https://bugs.winehq.org/show_bug.cgi?id=52252
--- Comment #1 from Lorenzo Ferrillo lorenzofer@live.it --- 0120:Call KERNEL32.OpenProcess(00000400,00000000,00000020) ret=15cc4b36 0120:Call ntdll.RtlRunOnceExecuteOnce(7b0b7aa0,7b0756a0,00000000,00000000) ret=7b072732 0120:Ret ntdll.RtlRunOnceExecuteOnce() retval=00000000 ret=7b072732 0120:Call ntdll.wcscpy(004173a4,7b0b7ad4 L"") ret=7b078932 0120:Ret ntdll.wcscpy() retval=004173a4 ret=7b078932 0120:Call ntdll.NtOpenProcess(004174e8,00000400,00417500,004174f0) ret=7b0530b3 0120: open_process( pid=0020, access=00000400, attributes=00000000 ) 0120: open_process() = 0 { handle=02e0 } 0120:Ret ntdll.NtOpenProcess() retval=00000000 ret=7b0530b3 0120:Ret KERNEL32.OpenProcess() retval=000002e0 ret=15cc4b36 0120:Call KERNEL32.IsWow64Process(000002e0,004175f8) ret=15cc4b8d 0120:Call ntdll.NtQueryInformationProcess(000002e0,0000001a,00417528,00000008,00000000) ret=7b052fd0 0120: get_process_info( handle=02e0 ) 0120: get_process_info() = 0 { pid=0020, ppid=0000, affinity=00000fff, peb=7fdde000, start_time=1d7f6c3ed8ddc32 (-75.0953790), end_time=0, session_id=00000001, exit_code=259, priority=2, machine=014c, image={} } 0120:Ret ntdll.NtQueryInformationProcess() retval=00000000 ret=7b052fd0 0120:Ret KERNEL32.IsWow64Process() retval=00000001 ret=15cc4b8d 0120:Call KERNEL32.CloseHandle(000002e0) ret=15cc4ba5 0120:Call ntdll.NtClose(000002e0) ret=7b0523d5 0120: close_handle( handle=02e0 ) 0120: close_handle() = 0 0120:Ret ntdll.NtClose() retval=00000000 ret=7b0523d5 0120:Ret KERNEL32.CloseHandle() retval=00000001 ret=15cc4ba5 0120:Call KERNEL32.CreateToolhelp32Snapshot(00000018,00000020) ret=15cc5f57 0120:Call ntdll.RtlRunOnceExecuteOnce(7b0b7aa0,7b0756a0,00000000,00000000) ret=7b072732 0120:Ret ntdll.RtlRunOnceExecuteOnce() retval=00000000 ret=7b072732 0120:Call ntdll.wcscpy(00417304,7b0b7ad4 L"") ret=7b078932 0120:Ret ntdll.wcscpy() retval=00417304 ret=7b078932 0120:Call ntdll.NtOpenProcess(00417448,00000410,00417460,00417450) ret=7b0530b3 0120: open_process( pid=0020, access=00000410, attributes=00000000 ) 0120: open_process() = 0 { handle=02e0 } 0120:Ret ntdll.NtOpenProcess() retval=00000000 ret=7b0530b3 0120: get_process_info( handle=02e0 ) 0120: get_process_info() = 0 { pid=0020, ppid=0000, affinity=00000fff, peb=7fdde000, start_time=1d7f6c3ed8ddc32 (-75.0956050), end_time=0, session_id=00000001, exit_code=259, priority=2, machine=014c, image={} } 0120:Call ntdll.NtReadVirtualMemory(000002e0,7fdde018,004174f0,00000008,00000000) ret=7b03ddbd 0120: read_process_memory( handle=02e0, addr=00000000 ) 0120: read_process_memory() = 0 { unix_pid=1461805, data={} } 0120:Ret ntdll.NtReadVirtualMemory() retval=c0000022 ret=7b03ddbd 0120:Call ntdll.RtlNtStatusToDosError(c0000022) ret=7b03ddd8 0120:Ret ntdll.RtlNtStatusToDosError() retval=00000005 ret=7b03ddd8 0120:Call ntdll.NtClose(000002e0) ret=7b0523d5 0120: close_handle( handle=02e0 ) 0120: close_handle() = 0 0120:Ret ntdll.NtClose() retval=00000000 ret=7b0523d5