unwind_info func 24980-24b89
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843A14 flags 0 prolog 0x17 bytes function 00006FFFFF824980-00006FFFFF824B89
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000A2D990 rsp 0000000000A2DC90 handler 00006FFFFF81EB00
17578.848:0064:0070:trace:seh:call_teb_handler calling TEB handler 00006FFFFF81EB00 (rec=0000000000A2D7D0, frame=0000000000A2D990 context=0000000000A2CD00, dispatch=0000000000A2CBD0)
17578.848:0064:0070:trace:seh:call_teb_handler handler at 00006FFFFF81EB00 returned 1
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff825430 rsp a2dc90
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 25360-25441
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843410 flags 0 prolog 0x11 bytes function 00006FFFFF825360-00006FFFFF825441
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:seh:call_stack_handlers found wine frame 0000000000A2DCC0 rsp 0000000000A2DE10 handler 00006FFFFF81EDB0
17578.848:0064:0070:trace:seh:call_teb_handler calling TEB handler 00006FFFFF81EDB0 (rec=0000000000A2D7D0, frame=0000000000A2DCC0 context=0000000000A2CD00, dispatch=0000000000A2CBD0)
17578.848:0064:0070:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=0000000000A2DCC0 target_ip=00006FFFFF80D98A rip=00006ffffff734c5
17578.848:0064:0070:trace:unwind:RtlUnwindEx rax=000000007ffb0000 rbx=0000000000a2d990 rcx=0000000000a2c5c0 rdx=00006fffff80d98a
17578.848:0064:0070:trace:unwind:RtlUnwindEx rsi=0000000000a2c070 rdi=0000000000a2d7d0 rbp=0000000000a2bf80 rsp=0000000000a2bf00
17578.848:0064:0070:trace:unwind:RtlUnwindEx r8=0000000000a2d7d0 r9=00006fffff8259d0 r10=0000000000000000 r11=0000000000000000
17578.848:0064:0070:trace:unwind:RtlUnwindEx r12=0000000000a2d7d0 r13=0000000000a2c5c0 r14=0000000000a2dcc0 r15=00006ffffffae2c0
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff734c5 rsp a2bf00
17578.848:0064:0070:trace:unwind:dump_unwind_info func 33470-33bd8
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7E2C flags 0 prolog 0x1b bytes function 00006FFFFFF73470-00006FFFFFF73BD8
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff73457 rsp a2c590
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 33430-33461
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7E48 flags 0 prolog 0x10 bytes function 00006FFFFFF73430-00006FFFFFF73461
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff80d98a rsp a2caa0
17578.848:0064:0070:trace:unwind:dump_unwind_info func d970-d98c
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843AF8 flags 0 prolog 0x8 bytes function 00006FFFFF80D970-00006FFFFF80D98C
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff8259cd rsp a2cad0
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 259a0-259ce
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843B04 flags 0 prolog 0x8 bytes function 00006FFFFF8259A0-00006FFFFF8259CE
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff81ee08 rsp a2cb00
17578.848:0064:0070:trace:unwind:dump_unwind_info func 1edb0-1ee09
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843B1C flags 0 prolog 0x10 bytes function 00006FFFFF81EDB0-00006FFFFF81EE09
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r12
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r13
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r14
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff81dad rsp a2cb60
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 41ae0-41fd1
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7DC4 flags 0 prolog 0x1b bytes function 00006FFFFFF81AE0-00006FFFFFF81FD1
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff84557 rsp a2d220
17578.848:0064:0070:trace:unwind:dump_unwind_info func 44230-4482c
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7DE0 flags 0 prolog 0x15 bytes function 00006FFFFFF84230-00006FFFFFF8482C
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xc: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xb: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xa: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x9: pushq %r12
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %r13
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r14
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r15
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff4f3db rsp a2d2b0
17578.848:0064:0070:trace:unwind:dump_unwind_info * func f36c-f3e8
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7CF8 flags 0 prolog 0x7 bytes function 00006FFFFFF4F36C-00006FFFFFF4F3E8
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffffc1ce87 rsp a2d7b0
17578.848:0064:0070:trace:unwind:dump_unwind_info func ce18-ce8f
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFFCC9C9C flags 0 prolog 0xf bytes function 00006FFFFFC1CE18-00006FFFFFC1CE8F
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind inside epilog.
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff9407e6 rsp a2d880
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 307d0-3081b
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF98582C flags 0 prolog 0x8 bytes function 00006FFFFF9407D0-00006FFFFF94081B
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff92d086 rsp a2d8b0
17578.848:0064:0070:trace:unwind:dump_unwind_info func 1cff0-1d087
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF982F9C flags 0 prolog 0xd bytes function 00006FFFFF92CFF0-00006FFFFF92D087
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff824a72 rsp a2d920
17578.848:0064:0070:trace:unwind:dump_unwind_info * func 24980-24b89
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843A14 flags 0 prolog 0x17 bytes function 00006FFFFF824980-00006FFFFF824B89
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x17: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0xf: subq $0x338,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x8: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x7: pushq %rsi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x6: pushq %rdi
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x5: pushq %r12
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x3: pushq %r13
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:unwind:RtlUnwindEx found builtin frame 0000000000A2D990 handler 00006FFFFF81EB00
17578.848:0064:0070:trace:unwind:call_teb_unwind_handler calling TEB handler 00006FFFFF81EB00 (rec=0000000000A2D7D0, frame=0000000000A2D990 context=0000000000A2C5C0, dispatch=0000000000A2BF80)
17578.848:0064:0070:trace:unwind:call_teb_unwind_handler handler at 00006FFFFF81EB00 returned 1
17578.848:0064:0070:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff825430 rsp a2dc90
17578.848:0064:0070:trace:unwind:dump_unwind_info func 25360-25441
17578.848:0064:0070:trace:unwind:dump_unwind_info unwind info at 00006FFFFF843410 flags 0 prolog 0x11 bytes function 00006FFFFF825360-00006FFFFF825441
17578.848:0064:0070:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x11: leaq 0x80(%rsp),rbp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x9: subq $0x168,%rsp
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x2: pushq %rbx
17578.848:0064:0070:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17578.848:0064:0070:trace:seh:RtlRestoreContext returning to 00006FFFFF80D98A stack 0000000000A2DC90
wine: using kernel write watches, use_kernel_writewatch 1.
17578.935:0094:0098:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17578.935:0094:0098:trace:seh:install_bpf Seccomp filters already installed.
17578.936:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\plugplay.exe" at 0000000140000000: builtin
17578.937:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17578.937:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17578.939:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17578.940:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17578.940:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17578.940:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17578.941:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17578.942:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17578.942:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17578.942:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
17579.005:0094:0098:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17579.006:0030:009c:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17579.011:0094:00a4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
17579.011:0094:00a8:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
17579.016:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\sharedgpures.sys" at 00006FFFFF3E0000: builtin
wine: using kernel write watches, use_kernel_writewatch 1.
17579.049:00ac:00b0:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17579.049:00ac:00b0:trace:seh:install_bpf Seccomp filters already installed.
17579.050:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\svchost.exe" at 0000000140000000: builtin
17579.052:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17579.052:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17579.054:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17579.055:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17579.055:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17579.055:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17579.066:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\wevtsvc.dll" at 00006FFFFF3C0000: builtin
17579.067:00ac:00b0:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17579.068:0030:00b4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17579.072:00ac:00bc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
17579.077:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\nsiproxy.sys" at 00006FFFFF3A0000: builtin
17579.085:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\dnsapi.dll" at 00006FFFFF300000: builtin
17579.086:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\nsi.dll" at 00006FFFFF2E0000: builtin
17579.086:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\ws2_32.dll" at 00006FFFFF9A0000: builtin
17579.086:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\iphlpapi.dll" at 00006FFFFF330000: builtin
17579.086:003c:004c:trace:loaddll:build_module Loaded L"C:\windows\system32\drivers\ndis.sys" at 00006FFFFF370000: builtin
17579.096:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17579.096:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
17579.096:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17579.097:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\shcore.dll" at 00006FFFFE900000: builtin
17579.097:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\shlwapi.dll" at 00006FFFFE930000: builtin
17579.097:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\shell32.dll" at 00006FFFFE990000: builtin
17579.148:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17579.151:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17579.151:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\combase.dll" at 00006FFFFE780000: builtin
17579.151:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\coml2.dll" at 00006FFFFE750000: builtin
17579.151:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\ole32.dll" at 00006FFFFE7E0000: builtin
17579.153:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\mpr.dll" at 00006FFFFE680000: builtin
17579.153:0028:002c:trace:loaddll:build_module Loaded L"C:\windows\system32\wininet.dll" at 00006FFFFE6B0000: builtin
17579.161:0020:0024:trace:loaddll:build_module Loaded L"C:\Program Files (x86)\Steam\steam.exe" at 7EA60000: builtin
17579.163:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 7BC00000: builtin
17579.163:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 7BEC0000: builtin
17579.165:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 7BAD0000: builtin
17579.167:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 7B990000: builtin
17579.167:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 7BA90000: builtin
17579.167:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 7BBA0000: builtin
17579.169:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\cabinet.dll" at 7B800000: builtin
17579.172:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 7B3E0000: builtin
17579.173:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 7B420000: builtin
17579.173:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 7B5F0000: builtin
17579.173:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 7B3B0000: builtin
17579.173:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\comctl32.dll" at 7B690000: builtin
17579.175:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\bcrypt.dll" at 7B290000: builtin
17579.175:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\crypt32.dll" at 7B2C0000: builtin
17579.176:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\dbghelp.dll" at 7B1F0000: builtin
17579.176:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\imagehlp.dll" at 7B270000: builtin
17579.177:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\mspatcha.dll" at 7B1D0000: builtin
17579.178:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\odbccp32.dll" at 7B1A0000: builtin
17579.180:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 7AF70000: builtin
17579.180:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\combase.dll" at 7B010000: builtin
17579.181:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\coml2.dll" at 7AF40000: builtin
17579.181:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\ole32.dll" at 7B070000: builtin
17579.182:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\oleaut32.dll" at 7AE10000: builtin
17579.184:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\shcore.dll" at 7A420000: builtin
17579.184:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\shlwapi.dll" at 7A450000: builtin
17579.184:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\shell32.dll" at 7A4B0000: builtin
17579.185:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\sxs.dll" at 7A400000: builtin
17579.187:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\mpr.dll" at 7A280000: builtin
17579.188:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\ws2_32.dll" at 7A240000: builtin
17579.188:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\wininet.dll" at 7A2B0000: builtin
17579.188:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\urlmon.dll" at 7A350000: builtin
17579.189:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\version.dll" at 7A220000: builtin
17579.190:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\wintrust.dll" at 7A1E0000: builtin
17579.190:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\msi.dll" at 7B830000: builtin
wine: using kernel write watches, use_kernel_writewatch 1.
17579.429:00cc:00d0:trace:seh:install_bpf Installing seccomp filters.
17579.429:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
17579.430:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\explorer.exe" at 0000000140000000: builtin
17579.431:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17579.431:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17579.434:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17579.435:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17579.435:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17579.435:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17579.436:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17579.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
17579.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17579.437:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17579.497:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17579.501:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\winex11.drv" at 00006FFFFF2B0000: builtin
DRM kernel driver 'nvidia-drm' in use. NVK requires nouveau.
DRM kernel driver 'nvidia-drm' in use. NVK requires nouveau.
