Skip to content

Instantly share code, notes, and snippets.

@benbrockn
Last active November 4, 2020 01:13
Show Gist options
  • Save benbrockn/01ca6c2d734ee6682e59b207836f02df to your computer and use it in GitHub Desktop.
Save benbrockn/01ca6c2d734ee6682e59b207836f02df to your computer and use it in GitHub Desktop.
SCP_Secret_Lab
======================
Proton: 1582308386 proton-4.11-13
SteamGameId: 700330
Command: ['/mnt/Data/Steam/steamapps/common/SCP Secret Laboratory/SCPSL.exe', '-steam']
Options: {'wined3d'}
======================
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
esync: up and running.
1493.333:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b430000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1493.348:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1493.349:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wineboot.exe" at 0x7fe5d8ac0000: builtin
1493.351:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1493.352:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7fe5d8910000: builtin
1493.352:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7fe5d8950000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1493.369:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1493.370:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\services.exe" at 0x400000: PE builtin
1493.371:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1493.372:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f5b6f700000: builtin
1493.372:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f5b6f840000: builtin
1493.373:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7f5b6f620000: builtin
1493.373:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1493.374:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\userenv.dll" at 0x7f5b6f5e0000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1493.396:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1493.397:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\plugplay.exe" at 0x400000: PE builtin
1493.398:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1493.399:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f8201e10000: builtin
1493.399:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f8201f60000: builtin
1493.400:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7f8201d40000: builtin
1493.405:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1493.452:0016:0017:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1493.453:0016:0017:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\winedevice.exe" at 0x400000: PE builtin
1493.455:0016:0017:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1493.455:0016:0017:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f4ca7840000: builtin
1493.455:0016:0017:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f4ca7990000: builtin
1493.456:0016:0017:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7f4ca7770000: builtin
1493.456:0016:0017:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0x67a00000: PE builtin
1493.463:0016:0017:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1493.472:0016:0019:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7f4ca70f0000: builtin
1493.473:0016:0019:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7f4ca70c0000: builtin
1493.473:0016:0019:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7f4ca72a0000: builtin
1493.473:0016:0019:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
1493.473:0016:0019:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 0x7f4ca7720000: builtin
1494.032:0016:0019:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
1494.032:0016:0019:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1495.214:0016:001d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\hidclass.sys" at 0x62c40000: PE builtin
1495.214:0016:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 0x7f4ca6a60000: builtin
1495.216:0016:001d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\hid.dll" at 0x64b80000: PE builtin
1495.222:001e:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1495.223:001e:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\winedevice.exe" at 0x400000: PE builtin
1495.225:001e:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1495.226:001e:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f605cf50000: builtin
1495.226:001e:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f605d090000: builtin
1495.226:001e:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7f605ce70000: builtin
1495.227:001e:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0x67a00000: PE builtin
1495.234:001e:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1495.241:001e:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 0x7f605ce20000: builtin
1495.247:001e:0028:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7f605c690000: builtin
1495.247:001e:0028:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7f605c670000: builtin
1495.247:001e:0028:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7f605c850000: builtin
1495.249:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7fe5d7d20000: builtin
1495.250:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7fe5d7c30000: builtin
1495.252:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7fe5d7980000: builtin
1495.252:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7fe5d79b0000: builtin
1495.252:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
1495.253:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1495.253:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
1495.253:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
1495.430:001e:0028:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
1495.430:001e:0028:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
1495.664:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
1495.667:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7fe5d7ed0000: builtin
1495.671:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\steam.exe" at 0x7eb60000: builtin
1495.673:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71240000: PE builtin
1495.674:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7ea70000: builtin
1495.674:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7eab0000: builtin
1495.675:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7e920000: builtin
1495.676:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7e850000: builtin
1495.677:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fdc0000: PE builtin
1495.679:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7e5f0000: builtin
1495.679:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7e630000: builtin
1495.679:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65200000: PE builtin
1495.684:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68c40000: PE builtin
1495.684:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64b40000: PE builtin
1495.684:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7d850000: builtin
1495.931:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6c0c0000: PE builtin
1495.939:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1495.940:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\explorer.exe" at 0x400000: PE builtin
1495.942:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1495.942:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7fdd7ae80000: builtin
