CrossOver Support - Community Forums

Important Information These are community forums and not official technical support. If you need official support: Contact Us

CrossOver Linux
Discussion about CrossOver Linux

The following comments are owned by whoever posted them. We are not responsible for them in any way.

Back to Threads Reply to Thread

crossover 24 cannot run in latest Desktop Environtment ?

I install crossover from aur, with the latest manjaro 24.0
all app in bottle not showing even the portable one, sometimes running several time works.
simple application like winbox, winscp, heidisql, 7zip not running at all.
opening wine setting etc also hardly to showup.

previously before upgrade (manjaro is rolling distro), I can run the application with crossover 22.
I have use cinnamon 6.0.4, plasma 6.0.5, icewm 3.5.0


Running command: "C:\\users\\crossover\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\WinSCP.lnk" 
Debug channels: +pid,+process,+module,+loaddll,+seh
Extra environment variables:   

Bottle:
Name: x64
Template: win8_64
Windows Version: win8
Managed: False
Arch: win64
D3DMetal: Unknown
DXVK: Disabled
ESync: Disabled
High resolution mode: Unavailable
MSync: Unknown

Product:
CrossOver

Version:
24.0.2

Install location:
/opt/cxoffice

Bitness:
64-bit

Desktop session:
cinnamon

Window manager:
Mutter (Muffin)

Locale:
Locale: en_GB.UTF-8
LC_ADDRESS: id_ID.UTF-8
LC_IDENTIFICATION: id_ID.UTF-8
LC_NAME: id_ID.UTF-8
LC_TELEPHONE: id_ID.UTF-8

System Information:
NAME: Manjaro Linux
PRETTY_NAME: Manjaro Linux
ID: manjaro
ID_LIKE: arch
BUILD_ID: rolling
ANSI_COLOR: 32;1;24;144;200
HOME_URL: https://manjaro.org/
DOCUMENTATION_URL: https://wiki.manjaro.org/
SUPPORT_URL: https://forum.manjaro.org/
BUG_REPORT_URL: https://docs.manjaro.org/reporting-bugs/
PRIVACY_POLICY_URL: https://manjaro.org/privacy-policy/
LOGO: manjarolinux

Warnings:

Properties:
vulkan.present.amd64: yes
display.depth: 24
display.dpi: 96.0
opengl.vendor: Intel
opengl.version: 4.6 (Compatibility Profile) Mesa 24.0.8-manjaro1.1
opengl.renderer: Mesa Intel(R) HD Graphics 530 (SKL GT2)
opengl.glsl_version: 4.60
opengl.extensions: GL_ARB_multisample GL_EXT_abgr GL_EXT_bgra GL_EXT_blend_color GL_EXT_blend_minmax GL_EXT_blend_subtract GL_EXT_copy_texture GL_EXT_subtexture GL_EXT_texture_object GL_EXT_vertex_array GL_EXT_compiled_vertex_array GL_EXT_texture GL_EXT_texture3D GL_IBM_rasterpos_clip GL_ARB_point_parameters GL_EXT_draw_range_elements GL_EXT_packed_pixels GL_EXT_point_parameters GL_EXT_rescale_normal GL_EXT_separate_specular_color GL_EXT_texture_edge_clamp GL_SGIS_generate_mipmap GL_SGIS_texture_border_clamp GL_SGIS_texture_edge_clamp GL_SGIS_texture_lod GL_ARB_framebuffer_sRGB GL_ARB_multitexture GL_EXT_framebuffer_sRGB GL_IBM_multimode_draw_arrays GL_IBM_texture_mirrored_repeat GL_3DFX_texture_compression_FXT1 GL_ARB_texture_cube_map GL_ARB_texture_env_add GL_ARB_transpose_matrix GL_EXT_blend_func_separate GL_EXT_fog_coord GL_EXT_multi_draw_arrays GL_EXT_secondary_color GL_EXT_texture_env_add GL_EXT_texture_filter_anisotropic GL_EXT_texture_lod_bias GL_INGR_blend_func_separate GL_NV_blend_square GL_NV_light_max_exponent GL_NV_texgen_reflection GL_NV_texture_env_combine4 GL_S3_s3tc GL_SUN_multi_draw_arrays GL_ARB_texture_border_clamp GL_ARB_texture_compression GL_EXT_framebuffer_object GL_EXT_texture_compression_s3tc GL_EXT_texture_env_combine GL_EXT_texture_env_dot3 GL_MESA_window_pos GL_NV_packed_depth_stencil GL_NV_texture_rectangle GL_ARB_depth_texture GL_ARB_occlusion_query GL_ARB_shadow GL_ARB_texture_env_combine GL_ARB_texture_env_crossbar GL_ARB_texture_env_dot3 GL_ARB_texture_mirrored_repeat GL_ARB_window_pos GL_ATI_fragment_shader GL_EXT_stencil_two_side GL_EXT_texture_cube_map GL_NV_copy_depth_to_color GL_NV_depth_clamp GL_NV_fog_distance GL_NV_half_float GL_APPLE_packed_pixels GL_ARB_draw_buffers GL_ARB_fragment_program GL_ARB_fragment_shader GL_ARB_shader_objects GL_ARB_vertex_program GL_ARB_vertex_shader GL_ATI_draw_buffers GL_ATI_texture_env_combine3 GL_ATI_texture_float GL_EXT_shadow_funcs GL_EXT_stencil_wrap GL_MESA_pack_invert GL_NV_primitive_restart GL_ARB_depth_clamp GL_ARB_fragment_program_shadow GL_ARB_half_float_pixel GL_ARB_occlusion_query2 GL_ARB_point_sprite GL_ARB_shading_language_100 GL_ARB_sync GL_ARB_texture_non_power_of_two GL_ARB_vertex_buffer_object GL_ATI_blend_equation_separate GL_EXT_blend_equation_separate GL_OES_read_format GL_ARB_color_buffer_float GL_ARB_pixel_buffer_object GL_ARB_texture_compression_rgtc GL_ARB_texture_float GL_ARB_texture_rectangle GL_ATI_texture_compression_3dc GL_EXT_packed_float GL_EXT_pixel_buffer_object GL_EXT_texture_compression_dxt1 GL_EXT_texture_compression_rgtc GL_EXT_texture_rectangle GL_EXT_texture_sRGB GL_EXT_texture_shared_exponent GL_ARB_framebuffer_object GL_EXT_framebuffer_blit GL_EXT_framebuffer_multisample GL_EXT_packed_depth_stencil GL_ARB_vertex_array_object GL_ATI_separate_stencil GL_EXT_draw_buffers2 GL_EXT_draw_instanced GL_EXT_gpu_program_parameters GL_EXT_gpu_shader4 GL_EXT_texture_array GL_EXT_texture_compression_latc GL_EXT_texture_integer GL_EXT_texture_sRGB_decode GL_EXT_timer_query GL_OES_EGL_image GL_AMD_performance_monitor GL_EXT_texture_buffer_object GL_AMD_texture_texture4 GL_ARB_copy_buffer GL_ARB_depth_buffer_float GL_ARB_draw_instanced GL_ARB_half_float_vertex GL_ARB_instanced_arrays GL_ARB_map_buffer_range GL_ARB_texture_buffer_object GL_ARB_texture_rg GL_ARB_texture_swizzle GL_ARB_vertex_array_bgra GL_EXT_texture_swizzle GL_EXT_vertex_array_bgra GL_NV_conditional_render GL_AMD_conservative_depth GL_AMD_depth_clamp_separate GL_AMD_draw_buffers_blend GL_AMD_seamless_cubemap_per_texture GL_AMD_shader_stencil_export GL_ARB_ES2_compatibility GL_ARB_blend_func_extended GL_ARB_compatibility GL_ARB_debug_output GL_ARB_draw_buffers_blend GL_ARB_draw_elements_base_vertex GL_ARB_explicit_attrib_location GL_ARB_fragment_coord_conventions GL_ARB_provoking_vertex GL_ARB_sample_shading GL_ARB_sampler_objects GL_ARB_seamless_cube_map GL_ARB_shader_stencil_export GL_ARB_shader_texture_lod GL_ARB_tessellation_shader GL_ARB_texture_buffer_object_rgb32 GL_ARB_texture_cube_map_array GL_ARB_texture_gather GL_ARB_texture_multisample GL_ARB_texture_query_lod GL_ARB_texture_rgb10_a2ui GL_ARB_uniform_buffer_object GL_ARB_vertex_type_2_10_10_10_rev GL_EXT_provoking_vertex GL_EXT_texture_snorm GL_MESA_texture_signed_rgba GL_NV_copy_image GL_NV_texture_barrier GL_ARB_draw_indirect GL_ARB_get_program_binary GL_ARB_gpu_shader5 GL_ARB_gpu_shader_fp64 GL_ARB_robustness GL_ARB_separate_shader_objects GL_ARB_shader_bit_encoding GL_ARB_shader_precision GL_ARB_shader_subroutine GL_ARB_texture_compression_bptc GL_ARB_timer_query GL_ARB_transform_feedback2 GL_ARB_transform_feedback3 GL_ARB_vertex_attrib_64bit GL_ARB_viewport_array GL_EXT_direct_state_access GL_EXT_vertex_attrib_64bit GL_AMD_multi_draw_indirect GL_ANGLE_texture_compression_dxt3 GL_ANGLE_texture_compression_dxt5 GL_ARB_base_instance GL_ARB_compressed_texture_pixel_storage GL_ARB_conservative_depth GL_ARB_internalformat_query GL_ARB_map_buffer_alignment GL_ARB_shader_atomic_counters GL_ARB_shader_image_load_store GL_ARB_shading_language_420pack GL_ARB_shading_language_packing GL_ARB_texture_storage GL_ARB_transform_feedback_instanced GL_EXT_framebuffer_multisample_blit_scaled GL_EXT_transform_feedback GL_AMD_query_buffer_object GL_AMD_shader_trinary_minmax GL_AMD_vertex_shader_layer GL_AMD_vertex_shader_viewport_index GL_ARB_ES3_compatibility GL_ARB_arrays_of_arrays GL_ARB_clear_buffer_object GL_ARB_compute_shader GL_ARB_copy_image GL_ARB_explicit_uniform_location GL_ARB_fragment_layer_viewport GL_ARB_framebuffer_no_attachments GL_ARB_invalidate_subdata GL_ARB_multi_draw_indirect GL_ARB_program_interface_query GL_ARB_robust_buffer_access_behavior GL_ARB_shader_image_size GL_ARB_shader_storage_buffer_object GL_ARB_stencil_texturing GL_ARB_texture_buffer_range GL_ARB_texture_query_levels GL_ARB_texture_storage_multisample GL_ARB_texture_view GL_ARB_vertex_attrib_binding GL_KHR_debug GL_KHR_robustness GL_KHR_texture_compression_astc_ldr GL_AMD_pinned_memory GL_ARB_buffer_storage GL_ARB_clear_texture GL_ARB_compute_variable_group_size GL_ARB_enhanced_layouts GL_ARB_indirect_parameters GL_ARB_internalformat_query2 GL_ARB_multi_bind GL_ARB_query_buffer_object GL_ARB_seamless_cubemap_per_texture GL_ARB_shader_draw_parameters GL_ARB_shader_group_vote GL_ARB_shading_language_include GL_ARB_texture_mirror_clamp_to_edge GL_ARB_texture_stencil8 GL_ARB_vertex_type_10f_11f_11f_rev GL_EXT_debug_label GL_EXT_shader_framebuffer_fetch GL_EXT_shader_integer_mix GL_INTEL_performance_query GL_ARB_ES3_1_compatibility GL_ARB_clip_control GL_ARB_conditional_render_inverted GL_ARB_cull_distance GL_ARB_derivative_control GL_ARB_direct_state_access GL_ARB_get_texture_sub_image GL_ARB_pipeline_statistics_query GL_ARB_shader_texture_image_samples GL_ARB_texture_barrier GL_ARB_transform_feedback_overflow_query GL_EXT_polygon_offset_clamp GL_KHR_blend_equation_advanced GL_KHR_blend_equation_advanced_coherent GL_KHR_context_flush_control GL_KHR_robust_buffer_access_behavior GL_ARB_ES3_2_compatibility GL_ARB_fragment_shader_interlock GL_ARB_gpu_shader_int64 GL_ARB_parallel_shader_compile GL_ARB_post_depth_coverage GL_ARB_shader_atomic_counter_ops GL_ARB_shader_ballot GL_ARB_shader_clock GL_ARB_shader_viewport_layer_array GL_EXT_shader_samples_identical GL_EXT_texture_sRGB_R8 GL_KHR_no_error GL_KHR_texture_compression_astc_sliced_3d GL_NV_fragment_shader_interlock GL_ARB_gl_spirv GL_ARB_spirv_extensions GL_MESA_shader_integer_functions GL_ARB_polygon_offset_clamp GL_ARB_texture_filter_anisotropic GL_EXT_memory_object GL_EXT_memory_object_fd GL_EXT_semaphore GL_EXT_semaphore_fd GL_KHR_parallel_shader_compile GL_NV_alpha_to_coverage_dither_control GL_EXT_EGL_image_storage GL_EXT_shader_framebuffer_fetch_non_coherent GL_EXT_texture_shadow_lod GL_INTEL_blackhole_render GL_INTEL_shader_atomic_float_minmax GL_INTEL_shader_integer_functions2 GL_MESA_framebuffer_flip_y GL_NV_compute_shader_derivatives GL_EXT_EGL_sync GL_EXT_demote_to_helper_invocation GL_NV_ES1_1_compatibility GL_MESA_texture_const_bandwidth 
opengl.core.vendor: Intel
opengl.core.version: 4.6 (Core Profile) Mesa 24.0.8-manjaro1.1
opengl.core.renderer: Mesa Intel(R) HD Graphics 530 (SKL GT2)
opengl.core.glsl_version: 4.60
opengl.core.extensions: GL_3DFX_texture_compression_FXT1 GL_AMD_conservative_depth GL_AMD_depth_clamp_separate GL_AMD_draw_buffers_blend GL_AMD_gpu_shader_int64 GL_AMD_multi_draw_indirect GL_AMD_performance_monitor GL_AMD_pinned_memory GL_AMD_query_buffer_object GL_AMD_seamless_cubemap_per_texture GL_AMD_shader_stencil_export GL_AMD_shader_trinary_minmax GL_AMD_texture_texture4 GL_AMD_vertex_shader_layer GL_AMD_vertex_shader_viewport_index GL_ANGLE_texture_compression_dxt3 GL_ANGLE_texture_compression_dxt5 GL_ARB_ES2_compatibility GL_ARB_ES3_1_compatibility GL_ARB_ES3_2_compatibility GL_ARB_ES3_compatibility GL_ARB_arrays_of_arrays GL_ARB_base_instance GL_ARB_blend_func_extended GL_ARB_buffer_storage GL_ARB_clear_buffer_object GL_ARB_clear_texture GL_ARB_clip_control GL_ARB_compressed_texture_pixel_storage GL_ARB_compute_shader GL_ARB_compute_variable_group_size GL_ARB_conditional_render_inverted GL_ARB_conservative_depth GL_ARB_copy_buffer GL_ARB_copy_image GL_ARB_cull_distance GL_ARB_debug_output GL_ARB_depth_buffer_float GL_ARB_depth_clamp GL_ARB_derivative_control GL_ARB_direct_state_access GL_ARB_draw_buffers GL_ARB_draw_buffers_blend GL_ARB_draw_elements_base_vertex GL_ARB_draw_indirect GL_ARB_draw_instanced GL_ARB_enhanced_layouts GL_ARB_explicit_attrib_location GL_ARB_explicit_uniform_location GL_ARB_fragment_coord_conventions GL_ARB_fragment_layer_viewport GL_ARB_fragment_shader GL_ARB_fragment_shader_interlock GL_ARB_framebuffer_no_attachments GL_ARB_framebuffer_object GL_ARB_framebuffer_sRGB GL_ARB_get_program_binary GL_ARB_get_texture_sub_image GL_ARB_gl_spirv GL_ARB_gpu_shader5 GL_ARB_gpu_shader_fp64 GL_ARB_gpu_shader_int64 GL_ARB_half_float_pixel GL_ARB_half_float_vertex GL_ARB_indirect_parameters GL_ARB_instanced_arrays GL_ARB_internalformat_query GL_ARB_internalformat_query2 GL_ARB_invalidate_subdata GL_ARB_map_buffer_alignment GL_ARB_map_buffer_range GL_ARB_multi_bind GL_ARB_multi_draw_indirect GL_ARB_occlusion_query2 GL_ARB_parallel_shader_compile GL_ARB_pipeline_statistics_query GL_ARB_pixel_buffer_object GL_ARB_point_sprite GL_ARB_polygon_offset_clamp GL_ARB_post_depth_coverage GL_ARB_program_interface_query GL_ARB_provoking_vertex GL_ARB_query_buffer_object GL_ARB_robust_buffer_access_behavior GL_ARB_robustness GL_ARB_sample_shading GL_ARB_sampler_objects GL_ARB_seamless_cube_map GL_ARB_seamless_cubemap_per_texture GL_ARB_separate_shader_objects GL_ARB_shader_atomic_counter_ops GL_ARB_shader_atomic_counters GL_ARB_shader_ballot GL_ARB_shader_bit_encoding GL_ARB_shader_clock GL_ARB_shader_draw_parameters GL_ARB_shader_group_vote GL_ARB_shader_image_load_store GL_ARB_shader_image_size GL_ARB_shader_objects GL_ARB_shader_precision GL_ARB_shader_stencil_export GL_ARB_shader_storage_buffer_object GL_ARB_shader_subroutine GL_ARB_shader_texture_image_samples GL_ARB_shader_texture_lod GL_ARB_shader_viewport_layer_array GL_ARB_shading_language_420pack GL_ARB_shading_language_include GL_ARB_shading_language_packing GL_ARB_spirv_extensions GL_ARB_stencil_texturing GL_ARB_sync GL_ARB_tessellation_shader GL_ARB_texture_barrier GL_ARB_texture_border_clamp GL_ARB_texture_buffer_object GL_ARB_texture_buffer_object_rgb32 GL_ARB_texture_buffer_range GL_ARB_texture_compression_bptc GL_ARB_texture_compression_rgtc GL_ARB_texture_cube_map_array GL_ARB_texture_filter_anisotropic GL_ARB_texture_float GL_ARB_texture_gather GL_ARB_texture_mirror_clamp_to_edge GL_ARB_texture_multisample GL_ARB_texture_non_power_of_two GL_ARB_texture_query_levels GL_ARB_texture_query_lod GL_ARB_texture_rectangle GL_ARB_texture_rg GL_ARB_texture_rgb10_a2ui GL_ARB_texture_stencil8 GL_ARB_texture_storage GL_ARB_texture_storage_multisample GL_ARB_texture_swizzle GL_ARB_texture_view GL_ARB_timer_query GL_ARB_transform_feedback2 GL_ARB_transform_feedback3 GL_ARB_transform_feedback_instanced GL_ARB_transform_feedback_overflow_query GL_ARB_uniform_buffer_object GL_ARB_vertex_array_bgra GL_ARB_vertex_array_object GL_ARB_vertex_attrib_64bit GL_ARB_vertex_attrib_binding GL_ARB_vertex_buffer_object GL_ARB_vertex_shader GL_ARB_vertex_type_10f_11f_11f_rev GL_ARB_vertex_type_2_10_10_10_rev GL_ARB_viewport_array GL_ATI_blend_equation_separate GL_ATI_texture_float GL_EXT_EGL_image_storage GL_EXT_EGL_sync GL_EXT_abgr GL_EXT_blend_equation_separate GL_EXT_debug_label GL_EXT_demote_to_helper_invocation GL_EXT_draw_buffers2 GL_EXT_draw_instanced GL_EXT_framebuffer_blit GL_EXT_framebuffer_multisample GL_EXT_framebuffer_multisample_blit_scaled GL_EXT_framebuffer_object GL_EXT_framebuffer_sRGB GL_EXT_memory_object GL_EXT_memory_object_fd GL_EXT_packed_depth_stencil GL_EXT_packed_float GL_EXT_pixel_buffer_object GL_EXT_polygon_offset_clamp GL_EXT_provoking_vertex GL_EXT_semaphore GL_EXT_semaphore_fd GL_EXT_shader_framebuffer_fetch GL_EXT_shader_framebuffer_fetch_non_coherent GL_EXT_shader_integer_mix GL_EXT_shader_samples_identical GL_EXT_texture_array GL_EXT_texture_compression_dxt1 GL_EXT_texture_compression_rgtc GL_EXT_texture_compression_s3tc GL_EXT_texture_filter_anisotropic GL_EXT_texture_integer GL_EXT_texture_sRGB GL_EXT_texture_sRGB_R8 GL_EXT_texture_sRGB_decode GL_EXT_texture_shadow_lod GL_EXT_texture_shared_exponent GL_EXT_texture_snorm GL_EXT_texture_swizzle GL_EXT_timer_query GL_EXT_transform_feedback GL_EXT_vertex_array_bgra GL_EXT_vertex_attrib_64bit GL_IBM_multimode_draw_arrays GL_INTEL_blackhole_render GL_INTEL_conservative_rasterization GL_INTEL_performance_query GL_INTEL_shader_atomic_float_minmax GL_INTEL_shader_integer_functions2 GL_KHR_blend_equation_advanced GL_KHR_blend_equation_advanced_coherent GL_KHR_context_flush_control GL_KHR_debug GL_KHR_no_error GL_KHR_parallel_shader_compile GL_KHR_robust_buffer_access_behavior GL_KHR_robustness GL_KHR_texture_compression_astc_ldr GL_KHR_texture_compression_astc_sliced_3d GL_MESA_framebuffer_flip_y GL_MESA_pack_invert GL_MESA_shader_integer_functions GL_MESA_texture_const_bandwidth GL_MESA_texture_signed_rgba GL_NV_alpha_to_coverage_dither_control GL_NV_compute_shader_derivatives GL_NV_conditional_render GL_NV_copy_image GL_NV_depth_clamp GL_NV_fragment_shader_interlock GL_NV_packed_depth_stencil GL_NV_texture_barrier GL_OES_EGL_image GL_S3_s3tc

Libraries:

***** Fri May 31 08:08:14 2024
Starting: '/opt/cxoffice/bin/cxstart' '--bottle' 'x64' '--new-console' '--debugmsg' '+pid,+process,+module,+loaddll,+seh' '--env' '  ' '--workdir' 'C:\users\crossover\AppData\Roaming\Microsoft\Windows\Start Menu' '--' 'C:\users\crossover\AppData\Roaming\Microsoft\Windows\Start Menu\WinSCP.lnk'

5824: Grabbing the '/tmp/.wine-1000/bottle-0-0.lock' lock
5824: Got the '/tmp/.wine-1000/bottle-0-0.lock' lock
CXConfig->read(/opt/cxoffice/etc/cxoffice.conf)
CXConfig->read(/home/user/.cxoffice/cxoffice.conf)
Product version=24.0.2.37033
CXConfig->read(/home/user/.cxoffice/x64/cxbottle.conf)
Mode = 'private'
Exec-ing '/opt/cxoffice/bin/cxupdatecheck' '--reminder'
Exec-ing '/opt/cxoffice/bin/cxrating' '--bottle' 'x64' '--reminder'

** Fri May 31 08:08:14 2024
Starting '/opt/cxoffice/bin/wineloader64' '/opt/cxoffice/lib/wine/x86_64-windows/winewrapper.exe' '--new-console' '--workdir' 'C:\users\crossover\AppData\Roaming\Microsoft\Windows\Start Menu' '--start' '--'
'C:\users\crossover\AppData\Roaming\Microsoft\Windows\Start Menu\WinSCP.lnk'

Environment:
  CX_ROOT = "/opt/cxoffice"
  CX_BOTTLE = "x64"
  WINEPREFIX = "/home/user/.cxoffice/x64"
  CX_WINDOWS_VERSION = <undefined>
  PATH = "/opt/cxoffice/bin:/home/user/Android/Sdk/platform-tools:/home/user/Android/Sdk/emulator:/home/user/Android/Sdk/tools/bin:/home/user/Android/flutter/bin:/home/user/.local/bin:/home/user/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/opt/cxoffice/bin:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl"
  LD_LIBRARY_PATH = "/opt/cxoffice/lib64:/opt/cxoffice/lib"
  WINEDLLPATH = "/opt/cxoffice/lib/wine/x86_64-windows:/opt/cxoffice/lib/wine/i386-windows"
  WINEDLLOVERRIDES = <undefined>
  WINEDLLPATH_PREPEND = <undefined>
  LD_PRELOAD = <undefined>
  LD_ASSUME_KERNEL = <undefined>
  WINELOADER = "/opt/cxoffice/bin/wineloader64"
  WINESERVER = "/opt/cxoffice/bin/wineserver"
  WINEDEBUG = "+pid,+process,+module,+loaddll,+seh"
  WINEWRAPPER = "/opt/cxoffice/lib/wine/x86_64-windows/winewrapper.exe"
  CX_LOG = "-"
  CX_DEBUGMSG = "+pid,+process,+module,+loaddll,+seh"
  DISPLAY = ":0"
  VKD3D_DEBUG = <undefined>
  VKD3D_SHADER_DEBUG = <undefined>
5824: Releasing the '/tmp/.wine-1000/bottle-0-0.lock' lock
Command:
/opt/cxoffice/bin/wineloader64 /opt/cxoffice/lib/wine/x86_64-windows/winewrapper.exe --new-console --workdir C:\users\crossover\AppData\Roaming\Microsoft\Windows\Start Menu --start -- C:\users\crossover\AppData\Roaming\Microsoft\Windows\Start Menu\WinSCP.lnk
wineserver: using server-side synchronization.
reading '/opt/cxoffice/etc/cxoffice.conf' took 0.0004s
reading '/home/user/.cxoffice/cxoffice.conf' took 0.0003s
5826: Grabbing the '/tmp/.wine-1000/cxoffice.conf.lock' lock
reading '/home/user/.cxoffice/cxoffice.conf' took 0.0000s
'/home/user/.cxoffice/cxoffice.conf' not modified -> no need to save

5826: Releasing the 'cxoffice.conf' lock
reading '/opt/cxoffice/etc/cxoffice.conf' took 0.0004s
reading '/home/user/.cxoffice/cxoffice.conf' took 0.0002s
reading '/home/user/.cxoffice/x64/cxbottle.conf' took 0.0003s
Found no application to rate in x64
0020:0024:trace:process:NtCreateUserProcess L"\\??\\C:\\windows\\system32\\wineboot.exe" image L"C:\\windows\\system32\\wineboot.exe" cmdline L"\"C:\\windows\\system32\\wineboot.exe\" --init" parent (nil) machine 0
0020:0024:trace:process:send_to_cx_loader loader (null) wineserversocket 7 stdin_fd -1 stdout_fd -1 unixdir (null) winedebug "WINEDEBUG=+pid,+process,+module,+loaddll,+seh" wineloader (null)
0020:0024:trace:process:send_to_cx_loader CX_ALT_LOADER_SOCKET is not set; nothing to do
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\wineboot.exe"
0028:002c:trace:module:get_load_order got hardcoded default for L"wineboot.exe"
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\wineboot.exe"
0028:002c:trace:module:get_load_order got hardcoded default for L"wineboot.exe"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\wineboot.exe" at 0x400000-0x423000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .text at 0x401000 off 1000 size 8000 virt 7cd0 flags 60500060
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .data at 0x409000 off 9000 size 1000 virt 1c0 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .rdata at 0x40a000 off a000 size c000 virt b940 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .pdata at 0x416000 off 16000 size 1000 virt 288 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .xdata at 0x417000 off 17000 size 1000 virt 28c flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .bss at 0x418000 off 0 size 0 virt 5a0 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .idata at 0x419000 off 18000 size 2000 virt 1a94 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\wineboot.exe" section .rsrc at 0x41b000 off 1a000 size 8000 virt 7ef0 flags c0400040
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ntdll.dll" at 0x6ffffff40000-0x6ffffffe9000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text at 0x6ffffff41000 off 1000 size 6f000 virt 6e4e0 flags 60500020
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .data at 0x6ffffffb0000 off 70000 size 1000 virt d20 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rodata at 0x6ffffffb1000 off 71000 size 3000 virt 2058 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rdata at 0x6ffffffb4000 off 74000 size 13000 virt 12d90 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section /4 at 0x6ffffffc7000 off 87000 size 1000 virt 8f0 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .pdata at 0x6ffffffc8000 off 88000 size 9000 virt 816c flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .xdata at 0x6ffffffd1000 off 91000 size 6000 virt 5088 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .bss at 0x6ffffffd7000 off 0 size 0 virt 3510 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .edata at 0x6ffffffdb000 off 97000 size b000 virt a07e flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .idata at 0x6ffffffe6000 off a2000 size 1000 virt 14 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rsrc at 0x6ffffffe7000 off a3000 size 1000 virt 3b0 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .reloc at 0x6ffffffe8000 off a4000 size 1000 virt 194 flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ntdll.dll" dynamic base 170000000 -> 6ffffff40000 mapped at 0x6ffffff40000
0028:002c:trace:module:load_apiset_dll loaded L"\\??\\C:\\windows\\system32\\apisetschema.dll" apiset at 0x7ffffe301000
0020:0024:trace:process:NtCreateUserProcess L"\\??\\C:\\windows\\system32\\wineboot.exe" pid 0028 tid 002c handles 0x14/0x18
0028:002c:trace:process:NtQueryInformationProcess (0xffffffffffffffff,0x00000025,0x7ffffe2ff940,0x00000040,(nil))
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\wineboot.exe" 00007FFFFE322CA0 0000000000400000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 0000000000400000: builtin
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\kernel32.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"kernel32.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\kernel32.dll" at 0x6fffffec0000-0x6ffffff22000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .text at 0x6fffffec1000 off 1000 size 30000 virt 2ffe0 flags 60500020
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .data at 0x6fffffef1000 off 31000 size 1000 virt 200 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .rodata at 0x6fffffef2000 off 32000 size 2000 virt 1d6c flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .rdata at 0x6fffffef4000 off 34000 size 4000 virt 30a0 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section /4 at 0x6fffffef8000 off 38000 size 1000 virt 710 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .pdata at 0x6fffffef9000 off 39000 size 6000 virt 5178 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .xdata at 0x6fffffeff000 off 3f000 size 3000 virt 2b50 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .bss at 0x6ffffff02000 off 0 size 0 virt 228 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .edata at 0x6ffffff03000 off 42000 size b000 virt a48d flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .idata at 0x6ffffff0e000 off 4d000 size a000 virt 96e0 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .rsrc at 0x6ffffff18000 off 57000 size 9000 virt 8190 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .reloc at 0x6ffffff21000 off 60000 size 1000 virt 1c flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\kernel32.dll" dynamic base 178000000 -> 6fffffec0000 mapped at 0x6fffffec0000
0028:002c:trace:module:load_dll looking for L"kernelbase.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\kernelbase.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"kernelbase.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\kernelbase.dll" at 0x6fffffc10000-0x6fffffea5000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .text at 0x6fffffc11000 off 1000 size 88000 virt 87210 flags 60500020
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .data at 0x6fffffc99000 off 89000 size 2000 virt 1ea0 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .rodata at 0x6fffffc9b000 off 8b000 size 2000 virt 1dd4 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .rdata at 0x6fffffc9d000 off 8d000 size 18000 virt 17300 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section /4 at 0x6fffffcb5000 off a5000 size 1000 virt 5a8 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .pdata at 0x6fffffcb6000 off a6000 size 9000 virt 81cc flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .xdata at 0x6fffffcbf000 off af000 size 6000 virt 5b38 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .bss at 0x6fffffcc5000 off 0 size 0 virt 28c0 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .edata at 0x6fffffcc8000 off b5000 size b000 virt a987 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .idata at 0x6fffffcd3000 off c0000 size 5000 virt 475c flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .rsrc at 0x6fffffcd8000 off c5000 size 1cc000 virt 1cbc90 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .reloc at 0x6fffffea4000 off 291000 size 1000 virt 1f4 flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\kernelbase.dll" dynamic base 174000000 -> 6fffffc10000 mapped at 0x6fffffc10000
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=2
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\kernelbase.dll" 00007FFFFE3232C0 00006FFFFFC10000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 00006FFFFFC10000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\kernelbase.dll" at 00006FFFFFC10000
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=3
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\kernel32.dll" 00007FFFFE323030 00006FFFFFEC0000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 00006FFFFFEC0000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\kernel32.dll" at 00006FFFFFEC0000
0028:002c:trace:module:load_dll looking for L"advapi32.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\advapi32.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"advapi32.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\advapi32.dll" at 0x7bfa0000-0x7bfe1000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .text at 0x7bfa1000 off 1000 size 24000 virt 23aa0 flags 60500060
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .data at 0x7bfc5000 off 25000 size 1000 virt 1f0 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .rodata at 0x7bfc6000 off 26000 size 1000 virt e30 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .rdata at 0x7bfc7000 off 27000 size 7000 virt 6060 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section /4 at 0x7bfce000 off 2e000 size 1000 virt 360 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .pdata at 0x7bfcf000 off 2f000 size 3000 virt 2cf4 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .xdata at 0x7bfd2000 off 32000 size 2000 virt 1dc4 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .bss at 0x7bfd4000 off 0 size 0 virt 19a0 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .edata at 0x7bfd6000 off 34000 size 5000 virt 4701 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .idata at 0x7bfdb000 off 39000 size 4000 virt 3190 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .rsrc at 0x7bfdf000 off 3d000 size 1000 virt 3c8 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\advapi32.dll" section .reloc at 0x7bfe0000 off 3e000 size 1000 virt 15c flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\advapi32.dll" dynamic base 10000000 -> 7bfa0000 mapped at 0x7bfa0000
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernel32.dll" for L"kernel32.dll" at 00006FFFFFEC0000, count=2
0028:002c:trace:module:load_dll looking for L"kernelbase.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernelbase.dll" for L"kernelbase.dll" at 00006FFFFFC10000, count=2
0028:002c:trace:module:load_dll looking for L"msvcrt.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\msvcrt.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"msvcrt.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\msvcrt.dll" at 0x7bef0000-0x7bf8a000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .text at 0x7bef1000 off 1000 size 6d000 virt 6cdd0 flags 60500060
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .data at 0x7bf5e000 off 6e000 size 2000 virt 1840 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .rodata at 0x7bf60000 off 70000 size 2000 virt 146c flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .rdata at 0x7bf62000 off 72000 size d000 virt c7e0 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section /4 at 0x7bf6f000 off 7f000 size 1000 virt 148 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .pdata at 0x7bf70000 off 80000 size 8000 virt 7a28 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .xdata at 0x7bf78000 off 88000 size 5000 virt 4ea8 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .bss at 0x7bf7d000 off 0 size 0 virt 1c68 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .edata at 0x7bf7f000 off 8d000 size 7000 virt 632b flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .idata at 0x7bf86000 off 94000 size 2000 virt 1958 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .rsrc at 0x7bf88000 off 96000 size 1000 virt 398 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\msvcrt.dll" section .reloc at 0x7bf89000 off 97000 size 1000 virt 218 flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\msvcrt.dll" dynamic base 10000000 -> 7bef0000 mapped at 0x7bef0000
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernel32.dll" for L"kernel32.dll" at 00006FFFFFEC0000, count=3
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=4
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\msvcrt.dll" 00007FFFFE323F10 000000007BEF0000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 000000007BEF0000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\msvcrt.dll" at 000000007BEF0000
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=5
0028:002c:trace:module:load_dll looking for L"sechost.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\sechost.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"sechost.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\sechost.dll" at 0x7beb0000-0x7bedb000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .text at 0x7beb1000 off 1000 size 19000 virt 18cb0 flags 60500060
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .data at 0x7beca000 off 1a000 size 1000 virt 190 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .rodata at 0x7becb000 off 1b000 size 1000 virt ef0 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .rdata at 0x7becc000 off 1c000 size 4000 virt 3900 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section /4 at 0x7bed0000 off 20000 size 1000 virt 978 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .pdata at 0x7bed1000 off 21000 size 2000 virt 1428 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .xdata at 0x7bed3000 off 23000 size 2000 virt 10d8 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .bss at 0x7bed5000 off 0 size 0 virt 1a8 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .edata at 0x7bed6000 off 25000 size 2000 virt 1e8c flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .idata at 0x7bed8000 off 27000 size 2000 virt 13a4 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\sechost.dll" section .reloc at 0x7beda000 off 29000 size 1000 virt f0 flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\sechost.dll" dynamic base 10000000 -> 7beb0000 mapped at 0x7beb0000
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernel32.dll" for L"kernel32.dll" at 00006FFFFFEC0000, count=4
0028:002c:trace:module:load_dll looking for L"kernelbase.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernelbase.dll" for L"kernelbase.dll" at 00006FFFFFC10000, count=3
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=6
0028:002c:trace:module:load_dll looking for L"ucrtbase.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\ucrtbase.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"ucrtbase.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ucrtbase.dll" at 0x7bdd0000-0x7be9a000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .text at 0x7bdd1000 off 1000 size 87000 virt 869a0 flags 60500060
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .data at 0x7be58000 off 88000 size 2000 virt 1b50 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .rodata at 0x7be5a000 off 8a000 size 4000 virt 3510 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .rdata at 0x7be5e000 off 8e000 size 10000 virt f850 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section /4 at 0x7be6e000 off 9e000 size 2000 virt 1638 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .pdata at 0x7be70000 off a0000 size d000 virt c7d4 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .xdata at 0x7be7d000 off ad000 size 8000 virt 7418 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .bss at 0x7be85000 off 0 size 0 virt 20f8 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .edata at 0x7be88000 off b5000 size e000 virt d619 flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .idata at 0x7be96000 off c3000 size 2000 virt 1b90 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .rsrc at 0x7be98000 off c5000 size 1000 virt 3c8 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ucrtbase.dll" section .reloc at 0x7be99000 off c6000 size 1000 virt 258 flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ucrtbase.dll" dynamic base 10000000 -> 7bdd0000 mapped at 0x7bdd0000
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernel32.dll" for L"kernel32.dll" at 00006FFFFFEC0000, count=5
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=7
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\ucrtbase.dll" 00007FFFFE321F50 000000007BDD0000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 000000007BDD0000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\ucrtbase.dll" at 000000007BDD0000
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\sechost.dll" 00007FFFFE321E10 000000007BEB0000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 000000007BEB0000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\sechost.dll" at 000000007BEB0000
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\advapi32.dll" 00007FFFFE323C80 000000007BFA0000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 000000007BFA0000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\advapi32.dll" at 000000007BFA0000
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernel32.dll" for L"kernel32.dll" at 00006FFFFFEC0000, count=6
0028:002c:trace:module:load_dll looking for L"kernelbase.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernelbase.dll" for L"kernelbase.dll" at 00006FFFFFC10000, count=4
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=8
0028:002c:trace:module:load_dll looking for L"ucrtbase.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ucrtbase.dll" for L"ucrtbase.dll" at 000000007BDD0000, count=2
0028:002c:trace:module:load_dll looking for L"ws2_32.dll" in (null)
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\ws2_32.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"ws2_32.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ws2_32.dll" at 0x7bd90000-0x7bdb7000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .text at 0x7bd91000 off 1000 size 14000 virt 13680 flags 60500060
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .data at 0x7bda5000 off 15000 size 1000 virt 240 flags c0600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .rodata at 0x7bda6000 off 16000 size 1000 virt 864 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .rdata at 0x7bda7000 off 17000 size 5000 virt 4b90 flags 40600040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section /4 at 0x7bdac000 off 1c000 size 1000 virt 58 flags 40400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .pdata at 0x7bdad000 off 1d000 size 1000 virt ffc flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .xdata at 0x7bdae000 off 1e000 size 1000 virt c5c flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .bss at 0x7bdaf000 off 0 size 0 virt 174 flags c0600080
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .edata at 0x7bdb0000 off 1f000 size 2000 virt 13cb flags 40300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .idata at 0x7bdb2000 off 21000 size 1000 virt d08 flags c0300040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .rsrc at 0x7bdb3000 off 22000 size 3000 virt 29b8 flags c0400040
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ws2_32.dll" section .reloc at 0x7bdb6000 off 25000 size 1000 virt 68 flags 42300040
0028:002c:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ws2_32.dll" dynamic base 10000000 -> 7bd90000 mapped at 0x7bd90000
0028:002c:trace:module:load_dll looking for L"kernel32.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\kernel32.dll" for L"kernel32.dll" at 00006FFFFFEC0000, count=7
0028:002c:trace:module:load_dll looking for L"ntdll.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ntdll.dll" for L"ntdll.dll" at 00006FFFFFF40000, count=9
0028:002c:trace:module:load_dll looking for L"ucrtbase.dll" in (null)
0028:002c:trace:module:load_dll Found L"C:\\windows\\system32\\ucrtbase.dll" for L"ucrtbase.dll" at 000000007BDD0000, count=3
0028:002c:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\ws2_32.dll" 00007FFFFE3221E0 000000007BD90000
0028:002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 000000007BD90000: builtin
0028:002c:trace:module:load_dll Loaded module L"\\??\\C:\\windows\\system32\\ws2_32.dll" at 000000007BD90000
0028:002c:trace:module:process_attach (L"ntdll.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:MODULE_InitDLL (00006FFFFFF40000 L"ntdll.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:MODULE_InitDLL (00006FFFFFF40000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"ntdll.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:process_attach (L"kernel32.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:process_attach (L"kernelbase.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:MODULE_InitDLL (00006FFFFFC10000 L"kernelbase.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:process:NtQueryInformationProcess (0xffffffffffffffff,0x0000001a,0x7ffffe2ff0a8,0x00000008,(nil))
0028:002c:trace:process:GetEnvironmentVariableW (L"WINEUNIXCP" 00007FFFFE2FED30 85)
0028:002c:trace:process:ExpandEnvironmentStringsW (L"@tzres.dll,-160" 0000000000000000 0)
0028:002c:trace:process:ExpandEnvironmentStringsW (L"@tzres.dll,-160" 00007FFFFE320970 16)
0028:002c:trace:module:LdrGetDllHandleEx flags 0, load_path 00007FFFFE320EE0, dll_characteristics 0000000000000000, name 00007FFFFE2FEB00, base 00007FFFFE2FEA98.
0028:002c:trace:module:LdrGetDllHandleEx L"C:\\windows\\system32\\tzres.dll" -> 0000000000000000 (load path L"C:\\windows\\system32;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0")
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\tzres.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"tzres.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\tzres.dll" at 0x180000000-0x180081000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\tzres.dll" section .rsrc at 0x180001000 off 1000 size 80000 virt 7fdc8 flags 40000040
0028:002c:trace:module:FindResourceExW 0000000180000002 #0006 #000b 0000
0028:002c:trace:module:LoadResource 0000000180000002 0000000180007390
0028:002c:trace:process:ExpandEnvironmentStringsW (L"@tzres.dll,-161" 0000000000000000 0)
0028:002c:trace:process:ExpandEnvironmentStringsW (L"@tzres.dll,-161" 00007FFFFE3209D0 16)
0028:002c:trace:module:LdrGetDllHandleEx flags 0, load_path 00007FFFFE320F30, dll_characteristics 0000000000000000, name 00007FFFFE2FEB00, base 00007FFFFE2FEA98.
0028:002c:trace:module:LdrGetDllHandleEx L"C:\\windows\\system32\\tzres.dll" -> 0000000000000000 (load path L"C:\\windows\\system32;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0")
0028:002c:trace:module:get_load_order looking for L"C:\\windows\\system32\\tzres.dll"
0028:002c:trace:module:get_load_order got hardcoded default for L"tzres.dll"
0028:002c:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\tzres.dll" at 0x180000000-0x180081000
0028:002c:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\tzres.dll" section .rsrc at 0x180001000 off 1000 size 80000 virt 7fdc8 flags 40000040
0028:002c:trace:module:FindResourceExW 0000000180000002 #0006 #000b 0000
0028:002c:trace:module:LoadResource 0000000180000002 0000000180007390
0028:002c:trace:module:MODULE_InitDLL (00006FFFFFC10000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"kernelbase.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:MODULE_InitDLL (00006FFFFFEC0000 L"kernel32.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:MODULE_InitDLL (00006FFFFFEC0000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"kernel32.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:process_attach (L"advapi32.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:process_attach (L"msvcrt.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:MODULE_InitDLL (000000007BEF0000 L"msvcrt.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:LdrGetDllFullName module 0000000000000000, name 00007FFFFE2FEE50.
0028:002c:trace:module:GetModuleFileNameW L"C:\\windows\\system32\\wineboot.exe"
0028:002c:trace:module:LdrGetDllFullName module 0000000000000000, name 00007FFFFE2FEEA0.
0028:002c:trace:module:GetModuleFileNameW L"C:\\windows\\system32\\wineboot.exe"
0028:002c:trace:module:LdrAddRefDll (L"msvcrt.dll") ldr.LoadCount: -1
0028:002c:trace:module:MODULE_InitDLL (000000007BEF0000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"msvcrt.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:process_attach (L"sechost.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:process_attach (L"ucrtbase.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:MODULE_InitDLL (000000007BDD0000 L"ucrtbase.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:LdrGetDllFullName module 0000000000000000, name 00007FFFFE2FED90.
0028:002c:trace:module:GetModuleFileNameW L"C:\\windows\\system32\\wineboot.exe"
0028:002c:trace:module:LdrGetDllFullName module 0000000000000000, name 00007FFFFE2FEDE0.
0028:002c:trace:module:GetModuleFileNameW L"C:\\windows\\system32\\wineboot.exe"
0028:002c:trace:module:MODULE_InitDLL (000000007BDD0000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"ucrtbase.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:MODULE_InitDLL (000000007BEB0000 L"sechost.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:MODULE_InitDLL (000000007BEB0000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"sechost.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:MODULE_InitDLL (000000007BFA0000 L"advapi32.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:MODULE_InitDLL (000000007BFA0000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"advapi32.dll",00007FFFFE2FFB00) - END
0028:002c:trace:module:process_attach (L"ws2_32.dll",00007FFFFE2FFB00) - START
0028:002c:trace:module:MODULE_InitDLL (000000007BD90000 L"ws2_32.dll",PROCESS_ATTACH,00007FFFFE2FFB00) - CALL
0028:002c:trace:module:LdrGetDllHandleEx flags 0x1, load_path 0000000000000000, dll_characteristics 0000000000000000, name 00007FFFFE2FF0C0, base 00007FFFFE2FF0B8.
0028:002c:trace:module:LdrGetDllHandleEx L"ntdll.dll" -> 00006FFFFFF40000 (load path (null))
0028:002c:trace:module:MODULE_InitDLL (000000007BD90000,PROCESS_ATTACH,00007FFFFE2FFB00) - RETURN 1
0028:002c:trace:module:process_attach (L"ws2_32.dll",00007FFFFE2FFB00) - END
0028:002c:trace:process:NtQueryInformationProcess (0xffffffffffffffff,0x00000007,0x7ffffe2ff748,0x00000008,(nil))
0028:002c:trace:process:NtQueryInformationProcess (0xffffffffffffffff,0x0000001a,0x7ffffe2fef08,0x00000008,(nil))
0028:002c:trace:module:LdrGetDllHandleEx flags 0x1, load_path 0000000000000000, dll_characteristics 0000000000000000, name 00007FFFFE2FEE00, base 00007FFFFE2FEDF8.
0028:002c:trace:module:LdrGetDllHandleEx L"ntdll.dll" -> 00006FFFFFF40000 (load path (null))
0028:002c:trace:module:LdrGetDllHandleEx flags 0x1, load_path 0000000000000000, dll_characteristics 0000000000000000, name 00007FFFFE2FEB60, base 00007FFFFE2FEB58.
0028:002c:trace:module:LdrGetDllHandleEx L"ntdll.dll" -> 00006FFFFFF40000 (load path (null))
0028:002c:trace:process:CreateProcessInternalW app L"C:\\windows\\system32\\services.exe" cmdline (null)
0028:002c:trace:process:CreateProcessInternalW app L"C:\\windows\\system32\\services.exe" cmdline L"\"C:\\windows\\system32\\services.exe\"" after all hacks
0028:002c:trace:process:NtCreateUserProcess L"\\??\\C:\\windows\\system32\\services.exe" image L"C:\\windows\\system32\\services.exe" cmdline L"\"C:\\windows\\system32\\services.exe\"" parent (nil) machine 0
0028:002c:trace:process:send_to_cx_loader loader (null) wineserversocket 5 stdin_fd -1 stdout_fd -1 unixdir (null) winedebug "WINEDEBUG=+pid,+process,+module,+loaddll,+seh" wineloader (null)
0028:002c:trace:process:send_to_cx_loader CX_ALT_LOADER_SOCKET is not set; nothing to do
0030:0034:trace:module:get_load_order looking for L"C:\\windows\\system32\\services.exe"
0030:0034:trace:module:get_load_order got hardcoded default for L"services.exe"
0030:0034:trace:module:get_load_order looking for L"C:\\windows\\system32\\services.exe"
0030:0034:trace:module:get_load_order got hardcoded default for L"services.exe"
0030:0034:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\services.exe" at 0x400000-0x422000
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .text at 0x401000 off 1000 size 18000 virt 17c20 flags 60500020
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .data at 0x419000 off 19000 size 1000 virt 2d0 flags c0600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .rdata at 0x41a000 off 1a000 size 3000 virt 2c40 flags 40600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .pdata at 0x41d000 off 1d000 size 1000 virt c78 flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .xdata at 0x41e000 off 1e000 size 1000 virt b04 flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .bss at 0x41f000 off 0 size 0 virt 230 flags c0600080
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\services.exe" section .idata at 0x420000 off 1f000 size 2000 virt 1870 flags c0300040
0030:0034:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\ntdll.dll" at 0x6ffffff40000-0x6ffffffe9000
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .text at 0x6ffffff41000 off 1000 size 6f000 virt 6e4e0 flags 60500020
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .data at 0x6ffffffb0000 off 70000 size 1000 virt d20 flags c0600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rodata at 0x6ffffffb1000 off 71000 size 3000 virt 2058 flags c0300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rdata at 0x6ffffffb4000 off 74000 size 13000 virt 12d90 flags 40600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section /4 at 0x6ffffffc7000 off 87000 size 1000 virt 8f0 flags 40400040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .pdata at 0x6ffffffc8000 off 88000 size 9000 virt 816c flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .xdata at 0x6ffffffd1000 off 91000 size 6000 virt 5088 flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .bss at 0x6ffffffd7000 off 0 size 0 virt 3510 flags c0600080
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .edata at 0x6ffffffdb000 off 97000 size b000 virt a07e flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .idata at 0x6ffffffe6000 off a2000 size 1000 virt 14 flags c0300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .rsrc at 0x6ffffffe7000 off a3000 size 1000 virt 3b0 flags c0400040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\ntdll.dll" section .reloc at 0x6ffffffe8000 off a4000 size 1000 virt 194 flags 42300040
0030:0034:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\ntdll.dll" dynamic base 170000000 -> 6ffffff40000 mapped at 0x6ffffff40000
0030:0034:trace:module:load_apiset_dll loaded L"\\??\\C:\\windows\\system32\\apisetschema.dll" apiset at 0x7ffffe301000
0028:002c:trace:process:NtCreateUserProcess L"\\??\\C:\\windows\\system32\\services.exe" pid 0030 tid 0034 handles 0x3c/0x40
0028:002c:trace:process:CreateProcessInternalW started process pid 0030 tid 0034
0030:0034:trace:process:NtQueryInformationProcess (0xffffffffffffffff,0x00000025,0x7ffffe2ff940,0x00000040,(nil))
0030:0034:trace:module:build_module loaded L"\\??\\C:\\windows\\system32\\services.exe" 00007FFFFE322D30 0000000000400000
0030:0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 0000000000400000: builtin
0030:0034:trace:module:load_dll looking for L"kernel32.dll" in (null)
0030:0034:trace:module:get_load_order looking for L"C:\\windows\\system32\\kernel32.dll"
0030:0034:trace:module:get_load_order got hardcoded default for L"kernel32.dll"
0030:0034:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\kernel32.dll" at 0x6fffffec0000-0x6ffffff22000
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .text at 0x6fffffec1000 off 1000 size 30000 virt 2ffe0 flags 60500020
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .data at 0x6fffffef1000 off 31000 size 1000 virt 200 flags c0600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .rodata at 0x6fffffef2000 off 32000 size 2000 virt 1d6c flags c0300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .rdata at 0x6fffffef4000 off 34000 size 4000 virt 30a0 flags 40600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section /4 at 0x6fffffef8000 off 38000 size 1000 virt 710 flags 40400040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .pdata at 0x6fffffef9000 off 39000 size 6000 virt 5178 flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .xdata at 0x6fffffeff000 off 3f000 size 3000 virt 2b50 flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .bss at 0x6ffffff02000 off 0 size 0 virt 228 flags c0600080
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .edata at 0x6ffffff03000 off 42000 size b000 virt a48d flags 40300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .idata at 0x6ffffff0e000 off 4d000 size a000 virt 96e0 flags c0300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .rsrc at 0x6ffffff18000 off 57000 size 9000 virt 8190 flags c0400040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernel32.dll" section .reloc at 0x6ffffff21000 off 60000 size 1000 virt 1c flags 42300040
0030:0034:trace:module:map_image_into_view relocating L"\\??\\C:\\windows\\system32\\kernel32.dll" dynamic base 178000000 -> 6fffffec0000 mapped at 0x6fffffec0000
0030:0034:trace:module:load_dll looking for L"kernelbase.dll" in (null)
0030:0034:trace:module:get_load_order looking for L"C:\\windows\\system32\\kernelbase.dll"
0030:0034:trace:module:get_load_order got hardcoded default for L"kernelbase.dll"
0030:0034:trace:module:map_image_into_view mapping PE file L"\\??\\C:\\windows\\system32\\kernelbase.dll" at 0x6fffffc10000-0x6fffffea5000
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .text at 0x6fffffc11000 off 1000 size 88000 virt 87210 flags 60500020
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .data at 0x6fffffc99000 off 89000 size 2000 virt 1ea0 flags c0600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .rodata at 0x6fffffc9b000 off 8b000 size 2000 virt 1dd4 flags c0300040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .rdata at 0x6fffffc9d000 off 8d000 size 18000 virt 17300 flags 40600040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section /4 at 0x6fffffcb5000 off a5000 size 1000 virt 5a8 flags 40400040
0030:0034:trace:module:map_image_into_view mapping L"\\??\\C:\\windows\\system32\\kernelbase.dll" section .pdata at 0x6

Please Note: This Forum is for non-application specific questions relating to installation/configuration of CrossOver. All application-specific posts to this Forum will be moved to their appropriate Compatibility Center Forum.

CrossOver Forums: the place to discuss running Windows applications on Mac and Linux

CodeWeavers or its third-party tools process personal data (e.g. browsing data or IP addresses) and use cookies or other identifiers, which are necessary for its functioning and required to achieve the purposes illustrated in our Privacy Policy. You accept the use of cookies or other identifiers by clicking the Acknowledge button.
Please Wait...
eyJjb3VudHJ5IjoiVVMiLCJsYW5nIjoiZW4iLCJjYXJ0IjowLCJ0enMiOi02LCJjZG4iOiJodHRwczpcL1wvbWVkaWEuY29kZXdlYXZlcnMuY29tXC9wdWJcL2Nyb3Nzb3Zlclwvd2Vic2l0ZSIsImNkbnRzIjoxNzMxNDM1MjAzLCJjc3JmX3Rva2VuIjoicjhxdUxjdHB0d0thRjdYUiIsImdkcHIiOjB9