DRM kernel driver 'nvidia-drm' in use. NVK requires nouveau.
DRM kernel driver 'nvidia-drm' in use. NVK requires nouveau.
17580.061:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\uxtheme.dll" at 00006FFFFF260000: builtin
17580.086:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\shcore.dll" at 00006FFFFE880000: builtin
17580.086:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\shlwapi.dll" at 00006FFFFE8B0000: builtin
17580.086:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\shell32.dll" at 00006FFFFE910000: builtin
17580.096:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\combase.dll" at 00006FFFFE700000: builtin
17580.097:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\coml2.dll" at 00006FFFFE6D0000: builtin
17580.097:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\ole32.dll" at 00006FFFFE760000: builtin
17580.098:00cc:00d8:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
17580.100:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\oleaut32.dll" at 00006FFFFE460000: builtin
17580.100:00cc:00d0:trace:loaddll:build_module Loaded L"C:\windows\system32\actxprxy.dll" at 00006FFFFE590000: builtin
17580.100:00cc:00d0:trace:seh:dispatch_exception code=6ba flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17580.100:00cc:00d0:warn:seh:dispatch_exception RPC_S_SERVER_UNAVAILABLE exception (code=6ba) raised
17580.100:00cc:00d0:trace:seh:dispatch_exception rax=000000000022e790 rbx=000000000022ea78 rcx=000000000022e790 rdx=0000000000000000
17580.100:00cc:00d0:trace:seh:dispatch_exception rsi=000000000000006c rdi=0000000000ae58b0 rbp=000000000022e860 rsp=000000000022e770
17580.100:00cc:00d0:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000ae59f0 r11=0000000000000010
17580.100:00cc:00d0:trace:seh:dispatch_exception r12=000000000022ea78 r13=0000000000ae5810 r14=0000000000ae4a20 r15=0000000000000001
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 1 rip 6fffffc1ce87 rsp 22e770
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func ce18-ce8f
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFCC9C9C flags 0 prolog 0xf bytes function 00006FFFFFC1CE18-00006FFFFFC1CE8F
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind inside epilog.
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff9407e6 rsp 22e840
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 307d0-3081b
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFF98582C flags 0 prolog 0x8 bytes function 00006FFFFF9407D0-00006FFFFF94081B
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 1 rip 6fffff92d086 rsp 22e870
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 1cff0-1d087
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFF982F9C flags 0 prolog 0xd bytes function 00006FFFFF92CFF0-00006FFFFF92D087
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x2: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffe71ea75 rsp 22e8e0
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 1e980-1ebd3
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE742600 flags 0 prolog 0x19 bytes function 00006FFFFE71E980-00006FFFFE71EBD3
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x19: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x11: subq $0x330,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xa: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x9: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x5: pushq %r13
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r14
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000022E950 rsp 000000000022EC50 handler 00006FFFFE715210
17580.100:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 00006FFFFE715210 (rec=000000000022E790, frame=000000000022E950 context=000000000022DCC0, dispatch=000000000022DB90)
17580.100:00cc:00d0:trace:seh:call_teb_handler handler at 00006FFFFE715210 returned 1
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 1 rip 6ffffe721b74 rsp 22ec50
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 21a90-21b9a
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE741C24 flags 0 prolog 0x13 bytes function 00006FFFFE721A90-00006FFFFE721B9A
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x13: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xb: subq $0x170,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:seh:call_stack_handlers found wine frame 000000000022EC90 rsp 000000000022EDE0 handler 00006FFFFE7154C0
17580.100:00cc:00d0:trace:seh:call_teb_handler calling TEB handler 00006FFFFE7154C0 (rec=000000000022E790, frame=000000000022EC90 context=000000000022DCC0, dispatch=000000000022DB90)
17580.100:00cc:00d0:trace:unwind:RtlUnwindEx code=6ba flags=2 end_frame=000000000022EC90 target_ip=00006FFFFE703EAA rip=00006ffffff734c5
17580.100:00cc:00d0:trace:unwind:RtlUnwindEx rax=000000007ffc0000 rbx=000000000022e950 rcx=000000000022d580 rdx=00006ffffe703eaa
17580.100:00cc:00d0:trace:unwind:RtlUnwindEx rsi=000000000022d030 rdi=000000000022e790 rbp=000000000022cf40 rsp=000000000022cec0
17580.100:00cc:00d0:trace:unwind:RtlUnwindEx r8=000000000022e790 r9=00006ffffe725e60 r10=0000000000000000 r11=0000000000000000
17580.100:00cc:00d0:trace:unwind:RtlUnwindEx r12=000000000022e790 r13=000000000022d580 r14=000000000022ec90 r15=00006ffffffae2c0
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff734c5 rsp 22cec0
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 33470-33bd8
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7E2C flags 0 prolog 0x1b bytes function 00006FFFFFF73470-00006FFFFFF73BD8
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x13: subq $0x648,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xc: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xb: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xa: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x9: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: pushq %r13
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x5: pushq %r14
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r15
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff73457 rsp 22d550
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 33430-33461
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7E48 flags 0 prolog 0x10 bytes function 00006FFFFFF73430-00006FFFFFF73461
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x10: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x500,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffe703eaa rsp 22da60
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 3e90-3eac
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE742718 flags 0 prolog 0x8 bytes function 00006FFFFE703E90-00006FFFFE703EAC
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffe725e5d rsp 22da90
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 25e30-25e5e
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE742724 flags 0 prolog 0x8 bytes function 00006FFFFE725E30-00006FFFFE725E5E
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffe715518 rsp 22dac0
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 154c0-15519
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE74273C flags 0 prolog 0x10 bytes function 00006FFFFE7154C0-00006FFFFE715519
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x30(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x10: leaq 0x30(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xb: subq $0x38,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x5: pushq %r13
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r14
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff81dad rsp 22db20
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 41ae0-41fd1
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7DC4 flags 0 prolog 0x1b bytes function 00006FFFFFF81AE0-00006FFFFFF81FD1
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1b: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x13: subq $0x678,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xc: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xb: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xa: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x9: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: pushq %r13
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x5: pushq %r14
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r15
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff84557 rsp 22e1e0
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 44230-4482c
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7DE0 flags 0 prolog 0x15 bytes function 00006FFFFFF84230-00006FFFFFF8482C
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x15: leaq 0x40(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x10: subq $0x48,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xc: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xb: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xa: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x9: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: pushq %r13
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x5: pushq %r14
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r15
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffff4f3db rsp 22e270
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func f36c-f3e8
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFFD7CF8 flags 0 prolog 0x7 bytes function 00006FFFFFF4F36C-00006FFFFFF4F3E8
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: subq $0x4f8,%rsp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6fffffc1ce87 rsp 22e770
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func ce18-ce8f
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFFCC9C9C flags 0 prolog 0xf bytes function 00006FFFFFC1CE18-00006FFFFFC1CE8F
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind inside epilog.
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff9407e6 rsp 22e840
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 307d0-3081b
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFF98582C flags 0 prolog 0x8 bytes function 00006FFFFF9407D0-00006FFFFF94081B
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x20,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6fffff92d086 rsp 22e870
17580.100:00cc:00d0:trace:unwind:dump_unwind_info func 1cff0-1d087
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFF982F9C flags 0 prolog 0xd bytes function 00006FFFFF92CFF0-00006FFFFF92D087
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x40(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xd: leaq 0x40(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: subq $0x48,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x2: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffe71ea75 rsp 22e8e0
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 1e980-1ebd3
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE742600 flags 0 prolog 0x19 bytes function 00006FFFFE71E980-00006FFFFE71EBD3
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x19: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x11: subq $0x330,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xa: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x9: pushq %rsi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x8: pushq %rdi
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x7: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x5: pushq %r13
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r14
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:unwind:RtlUnwindEx found builtin frame 000000000022E950 handler 00006FFFFE715210
17580.100:00cc:00d0:trace:unwind:call_teb_unwind_handler calling TEB handler 00006FFFFE715210 (rec=000000000022E790, frame=000000000022E950 context=000000000022D580, dispatch=000000000022CF40)
17580.100:00cc:00d0:trace:unwind:call_teb_unwind_handler handler at 00006FFFFE715210 returned 1
17580.100:00cc:00d0:trace:unwind:RtlVirtualUnwind type 2 rip 6ffffe721b74 rsp 22ec50
17580.100:00cc:00d0:trace:unwind:dump_unwind_info * func 21a90-21b9a
17580.100:00cc:00d0:trace:unwind:dump_unwind_info unwind info at 00006FFFFE741C24 flags 0 prolog 0x13 bytes function 00006FFFFE721A90-00006FFFFE721B9A
17580.100:00cc:00d0:trace:unwind:dump_unwind_info frame register rbp offset 0x80(%rsp)
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x13: leaq 0x80(%rsp),rbp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0xb: subq $0x170,%rsp
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x4: pushq %rbx
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x3: pushq %r12
17580.100:00cc:00d0:trace:unwind:dump_unwind_info 0x1: pushq %rbp
17580.100:00cc:00d0:trace:seh:RtlRestoreContext returning to 00006FFFFE703EAA stack 000000000022EC50
17580.101:0030:00dc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
wine: using kernel write watches, use_kernel_writewatch 1.
17580.132:00e0:00e4:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17580.132:00e0:00e4:trace:seh:install_bpf Seccomp filters already installed.
17580.133:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcss.exe" at 0000000140000000: builtin
17580.134:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17580.134:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17580.136:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17580.137:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17580.137:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17580.137:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17580.138:00e0:00e4:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17580.150:0030:00e8:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17580.165:0030:00ec:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
17580.168:00e0:00f4:warn:threadname:NtSetInformationThread Thread renamed to L"wine_sechost_service"
17580.169:00e0:00f8:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
17580.170:00e0:00fc:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
17580.174:00e0:0100:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_io"
17580.176:00e0:0104:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
wine: using kernel write watches, use_kernel_writewatch 1.
17580.192:0108:010c:trace:seh:sigsys_handler SIGSYS, rax 0xffff, rip 0x600000000005.
17580.192:0108:010c:trace:seh:install_bpf Seccomp filters already installed.
17580.193:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\tabtip.exe" at 0000000140000000: builtin
17580.194:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17580.194:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17580.197:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17580.198:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17580.198:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17580.198:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17580.200:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17580.200:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
17580.200:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17580.201:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17580.201:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\combase.dll" at 00006FFFFE700000: builtin
17580.202:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\coml2.dll" at 00006FFFFE6D0000: builtin
17580.202:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\ole32.dll" at 00006FFFFE760000: builtin
17580.202:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\oleaut32.dll" at 00006FFFFE460000: builtin
17580.204:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\shcore.dll" at 00006FFFFE880000: builtin
17580.204:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\shlwapi.dll" at 00006FFFFE8B0000: builtin
17580.204:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\shell32.dll" at 00006FFFFE910000: builtin
17580.264:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17580.266:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\winex11.drv" at 7A1B0000: builtin
17580.266:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\oleacc.dll" at 00006FFFFE380000: builtin
17580.266:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\uiautomationcore.dll" at 00006FFFFE3E0000: builtin
17580.267:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\winex11.drv" at 00006FFFFF2B0000: builtin
17580.287:0020:0024:trace:loaddll:build_module Loaded L"C:\windows\system32\uxtheme.dll" at 7A160000: builtin
17580.297:0108:010c:trace:loaddll:build_module Loaded L"C:\windows\system32\uxtheme.dll" at 00006FFFFF260000: builtin
17580.305:0108:010c:fixme:oleacc:find_class_data unhandled window class: L"#32769"
17580.305:0108:010c:fixme:uiautomation:uia_get_providers_for_hwnd Override provider callback currently unimplemented.
