通达信专业交易版开启顶栏补码( 附原程序)
-
相关简介:new_jyexp_v7.00_12112413_5.83开启顶栏补码(仅供参考) 献给爱折腾的同学------- 为方便填补代码添加2k空间。。。 -------------------------------------------------------------------------------- 00CE52BC 6A 40 push 0x40 00CE52BE E8 8D6C9DFF
-
文章来源:股海网作者:股海网发布时间:2013-03-07浏览次数:
new_jyexp_v7.00_12112413_5.83开启顶栏补码(仅供参考)
献给爱折腾的同学-------
为方便填补代码添加2k空间。。。
--------------------------------------------------------------------------------
00CE52BC 6A 40 push 0x40
00CE52BE E8 8D6C9DFF call <jmp.&MFC42.#823>
00CE52C3 8BE8 mov ebp,eax
00CE52C5 83C4 04 add esp,0x4
00CE52C8 896C24 10 mov dword ptr ss:[esp+0x10],ebp
00CE52CC 3BEF cmp ebp,edi
00CE52CE C78424 AC010000 04000000 mov dword ptr ss:[esp+0x1AC],0x4
00CE52D9 74 12 je XTdxW.00CE52ED
00CE52DB 8BCD mov ecx,ebp
00CE52DD E8 EE6D9DFF call <jmp.&MFC42.#567>
00CE52E2 C745 00 50CA6D00 mov dword ptr ss:[ebp],TdxW.006DCA50
00CE52E9 8BCD mov ecx,ebp
00CE52EB EB 02 jmp XTdxW.00CE52EF
00CE52ED 33C9 xor ecx,ecx
00CE52EF 57 push edi
00CE52F0 68 7A020000 push 0x27A
00CE52F5 8D5424 20 lea edx,dword ptr ss:[esp+0x20]
00CE52F9 56 push esi
00CE52FA 52 push edx
00CE52FB 898E 28020000 mov dword ptr ds:[esi+0x228],ecx
00CE5301 8B01 mov eax,dword ptr ds:[ecx]
00CE5303 68 00000050 push 0x50000000
00CE5308 83CD FF or ebp,0xFFFFFFFF
00CE530B 57 push edi
00CE530C 57 push edi
00CE530D 89AC24 C8010000 mov dword ptr ss:[esp+0x1C8],ebp
00CE5314 FF50 5C call dword ptr ds:[eax+0x5C]
00CE5317 8B8E 28020000 mov ecx,dword ptr ds:[esi+0x228]
00CE531D 6A 01 push 0x1
00CE531F E8 ECF087FF call TdxW.00564410
00CE5324 - E9 3A6A86FF jmp TdxW.0054BD63
00CE5329 90 nop
00CE532A 8B8E 28020000 mov ecx,dword ptr ds:[esi+0x228]-----------------------
00CE5330 85C9 test ecx,ecx
00CE5332 74 24 je XTdxW.00CE5358
00CE5334 8B4424 34 mov eax,dword ptr ss:[esp+0x34]
00CE5338 83F8 1C cmp eax,0x1C
00CE533B 7E 1B jle XTdxW.00CE5358
00CE533D 8B5424 30 mov edx,dword ptr ss:[esp+0x30]
00CE5341 6A 01 push 0x1
00CE5343 6A 1E push 0x1E
00CE5345 83C0 E4 add eax,-0x1C
00CE5348 52 push edx
00CE5349 50 push eax
00CE534A 6A 00 push 0x0
00CE534C E8 536F9DFF call <jmp.&MFC42.#4299>
00CE5351 8BCE mov ecx,esi
00CE5353 E8 0C000000 call TdxW.00CE5364
00CE5358 8B8E 54010000 mov ecx,dword ptr ds:[esi+0x154]
00CE535E - E9 918986FF jmp TdxW.0054DCF4
00CE5363 90 nop
00CE5364 55 push ebp
00CE5365 8BEC mov ebp,esp
00CE5367 6A FF push -0x1
00CE5369 68 40C36C00 push TdxW.006CC340 ; 入口地址
