http://bugs.winehq.org/show_bug.cgi?id=35532
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |obfuscation Status|NEW |RESOLVED CC| |focht@gmx.net Resolution|--- |DUPLICATE Summary|Sky router recovery tool |Sky router recovery tool |immediately crashes |immediately crashes | |(madCodeHook, in-memory PE | |image of Wine builtins vs. | |placeholder image on disk)
--- Comment #1 from Anastasius Focht focht@gmx.net --- Hello folks,
another 'madCodeHook' victim ... dupe of bug 15437
--- snip --- $ WINEDEBUG=+tid,+seh,+relay wine ./Sky\ Recovery\ for\ Windows.exe >>log.txt 2>&1 ... 0024:Call KERNEL32.CreateFileW(001483f8 L"C:\windows\system32\KERNEL32.dll",80000000,00000001,00000000,00000003,00000000,00000000) ret=009716f5 0024:Ret KERNEL32.CreateFileW() retval=00000090 ret=009716f5 0024:Call KERNEL32.LocalFree(001483f8) ret=00971730 0024:Ret KERNEL32.LocalFree() retval=00000000 ret=00971730 0024:Call KERNEL32.GetVersion() ret=0097173a 0024:Ret KERNEL32.GetVersion() retval=0a280105 ret=0097173a 0024:Call KERNEL32.CreateFileMappingW(00000090,00000000,00000002,00000000,00000000,00000000) ret=00971751 0024:Ret KERNEL32.CreateFileMappingW() retval=00000094 ret=00971751 0024:Call KERNEL32.MapViewOfFile(00000094,00000004,00000000,00000000,00000000) ret=00971779 0024:Ret KERNEL32.MapViewOfFile() retval=02310000 ret=00971779 0024:Call KERNEL32.CloseHandle(00000094) ret=00971781 0024:Ret KERNEL32.CloseHandle() retval=00000001 ret=00971781 0024:Call KERNEL32.CloseHandle(00000090) ret=00971787 0024:Ret KERNEL32.CloseHandle() retval=00000001 ret=00971787 0024:trace:seh:raise_exception code=c0000005 flags=0 addr=0x9718d6 ip=009718d6 tid=0024 0024:trace:seh:raise_exception info[0]=00000000 0024:trace:seh:raise_exception info[1]=029703bd 0024:trace:seh:raise_exception eax=02970069 ebx=7b810000 ecx=00000001 edx=000000d5 esi=7b810040 edi=02310000 0024:trace:seh:raise_exception ebp=023bb2d8 esp=0033fb1c cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010206 0024:trace:seh:call_stack_handlers calling handler at 0x97ddf4 code=c0000005 flags=0 0024:trace:seh:call_stack_handlers handler at 0x97ddf4 returned 1 0024:trace:seh:call_stack_handlers calling handler at 0x95a738 code=c0000005 flags=0 ... --- snip ---
Regards
*** This bug has been marked as a duplicate of bug 15437 ***