1495.942:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7fdd7afd0000: builtin
1495.943:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7fdd7ace0000: builtin
1495.944:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7fdd7abf0000: builtin
1495.944:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1495.946:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7fdd7a940000: builtin
1495.946:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7fdd7a970000: builtin
Setting breakpad minidump AppID = 700330
Steam_SetMinidumpSteamID: Caching Steam ID: 76561197971327307 [API loaded no]
1495.971:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1495.972:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\explorer.exe" at 0x400000: PE builtin
1495.974:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1495.974:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7fcc00820000: builtin
1495.974:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7fcc00970000: builtin
1495.975:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7fcc00680000: builtin
1495.976:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7fcc005a0000: builtin
1495.976:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1495.978:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7fcc002e0000: builtin
1495.978:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7fcc00310000: builtin
1496.133:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
1496.133:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
1496.143:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
1496.143:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7fdd7a230000: builtin
1496.161:0008:0029:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a900000: PE builtin
1496.161:0008:0029:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7d270000: builtin
1496.164:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
1496.164:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
1496.166:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7fdd79420000: builtin
1496.170:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\oleaut32.dll" at 0x6a100000: PE builtin
1496.170:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0xda0000: PE builtin
1496.359:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
1496.359:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
1496.369:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
1496.369:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7fcbffbe0000: builtin
1496.381:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
1496.381:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
1496.383:002c:002d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7fcbfee10000: builtin
1496.387:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\oleaut32.dll" at 0x6a100000: PE builtin
1496.387:002c:002d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0x750000: PE builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
1496.406:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
1496.408:0033:0034:trace:loaddll:load_native_dll Loaded L"Z:\\mnt\\Data\\Steam\\steamapps\\common\\SCP Secret Laboratory\\SCPSL.exe" at 0x140000000: native
1496.414:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x71040000: PE builtin
1496.415:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f4163b90000: builtin
1496.415:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f4163be0000: builtin
1496.415:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7f4163c60000: builtin
1496.416:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x7f4163b80000: builtin
1496.416:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7f4163e20000: builtin
1496.417:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\bcrypt.dll" at 0x7f4163b50000: builtin
1496.417:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\crypt32.dll" at 0x7f4164090000: builtin
1496.417:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\WINTRUST.dll" at 0x7f4164290000: builtin
1496.418:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7f4163a80000: builtin
1496.418:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
1496.419:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
1496.419:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 0x6a100000: PE builtin
1496.421:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0x63140000: PE builtin
1496.422:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7f4163950000: builtin
1496.422:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 0x63800000: PE builtin
1496.423:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 0x6dd80000: PE builtin
1496.423:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 0x69380000: PE builtin
1496.423:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 0x6d580000: PE builtin
1496.424:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0x240000: native
1496.424:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0x61540000: PE builtin
1496.424:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 0x620c0000: PE builtin
1496.425:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 0x68ac0000: PE builtin
1496.425:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0x69b80000: PE builtin
1496.426:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0x70580000: PE builtin
1496.426:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 0x6a4c0000: PE builtin
1496.426:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0x180000000: native
1496.427:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\VCRUNTIME140_1.dll" at 0x260000: native
1496.660:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
1496.670:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 0x6e340000: PE builtin
1496.671:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 0x6b880000: PE builtin
1496.722:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
1496.723:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
1496.723:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7f41621a0000: builtin
1496.746:0033:0034:trace:seh:NtRaiseException code=c000008e flags=0 addr=0x7b4531ad ip=7b4531ad tid=0034
1496.746:0033:0034:trace:seh:NtRaiseException rax=000000000022fca0 rbx=00000001401cf9a8 rcx=000000000022fca0 rdx=0000000000000000
1496.746:0033:0034:trace:seh:NtRaiseException rsi=000000007bc5bb90 rdi=00000001400c1000 rbp=000000000022fd50 rsp=000000000022fc80
1496.746:0033:0034:trace:seh:NtRaiseException r8=0000000000000000 r9=0000000000000000 r10=000000000010f120 r11=000000000010f120
1496.746:0033:0034:trace:seh:NtRaiseException r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
1496.746:0033:0034:trace:seh:call_vectored_handlers calling handler at 0x1403e9ba7 code=c000008e flags=0
1496.746:0033:0034:trace:seh:call_vectored_handlers handler at 0x1403e9ba7 returned ffffffff
1496.843:0033:0034:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
1496.843:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7f41620d0000: builtin
1496.856:0033:0034:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x7f4161cf0000: builtin
1501.656:0016:001a:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
1501.656:0016:001a:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
1501.658:0016:001a:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
pid 7366 != 7365, skipping destruction (fork without exec?)