00CE536E 64:A1 00000000 mov eax,dword ptr fs:[0]
00CE5374 50 push eax
00CE5375 64:8925 00000000 mov dword ptr fs:[0],esp
00CE537C 83EC 0C sub esp,0xC
00CE537F 53 push ebx
00CE5380 56 push esi
00CE5381 8BF1 mov esi,ecx
00CE5383 57 push edi
00CE5384 8965 F0 mov dword ptr ss:[ebp-0x10],esp
00CE5387 8B86 28020000 mov eax,dword ptr ds:[esi+0x228]
00CE538D 85C0 test eax,eax
00CE538F 74 76 je XTdxW.00CE5407
00CE5391 68 FC9E6D00 push TdxW.006D9EFC ; ASCII "pages\topmain.htm"
00CE5396 8D45 EC lea eax,dword ptr ss:[ebp-0x14]
00CE5399 68 CCDA8100 push TdxW.0081DACC
00CE539E 50 push eax
00CE539F C745 FC 00000000 mov dword ptr ss:[ebp-0x4],0x0
00CE53A6 E8 C96E9DFF call <jmp.&MFC42.#924>
00CE53AB A1 9C56A800 mov eax,dword ptr ds:[0xA8569C]
00CE53B0 B3 01 mov bl,0x1
00CE53B2 85C0 test eax,eax
00CE53B4 885D FC mov byte ptr ss:[ebp-0x4],bl
00CE53B7 74 2B je XTdxW.00CE53E4
00CE53B9 68 E89E6D00 push TdxW.006D9EE8 ; ASCII "jspages\topmain.htm"
00CE53BE 8D4D E8 lea ecx,dword ptr ss:[ebp-0x18]
00CE53C1 68 CCDA8100 push TdxW.0081DACC
00CE53C6 51 push ecx
00CE53C7 E8 A86E9DFF call <jmp.&MFC42.#924>
00CE53CC 50 push eax
00CE53CD 8D4D EC lea ecx,dword ptr ss:[ebp-0x14]
00CE53D0 C645 FC 02 mov byte ptr ss:[ebp-0x4],0x2
00CE53D4 E8 A76E9DFF call <jmp.&MFC42.#858>
00CE53D9 8D4D E8 lea ecx,dword ptr ss:[ebp-0x18]
00CE53DC 885D FC mov byte ptr ss:[ebp-0x4],bl
00CE53DF E8 226D9DFF call <jmp.&MFC42.#800>
00CE53E4 8B55 EC mov edx,dword ptr ss:[ebp-0x14]
00CE53E7 8B8E 28020000 mov ecx,dword ptr ds:[esi+0x228]
00CE53ED 6A 00 push 0x0
00CE53EF 6A 00 push 0x0
00CE53F1 6A 00 push 0x0
00CE53F3 6A 00 push 0x0
00CE53F5 52 push edx
00CE53F6 E8 B5EF87FF call TdxW.005643B0
00CE53FB 8D4D EC lea ecx,dword ptr ss:[ebp-0x14]
00CE53FE C645 FC 00 mov byte ptr ss:[ebp-0x4],0x0
00CE5402 E8 FF6C9DFF call <jmp.&MFC42.#800>
00CE5407 8B4D F4 mov ecx,dword ptr ss:[ebp-0xC]
00CE540A 5F pop edi
00CE540B 5E pop esi
00CE540C 64:890D 00000000 mov dword ptr fs:[0],ecx
00CE5413 5B pop ebx
00CE5414 8BE5 mov esp,ebp
00CE5416 5D pop ebp
00CE5417 C3 retn
00CE5418 B8 0754CE00 mov eax,TdxW.00CE5407
00CE541D C3 retn
00CE541E 0000 add byte ptr ds:[eax],al
00CE5420 55 push ebp-------------------------------------------------
00CE5421 8BEC mov ebp,esp
00CE5423 81EC 08020000 sub esp,0x208
00CE5429 8B81 28020000 mov eax,dword ptr ds:[ecx+0x228]
00CE542F 56 push esi
00CE5430 85C0 test eax,eax
00CE5432 57 push edi