17580.305:0108:010c:fixme:uiautomation:default_uia_provider_callback Default ProviderType_NonClientArea provider unimplemented.
17580.306:0108:0118:warn:threadname:NtSetInformationThread Thread renamed to L"wine_rpcrt4_server"
Setting breakpad minidump AppID = 311210
Steam_SetMinidumpSteamID: Caching Steam ID: 76561198037195796 [API loaded no]
17580.310:0108:010c:fixme:oleacc:find_class_data unhandled window class: L"#32769"
17580.312:0108:010c:fixme:uiautomation:base_hwnd_fragment_get_FragmentRoot 0000000000AE4618, 000000000022F9D0: stub!
17580.312:0108:010c:fixme:uiautomation:base_hwnd_fragment_GetEmbeddedFragmentRoots 0000000000AE4618, 000000000022F9E0: stub!
17580.313:0020:0024:fixme:steam:setup_steam_registry Game language "english", defaulting LC_CTYPE / LC_MESSAGES to en_US.UTF-8.
wine: using kernel write watches, use_kernel_writewatch 1.
17580.563:0124:0128:trace:seh:install_bpf Installing seccomp filters.
17580.563:0124:0128:trace:seh:check_bpf_jit_enable enabled 0x31.
17580.564:0124:0128:trace:loaddll:build_module Loaded L"Z:\home\yui\.local\share\Steam\steamapps\common\Call of Duty Black Ops III\BlackOps3.exe" at 0000000140000000: native
17580.565:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\kernelbase.dll" at 00006FFFFFC10000: builtin
17580.566:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\kernel32.dll" at 00006FFFFFEC0000: builtin
17580.568:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\msvcrt.dll" at 00006FFFFFB00000: builtin
17580.570:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\ucrtbase.dll" at 00006FFFFF9E0000: builtin
17580.570:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\sechost.dll" at 00006FFFFFAC0000: builtin
17580.570:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\advapi32.dll" at 00006FFFFFBB0000: builtin
17580.573:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\win32u.dll" at 00006FFFFF4E0000: builtin
17580.573:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\user32.dll" at 00006FFFFF5C0000: builtin
17580.573:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\gdi32.dll" at 00006FFFFF530000: builtin
17580.574:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\rpcrt4.dll" at 00006FFFFF910000: builtin
17580.574:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\combase.dll" at 00006FFFFE700000: builtin
17580.575:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\coml2.dll" at 00006FFFFE6D0000: builtin
17580.575:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\ole32.dll" at 00006FFFFE760000: builtin
17580.576:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\oleaut32.dll" at 00006FFFFE460000: builtin
17580.576:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\propsys.dll" at 00006FFFFE2D0000: builtin
17580.577:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\rtworkq.dll" at 00006FFFFE2A0000: builtin
17580.577:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\MFPlat.DLL" at 00006FFFFE310000: builtin
17580.578:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\shcore.dll" at 00006FFFFE880000: builtin
17580.578:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\SHLWAPI.dll" at 00006FFFFE8B0000: builtin
17580.580:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\SHELL32.dll" at 00006FFFFE910000: builtin
17580.580:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\dxgi.dll" at 00006FFFFE020000: native
17580.581:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\d3d11.dll" at 00006FFFFDC80000: native
17580.582:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\DSOUND.dll" at 00006FFFFDC20000: builtin
17580.583:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\msacm32.dll" at 00006FFFFDB10000: builtin
17580.583:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\WINMM.dll" at 00006FFFFDB40000: builtin
17580.584:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\WS2_32.dll" at 00006FFFFF9A0000: builtin
17580.585:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\wlanapi.dll" at 00006FFFFDAF0000: builtin
17580.587:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\dnsapi.dll" at 00006FFFFF300000: builtin
17580.587:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\nsi.dll" at 00006FFFFF2E0000: builtin
17580.588:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\IPHLPAPI.DLL" at 00006FFFFF330000: builtin
17580.588:0124:0128:trace:loaddll:build_module Loaded L"Z:\home\yui\.local\share\Steam\steamapps\common\Call of Duty Black Ops III\steam_api64.dll" at 000000007A110000: native
17580.589:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\WindowsCodecs.dll" at 00006FFFFD960000: builtin
17580.591:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\hid.dll" at 00006FFFFD910000: builtin
17580.592:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\setupapi.dll" at 00006FFFFF890000: builtin
17580.592:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\XINPUT9_1_0.dll" at 00006FFFFD930000: builtin
17580.593:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\WTSAPI32.dll" at 00006FFFFD8F0000: builtin
17580.652:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\imm32.dll" at 00006FFFFF400000: builtin
17587.176:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17587.176:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015F4C7F35 ip=15f4c7f34
17587.176:0124:0128:trace:seh:dispatch_exception info[0]=000000000012fc20
17587.176:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17587.176:0124:0128:trace:seh:dispatch_exception rax=000000000012fc20 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17587.176:0124:0128:trace:seh:dispatch_exception rsi=000000000000000a rdi=0000000140000000 rbp=000000000012fc00 rsp=000000000012fbc8
17587.176:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001a02d0 r10=0000000000000008 r11=0000000000000202
17587.176:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17587.176:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015AF944E9 code=80000003 flags=0
17587.176:0124:0128:trace:seh:call_vectored_handlers handler at 000000015AF944E9 returned ffffffff
17587.224:0124:0128:fixme:file:NtCreateFile alloc_size not supported
17587.231:0124:0128:fixme:gdi:GdiDllInitialize stub
17587.231:0124:0128:fixme:file:NtCreateFile alloc_size not supported
17587.233:0124:0128:fixme:file:NtCreateFile alloc_size not supported
17587.266:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\bcrypt.dll" at 00006FFFFD870000: builtin
17587.267:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\crypt32.dll" at 00006FFFFD780000: builtin
17587.267:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\rsaenh.dll" at 00006FFFFD8A0000: builtin
17587.308:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\winex11.drv" at 00006FFFFF2B0000: builtin
17587.334:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\uxtheme.dll" at 00006FFFFF260000: builtin
17587.340:0124:0128:fixme:ole:CoInitializeSecurity 0000000000000000, -1, 0000000000000000, 0000000000000000, 0, 3, 0000000000000000, 0, 0000000000000000 stub
17587.342:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\version.dll" at 00006FFFFD710000: builtin
17587.344:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\comctl32.dll" at 00006FFFFD540000: builtin
17587.344:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\compstui.dll" at 00006FFFFD690000: builtin
17587.344:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\winspool.drv" at 00006FFFFD6C0000: builtin
17587.344:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\wbem\wbemprox.dll" at 00006FFFFD730000: builtin
17587.347:0124:0128:fixme:wbemprox:wbem_locator_QueryInterface interface {00000126-0000-0000-c000-000000000046} not implemented
17587.380:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17587.380:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015E9453D5 ip=15e9453d4
17587.380:0124:0128:trace:seh:dispatch_exception info[0]=000000000012f120
17587.380:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17587.380:0124:0128:trace:seh:dispatch_exception rax=000000000012f120 rbx=000000000015955a rcx=00006ffffffb24c0 rdx=0000000000000080
17587.380:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f100 rsp=000000000012f0c8
17587.380:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001b65f0 r10=0000000000000008 r11=00000000000007c0
17587.380:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17587.380:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015EA0778B code=80000003 flags=0
17587.380:0124:0128:trace:seh:call_vectored_handlers handler at 000000015EA0778B returned ffffffff
17587.451:0124:0128:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17587.451:0124:0128:trace:seh:dispatch_exception info[0]=0000000000001000
17587.451:0124:0128:trace:seh:dispatch_exception info[1]=000000014304e3e8
17587.451:0124:0128:trace:seh:dispatch_exception info[2]=00000000ffffffff
17587.451:0124:0128:trace:seh:dispatch_exception info[3]=ffffffffffffffff
17587.451:0124:0128:trace:seh:dispatch_exception info[4]=000000000012f550
17587.451:0124:0128:trace:seh:dispatch_exception info[5]=00000001421838fa
17587.451:0124:0128:warn:threadname:dispatch_exception Thread renamed to "Main"
17587.451:0124:0128:trace:seh:call_vectored_handlers calling handler at 00006FFFFDC9B3E0 code=406d1388 flags=0
17587.451:0124:0128:trace:seh:call_vectored_handlers handler at 00006FFFFDC9B3E0 returned ffffffff
17587.458:0124:0128:fixme:ver:GetCurrentPackageId (000000000012A620 0000000000000000): stub
17587.460:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\wintrust.dll" at 00006FFFFD500000: builtin
17587.463:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\dbghelp.dll" at 00006FFFFD450000: builtin
17587.463:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\imagehlp.dll" at 00006FFFFD4D0000: builtin
17587.464:0124:0128:fixme:cryptasn:CryptDecodeObjectEx Unsupported decoder for lpszStructType 1.3.6.1.4.1.311.2.1.4
17587.464:0124:0128:fixme:cryptasn:CryptDecodeObjectEx Unsupported decoder for lpszStructType 1.3.6.1.4.1.311.2.1.4
17587.509:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\cryptnet.dll" at 00006FFFFD420000: builtin
17587.511:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\mpr.dll" at 00006FFFFD350000: builtin
17587.511:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\wininet.dll" at 00006FFFFD380000: builtin
17587.516:0124:0128:fixme:cryptasn:CryptDecodeObjectEx Unsupported decoder for lpszStructType 1.3.6.1.4.1.311.2.1.4
17587.516:0124:0128:fixme:cryptasn:CryptDecodeObjectEx Unsupported decoder for lpszStructType 1.3.6.1.4.1.311.2.1.4
17587.533:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17587.533:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015E97ABDB ip=15e97abda
17587.533:0124:0128:trace:seh:dispatch_exception info[0]=000000000012f130
17587.533:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17587.533:0124:0128:trace:seh:dispatch_exception rax=000000000012f130 rbx=000000000015955a rcx=00006ffffffb24c0 rdx=0000000000000080
17587.533:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f110 rsp=000000000012f0d8
17587.533:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001c28c0 r10=0000000000000008 r11=000000000012f420
17587.533:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17587.533:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015F0CA17E code=80000003 flags=0
17587.533:0124:0128:trace:seh:call_vectored_handlers handler at 000000015F0CA17E returned ffffffff
17587.620:0108:011c:fixme:oleacc:find_class_data unhandled window class: L"Button"
17587.624:0108:011c:fixme:uiautomation:msaa_provider_GetPatternProvider Unimplemented patternId 10002
17587.624:0108:011c:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 0000000000B25940, 10002, 000000000193F8A0: stub
17587.625:0108:011c:fixme:oleacc:find_class_data unhandled window class: L"Button"
17587.629:0108:011c:fixme:uiautomation:msaa_provider_GetPatternProvider Unimplemented patternId 10002
17587.629:0108:011c:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 0000000000AE7720, 10002, 000000000193F8A0: stub
17587.630:0108:011c:fixme:oleacc:find_class_data unhandled window class: L"#32770"
17589.354:0108:011c:fixme:oleacc:find_class_data unhandled window class: L"Button"
17589.357:0108:011c:fixme:uiautomation:msaa_provider_GetPatternProvider Unimplemented patternId 10002
17589.357:0108:011c:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 0000000000B25940, 10002, 000000000193F8A0: stub
17589.359:0108:011c:fixme:oleacc:find_class_data unhandled window class: L"Button"
17589.362:0108:011c:fixme:uiautomation:msaa_provider_GetPatternProvider Unimplemented patternId 10002
17589.362:0108:011c:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 0000000000AE7720, 10002, 000000000193F8A0: stub
17589.451:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.452:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015DEDDF24 ip=15deddf23
17589.452:0124:0128:trace:seh:dispatch_exception info[0]=000000000012f130
17589.452:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.452:0124:0128:trace:seh:dispatch_exception rax=000000000012f130 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.452:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f110 rsp=000000000012f0d8
17589.452:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001c28c0 r10=0000000000000008 r11=0000000000161800
17589.452:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.452:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015F0A08C7 code=80000003 flags=0
17589.452:0124:0128:trace:seh:call_vectored_handlers handler at 000000015F0A08C7 returned ffffffff
17589.452:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17589.452:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015CF330E1 ip=15cf330e1
17589.452:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17589.452:0124:0128:trace:seh:dispatch_exception rax=000000000012f178 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.452:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f110 rsp=000000000012f0d8
17589.452:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001c28c0 r10=0000000000000008 r11=0000000000000000
17589.452:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.452:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015AD31A3F code=c000001d flags=0
17589.452:0124:0128:trace:seh:call_vectored_handlers handler at 000000015AD31A3F returned ffffffff
17589.452:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.452:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015D5FBD48 ip=15d5fbd47
17589.452:0124:0128:trace:seh:dispatch_exception info[0]=000000000012f130
17589.452:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.452:0124:0128:trace:seh:dispatch_exception rax=000000000012f130 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.452:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f110 rsp=000000000012f0d8
17589.452:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001c28c0 r10=0000000000000008 r11=000000000012f400
17589.452:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.452:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015DB29B38 code=80000003 flags=0
17589.452:0124:0128:trace:seh:call_vectored_handlers handler at 000000015DB29B38 returned ffffffff
17589.459:0124:0128:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
17589.685:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\lsteamclient.dll" at 00006FFFFB9F0000: builtin
17589.685:0124:0128:trace:loaddll:build_module Loaded L"C:\Program Files (x86)\Steam\steamclient64.dll" at 00006FFFFBC30000: native
17589.700:0124:0128:trace:loaddll:build_module Loaded L"C:\Program Files (x86)\Steam\gameoverlayrenderer64.dll" at 00006FFFFB840000: native
17589.700:0124:0128:fixme:steamclient:manual_convert_Set_SteamAPI_CCheckCallbackRegisteredInProcess_func not implemented!
