解除安裝精靈V3.2破解的簡要分析!
軟體大小:
674 KB
軟體語言: 簡體中文
軟體類別: 國產軟體 / 共享版 / 解除安裝清除
應用平臺: Win9x/NT/2000/XP
加入時間:
2003-01-18 16:24:14
下載次數: 31495
軟體下載: http://count.skycn.com/softdown.php?id=4502&url=http://on165-http.skycn.net/down/clean32.exe
破解工具:TRW1.22
軟體說明:您的電腦裡面有很多軟體、遊戲無法解除安裝?已經厭倦了WINDOWS控制皮膚那個功能很弱的“新增/刪除程式”了嗎?解除安裝精靈的智慧解除安裝功能可以乾淨徹底地解除安裝軟體,包括那些無法正常解除安裝的程式它都可以幫您解除安裝。2.0版新增加了清除垃圾檔案的功能。2.1版的智慧解除安裝更強大,可以解除安裝桌面快捷方式及選單。這個軟體特別適合網咖做系統維護,清除系統中的垃圾軟體,最佳化系統的執行速度。它操作方便,介面友好,安全可靠。修正了不能自動重新整理和其他一些BUG。3.0以上版本增加了IE瀏覽器修復功能。這個軟體特別適合網咖做系統維護,清除系統中的垃圾軟體,最佳化系統的執行速度。它操作方便,介面友好,安全可靠。
又碰上了VB程式!無殼!這個程式的下斷有點麻煩,因為下BPX
HMEMCPY或BPX __VBASTRCOMP或BPX GETWINDOWTEXTA時,滑鼠一動程式就被中斷了,跟了半天也難跟到關鍵程式碼,索性用S搜尋大法,注意檢視各暫存器的值,抓得以下程式碼:
0167:0040C724
CALL `MSVBVM60!__vbaHresultCheckObj`
0167:0040C72A MOV
EDX,[EBP-24]
0167:0040C72D LEA ECX,[EBP-1C]
0167:0040C730
MOV [EBP-24],EBX
0167:0040C733 CALL
`MSVBVM60!__vbaStrMove`
0167:0040C739 LEA ECX,[EBP-2C]
0167:0040C73C
CALL `MSVBVM60!__vbaFreeObj`
0167:0040C742 LEA
ECX,[EBP-1C] <---[EBP-1C]中為我們輸入的註冊碼
0167:0040C745
PUSH ECX
0167:0040C746 CALL 0040B9C0
<---關鍵的比對Call,跟進
0167:0040C74B TEST
AX,AX <---標誌位判斷
0167:0040C74E
JZ NEAR 0040C8E6 <---跳則Game Over!
0167:0040C754 MOV ESI,[0040111C]
0167:0040C75A
LEA EDX,[EBP-18]
0167:0040C75D PUSH
EDX
0167:0040C75E PUSH DWORD 000F003F
0167:0040C763
PUSH EBX
0167:0040C764 LEA EAX,[EBP-24]
0167:0040C767
PUSH DWORD 00404384
0167:0040C76C PUSH
EAX
0167:0040C76D CALL ESI
0167:0040C76F PUSH
EAX
0167:0040C770 PUSH DWORD 80000002
0167:0040C775
CALL 00403D38
0167:0040C77A MOV EBX,[00401038]
0167:0040C780
CALL EBX
0167:0040C782 LEA ECX,[EBP-24]
0167:0040C785
CALL `MSVBVM60!__vbaFreeStr`
0167:0040C78B MOV
ECX,[EBP-1C]
0167:0040C78E PUSH ECX
......(略去)
0167:0040C941
PUSH ECX
0167:0040C942 PUSH EDX
0167:0040C943
LEA EAX,[EBP-3C]
0167:0040C946 PUSH
EBX
0167:0040C947 PUSH EAX