00CE5433 0F84 8F000000 je TdxW.00CE54C8
00CE5439 8B49 20 mov ecx,dword ptr ds:[ecx+0x20]
00CE543C 8D45 F0 lea eax,dword ptr ss:[ebp-0x10]
00CE543F 50 push eax
00CE5440 51 push ecx
00CE5441 FF15 8CB56D00 call dword ptr ds:[<&USER32.GetClientRec>; USER32.GetClientRect
00CE5447 8B55 FC mov edx,dword ptr ss:[ebp-0x4]
00CE544A 8B4D F4 mov ecx,dword ptr ss:[ebp-0xC]
00CE544D 2BD1 sub edx,ecx
00CE544F 83FA 34 cmp edx,0x34
00CE5452 7C 74 jl XTdxW.00CE54C8
00CE5454 B9 7D000000 mov ecx,0x7D
00CE5459 33C0 xor eax,eax
00CE545B 8DBD F9FDFFFF lea edi,dword ptr ss:[ebp-0x207]
00CE5461 C685 F8FDFFFF 00 mov byte ptr ss:[ebp-0x208],0x0
00CE5468 F3:AB rep stos dword ptr es:[edi]
00CE546A 8B45 0C mov eax,dword ptr ss:[ebp+0xC]
00CE546D 8B78 08 mov edi,dword ptr ds:[eax+0x8]
00CE5470 85FF test edi,edi
00CE5472 75 04 jnz XTdxW.00CE5478
00CE5474 33C0 xor eax,eax
00CE5476 EB 21 jmp XTdxW.00CE5499
00CE5478 57 push edi
00CE5479 FF15 8CA16D00 call dword ptr ds:[<&KERNEL32.lstrlenW>] ; kernel32.lstrlenW
00CE547F 8D7400 02 lea esi,dword ptr ds:[eax+eax+0x2]
00CE5483 8BC6 mov eax,esi
00CE5485 83C0 03 add eax,0x3
00CE5488 24 FC and al,0xFC
00CE548A E8 A1819DFF call TdxW.006BD630
00CE548F 8BC4 mov eax,esp
00CE5491 56 push esi
00CE5492 57 push edi
00CE5493 50 push eax
00CE5494 E8 116E9DFF call <jmp.&MFC42.#1574>
00CE5499 68 F4010000 push 0x1F4
00CE549E 8D8D F8FDFFFF lea ecx,dword ptr ss:[ebp-0x208]
00CE54A4 50 push eax
00CE54A5 51 push ecx
00CE54A6 FF15 78B26D00 call dword ptr ds:[<&MSVCRT.strncpy>] ; msvcrt.strncpy
00CE54AC 8D95 F8FDFFFF lea edx,dword ptr ss:[ebp-0x208]
00CE54B2 52 push edx
00CE54B3 E8 58968EFF call TdxW.005CEB10
00CE54B8 83C4 10 add esp,0x10
00CE54BB 85C0 test eax,eax
00CE54BD 74 09 je XTdxW.00CE54C8
00CE54BF 8B45 20 mov eax,dword ptr ss:[ebp+0x20]
00CE54C2 C700 01000000 mov dword ptr ds:[eax],0x1
00CE54C8 8DA5 F0FDFFFF lea esp,dword ptr ss:[ebp-0x210]
00CE54CE 5F pop edi
00CE54CF 5E pop esi
00CE54D0 8BE5 mov esp,ebp
00CE54D2 5D pop ebp
00CE54D3 C2 1C00 retn 0x1C
6A 40 E8 8D 6C 9D FF 8B E8 83 C4 04 89 6C 24 10 3B EF C7 84 24 AC 01 00 00 04 00 00 00 74 12 8B
CD E8 EE 6D 9D FF C7 45 00 50 CA 6D 00 8B CD EB 02 33 C9 57 68 7A 02 00 00 8D 54 24 20 56 52 89
8E 28 02 00 00 8B 01 68 00 00 00 50 83 CD FF 57 57 89 AC 24 C8 01 00 00 FF 50 5C 8B 8E 28 02 00
00 6A 01 E8 EC F0 87 FF E9 3A 6A 86 FF 90 8B 8E 28 02 00 00 85 C9 74 24 8B 44 24 34 83 F8 1C 7E
1B 8B 54 24 30 6A 01 6A 1E 83 C0 E4 52 50 6A 00 E8 53 6F 9D FF 8B CE E8 0C 00 00 00 8B 8E 54 01
00 00 E9 91 89 86 FF 90 55 8B EC 6A FF 68 40 C3 6C 00 64 A1 00 00 00 00 50 64 89 25 00 00 00 00
83 EC 0C 53 56 8B F1 57 89 65 F0 8B 86 28 02 00 00 85 C0 74 76 68 FC 9E 6D 00 8D 45 EC 68 CC DA
81 00 50 C7 45 FC 00 00 00 00 E8 C9 6E 9D FF A1 9C 56 A8 00 B3 01 85 C0 88 5D FC 74 2B 68 E8 9E
6D 00 8D 4D E8 68 CC DA 81 00 51 E8 A8 6E 9D FF 50 8D 4D EC C6 45 FC 02 E8 A7 6E 9D FF 8D 4D E8
88 5D FC E8 22 6D 9D FF 8B 55 EC 8B 8E 28 02 00 00 6A 00 6A 00 6A 00 6A 00 52 E8 B5 EF 87 FF 8D
4D EC C6 45 FC 00 E8 FF 6C 9D FF 8B 4D F4 5F 5E 64 89 0D 00 00 00 00 5B 8B E5 5D C3 B8 07 54 CE
00 C3 00 00 55 8B EC 81 EC 08 02 00 00 8B 81 28 02 00 00 56 85 C0 57 0F 84 8F 00 00 00 8B 49 20
8D 45 F0 50 51 FF 15 8C B5 6D 00 8B 55 FC 8B 4D F4 2B D1 83 FA 34 7C 74 B9 7D 00 00 00 33 C0 8D
BD F9 FD FF FF C6 85 F8 FD FF FF 00 F3 AB 8B 45 0C 8B 78 08 85 FF 75 04 33 C0 EB 21 57 FF 15 8C
A1 6D 00 8D 74 00 02 8B C6 83 C0 03 24 FC E8 A1 81 9D FF 8B C4 56 57 50 E8 11 6E 9D FF 68 F4 01
00 00 8D 8D F8 FD FF FF 50 51 FF 15 78 B2 6D 00 8D 95 F8 FD FF FF 52 E8 58 96 8E FF 83 C4 10 85
C0 74 09 8B 45 20 C7 00 01 00 00 00 8D A5 F0 FD FF FF 5F 5E 8B E5 5D C2 1C 00
006EDCD8 20 54 CE 00 00 00 00 00 00 00 00 00 00 00 00 00 T?............
006D9EE8 6A 73 70 61 67 65 73 5C 74 6F 70 6D 61 69 6E 2E jspages\topmain.
006D9EF8 68 74 6D 00 70 61 67 65 73 5C 74 6F 70 6D 61 69 htm.pages\topmai
006D9F08 6E 2E 68 74 6D 00 00 00 n.htm...
006D9F10 C605 388D7500 01 mov byte ptr ds:[0x758D38],0x1
006D9F17 E8 8823FEFF call <jmp.&MFC42.#4299>
006D9F1C - E9 9BB36000 jmp TdxW.00CE52BC
006D9F21 00 db 00
006D9F22 00 db 00
006D9F23 803D 388D7500 00 cmp byte ptr ds:[0x758D38],0x0
006D9F2A - 0F84 FAB36000 je TdxW.00CE532A
006D9F30 C605 A8397500 00 mov byte ptr ds:[0x7539A8],0x0
006D9F37 8B8E 30020000 mov ecx,dword ptr ds:[esi+0x230]
006D9F3D - E9 EEB36000 jmp TdxW.00CE5330
C6 05 38 8D 75 00 01 E8 88 23 FE FF E9 9B B3 60 00 00 00 80 3D 38 8D 75 00 00 0F 84 FA B3 60 00
C6 05 38 8D 75 00 00 8B 8E 30 02 00 00 E9 EE B3 60 00
0054BD4C . /E9 BFE11800 jmp TdxW.006D9F10
0054DCEE /E9 30C21800 jmp TdxW.006D9F23
--------------------------------------------------------------------------------
附原程序:(已添加一个2k区块) jTdxW.rar (1.56 MB)
在软件目录connect记事本打开找到【other】下面添加:
HasTopHomePag=1,激活顶部快捷。
之后将pages文件夹放入通达信安装目录。
pages文件夹内就是顶栏的样式设计文件,可自行修改。