17589.711:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17589.711:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015F7A446B ip=15f7a446b
17589.711:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17589.711:0124:0128:trace:seh:dispatch_exception rax=000000000012f128 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.711:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f0c0 rsp=000000000012f088
17589.711:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001c3450 r10=0000000000000008 r11=000000000012f300
17589.711:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.711:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015CD9A70B code=c000001d flags=0
17589.711:0124:0128:trace:seh:call_vectored_handlers handler at 000000015CD9A70B returned ffffffff
17589.852:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17589.852:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C2D5D1B ip=15c2d5d1b
17589.852:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17589.852:0124:0128:trace:seh:dispatch_exception rax=000000000012f128 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.852:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f0c0 rsp=000000000012f088
17589.852:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bee60 r10=0000000000000008 r11=000000000012f360
17589.852:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.852:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015F63243B code=c000001d flags=0
17589.852:0124:0128:trace:seh:call_vectored_handlers handler at 000000015F63243B returned ffffffff
17589.924:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.924:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001421F1DFC ip=1421f1dfb
17589.924:0124:0128:trace:seh:dispatch_exception info[0]=000000000012f130
17589.924:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.924:0124:0128:trace:seh:dispatch_exception rax=000000000012f130 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.924:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f110 rsp=000000000012f0d8
17589.924:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bee60 r10=0000000000000008 r11=000000000012f2f0
17589.924:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.924:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015EA7CAFD code=80000003 flags=0
17589.924:0124:0128:trace:seh:call_vectored_handlers handler at 000000015EA7CAFD returned ffffffff
17589.931:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.931:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015F2002C7 ip=15f2002c6
17589.931:0124:0128:trace:seh:dispatch_exception info[0]=000000000012f120
17589.931:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.931:0124:0128:trace:seh:dispatch_exception rax=000000000012f120 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.931:0124:0128:trace:seh:dispatch_exception rsi=0000000140000000 rdi=0000000000000000 rbp=000000000012f100 rsp=000000000012f0c8
17589.931:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bee60 r10=0000000000000008 r11=0000000140000000
17589.931:0124:0128:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17589.931:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015EC88A22 code=80000003 flags=0
17589.931:0124:0128:trace:seh:call_vectored_handlers handler at 000000015EC88A22 returned ffffffff
17589.947:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.947:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015DF54C5D ip=15df54c5c
17589.947:0124:0128:trace:seh:dispatch_exception info[0]=000000000012eaf0
17589.947:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.947:0124:0128:trace:seh:dispatch_exception rax=000000000012eaf0 rbx=00000000bacaa217 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.947:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012ead0 rsp=000000000012ea98
17589.947:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001beec0 r10=0000000000000008 r11=0000000140000000
17589.947:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=00000000ae8b9061 r14=0000000009f16641 r15=00000000d98fc883
17589.947:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015D8C245E code=80000003 flags=0
17589.947:0124:0128:trace:seh:call_vectored_handlers handler at 000000015D8C245E returned ffffffff
17589.967:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.967:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015E607872 ip=15e607871
17589.967:0124:0128:trace:seh:dispatch_exception info[0]=000000000012eae0
17589.967:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.967:0124:0128:trace:seh:dispatch_exception rax=000000000012eae0 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.967:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012eac0 rsp=000000000012ea88
17589.967:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001beec0 r10=0000000000000008 r11=0000000000000000
17589.967:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17589.967:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015D43D89E code=80000003 flags=0
17589.967:0124:0128:trace:seh:call_vectored_handlers handler at 000000015D43D89E returned ffffffff
17589.976:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\secur32.dll" at 00006FFFFB810000: builtin
17589.978:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\Kerberos.dll" at 00006FFFFB7F0000: builtin
17589.978:0124:0128:err:kerberos:kerberos_LsaApInitializePackage no Kerberos support, expect problems
17589.978:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\windows\system32\Kerberos.dll" : builtin
17589.980:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\netapi32.dll" at 00006FFFFB7A0000: builtin
17589.980:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\MSV1_0.dll" at 00006FFFFB7E0000: builtin
17589.980:0124:0128:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
17589.980:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\windows\system32\MSV1_0.dll" : builtin
17589.981:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\windows\system32\netapi32.dll" : builtin
17589.981:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17589.981:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015D481E40 ip=15d481e3f
17589.981:0124:0128:trace:seh:dispatch_exception info[0]=000000000012e7b0
17589.981:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17589.981:0124:0128:trace:seh:dispatch_exception rax=000000000012e7b0 rbx=000000015a8a5c60 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.981:0124:0128:trace:seh:dispatch_exception rsi=00000001568f5b78 rdi=0000000141deb840 rbp=000000000012e790 rsp=000000000012e758
17589.981:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=000000000000001a
17589.981:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000000000078 r15=00000000d98fc883
17589.981:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015AE50B69 code=80000003 flags=0
17589.981:0124:0128:trace:seh:call_vectored_handlers handler at 000000015AE50B69 returned ffffffff
17589.997:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17589.997:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C2E25DF ip=15c2e25df
17589.997:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17589.997:0124:0128:trace:seh:dispatch_exception rax=000000000012eaf8 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17589.997:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012ea90 rsp=000000000012ea58
17589.997:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=0000000000000202
17589.997:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17589.997:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015C81A823 code=c000001d flags=0
17589.997:0124:0128:trace:seh:call_vectored_handlers handler at 000000015C81A823 returned ffffffff
17590.015:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.015:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015B0F676B ip=15b0f676b
17590.015:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.015:0124:0128:trace:seh:dispatch_exception rax=000000000012eb08 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.015:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012eaa0 rsp=000000000012ea68
17590.015:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=0000000000000202
17590.015:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.015:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015C2DD09F code=c000001d flags=0
17590.015:0124:0128:trace:seh:call_vectored_handlers handler at 000000015C2DD09F returned ffffffff
17590.404:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.404:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001421D9F37 ip=1421d9f36
17590.404:0124:0128:trace:seh:dispatch_exception info[0]=000000000012eac0
17590.404:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.404:0124:0128:trace:seh:dispatch_exception rax=000000000012eac0 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.404:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012eaa0 rsp=000000000012ea68
17590.404:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=000000015811ad10
17590.404:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.404:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015E6BC5F2 code=80000003 flags=0
17590.404:0124:0128:trace:seh:call_vectored_handlers handler at 000000015E6BC5F2 returned ffffffff
17590.436:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.436:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015F63E43F ip=15f63e43e
17590.436:0124:0128:trace:seh:dispatch_exception info[0]=000000000012eac0
17590.436:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.436:0124:0128:trace:seh:dispatch_exception rax=000000000012eac0 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.436:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012eaa0 rsp=000000000012ea68
17590.436:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=00000001580e0e00
17590.436:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.436:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015E44EFAE code=80000003 flags=0
17590.436:0124:0128:trace:seh:call_vectored_handlers handler at 000000015E44EFAE returned ffffffff
17590.463:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.463:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C0C431B ip=15c0c431b
17590.463:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.463:0124:0128:trace:seh:dispatch_exception rax=000000000012eaf8 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.463:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012ea90 rsp=000000000012ea58
17590.463:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=00000001430728f0
17590.463:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.463:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015BEA1267 code=c000001d flags=0
17590.463:0124:0128:trace:seh:call_vectored_handlers handler at 000000015BEA1267 returned ffffffff
17590.463:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.463:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015E6D5B30 ip=15e6d5b30
17590.463:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.463:0124:0128:trace:seh:dispatch_exception rax=000000000012eb08 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.463:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012eaa0 rsp=000000000012ea68
17590.463:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=0000000143535258
17590.463:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.463:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015E0B6F3B code=c000001d flags=0
17590.463:0124:0128:trace:seh:call_vectored_handlers handler at 000000015E0B6F3B returned ffffffff
17590.479:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.479:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015BFF68D7 ip=15bff68d6
17590.479:0124:0128:trace:seh:dispatch_exception info[0]=000000000012eab0
17590.479:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.479:0124:0128:trace:seh:dispatch_exception rax=000000000012eab0 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.479:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012ea90 rsp=000000000012ea58
17590.479:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=000000000012ed80
17590.479:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.479:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015BCCA3F8 code=80000003 flags=0
