开启读取通达信CONNECT.CFG里面的普通行情主站站点
-
相关简介:开启读取通达信CONNECT.CFG里面的普通行情主站站点 该方法借签了论坛上周大田老师等各位高手的修改而来。如有不妥,请管理员及时删除。 并且,我一个月内不再发表文章,大家自已研究最后一脚。 开启读取CONNECT.CFG里面的HQHOST站点: CPU Disasm 地址 十六进制数据 指令&nbs
-
文章来源:股海网作者:股海网发布时间:2016-10-10浏览次数:
开启读取通达信CONNECT.CFG里面的普通行情主站站点
该方法借签了论坛上周大田老师等各位高手的修改而来。如有不妥,请管理员及时删除。
并且,我一个月内不再发表文章,大家自已研究最后一脚。
开启读取CONNECT.CFG里面的HQHOST站点:
CPU Disasm
地址 十六进制数据 指令 注释
0051C044 8B2D A0718600 MOV EBP,DWORD PTR DS:[<&KERNEL32.GetPriv
0051C04A 3BDE CMP EBX,ESI
0051C04C C64424 20 01 MOV BYTE PTR SS:[ESP+20],1
0051C051 0F84 17010000 JE 0051C16E
0051C057 83C9 FF OR ECX,FFFFFFFF
0051C05A BF B88C8D00 MOV EDI,008D8CB8 ; UNICODE "通达信普通主站"
0051C044 8B2D A0718600 MOV EBP,DWORD PTR DS:[<&KERNEL32.GetPri 转到要修改的地方去:
即
CPU Disasm
地址 十六进制数据 指令 注释
0051C044 /E9 E7A73400 JMP 00866830
0051C049 |90 NOP
在00866830增加补码:
CPU Disasm
地址 十六进制数据 指令 注释
00866830 8B2D A0718600 MOV EBP,DWORD PTR DS:[<&KERNEL32.GetPriv
00866836 8B3D A4718600 MOV EDI,DWORD PTR DS:[<&KERNEL32.GetPriv
0086683C 3BDE CMP EBX,ESI
0086683E C64424 20 01 MOV BYTE PTR SS:[ESP+20],1
00866843 ^ 0F84 2559CBFF JE 0051C16E
00866849 8B4424 54 MOV EAX,DWORD PTR SS:[ESP+54]
0086684D 50 PUSH EAX
0086684E 6A 00 PUSH 0
00866850 68 748B8D00 PUSH 008D8B74 ; ASCII "HostNum"
00866855 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
0086685A FFD5 CALL EBP
0086685C 66:85C0 TEST AX,AX
0086685F 66:8903 MOV WORD PTR DS:[EBX],AX
00866862 7E 05 JLE SHORT 00866869
00866864 0FBFC0 MOVSX EAX,AX
00866867 EB 02 JMP SHORT 0086686B
00866869 33C0 XOR EAX,EAX
0086686B 66:8903 MOV WORD PTR DS:[EBX],AX
0086686E 66:3D 9600 CMP AX,96
00866872 0FBFC0 MOVSX EAX,AX
00866875 7C 05 JL SHORT 0086687C
00866877 B8 96000000 MOV EAX,96
0086687C 66:85C0 TEST AX,AX
0086687F 66:8903 MOV WORD PTR DS:[EBX],AX
00866882 0F8E 82010000 JLE 00866A0A
00866888 8B7424 28 MOV ESI,DWORD PTR SS:[ESP+28]
0086688C BB 01000000 MOV EBX,1
00866891 8D8E D85D0000 LEA ECX,[ESI+5DD8]
00866897 8D96 DC3B0000 LEA EDX,[ESI+3BDC]
0086689D 8D86 B03A0000 LEA EAX,[ESI+3AB0]
008668A3 894C24 1C MOV DWORD PTR SS:[ESP+1C],ECX
008668A7 895424 18 MOV DWORD PTR SS:[ESP+18],EDX
008668AB 894424 14 MOV DWORD PTR SS:[ESP+14],EAX
008668AF 81C6 641D0000 ADD ESI,1D64
008668B5 53 PUSH EBX
008668B6 8D4C24 14 LEA ECX,[ESP+14]
008668BA 68 648B8D00 PUSH 008D8B64 ; ASCII "HostName%02d"
008668BF 51 PUSH ECX
008668C0 E8 0942FDFF CALL <JMP.&MFC42.#2818> ; 跳转至 MFC42.#2818
008668C5 8B5424 60 MOV EDX,DWORD PTR SS:[ESP+60]
008668C9 8B4C24 1C MOV ECX,DWORD PTR SS:[ESP+1C]
008668CD 83C4 0C ADD ESP,0C
008668D0 8D86 B4E2FFFF LEA EAX,[ESI-1D4C]
008668D6 52 PUSH EDX
008668D7 6A 30 PUSH 30
008668D9 50 PUSH EAX