======================
Proton: 1602709129 proton-5.13-1b
SteamGameId: 700330
Command: ['/mnt/Data/Steam/steamapps/common/SCP Secret Laboratory/SCPSL.exe', '-steam']
Options: {'forcelgadd'}
======================
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
esync: up and running.
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
408.201:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
408.202:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
408.202:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
408.202:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
408.202:0028:002c:trace:seh:check_bpf_jit_enable enabled 0x31.
408.204:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F72D7C80000: builtin
408.204:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
408.204:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F72D7E90000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
408.235:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
408.236:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
408.236:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
408.236:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
408.236:0030:0034:trace:seh:install_bpf Seccomp filters already installed.
408.237:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F4BD1740000: builtin
408.237:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
408.237:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F4BD1960000: builtin
408.238:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
408.238:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
408.238:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
408.239:0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 0000000067D00000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
408.273:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
408.274:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
408.274:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
408.274:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 0000000000400000: builtin
408.274:003c:0040:trace:seh:install_bpf Seccomp filters already installed.
408.276:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F6FB53A0000: builtin
408.276:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
408.276:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F6FB55C0000: builtin
408.276:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
408.277:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
408.277:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
408.278:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F6FB4F50000: builtin
408.278:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F6FB5110000: builtin
408.317:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
408.317:003c:0040:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
408.331:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
408.332:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
408.332:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
408.332:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
408.332:0058:005c:trace:seh:install_bpf Seccomp filters already installed.
408.334:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FD580650000: builtin
408.334:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
408.334:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FD580860000: builtin
408.334:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FD580550000: builtin
408.334:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
408.352:0058:005c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
408.376:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xf9f7b0,30,(nil))
408.379:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 00007FD5804F0000: builtin
408.379:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
408.379:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
408.382:0058:0064:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xd8ef70,30,(nil))
408.386:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 0000000062C40000: builtin
408.386:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 000000006B3C0000: builtin
408.387:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 0000000064B80000: builtin
408.389:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x11af980,30,(nil))
409.589:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0x15cf360,30,(nil))
409.590:0058:0064:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 00007FD572B90000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
409.630:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
409.630:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
409.630:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
409.630:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 0000000000400000: builtin
409.630:0088:008c:trace:seh:install_bpf Seccomp filters already installed.
409.632:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007FBD95280000: builtin
409.632:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
409.632:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007FBD954A0000: builtin
409.632:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 00007FBD95190000: builtin
409.633:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0000000067A00000: builtin
409.650:0088:008c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
409.653:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,0,0xf9f7b0,30,(nil))
409.656:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 00007FBD95130000: builtin
409.658:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
409.658:0088:0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
409.722:0088:0098:trace:seh:NtQueryInformationThread (0x64,0,0xf9f750,30,(nil))
409.819:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007FBD94A70000: builtin
409.819:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007FBD94C30000: builtin
409.822:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F72D7060000: builtin
409.823:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
409.824:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
409.824:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
409.824:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F72D6DE0000: builtin
409.824:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
409.824:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
409.824:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
409.825:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F72D7210000: builtin
409.838:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
409.838:0088:00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
409.848:0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
409.850:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
409.851:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
409.851:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
409.852:0020:0024:trace:loaddll:build_module Loaded L"C:\\Program Files (x86)\\Steam\\steam.exe" at 7EB50000: builtin
409.854:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9A0000: builtin
409.854:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
409.854:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EA90000: builtin
409.854:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E830000: builtin
409.855:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
409.856:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
409.856:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
409.856:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E610000: builtin
409.856:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
409.862:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
409.862:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
409.862:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DC00000: builtin
409.894:0020:0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
409.898:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
409.898:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
409.899:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
409.899:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
409.899:00a8:00ac:trace:seh:check_bpf_jit_enable enabled 0x31.