17590.479:0124:0128:trace:seh:call_vectored_handlers handler at 000000015BCCA3F8 returned ffffffff
17590.505:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.505:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C03904F ip=15c03904f
17590.505:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.505:0124:0128:trace:seh:dispatch_exception rax=0000000000129ec8 rbx=000000000012a328 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.505:0124:0128:trace:seh:dispatch_exception rsi=000000000012b3e8 rdi=000000000012b3f0 rbp=0000000000129e60 rsp=0000000000129e28
17590.505:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef80 r10=0000000000000008 r11=000000002889c3da
17590.505:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=000000007a146490 r14=000000015a8856a0 r15=00000000d98fc883
17590.505:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015B654F92 code=c000001d flags=0
17590.505:0124:0128:trace:seh:call_vectored_handlers handler at 000000015B654F92 returned ffffffff
17590.562:0124:0178:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17590.562:0124:0178:trace:seh:dispatch_exception info[0]=0000000000001000
17590.562:0124:0178:trace:seh:dispatch_exception info[1]=000000014304e364
17590.562:0124:0178:trace:seh:dispatch_exception info[2]=00000000ffffffff
17590.562:0124:0178:trace:seh:dispatch_exception info[3]=0000000000000000
17590.562:0124:0178:trace:seh:dispatch_exception info[4]=0000000000000000
17590.562:0124:0178:trace:seh:dispatch_exception info[5]=00000001421845d9
17590.562:0124:0178:warn:threadname:dispatch_exception Thread renamed to "Stream"
17590.562:0124:0178:trace:seh:call_vectored_handlers calling handler at 00006FFFFDC9B3E0 code=406d1388 flags=0
17590.562:0124:0178:trace:seh:call_vectored_handlers handler at 00006FFFFDC9B3E0 returned ffffffff
17590.563:0124:017c:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17590.563:0124:017c:trace:seh:dispatch_exception info[0]=0000000000001000
17590.563:0124:017c:trace:seh:dispatch_exception info[1]=000000014304e370
17590.563:0124:017c:trace:seh:dispatch_exception info[2]=00000000ffffffff
17590.563:0124:017c:trace:seh:dispatch_exception info[3]=0000000000000000
17590.563:0124:017c:trace:seh:dispatch_exception info[4]=0000000000000000
17590.563:0124:017c:trace:seh:dispatch_exception info[5]=00000001421845d9
17590.563:0124:017c:warn:threadname:dispatch_exception Thread renamed to "StreamAsync"
17590.563:0124:017c:trace:seh:call_vectored_handlers calling handler at 00006FFFFDC9B3E0 code=406d1388 flags=0
17590.563:0124:017c:trace:seh:call_vectored_handlers handler at 00006FFFFDC9B3E0 returned ffffffff
17590.563:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.563:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000014225198D ip=14225198c
17590.563:0124:0128:trace:seh:dispatch_exception info[0]=000000000012e980
17590.563:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.563:0124:0128:trace:seh:dispatch_exception rax=000000000012e980 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.563:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012e960 rsp=000000000012e928
17590.563:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001bef20 r10=0000000000000008 r11=0000000157511950
17590.563:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.563:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015ADCAD89 code=80000003 flags=0
17590.563:0124:0128:trace:seh:call_vectored_handlers handler at 000000015ADCAD89 returned ffffffff
17590.587:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.587:0124:0170:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015EA082D5 ip=15ea082d4
17590.587:0124:0170:trace:seh:dispatch_exception info[0]=000000006362fb60
17590.587:0124:0170:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.587:0124:0170:trace:seh:dispatch_exception rax=000000006362fb60 rbx=00000001569041f8 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.587:0124:0170:trace:seh:dispatch_exception rsi=0000000000000061 rdi=000000000000038f rbp=000000006362fb40 rsp=000000006362fb08
17590.587:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3210 r10=0000000000000008 r11=0000000000000000
17590.587:0124:0170:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
17590.587:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015B68509E code=80000003 flags=0
17590.587:0124:0170:trace:seh:call_vectored_handlers handler at 000000015B68509E returned ffffffff
17590.594:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.594:0124:0170:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000014219CD3C ip=14219cd3b
17590.594:0124:0170:trace:seh:dispatch_exception info[0]=000000006362f850
17590.594:0124:0170:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.594:0124:0170:trace:seh:dispatch_exception rax=000000006362f850 rbx=0000000156919c08 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.594:0124:0170:trace:seh:dispatch_exception rsi=00000000000001bb rdi=0000000156919238 rbp=000000006362f830 rsp=000000006362f7f8
17590.594:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3210 r10=0000000000000008 r11=000000006362fc48
17590.594:0124:0170:trace:seh:dispatch_exception r12=000000006362fcf8 r13=00000001568fb3e8 r14=000000006362fca0 r15=0000000156919c08
17590.594:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015C61268F code=80000003 flags=0
17590.594:0124:0170:trace:seh:call_vectored_handlers handler at 000000015C61268F returned ffffffff
17590.595:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.595:0124:0170:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015B41A3CD ip=15b41a3cc
17590.595:0124:0170:trace:seh:dispatch_exception info[0]=000000006362f8b0
17590.595:0124:0170:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.595:0124:0170:trace:seh:dispatch_exception rax=000000006362f8b0 rbx=000000006362fd82 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.595:0124:0170:trace:seh:dispatch_exception rsi=0000000000000000 rdi=0000000000000000 rbp=000000006362f890 rsp=000000006362f858
17590.595:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3210 r10=0000000000000008 r11=aaaaaaaaaaaaaaab
17590.595:0124:0170:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=00000001568fb3d8
17590.595:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015C6D4A08 code=80000003 flags=0
17590.595:0124:0170:trace:seh:call_vectored_handlers handler at 000000015C6D4A08 returned ffffffff
17590.638:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.638:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C2E81B8 ip=15c2e81b8
17590.638:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.638:0124:0128:trace:seh:dispatch_exception rax=000000000012eb38 rbx=000000014303f3f0 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.638:0124:0128:trace:seh:dispatch_exception rsi=00000000f2b3efcd rdi=00000000345c41e3 rbp=000000000012ead0 rsp=000000000012ea98
17590.638:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001befb0 r10=0000000000000008 r11=0000000000000200
17590.638:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000009f16641 r15=00000000d98fc883
17590.638:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015B10F89A code=c000001d flags=0
17590.638:0124:0128:trace:seh:call_vectored_handlers handler at 000000015B10F89A returned ffffffff
17590.646:0124:0184:warn:threadname:NtSetInformationThread Thread renamed to L"wine_threadpool_worker"
17590.650:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\msdmo.dll" at 00006FFFFB750000: builtin
17590.650:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\winegstreamer.dll" at 00006FFFFB780000: builtin
17590.733:0124:0170:trace:loaddll:build_module Loaded L"C:\windows\system32\schannel.dll" at 00006FFFFB730000: builtin
17590.850:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\mf.dll" at 00006FFFFB6C0000: builtin
info: Game: BlackOps3.exe
info: DXVK: v2.4-10-gc26b2ade1d485dd
17590.855:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\winevulkan.dll" at 00006FFFFB680000: builtin
info: Vulkan: Found vkGetInstanceProcAddr in winevulkan.dll @ 0x6ffffb68d310
info: Built-in extension providers:
info: Platform WSI
info: OpenVR
info: OpenXR
17590.857:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.857:0124:0170:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015E77A031 ip=15e77a031
17590.857:0124:0170:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.857:0124:0170:trace:seh:dispatch_exception rax=000000006362fae8 rbx=00000001568fb3d8 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.857:0124:0170:trace:seh:dispatch_exception rsi=0000000000000000 rdi=00000001568fb3d8 rbp=000000006362fa80 rsp=000000006362fa48
17590.857:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=000000006362fda0
17590.857:0124:0170:trace:seh:dispatch_exception r12=0000000000000000 r13=00000001569041f8 r14=0000000000000000 r15=0000000000000000
17590.857:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015ED3F519 code=c000001d flags=0
17590.857:0124:0170:trace:seh:call_vectored_handlers handler at 000000015ED3F519 returned ffffffff
17590.857:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17590.857:0124:0170:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015DAAB86E ip=15daab86d
17590.857:0124:0170:trace:seh:dispatch_exception info[0]=000000006362f920
17590.857:0124:0170:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17590.857:0124:0170:trace:seh:dispatch_exception rax=000000006362f920 rbx=0000000142f9368c rcx=00006ffffffb24c0 rdx=0000000000000080
17590.857:0124:0170:trace:seh:dispatch_exception rsi=0000000156919238 rdi=00000001568fb3d8 rbp=000000006362f900 rsp=000000006362f8c8
17590.857:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=0000000156919f98
17590.857:0124:0170:trace:seh:dispatch_exception r12=000000014305fd04 r13=0000000000000000 r14=0000000156919db8 r15=0000000156919af8
17590.857:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015D584273 code=80000003 flags=0
17590.857:0124:0170:trace:seh:call_vectored_handlers handler at 000000015D584273 returned ffffffff
17590.857:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\wineopenxr.dll" at 00007F483D2D0000: builtin
17590.857:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.857:0124:0170:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015D92A419 ip=15d92a419
17590.857:0124:0170:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.857:0124:0170:trace:seh:dispatch_exception rax=000000006362e718 rbx=0000000143091014 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.857:0124:0170:trace:seh:dispatch_exception rsi=0000000000000000 rdi=0000000000000000 rbp=000000006362e6b0 rsp=000000006362e678
17590.857:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=0000000156919fc8
17590.857:0124:0170:trace:seh:dispatch_exception r12=00000001428944a0 r13=000000006362fbf0 r14=0000000156919db8 r15=0000000156919af8
17590.857:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015D712E86 code=c000001d flags=0
17590.857:0124:0170:trace:seh:call_vectored_handlers handler at 000000015D712E86 returned ffffffff
17590.857:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.857:0124:0170:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015E694B25 ip=15e694b25
17590.857:0124:0170:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.857:0124:0170:trace:seh:dispatch_exception rax=000000006362f948 rbx=0000000156904158 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.857:0124:0170:trace:seh:dispatch_exception rsi=0000000143090cd8 rdi=0000000000000007 rbp=000000006362f8e0 rsp=000000006362f8a8
17590.857:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=00000001568eef60
17590.857:0124:0170:trace:seh:dispatch_exception r12=0000000000000000 r13=ffffffffffffffff r14=0000000156919dc8 r15=0000000156919db8
17590.857:0124:0170:trace:seh:call_vectored_handlers calling handler at 0000000142908DB0 code=c000001d flags=0
17590.857:0124:0170:trace:seh:call_vectored_handlers handler at 0000000142908DB0 returned ffffffff
warn: OpenXR: Unable to get required Vulkan instance extensions size
info: Enabled instance extensions:
info: VK_EXT_surface_maintenance1
info: VK_KHR_get_surface_capabilities2
info: VK_KHR_surface
info: VK_KHR_win32_surface
DRM kernel driver 'nvidia-drm' in use. NVK requires nouveau.
