https://bugs.winehq.org/show_bug.cgi?id=46751
--- Comment #2 from KOLANICH kolan_n@mail.ru --- OK. Another idea: [intercept syscalls](https://github.com/pmem/syscall_intercept), making the called process understand Windows paths with respect to the prefix.