Skip to content

Instantly share code, notes, and snippets.

@hadallen
Created April 19, 2020 01:35
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save hadallen/336ffcf1f8ae7e73024898306bb6ac01 to your computer and use it in GitHub Desktop.
Save hadallen/336ffcf1f8ae7e73024898306bb6ac01 to your computer and use it in GitHub Desktop.
steam-261550.log
======================
Proton: 1586834466 5.6-GE-1-6-ga6d50e7
SteamGameId: 261550
Command: ['/run/media/hadallen/backup1/Program Files/SteamLibrary/steamapps/common/Mount & Blade II Bannerlord/bin/Win64_Shipping_Client/TaleWorlds.MountAndBlade.Launcher.exe']
Options: {'forcelgadd'}
======================
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
esync: up and running.
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
684.187:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
684.187:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
684.188:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7feeb7260000: builtin
684.190:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\wineboot.exe" at 0x400000: PE builtin
684.194:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7feeb7090000: builtin
684.194:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7feeb70d0000: builtin
684.195:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7feeb6f70000: builtin
684.214:000a:000b:fixme:winediag:__wine_start_process Wine Staging 5.6 is a testing version containing experimental patches.
684.214:000a:000b:fixme:winediag:__wine_start_process Please mention your exact version when filing bug reports on winehq.org.
684.216:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7feeb6db0000: builtin
684.219:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
684.220:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
684.220:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
684.220:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7feeb6b30000: builtin
684.220:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
684.225:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
684.225:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
684.397:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
684.397:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
684.397:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7f67b1d70000: builtin
684.399:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\services.exe" at 0x400000: PE builtin
684.402:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f67b1ba0000: builtin
684.402:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f67b1bf0000: builtin
684.404:000c:000d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7f67b1a90000: builtin
684.404:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
684.405:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
684.405:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
684.406:000c:000d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\userenv.dll" at 0x67d00000: PE builtin
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
684.450:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
684.450:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
684.450:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7efcccaf0000: builtin
684.451:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\winedevice.exe" at 0x400000: PE builtin
684.453:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7efccc920000: builtin
684.453:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7efccc970000: builtin
684.455:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7efccc850000: builtin
684.455:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0x67a00000: PE builtin
684.456:000f:0010:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7efccc720000: builtin
684.468:000f:0010:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
684.495:000f:0015:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\win32k.sys" at 0x64fc0000: PE builtin
684.498:000f:0015:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\dxgkrnl.sys" at 0x6a4c0000: PE builtin
684.500:000f:0015:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\dxgmms1.sys" at 0x6f4c0000: PE builtin
684.508:000f:0014:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 0x7efccc6c0000: builtin
684.511:000f:0014:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
684.511:000f:0014:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
684.536:0017:0018:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
684.536:0017:0018:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
684.537:0017:0018:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7f55411a0000: builtin
684.538:0017:0018:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\plugplay.exe" at 0x400000: PE builtin
684.541:0017:0018:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f5540fd0000: builtin
684.541:0017:0018:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f5541020000: builtin
684.542:0017:0018:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7f5540ec0000: builtin
684.555:0017:0018:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
684.585:001c:001d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
684.585:001c:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
684.586:001c:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7fa9c8990000: builtin
684.587:001c:001d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\winedevice.exe" at 0x400000: PE builtin
684.589:001c:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7fa9c87c0000: builtin
684.589:001c:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7fa9c8800000: builtin
684.590:001c:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\msvcrt.dll" at 0x7fa9c86f0000: builtin
684.591:001c:001d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 0x67a00000: PE builtin
684.592:001c:001d:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7fa9c85c0000: builtin
684.605:001c:001d:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
684.614:001c:0020:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\win32k.sys" at 0x64fc0000: PE builtin
684.616:001c:0020:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\dxgkrnl.sys" at 0x6a4c0000: PE builtin
684.619:001c:0020:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\dxgmms1.sys" at 0x6f4c0000: PE builtin
684.626:001c:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 0x7fa9c8560000: builtin
684.627:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
684.628:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
684.638:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\hidclass.sys" at 0x62c40000: PE builtin
684.638:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 0x6b3c0000: PE builtin
684.642:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\hid.dll" at 0x64b80000: PE builtin
684.648:001c:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7fa9c3e70000: builtin
684.648:001c:001f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7fa9c80e0000: builtin
684.650:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
684.650:001c:001f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
684.702:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
684.703:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x62600000: PE builtin
684.703:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\comctl32.dll" at 0x6e6c0000: PE builtin
684.703:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\aclui.dll" at 0x330000: PE builtin
684.703:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7feeb60c0000: builtin
684.710:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
684.710:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
684.710:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7f067a510000: builtin
684.711:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\explorer.exe" at 0x400000: PE builtin
684.713:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f067a340000: builtin
684.713:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f067a390000: builtin
684.714:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7f067a1a0000: builtin
684.715:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7f067a080000: builtin
684.715:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
684.718:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
684.718:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
684.718:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7f0679de0000: builtin
684.731:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
684.731:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
684.741:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7f0679d00000: builtin
685.039:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7feeb5fe0000: builtin
685.045:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
685.045:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
685.047:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x62600000: PE builtin
685.047:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\comctl32.dll" at 0x6e6c0000: PE builtin
685.047:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\aclui.dll" at 0x380000: PE builtin
685.047:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7f0678590000: builtin
685.050:0024:0025:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\uxtheme.dll" at 0x7f0678530000: builtin
685.058:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\oleaut32.dll" at 0x6a100000: PE builtin
685.058:0024:0025:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0xfc0000: PE builtin
685.185:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\uxtheme.dll" at 0x7feeb5670000: builtin
685.188:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\mpr.dll" at 0x6d9c0000: PE builtin
685.189:000a:000b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ws2_32.dll" at 0x7feeb5630000: builtin
685.189:000a:000b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\wininet.dll" at 0x6b2c0000: PE builtin
685.194:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
685.194:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b420000: builtin
685.194:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7eb60000: builtin
685.196:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\steam.exe" at 0x7eb20000: builtin
685.199:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7ea20000: builtin
685.199:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7ea70000: builtin
685.200:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7e8e0000: builtin
685.202:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7e7e0000: builtin
685.202:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fdc0000: PE builtin
685.204:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65980000: PE builtin
685.204:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a900000: PE builtin
685.204:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7e5a0000: builtin
685.204:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65200000: PE builtin
685.209:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68c40000: PE builtin
685.210:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64b40000: PE builtin
685.211:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6c0c0000: PE builtin
685.212:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x62800000: PE builtin
685.212:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\comctl32.dll" at 0x6e8c0000: PE builtin
685.212:0008:0009:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\aclui.dll" at 0x330000: PE builtin
685.212:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7db70000: builtin
685.232:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7dab0000: builtin
685.378:0008:0009:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\uxtheme.dll" at 0x7d280000: builtin
Setting breakpad minidump AppID = 261550
Steam_SetMinidumpSteamID: Caching Steam ID: 76561197984605748 [API loaded no]
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
685.606:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
685.606:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
685.607:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7f6c12c20000: builtin
685.609:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\TaleWorlds.MountAndBlade.Launcher.exe" at 0x140000000: native
685.611:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\mscoree.dll" at 0x6427ee50000: native
685.619:002a:002b:fixme:heap:RtlSetHeapInformation 0x870000 0 0x52e360 4 stub
685.623:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f6c12850000: builtin
685.623:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ADVAPI32.dll" at 0x7f6c128a0000: builtin
685.630:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\mscoreei.dll" at 0x180000000: native
685.642:002a:002b:fixme:ntdll:EtwEventRegister ({319dc449-ada5-50f7-428e-957db6791668}, 0x1800183e0, 0x18008ffa0, 0x18008ffc0) stub.
685.643:002a:002b:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 0x1800663bd, 28) stub
685.652:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7f6c126b0000: builtin
685.653:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7f6c12590000: builtin
685.657:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
685.658:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
685.658:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
685.658:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7f6c12300000: builtin
685.658:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\SHLWAPI.dll" at 0x68a40000: PE builtin
685.664:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
685.664:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
685.671:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll" at 0x6c100000: PE builtin
685.755:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\MSVCR120_CLR0400.dll" at 0x16a0000: native
685.755:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\clr.dll" at 0xcb0000: native
685.779:002a:002b:fixme:reg:GetEnabledXStateFeatures
685.780:002a:002b:fixme:reg:GetEnabledXStateFeatures
685.781:002a:002b:fixme:ntdll:EtwEventRegister ({319dc449-ada5-50f7-428e-957db6791668}, 0x11ceff0, 0x15ff240, 0x15ff260) stub.
685.784:002a:002b:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 0x13fd83c, 28) stub
685.791:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll" at 0x6ff80000: PE builtin
685.793:002a:002b:fixme:kernelbase:QuirkIsEnabled3 (000000000052EE90, 00000000FFFFFFFF) stub!
685.803:002a:002b:fixme:heap:GetNumaHighestNodeNumber semi-stub: 000000000052F708
685.807:002a:002b:fixme:ntdll:EtwEventRegister ({e13c0d23-ccbc-4e12-931b-d9cc2eee27e4}, 0x10e4350, 0x15f40d0, 0x1602d78) stub.
685.807:002a:002b:fixme:ntdll:EtwEventRegister ({763fd754-7086-4dfe-95eb-c01a46faf4ca}, 0x10e4350, 0x15f4890, 0x15f4e68) stub.
685.807:002a:002b:fixme:ntdll:EtwEventRegister ({a669021c-c450-4609-a035-5af59af4df18}, 0x10e4350, 0x1601570, 0x1602d88) stub.
685.807:002a:002b:fixme:ntdll:EtwEventRegister ({cc2bcbba-16b6-4cf3-8990-d74c2e8af500}, 0x10e4350, 0x15f4220, 0x1602d90) stub.
685.819:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\combase.dll" at 0x67600000: PE builtin
685.820:002a:002b:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\combase.dll" : builtin
685.827:002a:002b:fixme:wer:WerRegisterRuntimeExceptionModule (L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\mscordacwks.dll", 0xcb0000) stub!
685.834:002a:002b:fixme:ntdll:NtQuerySystemInformation info_class SYSTEM_PERFORMANCE_INFORMATION
685.889:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\assembly\\NativeImages_v4.0.30319_64\\mscorlib\\7e819bac8c8ac8292aff75385ae8b0db\\mscorlib.ni.dll" at 0x64478000000: native
685.892:002a:002b:trace:seh:RtlInstallFunctionTableCallback 643f8440023 643f8440020 65504 0xd762f0 0xc5a330 L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\mscordacwks.dll"
685.973:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7f6c12020000: builtin
686.227:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\api-ms-win-core-winrt-l1-1-0.dll" at 0x63fc0000: PE builtin
686.229:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\combase.dll" at 0x67600000: PE builtin
686.230:002a:002b:trace:seh:RtlInstallFunctionTableCallback 1a87a453 17d0000 77824 0x1115690 0x1a87a451 L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\mscordacwks.dll"
686.229:002a:002d:err:ole:CoGetContextToken apartment not initialised
686.235:002a:002b:trace:seh:RtlInstallFunctionTableCallback 643f8480023 643f8480020 65504 0xd762f0 0xc5a330 L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\mscordacwks.dll"
686.237:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-core-xstate-l2-1-0.dll" at 0x62540000: PE builtin
686.237:002a:002b:fixme:reg:GetEnabledXStateFeatures
686.243:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\clrjit.dll" at 0x1aa10000: native
686.244:002a:002b:fixme:ntdll:EtwEventRegister ({319dc449-ada5-50f7-428e-957db6791668}, 0x1aaf2bc0, 0x1ab1b8a0, 0x1ab1b8c0) stub.