warn: Skipping CPU adapter: llvmpipe (LLVM 17.0.6, 256 bits)
warn: OpenXR: Unable to get required Vulkan Device extensions size
17590.963:0124:0128:trace:loaddll:free_modref Unloaded module L"C:\windows\system32\wineopenxr.dll" : builtin
info: NVIDIA GeForce RTX 3070 Laptop GPU:
info: Driver : NVIDIA 555.58.2
info: Memory Heap[0]:
info: Size: 8192 MiB
info: Flags: 0x1
info: Memory Type[1]: Property Flags = 0x1
info: Memory Type[2]: Property Flags = 0x1
info: Memory Type[5]: Property Flags = 0x7
info: Memory Heap[1]:
info: Size: 23962 MiB
info: Flags: 0x0
info: Memory Type[0]: Property Flags = 0x0
info: Memory Type[3]: Property Flags = 0x6
info: Memory Type[4]: Property Flags = 0xe
17590.963:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12e4e8, paths 0xa23b30, modes_count 0x12e4ec, modes 0x7be510, topology_id (nil) semi-stub
17590.963:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12e4e8, paths 0xa23b30, modes_count 0x12e4ec, modes 0x7be510, topology_id (nil) semi-stub
info: D3D11InternalCreateDevice: Maximum supported feature level: D3D_FEATURE_LEVEL_12_1
info: D3D11InternalCreateDevice: Using feature level D3D_FEATURE_LEVEL_11_0
info: Device properties:
info: Device : NVIDIA GeForce RTX 3070 Laptop GPU
info: Driver : NVIDIA 555.58.2
info: Enabled device extensions:
info: VK_EXT_attachment_feedback_loop_layout
info: VK_EXT_conservative_rasterization
info: VK_EXT_custom_border_color
info: VK_EXT_depth_bias_control
info: VK_EXT_depth_clip_enable
info: VK_EXT_extended_dynamic_state3
info: VK_EXT_fragment_shader_interlock
info: VK_EXT_graphics_pipeline_library
info: VK_EXT_memory_priority
info: VK_EXT_non_seamless_cube_map
info: VK_EXT_robustness2
info: VK_EXT_shader_module_identifier
info: VK_EXT_swapchain_maintenance1
info: VK_EXT_transform_feedback
info: VK_EXT_vertex_attribute_divisor
info: VK_KHR_external_memory_win32
info: VK_KHR_external_semaphore_win32
info: VK_KHR_maintenance5
info: VK_KHR_pipeline_library
info: VK_KHR_present_id
info: VK_KHR_present_wait
info: VK_KHR_swapchain
info: VK_KHR_win32_keyed_mutex
info: VK_NVX_binary_import
info: VK_NVX_image_view_handle
info: VK_NV_descriptor_pool_overallocation
info: VK_NV_raw_access_chains
info: Device features:
info: robustBufferAccess : 1
info: fullDrawIndexUint32 : 1
info: imageCubeArray : 1
info: independentBlend : 1
info: geometryShader : 1
info: tessellationShader : 1
info: sampleRateShading : 1
info: dualSrcBlend : 1
info: logicOp : 1
info: multiDrawIndirect : 1
info: drawIndirectFirstInstance : 1
info: depthClamp : 1
info: depthBiasClamp : 1
info: fillModeNonSolid : 1
info: depthBounds : 1
info: wideLines : 1
info: multiViewport : 1
info: samplerAnisotropy : 1
info: textureCompressionBC : 1
info: occlusionQueryPrecise : 1
info: pipelineStatisticsQuery : 1
info: vertexPipelineStoresAndAtomics : 1
info: fragmentStoresAndAtomics : 1
info: shaderImageGatherExtended : 1
info: shaderClipDistance : 1
info: shaderCullDistance : 1
info: shaderFloat64 : 1
info: shaderInt64 : 1
info: variableMultisampleRate : 1
info: shaderResourceResidency : 1
info: shaderResourceMinLod : 1
info: sparseBinding : 1
info: sparseResidencyBuffer : 1
info: sparseResidencyImage2D : 1
info: sparseResidencyImage3D : 1
info: sparseResidency2Samples : 1
info: sparseResidency4Samples : 1
info: sparseResidency8Samples : 1
info: sparseResidency16Samples : 1
info: sparseResidencyAliased : 1
info: Vulkan 1.1
info: shaderDrawParameters : 1
info: Vulkan 1.2
info: samplerMirrorClampToEdge : 1
info: drawIndirectCount : 1
info: samplerFilterMinmax : 1
info: hostQueryReset : 1
info: timelineSemaphore : 1
info: bufferDeviceAddress : 1
info: shaderOutputViewportIndex : 1
info: shaderOutputLayer : 1
info: vulkanMemoryModel : 1
info: Vulkan 1.3
info: robustImageAccess : 0
info: pipelineCreationCacheControl : 1
info: shaderDemoteToHelperInvocation : 1
info: shaderZeroInitializeWorkgroupMemory : 0
info: synchronization2 : 1
info: dynamicRendering : 1
info: VK_AMD_shader_fragment_mask
info: extension supported : 0
info: VK_EXT_attachment_feedback_loop_layout
info: attachmentFeedbackLoopLayout : 0
info: VK_EXT_conservative_rasterization
info: extension supported : 1
info: VK_EXT_custom_border_color
info: customBorderColors : 1
info: customBorderColorWithoutFormat : 1
info: VK_EXT_depth_clip_enable
info: depthClipEnable : 1
info: VK_EXT_depth_bias_control
info: depthBiasControl : 1
info: leastRepresentableValueForceUnormRepresentation : 1
info: floatRepresentation : 0
info: depthBiasExact : 1
info: VK_EXT_extended_dynamic_state3
info: extDynamicState3AlphaToCoverageEnable : 1
info: extDynamicState3DepthClipEnable : 1
info: extDynamicState3RasterizationSamples : 1
info: extDynamicState3SampleMask : 1
info: extDynamicState3LineRasterizationMode : 1
info: VK_EXT_fragment_shader_interlock
info: fragmentShaderSampleInterlock : 1
info: fragmentShaderPixelInterlock : 1
info: VK_EXT_full_screen_exclusive
info: extension supported : 0
info: VK_EXT_graphics_pipeline_library
info: graphicsPipelineLibrary : 1
info: VK_EXT_line_rasterization
info: rectangularLines : 1
info: smoothLines : 1
info: VK_EXT_memory_budget
info: extension supported : 1
info: VK_EXT_memory_priority
info: memoryPriority : 1
info: VK_EXT_non_seamless_cube_map
info: nonSeamlessCubeMap : 0
info: VK_EXT_robustness2
info: robustBufferAccess2 : 1
info: robustImageAccess2 : 1
info: nullDescriptor : 1
info: VK_EXT_shader_module_identifier
info: shaderModuleIdentifier : 1
info: VK_EXT_shader_stencil_export
info: extension supported : 0
info: VK_EXT_swapchain_colorspace
info: extension supported : 0
info: VK_EXT_swapchain_maintenance1
info: swapchainMaintenance1 : 1
info: VK_EXT_hdr_metadata
info: extension supported : 0
info: VK_EXT_transform_feedback
info: transformFeedback : 1
info: geometryStreams : 1
info: VK_EXT_vertex_attribute_divisor
info: vertexAttributeInstanceRateDivisor : 1
info: vertexAttributeInstanceRateZeroDivisor : 1
info: VK_KHR_external_memory_win32
info: extension supported : 1
info: VK_KHR_external_semaphore_win32
info: extension supported : 1
info: VK_KHR_maintenance5
info: maintenance5 : 1
info: VK_KHR_present_id
info: presentId : 1
info: VK_KHR_present_wait
info: presentWait : 1
info: VK_NV_descriptor_pool_overallocation
info: descriptorPoolOverallocation : 1
info: VK_NV_raw_access_chains
info: shaderRawAccessChains : 1
info: VK_NVX_binary_import
info: extension supported : 1
info: VK_NVX_image_view_handle
info: extension supported : 1
info: VK_KHR_win32_keyed_mutex
info: extension supported : 1
info: Queue families:
info: Graphics : 0
info: Transfer : 1
info: Sparse : 0
17590.979:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17590.979:0124:0170:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015E77A031 ip=15e77a031
17590.979:0124:0170:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17590.979:0124:0170:trace:seh:dispatch_exception rax=000000006362fae8 rbx=00000001568fb3d8 rcx=00006ffffffb24c0 rdx=0000000000000080
17590.979:0124:0170:trace:seh:dispatch_exception rsi=0000000000000000 rdi=00000001568fb3d8 rbp=000000006362fa80 rsp=000000006362fa48
17590.979:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=0000000000000202
17590.979:0124:0170:trace:seh:dispatch_exception r12=0000000000000000 r13=00000001569041f8 r14=0000000000000000 r15=0000000000000000
17590.979:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015ED3F519 code=c000001d flags=0
17590.979:0124:0170:trace:seh:call_vectored_handlers handler at 000000015ED3F519 returned ffffffff
17591.017:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17591.017:0124:0170:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015C49D7A3 ip=15c49d7a2
17591.017:0124:0170:trace:seh:dispatch_exception info[0]=000000006362f940
17591.017:0124:0170:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17591.017:0124:0170:trace:seh:dispatch_exception rax=000000006362f940 rbx=0000000000000020 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.017:0124:0170:trace:seh:dispatch_exception rsi=0000000000000003 rdi=00000001568fb468 rbp=000000006362f920 rsp=000000006362f8e8
17591.017:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=0000000156903f98
17591.017:0124:0170:trace:seh:dispatch_exception r12=000000006362fd80 r13=0000000000000000 r14=0000000156919238 r15=000000006362fd20
17591.017:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015B40A5BD code=80000003 flags=0
17591.017:0124:0170:trace:seh:call_vectored_handlers handler at 000000015B40A5BD returned ffffffff
17591.017:0124:0170:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17591.017:0124:0170:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015C49D7A3 ip=15c49d7a2
17591.017:0124:0170:trace:seh:dispatch_exception info[0]=000000006362f940
17591.017:0124:0170:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17591.017:0124:0170:trace:seh:dispatch_exception rax=000000006362f940 rbx=0000000000000167 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.017:0124:0170:trace:seh:dispatch_exception rsi=0000000000000003 rdi=00000001568fb468 rbp=000000006362f920 rsp=000000006362f8e8
17591.017:0124:0170:trace:seh:dispatch_exception r8=0000000000161800 r9=00000000001d3240 r10=0000000000000008 r11=000000015691a0e8
17591.017:0124:0170:trace:seh:dispatch_exception r12=000000006362fd80 r13=0000000000000000 r14=0000000156919238 r15=000000006362fd20
17591.017:0124:0170:trace:seh:call_vectored_handlers calling handler at 000000015B40A5BD code=80000003 flags=0
17591.017:0124:0170:trace:seh:call_vectored_handlers handler at 000000015B40A5BD returned ffffffff
Fossilize INFO: Overriding serialization path: "/home/yui/.local/share/Steam/steamapps/shadercache/311210/fozpipelinesv6/steamapprun_pipeline_cache".
