Problem with MSVBVM60.DLL

Open forum for end-user questions about Wine. Before asking questions, check out the Wiki as a first step.
Forum Rules
Post Reply
josejulio
Level 1
Level 1
Posts: 6
Joined: Wed Aug 26, 2020 4:26 pm

Problem with MSVBVM60.DLL

Post by josejulio » Wed Aug 26, 2020 5:05 pm

Hello,

I'm trying to run with wine a school program Bookmaker [1] (download link [2]) for my kid. I was able to complete the installer, but when trying to run I always get a:
"Failed to load module MSVBVM60.DLL".

I have tried to far:
- Installing the vb6 run time with `winetricks`
- Copy that DLL to be along side the exe file
- Start in the same folder as the exe
- Start with `wine start 'c:\the\path\ţo\exe'`

All yield the same message and I'm not sure how to troubleshoot this.

Here is a run with `WINEDEBUG=+loaddll`

Code: Select all

002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EDA0000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wineboot.exe" at 00400000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E940000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7ED40000: builtin
002c:fixme:winediag:start_process Wine Staging 5.15 is a testing version containing experimental patches.
002c:fixme:winediag:start_process Please mention your exact version when filing bug reports on winehq.org.
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E7D0000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E590000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 67800000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winemenubuilder.exe" at 7EAF0000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\services.exe" at 00400000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7DF80000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7E070000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7DE10000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
003c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\userenv.dll" at 67F00000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7DBD0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 67800000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 6E8C0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 00320000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7E0F0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 6A300000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\propsys.dll" at 69E80000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\windowscodecs.dll" at 7DAD0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 00400000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\plugplay.exe" at 00400000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E860000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E630000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E4E0000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E650000: builtin
0050:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7E520000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 00400000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hal.dll" at 6F200000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 7E8F0000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 67C00000: builtin
006c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32k.sys" at 651C0000: builtin
0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgkrnl.sys" at 6A6C0000: builtin
0078:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgmms1.sys" at 6F6C0000: builtin
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winebus.sys" at 7E870000: builtin
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hidclass.sys" at 62E40000: builtin
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\winehid.sys" at 6B5C0000: builtin
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hid.dll" at 64D80000: builtin
INTEL-MESA: warning: Haswell Vulkan support is incomplete
0074:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\wineusb.sys" at 7E4E0000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winedevice.exe" at 00400000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\hal.dll" at 6F200000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\msvcrt.dll" at 7E8F0000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntoskrnl.exe" at 67C00000: builtin
0094:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\win32k.sys" at 651C0000: builtin
00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgkrnl.sys" at 6A6C0000: builtin
00a0:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\dxgmms1.sys" at 6F6C0000: builtin
009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\drivers\\mountmgr.sys" at 7E870000: builtin
009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
009c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 6E8C0000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 00330000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7DB70000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\explorer.exe" at 00400000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E860000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E630000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7E520000: builtin
00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7DE80000: builtin
00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7DFF0000: builtin
00a4:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
INTEL-MESA: warning: Haswell Vulkan support is incomplete
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7D9E0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 67800000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 6E8C0000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 00380000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 75350000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 7DC90000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 6A300000: builtin
0048:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00F10000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 67800000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ole32.dll" at 65200000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shcore.dll" at 64B40000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shlwapi.dll" at 68C40000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\comctl32.dll" at 6E8C0000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\aclui.dll" at 00350000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\shell32.dll" at 7C610000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 7E080000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 6A300000: builtin
00ac:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\actxprxy.dll" at 00D00000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7DAA0000: builtin
0034:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 7D540000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 7D550000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\mpr.dll" at 6DBC0000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ws2_32.dll" at 7D510000: builtin
002c:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wininet.dll" at 6B4C0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ntdll.dll" at 7BC00000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernelbase.dll" at 7B000000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\kernel32.dll" at 7B620000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\wow64cpu.dll" at 7EB20000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\Program Files\\GrupoEducare\\Bookmaker\\BookMaker v3.0.exe" at 00400000: native
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\ucrtbase.dll" at 7E9D0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sechost.dll" at 61B00000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\advapi32.dll" at 7EAD0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\gdi32.dll" at 7E860000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\rpcrt4.dll" at 6FDC0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\version.dll" at 65980000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\setupapi.dll" at 6A900000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\user32.dll" at 7E630000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\combase.dll" at 67800000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\OLE32.DLL" at 65200000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\imm32.dll" at 6C0C0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\MSVCRT.dll" at 7E510000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\oleaut32.dll" at 6A300000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\sxs.dll" at 61F00000: builtin
0024:fixme:nls:RtlGetThreadPreferredUILanguages 00000008, 0031FCE0, 00363D04 0031FCE4
0024:fixme:nls:get_dummy_preferred_ui_language (0x8 0031FCE0 00363D04 0031FCE4) returning a dummy value (current locale)
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winmm.dll" at 639C0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\winex11.drv" at 7E450000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\usp10.dll" at 62800000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.2600.2982_none_deadbeef\\comctl32.dll" at 6E8C0000: builtin
0024:trace:loaddll:build_module Loaded L"C:\\windows\\system32\\uxtheme.dll" at 7DF70000: builtin
0078:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winebus.sys" : builtin
0078:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\wineusb.sys" : builtin
0078:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\drivers\\winehid.sys" : builtin
0078:trace:loaddll:free_modref Unloaded module L"C:\\windows\\system32\\hidclass.sys" : builtin
I see no trace of the MSVBVM60.DLL`, running it with `WINEDEBUG=+all` yields a tons of lines, some interesting ones (maybe?)

Code: Select all

00cc: create_file( access=80100000, sharing=00000005, create=1, options=00000060, attrs=00000000, objattr={rootdir=0000,attributes=00000000,sd={},name=L""}, filename="/usr/lib/wine/msvbvm60.dll" )
00cc: create_file() = NO_SUCH_FILE { handle=0000 }
00cc: load_dll( dbg_offset=0, base=66000000, name=00b9eda8, dbg_size=0, filename=L"C:\\windows\\system32\\MSVBVM60.DLL" )
00cc: load_dll() = 0
00cc: create_event( access=001f0003, manual_reset=1, initial_state=1,
50k+ lines later:

Code: Select all

00e8: set_window_text( handle=00010072, text=L"failed to load module MSVBVM60.DLL" )
Anyone has any idea of what I could do to solve this or provide better logs?

Thanks.

[1] http://soporte.grupoeducare.com/main/?p=7352
[2] http://didaktic.mx/profesores/pluginfil ... download=1

User avatar
DarkShadow44
Level 8
Level 8
Posts: 1108
Joined: Tue Nov 22, 2016 5:39 pm

Re: Problem with MSVBVM60.DLL

Post by DarkShadow44 » Thu Aug 27, 2020 1:22 pm

Maybe a +relay log could help.

josejulio
Level 1
Level 1
Posts: 6
Joined: Wed Aug 26, 2020 4:26 pm

Re: Problem with MSVBVM60.DLL

Post by josejulio » Thu Aug 27, 2020 2:54 pm

Thanks, +relay log is also really big (33mb, 562k lines), should I upload it?

I'm putting what I though could be useful.

Thanks in advance for your time.