686.245:002a:002b:fixme:ntdll:EtwEventSetInformation (deadbeef, 2, 0x1ab07e91, 28) stub
686.246:002a:002b:fixme:path:parse_url failed to parse L"TaleWorlds.Starter.Library"
686.277:002a:002b:fixme:path:parse_url failed to parse L"netstandard"
686.286:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\bcrypt.dll" at 0x7f6c11670000: builtin
686.291:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\crypt32.dll" at 0x7f6c11570000: builtin
686.292:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rsaenh.dll" at 0x66500000: PE builtin
686.319:002a:002b:fixme:nls:LCIDToLocaleName unsupported flags 8000000
686.320:002a:002b:fixme:nls:get_dummy_preferred_ui_language (0x8 0x52d9c0 (nil) 0x52d9c4) returning a dummy value (current locale)
686.320:002a:002b:fixme:nls:get_dummy_preferred_ui_language (0x8 0x52d9c0 0x1a882eb0 0x52d9c4) returning a dummy value (current locale)
686.340:002a:002b:fixme:path:parse_url failed to parse L""
686.364:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\oleaut32.dll" at 0x6a100000: PE builtin
686.374:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
686.378:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x62600000: PE builtin
686.378:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\comctl32.dll" at 0x6e6c0000: PE builtin
686.379:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\aclui.dll" at 0x1ace0000: PE builtin
686.379:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7f6c10290000: builtin
686.381:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\mpr.dll" at 0x6d9c0000: PE builtin
686.383:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ws2_32.dll" at 0x7f6c10240000: builtin
686.383:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\wininet.dll" at 0x6b2c0000: PE builtin
686.383:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\urlmon.dll" at 0x71140000: PE builtin
686.388:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\uxtheme.dll" at 0x7f6c10200000: builtin
686.401:002a:002b:fixme:path:parse_url failed to parse L""
686.420:002a:002b:fixme:path:parse_url failed to parse L"System.Runtime.InteropServices.RuntimeInformation"
686.429:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\nlssorting.dll" at 0x1ad80000: native
686.519:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\WINMM.dll" at 0x637c0000: PE builtin
686.552:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\dbghelp.dll" at 0x66200000: PE builtin
686.574:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-runtime-l1-1-0.dll" at 0x63140000: PE builtin
686.582:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-heap-l1-1-0.dll" at 0x1ab50000: PE builtin
686.588:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-string-l1-1-0.dll" at 0x6dd80000: PE builtin
686.595:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-stdio-l1-1-0.dll" at 0x69380000: PE builtin
686.600:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-convert-l1-1-0.dll" at 0x6d580000: PE builtin
686.601:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\VCRUNTIME140.dll" at 0x1c200000: native
686.607:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-locale-l1-1-0.dll" at 0x61540000: PE builtin
686.612:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-filesystem-l1-1-0.dll" at 0x620c0000: PE builtin
686.618:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-time-l1-1-0.dll" at 0x68ac0000: PE builtin
686.624:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-environment-l1-1-0.dll" at 0x69b80000: PE builtin
686.630:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-math-l1-1-0.dll" at 0x70580000: PE builtin
686.636:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-utility-l1-1-0.dll" at 0x6a4c0000: PE builtin
686.637:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\MSVCP140.dll" at 0x1c160000: native
686.638:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\FairyTale.Library.dll" at 0x1b0a0000: native
686.742:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-conio-l1-1-0.dll" at 0x6ec80000: PE builtin
686.742:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\mono-2.0-sgen.dll" at 0x1c220000: native
686.742:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\FairyTale.DotNet.dll" at 0x1b080000: native
686.749:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-core-synch-l1-2-0.dll" at 0x6e340000: PE builtin
686.753:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-core-fibers-l1-1-1.dll" at 0x6b880000: PE builtin
687.024:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\opengl32.dll" at 0x7a850000: builtin
687.024:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wined3d.dll" at 0x7f6c10020000: builtin
687.024:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\dxgi.dll" at 0x7f6c101b0000: builtin
687.025:002a:002b:err:module:import_dll Loading library d3d11.dll (which is needed by L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\Rgl.dll") failed (error c0000130).
687.113:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\D3DCOMPILER_47.dll" at 0x69900000: PE builtin
687.115:002a:002b:trace:loaddll:free_modref Unloaded module L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\D3DCOMPILER_47.dll" : builtin
687.138:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\api-ms-win-crt-private-l1-1-0.dll" at 0x6c400000: PE builtin
687.138:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\D3DCOMPILER_47.dll" at 0x1d400000: native
687.141:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\XINPUT9_1_0.dll" at 0x67500000: PE builtin
687.197:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\PhysX_64.dll" at 0x1d860000: native
687.279:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\PhysXCommon_64.dll" at 0x1da60000: native
687.301:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\PhysXCooking_64.dll" at 0x1dbe0000: native
687.354:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\PhysXFoundation_64.dll" at 0x1dc20000: native
687.364:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\MSACM32.dll" at 0x66440000: PE builtin
687.419:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\grCore.dll" at 0x1dc40000: native
687.443:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\grGranite.dll" at 0x1dcd0000: native
687.487:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\vulkan-1.dll" at 0x64d40000: PE builtin
687.496:002a:002b:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winevulkan.dll" at 0x7f6c0bfa0000: builtin
687.501:002a:002b:trace:loaddll:load_so_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\amd_ags_x64.dll" at 0x7f6c0bff0000: builtin
687.501:002a:002b:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\vulkan-1.dll" : builtin
687.501:002a:002b:trace:loaddll:free_modref Unloaded module L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\amd_ags_x64.dll" : builtin
687.514:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\amd_ags_x64.dll" at 0x1ddb0000: native
687.514:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\grGraniteDX11.dll" at 0x1dd40000: native
687.584:002a:002b:trace:loaddll:load_native_dll Loaded L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\GfeSDK.dll" at 0x6d040000: PE builtin
687.619:002a:002b:err:module:import_dll Loading library d3d11.dll (which is needed by L"Z:\\run\\media\\hadallen\\backup1\\Program Files\\SteamLibrary\\steamapps\\common\\Mount & Blade II Bannerlord\\bin\\Win64_Shipping_Client\\Rgl.dll") failed (error c0000130).
687.635:002a:002b:trace:seh:raise_exception code=e06d7363 flags=1 addr=0x7b00fdce ip=7b00fdce tid=002b
687.636:002a:002b:trace:seh:raise_exception info[0]=0000000019930520
687.636:002a:002b:trace:seh:raise_exception info[1]=000000000052e2a0
687.636:002a:002b:trace:seh:raise_exception info[2]=000000000146b208
687.636:002a:002b:trace:seh:raise_exception info[3]=0000000000cb0000
687.636:002a:002b:trace:seh:raise_exception rax=000000000052e130 rbx=000000001a8af6a0 rcx=000000000052e110 rdx=0000000000000001
687.636:002a:002b:trace:seh:raise_exception rsi=000000000052e230 rdi=000000000052e150 rbp=000000000052e230 rsp=000000000052e0f0
687.636:002a:002b:trace:seh:raise_exception r8=0000000000000004 r9=000000000052e210 r10=0000000000010000 r11=0000000000000246
687.636:002a:002b:trace:seh:raise_exception r12=0000000000000000 r13=0000000000000001 r14=000000000052e2a0 r15=0000000000000000
687.636:002a:002b:trace:seh:call_vectored_handlers calling handler at 0xd79250 code=e06d7363 flags=1
687.636:002a:002b:trace:seh:call_vectored_handlers handler at 0xd79250 returned 0
687.636:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 7b00fdce rsp 52e0f0
687.636:002a:002b:trace:seh:dump_unwind_info **** func fd80-fe07
687.636:002a:002b:trace:seh:dump_unwind_info unwind info at 0x7b08e344 flags 0 prolog 0x11 bytes function 0x7b00fd80-0x7b00fe07
687.636:002a:002b:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
687.636:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rsi
687.636:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rdi
687.636:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 1702af3 rsp 52e1d0
687.636:002a:002b:trace:seh:dump_unwind_info **** func 62a30-62b08
687.636:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1771b28 flags 0 prolog 0x15 bytes function 0x1702a30-0x1702b08
687.636:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rsi,0x90(%rsp)
687.636:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rbx,0x88(%rsp)
687.636:002a:002b:trace:seh:dump_unwind_info 0x15: subq $0x60,%rsp
687.636:002a:002b:trace:seh:dump_unwind_info 0xe: pushq %r14
687.636:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rdi
687.636:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rbp
687.636:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 10eea4c rsp 52e250
687.636:002a:002b:trace:seh:dump_unwind_info **** func 43e924-43ea4d
687.636:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14b733c flags 2 prolog 0x1c bytes function 0x10ee924-0x10eea4d
687.636:002a:002b:trace:seh:dump_unwind_info 0x1c: movq %rsi,0x80(%rsp)
687.636:002a:002b:trace:seh:dump_unwind_info 0x18: movq %rbp,0x78(%rsp)
687.636:002a:002b:trace:seh:dump_unwind_info 0x14: movq %rbx,0x70(%rsp)
687.636:002a:002b:trace:seh:dump_unwind_info 0x8: subq $0x60,%rsp
687.636:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rdi
687.637:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x14b7354
687.637:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 1013342 rsp 52e2c0
687.637:002a:002b:trace:seh:dump_unwind_info **** func 363200-3633b8
687.637:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14a6294 flags 4 prolog 0x0 bytes function 0x1013200-0x10133b8
687.637:002a:002b:trace:seh:dump_unwind_info chained to function 0xe4f6e0-0xe4f7e8
687.637:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1486ef0 flags 3 prolog 0x3c bytes function 0xe4f6e0-0xe4f7e8
687.637:002a:002b:trace:seh:dump_unwind_info 0x2b: movq %rdi,0x348(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0x27: movq %rsi,0x340(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0x23: movq %rbx,0x338(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0x16: subq $0x310,%rsp
687.637:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %r15
687.637:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %r14
687.637:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rbp
687.637:002a:002b:trace:seh:dump_unwind_info handler 0xe7ced8 data at 0x1486f10
687.637:002a:002b:trace:seh:call_handler calling handler 0xe7ced8 (rec=0x52e110, frame=0x52e2c0 context=0x52d5b0, dispatch=0x52d480)
687.637:002a:002b:trace:seh:call_handler handler at 0xe7ced8 returned 1
687.637:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip e4f6a7 rsp 52e5f0
