165710.177:010c:0110:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\windows.ui.dll" at 00000003719E0000: builtin 165710.177:010c:0110:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\windows.ui.dll" at 00000003719E0000 0110: close_handle( handle=00c4 ) 0110: close_handle() = 0 165710.180:010c:0110:trace:heap:RtlFreeHeap handle 0000000000140000, flags 0, ptr 00000000001E2B50, return 1, status 0. 165710.180:010c:0110:trace:module:process_attach (L"windows.ui.dll",0000000000000000) - START 165710.180:010c:0110:Call PE DLL (proc=00000003719E29C0,module=00000003719E0000 L"windows.ui.dll",reason=PROCESS_ATTACH,res=0000000000000000) 165710.180:010c:0110:Call KERNEL32.DisableThreadLibraryCalls(3719e0000) ret=3719e342e 165710.180:010c:0110:Call ntdll.LdrDisableThreadCalloutsForDll(3719e0000) ret=174025553 165710.180:010c:0110:Ret ntdll.LdrDisableThreadCalloutsForDll() retval=00000000 ret=174025553 165710.180:010c:0110:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=3719e342e 165710.180:010c:0110:Ret PE DLL (proc=00000003719E29C0,module=00000003719E0000 L"windows.ui.dll",reason=PROCESS_ATTACH,res=0000000000000000) retval=1 165710.180:010c:0110:trace:module:process_attach (L"windows.ui.dll",0000000000000000) - END 165710.180:010c:0110:Ret ntdll.LdrLoadDll() retval=00000000 ret=174025232 165710.180:010c:0110:Call ntdll.RtlReleasePath(01388040) ret=174025243 165710.180:010c:0110:trace:heap:RtlFreeHeap handle 0000000000140000, flags 0, ptr 0000000001388040, return 1, status 0. 165710.180:010c:0110:Ret ntdll.RtlReleasePath() retval=00000001 ret=174025243 165710.180:010c:0110:Ret KERNEL32.LoadLibraryW() retval=3719e0000 ret=31c5e820c 165710.180:010c:0110:Call KERNEL32.GetProcAddress(3719e0000,31c5ff2a1 "DllGetActivationFactory") ret=31c5e8228 165710.180:010c:0110:Ret KERNEL32.GetProcAddress() retval=3719e1050 ret=31c5e8228 165710.180:010c:0110:trace:winstring:WindowsGetStringRawBuffer (000000000011E098, 000000000011DE70) 165710.180:010c:0110:Call KERNEL32.IsBadStringPtrW(7fffff5dcba0,00000024) ret=31c5e85bf 165710.180:010c:0110:Ret KERNEL32.IsBadStringPtrW() retval=00000000 ret=31c5e85bf 165710.180:010c:0110:Call KERNEL32.IsBadStringPtrW(0086ab50,ffffffffffffffff) ret=31c5e8609 165710.180:010c:0110:Ret KERNEL32.IsBadStringPtrW() retval=00000000 ret=31c5e8609 165710.180:010c:0110:trace:combase:RoGetActivationFactory Found library L"C:\\windows\\system32\\windows.ui.dll" for class L"Windows.UI.ViewManagement.UISettings" 165710.180:010c:0110:Call windows.ui.DllGetActivationFactory(0011e098,0011de70) ret=31c5e824a 165710.180:010c:0110:Call combase.WindowsGetStringRawBuffer(0011e098,00000000) ret=3719e1604 165710.180:010c:0110:trace:winstring:WindowsGetStringRawBuffer (000000000011E098, 0000000000000000) 165710.180:010c:0110:Ret combase.WindowsGetStringRawBuffer() retval=7fffff5dcba0 ret=3719e1604 165710.180:010c:0110:Call combase.WindowsGetStringRawBuffer(0011e098,0011dd3c) ret=3719e1665 165710.180:010c:0110:trace:winstring:WindowsGetStringRawBuffer (000000000011E098, 000000000011DD3C) 165710.180:010c:0110:Ret combase.WindowsGetStringRawBuffer() retval=7fffff5dcba0 ret=3719e1665 165710.180:010c:0110:Call KERNEL32.IsBadStringPtrW(7fffff5dcba0,00000024) ret=3719e1171 165710.180:010c:0110:Ret KERNEL32.IsBadStringPtrW() retval=00000000 ret=3719e1171 165710.180:010c:0110:Call KERNEL32.GetModuleHandleW(3719e78d2 L"ntdll.dll") ret=3719e2fdd 165710.180:010c:0110:Call ntdll.RtlInitUnicodeString(0011da70,3719e78d2 L"ntdll.dll") ret=174025a2c 165710.180:010c:0110:Ret ntdll.RtlInitUnicodeString() retval=00000014 ret=174025a2c 165710.180:010c:0110:Call ntdll.LdrGetDllHandleEx(00000001,00000000,00000000,0011da70,0011da68) ret=174025a49 165710.180:010c:0110:trace:module:LdrGetDllHandleEx flags 0x1, load_path 0000000000000000, dll_characteristics 0000000000000000, name 000000000011DA70, base 000000000011DA68. 