[Bug 49121] Themida Demo 2.4.5.0 crashes on start
WineHQ Bugzilla
wine-bugs at winehq.org
Sun May 10 09:49:01 CDT 2020
https://bugs.winehq.org/show_bug.cgi?id=49121
--- Comment #6 from Zhiyi Zhang <zzhang at codeweavers.com> ---
(In reply to Fabian Maurer from comment #5)
> May I ask whether the test executable from bug 49112 works for you, and what
> CPU you have? Because this Demo is also Themida protected...
I got 'Ok' from a_protected_vm_allowed.exe and 'Sorry, this application can not
run under a Virtual Machine' from a_protected_vm_forbidden.exe.
I can even run Themida64.exe in a VirtualBox VM with Debian 10 installed.
Also a quick Google search about "themida cannot run under virtual machine"
turned up a bunch of registry hacks to get around this. Maybe some of them are
helpful.
~/Downloads$ md5sum ThemidaDemo32_64.zip
0f799ed563d32c0316619e61a6603ee4 ThemidaDemo32_64.zip
~/Downloads$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 43 bits physical, 48 bits virtual
CPU(s): 16
On-line CPU(s) list: 0-15
Thread(s) per core: 2
Core(s) per socket: 8
Socket(s): 1
NUMA node(s): 1
Vendor ID: AuthenticAMD
CPU family: 23
Model: 113
Model name: AMD Ryzen 7 3700X 8-Core Processor
Stepping: 0
Frequency boost: enabled
CPU MHz: 2199.032
CPU max MHz: 3600.0000
CPU min MHz: 2200.0000
BogoMIPS: 7200.17
Virtualization: AMD-V
L1d cache: 256 KiB
L1i cache: 256 KiB
L2 cache: 4 MiB
L3 cache: 32 MiB
NUMA node0 CPU(s): 0-15
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled
via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and
__user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, IBPB
conditional, STIBP conditional, RSB filling
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep
mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid
extd_apicid ap
erfmperf pni pclmulqdq monitor ssse3 fma cx16
sse4_1 sse4_2 movbe popcnt aes xsave avx f16c rdrand lahf_lm cmp_legacy svm
extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs skinit wdt tce
topo
ext perfctr_core perfctr_nb bpext perfctr_llc
mwaitx cpb cat_l3 cdp_l3 hw_pstate sme ssbd mba sev ibpb stibp vmmcall fsgsbase
bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap clflushopt clwb sha_ni xsaveopt x
savec xgetbv1 xsaves cqm_llc cqm_occup_llc
cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr wbnoinvd arat npt lbrv
svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter
pfthresh
old avic v_vmsave_vmload vgif umip rdpid
overflow_recov succor smca
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
More information about the wine-bugs
mailing list