687.637:002a:002b:trace:seh:dump_unwind_info **** func 19f650-19f6ba
687.637:002a:002b:trace:seh:dump_unwind_info unwind info at 0x147143c flags 0 prolog 0xf bytes function 0xe4f650-0xe4f6ba
687.637:002a:002b:trace:seh:dump_unwind_info 0xf: movq %rsi,0x58(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0xf: movq %rbx,0x50(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0xf: subq $0x40,%rsp
687.637:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rdi
687.637:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip e4f531 rsp 52e640
687.637:002a:002b:trace:seh:dump_unwind_info **** func 19f4c0-19f578
687.637:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14736ac flags 0 prolog 0x12 bytes function 0xe4f4c0-0xe4f578
687.637:002a:002b:trace:seh:dump_unwind_info 0x12: movq %rbp,0x48(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0x12: movq %rbx,0x40(%rsp)
687.637:002a:002b:trace:seh:dump_unwind_info 0x12: subq $0x20,%rsp
687.637:002a:002b:trace:seh:dump_unwind_info 0xe: pushq %r14
687.637:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rdi
687.637:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.638:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip e4f248 rsp 52e680
687.638:002a:002b:trace:seh:dump_unwind_info **** func 119f0-12330
687.638:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1471808 flags 2 prolog 0x28 bytes function 0xcc19f0-0xcc2330
687.638:002a:002b:trace:seh:dump_unwind_info 0x20: subq $0x1a8,%rsp
687.638:002a:002b:trace:seh:dump_unwind_info 0x11: pushq %r15
687.638:002a:002b:trace:seh:dump_unwind_info 0xf: pushq %r14
687.638:002a:002b:trace:seh:dump_unwind_info 0xd: pushq %r13
687.638:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %r12
687.638:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rdi
687.638:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %rsi
687.638:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %rbx
687.638:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %rbp
687.638:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x1471824
687.638:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip cc193b rsp 52e870
687.638:002a:002b:trace:seh:dump_unwind_info **** func 11570-119f0
687.638:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14717e8 flags 3 prolog 0x1e bytes function 0xcc1570-0xcc19f0
687.638:002a:002b:trace:seh:dump_unwind_info 0x12: subq $0x310,%rsp
687.638:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %r15
687.638:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r14
687.638:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.638:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r12
687.638:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rdi
687.638:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.638:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.638:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x1471804
687.638:002a:002b:trace:seh:call_handler calling handler 0xd770bc (rec=0x52e110, frame=0x52e870 context=0x52d5b0, dispatch=0x52d480)
687.638:002a:002b:trace:seh:RtlUnwindEx code=80000029 flags=3 end_frame=0x52e870 target_ip=0xcc193b rip=000000007bce1312
687.638:002a:002b:trace:seh:RtlUnwindEx info[0]=0000000001701da0
687.638:002a:002b:trace:seh:RtlUnwindEx info[1]=000000000052d228
687.638:002a:002b:trace:seh:RtlUnwindEx info[2]=0000000000fbfcf0
687.638:002a:002b:trace:seh:RtlUnwindEx info[3]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[4]=000000000052dc10
687.638:002a:002b:trace:seh:RtlUnwindEx info[5]=00000000014dcbb8
687.638:002a:002b:trace:seh:RtlUnwindEx info[6]=000000000052e110
687.638:002a:002b:trace:seh:RtlUnwindEx info[7]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[8]=0000000019930520
687.638:002a:002b:trace:seh:RtlUnwindEx info[9]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[10]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[11]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[12]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[13]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx info[14]=0000000000000000
687.638:002a:002b:trace:seh:RtlUnwindEx rax=00007fffffea8000 rbx=000000000052d410 rcx=000000000052ccb0 rdx=0000000000cc193b
687.638:002a:002b:trace:seh:RtlUnwindEx rsi=00000000014dcce4 rdi=000000000052c620 rbp=000000000052cbd0 rsp=000000000052c4a0
687.638:002a:002b:trace:seh:RtlUnwindEx r8=000000000052cc10 r9=0000000000000000 r10=000000000052d480 r11=000000000052d3d0
687.638:002a:002b:trace:seh:RtlUnwindEx r12=000000000052cc10 r13=000000000052d3d0 r14=000000000052d3d0 r15=000000000052c620
687.638:002a:002b:trace:seh:dwarf_virtual_unwind function 7bce1312 base 0x7bce1280 cie 0x7bd3b7a0 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1280: DW_CFA_def_cfa %rsp, 8
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1280: DW_CFA_offset %rip, -8
687.638:002a:002b:trace:seh:dwarf_virtual_unwind fde 0x7bd5f248 len 94 personality (nil) lsda (nil) code 7bce1280-7bce1c53
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1280: DW_CFA_advance_loc 1
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1281: DW_CFA_def_cfa_offset 16
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1281: DW_CFA_offset %rbp, -16
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1281: DW_CFA_advance_loc 3
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1284: DW_CFA_def_cfa_register %rbp
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce1284: DW_CFA_advance_loc 8
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce128c: DW_CFA_offset %r15, -24
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce128c: DW_CFA_offset %r14, -32
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce128c: DW_CFA_offset %r13, -40
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce128c: DW_CFA_offset %r12, -48
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce128c: DW_CFA_advance_loc 39
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12b3: DW_CFA_expression %xmm6 7bd5f26d-7bd5f270
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12b3: DW_CFA_offset %rdi, -56
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12b3: DW_CFA_offset %rsi, -64
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12b3: DW_CFA_offset %rbx, -72
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12b3: DW_CFA_advance_loc 15
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12c2: DW_CFA_expression %xmm7 7bd5f27a-7bd5f27d
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12c2: DW_CFA_advance_loc 11
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12cd: DW_CFA_expression %xmm8 7bd5f281-7bd5f284
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12cd: DW_CFA_advance_loc 8
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12d5: DW_CFA_expression %xmm9 7bd5f288-7bd5f28b
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12d5: DW_CFA_advance_loc 8
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12dd: DW_CFA_expression %xmm10 7bd5f28f-7bd5f292
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12dd: DW_CFA_advance_loc 8
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12e5: DW_CFA_expression %xmm11 7bd5f296-7bd5f299
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12e5: DW_CFA_advance_loc 5
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12ea: DW_CFA_expression %xmm12 7bd5f29d-7bd5f2a0
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12ea: DW_CFA_advance_loc 5
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12ef: DW_CFA_expression %xmm13 7bd5f2a4-7bd5f2a7
687.638:002a:002b:trace:seh:execute_cfa_instructions 7bce12ef: DW_CFA_advance_loc 5
687.639:002a:002b:trace:seh:execute_cfa_instructions 7bce12f4: DW_CFA_expression %xmm14 7bd5f2ab-7bd5f2ae
687.639:002a:002b:trace:seh:execute_cfa_instructions 7bce12f4: DW_CFA_advance_loc 5
687.639:002a:002b:trace:seh:execute_cfa_instructions 7bce12f9: DW_CFA_expression %xmm15 7bd5f2b2-7bd5f2b5
687.639:002a:002b:trace:seh:execute_cfa_instructions 7bce12f9: DW_CFA_advance_loc2 1424
687.639:002a:002b:trace:seh:dwarf_virtual_unwind next function rip=0000000001703115
687.639:002a:002b:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=000000000052e110 rcx=000000000052ccb0 rdx=0000000000cc193b
687.639:002a:002b:trace:seh:dwarf_virtual_unwind rsi=00000000014dcce4 rdi=000000000052d228 rbp=000000000052cce0 rsp=000000000052cbe0
687.639:002a:002b:trace:seh:dwarf_virtual_unwind r8=000000000052cc10 r9=0000000000000000 r10=000000000052d480 r11=000000000052d3d0
687.639:002a:002b:trace:seh:dwarf_virtual_unwind r12=000000000052dc10 r13=000000000052d3d0 r14=000000000052d3d0 r15=00000000014dcbb8
687.639:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 1703115 rsp 52cbe0
687.639:002a:002b:trace:seh:dump_unwind_info **** func 6300c-6312d
687.639:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1771b50 flags 3 prolog 0x22 bytes function 0x170300c-0x170312d
687.639:002a:002b:trace:seh:dump_unwind_info 0x11: subq $0x5b0,%rsp
687.639:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rbp
687.639:002a:002b:trace:seh:dump_unwind_info handler 0x1712198 data at 0x1771b60
687.639:002a:002b:trace:seh:call_unwind_handler calling handler 0x1712198 (rec=0x52cc10, frame=0x52cbe0 context=0x52ccb0, dispatch=0x52c530)
687.639:002a:002b:trace:seh:call_unwind_handler handler 0x1712198 returned 1
687.639:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 1701134 rsp 52d1a0
687.639:002a:002b:trace:seh:dump_unwind_info **** func 6108c-6114d
687.639:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1771a78 flags 0 prolog 0x17 bytes function 0x170108c-0x170114d
687.639:002a:002b:trace:seh:dump_unwind_info 0x17: movq %rbp,0x90(%rsp)
687.639:002a:002b:trace:seh:dump_unwind_info 0x17: movq %rbx,0x80(%rsp)
687.639:002a:002b:trace:seh:dump_unwind_info 0x17: subq $0x50,%rsp
687.639:002a:002b:trace:seh:dump_unwind_info 0x13: pushq %r15
687.639:002a:002b:trace:seh:dump_unwind_info 0x11: pushq %r14
687.639:002a:002b:trace:seh:dump_unwind_info 0xf: pushq %r12
687.639:002a:002b:trace:seh:dump_unwind_info 0xd: pushq %rdi
687.639:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rsi
687.639:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 17014a3 rsp 52d220
687.639:002a:002b:trace:seh:dump_unwind_info **** func 61150-615f1
687.639:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1771a5c flags 0 prolog 0x21 bytes function 0x1701150-0x17015f1
687.639:002a:002b:trace:seh:dump_unwind_info 0x21: movq %rbx,0xf8(%rsp)
687.639:002a:002b:trace:seh:dump_unwind_info 0x21: subq $0xb0,%rsp
687.639:002a:002b:trace:seh:dump_unwind_info 0x15: pushq %r15
687.639:002a:002b:trace:seh:dump_unwind_info 0x13: pushq %r14
687.639:002a:002b:trace:seh:dump_unwind_info 0x11: pushq %r13
687.639:002a:002b:trace:seh:dump_unwind_info 0xf: pushq %r12
687.639:002a:002b:trace:seh:dump_unwind_info 0xd: pushq %rdi
687.639:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rsi
687.639:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rbp
687.640:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 17028d7 rsp 52d310
687.640:002a:002b:trace:seh:dump_unwind_info **** func 626c4-628f8
687.640:002a:002b:trace:seh:dump_unwind_info unwind info at 0x176e328 flags 0 prolog 0x1c bytes function 0x17026c4-0x17028f8
687.640:002a:002b:trace:seh:dump_unwind_info 0x1c: movq %rsi,0x80(%rsp)
687.640:002a:002b:trace:seh:dump_unwind_info 0x1c: movq %rbp,0x78(%rsp)
687.640:002a:002b:trace:seh:dump_unwind_info 0x1c: movq %rbx,0x70(%rsp)
687.640:002a:002b:trace:seh:dump_unwind_info 0x1c: subq $0x40,%rsp
687.640:002a:002b:trace:seh:dump_unwind_info 0x18: pushq %r15
687.640:002a:002b:trace:seh:dump_unwind_info 0x16: pushq %r14
