https://bugs.winehq.org/show_bug.cgi?id=47274
--- Comment #2 from Gabriel Ivăncescu gabrielopcode@gmail.com --- Yeah. I've actually added a hack to GetProcAddress to return NULL if the passed string is "SaferIdentifyLevel" and that works too, so it seems cmd.exe loads it like that.
Patching the string "SaferIdentifyLevel" in cmd.exe with a Hex Editor by replacing the first character with a NUL also works, even with the patch applied. I guess a proper fix would require a semi-implementation of these functions.