当前位置:→ 股海网通达信软件 → 正文
  • 通达信专业交易版开启顶栏补码( 附原程序)

  • 相关简介:new_jyexp_v7.00_12112413_5.83开启顶栏补码(仅供参考) 献给爱折腾的同学------- 为方便填补代码添加2k空间。。。 -------------------------------------------------------------------------------- 00CE52BC 6A 40 push 0x40 00CE52BE E8 8D6C9DFF

  • 文章来源:股海网作者:股海网发布时间:2013-03-07浏览次数:下载次数:51

new_jyexp_v7.00_12112413_5.83开启顶栏补码(仅供参考)
 
献给爱折腾的同学-------
 
为方便填补代码添加2k空间。。。
 --------------------------------------------------------------------------------
 00CE52BC     6A 40                      push 0x40
 00CE52BE     E8 8D6C9DFF                call <jmp.&MFC42.#823>
 00CE52C3     8BE8                       mov ebp,eax
 00CE52C5     83C4 04                    add esp,0x4
 00CE52C8     896C24 10                  mov dword ptr ss:[esp+0x10],ebp
 00CE52CC     3BEF                       cmp ebp,edi
 00CE52CE     C78424 AC010000 04000000   mov dword ptr ss:[esp+0x1AC],0x4
 00CE52D9     74 12                      je XTdxW.00CE52ED
 00CE52DB     8BCD                       mov ecx,ebp
 00CE52DD     E8 EE6D9DFF                call <jmp.&MFC42.#567>
 00CE52E2     C745 00 50CA6D00           mov dword ptr ss:[ebp],TdxW.006DCA50
 00CE52E9     8BCD                       mov ecx,ebp
 00CE52EB     EB 02                      jmp XTdxW.00CE52EF
 00CE52ED     33C9                       xor ecx,ecx
 00CE52EF     57                         push edi
 00CE52F0     68 7A020000                push 0x27A
 00CE52F5     8D5424 20                  lea edx,dword ptr ss:[esp+0x20]
 00CE52F9     56                         push esi
 00CE52FA     52                         push edx
 00CE52FB     898E 28020000              mov dword ptr ds:[esi+0x228],ecx
 00CE5301     8B01                       mov eax,dword ptr ds:[ecx]
 00CE5303     68 00000050                push 0x50000000
 00CE5308     83CD FF                    or ebp,0xFFFFFFFF
 00CE530B     57                         push edi
 00CE530C     57                         push edi
 00CE530D     89AC24 C8010000            mov dword ptr ss:[esp+0x1C8],ebp
 00CE5314     FF50 5C                    call dword ptr ds:[eax+0x5C]
 00CE5317     8B8E 28020000              mov ecx,dword ptr ds:[esi+0x228]
 00CE531D     6A 01                      push 0x1
 00CE531F     E8 ECF087FF                call TdxW.00564410
 00CE5324   - E9 3A6A86FF                jmp TdxW.0054BD63
 00CE5329     90                         nop
 00CE532A     8B8E 28020000              mov ecx,dword ptr ds:[esi+0x228]-----------------------
 00CE5330     85C9                       test ecx,ecx
 00CE5332     74 24                      je XTdxW.00CE5358
 00CE5334     8B4424 34                  mov eax,dword ptr ss:[esp+0x34]
 00CE5338     83F8 1C                    cmp eax,0x1C
 00CE533B     7E 1B                      jle XTdxW.00CE5358
 00CE533D     8B5424 30                  mov edx,dword ptr ss:[esp+0x30]
 00CE5341     6A 01                      push 0x1
 00CE5343     6A 1E                      push 0x1E
 00CE5345     83C0 E4                    add eax,-0x1C
 00CE5348     52                         push edx
 00CE5349     50                         push eax
 00CE534A     6A 00                      push 0x0
 00CE534C     E8 536F9DFF                call <jmp.&MFC42.#4299>
 00CE5351     8BCE                       mov ecx,esi
 00CE5353     E8 0C000000                call TdxW.00CE5364
 00CE5358     8B8E 54010000              mov ecx,dword ptr ds:[esi+0x154]
 00CE535E   - E9 918986FF                jmp TdxW.0054DCF4
 00CE5363     90                         nop
 00CE5364     55                         push ebp
 00CE5365     8BEC                       mov ebp,esp
 00CE5367     6A FF                      push -0x1