687.640:002a:002b:trace:seh:dump_unwind_info 0x14: pushq %r13
687.640:002a:002b:trace:seh:dump_unwind_info 0x12: pushq %r12
687.640:002a:002b:trace:seh:dump_unwind_info 0x10: pushq %rdi
687.640:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 17031a7 rsp 52d380
687.640:002a:002b:trace:seh:dump_unwind_info **** func 63130-631b7
687.640:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1771ba0 flags 0 prolog 0xf bytes function 0x1703130-0x17031b7
687.640:002a:002b:trace:seh:dump_unwind_info 0xf: movq %rsi,0x60(%rsp)
687.640:002a:002b:trace:seh:dump_unwind_info 0xf: movq %rbx,0x58(%rsp)
687.640:002a:002b:trace:seh:dump_unwind_info 0xf: subq $0x40,%rsp
687.640:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rdi
687.640:002a:002b:trace:seh:dwarf_virtual_unwind function 7bce062d base 0x7bce04e0 cie 0x7bd3b7a0 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04e0: DW_CFA_def_cfa %rsp, 8
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04e0: DW_CFA_offset %rip, -8
687.640:002a:002b:trace:seh:dwarf_virtual_unwind fde 0x7bd5ef80 len fc personality (nil) lsda (nil) code 7bce04e0-7bce0a40
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04e0: DW_CFA_advance_loc 2
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04e2: DW_CFA_def_cfa_offset 16
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04e2: DW_CFA_offset %r15, -16
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04e2: DW_CFA_advance_loc 10
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04ec: DW_CFA_def_cfa_offset 24
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04ec: DW_CFA_offset %r14, -24
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04ec: DW_CFA_advance_loc 2
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04ee: DW_CFA_def_cfa_offset 32
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04ee: DW_CFA_offset %r13, -32
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04ee: DW_CFA_advance_loc 2
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f0: DW_CFA_def_cfa_offset 40
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f0: DW_CFA_offset %r12, -40
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f0: DW_CFA_advance_loc 4
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f4: DW_CFA_def_cfa_offset 48
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f4: DW_CFA_offset %rbp, -48
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f4: DW_CFA_advance_loc 1
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f5: DW_CFA_def_cfa_offset 56
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f5: DW_CFA_offset %rbx, -56
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04f5: DW_CFA_advance_loc 7
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04fc: DW_CFA_def_cfa_offset 1744
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce04fc: DW_CFA_advance_loc1 76
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce0548: DW_CFA_def_cfa_offset 1752
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce0548: DW_CFA_advance_loc 5
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce054d: DW_CFA_def_cfa_offset 1760
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce054d: DW_CFA_advance_loc 4
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce0551: DW_CFA_def_cfa_offset 1792
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce0551: DW_CFA_advance_loc 14
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce055f: DW_CFA_def_cfa_offset 1744
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce055f: DW_CFA_advance_loc1 182
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce0615: DW_CFA_def_cfa_offset 1776
687.640:002a:002b:trace:seh:execute_cfa_instructions 7bce0615: DW_CFA_advance_loc 28
687.640:002a:002b:trace:seh:dwarf_virtual_unwind next function rip=000000007bce0b12
687.640:002a:002b:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=000000000052e110 rcx=000000000052ccb0 rdx=0000000000cc193b
687.640:002a:002b:trace:seh:dwarf_virtual_unwind rsi=000000007bd23657 rdi=000000000052cf5c rbp=000000000052e110 rsp=000000000052dac0
687.640:002a:002b:trace:seh:dwarf_virtual_unwind r8=000000000052cc10 r9=0000000000000000 r10=000000000052d480 r11=000000000052d3d0
687.640:002a:002b:trace:seh:dwarf_virtual_unwind r12=0000000000000001 r13=000000000052dc10 r14=000000000052e2a0 r15=0000000000000000
687.640:002a:002b:trace:seh:RtlUnwindEx found builtin frame 0x52d410 handler 0x7bcdab30
687.640:002a:002b:trace:seh:call_teb_unwind_handler calling TEB handler 0x7bcdab30 (rec=0x52cc10, frame=0x52d410 context=0x52ccb0, dispatch=0x52c530)
687.640:002a:002b:trace:seh:call_teb_unwind_handler handler at 0x7bcdab30 returned 1
687.641:002a:002b:trace:seh:dwarf_virtual_unwind function 7bce0b12 base 0x7bce0a40 cie 0x7bd3b7a0 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a40: DW_CFA_def_cfa %rsp, 8
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a40: DW_CFA_offset %rip, -8
687.641:002a:002b:trace:seh:dwarf_virtual_unwind fde 0x7bd5f080 len 94 personality (nil) lsda (nil) code 7bce0a40-7bce0def
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a40: DW_CFA_advance_loc 2
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a42: DW_CFA_def_cfa_offset 16
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a42: DW_CFA_offset %r13, -16
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a42: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a47: DW_CFA_def_cfa_offset 24
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a47: DW_CFA_offset %r12, -24
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a47: DW_CFA_advance_loc 1
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a48: DW_CFA_def_cfa_offset 32
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a48: DW_CFA_offset %rbp, -32
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a48: DW_CFA_advance_loc 4
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a4c: DW_CFA_def_cfa_offset 40
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a4c: DW_CFA_offset %rbx, -40
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a4c: DW_CFA_advance_loc 4
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a50: DW_CFA_def_cfa_offset 48
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0a50: DW_CFA_advance_loc1 202
687.641:002a:002b:trace:seh:dwarf_virtual_unwind next function rip=000000007bce0e7e
687.641:002a:002b:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=000000000052dc10 rcx=000000000052ccb0 rdx=0000000000cc193b
687.641:002a:002b:trace:seh:dwarf_virtual_unwind rsi=000000007bd23657 rdi=000000000052cf5c rbp=000000000052dbe0 rsp=000000000052daf0
687.641:002a:002b:trace:seh:dwarf_virtual_unwind r8=000000000052cc10 r9=0000000000000000 r10=000000000052d480 r11=000000000052d3d0
687.641:002a:002b:trace:seh:dwarf_virtual_unwind r12=000000000052e110 r13=0000000000000001 r14=000000000052e2a0 r15=0000000000000000
687.641:002a:002b:trace:seh:dwarf_virtual_unwind function 7bce0e7e base 0x7bce0df0 cie 0x7bd3b7a0 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df0: DW_CFA_def_cfa %rsp, 8
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df0: DW_CFA_offset %rip, -8
687.641:002a:002b:trace:seh:dwarf_virtual_unwind fde 0x7bd5f118 len 84 personality (nil) lsda (nil) code 7bce0df0-7bce0ed9
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df0: DW_CFA_advance_loc 1
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df1: DW_CFA_def_cfa_offset 16
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df1: DW_CFA_offset %rbp, -16
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df1: DW_CFA_advance_loc 3
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df4: DW_CFA_def_cfa_register %rbp
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df4: DW_CFA_advance_loc 2
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df6: DW_CFA_offset %r12, -24
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0df6: DW_CFA_advance_loc 6
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0dfc: DW_CFA_offset %rdi, -32
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0dfc: DW_CFA_offset %rsi, -40
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0dfc: DW_CFA_offset %rbx, -48
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0dfc: DW_CFA_advance_loc 25
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e15: DW_CFA_expression %xmm6 7bd5f13e-7bd5f141
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e15: DW_CFA_advance_loc 7
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e1c: DW_CFA_expression %xmm7 7bd5f145-7bd5f148
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e1c: DW_CFA_advance_loc 8
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e24: DW_CFA_expression %xmm8 7bd5f14c-7bd5f14f
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e24: DW_CFA_advance_loc 8
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e2c: DW_CFA_expression %xmm9 7bd5f153-7bd5f156
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e2c: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e31: DW_CFA_expression %xmm10 7bd5f15a-7bd5f15d
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e31: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e36: DW_CFA_expression %xmm11 7bd5f161-7bd5f164
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e36: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e3b: DW_CFA_expression %xmm12 7bd5f168-7bd5f16b
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e3b: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e40: DW_CFA_expression %xmm13 7bd5f16f-7bd5f172
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e40: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e45: DW_CFA_expression %xmm14 7bd5f176-7bd5f178
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e45: DW_CFA_advance_loc 5
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e4a: DW_CFA_expression %xmm15 7bd5f17c-7bd5f17e
687.641:002a:002b:trace:seh:execute_cfa_instructions 7bce0e4a: DW_CFA_advance_loc1 116
687.641:002a:002b:trace:seh:dwarf_virtual_unwind next function rip=000000007bcda099
687.641:002a:002b:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=000000001a8af6a0 rcx=000000000052ccb0 rdx=0000000000cc193b
687.641:002a:002b:trace:seh:dwarf_virtual_unwind rsi=000000000052e230 rdi=000000000052e150 rbp=000000000052e230 rsp=000000000052dbf0
687.641:002a:002b:trace:seh:dwarf_virtual_unwind r8=000000000052cc10 r9=0000000000000000 r10=000000000052d480 r11=000000000052d3d0
687.641:002a:002b:trace:seh:dwarf_virtual_unwind r12=0000000000000000 r13=0000000000000001 r14=000000000052e2a0 r15=0000000000000000
687.642:002a:002b:trace:seh:dwarf_virtual_unwind function 7bcda099 base 0x7bcda044 cie 0x7bd3b7a0 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
687.642:002a:002b:trace:seh:execute_cfa_instructions 7bcda044: DW_CFA_def_cfa %rsp, 8
687.642:002a:002b:trace:seh:execute_cfa_instructions 7bcda044: DW_CFA_offset %rip, -8
687.642:002a:002b:trace:seh:dwarf_virtual_unwind fde 0x7bd5e410 len 14 personality (nil) lsda (nil) code 7bcda044-7bcda0a1
687.642:002a:002b:trace:seh:execute_cfa_instructions 7bcda044: DW_CFA_advance_loc 7
687.642:002a:002b:trace:seh:execute_cfa_instructions 7bcda04b: DW_CFA_def_cfa_offset 1280
687.642:002a:002b:trace:seh:dwarf_virtual_unwind next function rip=000000007b00fdce
687.642:002a:002b:trace:seh:dwarf_virtual_unwind rax=00007fffffea8000 rbx=000000001a8af6a0 rcx=000000000052ccb0 rdx=0000000000cc193b
687.642:002a:002b:trace:seh:dwarf_virtual_unwind rsi=000000000052e230 rdi=000000000052e150 rbp=000000000052e230 rsp=000000000052e0f0
687.642:002a:002b:trace:seh:dwarf_virtual_unwind r8=000000000052cc10 r9=0000000000000000 r10=000000000052d480 r11=000000000052d3d0
687.642:002a:002b:trace:seh:dwarf_virtual_unwind r12=0000000000000000 r13=0000000000000001 r14=000000000052e2a0 r15=0000000000000000
