[Bug 27138] Football Manager 2010 Demo: crash when cancelling installation (check for ATL thunk triggers unexpected guard page fault in Shinker 3.5 protected 'remove.exe')
wine-bugs at winehq.org
wine-bugs at winehq.org
Tue Dec 17 05:58:22 CST 2013
http://bugs.winehq.org/show_bug.cgi?id=27138
Anastasius Focht <focht at gmx.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Keywords| |obfuscation
Status|NEW |RESOLVED
URL|http://www.joystiq.com/game |http://www.gamefront.com/fi
|/football-manager-2010/down |les/14799945
|load/football-manager-2010- |
|vanilla-demo/ |
CC| |focht at gmx.net
Component|-unknown |ntdll
Resolution|--- |DUPLICATE
Summary|Football Manager 2010 Demo: |Football Manager 2010 Demo:
|crash when canceling |crash when cancelling
|installation |installation (check for ATL
| |thunk triggers unexpected
| |guard page fault in Shinker
| |3.5 protected 'remove.exe')
--- Comment #10 from Anastasius Focht <focht at gmx.net> ---
Hello folks,
dupe of bug 19296
'remove.exe' is compressed with Shrinker v3.5:
--- snip ---
-=[ ProtectionID v0.6.5.5 OCTOBER]=-
(c) 2003-2013 CDKiLLER & TippeX
Build 31/10/13-21:09:09
Ready...
Scanning -> Z:\home\focht\Downloads\remove.exe
File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 109056 (01AA00h)
Byte(s)
[File Heuristics] -> Flag : 00000000000101011100001000000001 (0x0015C201)
[Entrypoint Section Entropy] : 6.51
[!] Shrinker v3.5 detected !
- Scan Took : 0.241 Second(s) [0000000F1h tick(s)] [533 scan(s) done]
--- snip ---
See bug 19296 or bug 34479 for explanations.
--- snip ---
$ WINEDEBUG=+tid,+seh,+loaddll,+process,+server,+virtual wine ./remove.exe
>>log.txt 2>&1
...
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x7bc83bfa
ip=7bc83bfa tid=0009
0009:trace:seh:raise_exception info[0]=00000000
0009:trace:seh:raise_exception info[1]=00402e9d
0009:trace:seh:raise_exception eax=00402e9d ebx=7bccf000 ecx=8dfd1dca
edx=0033f968 esi=0033fa9c edi=00000000
0009:trace:seh:raise_exception ebp=0033fa38 esp=0033f940 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010246
0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7
code=c0000005 flags=0
0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x7bc9dcbf code=c0000005
flags=0
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000004
0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-rW-
0009:trace:virtual:VIRTUAL_SetProt forcing exec permission on 0x401000-0x408fff
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c----
0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r--
0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c----
0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r--
0009:trace:virtual:NtProtectVirtualMemory 0xffffffff 0x401000 00008000 00000020
0009:trace:virtual:VIRTUAL_SetProt 0x401000-0x408fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView View: 0x400000 - 0x436fff 0x20
0009:trace:virtual:VIRTUAL_DumpView 0x400000 - 0x400fff c-r--
0009:trace:virtual:VIRTUAL_DumpView 0x401000 - 0x408fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView 0x409000 - 0x421fff c----
0009:trace:virtual:VIRTUAL_DumpView 0x422000 - 0x426fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView 0x427000 - 0x427fff c-r--
0009:trace:virtual:VIRTUAL_DumpView 0x428000 - 0x42bfff c----
0009:trace:virtual:VIRTUAL_DumpView 0x42c000 - 0x42dfff c-r--
0009:trace:virtual:VIRTUAL_DumpView 0x42e000 - 0x431fff c-rW-
0009:trace:virtual:VIRTUAL_DumpView 0x432000 - 0x432fff c-rWx
0009:trace:virtual:VIRTUAL_DumpView 0x433000 - 0x435fff c-r-x
0009:trace:virtual:VIRTUAL_DumpView 0x436000 - 0x436fff c-r--
0009:trace:seh:call_stack_handlers handler at 0x7bc9dcbf returned 0
0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x402e9d ip=00402e9d
tid=0009
0009:trace:seh:raise_exception info[0]=00000000
0009:trace:seh:raise_exception info[1]=00402e9d
0009:trace:seh:raise_exception eax=00402e9d ebx=7b8ba000 ecx=00028000
edx=0013d448 esi=00000001 edi=00000000
0009:trace:seh:raise_exception ebp=0033fe04 esp=0033fdc8 cs=0023 ds=002b
es=002b fs=0063 gs=006b flags=00010202
0009:trace:seh:call_vectored_handlers calling handler at 0x7ed2b0b7
code=c0000005 flags=0
0009:trace:seh:call_vectored_handlers handler at 0x7ed2b0b7 returned 0
0009:trace:seh:call_stack_handlers calling handler at 0x434b4c code=c0000005
flags=0
0009:trace:seh:call_stack_handlers handler at 0x434b4c returned 1
0009:trace:seh:call_stack_handlers calling handler at 0x7bc9dc4f code=c0000005
flags=0
...
0009:trace:seh:start_debugger Starting debugger "winedbg --auto 8 80"
--- snip ---
$ sha1sum Setup_FM2010_Vanilla_Demo.exe
564a8f6a90a7d3fc8f735d31c92206e6c5947251 Setup_FM2010_Vanilla_Demo.exe
$ du -sh Setup_FM2010_Vanilla_Demo.exe
275M Setup_FM2010_Vanilla_Demo.exe
$ wine --version
wine-1.7.8-232-g3bad812
Regards
*** This bug has been marked as a duplicate of bug 19296 ***
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
More information about the wine-bugs
mailing list