[Bug 49121] Themida Demo 2.4.5.0 crashes on start

WineHQ Bugzilla wine-bugs at winehq.org
Sun May 10 09:49:01 CDT 2020


https://bugs.winehq.org/show_bug.cgi?id=49121

--- Comment #6 from Zhiyi Zhang <zzhang at codeweavers.com> ---
(In reply to Fabian Maurer from comment #5)
> May I ask whether the test executable from bug 49112 works for you, and what
> CPU you have? Because this Demo is also Themida protected...

I got 'Ok' from a_protected_vm_allowed.exe and 'Sorry, this application can not
run under a Virtual Machine' from a_protected_vm_forbidden.exe.

I can even run Themida64.exe in a VirtualBox VM with Debian 10 installed.

Also a quick Google search about "themida cannot run under virtual machine"
turned up a bunch of registry hacks to get around this. Maybe some of them are
helpful.

~/Downloads$ md5sum ThemidaDemo32_64.zip 
0f799ed563d32c0316619e61a6603ee4  ThemidaDemo32_64.zip

~/Downloads$ lscpu
Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   43 bits physical, 48 bits virtual
CPU(s):                          16
On-line CPU(s) list:             0-15
Thread(s) per core:              2
Core(s) per socket:              8
Socket(s):                       1
NUMA node(s):                    1
Vendor ID:                       AuthenticAMD
CPU family:                      23
Model:                           113
Model name:                      AMD Ryzen 7 3700X 8-Core Processor
Stepping:                        0
Frequency boost:                 enabled
CPU MHz:                         2199.032
CPU max MHz:                     3600.0000
CPU min MHz:                     2200.0000
BogoMIPS:                        7200.17
Virtualization:                  AMD-V
L1d cache:                       256 KiB
L1i cache:                       256 KiB
L2 cache:                        4 MiB
L3 cache:                        32 MiB
NUMA node0 CPU(s):               0-15
Vulnerability Itlb multihit:     Not affected
Vulnerability L1tf:              Not affected
Vulnerability Mds:               Not affected
Vulnerability Meltdown:          Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled
via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and
__user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full AMD retpoline, IBPB
conditional, STIBP conditional, RSB filling
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep
mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc cpuid
extd_apicid ap
                                 erfmperf pni pclmulqdq monitor ssse3 fma cx16
sse4_1 sse4_2 movbe popcnt aes xsave avx f16c rdrand lahf_lm cmp_legacy svm
extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw ibs skinit wdt tce
topo
                                 ext perfctr_core perfctr_nb bpext perfctr_llc
mwaitx cpb cat_l3 cdp_l3 hw_pstate sme ssbd mba sev ibpb stibp vmmcall fsgsbase
bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap clflushopt clwb sha_ni xsaveopt x
                                 savec xgetbv1 xsaves cqm_llc cqm_occup_llc
cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr wbnoinvd arat npt lbrv
svm_lock nrip_save tsc_scale vmcb_clean flushbyasid decodeassists pausefilter
pfthresh
                                 old avic v_vmsave_vmload vgif umip rdpid
overflow_recov succor smca

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list