687.642:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 7b00fdce rsp 52e0f0
687.642:002a:002b:trace:seh:dump_unwind_info **** func fd80-fe07
687.642:002a:002b:trace:seh:dump_unwind_info unwind info at 0x7b08e344 flags 0 prolog 0x11 bytes function 0x7b00fd80-0x7b00fe07
687.642:002a:002b:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
687.642:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rsi
687.642:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rdi
687.642:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 1702af3 rsp 52e1d0
687.642:002a:002b:trace:seh:dump_unwind_info **** func 62a30-62b08
687.642:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1771b28 flags 0 prolog 0x15 bytes function 0x1702a30-0x1702b08
687.642:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rsi,0x90(%rsp)
687.642:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rbx,0x88(%rsp)
687.642:002a:002b:trace:seh:dump_unwind_info 0x15: subq $0x60,%rsp
687.642:002a:002b:trace:seh:dump_unwind_info 0xe: pushq %r14
687.642:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rdi
687.642:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rbp
687.642:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 10eea4c rsp 52e250
687.642:002a:002b:trace:seh:dump_unwind_info **** func 43e924-43ea4d
687.642:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14b733c flags 2 prolog 0x1c bytes function 0x10ee924-0x10eea4d
687.642:002a:002b:trace:seh:dump_unwind_info 0x1c: movq %rsi,0x80(%rsp)
687.642:002a:002b:trace:seh:dump_unwind_info 0x18: movq %rbp,0x78(%rsp)
687.642:002a:002b:trace:seh:dump_unwind_info 0x14: movq %rbx,0x70(%rsp)
687.642:002a:002b:trace:seh:dump_unwind_info 0x8: subq $0x60,%rsp
687.642:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rdi
687.642:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x14b7354
687.642:002a:002b:trace:seh:call_unwind_handler calling handler 0xd770bc (rec=0x52cc10, frame=0x52e250 context=0x52ccb0, dispatch=0x52c530)
687.642:002a:002b:trace:seh:call_unwind_handler handler 0xd770bc returned 1
687.643:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip 1013342 rsp 52e2c0
687.643:002a:002b:trace:seh:dump_unwind_info **** func 363200-3633b8
687.643:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14a6294 flags 4 prolog 0x0 bytes function 0x1013200-0x10133b8
687.643:002a:002b:trace:seh:dump_unwind_info chained to function 0xe4f6e0-0xe4f7e8
687.643:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1486ef0 flags 3 prolog 0x3c bytes function 0xe4f6e0-0xe4f7e8
687.643:002a:002b:trace:seh:dump_unwind_info 0x2b: movq %rdi,0x348(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0x27: movq %rsi,0x340(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0x23: movq %rbx,0x338(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0x16: subq $0x310,%rsp
687.643:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %r15
687.643:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %r14
687.643:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rbp
687.643:002a:002b:trace:seh:dump_unwind_info handler 0xe7ced8 data at 0x1486f10
687.643:002a:002b:trace:seh:call_unwind_handler calling handler 0xe7ced8 (rec=0x52cc10, frame=0x52e2c0 context=0x52ccb0, dispatch=0x52c530)
687.643:002a:002b:trace:seh:call_unwind_handler handler 0xe7ced8 returned 1
687.643:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip e4f6a7 rsp 52e5f0
687.643:002a:002b:trace:seh:dump_unwind_info **** func 19f650-19f6ba
687.643:002a:002b:trace:seh:dump_unwind_info unwind info at 0x147143c flags 0 prolog 0xf bytes function 0xe4f650-0xe4f6ba
687.643:002a:002b:trace:seh:dump_unwind_info 0xf: movq %rsi,0x58(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0xf: movq %rbx,0x50(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0xf: subq $0x40,%rsp
687.643:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rdi
687.643:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip e4f531 rsp 52e640
687.643:002a:002b:trace:seh:dump_unwind_info **** func 19f4c0-19f578
687.643:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14736ac flags 0 prolog 0x12 bytes function 0xe4f4c0-0xe4f578
687.643:002a:002b:trace:seh:dump_unwind_info 0x12: movq %rbp,0x48(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0x12: movq %rbx,0x40(%rsp)
687.643:002a:002b:trace:seh:dump_unwind_info 0x12: subq $0x20,%rsp
687.643:002a:002b:trace:seh:dump_unwind_info 0xe: pushq %r14
687.643:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rdi
687.643:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.643:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip e4f248 rsp 52e680
687.643:002a:002b:trace:seh:dump_unwind_info **** func 119f0-12330
687.643:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1471808 flags 2 prolog 0x28 bytes function 0xcc19f0-0xcc2330
687.643:002a:002b:trace:seh:dump_unwind_info 0x20: subq $0x1a8,%rsp
687.643:002a:002b:trace:seh:dump_unwind_info 0x11: pushq %r15
687.643:002a:002b:trace:seh:dump_unwind_info 0xf: pushq %r14
687.643:002a:002b:trace:seh:dump_unwind_info 0xd: pushq %r13
687.643:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %r12
687.643:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rdi
687.643:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %rsi
687.643:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %rbx
687.643:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %rbp
687.643:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x1471824
687.643:002a:002b:trace:seh:call_unwind_handler calling handler 0xd770bc (rec=0x52cc10, frame=0x52e680 context=0x52ccb0, dispatch=0x52c530)
687.643:002a:002b:trace:seh:call_unwind_handler handler 0xd770bc returned 1
687.644:002a:002b:trace:seh:RtlVirtualUnwind type 2 rip cc193b rsp 52e870
687.644:002a:002b:trace:seh:dump_unwind_info **** func 11570-119f0
687.644:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14717e8 flags 3 prolog 0x1e bytes function 0xcc1570-0xcc19f0
687.644:002a:002b:trace:seh:dump_unwind_info 0x12: subq $0x310,%rsp
687.644:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %r15
687.644:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r14
687.644:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.644:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r12
687.644:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rdi
687.644:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.644:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.644:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x1471804
687.644:002a:002b:trace:seh:call_unwind_handler calling handler 0xd770bc (rec=0x52cc10, frame=0x52e870 context=0x52ccb0, dispatch=0x52c530)
687.644:002a:002b:trace:seh:call_unwind_handler handler 0xd770bc returned 1
687.644:002a:002b:trace:seh:RtlRestoreContext calling consolidate callback 0x1701da0 (rec=0x52cc10)
687.644:002a:002b:trace:seh:RtlRestoreContext returning to 1016318 stack 52e870
687.645:002a:002b:fixme:ntdll:EtwEventRegister ({8e9f5090-2d75-4d03-8a81-e5afbf85daf1}, 0x1abd0a5c, (nil), 0x1f3f0b8) stub.
687.645:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 64478576486 rsp 52d680
687.645:002a:002b:trace:seh:dump_unwind_info **** func 576410-5764bd
687.646:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785c2fb8 flags 3 prolog 0x10 bytes function 0x64478576410-0x644785764bd
687.646:002a:002b:trace:seh:dump_unwind_info 0x10: subq $0x68,%rsp
687.646:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rbx
687.646:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.646:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rdi
687.646:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r12
687.646:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.646:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r14
687.646:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %r15
687.646:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.646:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785c2fd4
687.646:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644785781bd rsp 52d730
687.646:002a:002b:trace:seh:dump_unwind_info **** func 5781a0-5781c3
687.646:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785963c0 flags 3 prolog 0x4 bytes function 0x644785781a0-0x644785781c3
687.646:002a:002b:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
687.646:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785963cc
687.646:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 64478577ab0 rsp 52d760
687.646:002a:002b:trace:seh:dump_unwind_info **** func 577a40-577b1d
687.646:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785cb444 flags 3 prolog 0x7 bytes function 0x64478577a40-0x64478577b1d
687.646:002a:002b:trace:seh:dump_unwind_info 0x7: subq $0x20,%rsp
687.646:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rbx
687.646:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.646:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rdi
687.646:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785cb454
687.646:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644784e303f rsp 52d7a0
687.646:002a:002b:trace:seh:dump_unwind_info **** func 4e2ef0-4e3147
687.646:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785a6638 flags 3 prolog 0x7 bytes function 0x644784e2ef0-0x644784e3147
687.646:002a:002b:trace:seh:dump_unwind_info 0x7: subq $0x50,%rsp
687.646:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rsi
687.646:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rdi
687.646:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.646:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785a6648
687.647:002a:002b:trace:seh:raise_exception code=e0434352 flags=1 addr=0x7b00fdce ip=7b00fdce tid=002b
687.647:002a:002b:trace:seh:raise_exception info[0]=ffffffff80131524
687.647:002a:002b:trace:seh:raise_exception info[1]=0000000000000000
687.647:002a:002b:trace:seh:raise_exception info[2]=0000000000000000
687.647:002a:002b:trace:seh:raise_exception info[3]=0000000000000000
687.647:002a:002b:trace:seh:raise_exception info[4]=0000000000cb0000
687.647:002a:002b:trace:seh:raise_exception rax=000000000052e680 rbx=0000000000000001 rcx=000000000052e660 rdx=0000000000000001
687.647:002a:002b:trace:seh:raise_exception rsi=000000000052e7e0 rdi=000000000052e6a8 rbp=000000000052ece0 rsp=000000000052e640
687.647:002a:002b:trace:seh:raise_exception r8=0000000000000005 r9=000000000052e7b8 r10=0000000000000005 r11=000000000052e7b8
687.647:002a:002b:trace:seh:raise_exception r12=0000000000004000 r13=0000000000000000 r14=00000000e0434352 r15=000000001a8a5e90
687.647:002a:002b:trace:seh:call_vectored_handlers calling handler at 0xd79250 code=e0434352 flags=1
687.647:002a:002b:trace:seh:call_vectored_handlers handler at 0xd79250 returned 0
687.647:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 7b00fdce rsp 52e640
687.647:002a:002b:trace:seh:dump_unwind_info **** func fd80-fe07
687.647:002a:002b:trace:seh:dump_unwind_info unwind info at 0x7b08e344 flags 0 prolog 0x11 bytes function 0x7b00fd80-0x7b00fe07
687.647:002a:002b:trace:seh:dump_unwind_info 0x11: subq $0xc8,%rsp
687.647:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rsi
687.647:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rdi
687.647:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d79a0a rsp 52e720
687.647:002a:002b:trace:seh:dump_unwind_info **** func c9840-c9a14
687.647:002a:002b:trace:seh:dump_unwind_info unwind info at 0x147b124 flags 1 prolog 0xe bytes function 0xd79840-0xd79a14
687.647:002a:002b:trace:seh:dump_unwind_info 0xe: subq $0xd0,%rsp
687.647:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r14
