吾爱破解 - 52pojie.cn

 找回密码
 注册[Register]

QQ登录

只需一步,快速开始

查看: 1422|回复: 8
收起左侧

[求助] 给VMWare做器官切除手术失败!

[复制链接]
冥界3大法王 发表于 2023-9-10 09:05
如图所示:
image.png
这破东西总出来!需要手术切除!

image.png

你会发现,根本就断不下来啊。
[Asm] 纯文本查看 复制代码
6CEBC870 <vmware | 68 08AE746D              | push vmwarecui.6D74AE08                  | 6D74AE08:"@&!*@*@(button.cui.toolsInfoBar.btnLblInstall)Install Tools"


BC70

6CEBC8B0 <vmware | 68 80AE746D              | push vmwarecui.6D74AE80                  | 6D74AE80:"@&!*@*@(button.cui.toolsInfoBar.btnLblLater)Remind Me Later"
BCB0

==================================
0083F560         | 68 B0958F00              | push vmware.8F95B0                       | 8F95B0:"@&!*@*@(msg.vmui.collectSupportData.toolsServiceState)VMware Tools"

AE960
=======================================
0083F410 <vmware | 55                       | push ebp                                 |
0083F411         | 8BEC                     | mov ebp,esp                              |
0083F413         | 6A FF                    | push FFFFFFFF                            |
0083F415         | 68 3BBD8C00              | push <vmware.sub_8CBD3B>                 |
0083F41A         | 64:A1 00000000           | mov eax,dword ptr fs:[0]                 | 00000000:L"﹤o"
0083F420         | 50                       | push eax                                 |
0083F421         | 83EC 68                  | sub esp,68                               |
0083F424         | A1 E4EA9500              | mov eax,dword ptr ds:[95EAE4]            |
0083F429         | 33C5                     | xor eax,ebp                              |
0083F42B         | 8945 F0                  | mov dword ptr ss:[ebp-10],eax            |
0083F42E         | 53                       | push ebx                                 | ebx:&"@鼂"
0083F42F         | 56                       | push esi                                 |
0083F430         | 57                       | push edi                                 | edi:"8崗"
0083F431         | 50                       | push eax                                 |
0083F432         | 8D45 F4                  | lea eax,dword ptr ss:[ebp-C]             |
0083F435         | 64:A3 00000000           | mov dword ptr fs:[0],eax                 | 00000000:L"﹤o"
0083F43B         | 8BF1                     | mov esi,ecx                              |
0083F43D         | 8975 B0                  | mov dword ptr ss:[ebp-50],esi            |
0083F440         | FFB6 4C020000            | push dword ptr ds:[esi+24C]              | esi+24C:L"倀J捀瘮Ho筴眍倀J順褙"
0083F446         | 8D9E 4C020000            | lea ebx,dword ptr ds:[esi+24C]           | ebx:&"@鼂", esi+24C:L"倀J捀瘮Ho筴眍倀J順褙"
0083F44C         | FF15 64F48D00            | call dword ptr ds:[<&IsWindow>]          |
0083F452         | 85C0                     | test eax,eax                             |
0083F454         | 0F84 36020000            | je vmware.83F690                         | 是不是这里?
0083F45A         | 6A 01                    | push 1                                   |
0083F45C         | FF76 04                  | push dword ptr ds:[esi+4]                |
0083F45F         | E8 5C97F6FF              | call <vmware.sub_7A8BC0>                 |
0083F464         | 50                       | push eax                                 |
0083F465         | FF15 9C0F8E00            | call dword ptr ds:[<&?GetImageList@NodeI |
0083F46B         | 83C4 08                  | add esp,8                                |
0083F46E         | 8BCB                     | mov ecx,ebx                              | ebx:&"@鼂"
0083F470         | 50                       | push eax                                 |
0083F471         | 8D45 AC                  | lea eax,dword ptr ss:[ebp-54]            |
0083F474         | 50                       | push eax                                 |
0083F475         | FF15 880B8E00            | call dword ptr ds:[<&?SetImageList@?$CLi |
0083F47B         | 6A F0                    | push FFFFFFF0                            |
0083F47D         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F47F         | FF15 20F58D00            | call dword ptr ds:[<&GetWindowLongW>]    |
0083F485         | 8BC8                     | mov ecx,eax                              |
0083F487         | 83C9 40                  | or ecx,40                                |
0083F48A         | 3BC1                     | cmp eax,ecx                              |
0083F48C         | 74 0B                    | je vmware.83F499                         |
0083F48E         | 51                       | push ecx                                 |
0083F48F         | 6A F0                    | push FFFFFFF0                            |
0083F491         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F493         | FF15 24F58D00            | call dword ptr ds:[<&SetWindowLongW>]    |
0083F499         | 68 24C00000              | push C024                                |
0083F49E         | 68 24C00000              | push C024                                |
0083F4A3         | 68 36100000              | push 1036                                |
0083F4A8         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F4AA         | FF15 40F48D00            | call dword ptr ds:[<&SendMessageW>]      |
0083F4B0         | 8D45 E0                  | lea eax,dword ptr ss:[ebp-20]            | [ebp-20]:"8崗"
0083F4B3         | 0F57C0                   | xorps xmm0,xmm0                          |
0083F4B6         | 50                       | push eax                                 |
0083F4B7         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F4B9         | 0F1145 E0                | movups xmmword ptr ss:[ebp-20],xmm0      |
0083F4BD         | FF15 F8F48D00            | call dword ptr ds:[<&GetClientRect>]     |