409.900:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F76EF170000: builtin
409.900:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
409.900:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F76EF390000: builtin
409.901:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F76EEFB0000: builtin
409.901:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
409.903:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
409.903:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
409.903:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F76EED30000: builtin
Setting breakpad minidump AppID = 700330
Steam_SetMinidumpSteamID: Caching Steam ID: 76561197971327307 [API loaded no]
409.939:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
409.939:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
409.942:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F76EEA80000: builtin
410.023:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
410.023:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
410.023:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F76ED5C0000: builtin
410.027:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
410.027:00a8:00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000DB0000: builtin
410.030:0020:00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at F5F40000: builtin
410.032:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
410.032:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
410.032:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
410.033:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 0000000000400000: builtin
410.033:00bc:00c0:trace:seh:check_bpf_jit_enable enabled 0x31.
410.034:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F3A8A4F0000: builtin
410.034:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
410.034:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F3A8A710000: builtin
410.034:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F3A8A330000: builtin
410.035:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
410.036:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
410.036:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
410.036:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F3A8A0B0000: builtin
410.067:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
410.067:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
410.070:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F3A89E00000: builtin
410.086:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
410.086:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
410.086:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F3A889E0000: builtin
410.090:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 000000006A100000: builtin
410.090:00bc:00c0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0000000000BA0000: builtin
ERROR: ld.so: object '/home/matt/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
410.107:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 000000007BC00000: builtin
410.107:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 000000007B000000: builtin
410.107:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 000000007B610000: builtin
410.109:00cc:00d0:trace:loaddll:build_module Loaded L"Z:\\mnt\\Data\\Steam\\steamapps\\common\\SCP Secret Laboratory\\SCPSL.exe" at 0000000140000000: native
410.109:00cc:00d0:trace:seh:check_bpf_jit_enable enabled 0x31.
410.111:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 00007F595EB40000: builtin
410.111:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 0000000061900000: builtin
410.112:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 00007F595ED60000: builtin
410.113:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 000000006FBC0000: builtin
410.114:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 0000000065780000: builtin
410.114:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 000000006A700000: builtin
410.114:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 00007F595E5E0000: builtin
410.114:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 00007F595E7A0000: builtin
410.115:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\bcrypt.dll" at 00007F595E5B0000: builtin
410.115:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\crypt32.dll" at 00007F595EA20000: builtin
410.115:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\WINTRUST.dll" at 0000000062540000: builtin
410.115:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 0000000065000000: builtin
410.116:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLEAUT32.dll" at 000000006A100000: builtin
410.118:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0000000063140000: builtin
410.118:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 0000000063800000: builtin
410.118:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 000000006DD80000: builtin
410.119:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 0000000069380000: builtin
410.119:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 000000006D580000: builtin
410.119:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0000000000230000: native