008668DA 68 28179100 PUSH 00911728
008668DF 51 PUSH ECX
008668E0 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
008668E5 FFD7 CALL EDI
008668E7 53 PUSH EBX
008668E8 8D5424 14 LEA EDX,[ESP+14]
008668EC 68 548B8D00 PUSH 008D8B54 ; ASCII "IPAddress%02d"
008668F1 52 PUSH EDX
008668F2 E8 D741FDFF CALL <JMP.&MFC42.#2818> ; 跳转至 MFC42.#2818
008668F7 8B4424 60 MOV EAX,DWORD PTR SS:[ESP+60]
008668FB 8B4C24 1C MOV ECX,DWORD PTR SS:[ESP+1C]
008668FF 83C4 0C ADD ESP,0C
00866902 50 PUSH EAX
00866903 6A 30 PUSH 30
00866905 56 PUSH ESI
00866906 68 28179100 PUSH 00911728
0086690B 51 PUSH ECX
0086690C 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
00866911 FFD7 CALL EDI
00866913 53 PUSH EBX
00866914 8D5424 14 LEA EDX,[ESP+14]
00866918 68 488B8D00 PUSH 008D8B48 ; ASCII "Port%02d"
0086691D 52 PUSH EDX
0086691E E8 AB41FDFF CALL <JMP.&MFC42.#2818> ; 跳转至 MFC42.#2818
00866923 8B4424 60 MOV EAX,DWORD PTR SS:[ESP+60]
00866927 8B4C24 1C MOV ECX,DWORD PTR SS:[ESP+1C]
0086692B 83C4 0C ADD ESP,0C
0086692E 50 PUSH EAX
0086692F 68 1D1E0000 PUSH 1E1D
00866934 51 PUSH ECX
00866935 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
0086693A FFD5 CALL EBP
0086693C 8B5424 14 MOV EDX,DWORD PTR SS:[ESP+14]
00866940 53 PUSH EBX
00866941 68 3C8B8D00 PUSH 008D8B3C ; ASCII "Weight%02d"
00866946 66:8902 MOV WORD PTR DS:[EDX],AX
00866949 8D4424 18 LEA EAX,[ESP+18]
0086694D 50 PUSH EAX
0086694E E8 7B41FDFF CALL <JMP.&MFC42.#2818> ; 跳转至 MFC42.#2818
00866953 8B4C24 60 MOV ECX,DWORD PTR SS:[ESP+60]
00866957 8B5424 1C MOV EDX,DWORD PTR SS:[ESP+1C]
0086695B 83C4 0C ADD ESP,0C
0086695E 51 PUSH ECX
0086695F 6A 00 PUSH 0
00866961 52 PUSH EDX
00866962 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
00866967 FFD5 CALL EBP
00866969 8B4C24 18 MOV ECX,DWORD PTR SS:[ESP+18]
0086696D 53 PUSH EBX
0086696E 8D5424 14 LEA EDX,[ESP+14]
00866972 68 308B8D00 PUSH 008D8B30 ; ASCII "Areas%02d"
00866977 52 PUSH EDX
00866978 8901 MOV DWORD PTR DS:[ECX],EAX
0086697A E8 4F41FDFF CALL <JMP.&MFC42.#2818> ; 跳转至 MFC42.#2818
0086697F 8B4424 60 MOV EAX,DWORD PTR SS:[ESP+60]
00866983 8B5424 1C MOV EDX,DWORD PTR SS:[ESP+1C]
00866987 83C4 0C ADD ESP,0C
0086698A 8D8E D0200000 LEA ECX,[ESI+20D0]
00866990 50 PUSH EAX
00866991 6A 30 PUSH 30
00866993 51 PUSH ECX
00866994 68 28179100 PUSH 00911728
00866999 52 PUSH EDX
0086699A 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
0086699F FFD7 CALL EDI
008669A1 53 PUSH EBX
008669A2 8D4424 14 LEA EAX,[ESP+14]
008669A6 68 248B8D00 PUSH 008D8B24 ; ASCII "Yybids%02d"
008669AB 50 PUSH EAX
008669AC E8 1D41FDFF CALL <JMP.&MFC42.#2818> ; 跳转至 MFC42.#2818
008669B1 8B4C24 60 MOV ECX,DWORD PTR SS:[ESP+60]
008669B5 8B5424 28 MOV EDX,DWORD PTR SS:[ESP+28]
008669B9 8B4424 1C MOV EAX,DWORD PTR SS:[ESP+1C]
008669BD 83C4 0C ADD ESP,0C
008669C0 51 PUSH ECX
008669C1 6A 62 PUSH 62
008669C3 52 PUSH EDX
008669C4 68 28179100 PUSH 00911728
008669C9 50 PUSH EAX
008669CA 68 B08C8D00 PUSH 008D8CB0 ; ASCII "HQHOST"
008669CF FFD7 CALL EDI
008669D1 8B4424 18 MOV EAX,DWORD PTR SS:[ESP+18]
008669D5 8B4C24 14 MOV ECX,DWORD PTR SS:[ESP+14]
008669D9 8B5424 28 MOV EDX,DWORD PTR SS:[ESP+28]
008669DD 83C0 04 ADD EAX,4
008669E0 894424 18 MOV DWORD PTR SS:[ESP+18],EAX
008669E4 8B4424 1C MOV EAX,DWORD PTR SS:[ESP+1C]
008669E8 83C0 64 ADD EAX,64
008669EB 83C1 02 ADD ECX,2
008669EE 83C6 32 ADD ESI,32
008669F1 43 INC EBX
008669F2 894424 1C MOV DWORD PTR SS:[ESP+1C],EAX
008669F6 894C24 14 MOV DWORD PTR SS:[ESP+14],ECX
008669FA 0FBF02 MOVSX EAX,WORD PTR DS:[EDX]
008669FD 8D4B FF LEA ECX,[EBX-1]
00866A00 3BC8 CMP ECX,EAX
00866A02 ^ 0F8C ADFEFFFF JL 008668B5
00866A08 8BDA MOV EBX,EDX
00866A0A 8B4424 58 MOV EAX,DWORD PTR SS:[ESP+58]
00866A0E 85C0 TEST EAX,EAX
00866A10 ^ E9 0B57CBFF JMP 0051C120
00866A15 0000 ADD BYTE PTR DS:[EAX],AL
8B 2D A0 71 86 00 8B 3D A4 71 86 00 3B DE C6 44
24 20 01 0F 84 25 59 CB FF 8B 44 24 54 50 6A 00
68 74 8B 8D 00 68 B0 8C 8D 00 FF D5 66 85 C0 66
89 03 7E 05 0F BF C0 EB 02 33 C0 66 89 03 66 3D
96 00 0F BF C0 7C 05 B8 96 00 00 00 66 85 C0 66
89 03 0F 8E 82 01 00 00 8B 74 24 28 BB 01 00 00
00 8D 8E D8 5D 00 00 8D 96 DC 3B 00 00 8D 86 B0
3A 00 00 89 4C 24 1C 89 54 24 18 89 44 24 14 81
C6 64 1D 00 00 53 8D 4C 24 14 68 64 8B 8D 00 51
E8 09 42 FD FF 8B 54 24 60 8B 4C 24 1C 83 C4 0C
8D 86 B4 E2 FF FF 52 6A 30 50 68 28 17 91 00 51
68 B0 8C 8D 00 FF D7 53 8D 54 24 14 68 54 8B 8D
00 52 E8 D7 41 FD FF 8B 44 24 60 8B 4C 24 1C 83
C4 0C 50 6A 30 56 68 28 17 91 00 51 68 B0 8C 8D
00 FF D7 53 8D 54 24 14 68 48 8B 8D 00 52 E8 AB
41 FD FF 8B 44 24 60 8B 4C 24 1C 83 C4 0C 50 68
1D 1E 00 00 51 68 B0 8C 8D 00 FF D5 8B 54 24 14
53 68 3C 8B 8D 00 66 89 02 8D 44 24 18 50 E8 7B
41 FD FF 8B 4C 24 60 8B 54 24 1C 83 C4 0C 51 6A
00 52 68 B0 8C 8D 00 FF D5 8B 4C 24 18 53 8D 54
24 14 68 30 8B 8D 00 52 89 01 E8 4F 41 FD FF 8B
44 24 60 8B 54 24 1C 83 C4 0C 8D 8E D0 20 00 00
50 6A 30 51 68 28 17 91 00 52 68 B0 8C 8D 00 FF
D7 53 8D 44 24 14 68 24 8B 8D 00 50 E8 1D 41 FD
FF 8B 4C 24 60 8B 54 24 28 8B 44 24 1C 83 C4 0C
51 6A 62 52 68 28 17 91 00 50 68 B0 8C 8D 00 FF
D7 8B 44 24 18 8B 4C 24 14 8B 54 24 28 83 C0 04
89 44 24 18 8B 44 24 1C 83 C0 64 83 C1 02 83 C6
32 43 89 44 24 1C 89 4C 24 14 0F BF 02 8D 4B FF
3B C8 0F 8C AD FE FF FF 8B DA 8B 44 24 58 85 C0
E9 0B 57 CB FF
|