[Bug 47145] New: Esportal client 1.0 (CS:GO anti-cheat) fails to start, reporting ' The procedure entry point K32GetWsChangesEx could not be located in the dynamic link library KERNEL32.dll '

wine-bugs at winehq.org wine-bugs at winehq.org
Wed May 8 12:43:10 CDT 2019


https://bugs.winehq.org/show_bug.cgi?id=47145

            Bug ID: 47145
           Summary: Esportal client 1.0 (CS:GO anti-cheat) fails to start,
                    reporting 'The procedure entry point K32GetWsChangesEx
                    could not be located in the dynamic link library
                    KERNEL32.dll'
           Product: Wine
           Version: 4.7
          Hardware: x86-64
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: kernel32
          Assignee: wine-bugs at winehq.org
          Reporter: focht at gmx.net
      Distribution: ---

Hello folks,

continuation of bug 47142

--- snip ---
$ WINEDEBUG=+seh,+relay wine ./esportal-client.exe >>log.txt 2>&1
...
002c:Starting process L"Z:\\home\\focht\\Downloads\\esportal-client.exe"
(entryproc=0x141af9548)
002c:Call KERNEL32.LocalAlloc(00000000,00000150) ret=141c241f0
002c:Ret  KERNEL32.LocalAlloc() retval=0008d220 ret=141c241f0
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "kernel32.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7b420000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "ntdll.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=141b63305
002c:Call KERNEL32.IsDebuggerPresent() ret=141c73b0e
002c:Ret  KERNEL32.IsDebuggerPresent() retval=00000000 ret=141c73b0e
002c:Call KERNEL32.CheckRemoteDebuggerPresent(ffffffffffffffff,0024f880)
ret=141ba3cd6
002c:Ret  KERNEL32.CheckRemoteDebuggerPresent() retval=00000001 ret=141ba3cd6
002c:Call
ntdll.NtQueryInformationProcess(ffffffffffffffff,0000001e,0024fa98,00000008,00000000)
ret=141c727c9
002c:Ret  ntdll.NtQueryInformationProcess() retval=c0000353 ret=141c727c9
002c:Call
ntdll.NtSetInformationThread(fffffffffffffffe,00000011,00000000,00000000)
ret=141ca10c0
002c:Ret  ntdll.NtSetInformationThread() retval=00000000 ret=141ca10c0
002c:Call ntdll.NtQuerySystemInformation(00000023,0024fda0,00000002,00000000)
ret=141bea146
002c:Ret  ntdll.NtQuerySystemInformation() retval=00000000 ret=141bea146
002c:Call ntdll.NtQuerySystemInformation(0000000b,0024f7e8,00000000,0024f7b8)
ret=141bbf765
002c:Ret  ntdll.NtQuerySystemInformation() retval=c0000004 ret=141bbf765
002c:Call KERNEL32.LocalAlloc(00000000,00003e78) ret=141c0fe1d
002c:Ret  KERNEL32.LocalAlloc() retval=0008e2b0 ret=141c0fe1d
002c:Call ntdll.NtQuerySystemInformation(0000000b,0008e2b0,00003e78,00000000)
ret=141cdf7d5
002c:Ret  ntdll.NtQuerySystemInformation() retval=00000000 ret=141cdf7d5
002c:Call KERNEL32.LocalFree(0008e2b0) ret=141cb3812
002c:Ret  KERNEL32.LocalFree() retval=00000000 ret=141cb3812
002c:Call KERNEL32.GetModuleFileNameW(140000000,0024fb4c,000000fe)
ret=141cb3980
002c:Ret  KERNEL32.GetModuleFileNameW() retval=0000002b ret=141cb3980
002c:Call
ntdll.NtOpenFile(0024f908,80100080,0024f918,0024fb28,00000003,3100000000000060)
ret=141c84e72
002c:Ret  ntdll.NtOpenFile() retval=00000000 ret=141c84e72
002c:Call
ntdll.NtCreateSection(0024f8e8,00000004,0024f918,00000000,00000002,3100000008000000,00000054)
ret=141cbe391
002c:Ret  ntdll.NtCreateSection() retval=00000000 ret=141cbe391
002c:Call
ntdll.NtMapViewOfSection(00000058,ffffffffffffffff,0024f7f0,00000000,00000000,0024f8e0,0024f8f8,39f34cf100000001,00000000,00000002)
ret=141c8c022
002c:Ret  ntdll.NtMapViewOfSection() retval=00000000 ret=141c8c022
002c:Call ntdll.NtUnmapViewOfSection(ffffffffffffffff,00260000) ret=141c3da86
002c:Ret  ntdll.NtUnmapViewOfSection() retval=00000000 ret=141c3da86
002c:Call ntdll.NtClose(00000058) ret=141c4450d
002c:Ret  ntdll.NtClose() retval=00000000 ret=141c4450d
002c:Call ntdll.NtClose(00000054) ret=141cbe62c
002c:Ret  ntdll.NtClose() retval=00000000 ret=141cbe62c
002c:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0024f878,0024f9f8,00000040,0024f848)
ret=141cc6fd0
002c:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=141cc6fd0
002c:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0024f878,0024f9f8,00000004,0024f848)
ret=141cc6fd0
002c:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=141cc6fd0
002c:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0024f878,0024f9f8,00000040,0024f848)
ret=141cc6fd0
002c:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=141cc6fd0
002c:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0024f878,0024f9f8,00000004,0024f848)
ret=141cc6fd0
002c:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=141cc6fd0
002c:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0024f878,0024f9f8,00000004,0024f848)
ret=141cc6fd0
002c:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=141cc6fd0
002c:Call
ntdll.NtProtectVirtualMemory(ffffffffffffffff,0024f878,0024f9f8,00000004,0024f848)
ret=141cc6fd0
002c:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=141cc6fd0
002c:Call KERNEL32.LocalAlloc(00000000,00003e6c) ret=141c5e9c3
002c:Ret  KERNEL32.LocalAlloc() retval=0008e2b0 ret=141c5e9c3
002c:Call KERNEL32.LocalFree(0008e2b0) ret=141cdc635
002c:Ret  KERNEL32.LocalFree() retval=00000000 ret=141cdc635
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "VERSION.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e93ea0000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "USER32.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e858a0000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "ADVAPI32.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e85650000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "RPCRT4.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e85590000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "ntdll.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "SHLWAPI.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e854f0000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "CRYPT32.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e853e0000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "bcrypt.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7f5e853b0000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5f0 "KERNEL32.dll") ret=141b63305
002c:Ret  KERNEL32.GetModuleHandleA() retval=7b420000 ret=141b63305
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleHandleA(0024f5d0 "ntdll") ret=140fbb088
002c:Ret  KERNEL32.GetModuleHandleA() retval=7bc20000 ret=140fbb088
002c:Call KERNEL32.GetModuleFileNameW(140000000,0024ecd0,00000104)
ret=141c89c87
002c:Ret  KERNEL32.GetModuleFileNameW() retval=0000002b ret=141c89c87
002c:Call user32.GetProcessWindowStation() ret=141c20392
002c:Ret  user32.GetProcessWindowStation() retval=00000034 ret=141c20392
002c:Call
user32.GetUserObjectInformationW(00000034,00000001,0024ecb0,0000000c,0024f728)
ret=141b8f51d
002c:Ret  user32.GetUserObjectInformationW() retval=00000001 ret=141b8f51d
002c:Call KERNEL32.LoadLibraryA(0024eb40 "user32.dll") ret=141b8edf6
002c:Ret  KERNEL32.LoadLibraryA() retval=7f5e858a0000 ret=141b8edf6
002c:Call user32.MessageBoxW(00000000,0024eee0 L"The procedure entry point
K32GetWsChangesEx could not be located in the dynamic link library
KERNEL32.dll",0024ed00 L"esportal-client.exe",00000010) ret=141be4e0e 
--- snip ---

$ sha1sum esportal-client.exe 
356be58c352fe9e1ffbbf742393875806910e3d1  esportal-client.exe

$ du -sh esportal-client.exe 
14M    esportal-client.exe

$ wine --version
wine-4.7-265-g622422e67b

Regards

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.


More information about the wine-bugs mailing list