410.120:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0000000061540000: builtin
410.120:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 00000000620C0000: builtin
410.120:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 0000000068AC0000: builtin
410.121:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0000000069B80000: builtin
410.121:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0000000070580000: builtin
410.122:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 000000006A4C0000: builtin
410.122:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0000000180000000: native
410.122:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\VCRUNTIME140_1.dll" at 000000006FF40000: builtin
410.159:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 000000006BEC0000: builtin
410.161:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 000000006E340000: builtin
410.161:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 000000006B880000: builtin
410.206:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 0000000064940000: builtin
410.206:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0000000068A40000: builtin
410.206:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 00007F595D210000: builtin
410.229:00cc:00d0:trace:seh:dispatch_exception code=c000008e flags=0 addr=000000007B010E0E ip=7b010e0e tid=00d0
410.229:00cc:00d0:trace:seh:dispatch_exception rax=000000007b010dc0 rbx=00000000401cf9a8 rcx=000000000021f910 rdx=0000000000000000
410.229:00cc:00d0:trace:seh:dispatch_exception rsi=000000007bc287f0 rdi=00000000400c1000 rbp=000000000021fa18 rsp=000000000021f8f0
410.229:00cc:00d0:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000000008 r11=0000000000000246
410.229:00cc:00d0:trace:seh:dispatch_exception r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
410.229:00cc:00d0:trace:seh:call_vectored_handlers calling handler at 00000001403E9BA7 code=c000008e flags=0
410.229:00cc:00d0:trace:seh:call_vectored_handlers handler at 00000001403E9BA7 returned ffffffff
410.229:00cc:00d0:trace:seh:NtSetInformationThread (0xfffffffffffffffe,17,(nil),0)
410.323:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 00007F595D130000: builtin
410.342:00cc:00d0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 0000000062600000: builtin
413.384:003c:0078:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x13afc50,4,(nil))
414.658:0030:0048:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xfafc50,4,(nil))
416.326:0058:0084:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x17dfda0,4,(nil))
416.326:003c:0074:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x119fda0,4,(nil))
416.326:003c:0054:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xf8fda0,4,(nil))
416.327:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B010E0E ip=7b010e0e tid=0068
416.327:0058:0068:trace:seh:dispatch_exception rax=000000007b010dc0 rbx=0000000000f9f1a8 rcx=0000000000f9eed0 rdx=0000000000000000
416.327:0058:0068:trace:seh:dispatch_exception rsi=00000000000000cc rdi=00000000000000be rbp=0000000000000000 rsp=0000000000f9eeb0
416.327:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=00000000008eaba8 r11=0000000000f9ecd8
416.327:0058:0068:trace:seh:dispatch_exception r12=0000000000f9f1a8 r13=00000000008ecd30 r14=0000000000000000 r15=00000000ffba0000
416.327:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
416.327:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
416.327:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636150 code=6ba flags=0
416.327:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636150 returned 0
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b010e0e rsp f9eeb0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 10dc0-10e47
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A1394 flags 0 prolog 0x11 bytes function 000000007B010DC0-000000007B010E47
416.327:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp f9ef90
416.327:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9e54 rsp f9efc0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
416.327:0088:0098:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xf9fda0,4,(nil))
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a2156e rsp f9f010
416.327:0058:0068:trace:seh:dump_unwind_info **** func 213b0-215d0
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32DE0 flags 0 prolog 0xe bytes function 0000000067A213B0-0000000067A215D0
416.327:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
416.327:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000F9F080 rsp f9f370 handler 0000000067A20E70
416.327:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A20E70 (rec=0000000000F9EED0, frame=0000000000F9F080 context=0000000000F9E400, dispatch=0000000000F9E2D0)
416.327:0058:0068:trace:seh:call_teb_handler handler at 0000000067A20E70 returned 1
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19865 rsp f9f370
416.327:0058:0068:trace:seh:dump_unwind_info **** func 19790-19876
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A329DC flags 0 prolog 0x8 bytes function 0000000067A19790-0000000067A19876
