000d:Call PE DLL (proc=0x415d9090,module=0x415d0000 L"lz32.dll",reason=PROCESS_ATTACH,res=(nil)) 000d:Call kernel32.__wine_register_dll_16(415db5f8) ret=415d932c 000d:Ret kernel32.__wine_register_dll_16() retval=415db5f8 ret=415d932c 000d:Ret PE DLL (proc=0x415d9090,module=0x415d0000 L"lz32.dll",reason=PROCESS_ATTACH,res=(nil)) retval=1 000d:Call PE DLL (proc=0x415bf1b0,module=0x415b0000 L"version.dll",reason=PROCESS_ATTACH,res=(nil)) 000d:Call kernel32.__wine_register_dll_16(415c581c) ret=415bf7ec 000d:Ret kernel32.__wine_register_dll_16() retval=415c581c ret=415bf7ec 000d:Ret PE DLL (proc=0x415bf1b0,module=0x415b0000 L"version.dll",reason=PROCESS_ATTACH,res=(nil)) retval=1 000d:Call PE DLL (proc=0x715d4ab3,module=0x715d0000 L"advpack.dll",reason=PROCESS_ATTACH,res=(nil)) wine_dbg_vprintf: debugstr buffer overflow (contents: '000d:Call lz32.CopyLZFile(80000002,715d15a8,00000000,00020019 L"",406cc218,00000000,406cbe58 "\x88\xbfl@\x88\xaf\x0f@\x90\xbel@ V$@\xe4\xbfl@h\x86%@",400d9d6f L"\958b\fba8\ffff\c189\d089\f029\c139\850f\ee38\ffff\8d01\fb38\ffff\3a80\0f00\2e85\ffed\e9ff\ee39\ffff\44c7\0824\03e8",406cbe90,40245644,00000001,406cbe9c L"\8668\4025\8668\4025\86a2\4025\8a67\4025\8668\4025\8a67\4025",40245476,00000001,401c0fd8 "\xec\xfe\x12",00000001,40498fcb,406cb864,400f1bf1,406cbecc,00000053,400d8fca,00000000,40243241,406cbe38,400d8fca,406cbe40,406cbe44,400d8fca,00000000,406cb898,406cbe54,400d8fca,00000041,406cbe60,400d8fca,40243241,406cbe6c,400d8fca,406cbe74,400d8fca,400d8fca,00000000,406cbe84,400d8fca,00000000,00000000,30780000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000004,406cbfc0,406cb948,400f45b5,406cbfc0,00000000,00000003,406cbfd8,406cb960,400f45b5,406cbfd8,401b1b64,00000003,00000000,00000003,406cbff8,406cb980,400f45b5,406cbff8,401b1b64,00000003,401b1b64,') trace:seh:EXC_RtlRaiseException code=80000101 flags=1 addr=0x400bab71 trace:seh:EXC_CallHandler calling handler at 0x1016b2c code=80000101 flags=1 000d:Call kernel32.VirtualQuery(01005a70,406cb178,0000001c) ret=0101d323 000d:Ret kernel32.VirtualQuery() retval=0000001c ret=0101d323 000d:Call kernel32.InterlockedExchange(01025678,00000001) ret=0101d3a1