 00CE5369     68 40C36C00                push TdxW.006CC340                       ; 入口地址
 00CE536E     64:A1 00000000             mov eax,dword ptr fs:[0]
 00CE5374     50                         push eax
 00CE5375     64:8925 00000000           mov dword ptr fs:[0],esp
 00CE537C     83EC 0C                    sub esp,0xC
 00CE537F     53                         push ebx
 00CE5380     56                         push esi
 00CE5381     8BF1                       mov esi,ecx
 00CE5383     57                         push edi
 00CE5384     8965 F0                    mov dword ptr ss:[ebp-0x10],esp
 00CE5387     8B86 28020000              mov eax,dword ptr ds:[esi+0x228]
 00CE538D     85C0                       test eax,eax
 00CE538F     74 76                      je XTdxW.00CE5407
 00CE5391     68 FC9E6D00                push TdxW.006D9EFC                       ; ASCII "pages\topmain.htm"
 00CE5396     8D45 EC                    lea eax,dword ptr ss:[ebp-0x14]
 00CE5399     68 CCDA8100                push TdxW.0081DACC
 00CE539E     50                         push eax
 00CE539F     C745 FC 00000000           mov dword ptr ss:[ebp-0x4],0x0
 00CE53A6     E8 C96E9DFF                call <jmp.&MFC42.#924>
 00CE53AB     A1 9C56A800                mov eax,dword ptr ds:[0xA8569C]
 00CE53B0     B3 01                      mov bl,0x1
 00CE53B2     85C0                       test eax,eax
 00CE53B4     885D FC                    mov byte ptr ss:[ebp-0x4],bl
 00CE53B7     74 2B                      je XTdxW.00CE53E4
 00CE53B9     68 E89E6D00                push TdxW.006D9EE8                       ; ASCII "jspages\topmain.htm"
 00CE53BE     8D4D E8                    lea ecx,dword ptr ss:[ebp-0x18]
 00CE53C1     68 CCDA8100                push TdxW.0081DACC
 00CE53C6     51                         push ecx
 00CE53C7     E8 A86E9DFF                call <jmp.&MFC42.#924>
 00CE53CC     50                         push eax
 00CE53CD     8D4D EC                    lea ecx,dword ptr ss:[ebp-0x14]
 00CE53D0     C645 FC 02                 mov byte ptr ss:[ebp-0x4],0x2
 00CE53D4     E8 A76E9DFF                call <jmp.&MFC42.#858>
 00CE53D9     8D4D E8                    lea ecx,dword ptr ss:[ebp-0x18]
 00CE53DC     885D FC                    mov byte ptr ss:[ebp-0x4],bl
 00CE53DF     E8 226D9DFF                call <jmp.&MFC42.#800>
 00CE53E4     8B55 EC                    mov edx,dword ptr ss:[ebp-0x14]
 00CE53E7     8B8E 28020000              mov ecx,dword ptr ds:[esi+0x228]
 00CE53ED     6A 00                      push 0x0
 00CE53EF     6A 00                      push 0x0
 00CE53F1     6A 00                      push 0x0
 00CE53F3     6A 00                      push 0x0
 00CE53F5     52                         push edx
 00CE53F6     E8 B5EF87FF                call TdxW.005643B0
 00CE53FB     8D4D EC                    lea ecx,dword ptr ss:[ebp-0x14]
 00CE53FE     C645 FC 00                 mov byte ptr ss:[ebp-0x4],0x0
 00CE5402     E8 FF6C9DFF                call <jmp.&MFC42.#800>
 00CE5407     8B4D F4                    mov ecx,dword ptr ss:[ebp-0xC]
 00CE540A     5F                         pop edi
 00CE540B     5E                         pop esi
 00CE540C     64:890D 00000000           mov dword ptr fs:[0],ecx
 00CE5413     5B                         pop ebx
 00CE5414     8BE5                       mov esp,ebp
 00CE5416     5D                         pop ebp
 00CE5417     C3                         retn
 00CE5418     B8 0754CE00                mov eax,TdxW.00CE5407
 00CE541D     C3                         retn
 00CE541E     0000                       add byte ptr ds:[eax],al
 00CE5420     55                         push ebp-------------------------------------------------
 00CE5421     8BEC                       mov ebp,esp
 00CE5423     81EC 08020000              sub esp,0x208
 00CE5429     8B81 28020000              mov eax,dword ptr ds:[ecx+0x228]
 00CE542F     56                         push esi
 00CE5430     85C0                       test eax,eax
 00CE5432     57                         push edi
 00CE5433     0F84 8F000000              je TdxW.00CE54C8
 00CE5439     8B49 20                    mov ecx,dword ptr ds:[ecx+0x20]
 00CE543C     8D45 F0                    lea eax,dword ptr ss:[ebp-0x10]
 00CE543F     50                         push eax
 00CE5440     51                         push ecx
 00CE5441     FF15 8CB56D00              call dword ptr ds:[<&USER32.GetClientRec>; USER32.GetClientRect
 00CE5447     8B55 FC                    mov edx,dword ptr ss:[ebp-0x4]
 00CE544A     8B4D F4                    mov ecx,dword ptr ss:[ebp-0xC]
 00CE544D     2BD1                       sub edx,ecx
 00CE544F     83FA 34                    cmp edx,0x34
 00CE5452     7C 74                      jl XTdxW.00CE54C8
 00CE5454     B9 7D000000                mov ecx,0x7D
 00CE5459     33C0                       xor eax,eax
 00CE545B     8DBD F9FDFFFF              lea edi,dword ptr ss:[ebp-0x207]
 00CE5461     C685 F8FDFFFF 00           mov byte ptr ss:[ebp-0x208],0x0
 00CE5468     F3:AB                      rep stos dword ptr es:[edi]
 00CE546A     8B45 0C                    mov eax,dword ptr ss:[ebp+0xC]
 00CE546D     8B78 08                    mov edi,dword ptr ds:[eax+0x8]
 00CE5470     85FF                       test edi,edi
 00CE5472     75 04                      jnz XTdxW.00CE5478
 00CE5474     33C0                       xor eax,eax
 00CE5476     EB 21                      jmp XTdxW.00CE5499
 00CE5478     57                         push edi
 00CE5479     FF15 8CA16D00              call dword ptr ds:[<&KERNEL32.lstrlenW>] ; kernel32.lstrlenW
 00CE547F     8D7400 02                  lea esi,dword ptr ds:[eax+eax+0x2]
 00CE5483     8BC6                       mov eax,esi
 00CE5485     83C0 03                    add eax,0x3
 00CE5488     24 FC                      and al,0xFC
 00CE548A     E8 A1819DFF                call TdxW.006BD630
 00CE548F     8BC4                       mov eax,esp
 00CE5491     56                         push esi
 00CE5492     57                         push edi
 00CE5493     50                         push eax
 00CE5494     E8 116E9DFF                call <jmp.&MFC42.#1574>
 00CE5499     68 F4010000                push 0x1F4
 00CE549E     8D8D F8FDFFFF              lea ecx,dword ptr ss:[ebp-0x208]
 00CE54A4     50                         push eax
 00CE54A5     51                         push ecx
 00CE54A6     FF15 78B26D00              call dword ptr ds:[<&MSVCRT.strncpy>]    ; msvcrt.strncpy
 00CE54AC     8D95 F8FDFFFF              lea edx,dword ptr ss:[ebp-0x208]
 00CE54B2     52                         push edx
 00CE54B3     E8 58968EFF                call TdxW.005CEB10
 00CE54B8     83C4 10                    add esp,0x10
 00CE54BB     85C0                       test eax,eax
 00CE54BD     74 09                      je XTdxW.00CE54C8
 00CE54BF     8B45 20                    mov eax,dword ptr ss:[ebp+0x20]
 00CE54C2     C700 01000000              mov dword ptr ds:[eax],0x1
 00CE54C8     8DA5 F0FDFFFF              lea esp,dword ptr ss:[ebp-0x210]
 00CE54CE     5F                         pop edi
 00CE54CF     5E                         pop esi
 00CE54D0     8BE5                       mov esp,ebp
 00CE54D2     5D                         pop ebp
 00CE54D3     C2 1C00                    retn 0x1C
 
6A 40 E8 8D 6C 9D FF 8B E8 83 C4 04 89 6C 24 10 3B EF C7 84 24 AC 01 00 00 04 00 00 00 74 12 8B
 CD E8 EE 6D 9D FF C7 45 00 50 CA 6D 00 8B CD EB 02 33 C9 57 68 7A 02 00 00 8D 54 24 20 56 52 89
 8E 28 02 00 00 8B 01 68 00 00 00 50 83 CD FF 57 57 89 AC 24 C8 01 00 00 FF 50 5C 8B 8E 28 02 00
 00 6A 01 E8 EC F0 87 FF E9 3A 6A 86 FF 90 8B 8E 28 02 00 00 85 C9 74 24 8B 44 24 34 83 F8 1C 7E
 1B 8B 54 24 30 6A 01 6A 1E 83 C0 E4 52 50 6A 00 E8 53 6F 9D FF 8B CE E8 0C 00 00 00 8B 8E 54 01
 00 00 E9 91 89 86 FF 90 55 8B EC 6A FF 68 40 C3 6C 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00
 83 EC 0C 53 56 8B F1 57 89 65 F0 8B 86 28 02 00 00 85 C0 74 76 68 FC 9E 6D 00 8D 45 EC 68 CC DA
 81 00 50 C7 45 FC 00 00 00 00 E8 C9 6E 9D FF A1 9C 56 A8 00 B3 01 85 C0 88 5D FC 74 2B 68 E8 9E
 6D 00 8D 4D E8 68 CC DA 81 00 51 E8 A8 6E 9D FF 50 8D 4D EC C6 45 FC 02 E8 A7 6E 9D FF 8D 4D E8
 88 5D FC E8 22 6D 9D FF 8B 55 EC 8B 8E 28 02 00 00 6A 00 6A 00 6A 00 6A 00 52 E8 B5 EF 87 FF 8D
 4D EC C6 45 FC 00 E8 FF 6C 9D FF 8B 4D F4 5F 5E 64 89 0D 00 00 00 00 5B 8B E5 5D C3 B8 07 54 CE
 00 C3 00 00 55 8B EC 81 EC 08 02 00 00 8B 81 28 02 00 00 56 85 C0 57 0F 84 8F 00 00 00 8B 49 20
 8D 45 F0 50 51 FF 15 8C B5 6D 00 8B 55 FC 8B 4D F4 2B D1 83 FA 34 7C 74 B9 7D 00 00 00 33 C0 8D
 BD F9 FD FF FF C6 85 F8 FD FF FF 00 F3 AB 8B 45 0C 8B 78 08 85 FF 75 04 33 C0 EB 21 57 FF 15 8C
 A1 6D 00 8D 74 00 02 8B C6 83 C0 03 24 FC E8 A1 81 9D FF 8B C4 56 57 50 E8 11 6E 9D FF 68 F4 01
 00 00 8D 8D F8 FD FF FF 50 51 FF 15 78 B2 6D 00 8D 95 F8 FD FF FF 52 E8 58 96 8E FF 83 C4 10 85
 C0 74 09 8B 45 20 C7 00 01 00 00 00 8D A5 F0 FD FF FF 5F 5E 8B E5 5D C2 1C 00
 
006EDCD8  20 54 CE 00 00 00 00 00 00 00 00 00 00 00 00 00   T?............
 
006D9EE8  6A 73 70 61 67 65 73 5C 74 6F 70 6D 61 69 6E 2E  jspages\topmain.
 006D9EF8  68 74 6D 00 70 61 67 65 73 5C 74 6F 70 6D 61 69  htm.pages\topmai
 006D9F08  6E 2E 68 74 6D 00 00 00                          n.htm...
 
006D9F10      C605 388D7500 01   mov byte ptr ds:[0x758D38],0x1
 006D9F17      E8 8823FEFF        call <jmp.&MFC42.#4299>
 006D9F1C    - E9 9BB36000        jmp TdxW.00CE52BC
 006D9F21      00                 db 00
 006D9F22      00                 db 00
 006D9F23      803D 388D7500 00   cmp byte ptr ds:[0x758D38],0x0
 006D9F2A    - 0F84 FAB36000      je TdxW.00CE532A
 006D9F30      C605 A8397500 00   mov byte ptr ds:[0x7539A8],0x0
 006D9F37      8B8E 30020000      mov ecx,dword ptr ds:[esi+0x230]
 006D9F3D    - E9 EEB36000        jmp TdxW.00CE5330
 
C6 05 38 8D 75 00 01 E8 88 23 FE FF E9 9B B3 60 00 00 00 80 3D 38 8D 75 00 00 0F 84 FA B3 60 00
 C6 05 38 8D 75 00 00 8B 8E 30 02 00 00 E9 EE B3 60 00
 
0054BD4C   . /E9 BFE11800   jmp TdxW.006D9F10
 
0054DCEE     /E9 30C21800   jmp TdxW.006D9F23
 --------------------------------------------------------------------------------
 附原程序:(已添加一个2k区块) jTdxW.rar (1.56 MB)

 

 


在软件目录connect记事本打开找到【other】下面添加:
 HasTopHomePag=1,激活顶部快捷。
 之后将pages文件夹放入通达信安装目录。
 pages文件夹内就是顶栏的样式设计文件,可自行修改。

下载资源链接:( 说明:股海资源如需解压密码的请输入本站域名:www.guhai.com.cn 请仔细输入!)
本地下载 (免费下载)
下载 (免费下载)
 ☟问题反馈 ☞┄┄┄┄┄┄┄┄┄┄→收藏资源:

通达信专业交易版开启顶栏补码( 附原程序)

  • 下载资源所需积分

    0

  • 当前拥有积分

    0

上传会员: 
股海网
文件大小: 
Bytes
上传时间: 
2013-03-07
下载积分: 
-
免责声明: 
请仔细阅读并同意后才能下载
本附件为用户分享上传,股海网没有对文件进行验证,不能保证下载资源的准确性、安全性和完整性,也不保证下载资源能正常安装和使用,且下载后扣除的积分无法退还,除非您充分理解并完全接受本声明,否则您无权下载。
本站对提供下载的软件、指标、资料等不拥有任何权利,其版权归该下载资源的合法拥有者所有。本附件仅供学习和研究使用,不得用于商业或者非法用途,如有侵犯您的版权, 请参看 《股海网侵权处理流程》《股海网免责声明条款》
点击下载无反应时,更换主流浏览器重新登录操作,如360浏览器、Edge浏览器、谷歌浏览器,个别浏览器有不兼容现象。
勾选以下表示您已经阅读并同意以上声明才能下载本文件,扣除积分无法退还!
我已阅读所有条款规定, 请点我同意 所有条款内容!我自愿下载!
提示:如下载失败,请点关闭刷新此页面或提交问题反馈给管理员→
关闭

关于我们 - 联系我们 - 隐私政策 - 免责声明 - 下载帮助 - 广告合作 - SiteMap - TOP
增值电信业务经营ICP许可证:湘B2-20210269 湘ICP备09016573号-10 湘公网安备43108102000040号
Copyright © 2021 铭网科技,All Rights Reserved.