0083F4C3         | 8B7D E8                  | mov edi,dword ptr ss:[ebp-18]            |
0083F4C6         | 8D45 8C                  | lea eax,dword ptr ss:[ebp-74]            |
0083F4C9         | 2B7D E0                  | sub edi,dword ptr ss:[ebp-20]            | [ebp-20]:"8崗"
0083F4CC         | 68 74958F00              | push vmware.8F9574                       | 8F9574:"@&!*@*@(msg.vmui.collectSupportData.vmName)Virtual Machine"
0083F4D1         | 50                       | push eax                                 |
0083F4D2         | FF15 48FA8D00            | call dword ptr ds:[<&?GetLocalString[url=home.php?mod=space&uid=763140]@Cui[/url] |
0083F4D8         | 83C4 08                  | add esp,8                                |
0083F4DB         | 8BF0                     | mov esi,eax                              |
0083F4DD         | C745 FC 00000000         | mov dword ptr ss:[ebp-4],0               |
0083F4E4         | 8D0CBD 00000000          | lea ecx,dword ptr ds:[edi*4]             |
0083F4EB         | B8 67666666              | mov eax,66666667                         |
0083F4F0         | C745 C4 00000000         | mov dword ptr ss:[ebp-3C],0              |
0083F4F7         | F7E9                     | imul ecx                                 |
0083F4F9         | 0F57C0                   | xorps xmm0,xmm0                          |
0083F4FC         | 66:0F1345 CC             | movlpd qword ptr ss:[ebp-34],xmm0        |
0083F501         | 66:0F1345 D4             | movlpd qword ptr ss:[ebp-2C],xmm0        |
0083F506         | 8BCE                     | mov ecx,esi                              |
0083F508         | C745 DC 00000000         | mov dword ptr ss:[ebp-24],0              | [ebp-24]:&"@鼂"
0083F50F         | C1FA 02                  | sar edx,2                                |
0083F512         | 8BC2                     | mov eax,edx                              |
0083F514         | C745 B4 0F000000         | mov dword ptr ss:[ebp-4C],F              | [ebp-4C]:"8崗"
0083F51B         | C1E8 1F                  | shr eax,1F                               |
0083F51E         | 03C2                     | add eax,edx                              |
0083F520         | C745 B8 00000000         | mov dword ptr ss:[ebp-48],0              | [ebp-48]:&"@鼂"
0083F527         | 8945 BC                  | mov dword ptr ss:[ebp-44],eax            | [ebp-44]:&"@鼂"
0083F52A         | C745 C8 00000000         | mov dword ptr ss:[ebp-38],0              |
0083F531         | FF15 88038E00            | call dword ptr ds:[<&?GetUtf16Cache@stri |
0083F537         | 8945 C0                  | mov dword ptr ss:[ebp-40],eax            |
0083F53A         | 8D45 B4                  | lea eax,dword ptr ss:[ebp-4C]            | [ebp-4C]:"8崗"
0083F53D         | 50                       | push eax                                 |
0083F53E         | 6A 00                    | push 0                                   |
0083F540         | 68 61100000              | push 1061                                |
0083F545         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F547         | FF15 40F48D00            | call dword ptr ds:[<&SendMessageW>]      |
0083F54D         | C745 FC FFFFFFFF         | mov dword ptr ss:[ebp-4],FFFFFFFF        |
0083F554         | 8D4D 8C                  | lea ecx,dword ptr ss:[ebp-74]            |
0083F557         | FF15 94038E00            | call dword ptr ds:[<&??1string@utf@@QAE@ |
0083F55D         | 8D45 8C                  | lea eax,dword ptr ss:[ebp-74]            |
0083F560         | 68 B0958F00              | push vmware.8F95B0                       | 8F95B0:"@&!*@*@(msg.vmui.collectSupportData.toolsServiceState)VMware Tools"
0083F565         | 50                       | push eax                                 |
0083F566         | FF15 48FA8D00            | call dword ptr ds:[<&?GetLocalString@cui |
0083F56C         | 83C4 08                  | add esp,8                                |
0083F56F         | 8BF0                     | mov esi,eax                              |
0083F571         | C745 FC 01000000         | mov dword ptr ss:[ebp-4],1               |
0083F578         | 8D0C3F                   | lea ecx,dword ptr ds:[edi+edi]           |
0083F57B         | B8 67666666              | mov eax,66666667                         |
0083F580         | C745 C4 00000000         | mov dword ptr ss:[ebp-3C],0              |
0083F587         | F7E9                     | imul ecx                                 |
0083F589         | 0F57C0                   | xorps xmm0,xmm0                          |
0083F58C         | 66:0F1345 CC             | movlpd qword ptr ss:[ebp-34],xmm0        |
0083F591         | 66:0F1345 D4             | movlpd qword ptr ss:[ebp-2C],xmm0        |
0083F596         | 8BCE                     | mov ecx,esi                              |
0083F598         | C745 DC 00000000         | mov dword ptr ss:[ebp-24],0              | [ebp-24]:&"@鼂"
0083F59F         | C1FA 02                  | sar edx,2                                |
0083F5A2         | 8BC2                     | mov eax,edx                              |
0083F5A4         | C745 B4 0F000000         | mov dword ptr ss:[ebp-4C],F              | [ebp-4C]:"8崗"
0083F5AB         | C1E8 1F                  | shr eax,1F                               |
0083F5AE         | 03C2                     | add eax,edx                              |
0083F5B0         | C745 B8 00000000         | mov dword ptr ss:[ebp-48],0              | [ebp-48]:&"@鼂"
0083F5B7         | 8945 BC                  | mov dword ptr ss:[ebp-44],eax            | [ebp-44]:&"@鼂"
0083F5BA         | C745 C8 01000000         | mov dword ptr ss:[ebp-38],1              |
0083F5C1         | FF15 88038E00            | call dword ptr ds:[<&?GetUtf16Cache@stri |
0083F5C7         | 8945 C0                  | mov dword ptr ss:[ebp-40],eax            |
0083F5CA         | 8D45 B4                  | lea eax,dword ptr ss:[ebp-4C]            | [ebp-4C]:"8崗"
0083F5CD         | 50                       | push eax                                 |
0083F5CE         | 6A 01                    | push 1                                   |
0083F5D0         | 68 61100000              | push 1061                                |
0083F5D5         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F5D7         | FF15 40F48D00            | call dword ptr ds:[<&SendMessageW>]      |
0083F5DD         | C745 FC FFFFFFFF         | mov dword ptr ss:[ebp-4],FFFFFFFF        |
0083F5E4         | 8D4D 8C                  | lea ecx,dword ptr ss:[ebp-74]            |
0083F5E7         | FF15 94038E00            | call dword ptr ds:[<&??1string@utf@@QAE@ |
0083F5ED         | 8D45 8C                  | lea eax,dword ptr ss:[ebp-74]            |
0083F5F0         | 68 F4958F00              | push vmware.8F95F4                       | 8F95F4:"@&!*@*@(msg.vmui.collectSupportData.vmFileName)Location"
0083F5F5         | 50                       | push eax                                 |
0083F5F6         | FF15 48FA8D00            | call dword ptr ds:[<&?GetLocalString@cui |
0083F5FC         | 83C4 08                  | add esp,8                                |
0083F5FF         | 8BF0                     | mov esi,eax                              |
0083F601         | C745 FC 02000000         | mov dword ptr ss:[ebp-4],2               |
0083F608         | 8D0C7F                   | lea ecx,dword ptr ds:[edi+edi*2]         |
0083F60B         | B8 67666666              | mov eax,66666667                         |
0083F610         | C745 C4 00000000         | mov dword ptr ss:[ebp-3C],0              |
0083F617         | F7E9                     | imul ecx                                 |
0083F619         | 0F57C0                   | xorps xmm0,xmm0                          |
0083F61C         | 66:0F1345 CC             | movlpd qword ptr ss:[ebp-34],xmm0        |
0083F621         | 66:0F1345 D4             | movlpd qword ptr ss:[ebp-2C],xmm0        |
0083F626         | 8BCE                     | mov ecx,esi                              |
0083F628         | C745 DC 00000000         | mov dword ptr ss:[ebp-24],0              | [ebp-24]:&"@鼂"
0083F62F         | C1FA 02                  | sar edx,2                                |
0083F632         | 8BC2                     | mov eax,edx                              |
0083F634         | C745 B4 0F000000         | mov dword ptr ss:[ebp-4C],F              | [ebp-4C]:"8崗"
0083F63B         | C1E8 1F                  | shr eax,1F                               |
0083F63E         | 03C2                     | add eax,edx                              |
0083F640         | C745 B8 00000000         | mov dword ptr ss:[ebp-48],0              | [ebp-48]:&"@鼂"
0083F647         | 8945 BC                  | mov dword ptr ss:[ebp-44],eax            | [ebp-44]:&"@鼂"
0083F64A         | C745 C8 02000000         | mov dword ptr ss:[ebp-38],2              |
0083F651         | FF15 88038E00            | call dword ptr ds:[<&?GetUtf16Cache@stri |
0083F657         | 8945 C0                  | mov dword ptr ss:[ebp-40],eax            |
0083F65A         | 8D45 B4                  | lea eax,dword ptr ss:[ebp-4C]            | [ebp-4C]:"8崗"
0083F65D         | 50                       | push eax                                 |
0083F65E         | 6A 02                    | push 2                                   |
0083F660         | 68 61100000              | push 1061                                |
0083F665         | FF33                     | push dword ptr ds:[ebx]                  | [ebx]:"@鼂"
0083F667         | FF15 40F48D00            | call dword ptr ds:[<&SendMessageW>]      |
0083F66D         | C745 FC FFFFFFFF         | mov dword ptr ss:[ebp-4],FFFFFFFF        |
0083F674         | 8D4D 8C                  | lea ecx,dword ptr ss:[ebp-74]            |
0083F677         | FF15 94038E00            | call dword ptr ds:[<&??1string@utf@@QAE@ |
0083F67D         | 8B4D B0                  | mov ecx,dword ptr ss:[ebp-50]            |
0083F680         | 6A 01                    | push 1                                   |
0083F682         | 6A 02                    | push 2                                   |
0083F684         | 81C1 48020000            | add ecx,248                              |
0083F68A         | FF15 A40B8E00            | call dword ptr ds:[<&?SetAutoSizeColumn@ |
0083F690         | 8B4D F4                  | mov ecx,dword ptr ss:[ebp-C]             |
0083F693         | 64:890D 00000000         | mov dword ptr fs:[0],ecx                 | 00000000:L"﹤o"
0083F69A         | 59                       | pop ecx                                  |
0083F69B         | 5F                       | pop edi                                  | edi:"8崗"
0083F69C         | 5E                       | pop esi                                  |
0083F69D         | 5B                       | pop ebx                                  | ebx:&"@鼂"
0083F69E         | 8B4D F0                  | mov ecx,dword ptr ss:[ebp-10]            |
0083F6A1         | 33CD                     | xor ecx,ebp                              |
0083F6A3         | E8 08380600              | call vmware.8A2EB0                       |
0083F6A8         | 8BE5                     | mov esp,ebp                              |
0083F6AA         | 5D                       | pop ebp                                  |
0083F6AB         | C3                       | ret                                      |

免费评分

参与人数 1热心值 +1 收起 理由
ysjd22 + 1 以后都叫肿瘤手术

查看全部评分

发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。

 楼主| 冥界3大法王 发表于 2023-9-10 10:18

不认真回答,举报垃圾。
luliucheng 发表于 2023-9-10 10:39
这明显不对吧,窗口里的按钮是“以后提醒我”,但你断的是“不再提醒”,这肯定断不下来啊。
newyun 发表于 2023-9-10 10:40
https://newyun.lanzoue.com/iVVAA17w2g6f 来给你个vmtool12.2.0
apull 发表于 2023-9-10 10:46
不是有个不再提醒的按钮么
头像被屏蔽
jvmmqqll 发表于 2023-9-10 11:55
提示: 该帖被管理员或版主屏蔽
jimmyxing001 发表于 2023-9-10 13:49
确实是这样,切除最好,可是不知道咋弄,大神继续
smile1110 发表于 2023-9-10 14:44
你可以从工具箱里拿出来眼罩,把自己眼睛蒙上,这样子就看不到它了
月清晖 发表于 2023-9-11 08:31
不得先修改字符串确认下是不是这里?
您需要登录后才可以回帖 登录 | 注册[Register]

本版积分规则

返回列表

RSS订阅|小黑屋|处罚记录|联系我们|吾爱破解 - LCG - LSG ( 京ICP备16042023号 | 京公网安备 11010502030087号 )

GMT+8, 2024-11-22 07:59

Powered by Discuz!

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表