info: Memory type mask for sparse resources: 0x2
warn: DXVK: No state cache file found
info: DXVK: Graphics pipeline libraries supported
17591.315:0124:0188:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-submit"
17591.316:0124:018c:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-queue"
17591.319:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12e3d8, paths 0xa21f50, modes_count 0x12e3dc, modes 0xa19b60, topology_id (nil) semi-stub
17591.320:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12b16c, paths 0xa21f50, modes_count 0x12b1d0, modes 0xa19be0, topology_id (nil) semi-stub
17591.321:0124:0190:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-cs"
17591.322:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12e3d8, paths 0xa21f50, modes_count 0x12e3dc, modes 0xa19c50, topology_id (nil) semi-stub
17591.339:0124:0128:trace:loaddll:build_module Loaded L"C:\windows\system32\nvapi64.dll" at 00006FFFFB4E0000: native
17591.341:0124:0128:info:dxvk-nvapi:NvAPI_Initialize
17591.341:0124:0128:info:dxvk-nvapi:DXVK-NVAPI v0.7.1 (BlackOps3.exe)
info: NVIDIA GeForce RTX 3070 Laptop GPU:
info: Driver : NVIDIA 555.58.2
info: Memory Heap[0]:
info: Size: 8192 MiB
info: Flags: 0x1
info: Memory Type[1]: Property Flags = 0x1
info: Memory Type[2]: Property Flags = 0x1
info: Memory Type[5]: Property Flags = 0x7
info: Memory Heap[1]:
info: Size: 23962 MiB
info: Flags: 0x0
info: Memory Type[0]: Property Flags = 0x0
info: Memory Type[3]: Property Flags = 0x6
info: Memory Type[4]: Property Flags = 0xe
17591.341:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12db58, paths 0xa21f50, modes_count 0x12db5c, modes 0xa1d470, topology_id (nil) semi-stub
17591.341:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12db58, paths 0xa21f50, modes_count 0x12db5c, modes 0xa1d470, topology_id (nil) semi-stub
17591.343:0124:0128:info:dxvk-nvapi:Successfully acquired Vulkan vkGetInstanceProcAddr @ 0x6ffffb68d310
17591.346:0124:0128:info:dxvk-nvapi:NvAPI Device: NVIDIA GeForce RTX 3070 Laptop GPU (555.58.2)
17591.346:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12d328, paths 0xa79780, modes_count 0x12d32c, modes 0xa1d6d0, topology_id (nil) semi-stub
17591.346:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12a0bc, paths 0xa79780, modes_count 0x12a120, modes 0xa1d750, topology_id (nil) semi-stub
17591.348:0124:0128:info:dxvk-nvapi:NvAPI Output: \.\DISPLAY1
17591.348:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12d328, paths 0xa79780, modes_count 0x12d32c, modes 0xa1d7c0, topology_id (nil) semi-stub
17591.350:0124:0128:info:dxvk-nvapi:<-NvAPI_Initialize: OK
17591.350:0124:0128:info:dxvk-nvapi:NvAPI_QueryInterface (0x33c7358c): Unknown function ID
17591.350:0124:0128:info:dxvk-nvapi:NvAPI_QueryInterface (0x593e8644): Unknown function ID
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_SYS_GetDriverAndBranchVersion: OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_EnumPhysicalGPUs: OK
17591.364:0124:0128:info:dxvk-nvapi:NvAPI_QueryInterface (0xb7fbdbfa): Unknown function ID
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D_GetCurrentSLIState: OK
17591.364:0124:0128:info:dxvk-nvapi:NvAPI_QueryInterface NvAPI_Stereo_CreateHandleFromIUnknown: Not implemented method
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (1/NV_EXTN_OP_SHFL): OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (3/NV_EXTN_OP_SHFL_DOWN): OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (4/NV_EXTN_OP_SHFL_XOR): OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (5/NV_EXTN_OP_VOTE_ALL): OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (6/NV_EXTN_OP_VOTE_ANY): OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (7/NV_EXTN_OP_VOTE_BALLOT): OK
17591.364:0124:0128:info:dxvk-nvapi:<-NvAPI_D3D11_IsNvShaderExtnOpCodeSupported (8/NV_EXTN_OP_GET_LANE_ID): OK
17591.365:0124:0194:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17591.365:0124:0194:trace:seh:dispatch_exception info[0]=0000000000001000
17591.365:0124:0194:trace:seh:dispatch_exception info[1]=000000014304e3e0
17591.365:0124:0194:trace:seh:dispatch_exception info[2]=00000000ffffffff
17591.365:0124:0194:trace:seh:dispatch_exception info[3]=0000000000000000
17591.365:0124:0194:trace:seh:dispatch_exception info[4]=0000000000000000
17591.365:0124:0194:trace:seh:dispatch_exception info[5]=00000001421845d9
17591.365:0124:0194:warn:threadname:dispatch_exception Thread renamed to "Window"
17591.365:0124:0194:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17591.365:0124:0194:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17591.380:0124:0194:fixme:wtsapi:WTSRegisterSessionNotification Stub 00000000000D008E 0x00000000
17591.394:0124:0198:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17591.394:0124:0198:trace:seh:dispatch_exception info[0]=0000000000001000
17591.394:0124:0198:trace:seh:dispatch_exception info[1]=0000000142ff3238
17591.394:0124:0198:trace:seh:dispatch_exception info[2]=00000000ffffffff
17591.394:0124:0198:trace:seh:dispatch_exception info[3]=0000000000000000
17591.394:0124:0198:trace:seh:dispatch_exception info[4]=0000000000000000
17591.394:0124:0198:trace:seh:dispatch_exception info[5]=00000001421845d9
17591.394:0124:0198:warn:threadname:dispatch_exception Thread renamed to "Input"
17591.395:0124:0198:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17591.395:0124:0198:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17591.425:0124:01a0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-frame"
info: Presenter: Actual swap chain properties:
info: Format: VK_FORMAT_B8G8R8A8_UNORM
info: Color space: VK_COLOR_SPACE_SRGB_NONLINEAR_KHR
info: Present mode: VK_PRESENT_MODE_IMMEDIATE_KHR (dynamic: yes)
info: Buffer size: 2560x1600
info: Image count: 3
info: Exclusive FS: 1
warn: DXGI: MakeWindowAssociation: Ignoring flags
17591.640:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12e6c8, paths 0xa707b0, modes_count 0x12e6cc, modes 0xa76c20, topology_id (nil) semi-stub
17591.640:0124:0128:fixme:system:NtUserQueryDisplayConfig flags 0x2, paths_count 0x12e898, paths 0xa707b0, modes_count 0x12e89c, modes 0xa76c20, topology_id (nil) semi-stub
info: Setting display mode: 2560x1600@165
info: Setting display mode: 2560x1600@165
17591.691:0124:01ac:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17591.691:0124:01ac:trace:seh:dispatch_exception info[0]=0000000000001000
17591.691:0124:01ac:trace:seh:dispatch_exception info[1]=000000014304e358
17591.691:0124:01ac:trace:seh:dispatch_exception info[2]=00000000ffffffff
17591.691:0124:01ac:trace:seh:dispatch_exception info[3]=0000000000000000
17591.691:0124:01ac:trace:seh:dispatch_exception info[4]=0000000000000000
17591.691:0124:01ac:trace:seh:dispatch_exception info[5]=00000001421845d9
17591.691:0124:01ac:warn:threadname:dispatch_exception Thread renamed to "Database"
17591.691:0124:01ac:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17591.691:0124:01ac:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17591.695:0108:011c:fixme:uiautomation:msaa_provider_GetPatternProvider Unimplemented patternId 10002
17591.695:0108:011c:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 0000000000B25940, 10002, 000000000193F8A0: stub
17591.701:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17591.701:0124:01ac:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015C5AE0B3 ip=15c5ae0b2
17591.701:0124:01ac:trace:seh:dispatch_exception info[0]=000000006411eb60
17591.701:0124:01ac:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17591.701:0124:01ac:trace:seh:dispatch_exception rax=000000006411eb60 rbx=00000001568fb508 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.701:0124:01ac:trace:seh:dispatch_exception rsi=000000006411eef0 rdi=0000000000000000 rbp=000000006411eb40 rsp=000000006411eb08
17591.701:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000001
17591.701:0124:01ac:trace:seh:dispatch_exception r12=000000006411f2f0 r13=000000000000010e r14=0000000000000002 r15=0000000000000001
17591.701:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015DEB22E6 code=80000003 flags=0
17591.701:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015DEB22E6 returned ffffffff
17591.701:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17591.701:0124:01ac:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015C5AE0B3 ip=15c5ae0b2
17591.701:0124:01ac:trace:seh:dispatch_exception info[0]=000000006411eb60
17591.701:0124:01ac:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17591.701:0124:01ac:trace:seh:dispatch_exception rax=000000006411eb60 rbx=00000001568fb508 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.701:0124:01ac:trace:seh:dispatch_exception rsi=000000006411eef0 rdi=0000000000000000 rbp=000000006411eb40 rsp=000000006411eb08
17591.701:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000001
17591.701:0124:01ac:trace:seh:dispatch_exception r12=000000006411f2f0 r13=000000000000010e r14=0000000000000002 r15=0000000000000001
17591.701:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015DEB22E6 code=80000003 flags=0
17591.701:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015DEB22E6 returned ffffffff
17591.705:0108:011c:fixme:uiautomation:msaa_provider_GetPatternProvider Unimplemented patternId 10002
17591.705:0108:011c:fixme:uiautomation:base_hwnd_provider_GetPatternProvider 0000000000AE7720, 10002, 000000000193F8A0: stub
17591.717:0124:01b8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
17591.718:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17591.718:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015DADD174 ip=15dadd173
17591.718:0124:0128:trace:seh:dispatch_exception info[0]=000000000012d340
17591.718:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17591.718:0124:0128:trace:seh:dispatch_exception rax=000000000012d340 rbx=000000000012d828 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.718:0124:0128:trace:seh:dispatch_exception rsi=000000000012e9d8 rdi=000000000012d6c0 rbp=000000000012d320 rsp=000000000012d2e8
17591.718:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000024bcc0 r10=0000000000000008 r11=000000007bf2c8ef
17591.718:0124:0128:trace:seh:dispatch_exception r12=0000000000000080 r13=000000015a8856a0 r14=000000000012e9a0 r15=000000006e103687
17591.718:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015F955AAD code=80000003 flags=0
17591.718:0124:0128:trace:seh:call_vectored_handlers handler at 000000015F955AAD returned ffffffff
17591.718:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17591.718:0124:0128:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C03904F ip=15c03904f
17591.718:0124:0128:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17591.718:0124:0128:trace:seh:dispatch_exception rax=000000000012d388 rbx=000000000012d828 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.718:0124:0128:trace:seh:dispatch_exception rsi=000000000012e9f8 rdi=000000000012d6c0 rbp=000000000012d320 rsp=000000000012d2e8
17591.718:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000024bcc0 r10=0000000000000008 r11=00000000a973e567
17591.718:0124:0128:trace:seh:dispatch_exception r12=0000000000000080 r13=000000015a8856a0 r14=000000000012e9a0 r15=000000006e103687
17591.718:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015B654F92 code=c000001d flags=0
17591.718:0124:0128:trace:seh:call_vectored_handlers handler at 000000015B654F92 returned ffffffff
17591.718:0124:01bc:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
info: DXVK: Using 16 compiler threads
17591.719:0124:01c0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
17591.720:0124:01c4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-l"
17591.721:0124:01c8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
17591.721:0124:01cc:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
17591.722:0124:01d0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
17591.723:0124:01d4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
17591.723:0124:01d8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
17591.724:0124:01dc:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-n"
17591.725:0124:01e0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
17591.726:0124:01e4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
17591.727:0124:01e8:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
17591.727:0124:01ec:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
17591.728:0124:01f0:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
17591.729:0124:01f4:warn:threadname:NtSetInformationThread Thread renamed to L"dxvk-shader-h"
17591.911:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17591.911:0124:01ac:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015BC93A38 ip=15bc93a38
