http://bugs.winehq.org/show_bug.cgi?id=9484
--- Comment #22 from Klaus Layer klaus.layer@gmx.de 2008-10-24 03:34:26 --- Yes, the copy protection still rejects to run the program with original CD in drive with latest git.
In the last trace I attached I see a SEH after GetProcAddress which is called with LoadLibraryA. Could this be some sort of entry point checking as known from punkbuster? Focht what do you think?
0009:trace:module:LdrGetDllHandle L"Kernel32.dll" -> 0x7ee00000 (load path L"C:\Programme\Klett\Mathetrainer 6;.;C:\windows\system32;C:\windows\system;C:\windows;C:\windows\system32;C:\windows") 0009:Ret KERNEL32.GetModuleHandleA() retval=7ee00000 ret=0043a61f 0009:Call KERNEL32.GetProcAddress(7ee00000,0043a5ae "LoadLibraryA") ret=0043a63a 0009:Ret KERNEL32.GetProcAddress() retval=7ee0a0ec ret=0043a63a 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x443546 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00000000 0009:trace:seh:raise_exception eax=00000000 ebx=7ee90be8 ecx=00400000 edx=00400000 esi=ffffffa8 edi=00405000 0009:trace:seh:raise_exception ebp=00004d14 esp=0034feec cs=0073 ds=007b es=007b fs=0033 gs=003b flags=00010206 0009:trace:seh:call_stack_handlers calling handler at 0x441d79 code=c0000005 flags=0 0009:trace:seh:call_stack_handlers handler at 0x441d79 returned 0