https://bugs.winehq.org/show_bug.cgi?id=54952
--- Comment #4 from jakubkwadrans15@gmail.com --- (In reply to Louis Lenders from comment #3)
Created attachment 74479 [details] Hack Hide Virtuallloc2 + Paul Gofman patch for bug 52396
A +relay debug-log shows it's apparently coming from:
00e4:Call KERNEL32.GetProcAddress(174000000,1406cdff0 "VirtualAlloc2") ret=1404f0604 00e4:Ret KERNEL32.GetProcAddress() retval=17400c39c ret=1404f0604 00e4:Call KERNEL32.GetProcAddress(174000000,1406cdfe0 "MapViewOfFile3") ret=1404f061b . . kernelbase.VirtualAlloc2(ffffffffffffffff,00000000,00b1a000,00042000, 00000001,00000000,00000000) ret=1404f06ea 00e4:Call ntdll.NtAllocateVirtualMemoryEx(ffffffffffffffff,0029de38,0029de60,00042000, 100000001,00000000,00000000) ret=174044c17 00e4:Ret ntdll.NtAllocateVirtualMemoryEx() retval=c000000d ret=174044c17 00e4:Call ntdll.RtlNtStatusToDosError(c000000d) ret=174044c36 00e4:Ret ntdll.RtlNtStatusToDosError() retval=00000057 ret=174044c36 00e4:Ret kernelbase.VirtualAlloc2() retval=00000000 ret=1404f06ea 00e4:Call KERNEL32.GetLastError() ret=1402c8dea 00e4:Ret KERNEL32.GetLastError() retval=00000057 ret=1402c8dea
With stupid hack, just hiding the VirtualAlloc2 export the initial window comes up, there's another errorwindow that i didn't look at, just clicked away, and than it starts downloading stuff.
Important: it also suffers from bug https://bugs.winehq.org/show_bug.cgi?id=52396 so I also included Pauls staging-patch for that in the hack. That should allow you to at least start the application against vanilla wine
Maybe Paul could shed a light on this bug as he seems to have worked quite a bit on these Virtual* api's
Thanks a lot for the reply, however, I'm kind of inexperienced with Linux, as I'm fairly new to it. What do I do with the hack? Just run it in cmd, or are there specifics steps to it? Thanks in advance.
Kind regards.