0167:0040C948 CALL
`MSVBVM60!rtcMsgBox` <---出錯對話方塊
0167:0040C94E LEA
ECX,[EBP-6C]
0167:0040C951 LEA EDX,[EBP-5C]
0167:0040C954
PUSH ECX
0167:0040C955 LEA EAX,[EBP-4C]
0167:0040C958
PUSH EDX
0167:0040C959 LEA ECX,[EBP-3C]
0167:0040C95C
PUSH EAX
0167:0040C95D PUSH ECX
跟進上面的那個關鍵Call,看到如下程式碼:
0167:0040B9C0
PUSH EBP
0167:0040B9C1 MOV EBP,ESP
0167:0040B9C3
SUB ESP,BYTE +08
0167:0040B9C6 PUSH
DWORD 004012F6
0167:0040B9CB MOV EAX,[FS:00]
0167:0040B9D1
PUSH EAX
0167:0040B9D2 MOV [FS:00],ESP
0167:0040B9D9
SUB ESP,94
0167:0040B9DF PUSH
EBX
0167:0040B9E0 PUSH ESI
0167:0040B9E1 PUSH
EDI
0167:0040B9E2 MOV [EBP-08],ESP
0167:0040B9E5
MOV DWORD [EBP-04],00401218
0167:0040B9EC MOV
ESI,[EBP+08]
0167:0040B9EF XOR EDI,EDI
<---EDI=0
0167:0040B9F1 MOV
[EBP-24],EDI <---[EBP-24]=0
0167:0040B9F4 MOV
[EBP-34],EDI <---[EBP-34]=0
0167:0040B9F7 MOV
EAX,[ESI] <---取使用者輸入的註冊碼
0167:0040B9F9
MOV [EBP-44],EDI <---[EBP-44]=0
0167:0040B9FC
PUSH EAX
0167:0040B9FD MOV [EBP-54],EDI
<---[EBP-54]=0
0167:0040BA00 MOV [EBP-64],EDI
<---[EBP-64]=0
0167:0040BA03 MOV [EBP+FFFFFF7C],EDI
0167:0040BA09
CALL `MSVBVM60!__vbaLenBstr` <---取註冊碼長度
0167:0040BA0F
CMP EAX,BYTE +08 <---判斷註冊碼長度是否為8
0167:0040BA12
JZ 0040BA21 <---相等則跳,不跳就死了!
0167:0040BA14
MOV [EBP-14],EDI
0167:0040BA17 PUSH
DWORD 0040BDFF
0167:0040BA1C JMP 0040BDFE
<---千萬別走到這
-------------第1次判斷---------------------
0167:0040BA21
MOV EDI,[0040107C]
0167:0040BA27 LEA
ECX,[EBP-24]
0167:0040BA2A PUSH ECX
0167:0040BA2B
LEA EDX,[EBP-64]
0167:0040BA2E PUSH
BYTE +01 <---引數入棧,決定取註冊碼的第幾位
0167:0040BA30
LEA EAX,[EBP-34]
0167:0040BA33 MOV
EBX,4008
0167:0040BA38 PUSH EDX
0167:0040BA39
PUSH EAX
0167:0040BA3A MOV DWORD
[EBP-1C],01
0167:0040BA41 MOV DWORD [EBP-24],02
0167:0040BA48
MOV [EBP-5C],ESI
0167:0040BA4B MOV
[EBP-64],EBX
0167:0040BA4E CALL EDI
<---這個Call__rtcmidcharvar幹什麼的?
0167:0040BA50 LEA
ECX,[EBP-44]
0167:0040BA53 LEA EDX,[EBP+FFFFFF7C]
0167:0040BA59
PUSH ECX
0167:0040BA5A PUSH BYTE +03
<---引數入棧,決定取註冊碼的第幾位
0167:0040BA5C LEA
EAX,[EBP-54]
0167:0040BA5F PUSH EDX
0167:0040BA60
PUSH EAX
0167:0040BA61 MOV DWORD
[EBP-3C],01
0167:0040BA68 MOV DWORD [EBP-44],02
0167:0040BA6F
MOV [EBP-7C],ESI
0167:0040BA72 MOV
[EBP+FFFFFF7C],EBX
0167:0040BA78 CALL EDI
<---同上
0167:0040BA7A MOV EBX,[00401130]
0167:0040BA80
LEA ECX,[EBP-54]
0167:0040BA83 PUSH
ECX
0167:0040BA84 CALL EBX
<---取註冊碼的第3位,返回值在AX中
0167:0040BA86 MOV DX,AX
<---值存入DX中
0167:0040BA89 LEA EAX,[EBP-34]
0167:0040BA8C
PUSH EAX
0167:0040BA8D MOV [EBP+FFFFFF62],DX
0167:0040BA94
CALL EBX <---取註冊碼的第1位,返回值在AX中
0167:0040BA96
MOV CX,[EBP+FFFFFF62]
0167:0040BA9D LEA
EDX,[EBP-54]
0167:0040BAA0 ADD CX,AX
<---CX=CX+AX,即前面取得的1、3位值相加
0167:0040BAA3 LEA
EAX,[EBP-54]
0167:0040BAA6 JO
NEAR 0040BE16
0167:0040BAAC XOR EBX,EBX
0167:0040BAAE
CMP CX,BYTE +07 <---是否等於7
0167:0040BAB2 PUSH
EDX
0167:0040BAB3 LEA ECX,[EBP-44]
0167:0040BAB6
PUSH EAX
0167:0040BAB7 LEA EDX,[EBP-34]
0167:0040BABA
PUSH ECX
0167:0040BABB LEA EAX,[EBP-34]
0167:0040BABE
PUSH EDX
0167:0040BABF LEA ECX,[EBP-24]
0167:0040BAC2
PUSH EAX
0167:0040BAC3 PUSH ECX
0167:0040BAC4
SETNZ BL <---根據前面的CMP結果置BL的值
0167:0040BAC7
PUSH BYTE +06
0167:0040BAC9 NEG EBX
<---EBX=0-EBX
0167:0040BACB CALL
`MSVBVM60!__vbaFreeVarList`
0167:0040BAD1 ADD ESP,BYTE
+1C
0167:0040BAD4 TEST BX,BX
0167:0040BAD7 JZ
0040BAEA <---不跳則完
0167:0040BAD9 MOV
DWORD [EBP-14],00
0167:0040BAE0 PUSH
DWORD 0040BDFF
0167:0040BAE5 JMP 0040BDFE
<---不要走到這
此後後面對註冊碼還有4次判斷,操作同第1次判斷,不再鋁
---------第二次判斷,同上------------------
0167:0040BAEA
LEA EDX,[EBP-24]
0167:0040BAED LEA
EAX,[EBP-64]
0167:0040BAF0 PUSH EDX
0167:0040BAF1
PUSH BYTE +02
0167:0040BAF3 LEA
ECX,[EBP-34]
0167:0040BAF6 MOV EBX,4008
0167:0040BAFB
PUSH EAX
0167:0040BAFC PUSH ECX
0167:0040BAFD
MOV DWORD [EBP-1C],01
0167:0040BB04 MOV
DWORD [EBP-24],02
0167:0040BB0B MOV [EBP-5C],ESI
0167:0040BB0E
MOV [EBP-64],EBX
0167:0040BB11 CALL
EDI
0167:0040BB13 LEA
EDX,[EBP-44]
0167:0040BB16 LEA EAX,[EBP+FFFFFF7C]
0167:0040BB1C PUSH EDX
0167:0040BB1D
PUSH BYTE +04
0167:0040BB1F LEA ECX,[EBP-54]
0167:0040BB22
PUSH EAX
0167:0040BB23 PUSH
ECX
0167:0040BB24 MOV DWORD [EBP-3C],01
0167:0040BB2B MOV
DWORD [EBP-44],02
0167:0040BB32
MOV [EBP-7C],ESI
0167:0040BB35 MOV [EBP+FFFFFF7C],EBX
0167:0040BB3B CALL
EDI <---
0167:0040BB3D MOV EBX,[00401130]
0167:0040BB43 LEA EDX,[EBP-54]
0167:0040BB46
PUSH EDX
0167:0040BB47 CALL
EBX <---
0167:0040BB49 MOV DX,AX
0167:0040BB4C
LEA EAX,[EBP-34]
0167:0040BB4F PUSH EAX
0167:0040BB50
MOV [EBP+FFFFFF60],DX
0167:0040BB57 CALL EBX
0167:0040BB59
MOV CX,[EBP+FFFFFF60]
0167:0040BB60 LEA EDX,[EBP-54]
0167:0040BB63 ADD
CX,AX
0167:0040BB66 LEA EAX,[EBP-54]
0167:0040BB69 JO
NEAR 0040BE16
0167:0040BB6F
XOR EBX,EBX
0167:0040BB71 CMP CX,BYTE
+08
0167:0040BB75
PUSH EDX
0167:0040BB76 LEA
ECX,[EBP-44]
0167:0040BB79
PUSH EAX
0167:0040BB7A LEA
EDX,[EBP-34]
0167:0040BB7D
PUSH ECX
0167:0040BB7E LEA
EAX,[EBP-34]
0167:0040BB81
PUSH EDX
0167:0040BB82 LEA
ECX,[EBP-24]
0167:0040BB85
PUSH EAX
0167:0040BB86 PUSH
ECX
0167:0040BB87 SETNZ BL
0167:0040BB8A
PUSH BYTE +06
0167:0040BB8C NEG EBX
0167:0040BB8E
CALL `MSVBVM60!__vbaFreeVarList`
0167:0040BB94 ADD
ESP,BYTE +1C
0167:0040BB97 TEST BX,BX
0167:0040BB9A
JZ 0040BBAD
0167:0040BB9C MOV DWORD
[EBP-14],00
0167:0040BBA3 PUSH
DWORD 0040BDFF
0167:0040BBA8 JMP 0040BDFE
-----------------------------------------
---------第三次判斷,同上------------------
0167:0040BBAD
LEA EDX,[EBP-24]
0167:0040BBB0 LEA
EAX,[EBP-64]
0167:0040BBB3 PUSH EDX
0167:0040BBB4
PUSH BYTE +05
0167:0040BBB6 LEA ECX,[EBP-34]
0167:0040BBB9 MOV
EBX,4008
0167:0040BBBE PUSH EAX
0167:0040BBBF
PUSH ECX
0167:0040BBC0 MOV
DWORD [EBP-1C],01
0167:0040BBC7
MOV DWORD [EBP-24],02
0167:0040BBCE MOV [EBP-5C],ESI
0167:0040BBD1
MOV [EBP-64],EBX
0167:0040BBD4 CALL
EDI
0167:0040BBD6 LEA EDX,[EBP-44]
0167:0040BBD9
LEA EAX,[EBP+FFFFFF7C]
0167:0040BBDF PUSH
EDX
0167:0040BBE0 PUSH BYTE +07
0167:0040BBE2
LEA ECX,[EBP-54]
0167:0040BBE5 PUSH
EAX
0167:0040BBE6 PUSH ECX
0167:0040BBE7 MOV
DWORD [EBP-3C],01
0167:0040BBEE MOV
DWORD [EBP-44],02
0167:0040BBF5 MOV [EBP-7C],ESI
0167:0040BBF8
MOV [EBP+FFFFFF7C],EBX
0167:0040BBFE CALL
EDI
0167:0040BC00 MOV EBX,[00401130]
0167:0040BC06
LEA EDX,[EBP-54]
0167:0040BC09 PUSH
EDX
0167:0040BC0A CALL EBX
0167:0040BC0C MOV
DX,AX
0167:0040BC0F LEA EAX,[EBP-34]
0167:0040BC12
PUSH EAX
0167:0040BC13 MOV [EBP+FFFFFF5E],DX
0167:0040BC1A
CALL EBX
0167:0040BC1C MOV CX,[EBP+FFFFFF5E]
0167:0040BC23
LEA EDX,[EBP-54]
0167:0040BC26 ADD
CX,AX
0167:0040BC29 LEA EAX,[EBP-54]
0167:0040BC2C
JO NEAR 0040BE16
0167:0040BC32 XOR
EBX,EBX
0167:0040BC34 CMP CX,BYTE +09
0167:0040BC38
PUSH EDX
0167:0040BC39 LEA ECX,[EBP-44]
0167:0040BC3C
PUSH EAX
0167:0040BC3D LEA EDX,[EBP-34]
0167:0040BC40
PUSH ECX
0167:0040BC41 LEA EAX,[EBP-34]
0167:0040BC44
PUSH EDX
0167:0040BC45 LEA ECX,[EBP-24]
0167:0040BC48
PUSH EAX
0167:0040BC49 PUSH ECX
0167:0040BC4A
SETNZ BL
0167:0040BC4D PUSH BYTE +06
0167:0040BC4F
NEG EBX
0167:0040BC51 CALL `MSVBVM60!__vbaFreeVarList`
0167:0040BC57
ADD ESP,BYTE +1C
0167:0040BC5A TEST
BX,BX
0167:0040BC5D JZ 0040BC70
0167:0040BC5F
MOV DWORD [EBP-14],00
0167:0040BC66 PUSH
DWORD 0040BDFF
0167:0040BC6B JMP 0040BDFE
-----------------------------------------------
---------第四次判斷,同上------------------
0167:0040BC70
LEA EDX,[EBP-24]
0167:0040BC73 LEA
EAX,[EBP-64]
0167:0040BC76 PUSH EDX
0167:0040BC77
PUSH BYTE +06
0167:0040BC79 LEA ECX,[EBP-34]
0167:0040BC7C
MOV EBX,4008
0167:0040BC81 PUSH
EAX
0167:0040BC82 PUSH ECX
0167:0040BC83 MOV
DWORD [EBP-1C],01
0167:0040BC8A MOV DWORD
[EBP-24],02
0167:0040BC91 MOV [EBP-5C],ESI
0167:0040BC94
MOV [EBP-64],EBX
0167:0040BC97 CALL
EDI
0167:0040BC99 LEA EDX,[EBP-44]
0167:0040BC9C
LEA EAX,[EBP+FFFFFF7C]
0167:0040BCA2 PUSH
EDX
0167:0040BCA3 PUSH BYTE +08
0167:0040BCA5
LEA ECX,[EBP-54]
0167:0040BCA8 PUSH
EAX
0167:0040BCA9 PUSH ECX
0167:0040BCAA MOV
DWORD [EBP-3C],01
0167:0040BCB1 MOV
DWORD [EBP-44],02
0167:0040BCB8 MOV [EBP-7C],ESI
0167:0040BCBB
MOV [EBP+FFFFFF7C],EBX
0167:0040BCC1 CALL
EDI
0167:0040BCC3 MOV EBX,[00401130]
0167:0040BCC9
LEA EDX,[EBP-54]
0167:0040BCCC PUSH
EDX
0167:0040BCCD CALL EBX
0167:0040BCCF MOV
DX,AX
0167:0040BCD2 LEA EAX,[EBP-34]
0167:0040BCD5
PUSH EAX
0167:0040BCD6 MOV [EBP+FFFFFF5C],DX
0167:0040BCDD
CALL EBX
0167:0040BCDF MOV CX,[EBP+FFFFFF5C]
0167:0040BCE6
LEA EDX,[EBP-54]
0167:0040BCE9 ADD
CX,AX
0167:0040BCEC LEA EAX,[EBP-54]
0167:0040BCEF
JO NEAR 0040BE16
0167:0040BCF5 XOR
EBX,EBX
0167:0040BCF7 CMP CX,BYTE +0A
0167:0040BCFB
PUSH EDX
0167:0040BCFC LEA ECX,[EBP-44]
0167:0040BCFF
PUSH EAX
0167:0040BD00 LEA EDX,[EBP-34]
0167:0040BD03
PUSH ECX
0167:0040BD04 LEA EAX,[EBP-34]
0167:0040BD07
PUSH EDX
0167:0040BD08 LEA ECX,[EBP-24]
0167:0040BD0B
PUSH EAX
0167:0040BD0C PUSH ECX
0167:0040BD0D
SETNZ BL
0167:0040BD10 PUSH BYTE +06
0167:0040BD12
NEG EBX
0167:0040BD14 CALL `MSVBVM60!__vbaFreeVarList`
0167:0040BD1A
ADD ESP,BYTE +1C
0167:0040BD1D TEST
BX,BX
0167:0040BD20 JZ 0040BD33
0167:0040BD22
MOV DWORD [EBP-14],00
0167:0040BD29 PUSH
DWORD 0040BDFF
0167:0040BD2E JMP 0040BDFE
-------------------------------------------
---------第五次判斷,同上------------------
0167:0040BD33
LEA EDX,[EBP-24]
0167:0040BD36 LEA
EAX,[EBP-64]
0167:0040BD39 PUSH EDX
0167:0040BD3A
PUSH BYTE +01
0167:0040BD3C LEA ECX,[EBP-34]
0167:0040BD3F
MOV EBX,4008
0167:0040BD44 PUSH
EAX
0167:0040BD45 PUSH ECX
0167:0040BD46 MOV
DWORD [EBP-1C],01
0167:0040BD4D MOV DWORD
[EBP-24],02
0167:0040BD54 MOV [EBP-5C],ESI
0167:0040BD57
MOV [EBP-64],EBX
0167:0040BD5A CALL
EDI
0167:0040BD5C LEA EDX,[EBP-44]
0167:0040BD5F
LEA EAX,[EBP+FFFFFF7C]
0167:0040BD65 PUSH
EDX
0167:0040BD66 PUSH BYTE +08
0167:0040BD68
LEA ECX,[EBP-54]
0167:0040BD6B PUSH
EAX
0167:0040BD6C PUSH ECX
0167:0040BD6D MOV
DWORD [EBP-3C],01
0167:0040BD74 MOV
DWORD [EBP-44],02
0167:0040BD7B MOV [EBP-7C],ESI
0167:0040BD7E
MOV [EBP+FFFFFF7C],EBX
0167:0040BD84 CALL
EDI
0167:0040BD86 MOV ESI,[00401130]
0167:0040BD8C
LEA EDX,[EBP-54]
0167:0040BD8F PUSH
EDX
0167:0040BD90 CALL ESI
0167:0040BD92 MOV
DI,AX
0167:0040BD95 LEA EAX,[EBP-34]
0167:0040BD98
PUSH EAX
0167:0040BD99 CALL ESI
0167:0040BD9B
ADD DI,AX
0167:0040BD9E LEA EDX,[EBP-54]
0167:0040BDA1
JO 0040BE16
0167:0040BDA3 XOR
ECX,ECX
0167:0040BDA5 CMP DI,BYTE +08
0167:0040BDA9 SETNZ CL
<---若DI=08,則CL=0
------------------------------------------
0167:0040BDAC
NEG ECX <---ECX=0
0167:0040BDAE MOV ESI,ECX
<---ESI=ECX
0167:0040BDB0 LEA EAX,[EBP-54]
0167:0040BDB3
PUSH EDX
0167:0040BDB4 LEA ECX,[EBP-44]
0167:0040BDB7
PUSH EAX
0167:0040BDB8 LEA EDX,[EBP-34]
0167:0040BDBB
PUSH ECX
0167:0040BDBC LEA EAX,[EBP-34]
0167:0040BDBF
PUSH EDX
0167:0040BDC0 LEA ECX,[EBP-24]
0167:0040BDC3
PUSH EAX
0167:0040BDC4 PUSH ECX
0167:0040BDC5
PUSH BYTE +06
0167:0040BDC7 CALL `MSVBVM60!__vbaFreeVarList`
0167:0040BDCD
ADD ESP,BYTE +1C
0167:0040BDD0 NEG
SI <---SI=0-SI
0167:0040BDD3 SBB
ESI,ESI <---ESI=ESI-ESI-CF(CF為進位標誌)
0167:0040BDD5
PUSH DWORD 0040BDFF
0167:0040BDDA NEG
ESI <---ESI=0-ESI
0167:0040BDDC DEC
ESI <---ESI=ESI-1
0167:0040BDDD
MOV [EBP-14],ESI<---[EBP-14]=ESI
0167:0040BDE0
JMP SHORT 0040BDFE
0167:0040BDE2 LEA
EDX,[EBP-54]
0167:0040BDE5 LEA EAX,[EBP-44]
0167:0040BDE8
PUSH EDX
0167:0040BDE9 LEA ECX,[EBP-34]
0167:0040BDEC
PUSH EAX
0167:0040BDED LEA EDX,[EBP-24]
0167:0040BDF0
PUSH ECX
0167:0040BDF1 PUSH EDX
0167:0040BDF2
PUSH BYTE +04
0167:0040BDF4 CALL `MSVBVM60!__vbaFreeVarList`
0167:0040BDFA
ADD ESP,BYTE +14
0167:0040BDFD RET
0167:0040BDFE RET
0167:0040BDFF MOV
ECX,[EBP-10]
0167:0040BE02 MOV AX,[EBP-14]
<---AX=[EBP-14]置標誌位值
0167:0040BE06 POP EDI
0167:0040BE07
POP ESI
0167:0040BE08 MOV [FS:00],ECX
0167:0040BE0F
POP EBX
0167:0040BE10 MOV ESP,EBP
0167:0040BE12
POP EBP
0167:0040BE13 RET 04
這個程式的演算法並不複雜,只是VB程式看起來有點麻煩。註冊碼與使用者名稱無關,要求位數為8位,且只要滿足第1、3位相加等於7,第2、4位相加等於8,第5、7位相加等於9,第6、8位相加等於10,第1、8位相加等於8就可以了。滿足這個條件的數太多了,我是用14645347註冊的。
--------------------------------------ShenGe------------------------------------
相關文章
- win10如何強制解除安裝驅動精靈_win10解除安裝驅動精靈的方法2019-12-17Win10
- win10系統驅動精靈解除安裝不了怎麼辦_win10驅動精靈解除安裝不了如何解決2020-06-16Win10
- win10解除安裝驅動精靈後drivergenius刪不了怎麼辦_win10解除安裝驅動精靈後drivergenius刪不掉如何處理2020-06-18Win10
- Win10系統怎樣解除安裝幽靈熔斷補丁_win10解除安裝幽靈補丁的方法2020-02-17Win10
- 驅動精靈是幹嘛的 驅動精靈怎麼安裝驅動2021-06-07
- adobe creative cloud(adobe acc)精簡版+完整版下載安裝包 附解除安裝教程2024-01-13Cloud
- 簡要分析ZooKeeper基本原理及安裝部署2019-05-27
- JDK的安裝與解除安裝2020-09-29JDK
- docker的解除安裝2018-05-12Docker
- Python pip的安裝及解除安裝2020-10-10Python
- win10怎麼解除安裝solidworks_windows10電腦要如何解除安裝SolidWork20162020-08-23Win10SolidWindows
- Linux安裝解除安裝MySQL2024-05-24LinuxMySql
- Ubuntu解除安裝和安裝2020-10-20Ubuntu
- cocoapods安裝/解除安裝/使用2019-07-04
- JDK安裝和解除安裝2024-08-01JDK
- docker安裝及解除安裝2021-06-19Docker
- 全新破解App Cleaner & Uninstaller for Mac:徹底解除安裝Mac應用的高效工具2023-10-11APPMac
- 解除安裝windows安裝ubuntu的完全指南2022-06-03WindowsUbuntu
- 安裝npm 解除安裝npm 安裝apidoc2021-04-02NPMAPI
- docker 解除安裝2024-04-29Docker
- 解除安裝 Python2019-07-01Python
- WSL解除安裝2024-12-02
- debian軟體解除安裝|deb包解除安裝|dpkg命令2024-10-19
- Mac Redis安裝與解除安裝2018-10-30MacRedis
- Linux 解除安裝openjdk 安裝oraclejdk2024-04-09LinuxJDKOracle
- debian安裝和解除安裝vmware2024-05-15
- linux 解除安裝jdk和安裝2020-10-10LinuxJDK
- [雲原生]Docker - 安裝&解除安裝2021-12-08Docker
- Ubuntu安裝和解除安裝mongodb2020-12-02UbuntuMongoDB
- Linux下jdk的安裝解除安裝切換2019-05-10LinuxJDK
- app的安裝與解除安裝測試點2018-03-29APP
- window下安裝並使用nvm(含解除安裝node、解除安裝nvm、全域性安裝npm)2024-06-26NPM
- ssl解除安裝的工作原理2022-05-23
- air安裝win10怎麼解除安裝_air安裝win10如何解除安裝2020-02-20AIWin10
- Chrome如何解除安裝掉外掛?如此簡單!2024-11-12Chrome
- Redis(windows)解除安裝2018-04-07RedisWindows
- VMware Workstation解除安裝2024-03-06
- kangle 解除安裝命令2019-06-27
- 解除安裝 Microsoft Edge2024-08-15ROS