Line 490068 to 490104

Code: Select all

00c8:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b036f1b
00c8:Ret  KERNEL32.VirtualProtect() retval=00000001 ret=0038489e
00c8:Call msvcrt._strcmpi(0068a5c9 "MSVBVM60.DLL",003d0010 "") ret=00384541
00c8:Ret  msvcrt._strcmpi() retval=0000006d ret=00384541
00c8:Call KERNEL32.LoadLibraryA(0068a5c9 "MSVBVM60.DLL") ret=00384567
00c8:Call ntdll.RtlInitAnsiString(0031fbc0,0068a5c9 "MSVBVM60.DLL") ret=7b014d9f
00c8:Ret  ntdll.RtlInitAnsiString() retval=0000000d ret=7b014d9f
00c8:Call ntdll.RtlAnsiStringToUnicodeString(7ffc2bf8,0031fbc0,00000000) ret=7b014e26
00c8:Ret  ntdll.RtlAnsiStringToUnicodeString() retval=00000000 ret=7b014e26
00c8:Call ntdll.RtlInitUnicodeString(0031fbe8,7ffc2c00 L"MSVBVM60.DLL") ret=7b023ec8
00c8:Ret  ntdll.RtlInitUnicodeString() retval=0000001a ret=7b023ec8
00c8:Call ntdll.LdrGetDllPath(7ffc2c00 L"MSVBVM60.DLL",00000000,0031fba4,0031fba8) ret=7b022f8f
00c8:Ret  ntdll.LdrGetDllPath() retval=00000000 ret=7b022f8f
00c8:Call ntdll.LdrLoadDll(0021ec58 L"c:\\Program Files\\GrupoEducare\\Bookmaker;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0",00000000,0031fbe8,0031fba0) ret=7b023033
00c8:Call PE DLL (proc=732FB192,module=732A0000 L"MSVBVM60.DLL",reason=PROCESS_ATTACH,res=00000000)
00c8:Call KERNEL32.GetVersion() ret=732fb260
00c8:Call ntdll.RtlRunOnceExecuteOnce(7b0afb40,7b0696d0,00000000,00000000) ret=7b0665ee
00c8:Ret  ntdll.RtlRunOnceExecuteOnce() retval=00000000 ret=7b0665ee
00c8:Call ntdll.wcscpy(0031f4a0,7b0afb74 L"Service Pack 1") ret=7b06d26f
00c8:Ret  ntdll.wcscpy() retval=0031f4a0 ret=7b06d26f
00c8:Ret  KERNEL32.GetVersion() retval=1db10106 ret=732fb260
00c8:Call KERNEL32.GetModuleHandleA(732fb490 "kernel32.dll") ret=732fb282
00c8:Call ntdll.RtlInitAnsiString(0031f540,732fb490 "kernel32.dll") ret=7b014d9f
00c8:Ret  ntdll.RtlInitAnsiString() retval=0000000d ret=7b014d9f
00c8:Call ntdll.RtlAnsiStringToUnicodeString(7ffc2bf8,0031f540,00000000) ret=7b014e26
00c8:Ret  ntdll.RtlAnsiStringToUnicodeString() retval=00000000 ret=7b014e26
00c8:Call ntdll.RtlInitUnicodeString(0031f558,7ffc2c00 L"kernel32.dll") ret=7b023c99
00c8:Ret  ntdll.RtlInitUnicodeString() retval=0000001a ret=7b023c99
00c8:Call ntdll.LdrGetDllHandle(00000000,00000000,0031f558,0031f550) ret=7b023cbd
00c8:Ret  ntdll.LdrGetDllHandle() retval=00000000 ret=7b023cbd
00c8:Ret  KERNEL32.GetModuleHandleA() retval=7b620000 ret=732fb282
00c8:Call KERNEL32.GetProcAddress(7b620000,732fb488 "IsTNT") ret=732fb292
00c8:Ret  KERNEL32.GetProcAddress() retval=00000000 ret=732fb292
00c8:Call KERNEL32.HeapCreate(00000000,00001000,00000000) ret=732a66e2
00c8:Ret  KERNEL32.HeapCreate() retval=01100000 ret=732a66e2
00c8:Call KERNEL32.VirtualAlloc(00000000,00400000,00002000,00000004) ret=732a672e
00c8:Call ntdll.NtAllocateVirtualMemory(ffffffff,0031f53c,00000000,0031f558,00002000,00000004) ret=7b036cc6

josejulio
Level 1
Level 1
Posts: 6
Joined: Wed Aug 26, 2020 4:26 pm

Re: Problem with MSVBVM60.DLL

Post by josejulio » Thu Aug 27, 2020 2:57 pm

More logs:

Line 541219 to 541830

Code: Select all

00c8:Call KERNEL32.TlsAlloc() ret=732a7b4d
00c8:Call ntdll.RtlAcquirePebLock() ret=7b067fbd
00c8:Ret  ntdll.RtlAcquirePebLock() retval=00000000 ret=7b067fbd
00c8:Call ntdll.RtlFindClearBitsAndSet(7bc8e570,00000001,00000001) ret=7b067fdb
00c8:Ret  ntdll.RtlFindClearBitsAndSet() retval=00000007 ret=7b067fdb
00c8:Call ntdll.RtlReleasePebLock() ret=7b067ff6
00c8:Ret  ntdll.RtlReleasePebLock() retval=00000000 ret=7b067ff6
00c8:Ret  KERNEL32.TlsAlloc() retval=00000007 ret=732a7b4d
00c8:Ret  PE DLL (proc=732FB192,module=732A0000 L"MSVBVM60.DLL",reason=PROCESS_ATTACH,res=00000000) retval=1
00c8:Ret  ntdll.LdrLoadDll() retval=00000000 ret=7b023033
00c8:Call ntdll.RtlReleasePath(0021ec58) ret=7b023049
00c8:Ret  ntdll.RtlReleasePath() retval=00000001 ret=7b023049
00c8:Ret  KERNEL32.LoadLibraryA() retval=732a0000 ret=00384567
00c8:Call KERNEL32.VirtualProtect(0068a5ac,00000004,00000008,0031fd5c) ret=003848c6
00c8:Call ntdll.NtProtectVirtualMemory(ffffffff,0031fcc4,0031fcc8,00000008,0031fd5c) ret=7b036f1b
00c8:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b036f1b
00c8:Ret  KERNEL32.VirtualProtect() retval=00000001 ret=003848c6
00c8:Call KERNEL32.VirtualProtect(0068a540,00000130,00000008,0031fd58) ret=00384922
00c8:Call ntdll.NtProtectVirtualMemory(ffffffff,0031fcc4,0031fcc8,00000008,0031fd58) ret=7b036f1b
00c8:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b036f1b
00c8:Ret  KERNEL32.VirtualProtect() retval=00000001 ret=00384922
00c8:Call KERNEL32.LoadLibraryA(0068a5bc "KERNEL32.DLL") ret=00622328
00c8:Call ntdll.RtlInitAnsiString(0031fe20,0068a5bc "KERNEL32.DLL") ret=7b014d9f
00c8:Ret  ntdll.RtlInitAnsiString() retval=0000000d ret=7b014d9f
00c8:Call ntdll.RtlAnsiStringToUnicodeString(7ffc2bf8,0031fe20,00000000) ret=7b014e26
00c8:Ret  ntdll.RtlAnsiStringToUnicodeString() retval=00000000 ret=7b014e26
00c8:Call ntdll.RtlInitUnicodeString(0031fe48,7ffc2c00 L"KERNEL32.DLL") ret=7b023ec8
00c8:Ret  ntdll.RtlInitUnicodeString() retval=0000001a ret=7b023ec8
00c8:Call ntdll.LdrGetDllPath(7ffc2c00 L"KERNEL32.DLL",00000000,0031fe04,0031fe08) ret=7b022f8f
00c8:Ret  ntdll.LdrGetDllPath() retval=00000000 ret=7b022f8f
00c8:Call ntdll.LdrLoadDll(0021ec58 L"c:\\Program Files\\GrupoEducare\\Bookmaker;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0",00000000,0031fe48,0031fe00) ret=7b023033
00c8:Ret  ntdll.LdrLoadDll() retval=00000000 ret=7b023033
00c8:Call ntdll.RtlReleasePath(0021ec58) ret=7b023049
00c8:Ret  ntdll.RtlReleasePath() retval=00000001 ret=7b023049
00c8:Ret  KERNEL32.LoadLibraryA() retval=7b620000 ret=00622328
00c8:Call KERNEL32.GetProcAddress(7b620000,00621009 "RtlMoveMemory") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7bc07150 ret=00622346
00c8:Call KERNEL32.GetProcAddress(7b620000,00621018 "RtlZeroMemory") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7bc082b0 ret=00622346
00c8:Call KERNEL32.GetProcAddress(7b620000,00621027 "LoadLibraryExA") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7b62b3bc ret=00622346
00c8:Call KERNEL32.LoadLibraryA(0068a5c9 "MSVBVM60.DLL") ret=00622328
00c8:Call ntdll.RtlInitAnsiString(0031fe20,0068a5c9 "MSVBVM60.DLL") ret=7b014d9f
00c8:Ret  ntdll.RtlInitAnsiString() retval=0000000d ret=7b014d9f
00c8:Call ntdll.RtlAnsiStringToUnicodeString(7ffc2bf8,0031fe20,00000000) ret=7b014e26
00c8:Ret  ntdll.RtlAnsiStringToUnicodeString() retval=00000000 ret=7b014e26
00c8:Call ntdll.RtlInitUnicodeString(0031fe48,7ffc2c00 L"MSVBVM60.DLL") ret=7b023ec8
00c8:Ret  ntdll.RtlInitUnicodeString() retval=0000001a ret=7b023ec8
00c8:Call ntdll.LdrGetDllPath(7ffc2c00 L"MSVBVM60.DLL",00000000,0031fe04,0031fe08) ret=7b022f8f
00c8:Ret  ntdll.LdrGetDllPath() retval=00000000 ret=7b022f8f
00c8:Call ntdll.LdrLoadDll(0021ec58 L"c:\\Program Files\\GrupoEducare\\Bookmaker;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0",00000000,0031fe48,0031fe00) ret=7b023033
00c8:Ret  ntdll.LdrLoadDll() retval=00000000 ret=7b023033
00c8:Call ntdll.RtlReleasePath(0021ec58) ret=7b023049
00c8:Ret  ntdll.RtlReleasePath() retval=00000001 ret=7b023049
00c8:Ret  KERNEL32.LoadLibraryA() retval=732a0000 ret=00622328
00c8:Call KERNEL32.GetProcAddress(732a0000,00621040 "EVENT_SINK_GetIDsOfNames") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73386027 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000024b) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f732e ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002b8) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733944cb ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002b9) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73390e75 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00621063 "MethCallEngine") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a6962 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00621073 "EVENT_SINK_Invoke") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73305397 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000204) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cce9c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000205) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f7cb7 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000207) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cc67c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000229) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f6333 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000294) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339f1d3 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000022c) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338dff3 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000022e) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338e0de ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000029b) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733051f0 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0062109e "Zombie_GetTypeInfo") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733860e5 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000029d) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732b6383 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000024f) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f7df1 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,006210b8 "EVENT_SINK2_Release") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73386015 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000250) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cbd32 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000251) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732bd79c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000252) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732e3865 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000012d) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339edd1 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000253) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338e611 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000254) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338e7e0 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000012f) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339ee14 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000256) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cb932 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000131) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339edf9 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000208) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733947f4 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000133) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339eef7 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000209) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73394896 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002c2) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339f32e ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002c3) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339f36c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000135) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73309169 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000020b) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73394aa9 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002c5) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a1041 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000020c) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73394ac9 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000277) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732caaa8 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000278) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732bf959 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000020d) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73394dc4 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000020e) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73394e06 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0062110f "EVENT_SINK_AddRef") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732fd157 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000020f) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f885b ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000210) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f8807 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000211) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cc700 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0062112b "DllFunctionCall") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732a514b ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000233) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732ce041 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000237) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338aee5 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000238) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73393734 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00621145 "Zombie_GetTypeInfoCount") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733860ed ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0062115e "EVENT_SINK_Release") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732fd930 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000259) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a960d ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000137) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339ef1c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00621178 "EVENT_SINK_QueryInterface") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73308eb4 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00621193 "__vbaExceptHandler") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732bcf60 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002c7) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a0b83 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000139) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339f107 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002c8) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a176c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002c9) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a1719 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000025e) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732fa33e ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000025f) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cdafc ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000260) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732bd928 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000212) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338be20 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002cb) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338efda ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000213) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338be41 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002cc) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732eb766 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000214) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338be52 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002cd) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73395a30 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000013f) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339eecd ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000215) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338c198 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,006211d4 "ProcCallEngine") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a991b ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000217) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cb17c ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000218) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732e3380 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000284) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338efd3 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000219) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732fc050 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000021a) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73389aa0 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000285) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733043c4 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000287) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338bbca ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000023a) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73304f9e ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000288) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732ca886 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000023b) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733069ee ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000023c) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732c07e6 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000023d) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732c07b0 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00621208 "EVENT_SINK2_AddRef") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73386003 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002a9) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732bd5df ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000242) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732e8e3b ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002ad) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732ca9e3 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000064) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732a7b5d ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,000002b1) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=733a02e4 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000140) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7339f0f7 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000141) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732e2754 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000268) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cabe1 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000269) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732bd9e3 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000026a) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732cc4e5 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000021e) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f62f4 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000021f) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73389caf ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,0000028a) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732fc2b0 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000220) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73389cf2 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000221) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732f6268 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000222) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=732fc36b ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000223) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=73389d35 ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000244) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7338bfed ret=00622346
00c8:Call KERNEL32.GetProcAddress(732a0000,00000245) ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=7330903c ret=00622346
00c8:Call KERNEL32.LoadLibraryA(0068a5d6 "OLE32.DLL") ret=00622328
00c8:Call ntdll.RtlInitAnsiString(0031fe20,0068a5d6 "OLE32.DLL") ret=7b014d9f
00c8:Ret  ntdll.RtlInitAnsiString() retval=0000000a ret=7b014d9f
00c8:Call ntdll.RtlAnsiStringToUnicodeString(7ffc2bf8,0031fe20,00000000) ret=7b014e26
00c8:Ret  ntdll.RtlAnsiStringToUnicodeString() retval=00000000 ret=7b014e26
00c8:Call ntdll.RtlInitUnicodeString(0031fe48,7ffc2c00 L"OLE32.DLL") ret=7b023ec8
00c8:Ret  ntdll.RtlInitUnicodeString() retval=00000014 ret=7b023ec8
00c8:Call ntdll.LdrGetDllPath(7ffc2c00 L"OLE32.DLL",00000000,0031fe04,0031fe08) ret=7b022f8f
00c8:Ret  ntdll.LdrGetDllPath() retval=00000000 ret=7b022f8f
00c8:Call ntdll.LdrLoadDll(0021ec58 L"c:\\Program Files\\GrupoEducare\\Bookmaker;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0",00000000,0031fe48,0031fe00) ret=7b023033
00c8:Ret  ntdll.LdrLoadDll() retval=00000000 ret=7b023033
00c8:Call ntdll.RtlReleasePath(0021ec58) ret=7b023049
00c8:Ret  ntdll.RtlReleasePath() retval=00000001 ret=7b023049
00c8:Ret  KERNEL32.LoadLibraryA() retval=65200000 ret=00622328
00c8:Call KERNEL32.GetProcAddress(65200000,0062125e "IIDFromString") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=67803108 ret=00622346
00c8:Call KERNEL32.GetProcAddress(65200000,0062126d "CoTaskMemAlloc") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=67802b88 ret=00622346
00c8:Call KERNEL32.GetProcAddress(65200000,0062127d "IsEqualGUID") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=65201f0c ret=00622346
00c8:Call KERNEL32.GetProcAddress(65200000,0062128a "CoTaskMemFree") ret=00622346
00c8:Ret  KERNEL32.GetProcAddress() retval=67802ba8 ret=00622346
00c8:Call KERNEL32.VirtualProtect(00400000,00001000,00000004,0031feb0) ret=00622370
00c8:Call ntdll.NtProtectVirtualMemory(ffffffff,0031fe34,0031fe38,00000004,0031feb0) ret=7b036f1b
00c8:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b036f1b
00c8:Ret  KERNEL32.VirtualProtect() retval=00000001 ret=00622370
00c8:Call KERNEL32.VirtualProtect(00400000,00001000,00000080,0031feb0) ret=00622385
00c8:Call ntdll.NtProtectVirtualMemory(ffffffff,0031fe34,0031fe38,00000080,0031feb0) ret=7b036f1b
00c8:Ret  ntdll.NtProtectVirtualMemory() retval=00000000 ret=7b036f1b
00c8:Ret  KERNEL32.VirtualProtect() retval=00000001 ret=00622385
00c8:Call KERNEL32.GetStartupInfoA(0031fe68) ret=732a7b9c
00c8:Ret  KERNEL32.GetStartupInfoA() retval=7b63eda0 ret=732a7b9c
00c8:Call ntdll.RtlAllocateHeap(01610000,00000008,00000104) ret=732a7c5b
00c8:Ret  ntdll.RtlAllocateHeap() retval=016104d0 ret=732a7c5b
00c8:Call ntdll.RtlAllocateHeap(01610000,00000008,00000ecc) ret=732a7dea
00c8:Ret  ntdll.RtlAllocateHeap() retval=016105e0 ret=732a7dea
00c8:Call KERNEL32.GetCommandLineA() ret=732a7feb
00c8:Ret  KERNEL32.GetCommandLineA() retval=00111318 ret=732a7feb
00c8:Call KERNEL32.lstrlenA(00111355 "") ret=732a801f
00c8:Call ntdll.strlen(00111355 "") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000000 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000000 ret=732a801f
00c8:Call KERNEL32.lstrcpyA(0031fdf4,00111355 "") ret=732a803b
00c8:Ret  KERNEL32.lstrcpyA() retval=0031fdf4 ret=732a803b
00c8:Call KERNEL32.SetErrorMode(00008001) ret=732a80d8
00c8:Call ntdll.NtQueryInformationProcess(ffffffff,0000000c,0031fb7c,00000004,00000000) ret=7b049557
00c8:Ret  ntdll.NtQueryInformationProcess() retval=00000000 ret=7b049557
00c8:Call ntdll.NtSetInformationProcess(ffffffff,0000000c,0031fb90,00000004) ret=7b049583
00c8:Ret  ntdll.NtSetInformationProcess() retval=00000000 ret=7b049583
00c8:Ret  KERNEL32.SetErrorMode() retval=00000000 ret=732a80d8
00c8:Call KERNEL32.GetModuleFileNameA(732a0000,0031fab0,00000104) ret=732a8475
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000208) ret=7b023a96
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe830 ret=7b023a96
00c8:Call ntdll.LdrLockLoaderLock(00000000,00000000,0031f728) ret=7b0238bd
00c8:Ret  ntdll.LdrLockLoaderLock() retval=00000000 ret=7b0238bd
00c8:Call ntdll.LdrFindEntryForAddress(732a0000,0031f72c) ret=7b0238d1
00c8:Ret  ntdll.LdrFindEntryForAddress() retval=00000000 ret=7b0238d1
00c8:Call ntdll.memcpy(00bbe830,0021eea8,00000068) ret=7b023905
00c8:Ret  ntdll.memcpy() retval=00bbe830 ret=7b023905
00c8:Call ntdll.LdrUnlockLoaderLock(00000000,000000c8) ret=7b0239a6
00c8:Ret  ntdll.LdrUnlockLoaderLock() retval=00000000 ret=7b0239a6
00c8:Call ntdll.RtlUnicodeToMultiByteN(0031fab0,00000104,0031f728,00bbe830,00000068) ret=7b014eb7
00c8:Ret  ntdll.RtlUnicodeToMultiByteN() retval=00000000 ret=7b014eb7
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe830) ret=7b023ae1
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b023ae1
00c8:Ret  KERNEL32.GetModuleFileNameA() retval=00000034 ret=732a8475
00c8:Call KERNEL32.GetUserDefaultLCID() ret=732a849b
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031f774) ret=7b02f1ae
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b02f1ae
00c8:Ret  KERNEL32.GetUserDefaultLCID() retval=0000080a ret=732a849b
00c8:Call KERNEL32.GetUserDefaultLCID() ret=7335312e
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031f760) ret=7b02f1ae
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b02f1ae
00c8:Ret  KERNEL32.GetUserDefaultLCID() retval=0000080a ret=7335312e
00c8:Call KERNEL32.GetLocaleInfoA(0000080a,00000003,0031f79c,00000004) ret=7335314b
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031f6c0) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.RtlInitUnicodeString(0031f4cc,7b0899f8 L"sLanguage") ret=7b0540b0
00c8:Ret  ntdll.RtlInitUnicodeString() retval=00000014 ret=7b0540b0
00c8:Call KERNEL32.GetLastError() ret=00375b8f
00c8:Ret  KERNEL32.GetLastError() retval=00000000 ret=00375b8f
00c8:Call ntdll.NtQueryValueKey(00000024,0031f4cc,00000002,0031f4d4,0000000c,0031f4c8) ret=7b0543c7
00c8:Ret  ntdll.NtQueryValueKey() retval=80000005 ret=7b0543c7
00c8:Call ntdll.RtlNtStatusToDosError(00000000) ret=7b054243
00c8:Ret  ntdll.RtlNtStatusToDosError() retval=00000000 ret=7b054243
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=7b03419e
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe7a0 ret=7b03419e
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031f6c0) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.RtlInitUnicodeString(0031f4cc,7b0899f8 L"sLanguage") ret=7b0540b0
00c8:Ret  ntdll.RtlInitUnicodeString() retval=00000014 ret=7b0540b0
00c8:Call KERNEL32.GetLastError() ret=00375b8f
00c8:Ret  KERNEL32.GetLastError() retval=00000000 ret=00375b8f
00c8:Call ntdll.NtQueryValueKey(00000024,0031f4cc,00000002,0031f4d4,00000014,0031f4c8) ret=7b05410e
00c8:Ret  ntdll.NtQueryValueKey() retval=00000000 ret=7b05410e
00c8:Call ntdll.memcpy(00bbe7a0,0031f4e0,00000008) ret=7b054495
00c8:Ret  ntdll.memcpy() retval=00bbe7a0 ret=7b054495
00c8:Call ntdll.RtlNtStatusToDosError(00000000) ret=7b054243
00c8:Ret  ntdll.RtlNtStatusToDosError() retval=00000000 ret=7b054243
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=7b027c04
00c8:Ret  ntdll.RtlAllocateHeap() retval=0021ec58 ret=7b027c04
00c8:Call ntdll.memcpy(0021ec58,00bbe7a0,00000008) ret=7b027c28
00c8:Ret  ntdll.memcpy() retval=0021ec58 ret=7b027c28
00c8:Call ntdll.NtQueryDefaultLocale(00000000,0031f6ec) ret=7b0295d5
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0295d5
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe7a0) ret=7b0341ed
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b0341ed
00c8:Ret  KERNEL32.GetLocaleInfoA() retval=00000004 ret=7335314b
00c8:Call KERNEL32.lstrlenA(0031f7b0 "VB6ES.DLL") ret=73313239
00c8:Call ntdll.strlen(0031f7b0 "VB6ES.DLL") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000009 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000009 ret=73313239
00c8:Call KERNEL32.lstrlenA(0031fab0 "c:\\Program Files\\GrupoEducare\\Bookmaker\\") ret=73313240
00c8:Call ntdll.strlen(0031fab0 "c:\\Program Files\\GrupoEducare\\Bookmaker\\") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000028 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000028 ret=73313240
00c8:Call KERNEL32.lstrcpyA(0031f698,0031fab0 "c:\\Program Files\\GrupoEducare\\Bookmaker\\") ret=73313262
00c8:Ret  KERNEL32.lstrcpyA() retval=0031f698 ret=73313262
00c8:Call KERNEL32.lstrcatA(0031f698 "c:\\Program Files\\GrupoEducare\\Bookmaker\\",0031f7b0 "VB6ES.DLL") ret=73313270
00c8:Ret  KERNEL32.lstrcatA() retval=0031f698 ret=73313270
00c8:Call KERNEL32.LoadLibraryA(0031f698 "c:\\Program Files\\GrupoEducare\\Bookmaker\\VB6ES.DLL") ret=7331327d
00c8:Call ntdll.RtlInitAnsiString(0031f600,0031f698 "c:\\Program Files\\GrupoEducare\\Bookmaker\\VB6ES.DLL") ret=7b014d9f
00c8:Ret  ntdll.RtlInitAnsiString() retval=00000032 ret=7b014d9f
00c8:Call ntdll.RtlAnsiStringToUnicodeString(7ffc2bf8,0031f600,00000000) ret=7b014e26
00c8:Ret  ntdll.RtlAnsiStringToUnicodeString() retval=00000000 ret=7b014e26
00c8:Call ntdll.RtlInitUnicodeString(0031f628,7ffc2c00 L"c:\\Program Files\\GrupoEducare\\Bookmaker\\VB6ES.DLL") ret=7b023ec8
00c8:Ret  ntdll.RtlInitUnicodeString() retval=00000064 ret=7b023ec8
00c8:Call ntdll.LdrGetDllPath(7ffc2c00 L"c:\\Program Files\\GrupoEducare\\Bookmaker\\VB6ES.DLL",00000000,0031f5e4,0031f5e8) ret=7b022f8f
00c8:Ret  ntdll.LdrGetDllPath() retval=00000000 ret=7b022f8f
00c8:Call ntdll.LdrLoadDll(00bbe830 L"c:\\Program Files\\GrupoEducare\\Bookmaker;C:\\windows\\system32;C:\\windows\\system;C:\\windows;.;C:\\windows\\system32;C:\\windows;C:\\windows\\system32\\wbem;C:\\windows\\system32\\WindowsPowershell\\v1.0",00000000,0031f628,0031f5e0) ret=7b023033
00c8:Ret  ntdll.LdrLoadDll() retval=c0000135 ret=7b023033
00c8:Call ntdll.RtlRunOnceExecuteOnce(7b0afb40,7b0696d0,00000000,00000000) ret=7b0665ee
00c8:Ret  ntdll.RtlRunOnceExecuteOnce() retval=00000000 ret=7b0665ee
00c8:Call ntdll.wcscpy(0031f4a8,7b0afb74 L"Service Pack 1") ret=7b06d26f
00c8:Ret  ntdll.wcscpy() retval=0031f4a8 ret=7b06d26f
00c8:Call ntdll.RtlNtStatusToDosError(c0000135) ret=7b023078
00c8:Ret  ntdll.RtlNtStatusToDosError() retval=0000007e ret=7b023078
00c8:Call ntdll.RtlReleasePath(00bbe830) ret=7b023049
00c8:Ret  ntdll.RtlReleasePath() retval=00000001 ret=7b023049
00c8:Ret  KERNEL32.LoadLibraryA() retval=00000000 ret=7331327d
00c8:Call KERNEL32.lstrcpyA(0031f7b0,004025c2 "*") ret=732a84c0
00c8:Ret  KERNEL32.lstrcpyA() retval=0031f7b0 ret=732a84c0
00c8:Call user32.LoadStringA(732a0000,000007d1,0031fbb4,00000008) ret=732a850a
00c8:Call ntdll.LdrFindResource_U(732a0000,0031f404,00000003,0031f3ec) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(732a0000,733bcf48,0031f6ec,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Ret  user32.LoadStringA() retval=00000003 ret=732a850a
00c8:Call KERNEL32.GetSystemDefaultLCID() ret=732a86ef
00c8:Call ntdll.NtQueryDefaultLocale(00000000,0031fb8c) ret=7b02e9ee
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b02e9ee
00c8:Ret  KERNEL32.GetSystemDefaultLCID() retval=0000080a ret=732a86ef
00c8:Call KERNEL32.GetUserDefaultLCID() ret=732a8748
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fb84) ret=7b02f1ae
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b02f1ae
00c8:Ret  KERNEL32.GetUserDefaultLCID() retval=0000080a ret=732a8748
00c8:Call KERNEL32.GetLocaleInfoA(00000400,0000000e,0031fbbe,00000002) ret=732a8781
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fa7c) ret=7b028f67
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b028f67
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fae0) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.RtlInitUnicodeString(0031f8ec,7b089858 L"sDecimal") ret=7b0540b0
00c8:Ret  ntdll.RtlInitUnicodeString() retval=00000012 ret=7b0540b0
00c8:Call KERNEL32.GetLastError() ret=00375b8f
00c8:Ret  KERNEL32.GetLastError() retval=0000007e ret=00375b8f
00c8:Call ntdll.NtQueryValueKey(00000024,0031f8ec,00000002,0031f8f4,0000000c,0031f8e8) ret=7b0543c7
00c8:Ret  ntdll.NtQueryValueKey() retval=80000005 ret=7b0543c7
00c8:Call ntdll.RtlNtStatusToDosError(00000000) ret=7b054243
00c8:Ret  ntdll.RtlNtStatusToDosError() retval=00000000 ret=7b054243
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=7b03419e
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe7a0 ret=7b03419e
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fa7c) ret=7b028f67
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b028f67
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fae0) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.RtlInitUnicodeString(0031f8ec,7b089858 L"sDecimal") ret=7b0540b0
00c8:Ret  ntdll.RtlInitUnicodeString() retval=00000012 ret=7b0540b0
00c8:Call KERNEL32.GetLastError() ret=00375b8f
00c8:Ret  KERNEL32.GetLastError() retval=0000007e ret=00375b8f
00c8:Call ntdll.NtQueryValueKey(00000024,0031f8ec,00000002,0031f8f4,00000010,0031f8e8) ret=7b05410e
00c8:Ret  ntdll.NtQueryValueKey() retval=00000000 ret=7b05410e
00c8:Call ntdll.memcpy(00bbe7a0,0031f900,00000004) ret=7b054495
00c8:Ret  ntdll.memcpy() retval=00bbe7a0 ret=7b054495
00c8:Call ntdll.RtlNtStatusToDosError(00000000) ret=7b054243
00c8:Ret  ntdll.RtlNtStatusToDosError() retval=00000000 ret=7b054243
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=7b027c04
00c8:Ret  ntdll.RtlAllocateHeap() retval=0021ec78 ret=7b027c04
00c8:Call ntdll.memcpy(0021ec78,00bbe7a0,00000004) ret=7b027c28
00c8:Ret  ntdll.memcpy() retval=0021ec78 ret=7b027c28
00c8:Call ntdll.NtQueryDefaultLocale(00000000,0031fb0c) ret=7b0295d5
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0295d5
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fa4c) ret=7b028f67
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b028f67
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fab0) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f784,00000003,0031f76c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6aa09c,0031fa4c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=7b0291e2
00c8:Ret  ntdll.RtlAllocateHeap() retval=0021ec98 ret=7b0291e2
00c8:Call ntdll.memcpy(0021ec98,7b6d8a2a,00000008) ret=7b02921b
00c8:Ret  ntdll.memcpy() retval=0021ec98 ret=7b02921b
00c8:Call ntdll.wcstol(0021ec98 L"1252",0031fab0,0000000a) ret=7b02924c
00c8:Ret  ntdll.wcstol() retval=000004e4 ret=7b02924c
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,0021ec98) ret=7b029292
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b029292
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe7a0) ret=7b0341ed
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b0341ed
00c8:Ret  KERNEL32.GetLocaleInfoA() retval=00000002 ret=732a8781
00c8:Call gdi32.GetStockObject(0000000d) ret=732a87a5
00c8:Call user32.GetDpiForSystem() ret=7e8e91b5
00c8:Ret  user32.GetDpiForSystem() retval=00000060 ret=7e8e91b5
00c8:Ret  gdi32.GetStockObject() retval=0001002e ret=732a87a5
00c8:Call gdi32.GetObjectA(0001002e,0000003c,0031fb84) ret=732a87ba
00c8:Ret  gdi32.GetObjectA() retval=0000003c ret=732a87ba
00c8:Call KERNEL32.GetLocaleInfoA(00000409,80000003,0031fb80,00000004) ret=732a889f
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f774,00000003,0031f75c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6a50fc,0031fa3c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=7b03419e
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe7a0 ret=7b03419e
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f774,00000003,0031f75c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6a50fc,0031fa3c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.memcpy(00bbe7a0,7b6acb5e,00000008) ret=7b0294e1
00c8:Ret  ntdll.memcpy() retval=00bbe7a0 ret=7b0294e1
00c8:Call ntdll.NtQueryDefaultLocale(00000000,0031facc) ret=7b0295d5
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0295d5
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fa70) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f744,00000003,0031f72c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6a9bfc,0031fa0c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=7b0291e2
00c8:Ret  ntdll.RtlAllocateHeap() retval=0021ec98 ret=7b0291e2
00c8:Call ntdll.memcpy(0021ec98,7b6d5d62,00000008) ret=7b02921b
00c8:Ret  ntdll.memcpy() retval=0021ec98 ret=7b02921b
00c8:Call ntdll.wcstol(0021ec98 L"1252",0031fa70,0000000a) ret=7b02924c
00c8:Ret  ntdll.wcstol() retval=000004e4 ret=7b02924c
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,0021ec98) ret=7b029292
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b029292
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe7a0) ret=7b0341ed
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b0341ed
00c8:Ret  KERNEL32.GetLocaleInfoA() retval=00000004 ret=732a889f
00c8:Call KERNEL32.lstrcpyA(0031fbb0,0031fb80 "EN") ret=732a88f6
00c8:Ret  KERNEL32.lstrcpyA() retval=0031fbb0 ret=732a88f6
00c8:Call KERNEL32.lstrlenA(732b1edc "{xx}") ret=732a8844
00c8:Call ntdll.strlen(732b1edc "{xx}") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000004 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000004 ret=732a8844
00c8:Call KERNEL32.lstrlenA(732b1ed0 "VB98.CHM") ret=732a884e
00c8:Call ntdll.strlen(732b1ed0 "VB98.CHM") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000008 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000008 ret=732a884e
00c8:Call KERNEL32.lstrcpyA(733b95c8,732b1ed0 "VB98.CHM") ret=732a887a
00c8:Ret  KERNEL32.lstrcpyA() retval=733b95c8 ret=732a887a
00c8:Call KERNEL32.GetLocaleInfoA(00000409,80000003,0031fb80,00000004) ret=732a889f
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f774,00000003,0031f75c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6a50fc,0031fa3c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=7b03419e
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe7a0 ret=7b03419e
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f774,00000003,0031f75c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6a50fc,0031fa3c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.memcpy(00bbe7a0,7b6acb5e,00000008) ret=7b0294e1
00c8:Ret  ntdll.memcpy() retval=00bbe7a0 ret=7b0294e1
00c8:Call ntdll.NtQueryDefaultLocale(00000000,0031facc) ret=7b0295d5
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0295d5
00c8:Call ntdll.NtQueryDefaultLocale(00000001,0031fa70) ret=7b0290df
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0290df
00c8:Call ntdll.LdrFindResource_U(7b620000,0031f744,00000003,0031f72c) ret=7b02693b
00c8:Ret  ntdll.LdrFindResource_U() retval=00000000 ret=7b02693b
00c8:Call ntdll.LdrAccessResource(7b620000,7b6a9bfc,0031fa0c,00000000) ret=7b026e0a
00c8:Ret  ntdll.LdrAccessResource() retval=00000000 ret=7b026e0a
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=7b0291e2
00c8:Ret  ntdll.RtlAllocateHeap() retval=0021ec98 ret=7b0291e2
00c8:Call ntdll.memcpy(0021ec98,7b6d5d62,00000008) ret=7b02921b
00c8:Ret  ntdll.memcpy() retval=0021ec98 ret=7b02921b
00c8:Call ntdll.wcstol(0021ec98 L"1252",0031fa70,0000000a) ret=7b02924c
00c8:Ret  ntdll.wcstol() retval=000004e4 ret=7b02924c
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,0021ec98) ret=7b029292
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b029292
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe7a0) ret=7b0341ed
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b0341ed
00c8:Ret  KERNEL32.GetLocaleInfoA() retval=00000004 ret=732a889f
00c8:Call KERNEL32.lstrcpyA(0031fbb0,0031fb80 "EN") ret=732a88f6
00c8:Ret  KERNEL32.lstrcpyA() retval=0031fbb0 ret=732a88f6
00c8:Call KERNEL32.lstrlenA(732b1edc "{xx}") ret=732a8844
00c8:Call ntdll.strlen(732b1edc "{xx}") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000004 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000004 ret=732a8844
00c8:Call KERNEL32.lstrlenA(732b1ec0 "VBENLR98.CHM") ret=732a884e
00c8:Call ntdll.strlen(732b1ec0 "VBENLR98.CHM") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=0000000c ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=0000000c ret=732a884e
00c8:Call KERNEL32.lstrcpyA(733b96d0,732b1ec0 "VBENLR98.CHM") ret=732a887a
00c8:Ret  KERNEL32.lstrcpyA() retval=733b96d0 ret=732a887a
00c8:Call KERNEL32.GetModuleFileNameA(00400000,0031fcd8,00000104) ret=732a8193
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000208) ret=7b023a96
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe830 ret=7b023a96
00c8:Call ntdll.LdrLockLoaderLock(00000000,00000000,0031fb38) ret=7b0238bd
00c8:Ret  ntdll.LdrLockLoaderLock() retval=00000000 ret=7b0238bd
00c8:Call ntdll.LdrFindEntryForAddress(00400000,0031fb3c) ret=7b0238d1
00c8:Ret  ntdll.LdrFindEntryForAddress() retval=00000000 ret=7b0238d1
00c8:Call ntdll.memcpy(00bbe830,00110df8,00000074) ret=7b023905
00c8:Ret  ntdll.memcpy() retval=00bbe830 ret=7b023905
00c8:Call ntdll.LdrUnlockLoaderLock(00000000,000000c8) ret=7b0239a6
00c8:Ret  ntdll.LdrUnlockLoaderLock() retval=00000000 ret=7b0239a6
00c8:Call ntdll.RtlUnicodeToMultiByteN(0031fcd8,00000104,0031fb38,00bbe830,00000074) ret=7b014eb7
00c8:Ret  ntdll.RtlUnicodeToMultiByteN() retval=00000000 ret=7b014eb7
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe830) ret=7b023ae1
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b023ae1
00c8:Ret  KERNEL32.GetModuleFileNameA() retval=0000003a ret=732a8193
00c8:Call KERNEL32.GetModuleFileNameA(732a0000,0031fbd4,00000104) ret=732a81ab
00c8:Call ntdll.RtlAllocateHeap(00110000,00000000,00000208) ret=7b023a96
00c8:Ret  ntdll.RtlAllocateHeap() retval=00bbe830 ret=7b023a96
00c8:Call ntdll.LdrLockLoaderLock(00000000,00000000,0031fb38) ret=7b0238bd
00c8:Ret  ntdll.LdrLockLoaderLock() retval=00000000 ret=7b0238bd
00c8:Call ntdll.LdrFindEntryForAddress(732a0000,0031fb3c) ret=7b0238d1
00c8:Ret  ntdll.LdrFindEntryForAddress() retval=00000000 ret=7b0238d1
00c8:Call ntdll.memcpy(00bbe830,0021eea8,00000068) ret=7b023905
00c8:Ret  ntdll.memcpy() retval=00bbe830 ret=7b023905
00c8:Call ntdll.LdrUnlockLoaderLock(00000000,000000c8) ret=7b0239a6
00c8:Ret  ntdll.LdrUnlockLoaderLock() retval=00000000 ret=7b0239a6
00c8:Call ntdll.RtlUnicodeToMultiByteN(0031fbd4,00000104,0031fb38,00bbe830,00000068) ret=7b014eb7
00c8:Ret  ntdll.RtlUnicodeToMultiByteN() retval=00000000 ret=7b014eb7
00c8:Call ntdll.RtlFreeHeap(00110000,00000000,00bbe830) ret=7b023ae1
00c8:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=7b023ae1
00c8:Ret  KERNEL32.GetModuleFileNameA() retval=00000034 ret=732a81ab
00c8:Call KERNEL32.lstrcpynA(0031fab8,0031fbd4 "c:\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL",00000104) ret=732a4bce
00c8:Ret  KERNEL32.lstrcpynA() retval=0031fab8 ret=732a4bce
00c8:Call KERNEL32.lstrlenA(0031fab8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4bdb
00c8:Call ntdll.strlen(0031fab8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000034 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000034 ret=732a4bdb
00c8:Call ntdll.RtlAllocateHeap(01610000,00000000,00000035) ret=732a4c3f
00c8:Ret  ntdll.RtlAllocateHeap() retval=016114b8 ret=732a4c3f
00c8:Call ntdll.RtlAllocateHeap(01610000,00000000,00000035) ret=732a4c3f
00c8:Ret  ntdll.RtlAllocateHeap() retval=016114f8 ret=732a4c3f
00c8:Call KERNEL32.lstrcpyA(016114b8,0031fab8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4c19
00c8:Ret  KERNEL32.lstrcpyA() retval=016114b8 ret=732a4c19
00c8:Call KERNEL32.LCMapStringA(0000080a,00000200,0031fcd8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\BookMaker v3.0.exe",ffffffff,0031fa98,00000104) ret=732a8930
00c8:Call ntdll.NtQueryDefaultLocale(00000000,0031f9bc) ret=7b0295d5
00c8:Ret  ntdll.NtQueryDefaultLocale() retval=00000000 ret=7b0295d5
00c8:Call ntdll.strlen(0031fcd8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\BookMaker v3.0.exe") ret=7b02982f
00c8:Ret  ntdll.strlen() retval=0000003a ret=7b02982f

josejulio
Level 1
Level 1
Posts: 6
Joined: Wed Aug 26, 2020 4:26 pm

Re: Problem with MSVBVM60.DLL

Post by josejulio » Thu Aug 27, 2020 2:58 pm

And the last part that I think could be useful:


Lines 551491 to 551629

Code: Select all

00c8:Ret  ntdll.NtCreateFile() retval=c0000034 ret=7b01559c
00c8:Call ntdll.RtlNtStatusToDosError(c0000034) ret=7b0157b9
00c8:Ret  ntdll.RtlNtStatusToDosError() retval=00000002 ret=7b0157b9
00c8:Call ntdll.RtlFreeUnicodeString(0031eaac) ret=7b015742
00c8:Ret  ntdll.RtlFreeUnicodeString() retval=00000001 ret=7b015742
00c8:Ret  KERNEL32.GetPrivateProfileStringA() retval=00000000 ret=732b931d
00c8:Call KERNEL32.HeapFree(01610000,00000000,0161f120) ret=732b9341
00c8:Ret  KERNEL32.HeapFree() retval=00000001 ret=732b9341
00c8:Call KERNEL32.HeapFree(01610000,00000000,0161f800) ret=732b9352
00c8:Ret  KERNEL32.HeapFree() retval=00000001 ret=732b9352
00c8:Call user32.CharNextA(016114b8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e2b
00c8:Ret  user32.CharNextA() retval=016114b9 ret=732a4e2b
00c8:Call user32.CharNextA(016114b8 "c:\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e3c
00c8:Ret  user32.CharNextA() retval=016114b9 ret=732a4e3c
00c8:Call user32.CharNextA(016114b9 ":\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e3f
00c8:Ret  user32.CharNextA() retval=016114ba ret=732a4e3f
00c8:Call user32.CharNextA(016114ba "\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e8b
00c8:Ret  user32.CharNextA() retval=016114bb ret=732a4e8b
00c8:Call user32.CharNextA(016114ba "\\Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114bb ret=732a4e91
00c8:Call user32.CharNextA(016114bb "Program Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114bc ret=732a4e91
00c8:Call user32.CharNextA(016114bc "rogram Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114bd ret=732a4e91
00c8:Call user32.CharNextA(016114bd "ogram Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114be ret=732a4e91
00c8:Call user32.CharNextA(016114be "gram Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114bf ret=732a4e91
00c8:Call user32.CharNextA(016114bf "ram Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c0 ret=732a4e91
00c8:Call user32.CharNextA(016114c0 "am Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c1 ret=732a4e91
00c8:Call user32.CharNextA(016114c1 "m Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c2 ret=732a4e91
00c8:Call user32.CharNextA(016114c2 " Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c3 ret=732a4e91
00c8:Call user32.CharNextA(016114c3 "Files\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c4 ret=732a4e91
00c8:Call user32.CharNextA(016114c4 "iles\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c5 ret=732a4e91
00c8:Call user32.CharNextA(016114c5 "les\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c6 ret=732a4e91
00c8:Call user32.CharNextA(016114c6 "es\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c7 ret=732a4e91
00c8:Call user32.CharNextA(016114c7 "s\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c8 ret=732a4e91
00c8:Call user32.CharNextA(016114c8 "\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e8b
00c8:Ret  user32.CharNextA() retval=016114c9 ret=732a4e8b
00c8:Call user32.CharNextA(016114c8 "\\GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114c9 ret=732a4e91
00c8:Call user32.CharNextA(016114c9 "GrupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114ca ret=732a4e91
00c8:Call user32.CharNextA(016114ca "rupoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114cb ret=732a4e91
00c8:Call user32.CharNextA(016114cb "upoEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114cc ret=732a4e91
00c8:Call user32.CharNextA(016114cc "poEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114cd ret=732a4e91
00c8:Call user32.CharNextA(016114cd "oEducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114ce ret=732a4e91
00c8:Call user32.CharNextA(016114ce "Educare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114cf ret=732a4e91
00c8:Call user32.CharNextA(016114cf "ducare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d0 ret=732a4e91
00c8:Call user32.CharNextA(016114d0 "ucare\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d1 ret=732a4e91
00c8:Call user32.CharNextA(016114d1 "care\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d2 ret=732a4e91
00c8:Call user32.CharNextA(016114d2 "are\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d3 ret=732a4e91
00c8:Call user32.CharNextA(016114d3 "re\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d4 ret=732a4e91
00c8:Call user32.CharNextA(016114d4 "e\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d5 ret=732a4e91
00c8:Call user32.CharNextA(016114d5 "\\Bookmaker\\MSVBVM60.DLL") ret=732a4e8b
00c8:Ret  user32.CharNextA() retval=016114d6 ret=732a4e8b
00c8:Call user32.CharNextA(016114d5 "\\Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d6 ret=732a4e91
00c8:Call user32.CharNextA(016114d6 "Bookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d7 ret=732a4e91
00c8:Call user32.CharNextA(016114d7 "ookmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d8 ret=732a4e91
00c8:Call user32.CharNextA(016114d8 "okmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114d9 ret=732a4e91
00c8:Call user32.CharNextA(016114d9 "kmaker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114da ret=732a4e91
00c8:Call user32.CharNextA(016114da "maker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114db ret=732a4e91
00c8:Call user32.CharNextA(016114db "aker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114dc ret=732a4e91
00c8:Call user32.CharNextA(016114dc "ker\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114dd ret=732a4e91
00c8:Call user32.CharNextA(016114dd "er\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114de ret=732a4e91
00c8:Call user32.CharNextA(016114de "r\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114df ret=732a4e91
00c8:Call user32.CharNextA(016114df "\\MSVBVM60.DLL") ret=732a4e8b
00c8:Ret  user32.CharNextA() retval=016114e0 ret=732a4e8b
00c8:Call user32.CharNextA(016114df "\\MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e0 ret=732a4e91
00c8:Call user32.CharNextA(016114e0 "MSVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e1 ret=732a4e91
00c8:Call user32.CharNextA(016114e1 "SVBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e2 ret=732a4e91
00c8:Call user32.CharNextA(016114e2 "VBVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e3 ret=732a4e91
00c8:Call user32.CharNextA(016114e3 "BVM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e4 ret=732a4e91
00c8:Call user32.CharNextA(016114e4 "VM60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e5 ret=732a4e91
00c8:Call user32.CharNextA(016114e5 "M60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e6 ret=732a4e91
00c8:Call user32.CharNextA(016114e6 "60.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e7 ret=732a4e91
00c8:Call user32.CharNextA(016114e7 "0.DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e8 ret=732a4e91
00c8:Call user32.CharNextA(016114e8 ".DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114e9 ret=732a4e91
00c8:Call user32.CharNextA(016114e9 "DLL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114ea ret=732a4e91
00c8:Call user32.CharNextA(016114ea "LL") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114eb ret=732a4e91
00c8:Call user32.CharNextA(016114eb "L") ret=732a4e91
00c8:Ret  user32.CharNextA() retval=016114ec ret=732a4e91
00c8:Call KERNEL32.lstrcpynA(0031f124,016114f8 "c:\\Program Files\\GrupoEducare\\Bookmaker",00000104) ret=732b93c7
00c8:Ret  KERNEL32.lstrcpynA() retval=0031f124 ret=732b93c7
00c8:Call KERNEL32.lstrlenA(016114f8 "c:\\Program Files\\GrupoEducare\\Bookmaker") ret=732b93d2
00c8:Call ntdll.strlen(016114f8 "c:\\Program Files\\GrupoEducare\\Bookmaker") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000027 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000027 ret=732b93d2
00c8:Call ntdll.RtlReAllocateHeap(01610000,00000000,0161f0e0,00000028) ret=732a4c53
00c8:Ret  ntdll.RtlReAllocateHeap() retval=0161f120 ret=732a4c53
00c8:Call KERNEL32.lstrlenA(0031f124 "c:\\Program Files\\GrupoEducare\\Bookmaker") ret=732b93ea
00c8:Call ntdll.strlen(0031f124 "c:\\Program Files\\GrupoEducare\\Bookmaker") ret=7b05e921
00c8:Ret  ntdll.strlen() retval=00000027 ret=7b05e921
00c8:Ret  KERNEL32.lstrlenA() retval=00000027 ret=732b93ea
00c8:Call ntdll.RtlReAllocateHeap(01610000,00000000,0161f100,00000028) ret=732a4c53
00c8:Ret  ntdll.RtlReAllocateHeap() retval=0161f150 ret=732a4c53
00c8:Call KERNEL32.lstrcpyA(0161f120,0031f124 "c:\\Program Files\\GrupoEducare\\Bookmaker") ret=732b9418
Line 553891 to 554020

Code: Select all

0044:Call winex11.drv.MsgWaitForMultipleObjectsEx(00000000,00000000,00000000,000004ff,00000000) ret=7e6d3767
00c8:Call KERNEL32.HeapFree(01610000,00000000,016105e0) ret=732b7f24
00c8:Ret  KERNEL32.HeapFree() retval=00000001 ret=732b7f24
00c8:Call KERNEL32.HeapFree(01610000,00000000,016104d0) ret=732b7f57
0044:Ret  winex11.drv.MsgWaitForMultipleObjectsEx() retval=00000102 ret=7e6d3767
00c8:Ret  KERNEL32.HeapFree() retval=00000001 ret=732b7f57
0044:Ret  user32.PeekMessageW() retval=00000000 ret=0040aed0
00c8:Call KERNEL32.ExitProcess(00000000) ret=732a7bd1
0044:Call user32.MsgWaitForMultipleObjectsEx(00000001,0069f2a4,ffffffff,000004ff,00000000) ret=0040ae78
00c8:Call PE DLL (proc=7E497890,module=7E450000 L"winex11.drv",reason=PROCESS_DETACH,res=00000001)
0044:Call winex11.drv.MsgWaitForMultipleObjectsEx(00000002,0069efcc,ffffffff,000004ff,00000000) ret=7e6d3767
00c8:Ret  PE DLL (proc=7E497890,module=7E450000 L"winex11.drv",reason=PROCESS_DETACH,res=00000001) retval=1
00c8:Call PE DLL (proc=732FB192,module=732A0000 L"MSVBVM60.DLL",reason=PROCESS_DETACH,res=00000001)
00c8:Call KERNEL32.TlsFree(00000007) ret=732b7f81
0044:Call ntdll.NtWaitForMultipleObjects(00000002,0069ecc0,00000001,00000000,00000000) ret=7b062d76
00c8:Call ntdll.RtlAcquirePebLock() ret=7b0680e8
00c8:Ret  ntdll.RtlAcquirePebLock() retval=00000000 ret=7b0680e8
00c8:Call ntdll.RtlAreBitsSet(7bc8e570,00000007,00000001) ret=7b068153
00c8:Ret  ntdll.RtlAreBitsSet() retval=00000001 ret=7b068153
00c8:Call ntdll.RtlClearBits(7bc8e570,00000007,00000001) ret=7b06817c
00c8:Ret  ntdll.RtlClearBits() retval=00000080 ret=7b06817c
00c8:Call ntdll.NtSetInformationThread(fffffffe,0000000a,0031f8a0,00000004) ret=7b0681a4
00c8:Ret  ntdll.NtSetInformationThread() retval=00000000 ret=7b0681a4
00c8:Call ntdll.RtlReleasePebLock() ret=7b068135
00c8:Ret  ntdll.RtlReleasePebLock() retval=00000000 ret=7b068135
00c8:Ret  KERNEL32.TlsFree() retval=00000001 ret=732b7f81
00c8:Call KERNEL32.HeapDestroy(01610000) ret=732b7fb9
00c8:Ret  KERNEL32.HeapDestroy() retval=00000001 ret=732b7fb9
00c8:Call ntdll.RtlDeleteCriticalSection(733b6f24) ret=732bb9f7
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732bb9f7
00c8:Call ntdll.RtlDeleteCriticalSection(733b6ea4) ret=732b80be
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b80be
00c8:Call ntdll.RtlDeleteCriticalSection(733b43b4) ret=732b80db
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b80db
00c8:Call ntdll.RtlDeleteCriticalSection(733b6e84) ret=732b80f8
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b80f8
00c8:Call ntdll.RtlDeleteCriticalSection(733b4108) ret=732b8124
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8124
00c8:Call KERNEL32.CloseHandle(00000058) ret=732b8197
00c8:Call KERNEL32.GetLastError() ret=00375b8f
00c8:Ret  KERNEL32.GetLastError() retval=00000000 ret=00375b8f
00c8:Call ntdll.NtClose(00000058) ret=7b048413
00c8:Ret  ntdll.NtClose() retval=00000000 ret=7b048413
00c8:Ret  KERNEL32.CloseHandle() retval=00000001 ret=732b8197
00c8:Call KERNEL32.CloseHandle(0000005c) ret=732b819c
00c8:Call KERNEL32.GetLastError() ret=00375b8f
00c8:Ret  KERNEL32.GetLastError() retval=00000000 ret=00375b8f
00c8:Call ntdll.NtClose(0000005c) ret=7b048413
00c8:Ret  ntdll.NtClose() retval=00000000 ret=7b048413
00c8:Ret  KERNEL32.CloseHandle() retval=00000001 ret=732b819c
00c8:Call ntdll.RtlDeleteCriticalSection(733b40e0) ret=732b81b4
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b81b4
00c8:Call ntdll.RtlDeleteCriticalSection(733b40bc) ret=732b81c1
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b81c1
00c8:Call ntdll.RtlDeleteCriticalSection(733b4094) ret=732b8141
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8141
00c8:Call ntdll.RtlDeleteCriticalSection(733b4074) ret=732b8150
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8150
00c8:Call ntdll.RtlDeleteCriticalSection(733b4054) ret=732b815d
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b815d
00c8:Call ntdll.RtlDeleteCriticalSection(733b4034) ret=732b816a
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b816a
00c8:Call ntdll.RtlInitializeCriticalSection(01211180) ret=732a1d3d
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=732a1d3d
00c8:Call ntdll.RtlInitializeCriticalSection(012111a0) ret=732a1d3d
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=732a1d3d
00c8:Call ntdll.RtlInitializeCriticalSection(012111c0) ret=732a1d3d
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=732a1d3d
00c8:Call ntdll.RtlInitializeCriticalSection(012111e0) ret=732a1d3d
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=732a1d3d
00c8:Call KERNEL32.HeapFree(01100000,00000000,011015c8) ret=732a54a9
00c8:Ret  KERNEL32.HeapFree() retval=00000001 ret=732a54a9
00c8:Call ntdll.RtlDeleteCriticalSection(01211180) ret=732b8492
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8492
00c8:Call ntdll.RtlDeleteCriticalSection(01210180) ret=732b8492
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8492
00c8:Call ntdll.RtlDeleteCriticalSection(012111a0) ret=732b8492
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8492
00c8:Call ntdll.RtlDeleteCriticalSection(012111c0) ret=732b8492
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8492
00c8:Call ntdll.RtlDeleteCriticalSection(012111e0) ret=732b8492
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8492
00c8:Call ntdll.RtlDeleteCriticalSection(733b4380) ret=732b8452
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8452
00c8:Call ntdll.RtlDeleteCriticalSection(733b4398) ret=732b845b
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b845b
00c8:Call ntdll.RtlDeleteCriticalSection(733b4368) ret=732b8463
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b8463
00c8:Call ntdll.RtlDeleteCriticalSection(733b4350) ret=732b846c
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=732b846c
00c8:Call KERNEL32.TlsFree(00000005) ret=732b8420
00c8:Call ntdll.RtlAcquirePebLock() ret=7b0680e8
00c8:Ret  ntdll.RtlAcquirePebLock() retval=00000000 ret=7b0680e8
00c8:Call ntdll.RtlAreBitsSet(7bc8e570,00000005,00000001) ret=7b068153
00c8:Ret  ntdll.RtlAreBitsSet() retval=00000001 ret=7b068153
00c8:Call ntdll.RtlClearBits(7bc8e570,00000005,00000001) ret=7b06817c
00c8:Ret  ntdll.RtlClearBits() retval=00000020 ret=7b06817c
00c8:Call ntdll.NtSetInformationThread(fffffffe,0000000a,0031f8b0,00000004) ret=7b0681a4
00c8:Ret  ntdll.NtSetInformationThread() retval=00000000 ret=7b0681a4
00c8:Call ntdll.RtlReleasePebLock() ret=7b068135
00c8:Ret  ntdll.RtlReleasePebLock() retval=00000000 ret=7b068135
00c8:Ret  KERNEL32.TlsFree() retval=00000001 ret=732b8420
00c8:Call KERNEL32.VirtualFree(01210000,00000000,00008000) ret=732b84fa
00c8:Call ntdll.NtFreeVirtualMemory(ffffffff,0031f884,0031f888,00008000) ret=7b036d9f
00c8:Ret  ntdll.NtFreeVirtualMemory() retval=00000000 ret=7b036d9f
00c8:Ret  KERNEL32.VirtualFree() retval=00000001 ret=732b84fa
00c8:Call KERNEL32.HeapDestroy(01100000) ret=732b8510
00c8:Ret  KERNEL32.HeapDestroy() retval=00000001 ret=732b8510
00c8:Ret  PE DLL (proc=732FB192,module=732A0000 L"MSVBVM60.DLL",reason=PROCESS_DETACH,res=00000001) retval=1
00c8:Call PE DLL (proc=639E4500,module=639C0000 L"winmm.dll",reason=PROCESS_DETACH,res=00000001)
00c8:Ret  PE DLL (proc=639E4500,module=639C0000 L"winmm.dll",reason=PROCESS_DETACH,res=00000001) retval=1
00c8:Call PE DLL (proc=61F05600,module=61F00000 L"sxs.dll",reason=PROCESS_DETACH,res=00000001)
00c8:Ret  PE DLL (proc=61F05600,module=61F00000 L"sxs.dll",reason=PROCESS_DETACH,res=00000001) retval=1
00c8:Call PE DLL (proc=6A3A0A20,module=6A300000 L"oleaut32.dll",reason=PROCESS_DETACH,res=00000001)
00c8:Ret  PE DLL (proc=6A3A0A20,module=6A300000 L"oleaut32.dll",reason=PROCESS_DETACH,res=00000001) retval=1
00c8:Call PE DLL (proc=7E548B20,module=7E510000 L"MSVCRT.dll",reason=PROCESS_DETACH,res=00000001)
00c8:Call ntdll.RtlInitializeCriticalSection(7e5bfc14) ret=7e54892c
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=7e54892c
00c8:Call ntdll.RtlInitializeCriticalSection(7e5bfc30) ret=7e54892c
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=7e54892c
00c8:Call ntdll.RtlInitializeCriticalSection(7e5bfc4c) ret=7e54892c
00c8:Ret  ntdll.RtlInitializeCriticalSection() retval=00000000 ret=7e54892c
00c8:Call ntdll.RtlDeleteCriticalSection(00bf0c2c) ret=7e53e653
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=7e53e653
00c8:Call ntdll.RtlDeleteCriticalSection(00bf0c50) ret=7e53e653
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=7e53e653
00c8:Call ntdll.RtlDeleteCriticalSection(00bf0c74) ret=7e53e653
00c8:Ret  ntdll.RtlDeleteCriticalSection() retval=00000000 ret=7e53e653
00c8:Call KERNEL32.HeapFree(00bf0000,00000000,00bf0c20) ret=7e543b40
00c8:Ret  KERNEL32.HeapFree() retval=00000001 ret=7e543b40

User avatar
DarkShadow44
Level 8
Level 8
Posts: 1108
Joined: Tue Nov 22, 2016 5:39 pm

Re: Problem with MSVBVM60.DLL

Post by DarkShadow44 » Fri Aug 28, 2020 4:40 pm

Please just compress the log and upload it.

josejulio
Level 1
Level 1
Posts: 6
Joined: Wed Aug 26, 2020 4:26 pm

Re: Problem with MSVBVM60.DLL

Post by josejulio » Fri Aug 28, 2020 4:52 pm

Sure, I just uploaded it here:

https://gofile.io/d/F81Gco

Thanks!

User avatar
DarkShadow44
Level 8
Level 8
Posts: 1108
Joined: Tue Nov 22, 2016 5:39 pm

Re: Problem with MSVBVM60.DLL

Post by DarkShadow44 » Fri Aug 28, 2020 5:18 pm

Hm, don't see anything interesting. It seems to be able to load MSVBVM60 just fine...
Is there a way to get the program for testing? I tried making an account, but it's unusable when you're not a teacher.

jkfloris
Level 8
Level 8
Posts: 1132
Joined: Thu Aug 14, 2014 10:10 am

Re: Problem with MSVBVM60.DLL

Post by jkfloris » Sun Aug 30, 2020 11:50 am

DarkShadow44 wrote:
Fri Aug 28, 2020 5:18 pm
Hm, don't see anything interesting. It seems to be able to load MSVBVM60 just fine...
Is there a way to get the program for testing? I tried making an account, but it's unusable when you're not a teacher.
You can download the program here: https://bookmaker.programas-gratis.net

User avatar
DarkShadow44
Level 8
Level 8
Posts: 1108
Joined: Tue Nov 22, 2016 5:39 pm

Re: Problem with MSVBVM60.DLL

Post by DarkShadow44 » Sun Aug 30, 2020 1:20 pm

That seems to work just fine for me.

jkfloris
Level 8
Level 8
Posts: 1132
Joined: Thu Aug 14, 2014 10:10 am

Re: Problem with MSVBVM60.DLL

Post by jkfloris » Mon Aug 31, 2020 12:52 am

I can confirm that the program now works with Wine 5.16

josejulio
Level 1
Level 1
Posts: 6
Joined: Wed Aug 26, 2020 4:26 pm

Re: Problem with MSVBVM60.DLL

Post by josejulio » Mon Aug 31, 2020 2:49 pm

I was trying with an older version (Wine 5.15 stagging). I just downloaded Wine5.16 (stagging) and it works well for me.

Thanks a lot!

Post Reply