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
416.327:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000F9F3A0 rsp f9f4e0 handler 0000000067A22820
416.327:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22820 (rec=0000000000F9EED0, frame=0000000000F9F3A0 context=0000000000F9E400, dispatch=0000000000F9E2D0)
416.327:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000F9F3A0 target_ip=0000000067A227B6 rip=000000007bc5ec32
416.327:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000f9f080 rcx=0000000000f9dcd0 rdx=0000000067a227b6
416.327:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000f9e9d0 rdi=0000000000f9e400 rbp=0000000000f9d780 rsp=0000000000f9d600
416.327:0058:0068:trace:seh:RtlUnwindEx r8=0000000000f9eed0 r9=0000000067a227f0 r10=0000000000f9e0e0 r11=00000000000244f0
416.327:0058:0068:trace:seh:RtlUnwindEx r12=0000000000f9eed0 r13=0000000000f9dcd0 r14=0000000000f9f3a0 r15=0000000000f9eed0
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5ec32 rsp f9d600
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5ebe0-5f4ae
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89778 flags 0 prolog 0x13 bytes function 000000007BC5EBE0-000000007BC5F4AE
416.327:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp f9dca0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5f4b0-5f4d8
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89790 flags 0 prolog 0x7 bytes function 000000007BC5F4B0-000000007BC5F4D8
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a227b6 rsp f9e1b0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 2279c-227b8
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32E8C flags 0 prolog 0x8 bytes function 0000000067A2279C-0000000067A227B8
416.327:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a227e9 rsp f9e1e0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 227c0-227ea
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32E98 flags 0 prolog 0x4 bytes function 0000000067A227C0-0000000067A227EA
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22874 rsp f9e210
416.327:0058:0068:trace:seh:dump_unwind_info **** func 22820-22875
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32EA8 flags 0 prolog 0xa bytes function 0000000067A22820-0000000067A22875
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5e34f rsp f9e260
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5e080-5e5c1
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89738 flags 0 prolog 0x13 bytes function 000000007BC5E080-000000007BC5E5C1
416.327:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5e69e rsp f9e920
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5e5d0-5e909
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89750 flags 0 prolog 0xe bytes function 000000007BC5E5D0-000000007BC5E909
416.327:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5c938 rsp f9e9b0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5c8d0-5c945
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC896B8 flags 0 prolog 0x7 bytes function 000000007BC5C8D0-000000007BC5C945
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b010e0e rsp f9eeb0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 10dc0-10e47
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A1394 flags 0 prolog 0x11 bytes function 000000007B010DC0-000000007B010E47
416.327:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp f9ef90
416.327:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9e54 rsp f9efc0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 9d60-9e55
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27328 flags 0 prolog 0x6 bytes function 000000006FBC9D60-000000006FBC9E55
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rsi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a2156e rsp f9f010
416.327:0058:0068:trace:seh:dump_unwind_info **** func 213b0-215d0
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32DE0 flags 0 prolog 0xe bytes function 0000000067A213B0-0000000067A215D0
416.327:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
416.327:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000F9F080 handler 0000000067A20E70
416.327:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A20E70 (rec=0000000000F9EED0, frame=0000000000F9F080 context=0000000000F9DCD0, dispatch=0000000000F9D690)
416.327:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A20E70 returned 1
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19865 rsp f9f370
416.327:0058:0068:trace:seh:dump_unwind_info **** func 19790-19876
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A329DC flags 0 prolog 0x8 bytes function 0000000067A19790-0000000067A19876
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
416.327:0058:0068:trace:seh:RtlRestoreContext returning to 67a227b6 stack f9f370
416.327:003c:0050:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xd7fda0,4,(nil))
416.327:0058:0068:trace:seh:dispatch_exception code=6ba flags=0 addr=000000007B010E0E ip=7b010e0e tid=0068
416.327:0058:0068:trace:seh:dispatch_exception rax=000000007b010dc0 rbx=0000000000f9f1a8 rcx=0000000000f9eec0 rdx=0000000000000000