165710.180:010c:0110:trace:actctx:RtlFindActivationContextSectionString 00000001 (null) 2 L"ntdll.dll" 000000000011D7F0 165710.180:010c:0110:trace:module:LdrGetDllHandleEx L"ntdll.dll" -> 0000000170000000 (load path (null)) 165710.180:010c:0110:Ret ntdll.LdrGetDllHandleEx() retval=00000000 ret=174025a49 165710.180:010c:0110:Ret KERNEL32.GetModuleHandleW() retval=170000000 ret=3719e2fdd 165710.180:010c:0110:Call KERNEL32.GetProcAddress(170000000,3719e791d "__wine_dbg_strdup") ret=3719e2fe9 165710.180:010c:0110:Ret KERNEL32.GetProcAddress() retval=17005df50 ret=3719e2fe9 165710.180:010c:0110:Call KERNEL32.GetModuleHandleW(3719e78d2 L"ntdll.dll") ret=3719e2fdd 165710.180:010c:0110:Call ntdll.RtlInitUnicodeString(0011db90,3719e78d2 L"ntdll.dll") ret=174025a2c 165710.180:010c:0110:Ret ntdll.RtlInitUnicodeString() retval=00000014 ret=174025a2c 165710.180:010c:0110:Call ntdll.LdrGetDllHandleEx(00000001,00000000,00000000,0011db90,0011db88) ret=174025a49 165710.180:010c:0110:trace:module:LdrGetDllHandleEx flags 0x1, load_path 0000000000000000, dll_characteristics 0000000000000000, name 000000000011DB90, base 000000000011DB88. 165710.180:010c:0110:trace:actctx:RtlFindActivationContextSectionString 00000001 (null) 2 L"ntdll.dll" 000000000011D910 165710.180:010c:0110:trace:module:LdrGetDllHandleEx L"ntdll.dll" -> 0000000170000000 (load path (null)) 165710.180:010c:0110:Ret ntdll.LdrGetDllHandleEx() retval=00000000 ret=174025a49 165710.180:010c:0110:Ret KERNEL32.GetModuleHandleW() retval=170000000 ret=3719e2fdd 165710.180:010c:0110:Call KERNEL32.GetProcAddress(170000000,3719e7941 "__wine_dbg_header") ret=3719e2fe9 165710.180:010c:0110:Ret KERNEL32.GetProcAddress() retval=17005dfd0 ret=3719e2fe9 165710.180:010c:0110:trace:ui:DllGetActivationFactory Call KERNEL32.GetModuleHandleW(3719e78d2 L"ntdll.dll") ret=3719e2fdd 165710.180:010c:0110:Call ntdll.RtlInitUnicodeString(0011d760,3719e78d2 L"ntdll.dll") ret=174025a2c 165710.180:010c:0110:Ret ntdll.RtlInitUnicodeString() retval=00000014 ret=174025a2c 165710.180:010c:0110:Call ntdll.LdrGetDllHandleEx(00000001,00000000,00000000,0011d760,0011d758) ret=174025a49 165710.180:010c:0110:trace:module:LdrGetDllHandleEx flags 0x1, load_path 0000000000000000, dll_characteristics 0000000000000000, name 000000000011D760, base 000000000011D758. 165710.180:010c:0110:trace:actctx:RtlFindActivationContextSectionString 00000001 (null) 2 L"ntdll.dll" 000000000011D4E0 165710.180:010c:0110:trace:module:LdrGetDllHandleEx L"ntdll.dll" -> 0000000170000000 (load path (null)) 165710.180:010c:0110:Ret ntdll.LdrGetDllHandleEx() retval=00000000 ret=174025a49 165710.180:010c:0110:Ret KERNEL32.GetModuleHandleW() retval=170000000 ret=3719e2fdd 165710.180:010c:0110:Call KERNEL32.GetProcAddress(170000000,3719e792f "__wine_dbg_output") ret=3719e2fe9 165710.180:010c:0110:Ret KERNEL32.GetProcAddress() retval=17005e190 ret=3719e2fe9 class L"Windows.UI.ViewManagement.UISettings", factory 000000000011DE70. 165710.180:010c:0110:Call ucrtbase.wcscmp(7fffff5dcba0 L"Windows.UI.ViewManagement.UISettings",3719e82a0 L"Windows.UI.ViewManagement.UISettings") ret=3719e1627 165710.180:010c:0110:Ret ucrtbase.wcscmp() retval=00000000 ret=3719e1627 165710.180:010c:0110:trace:ui:factory_QueryInterface iface 00000003719E4050, iid {00000035-0000-0000-c000-000000000046}, out 000000000011DE70. 165710.180:010c:0110:trace:ui:factory_AddRef iface 00000003719E4050, ref 2. 165710.180:010c:0110:Ret windows.ui.DllGetActivationFactory() retval=00000000 ret=31c5e824a 165710.180:010c:0110:trace:ui:factory_QueryInterface iface 00000003719E4050, iid {00000035-0000-0000-c000-000000000046}, out 000000000011E078. 165710.180:010c:0110:trace:ui:factory_AddRef iface 00000003719E4050, ref 3. 165710.180:010c:0110:trace:combase:RoGetActivationFactory Created interface 00000003719E4050 165710.180:010c:0110:trace:ui:factory_Release iface 00000003719E4050, ref 2. 165710.180:010c:0110:Call ucrtbase.free(0086ab50) ret=31c5e828c 165710.180:010c:0110:Call KERNEL32.HeapFree(00800000,00000000,0086ab50) ret=170048f8f 165710.180:010c:0110:trace:heap:RtlFreeHeap handle 0000000000800000, flags 0, ptr 000000000086AB50, return 1, status 0. 165710.180:010c:0110:Ret KERNEL32.HeapFree() retval=00000001 ret=170048f8f 165710.180:010c:0110:Ret ucrtbase.free() retval=00000001 ret=31c5e828c 165710.180:010c:0110:Ret combase.RoGetActivationFactory() retval=00000000 ret=7fffff56e304 165710.180:010c:0110:trace:ui:factory_QueryInterface iface 00000003719E4050, iid {94ea2b94-e9cc-49e0-c0ff-ee64ca8f5b90}, out 000000000011E080. 165710.180:010c:0110:fixme:ui:factory_QueryInterface {94ea2b94-e9cc-49e0-c0ff-ee64ca8f5b90} not implemented, returning E_NOINTERFACE. 165710.180:010c:0110:trace:ui:factory_ActivateInstance iface 00000003719E4050, instance 000000000011E030. 165710.180:010c:0110:Call ucrtbase.calloc(00000001,00000020) ret=3719e2481 165710.180:010c:0110:Call ntdll.RtlAllocateHeap(00800000,00000008,00000020) ret=170048f8f 165710.180:010c:0110:trace:heap:RtlAllocateHeap handle 0000000000800000, flags 0x8, size 0x20, return 0000000000857880, status 0. 165710.180:010c:0110:Ret ntdll.RtlAllocateHeap() retval=00857880 ret=170048f8f 165710.180:010c:0110:Ret ucrtbase.calloc() retval=00857880 ret=3719e2481 165710.180:010c:0110:trace:ui:uisettings_QueryInterface iface 0000000000857880, iid {85361600-1c63-4627-bcb1-3a89e0bc9c55}, out 000000000011E038. 165710.180:010c:0110:trace:ui:uisettings_AddRef iface 0000000000857880, ref 2. 165710.180:010c:0110:trace:ui:uisettings_Release iface 0000000000857880, ref 1. 165710.180:010c:0110:trace:ui:factory_Release iface 00000003719E4050, ref 1. 165710.180:010c:0110:trace:ui:uisettings_QueryInterface iface 0000000000857880, iid {03021be4-5254-4781-8194-5168f7d06d7b}, out 000000000011E150. 165710.180:010c:0110:trace:ui:uisettings_AddRef iface 0000000000857880, ref 2. 165710.180:010c:0110:trace:ui:uisettings3_GetColorValue iface 0000000000857890, type 5, value 000000000011E140. 165710.180:010c:0110:fixme:ui:uisettings3_GetColorValue type 5 not implemented. 165710.180:010c:0110:Call oleaut32.GetErrorInfo(00000000,0011e070) ret=7fffff56f313 165710.180:010c:0110:Call combase.GetErrorInfo(00000000,0011e070) ret=170048f8f 165710.180:010c:0110:trace:ole:GetErrorInfo 0, 000000000011E070 165710.180:010c:0110:Ret combase.GetErrorInfo() retval=00000001 ret=170048f8f 165710.180:010c:0110:Ret oleaut32.GetErrorInfo() retval=00000001 ret=7fffff56f313 165710.180:010c:0110:Call KERNEL32.LoadLibraryW(7fffff5dd388 L"combase.dll") ret=7fffff5718b3 165710.180:010c:0110:Call ntdll.RtlInitUnicodeString(0011df30,7fffff5dd388 L"combase.dll") ret=174025e2f 165710.180:010c:0110:Ret ntdll.RtlInitUnicodeString() retval=00000018 ret=174025e2f 165710.180:010c:0110:Call ntdll.LdrGetDllPath(7fffff5dd388 L"combase.dll",00000000,0011dee0,0011dee8) ret=174025214 165710.180:010c:0110:trace:environ:RtlQueryEnvironmentVariable_U 0000000000000000 L"PATH" 000000000011DD30 165710.180:010c:0110:trace:heap:RtlAllocateHeap handle 0000000000140000, flags 0, size 0x17e, return 00000000013881F0, status 0. 165710.180:010c:0110:trace:environ:RtlQueryEnvironmentVariable_U 0000000000000000 L"PATH" 000000000011DD30 165710.180:010c:0110:Ret ntdll.LdrGetDllPath() retval=00000000 ret=174025214 165710.180:010c:0110:Call ntdll.LdrLoadDll(013881f0 L"Z:\\games\\tools-skyrimspecialedition\\LOOT;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0",00000000,0011df30,0011ded8) ret=174025232 165710.180:010c:0110:trace:module:load_dll looking for L"combase.dll" in L"Z:\\games\\tools-skyrimspecialedition\\LOOT;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0" 165710.180:010c:0110:trace:actctx:RtlFindActivationContextSectionString 00000001 (null) 2 L"combase.dll" 000000000011DB50 165710.180:010c:0110:trace:module:load_dll Found L"C:\\windows\\system32\\combase.dll" for L"combase.dll" at 000000031C5D0000, count=-1 165710.180:010c:0110:Ret ntdll.LdrLoadDll() retval=00000000 ret=174025232 165710.180:010c:0110:Call ntdll.RtlReleasePath(013881f0) ret=174025243 165710.180:010c:0110:trace:heap:RtlFreeHeap handle 0000000000140000, flags 0, ptr 00000000013881F0, return 1, status 0. 165710.180:010c:0110:Ret ntdll.RtlReleasePath() retval=00000001 ret=174025243 165710.180:010c:0110:Ret KERNEL32.LoadLibraryW() retval=31c5d0000 ret=7fffff5718b3 165710.180:010c:0110:Call KERNEL32.GetProcAddress(31c5d0000,7fffff5dd418 "RoOriginateLanguageException") ret=7fffff5718c2 165710.180:010c:0110:Ret KERNEL32.GetProcAddress() retval=31c5d3590 ret=7fffff5718c2 165710.180:010c:0110:Call combase.RoOriginateLanguageException(80004001,00000000,00000000) ret=7fffff571934 165710.180:010c:0110:trace:winstring:WindowsGetStringRawBuffer (0000000000000000, 000000000011DF2C) 165710.180:010c:0110:Call KERNEL32.IsBadStringPtrW(31c6006d4,00000000) ret=31c5e8c3a 165710.180:010c:0110:Ret KERNEL32.IsBadStringPtrW() retval=00000000 ret=31c5e8c3a 165710.180:010c:0110:fixme:combase:RoOriginateLanguageException 0x80004001, L"", 0000000000000000: stub 