17591.911:0124:01ac:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17591.911:0124:01ac:trace:seh:dispatch_exception rax=000000006411ee88 rbx=0000000000000100 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.911:0124:01ac:trace:seh:dispatch_exception rsi=0000000000000100 rdi=000000006411f2a0 rbp=000000006411ee20 rsp=000000006411ede8
17591.911:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=00000001568eef60
17591.911:0124:01ac:trace:seh:dispatch_exception r12=000000006411f280 r13=00000001568fb878 r14=0000000000003e80 r15=0000000149408450
17591.911:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015DB234A9 code=c000001d flags=0
17591.911:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015DB234A9 returned ffffffff
17591.915:0124:0128:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17591.915:0124:0128:trace:seh:dispatch_exception code=80000003 flags=0 addr=00000001429EE41C ip=1429ee41b
17591.915:0124:0128:trace:seh:dispatch_exception info[0]=000000000012eae0
17591.915:0124:0128:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17591.915:0124:0128:trace:seh:dispatch_exception rax=000000000012eae0 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17591.915:0124:0128:trace:seh:dispatch_exception rsi=0000000000000001 rdi=0000000000000002 rbp=000000000012eac0 rsp=000000000012ea88
17591.915:0124:0128:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000024bd50 r10=0000000000000008 r11=00000001430585f8
17591.915:0124:0128:trace:seh:dispatch_exception r12=00000000f794df84 r13=0000000142fb68cc r14=0000000000000000 r15=00000000d98fc883
17591.915:0124:0128:trace:seh:call_vectored_handlers calling handler at 000000015DC98980 code=80000003 flags=0
17591.915:0124:0128:trace:seh:call_vectored_handlers handler at 000000015DC98980 returned ffffffff
17591.986:0124:01f8:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17591.986:0124:01f8:trace:seh:dispatch_exception info[0]=0000000000001000
17591.986:0124:01f8:trace:seh:dispatch_exception info[1]=000000014304e2b8
17591.986:0124:01f8:trace:seh:dispatch_exception info[2]=00000000ffffffff
17591.986:0124:01f8:trace:seh:dispatch_exception info[3]=0000000000000000
17591.986:0124:01f8:trace:seh:dispatch_exception info[4]=0000000000000000
17591.986:0124:01f8:trace:seh:dispatch_exception info[5]=00000001421845d9
17591.986:0124:01f8:warn:threadname:dispatch_exception Thread renamed to "2_Backend"
17591.986:0124:01f8:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17591.986:0124:01f8:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17592.227:0124:01fc:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17592.227:0124:01fc:trace:seh:dispatch_exception info[0]=0000000000001000
17592.227:0124:01fc:trace:seh:dispatch_exception info[1]=000000014304e390
17592.227:0124:01fc:trace:seh:dispatch_exception info[2]=00000000ffffffff
17592.227:0124:01fc:trace:seh:dispatch_exception info[3]=0000000000000000
17592.227:0124:01fc:trace:seh:dispatch_exception info[4]=0000000000000000
17592.227:0124:01fc:trace:seh:dispatch_exception info[5]=00000001421845d9
17592.227:0124:01fc:warn:threadname:dispatch_exception Thread renamed to "Video Decode"
17592.227:0124:01fc:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17592.227:0124:01fc:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17593.165:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17593.165:0124:01ac:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015B18F8A7 ip=15b18f8a6
17593.165:0124:01ac:trace:seh:dispatch_exception info[0]=000000006411d4d0
17593.165:0124:01ac:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17593.165:0124:01ac:trace:seh:dispatch_exception rax=000000006411d4d0 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.165:0124:01ac:trace:seh:dispatch_exception rsi=00000001568f4a48 rdi=0000000000000000 rbp=000000006411d4b0 rsp=000000006411d478
17593.165:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000000
17593.165:0124:01ac:trace:seh:dispatch_exception r12=0000000000000002 r13=0000000000000003 r14=00000001568fb778 r15=0000000142c7f230
17593.165:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015C2B061A code=80000003 flags=0
17593.165:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015C2B061A returned ffffffff
17593.240:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17593.240:0124:01ac:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015C5DB7F7 ip=15c5db7f7
17593.240:0124:01ac:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17593.240:0124:01ac:trace:seh:dispatch_exception rax=000000006411eb78 rbx=000000006411f3f9 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.240:0124:01ac:trace:seh:dispatch_exception rsi=00000001568f4150 rdi=0000000000000002 rbp=000000006411eb10 rsp=000000006411ead8
17593.240:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000002
17593.240:0124:01ac:trace:seh:dispatch_exception r12=000000006411f2f0 r13=000000000000010e r14=0000000000000001 r15=0000000000000001
17593.240:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015E77DBFC code=c000001d flags=0
17593.240:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015E77DBFC returned ffffffff
17593.240:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17593.240:0124:01ac:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015EE1B757 ip=15ee1b756
17593.240:0124:01ac:trace:seh:dispatch_exception info[0]=000000006411d4a0
17593.240:0124:01ac:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17593.240:0124:01ac:trace:seh:dispatch_exception rax=000000006411d4a0 rbx=000000006411d850 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.240:0124:01ac:trace:seh:dispatch_exception rsi=00000001568f4a48 rdi=0000000000000007 rbp=000000006411d480 rsp=000000006411d448
17593.240:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=00000001568fb8e0
17593.240:0124:01ac:trace:seh:dispatch_exception r12=0000000000000002 r13=0000000000000003 r14=00000001568fb778 r15=0000000142c7f230
17593.240:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015EE0F56D code=80000003 flags=0
17593.240:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015EE0F56D returned ffffffff
17593.241:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17593.241:0124:01ac:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015D275B51 ip=15d275b51
17593.241:0124:01ac:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17593.241:0124:01ac:trace:seh:dispatch_exception rax=000000006411d538 rbx=0000000000000000 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.241:0124:01ac:trace:seh:dispatch_exception rsi=0000000000000001 rdi=0000000000000001 rbp=000000006411d4d0 rsp=000000006411d498
17593.241:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=000000006411ca00
17593.241:0124:01ac:trace:seh:dispatch_exception r12=0000000000000008 r13=0000000000000003 r14=00000001568f4a48 r15=0000000142c7f230
17593.241:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015F1FD21A code=c000001d flags=0
17593.241:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015F1FD21A returned ffffffff
17593.465:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17593.465:0124:01ac:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015D8FA7E6 ip=15d8fa7e6
17593.465:0124:01ac:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17593.465:0124:01ac:trace:seh:dispatch_exception rax=000000006411ebc8 rbx=0000000000000005 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.465:0124:01ac:trace:seh:dispatch_exception rsi=00000001568f4150 rdi=0000000000000038 rbp=000000006411eb60 rsp=000000006411eb28
17593.465:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000002
17593.465:0124:01ac:trace:seh:dispatch_exception r12=000000006411f2f0 r13=000000000000010e r14=0000000000000011 r15=0000000000000001
17593.465:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015C00EA24 code=c000001d flags=0
17593.465:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015C00EA24 returned ffffffff
17593.466:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17593.466:0124:01ac:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015C5AE0B3 ip=15c5ae0b2
17593.466:0124:01ac:trace:seh:dispatch_exception info[0]=000000006411eb50
17593.466:0124:01ac:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17593.466:0124:01ac:trace:seh:dispatch_exception rax=000000006411eb50 rbx=00000001568f4a48 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.466:0124:01ac:trace:seh:dispatch_exception rsi=000000006411eee0 rdi=0000000000000000 rbp=000000006411eb30 rsp=000000006411eaf8
17593.466:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000001
17593.466:0124:01ac:trace:seh:dispatch_exception r12=000000006411f2e0 r13=000000000000010e r14=0000000000000011 r15=0000000000000001
17593.466:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015DEB22E6 code=80000003 flags=0
17593.466:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015DEB22E6 returned ffffffff
17593.469:0124:0200:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17593.469:0124:0200:trace:seh:dispatch_exception info[0]=0000000000001000
17593.469:0124:0200:trace:seh:dispatch_exception info[1]=000000006908ff20
17593.469:0124:0200:trace:seh:dispatch_exception info[2]=00000000ffffffff
17593.469:0124:0200:trace:seh:dispatch_exception info[3]=0000000cdffd91e8
17593.469:0124:0200:trace:seh:dispatch_exception info[4]=000000006908ffa0
17593.469:0124:0200:trace:seh:dispatch_exception info[5]=000000014000b4fc
17593.469:0124:0200:warn:threadname:dispatch_exception Thread renamed to "JQ Worker 1 (Processor 3)"
17593.469:0124:0200:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17593.469:0124:0200:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17593.470:0124:0204:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17593.470:0124:0204:trace:seh:dispatch_exception info[0]=0000000000001000
17593.470:0124:0204:trace:seh:dispatch_exception info[1]=000000006918ff20
17593.470:0124:0204:trace:seh:dispatch_exception info[2]=00000000ffffffff
17593.470:0124:0204:trace:seh:dispatch_exception info[3]=0000000cdffd9250
17593.470:0124:0204:trace:seh:dispatch_exception info[4]=000000006918ffa0
17593.470:0124:0204:trace:seh:dispatch_exception info[5]=000000014000b4fc
17593.470:0124:0204:warn:threadname:dispatch_exception Thread renamed to "JQ Worker 2 (Processor 4)"
17593.470:0124:0204:trace:seh:call_vectored_handlers calling handler at 00006FFFFB4FB1C0 code=406d1388 flags=0
17593.470:0124:0204:trace:seh:call_vectored_handlers handler at 00006FFFFB4FB1C0 returned ffffffff
17593.590:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0xc000001d.
17593.590:0124:01ac:trace:seh:dispatch_exception code=c000001d flags=0 addr=000000015EA4348D ip=15ea4348d
17593.590:0124:01ac:warn:seh:dispatch_exception EXCEPTION_ILLEGAL_INSTRUCTION exception (code=c000001d) raised
17593.590:0124:01ac:trace:seh:dispatch_exception rax=000000006411cc18 rbx=0000000000000095 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.590:0124:01ac:trace:seh:dispatch_exception rsi=00000001568fb778 rdi=000000006411d850 rbp=000000006411cbb0 rsp=000000006411cb78
17593.590:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000020000
17593.590:0124:01ac:trace:seh:dispatch_exception r12=0000000000000002 r13=0000000000000003 r14=00000001568fb778 r15=0000000142c7f230
17593.590:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015F0ADAEA code=c000001d flags=0
17593.590:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015F0ADAEA returned ffffffff
17593.591:0124:01ac:warn:seh:dispatch_exception backtrace: --- Exception 0x80000003.
17593.591:0124:01ac:trace:seh:dispatch_exception code=80000003 flags=0 addr=000000015BD7E170 ip=15bd7e16f
17593.591:0124:01ac:trace:seh:dispatch_exception info[0]=000000006411d2f0
17593.591:0124:01ac:warn:seh:dispatch_exception EXCEPTION_BREAKPOINT exception (code=80000003) raised
17593.591:0124:01ac:trace:seh:dispatch_exception rax=000000006411d2f0 rbx=000000006411d6b8 rcx=00006ffffffb24c0 rdx=0000000000000080
17593.591:0124:01ac:trace:seh:dispatch_exception rsi=0000000000000003 rdi=000000006411d6a0 rbp=000000006411d2d0 rsp=000000006411d298
17593.591:0124:01ac:trace:seh:dispatch_exception r8=0000000000161800 r9=000000000026ae30 r10=0000000000000008 r11=0000000000000003
17593.591:0124:01ac:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000093 r14=0000000000000048 r15=0000000000000049
17593.591:0124:01ac:trace:seh:call_vectored_handlers calling handler at 000000015B2FAFD7 code=80000003 flags=0
17593.591:0124:01ac:trace:seh:call_vectored_handlers handler at 000000015B2FAFD7 returned ffffffff
17593.592:0124:0208:trace:seh:dispatch_exception code=406d1388 flags=0 addr=00006FFFFFC1CE87 ip=6fffffc1ce87
17593.592:0124:0208:trace:seh:dispatch_exception info[0]=0000000000001000
17593.592:0124:0208:trace:seh:dispatch_exception info[1]=000000014304e3a0
17593.592:0124:0208:trace:seh:dispatch_exception info[2]=00000000ffffffff
17593.592:0124:0208:trace:seh:dispatch_exception info[3]=