https://bugs.winehq.org/show_bug.cgi?id=41977
--- Comment #1 from Bruno Jesus 00cpxxx@gmail.com --- Can you explain how you patched the exe? Like allocating more memory and pretending to return an offset higher then initial pointer to ensure there is enough memory for the erroneous attempts.
How far from the initial pointer the game attempts to read?