http://bugs.winehq.org/show_bug.cgi?id=27138
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |obfuscation Status|NEW |RESOLVED URL|http://www.joystiq.com/game |http://www.gamefront.com/fi |/football-manager-2010/down |les/14799945 |load/football-manager-2010- | |vanilla-demo/ | CC| |focht@gmx.net Component|-unknown |ntdll Resolution|--- |DUPLICATE Summary|Football Manager 2010 Demo: |Football Manager 2010 Demo: |crash when canceling |crash when cancelling |installation |installation (check for ATL | |thunk triggers unexpected | |guard page fault in Shinker | |3.5 protected 'remove.exe')
--- Comment #10 from Anastasius Focht focht@gmx.net --- Hello folks,
dupe of bug 19296
'remove.exe' is compressed with Shrinker v3.5:
--- snip --- -=[ ProtectionID v0.6.5.5 OCTOBER]=- (c) 2003-2013 CDKiLLER & TippeX Build 31/10/13-21:09:09 Ready... Scanning -> Z:\home\focht\Downloads\remove.exe File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 109056 (01AA00h) Byte(s) [File Heuristics] -> Flag : 00000000000101011100001000000001 (0x0015C201) [Entrypoint Section Entropy] : 6.51 [!] Shrinker v3.5 detected ! - Scan Took : 0.241 Second(s) [0000000F1h tick(s)] [533 scan(s) done] --- snip ---
See bug 19296 or bug 34479 for explanations.
--- snip --- $ WINEDEBUG=+tid,+seh,+loaddll,+process,+server,+virtual wine ./remove.exe
log.txt 2>&1
... 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc83bfa ip=7bc83bfa tid=0009 0009:trace:seh:raise_exception info[0]=00000000 0009:trace:seh:raise_exception info[1]=00402e9d 0009:trace:seh:raise_exception eax=00402e9d ebx=7bccf000 ecx=8dfd1dca edx=0033f968 esi=0033fa9c edi=00000000 0009:trace:seh:raise_exception ebp=0033fa38 esp=0033f940 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010246 0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x7bc9dcbf code=c0000005 flags=0 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000004 0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-rW- 0009:trace:virtual:VIRTUAL_SetProt forcing exec permission on 0x401000-0x408fff 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- 0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000020 0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20 0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c---- 0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r-- 0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW- 0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx 0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x 0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r-- 0009:trace:seh:call_stack_handlers handler at 0x7bc9dcbf returned 0 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x402e9d ip=00402e9d tid=0009 0009:trace:seh:raise_exception info[0]=00000000 0009:trace:seh:raise_exception info[1]=00402e9d 0009:trace:seh:raise_exception eax=00402e9d ebx=7b8ba000 ecx=00028000 edx=0013d448 esi=00000001 edi=00000000 0009:trace:seh:raise_exception ebp=0033fe04 esp=0033fdc8 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x434b4c code=c0000005 flags=0 0009:trace:seh:call_stack_handlers handler at 0x434b4c returned 1 0009:trace:seh:call_stack_handlers calling handler at 0x7bc9dc4f code=c0000005 flags=0 ... 0009:trace:seh:start_debugger Starting debugger "winedbg --auto 8 80" --- snip ---
$ sha1sum Setup_FM2010_Vanilla_Demo.exe 564a8f6a90a7d3fc8f735d31c92206e6c5947251 Setup_FM2010_Vanilla_Demo.exe
$ du -sh Setup_FM2010_Vanilla_Demo.exe 275M Setup_FM2010_Vanilla_Demo.exe
$ wine --version wine-1.7.8-232-g3bad812
Regards
*** This bug has been marked as a duplicate of bug 19296 ***