416.327:0058:0068:trace:seh:dispatch_exception rsi=00000000000000d2 rdi=00000000008e3950 rbp=0000000000000000 rsp=0000000000f9eea0
416.327:0058:0068:trace:seh:dispatch_exception r8=0000000000000000 r9=0000000000000000 r10=0000000000010348 r11=0000000000f9ef18
416.327:0058:0068:trace:seh:dispatch_exception r12=0000000000f9f1a8 r13=00000000008eaa70 r14=0000000000000000 r15=00000000ffba0000
416.327:0058:0068:trace:seh:call_vectored_handlers calling handler at 0000000067A0D3E0 code=6ba flags=0
416.327:0058:0068:trace:seh:call_vectored_handlers handler at 0000000067A0D3E0 returned 0
416.327:0058:0068:trace:seh:call_vectored_handlers calling handler at 000000007B636150 code=6ba flags=0
416.327:0058:0068:trace:seh:call_vectored_handlers handler at 000000007B636150 returned 0
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 7b010e0e rsp f9eea0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 10dc0-10e47
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A1394 flags 0 prolog 0x11 bytes function 000000007B010DC0-000000007B010E47
416.327:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fc067b1 rsp f9ef80
416.327:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 6fbc9ce6 rsp f9efb0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a214ad rsp f9f010
416.327:0058:0068:trace:seh:dump_unwind_info **** func 213b0-215d0
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32DE0 flags 0 prolog 0xe bytes function 0000000067A213B0-0000000067A215D0
416.327:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
416.327:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000F9F080 rsp f9f370 handler 0000000067A20E70
416.327:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A20E70 (rec=0000000000F9EEC0, frame=0000000000F9F080 context=0000000000F9E3F0, dispatch=0000000000F9E2C0)
416.327:0058:0068:trace:seh:call_teb_handler handler at 0000000067A20E70 returned 1
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 1 rip 67a19865 rsp f9f370
416.327:0058:0068:trace:seh:dump_unwind_info **** func 19790-19876
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A329DC flags 0 prolog 0x8 bytes function 0000000067A19790-0000000067A19876
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
416.327:0058:0068:trace:seh:call_stack_handlers found wine frame 0000000000F9F3A0 rsp f9f4e0 handler 0000000067A22820
416.327:0058:0068:trace:seh:call_teb_handler calling TEB handler 0000000067A22820 (rec=0000000000F9EEC0, frame=0000000000F9F3A0 context=0000000000F9E3F0, dispatch=0000000000F9E2C0)
416.327:0058:0068:trace:seh:RtlUnwindEx code=6ba flags=2 end_frame=0000000000F9F3A0 target_ip=0000000067A227B6 rip=000000007bc5ec32
416.327:0058:0068:trace:seh:RtlUnwindEx rax=00000000ffba0000 rbx=0000000000f9f080 rcx=0000000000f9dcc0 rdx=0000000067a227b6
416.327:0058:0068:trace:seh:RtlUnwindEx rsi=0000000000f9e9c0 rdi=0000000000f9e3f0 rbp=0000000000f9d770 rsp=0000000000f9d5f0
416.327:0058:0068:trace:seh:RtlUnwindEx r8=0000000000f9eec0 r9=0000000067a227f0 r10=000000000000000a r11=0000000000000293
416.327:0058:0068:trace:seh:RtlUnwindEx r12=0000000000f9eec0 r13=0000000000f9dcc0 r14=0000000000f9f3a0 r15=0000000000f9eec0
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5ec32 rsp f9d5f0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5ebe0-5f4ae
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89778 flags 0 prolog 0x13 bytes function 000000007BC5EBE0-000000007BC5F4AE
416.327:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x658,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5f4cf rsp f9dc90
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5f4b0-5f4d8
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89790 flags 0 prolog 0x7 bytes function 000000007BC5F4B0-000000007BC5F4D8
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x508,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a227b6 rsp f9e1a0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 2279c-227b8
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32E8C flags 0 prolog 0x8 bytes function 0000000067A2279C-0000000067A227B8
416.327:0058:0068:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x20,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a227e9 rsp f9e1d0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 227c0-227ea
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32E98 flags 0 prolog 0x4 bytes function 0000000067A227C0-0000000067A227EA
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a22874 rsp f9e200
416.327:0058:0068:trace:seh:dump_unwind_info **** func 22820-22875
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32EA8 flags 0 prolog 0xa bytes function 0000000067A22820-0000000067A22875
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5e34f rsp f9e250
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5e080-5e5c1
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89738 flags 0 prolog 0x13 bytes function 000000007BC5E080-000000007BC5E5C1
416.327:0058:0068:trace:seh:dump_unwind_info 0x13: subq $0x678,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xc: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0xb: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r14
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r15
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5e69e rsp f9e910
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5e5d0-5e909
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC89750 flags 0 prolog 0xe bytes function 000000007BC5E5D0-000000007BC5E909
416.327:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x50,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbp
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r13
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r14
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7bc5c938 rsp f9e9a0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 5c8d0-5c945
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007BC896B8 flags 0 prolog 0x7 bytes function 000000007BC5C8D0-000000007BC5C945
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x4f8,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 7b010e0e rsp f9eea0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 10dc0-10e47
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000007B0A1394 flags 0 prolog 0x11 bytes function 000000007B010DC0-000000007B010E47
416.327:0058:0068:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0xa: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x9: pushq %rdi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fc067b1 rsp f9ef80
416.327:0058:0068:trace:seh:dump_unwind_info **** func 467a0-467e5
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC29350 flags 0 prolog 0x4 bytes function 000000006FC067A0-000000006FC067E5
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 6fbc9ce6 rsp f9efb0
416.327:0058:0068:trace:seh:dump_unwind_info **** func 9c60-9ce7
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 000000006FC27314 flags 0 prolog 0x7 bytes function 000000006FBC9C60-000000006FBC9CE7
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: subq $0x40,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x3: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rdi
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a214ad rsp f9f010
416.327:0058:0068:trace:seh:dump_unwind_info **** func 213b0-215d0
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A32DE0 flags 0 prolog 0xe bytes function 0000000067A213B0-0000000067A215D0
416.327:0058:0068:trace:seh:dump_unwind_info 0xe: subq $0x330,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x7: pushq %rbx
416.327:0058:0068:trace:seh:dump_unwind_info 0x6: pushq %rsi
416.327:0058:0068:trace:seh:dump_unwind_info 0x5: pushq %rdi
416.327:0058:0068:trace:seh:dump_unwind_info 0x4: pushq %r12
416.327:0058:0068:trace:seh:dump_unwind_info 0x2: pushq %r13
416.327:0058:0068:trace:seh:RtlUnwindEx found builtin frame 0000000000F9F080 handler 0000000067A20E70
416.327:0058:0068:trace:seh:call_teb_unwind_handler calling TEB handler 0000000067A20E70 (rec=0000000000F9EEC0, frame=0000000000F9F080 context=0000000000F9DCC0, dispatch=0000000000F9D680)
416.327:0058:0068:trace:seh:call_teb_unwind_handler handler at 0000000067A20E70 returned 1
416.327:0058:0068:trace:seh:RtlVirtualUnwind type 2 rip 67a19865 rsp f9f370
416.327:0058:0068:trace:seh:dump_unwind_info **** func 19790-19876
416.327:0058:0068:trace:seh:dump_unwind_info unwind info at 0000000067A329DC flags 0 prolog 0x8 bytes function 0000000067A19790-0000000067A19876
416.327:0058:0068:trace:seh:dump_unwind_info 0x8: subq $0x160,%rsp
416.327:0058:0068:trace:seh:dump_unwind_info 0x1: pushq %rbx
416.327:0058:0068:trace:seh:RtlRestoreContext returning to 67a227b6 stack f9f370
416.328:0058:0070:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x11afda0,4,(nil))
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
416.328:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000017
416.329:0058:0068:fixme:plugplay:pdo_pnp_dispatch Unhandled function 00000002
416.329:0058:007c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x13bfda0,4,(nil))
416.329:0058:0080:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x15cfda0,4,(nil))
416.330:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
416.332:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
416.333:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
416.333:0058:0068:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
416.334:0058:0068:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xf9fda0,4,(nil))
416.428:0030:0090:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x15dfda0,4,(nil))
416.428:0030:009c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x17efda0,4,(nil))
416.428:0030:00e4:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x202fda0,4,(nil))
416.428:0030:0044:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xd9fda0,4,(nil))
416.521:0030:0060:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x11bfda0,4,(nil))
416.521:0030:006c:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0x13cfda0,4,(nil))
416.521:0030:0038:trace:seh:NtQueryInformationThread (0xfffffffffffffffe,12,0xb8fda0,4,(nil))
pid 5099 != 5098, skipping destruction (fork without exec?)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment