http://bugs.winehq.org/show_bug.cgi?id=27557
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |DUPLICATE
--- Comment #1 from Anastasius Focht focht@gmx.net 2011-06-22 01:17:53 CDT --- Hello,
sure - the crash is in FT_Thunk wrapper code, currently making it a dupe of bug 27326
--- snip --- ... 002d:Call advapi32.RegOpenKeyExA(80000002,00ed8ae0 "Software\Microsoft\Windows NT\CurrentVersion",00000000,00020019,0187f5bc) ret=0051494c 002d:Ret advapi32.RegOpenKeyExA() retval=00000000 ret=0051494c 002d:Call KERNEL32.LoadLibraryA(00e556b8 "ADVAPI32.dll") ret=006c2bbd 002d:Ret KERNEL32.LoadLibraryA() retval=7eb10000 ret=006c2bbd 002d:Call KERNEL32.GetModuleHandleA(00e556b8 "ADVAPI32.dll") ret=006c2be9 002d:Ret KERNEL32.GetModuleHandleA() retval=7eb10000 ret=006c2be9 002d:Call KERNEL32.GetProcAddress(7eb10000,00e556c8 "RegQueryValueExA") ret=006c2bf0 002d:Ret KERNEL32.GetProcAddress() retval=7eb174e0 ret=006c2bf0 002d:Call advapi32.RegQueryValueExA(00000028,00ed8ae0 "CurrentVersion",00000000,00000000,0187f504,0187f5b0) ret=00514978 002d:Ret advapi32.RegQueryValueExA() retval=00000000 ret=00514978 002d:Call advapi32.RegQueryValueExA(00000028,00ed8ae0 "CurrentBuildNumber",00000000,00000000,0187f524,0187f5b0) ret=005149a8 002d:Ret advapi32.RegQueryValueExA() retval=00000000 ret=005149a8 002d:Call KERNEL32.LoadLibraryA(00e556b8 "ADVAPI32.dll") ret=006c2c81 002d:Ret KERNEL32.LoadLibraryA() retval=7eb10000 ret=006c2c81 002d:Call KERNEL32.GetModuleHandleA(00e556b8 "ADVAPI32.dll") ret=006c2cad 002d:Ret KERNEL32.GetModuleHandleA() retval=7eb10000 ret=006c2cad 002d:Call KERNEL32.GetProcAddress(7eb10000,00e556dc "RegCloseKey") ret=006c2cb4 002d:Ret KERNEL32.GetProcAddress() retval=7eb170d8 ret=006c2cb4 002d:Call advapi32.RegCloseKey(00000028) ret=005149b0 002d:Ret advapi32.RegCloseKey() retval=00000000 ret=005149b0 002d:Call KERNEL32.LoadLibraryA(00ed8ae0 "kernel32.dll") ret=00514a03 002d:Ret KERNEL32.LoadLibraryA() retval=7b810000 ret=00514a03 002d:trace:seh:raise_exception code=c0000005 flags=0 addr=(nil) ip=00000000 tid=002d 002d:trace:seh:raise_exception info[0]=00000000 002d:trace:seh:raise_exception info[1]=00000000 002d:trace:seh:raise_exception eax=00ef7294 ebx=00ef7240 ecx=00000000 edx=0187f4a7 esi=96ec4a76 edi=00ef72dc 002d:trace:seh:raise_exception ebp=0187f4e8 esp=0187f490 cs=0073 ds=007b es=007b fs=0033 gs=003b flags=00010246 002d:trace:seh:call_vectored_handlers calling handler at 0x7e6795d0 code=c0000005 flags=0 002d:trace:seh:call_vectored_handlers handler at 0x7e6795d0 returned 0 002d:trace:seh:call_stack_handlers calling handler at 0xb388a8 code=c0000005 flags=0 --- snip ---
Though the game might be still useful at later time for tracking the "Matroschka" part of copy protection (online check for release date and product activation) if that doesn't work.
Regards
*** This bug has been marked as a duplicate of bug 27326 ***