165710.180:010c:0110:Ret combase.RoOriginateLanguageException() retval=00000000 ret=7fffff571934 165710.180:010c:0110:Call oleaut32.GetErrorInfo(00000000,0011e010) ret=7fffff571947 165710.180:010c:0110:Call combase.GetErrorInfo(00000000,0011e010) ret=170048f8f 165710.180:010c:0110:trace:ole:GetErrorInfo 0, 000000000011E010 165710.180:010c:0110:Ret combase.GetErrorInfo() retval=00000001 ret=170048f8f 165710.180:010c:0110:Ret oleaut32.GetErrorInfo() retval=00000001 ret=7fffff571947 165710.180:010c:0110:Call ucrtbase._CxxThrowException(0011e0d0,7fffff5f94b8) ret=7fffff573940 165710.180:010c:0110:Call ntdll.RtlPcToFileHeader(7fffff5f94b8,0011e018) ret=2c748934e 165710.180:010c:0110:Ret ntdll.RtlPcToFileHeader() retval=7fffff550000 ret=2c748934e 165710.180:010c:0110:Call KERNEL32.RaiseException(e06d7363,00000001,00000004,0011e000) ret=2c7489367 165710.180:010c:0110:trace:seh:dispatch_exception code=e06d7363 flags=1 addr=0000000174013BA7 ip=174013ba7 165710.180:010c:0110:trace:seh:dispatch_exception info[0]=0000000019930520 165710.180:010c:0110:trace:seh:dispatch_exception info[1]=000000000011e0d0 165710.180:010c:0110:trace:seh:dispatch_exception info[2]=00007fffff5f94b8 165710.180:010c:0110:trace:seh:dispatch_exception info[3]=00007fffff550000 165710.180:010c:0110:warn:seh:dispatch_exception EXCEPTION_WINE_CXX_EXCEPTION exception (code=e06d7363) raised 165710.180:010c:0110:trace:seh:dispatch_exception rax=000000000011def8 rbx=000000000011e000 rcx=000000000011dec0 rdx=0000000000000000 165710.180:010c:0110:trace:seh:dispatch_exception rsi=000000000011e000 rdi=000000000011df90 rbp=000000000011dfc8 rsp=000000000011dea0 165710.180:010c:0110:trace:seh:dispatch_exception r8=00007fffff550000 r9=000000000011e018 r10=00007f184878a340 r11=0000000000000202 165710.180:010c:0110:trace:seh:dispatch_exception r12=000000000011ec60 r13=000000000011ec90 r14=ffffffffffffffff r15=0000000000000000 165710.180:010c:0110:trace:seh:call_vectored_handlers calling handler at 0000000359184490 code=e06d7363 flags=1 165710.180:010c:0110:trace:seh:call_vectored_handlers handler at 0000000359184490 returned 0 165710.180:010c:0110:trace:seh:call_vectored_handlers calling handler at 00000002E3653F70 code=e06d7363 flags=1 165710.180:010c:0110:trace:seh:call_vectored_handlers handler at 00000002E3653F70 returned 0 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 174013ba7 rsp 11dea0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 13b38-13baf 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00000001740AC594 flags 0 prolog 0xf bytes function 0000000174013B38-0000000174013BAF 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: subq $0xc8,%rsp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind inside epilog. 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 170048f8f rsp 11df70 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 48f10-48fc1 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 000000017008BCF8 flags 0 prolog 0x4 bytes function 0000000170048F10-0000000170048FC1 165710.180:010c:0110:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1: pushq %rbp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 2c7489367 rsp 11dfe0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 19320-1936e 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00000002C75143FC flags 0 prolog 0x5 bytes function 00000002C7489320-00000002C748936E 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x5: subq $0x40,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1: pushq %rbx 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 170048f8f rsp 11e030 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 48f10-48fc1 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 000000017008BCF8 flags 0 prolog 0x4 bytes function 0000000170048F10-0000000170048FC1 165710.180:010c:0110:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1: pushq %rbp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7fffff573940 rsp 11e0a0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 23880-23ad3 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F3294 flags 0 prolog 0xd bytes function 00007FFFFF573880-00007FFFFF573AD3 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xd: movq %rbx,0x60(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xd: subq $0x50,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %rbp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7fffff5a4340 rsp 11e100 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 542ac-54341 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F6210 flags 4 prolog 0x0 bytes function 00007FFFFF5A42AC-00007FFFFF5A4341 165710.180:010c:0110:trace:unwind:dump_unwind_info chained to function 00007FFFFF5A3A90-00007FFFFF5A3BA8 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F61E4 flags 3 prolog 0x20 bytes function 00007FFFFF5A3A90-00 007FFFFF5A3BA8 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x12: movq %rdi,0xf0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x12: subq $0xd0,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00007FFFFF5D2008 data at 00007FFFFF5F61F8 165710.180:010c:0110:trace:seh:call_handler calling handler 00007FFFFF5D2008 (rec=000000000011DEC0, frame=000000000011E100 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:trace:seh:call_handler handler at 00007FFFFF5D2008 returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7fffff5a6365 rsp 11e1e0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 561d0-56702 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F63C8 flags 3 prolog 0x32 bytes function 00007FFFFF5A61D0-00007FFFFF5A6702 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x24: movq %rdi,0x148(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x24: movq %rsi,0x140(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x24: movq %rbx,0x138(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x24: subq $0x100,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x18: pushq %r15 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x16: pushq %r14 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: pushq %r13 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x12: pushq %r12 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x10: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00007FFFFF5D2008 data at 00007FFFFF5F63EC 165710.180:010c:0110:trace:seh:call_handler calling handler 00007FFFFF5D2008 (rec=000000000011DEC0, frame=000000000011E1E0 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:trace:seh:call_handler handler at 00007FFFFF5D2008 returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7fffff5a4e91 rsp 11e310 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 54e31-55278 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F626C flags 4 prolog 0x10 bytes function 00007FFFFF5A4E31-00007FFFFF5A5278 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x10: movq %rsi,0xb0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x8: movq %rbx,0xa8(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info chained to function 00007FFFFF5A4E00-00007FFFFF5A4E31 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F6254 flags 3 prolog 0x20 bytes function 00007FFFFF5A4E00-00007FFFFF5A4E31 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x12: movq %rdi,0xb8(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x12: subq $0x90,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00007FFFFF5D2008 data at 00007FFFFF5F6268 165710.180:010c:0110:trace:seh:call_handler calling handler 00007FFFFF5D2008 (rec=000000000011DEC0, frame=000000000011E310 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:trace:seh:call_handler handler at 00007FFFFF5D2008 returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7fffff5a027b rsp 11e3b0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 501f0-5029e 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F171C flags 0 prolog 0xf bytes function 00007FFFFF5A01F0-00007FFFFF5A029E 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: movq %rsi,0x38(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: movq %rbx,0x30(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: subq $0x20,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xb: pushq %rdi 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7fffff5709f6 rsp 11e3e0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 20940-20a19 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF5F1DD4 flags 0 prolog 0x14 bytes function 00007FFFFF570940-00007FFFFF570A19 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: movq %rsi,0x60(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: movq %rbp,0x58(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: movq %rbx,0x50(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: subq $0x40,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x10: pushq %rdi 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffe754900 rsp 11e430 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 83310-84e38 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFECDABE4 flags 3 prolog 0x2d bytes function 00007FFFFE753310-00007FFFFE754E38 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1c: subq $0x6d8,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xd: pushq %r15 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xb: pushq %r14 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x9: pushq %r13 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x7: pushq %r12 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x5: pushq %rdi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: pushq %rsi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x3: pushq %rbx 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x2: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00007FFFFEC208BC data at 00007FFFFECDAC00 165710.180:010c:0110:trace:seh:call_handler calling handler 00007FFFFEC208BC (rec=000000000011DEC0, frame=000000000011E430 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:trace:seh:call_handler handler at 00007FFFFEC208BC returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffe75076a rsp 11eb50 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 806ee-807e4 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFECD9B5C flags 4 prolog 0x0 bytes function 00007FFFFE7506EE-00007FFFFE7507E4 165710.180:010c:0110:trace:unwind:dump_unwind_info chained to function 00007FFFFE750084-00007FFFFE75008F 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFECD9B04 flags 4 prolog 0xb bytes function 00007FFFFE750084-00007FFFFE75008F 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xb: movq %rdi,0x1b8(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: movq %rbx,0x1a8(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info chained to function 00007FFFFE750070-00007FFFFE750084 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFECD9AF8 flags 0 prolog 0x14 bytes function 00007FFFFE750070-00007FFFFE750084 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: subq $0x188,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %r13 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: pushq %rbp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffe75004b rsp 11ecf0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 80030-8006e 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFECD1038 flags 0 prolog 0x4 bytes function 00007FFFFE750030-00007FFFFE75006E 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffeed822a rsp 11ed20 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 77db0-7838b 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFF2BAEA0 flags 2 prolog 0x1d bytes function 00007FFFFEED7DB0-00007FFFFEED838B 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1d: subq $0xe8,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x11: pushq %r15 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: pushq %r14 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xd: pushq %r13 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xb: pushq %r12 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x9: pushq %rdi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x8: pushq %rsi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x7: pushq %rbx 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00007FFFFF179FEE data at 00007FFFFF2BAEBC 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffe752431 rsp 11ee50 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 823f0-831b6 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFECD9AD0 flags 3 prolog 0x38 bytes function 00007FFFFE7523F0-00007FFFFE7531B6 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x27: movq %rdi,0x3b8(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x27: movq %rsi,0x3b0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x27: movq %rbx,0x3a8(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x27: subq $0x370,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x18: pushq %r15 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x16: pushq %r14 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x14: pushq %r13 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x12: pushq %r12 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x10: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00007FFFFEC208BC data at 00007FFFFECD9AF4 165710.180:010c:0110:trace:seh:call_handler calling handler 00007FFFFEC208BC (rec=000000000011DEC0, frame=000000000011EE50 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:trace:seh:call_handler handler at 00007FFFFEC208BC returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffe10b7ef rsp 11f1f0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func b7e0-b883 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFE58AF14 flags 0 prolog 0x6 bytes function 00007FFFFE10B7E0-00007FFFFE10B883 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: subq $0x20,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x2: pushq %rbx 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 7ffffe103caf rsp 11f220 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 3c60-3cc2 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00007FFFFE58B20C flags 0 prolog 0xf bytes function 00007FFFFE103C60-00007FFFFE103CC2 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: movq %rsi,0x38(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: movq %rbx,0x30(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xf: subq $0x20,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xb: pushq %rdi 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 14003f0da rsp 11f250 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 3f040-3fe0a 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 0000000140365DF4 flags 3 prolog 0x2c bytes function 000000014003F040-000000014003FE0A 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1b: movq %rbx,0xac0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1b: subq $0xa80,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xc: pushq %r15 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xa: pushq %r14 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x8: pushq %rdi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x7: pushq %rsi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00000001402C48D4 data at 0000000140365E10 165710.180:010c:0110:trace:seh:call_handler calling handler 00000001402C48D4 (rec=000000000011DEC0, frame=000000000011F250 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:trace:seh:call_handler handler at 00000001402C48D4 returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 1402c598d rsp 11fd00 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 2c596f-2c59d9 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 0000000140396A14 flags 4 prolog 0x0 bytes function 00000001402C596F-00000001402C59D9 165710.180:010c:0110:trace:unwind:dump_unwind_info chained to function 00000001402C5830-00000001402C58C1 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 00000001403969E4 flags 0 prolog 0x6b bytes function 00000001402C5830-00000001402C58C1 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6b: movq %r14,0x48(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x5b: movq %rsi,0x60(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x9: subq $0x70,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x5: pushq %r15 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x3: pushq %rdi 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x2: pushq %rbx 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 1402c4d16 rsp 11fd90 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 2c4c10-2c4d81 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 0000000140396930 flags 1 prolog 0xa bytes function 00000001402C4C10-00000001402C4D81 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xa: movq %rbx,0x40(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0xa: subq $0x30,%rsp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x6: pushq %rdi 165710.180:010c:0110:trace:unwind:dump_unwind_info handler 00000001402C5720 data at 0000000140396940 165710.180:010c:0110:trace:seh:call_handler calling handler 00000001402C5720 (rec=000000000011DEC0, frame=000000000011FD90 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:Call ntdll.__C_specific_handler(0011dec0,0011fd90,0011d9c0,0011d2d0) ret=170056004 165710.180:010c:0110:trace:seh:__C_specific_handler 000000000011DEC0 000000000011FD90 000000000011D9C0 000000000011D2D0 165710.180:010c:0110:trace:unwind:dump_scope_table scope table at 0000000140396940 165710.180:010c:0110:trace:unwind:dump_scope_table 0: 00000001402C4C34-00000001402C4D38 handler 00000001402E02A0 target 00000001402C4D38 165710.180:010c:0110:trace:unwind:dump_scope_table 1: 00000001402C4D67-00000001402C4D79 handler 00000001402E02A0 target 00000001402C4D38 165710.180:010c:0110:trace:seh:__C_specific_handler calling filter 00000001402E02A0 ptrs 000000000011D170 frame 000000000011FD90 165710.180:010c:0110:Call ucrtbase._seh_filter_exe(e06d7363,0011d170) ret=1402e02b6 165710.180:010c:0110:trace:seh:_XcptFilter (e06d7363,000000000011D170) 165710.180:010c:0110:Ret ucrtbase._seh_filter_exe() retval=00000000 ret=1402e02b6 165710.180:010c:0110:Ret ntdll.__C_specific_handler() retval=00000001 ret=170056004 165710.180:010c:0110:trace:seh:call_handler handler at 00000001402C5720 returned 1 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 178028a39 rsp 11fdd0 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 28a30-28a42 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 000000017803B418 flags 0 prolog 0x4 bytes function 0000000178028A30-0000000178028A42 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: subq $0x28,%rsp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 170048f8f rsp 11fe00 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 48f10-48fc1 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 000000017008BCF8 flags 0 prolog 0x4 bytes function 0000000170048F10-0000000170048FC1 165710.180:010c:0110:trace:unwind:dump_unwind_info frame register rbp offset 0x0(%rsp) 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x4: leaq 0x0(%rsp),rbp 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x1: pushq %rbp 165710.180:010c:0110:trace:unwind:RtlVirtualUnwind type 1 rip 17005e545 rsp 11fe70 165710.180:010c:0110:trace:unwind:dump_unwind_info **** func 5e4c0-5e5c6 165710.180:010c:0110:trace:unwind:dump_unwind_info unwind info at 000000017008CE44 flags 0 prolog 0x7 bytes function 000000017005E4C0-000 000017005E5C6 165710.180:010c:0110:trace:unwind:dump_unwind_info 0x7: subq $0x168,%rsp 165710.180:010c:0110:trace:seh:call_stack_handlers found wine frame 000000000011FEA0 rsp 000000000011FFE0 handler 000000017006D1D0 165710.180:010c:0110:trace:seh:call_teb_handler calling TEB handler 000000017006D1D0 (rec=000000000011DEC0, frame=000000000011FEA0 context=000000000011D400, dispatch=000000000011D2D0) 165710.180:010c:0110:Call ucrtbase.__current_exception() ret=1402c54de 165710.180:010c:0110:trace:seh:__current_exception () 165710.180:010c:0110:Ret ucrtbase.__current_exception() retval=001feed0 ret=1402c54de 165710.180:010c:0110:Call ucrtbase.__current_exception_context() ret=1402c54ea 165710.180:010c:0110:trace:seh:__current_exception_context () 165710.180:010c:0110:Ret ucrtbase.__current_exception_context() retval=001feed8 ret=1402c54ea 165710.180:010c:0110:Call ucrtbase.terminate() ret=1402c54f2 165710.180:010c:0110:trace:msvcrt:abort () 165710.180:010c:0110:trace:seh:raise (22) 165710.180:010c:0110:trace:msvcrt:_exit (3) 165710.180:010c:0110:Call KERNEL32.ExitProcess(00000003) ret=2c74949c8 0110: terminate_process( handle=0000, exit_code=3 ) 0110: terminate_process() = 0 { self=1 } 165710.181:010c:0110:trace:module:LdrShutdownProcess () 165710.181:010c:0110:trace:thread:RtlProcessFlsData teb_fls_data 00000000001E3530, flags 0x1. 165710.181:010c:0110:Call PE DLL (proc=00000003719E29C0,module=00000003719E0000 L"windows.ui.dll",reason=PROCESS_DETACH,res=0000000000000001) 165710.181:010c:0110:Ret PE DLL (proc=00000003719E29C0,module=00000003719E0000 L"windows.ui.dll",reason=PROCESS_DETACH,res=0000000000000001) retval=1 165710.181:010c:0110:Call PE DLL (proc=00007FFFFF5D2470,module=00007FFFFF550000 L"qwindows.dll",reason=PROCESS_DETACH,res=0000000000000001) 165710.181:010c:0110:Call ucrtbase._execute_onexit_table(7fffff615bd0) ret=7fffff5d22fd 165710.181:010c:0110:trace:msvcrt:_execute_onexit_table (00007FFFFF615BD0)