687.647:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r12
687.647:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rdi
687.647:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.647:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.647:002a:002b:trace:seh:dump_unwind_info handler 0xd770b4 data at 0x147b13c
687.647:002a:002b:trace:seh:call_handler calling handler 0xd770b4 (rec=0x52e660, frame=0x52e720 context=0x52db00, dispatch=0x52d9d0)
687.647:002a:002b:trace:seh:call_handler handler at 0xd770b4 returned 1
687.648:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 10f1683 rsp 52e820
687.648:002a:002b:trace:seh:dump_unwind_info **** func 441604-441684
687.648:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14b75c8 flags 2 prolog 0x13 bytes function 0x10f1604-0x10f1684
687.648:002a:002b:trace:seh:dump_unwind_info 0x13: movq %rbx,0x50(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x5: subq $0x40,%rsp
687.648:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rdi
687.648:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x14b75d8
687.648:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 1016328 rsp 52e870
687.648:002a:002b:trace:seh:dump_unwind_info **** func 366196-366318
687.648:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14a66c0 flags 4 prolog 0x0 bytes function 0x1016196-0x1016318
687.648:002a:002b:trace:seh:dump_unwind_info chained to function 0xcc1570-0xcc19f0
687.648:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14717e8 flags 3 prolog 0x1e bytes function 0xcc1570-0xcc19f0
687.648:002a:002b:trace:seh:dump_unwind_info 0x12: subq $0x310,%rsp
687.648:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %r15
687.648:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r14
687.648:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.648:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r12
687.648:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rdi
687.648:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.648:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.648:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x1471804
687.648:002a:002b:trace:seh:call_handler calling handler 0xd770bc (rec=0x52e660, frame=0x52e870 context=0x52db00, dispatch=0x52d9d0)
687.648:002a:002b:trace:seh:call_handler handler at 0xd770bc returned 1
687.648:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip cb46d5 rsp 52ebc0
687.648:002a:002b:trace:seh:dump_unwind_info **** func 4680-4720
687.648:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14706f0 flags 3 prolog 0x48 bytes function 0xcb4680-0xcb4720
687.648:002a:002b:trace:seh:dump_unwind_info 0x48: movaps %xmm3,0x50(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x42: movaps %xmm2,0x40(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x3c: movaps %xmm1,0x30(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x36: movaps %xmm0,0x20(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x30: movq %r9,0xc8(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x28: movq %r8,0xc0(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x20: movq %rdx,0xb8(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x18: movq %rcx,0xb0(%rsp)
687.648:002a:002b:trace:seh:dump_unwind_info 0x10: subq $0x68,%rsp
687.648:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rdi
687.648:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.648:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rbx
687.648:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rbp
687.648:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %r12
687.648:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %r13
687.648:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %r14
687.648:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %r15
687.648:002a:002b:trace:seh:dump_unwind_info handler 0xd78230 data at 0x147072c
687.648:002a:002b:trace:seh:call_handler calling handler 0xd78230 (rec=0x52e660, frame=0x52ebc0 context=0x52db00, dispatch=0x52d9d0)
687.648:002a:002b:trace:seh:call_handler handler at 0xd78230 returned 1
687.649:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 643f844112b rsp 52ec70
687.649:002a:002b:trace:seh:dump_unwind_info **** func f40-111b
687.649:002a:002b:trace:seh:dump_unwind_info unwind info at 0x643f8441298 flags 3 prolog 0x8 bytes function 0x643f8440f60-0x643f844113b
687.649:002a:002b:trace:seh:dump_unwind_info 0x8: subq $0x58,%rsp
687.649:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rbx
687.649:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rsi
687.649:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rdi
687.649:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.649:002a:002b:trace:seh:dump_unwind_info handler 0x643f8440060 data at 0x643f84412ac
687.649:002a:002b:trace:seh:call_handler calling handler 0x643f8440060 (rec=0x52e660, frame=0x52ec70 context=0x52db00, dispatch=0x52d9d0)
687.649:002a:002b:trace:seh:call_handler handler at 0x643f8440060 returned 1
687.649:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 643f8440cf9 rsp 52ecf0
687.649:002a:002b:trace:seh:dump_unwind_info **** func cd0-cdf
687.649:002a:002b:trace:seh:dump_unwind_info unwind info at 0x643f8440d00 flags 3 prolog 0x4 bytes function 0x643f8440cf0-0x643f8440cff
687.649:002a:002b:trace:seh:dump_unwind_info 0x4: subq $0x28,%rsp
687.649:002a:002b:trace:seh:dump_unwind_info handler 0x643f8440060 data at 0x643f8440d0c
687.649:002a:002b:trace:seh:call_handler calling handler 0x643f8440060 (rec=0x52e660, frame=0x52ecf0 context=0x52db00, dispatch=0x52d9d0)
687.649:002a:002b:trace:seh:call_handler handler at 0x643f8440060 returned 1
687.649:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip cb6bb3 rsp 52ed20
687.649:002a:002b:trace:seh:dump_unwind_info **** func 6b30-6be0
687.649:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1470be4 flags 3 prolog 0x6 bytes function 0xcb6b30-0xcb6be0
687.649:002a:002b:trace:seh:dump_unwind_info frame register rbp offset 0x0(%rsp)
687.649:002a:002b:trace:seh:dump_unwind_info 0x6: leaq 0x0(%rsp),rbp
687.649:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rbp
687.649:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.649:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.649:002a:002b:trace:seh:dump_unwind_info handler 0xe80a00 data at 0x1470bf4
687.649:002a:002b:trace:seh:call_handler calling handler 0xe80a00 (rec=0x52e660, frame=0x52ed40 context=0x52db00, dispatch=0x52d9d0)
687.649:002a:002b:trace:seh:call_handler handler at 0xe80a00 returned 1
687.649:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip cb6a70 rsp 52ed60
687.649:002a:002b:trace:seh:dump_unwind_info **** func 6be0-6c2c
687.649:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1470bfc flags 3 prolog 0x15 bytes function 0xcb6be0-0xcb6c2c
687.649:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rdi,0x58(%rsp)
687.649:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rsi,0x48(%rsp)
687.649:002a:002b:trace:seh:dump_unwind_info 0x15: movq %rbx,0x40(%rsp)
687.649:002a:002b:trace:seh:dump_unwind_info 0x15: subq $0x30,%rsp
687.649:002a:002b:trace:seh:dump_unwind_info 0x11: pushq %r14
687.649:002a:002b:trace:seh:dump_unwind_info handler 0xd770b4 data at 0x1470c14
687.649:002a:002b:trace:seh:call_handler calling handler 0xd770b4 (rec=0x52e660, frame=0x52ed60 context=0x52db00, dispatch=0x52d9d0)
687.649:002a:002b:trace:seh:call_handler handler at 0xd770b4 returned 1
687.650:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip cb735d rsp 52eda0
687.650:002a:002b:trace:seh:dump_unwind_info **** func 7268-7390
687.650:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1470cdc flags 3 prolog 0x2d bytes function 0xcb7268-0xcb7390
687.650:002a:002b:trace:seh:dump_unwind_info frame register rbp offset 0x20(%rsp)
687.650:002a:002b:trace:seh:dump_unwind_info 0x1f: movq %rsi,0xa8(%rsp)
687.650:002a:002b:trace:seh:dump_unwind_info 0x18: movq %rbx,0xa0(%rsp)
687.650:002a:002b:trace:seh:dump_unwind_info 0x11: leaq 0x20(%rsp),rbp
687.650:002a:002b:trace:seh:dump_unwind_info 0xc: subq $0x60,%rsp
687.650:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %r15
687.650:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %r14
687.650:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %r13
687.650:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rdi
687.650:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.650:002a:002b:trace:seh:dump_unwind_info handler 0xd79a64 data at 0x1470cfc
687.650:002a:002b:trace:seh:call_handler calling handler 0xd79a64 (rec=0x52e660, frame=0x52ee10 context=0x52db00, dispatch=0x52d9d0)
687.650:002a:002b:trace:seh:call_handler handler at 0xd79a64 returned 1
687.650:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d0ec23 rsp 52eea0
687.650:002a:002b:trace:seh:dump_unwind_info **** func 60ab4-60b8c
687.650:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14754a8 flags 3 prolog 0x19 bytes function 0xd10ab4-0xd10b8c
687.650:002a:002b:trace:seh:dump_unwind_info 0x19: subq $0x1a0,%rsp
687.650:002a:002b:trace:seh:dump_unwind_info 0x12: pushq %r15
687.650:002a:002b:trace:seh:dump_unwind_info 0x10: pushq %r14
687.650:002a:002b:trace:seh:dump_unwind_info 0xe: pushq %r13
687.650:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %r12
687.650:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rdi
687.650:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %rsi
687.650:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %rbx
687.650:002a:002b:trace:seh:dump_unwind_info handler 0xd770b4 data at 0x14754c4
687.650:002a:002b:trace:seh:call_handler calling handler 0xd770b4 (rec=0x52e660, frame=0x52eea0 context=0x52db00, dispatch=0x52d9d0)
687.650:002a:002b:trace:seh:call_handler handler at 0xd770b4 returned 1
687.650:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d0ee06 rsp 52f080
687.650:002a:002b:trace:seh:dump_unwind_info **** func 5ed50-5ee90
687.650:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14751ec flags 3 prolog 0x3a bytes function 0xd0ed50-0xd0ee90
687.650:002a:002b:trace:seh:dump_unwind_info 0x29: movq %rsi,0x308(%rsp)
687.650:002a:002b:trace:seh:dump_unwind_info 0x25: movq %rbx,0x300(%rsp)
687.650:002a:002b:trace:seh:dump_unwind_info 0x19: subq $0x2c0,%rsp
687.650:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %r15
687.650:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r14
687.650:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r12
687.650:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %rdi
687.650:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rbp
687.650:002a:002b:trace:seh:dump_unwind_info handler 0xe7ced8 data at 0x147520c
687.650:002a:002b:trace:seh:call_handler calling handler 0xe7ced8 (rec=0x52e660, frame=0x52f080 context=0x52db00, dispatch=0x52d9d0)
687.650:002a:002b:trace:seh:call_handler handler at 0xe7ced8 returned 1
687.651:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d0ecfb rsp 52f370
687.651:002a:002b:trace:seh:dump_unwind_info **** func 5fdf0-60334
687.651:002a:002b:trace:seh:dump_unwind_info unwind info at 0x147537c flags 3 prolog 0x3f bytes function 0xd0fdf0-0xd10334
687.651:002a:002b:trace:seh:dump_unwind_info 0x2e: movq %rdi,0x628(%rsp)
687.651:002a:002b:trace:seh:dump_unwind_info 0x2a: movq %rsi,0x620(%rsp)
687.651:002a:002b:trace:seh:dump_unwind_info 0x26: movq %rbx,0x618(%rsp)
687.651:002a:002b:trace:seh:dump_unwind_info 0x1a: subq $0x5e0,%rsp
687.651:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %r15
687.651:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %r14
687.651:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %r13
687.651:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %r12
687.651:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rbp
687.651:002a:002b:trace:seh:dump_unwind_info handler 0xe7ced8 data at 0x14753a0
687.651:002a:002b:trace:seh:call_handler calling handler 0xe7ced8 (rec=0x52e660, frame=0x52f370 context=0x52db00, dispatch=0x52d9d0)
687.651:002a:002b:trace:seh:call_handler handler at 0xe7ced8 returned 1
687.651:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d0eaf4 rsp 52f980
687.651:002a:002b:trace:seh:dump_unwind_info **** func 5ef40-5ef70
687.651:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1475234 flags 3 prolog 0x5 bytes function 0xd0ef40-0xd0ef70
687.651:002a:002b:trace:seh:dump_unwind_info 0x5: subq $0x60,%rsp
687.651:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.651:002a:002b:trace:seh:dump_unwind_info handler 0xd770b4 data at 0x1475240
687.651:002a:002b:trace:seh:call_handler calling handler 0xd770b4 (rec=0x52e660, frame=0x52f980 context=0x52db00, dispatch=0x52d9d0)
687.651:002a:002b:trace:seh:call_handler handler at 0xd770b4 returned 1
687.651:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d0ea72 rsp 52f9f0
687.651:002a:002b:trace:seh:dump_unwind_info **** func 5e9c0-5ead9
687.651:002a:002b:trace:seh:dump_unwind_info unwind info at 0x14751d4 flags 3 prolog 0x1b bytes function 0xd0e9c0-0xd0ead9
687.651:002a:002b:trace:seh:dump_unwind_info 0x1b: movq %rsi,0xa0(%rsp)
687.651:002a:002b:trace:seh:dump_unwind_info 0x17: movq %rbx,0x98(%rsp)
687.651:002a:002b:trace:seh:dump_unwind_info 0xb: subq $0x80,%rsp
687.651:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rdi
687.651:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x14751e8
687.651:002a:002b:trace:seh:call_handler calling handler 0xd770bc (rec=0x52e660, frame=0x52f9f0 context=0x52db00, dispatch=0x52d9d0)
687.651:002a:002b:trace:seh:call_handler handler at 0xd770bc returned 1
687.651:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip d0ef34 rsp 52fa80
687.651:002a:002b:trace:seh:dump_unwind_info **** func 5ef20-5ef40
687.651:002a:002b:trace:seh:dump_unwind_info unwind info at 0x1475214 flags 1 prolog 0x4 bytes function 0xd0ef20-0xd0ef40
687.651:002a:002b:trace:seh:dump_unwind_info 0x4: subq $0x38,%rsp
687.651:002a:002b:trace:seh:dump_unwind_info handler 0xd770b4 data at 0x1475220
687.651:002a:002b:trace:seh:call_handler calling handler 0xd770b4 (rec=0x52e660, frame=0x52fa80 context=0x52db00, dispatch=0x52d9d0)
687.659:002a:002b:fixme:advapi:RegisterEventSourceW ((null),L".NET Runtime"): stub
687.659:002a:002b:fixme:advapi:ReportEventW (0xcafe4242,0x0001,0x0000,0x00000402,(nil),0x0001,0x00000000,0x52ca40,(nil)): stub
687.659:002a:002b:err:eventlog:ReportEventW L"Application: TaleWorlds.MountAndBlade.Launcher.exe\nFramework Version: v4.0.30319\nDescription: The process was terminated due to an unhandled exception.\nException Info: System.DllNotFoundException\n at TaleWorlds.Starter.Library.MBDotNet.WotsMainDotNet(System.String)\n at TaleWorlds"...
687.659:002a:002b:fixme:advapi:DeregisterEventSource (0xcafe4242) stub
Unhandled Exception: 687.659:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip dc53da rsp 52c9c0
687.659:002a:002b:trace:seh:dump_unwind_info **** func 115330-1158e0
687.659:002a:002b:trace:seh:dump_unwind_info unwind info at 0x147fff0 flags 3 prolog 0x2a bytes function 0xdc5330-0xdc58e0
687.659:002a:002b:trace:seh:dump_unwind_info 0x2a: movq %rsi,0x498(%rsp)
687.659:002a:002b:trace:seh:dump_unwind_info 0x26: movq %rbx,0x490(%rsp)
687.659:002a:002b:trace:seh:dump_unwind_info 0x17: subq $0x470,%rsp
687.659:002a:002b:trace:seh:dump_unwind_info 0x10: pushq %r15
687.659:002a:002b:trace:seh:dump_unwind_info 0xe: pushq %r14
687.659:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rdi
687.659:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x148000c
687.659:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644784f86c6 rsp 52ce50
687.659:002a:002b:trace:seh:dump_unwind_info **** func 4f8680-4f8752
687.659:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785ab7b8 flags 3 prolog 0x6 bytes function 0x644784f8680-0x644784f8752
687.659:002a:002b:trace:seh:dump_unwind_info 0x6: subq $0x28,%rsp
687.659:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.659:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rdi
687.659:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785ab7c8
687.659:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644784f8672 rsp 52ce90
687.659:002a:002b:trace:seh:dump_unwind_info **** func 4f8650-4f8678
687.659:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785ab798 flags 3 prolog 0x4 bytes function 0x644784f8650-0x644784f8678
687.659:002a:002b:trace:seh:dump_unwind_info 0x4: subq $0x38,%rsp
687.659:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785ab7a4
687.660:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 64478c57c7e rsp 52ced0
687.660:002a:002b:trace:seh:dump_unwind_info **** func c57c30-c57c9b
687.660:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644790dc8f4 flags 3 prolog 0x6 bytes function 0x64478c57c30-0x64478c57c9b
687.660:002a:002b:trace:seh:dump_unwind_info 0x6: subq $0x38,%rsp
687.660:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.660:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.660:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644790dc904
687.665:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\Microsoft.NET\\Framework64\\v4.0.30319\\diasymreader.dll" at 0x1ea10000: native
687.667:002a:002b:fixme:ver:GetCurrentPackageId (0x52a6d0 (nil)): stub
687.673:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 6447857fca9 rsp 52cae0
687.673:002a:002b:trace:seh:dump_unwind_info **** func 57fbd0-57fcde
687.673:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785cd5ac flags 3 prolog 0x13 bytes function 0x6447857fbd0-0x6447857fcde
687.673:002a:002b:trace:seh:dump_unwind_info 0x13: subq $0x98,%rsp
687.673:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rbx
687.673:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.673:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rdi
687.673:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r12
687.673:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.673:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r14
687.673:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %r15
687.673:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.673:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785cd5c8
687.673:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 6447856fe6f rsp 52cbc0
687.673:002a:002b:trace:seh:dump_unwind_info **** func 56fe10-56fe7a
687.673:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785c9654 flags 3 prolog 0x6 bytes function 0x6447856fe10-0x6447856fe7a
687.673:002a:002b:trace:seh:dump_unwind_info 0x6: subq $0x48,%rsp
687.673:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.673:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.673:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785c9664
687.673:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644784fd75f rsp 52cc20
687.673:002a:002b:trace:seh:dump_unwind_info **** func 4fd720-4fd766
687.673:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785acc64 flags 3 prolog 0x5 bytes function 0x644784fd720-0x644784fd766
687.673:002a:002b:trace:seh:dump_unwind_info 0x5: subq $0x40,%rsp
687.673:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rsi
687.673:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785acc70
687.673:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 64478540666 rsp 52cc70
687.673:002a:002b:trace:seh:dump_unwind_info **** func 5402f0-540850
687.673:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785bdf0c flags 3 prolog 0x13 bytes function 0x644785402f0-0x64478540850
687.673:002a:002b:trace:seh:dump_unwind_info 0x13: subq $0x88,%rsp
687.673:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rbx
687.673:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.673:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rdi
687.673:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r12
687.673:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.673:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r14
687.673:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %r15
687.673:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.673:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785bdf28
687.674:002a:002b:fixme:path:parse_url failed to parse L"System.Core"
687.677:002a:002b:fixme:path:parse_url failed to parse L"System"
687.679:002a:002b:fixme:path:parse_url failed to parse L"System.Configuration"
687.680:002a:002b:fixme:path:parse_url failed to parse L"System.Xml"
687.710:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\assembly\\NativeImages_v4.0.30319_64\\System\\3823f9cc74112cd923de7c2d781613ce\\System.ni.dll" at 0x64474a80000: native
687.711:002a:002b:fixme:path:parse_url failed to parse L"System.Numerics"
687.712:002a:002b:fixme:path:parse_url failed to parse L"System.Security"
687.740:002a:002b:trace:loaddll:load_native_dll Loaded L"C:\\windows\\assembly\\NativeImages_v4.0.30319_64\\System.Core\\e9bc81d0f2835b3f994ffeb9ab8c932e\\System.Core.ni.dll" at 0x64443400000: native
687.740:002a:002b:fixme:path:parse_url failed to parse L"System"
687.749:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip dbf8b4 rsp 52c970
687.749:002a:002b:trace:seh:dump_unwind_info **** func 10f7f0-10fa85
687.749:002a:002b:trace:seh:dump_unwind_info unwind info at 0x147faa0 flags 3 prolog 0x27 bytes function 0xdbf7f0-0xdbfa85
687.749:002a:002b:trace:seh:dump_unwind_info 0x27: movq %rdi,0x200(%rsp)
687.749:002a:002b:trace:seh:dump_unwind_info 0x23: movq %rsi,0x1f8(%rsp)
687.749:002a:002b:trace:seh:dump_unwind_info 0x1f: movq %rbx,0x1f0(%rsp)
687.749:002a:002b:trace:seh:dump_unwind_info 0x10: subq $0x1d0,%rsp
687.749:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r15
687.749:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r14
687.749:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r13
687.749:002a:002b:trace:seh:dump_unwind_info handler 0xd770bc data at 0x147fac0
687.749:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 6447850e19a rsp 52cb60
687.749:002a:002b:trace:seh:dump_unwind_info **** func 50e130-50e1b2
687.749:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785b1170 flags 3 prolog 0xc bytes function 0x6447850e130-0x6447850e1b2
687.749:002a:002b:trace:seh:dump_unwind_info 0xc: subq $0x38,%rsp
687.749:002a:002b:trace:seh:dump_unwind_info 0x8: pushq %rbx
687.749:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %rbp
687.749:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %rsi
687.749:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %rdi
687.749:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %r14
687.749:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %r15
687.749:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785b1188
687.749:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644784a59a2 rsp 52cbd0
687.749:002a:002b:trace:seh:dump_unwind_info **** func 4a5940-4a59b6
687.749:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785962e0 flags 3 prolog 0xa bytes function 0x644784a5940-0x644784a59b6
687.749:002a:002b:trace:seh:dump_unwind_info 0xa: subq $0x30,%rsp
687.749:002a:002b:trace:seh:dump_unwind_info 0x6: pushq %rbx
687.749:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %rbp
687.749:002a:002b:trace:seh:dump_unwind_info 0x4: pushq %rsi
687.749:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rdi
687.749:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %r14
687.749:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785962f4
687.749:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644784a5938 rsp 52cc30
687.749:002a:002b:trace:seh:dump_unwind_info **** func 4a5910-4a593e
687.749:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785962d0 flags 3 prolog 0x4 bytes function 0x644784a5910-0x644784a593e
687.749:002a:002b:trace:seh:dump_unwind_info 0x4: subq $0x38,%rsp
687.749:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785962dc
687.749:002a:002b:trace:seh:RtlVirtualUnwind type 0 rip 644785407db rsp 52cc70
687.749:002a:002b:trace:seh:dump_unwind_info **** func 5402f0-540850
687.749:002a:002b:trace:seh:dump_unwind_info unwind info at 0x644785bdf0c flags 3 prolog 0x13 bytes function 0x644785402f0-0x64478540850
687.749:002a:002b:trace:seh:dump_unwind_info 0x13: subq $0x88,%rsp
687.749:002a:002b:trace:seh:dump_unwind_info 0xc: pushq %rbx
687.749:002a:002b:trace:seh:dump_unwind_info 0xb: pushq %rsi
687.749:002a:002b:trace:seh:dump_unwind_info 0xa: pushq %rdi
687.749:002a:002b:trace:seh:dump_unwind_info 0x9: pushq %r12
687.749:002a:002b:trace:seh:dump_unwind_info 0x7: pushq %r13
687.749:002a:002b:trace:seh:dump_unwind_info 0x5: pushq %r14
687.749:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %r15
687.749:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.749:002a:002b:trace:seh:dump_unwind_info handler 0x64478435000 data at 0x644785bdf28
System.DllNotFoundException: Unable to load DLL 'Rgl.dll': Module not found. (Exception from HRESULT: 0x8007007E)
at TaleWorlds.Starter.Library.MBDotNet.WotsMainDotNet(String args)
at TaleWorlds.Starter.Library.Program.Starter()
at ManagedStarter.Program.Main(String[] args)
687.938:002a:002b:trace:seh:call_handler handler at 0xd770b4 returned 1
687.938:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 180007b2d rsp 52fac0
687.938:002a:002b:trace:seh:dump_unwind_info **** func 7ac0-7b40
687.938:002a:002b:trace:seh:dump_unwind_info unwind info at 0x180074e9c flags 2 prolog 0x17 bytes function 0x180007ac0-0x180007b40
687.938:002a:002b:trace:seh:dump_unwind_info 0x17: movq %rbx,0x78(%rsp)
687.938:002a:002b:trace:seh:dump_unwind_info 0xa: subq $0x40,%rsp
687.938:002a:002b:trace:seh:dump_unwind_info 0x3: pushq %rdi
687.938:002a:002b:trace:seh:dump_unwind_info 0x2: pushq %rsi
687.938:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbp
687.938:002a:002b:trace:seh:dump_unwind_info handler 0x180052ca0 data at 0x180074eb0
687.939:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 6427ee55b21 rsp 52fb20
687.939:002a:002b:trace:seh:dump_unwind_info **** func 5ab8-5b32
687.939:002a:002b:trace:seh:dump_unwind_info unwind info at 0x6427eea5700 flags 0 prolog 0x5 bytes function 0x6427ee55ab8-0x6427ee55b32
687.939:002a:002b:trace:seh:dump_unwind_info 0x5: subq $0x20,%rsp
687.939:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
687.939:002a:002b:trace:seh:dwarf_virtual_unwind function 7b454ef1 base 0x7b454d90 cie 0x7b4903e0 len 14 id 0 version 1 aug 'zR' code_align 1 data_align -8 retaddr %rip
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d90: DW_CFA_def_cfa %rsp, 8
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d90: DW_CFA_offset %rip, -8
687.939:002a:002b:trace:seh:dwarf_virtual_unwind fde 0x7b4a8020 len 64 personality (nil) lsda (nil) code 7b454d90-7b455421
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d90: DW_CFA_advance_loc 1
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d91: DW_CFA_def_cfa_offset 16
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d91: DW_CFA_offset %rbp, -16
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d91: DW_CFA_advance_loc 3
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d94: DW_CFA_def_cfa_register %rbp
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454d94: DW_CFA_advance_loc 28
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db0: DW_CFA_expression %xmm6 7b4a803c-7b4a803f
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db0: DW_CFA_offset %rdi, -24
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db0: DW_CFA_offset %rsi, -32
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db0: DW_CFA_offset %rbx, -40
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db0: DW_CFA_advance_loc 7
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db7: DW_CFA_expression %xmm7 7b4a8049-7b4a804c
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454db7: DW_CFA_advance_loc 8
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dbf: DW_CFA_expression %xmm8 7b4a8050-7b4a8053
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dbf: DW_CFA_advance_loc 8
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dc7: DW_CFA_expression %xmm9 7b4a8057-7b4a805a
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dc7: DW_CFA_advance_loc 5
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dcc: DW_CFA_expression %xmm10 7b4a805e-7b4a8061
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dcc: DW_CFA_advance_loc 5
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dd1: DW_CFA_expression %xmm11 7b4a8065-7b4a8068
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dd1: DW_CFA_advance_loc 5
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dd6: DW_CFA_expression %xmm12 7b4a806c-7b4a806f
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454dd6: DW_CFA_advance_loc 5
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454ddb: DW_CFA_expression %xmm13 7b4a8073-7b4a8076
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454ddb: DW_CFA_advance_loc 5
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454de0: DW_CFA_expression %xmm14 7b4a807a-7b4a807c
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454de0: DW_CFA_advance_loc 5
687.939:002a:002b:trace:seh:execute_cfa_instructions 7b454de5: DW_CFA_expression %xmm15 7b4a8080-7b4a8082
687.939:002a:002b:trace:seh:dwarf_virtual_unwind next function rip=0000000000000000
687.939:002a:002b:trace:seh:dwarf_virtual_unwind rax=000000000052e680 rbx=0000000000000000 rcx=0000000001f31420 rdx=0000000000c60080
687.939:002a:002b:trace:seh:dwarf_virtual_unwind rsi=0000000000000000 rdi=0000000000000000 rbp=0000000000000000 rsp=000000000052ffe0
687.939:002a:002b:trace:seh:dwarf_virtual_unwind r8=0000000000000000 r9=00000000000100b0 r10=0000000000000005 r11=000000000052e7b8
687.939:002a:002b:trace:seh:dwarf_virtual_unwind r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000
687.939:002a:002b:trace:seh:call_stack_handlers found wine frame 0x52fde0 rsp 52ffe0 handler 0x7b474e90
687.939:002a:002b:trace:seh:call_teb_handler calling TEB handler 0x7b474e90 (rec=0x52e660, frame=0x52fde0 context=0x52db00, dispatch=0x52d9d0)
wine: Unhandled exception 0xe0434352 in thread 2b at address 000000007B00FDCE (thread 002b), starting debugger...
687.939:002a:002b:trace:seh:start_debugger Starting debugger L"winedbg --auto 42 444"
ERROR: ld.so: object '/home/hadallen/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
687.975:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
687.975:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
687.976:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7fbcf8710000: builtin
687.980:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winedbg.exe" at 0x7fbcf8590000: builtin
687.984:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7fbcf8460000: builtin
687.984:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\dbghelp.dll" at 0x66200000: PE builtin
687.985:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7fbcf8380000: builtin
687.985:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7fbcf83c0000: builtin
688.000:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
688.001:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
688.001:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
688.002:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7fbcf7f50000: builtin
688.002:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7fbcf8100000: builtin
688.004:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
688.004:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
688.008:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x62600000: PE builtin
688.008:002e:002f:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\comctl32.dll" at 0x6e6c0000: PE builtin
688.014:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\kernelbase.dll" at 0x7b000000: PE builtin
688.014:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\kernel32.dll" at 0x7b410000: builtin
688.015:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 0x7f083ad60000: builtin
688.015:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\explorer.exe" at 0x400000: PE builtin
688.018:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\sechost.dll" at 0x7f083ab90000: builtin
688.018:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\advapi32.dll" at 0x7f083abe0000: builtin
688.019:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\gdi32.dll" at 0x7f083a9f0000: builtin
688.020:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 0x7f083a8d0000: builtin
688.020:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 0x6fbc0000: PE builtin
688.022:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\version.dll" at 0x65780000: PE builtin
688.022:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\setupapi.dll" at 0x6a700000: PE builtin
688.022:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\user32.dll" at 0x7f083a630000: builtin
688.036:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\ole32.dll" at 0x65000000: PE builtin
688.036:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\imm32.dll" at 0x6bec0000: PE builtin
688.045:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7f083a560000: builtin
688.201:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shlwapi.dll" at 0x68a40000: PE builtin
688.202:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\shcore.dll" at 0x64940000: PE builtin
688.204:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\usp10.dll" at 0x62600000: PE builtin
688.204:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\comctl32.dll" at 0x6e6c0000: PE builtin
688.204:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\aclui.dll" at 0x380000: PE builtin
688.204:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\shell32.dll" at 0x7f0838de0000: builtin
688.207:0031:0032:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\uxtheme.dll" at 0x7f0838d80000: builtin
688.215:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\oleaut32.dll" at 0x6a100000: PE builtin
688.215:0031:0032:trace:loaddll:load_native_dll Loaded L"C:\\windows\\system32\\actxprxy.dll" at 0xfc0000: PE builtin
688.217:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\winex11.drv" at 0x7fbcf7e80000: builtin
688.370:002e:002f:trace:loaddll:load_so_dll Loaded L"C:\\windows\\system32\\uxtheme.dll" at 0x7fbcf7500000: builtin
690.402:002a:002b:trace:seh:call_teb_handler handler at 0x7b474e90 returned 1
690.403:002a:002b:trace:seh:RtlVirtualUnwind type 1 rip 6427ee55ab8 rsp 52ffe8
690.403:002a:002b:trace:seh:dump_unwind_info **** func 5ab8-5b32
690.403:002a:002b:trace:seh:dump_unwind_info unwind info at 0x6427eea5700 flags 0 prolog 0x5 bytes function 0x6427ee55ab8-0x6427ee55b32
690.403:002a:002b:trace:seh:dump_unwind_info 0x5: subq $0x20,%rsp
690.403:002a:002b:trace:seh:dump_unwind_info 0x1: pushq %rbx
690.405:002e:002f:fixme:dbghelp:x86_64_find_runtime_function RunTime_Function outside IMAGE_DIRECTORY_ENTRY_EXCEPTION unimplemented yet!
690.533:002e:002f:fixme:dbghelp:x86_64_find_runtime_function RunTime_Function outside IMAGE_DIRECTORY_ENTRY_EXCEPTION unimplemented yet!
699.774:0031:0033:err:clipboard:convert_selection Timed out waiting for SelectionNotify event
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment