EDI is Electronic data interchange, a decades old set of standards and methods, and EDIdEv software such as the subject exe seems to be in use in several windows applications.
I have a backtrace that (if I'm reading it correctly) seems to show the subject exe calling an unimplemented function sfc.dll.SfcGetNextProtectedFile.
Code: Select all
Unhandled exception: unimplemented function sfc.dll.SfcGetNextProtectedFile called in 32-bit code (0x7b83af6c).
Register dump:
CS:0023 SS:002b DS:002b ES:002b FS:0063 GS:006b
EIP:7b83af6c ESP:0033f6e4 EBP:0033f768 EFLAGS:00000216( - -- I -A-P- )
EAX:7b827b19 EBX:7b8b8000 ECX:0033f710 EDX:0033f794
ESI:00000004 EDI:7e076b88
Stack dump:
0x0033f6e4: 7e07917c 7e070000 00000000 00000000
0x0033f6f4: 7bc55d36 0033f720 80000100 00000001
0x0033f704: 00000000 7b83af6c 00000002 7e076b88
0x0033f714: 7e076b90 0033f748 7bc57982 7bcd0fc0
0x0033f724: 00489ef8 ffffffff 00110510 2d303030
0x0033f734: 00000000 0033f790 0033f794 00489ef8
000c: sel=0067 base=00000000 limit=00000000 16-bit r--
Backtrace:
=>0 0x7b83af6c in kernel32 (+0x2af6c) (0x0033f768)
1 0x7e076b6f in sfc (+0x6b6e) (0x0033f7a8)
2 0x7e0767f1 in sfc (+0x67f0) (0x00000000)
0x7b83af6c: addl $12,%esp
Modules:
Module Address Debug info Name (68 modules)
PE 400000- 1788000 Export edidev_fredi_runtime
...
0000005f spoolsv.exe
00000049 0
00000039 0
0000005e 0
00000054 cmd.exe
00000053 0
0000006a (D) C:\users\lin\Temp\{C4CC1AE7-2A46-4D42-857D-46E7FBE4B2F6}\Fredi\Edidev_FREDI_Runtime.exe
00000069 0 <==
System information:
Wine build: wine-1.7.43
Platform: i386
Host system: Linux
Host version: 4.0.4-2-ARCH
I've encountered some other exe's that make the same function call. For example, I found this bug.
Before I file a bug, I just wanted to post here to see if anyone has any additional information about either Edidev_FREDI_Runtime.exe or sfc.dll.SfcGetNextProtectedFile, or if anyone has suggestions on further troubleshooting.
Thanks.