不联网导入导出大智慧公式的修改方法

admin 206 0

第一步 OD 载入大智慧7.7.0625版 查找字符 等待服务器应答...
找到后按下面四个修改,进行二进制修改。保存。

01182C5C . FF90 98000000 call dword ptr [eax+98]
01182C62 . 33DB xor ebx, ebx
01182C64 . 43 inc ebx
01182C65 . 3BC3 cmp eax, ebx
01182C67 0F85 9A010000 jnz 01182E07 ; nop掉 修改一
01182C6D . B8 01880000 mov eax, 8801
01182C72 . 66:8945 DC mov word ptr [ebp-24], ax
01182C76 . 8B45 08 mov eax, dword ptr [ebp+8]
01182C79 . 35 3EACD97C xor eax, 7CD9AC3E
01182C7E . 8945 E3 mov dword ptr [ebp-1D], eax
01182C81 . 8B45 0C mov eax, dword ptr [ebp+C]
01182C84 . 35 C9A975AD xor eax, AD75A9C9
01182C89 . 8945 E7 mov dword ptr [ebp-19], eax
01182C8C . 8B45 10 mov eax, dword ptr [ebp+10]
01182C8F . 35 A75B5D59 xor eax, 595D5BA7
01182C94 . 8945 EB mov dword ptr [ebp-15], eax
01182C97 . 8D86 02010000 lea eax, dword ptr [esi+102]
01182C9D . 6A 0C push 0C ; /n = C (12.)
01182C9F . 50 push eax ; |s2
01182CA0 . 8D45 E3 lea eax, dword ptr [ebp-1D] ; |
01182CA3 . 50 push eax ; |s1
01182CA4 . 885D DE mov byte ptr [ebp-22], bl ; |
01182CA7 . 895D DF mov dword ptr [ebp-21], ebx ; |
01182CAA . E8 6F914000 call <jmp.&MSVCR100.memcmp> ; \memcmp
01182CAF . 83C4 0C add esp, 0C
01182CB2 . 85C0 test eax, eax
01182CB4 0F84 18010000 je 01182DD2 ; jmp 修改二
01182CBA . 838E FE000000 FF or dword ptr [esi+FE], FFFFFFFF
01182CC1 . 6A 0C push 0C ; /n = C (12.)
01182CC3 . 8D86 02010000 lea eax, dword ptr [esi+102] ; |
01182CC9 . 57 push edi ; |c
01182CCA . 50 push eax ; |s
01182CCB . E8 828F4000 call <jmp.&MSVCR100.memset> ; \memset
01182CD0 . 6A 08 push 8 ; /n = 8
01182CD2 . 8D86 0E010000 lea eax, dword ptr [esi+10E] ; |
01182CD8 . 57 push edi ; |c
01182CD9 . 50 push eax ; |s
01182CDA . E8 738F4000 call <jmp.&MSVCR100.memset> ; \memset
01182CDF . 83C4 18 add esp, 18
01182CE2 . 6A 13 push 13
01182CE4 . 8D45 DC lea eax, dword ptr [ebp-24]
01182CE7 . 50 push eax
01182CE8 . FF96 CC000000 call dword ptr [esi+CC]
01182CEE . 57 push edi
01182CEF . 6A 30 push 30
01182CF1 . 68 60106201 push 01621060 ; 连接服务器
01182CF6 . 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182CFC . E8 61301800 call 01305D62
01182D01 . 57 push edi
01182D02 . 68 E1000000 push 0E1
01182D07 . 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182D0D . 897D FC mov dword ptr [ebp-4], edi
01182D10 . E8 995C4000 call <jmp.&mfc100.#2752>
01182D15 . 8B1D C8036001 mov ebx, dword ptr [<&KERNEL32.GetTi>; kernel32.GetTickCount
01182D1B . FFD3 call ebx ; [GetTickCount
01182D1D . 8945 CC mov dword ptr [ebp-34], eax
01182D20 . 897D D8 mov dword ptr [ebp-28], edi
01182D23 . EB 6C jmp short 01182D91
01182D25 > 83BE FE000000 FF cmp dword ptr [esi+FE], -1
01182D2C . 75 74 jnz short 01182DA2
01182D2E . 57 push edi
01182D2F . B9 D00C7A01 mov ecx, 017A0CD0
01182D34 . E8 C63C1D00 call 013569FF
01182D39 . FFD3 call ebx
01182D3B . 2B45 CC sub eax, dword ptr [ebp-34]
01182D3E . 8945 D0 mov dword ptr [ebp-30], eax
01182D41 . 3D 10270000 cmp eax, 2710
01182D46 . 7F 50 jg short 01182D98
01182D48 . 2B45 D8 sub eax, dword ptr [ebp-28]
01182D4B . 3D 58020000 cmp eax, 258
01182D50 . 7C 3F jl short 01182D91
01182D52 . 397D D8 cmp dword ptr [ebp-28], edi
01182D55 . 75 29 jnz short 01182D80
01182D57 . 57 push edi
01182D58 . 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182D5E . E8 315E4000 call <jmp.&mfc100.#2406>
01182D63 . 6A 05 push 5
01182D65 . 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182D6B . E8 F85C4000 call <jmp.&mfc100.#12962>
01182D70 . 68 4C106201 push 0162104C ; 等待服务器应答...
01182D75 . 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182D7B . E8 8B2D1800 call 01305B0B
01182D80 > 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182D86 . E8 FD2E1800 call 01305C88
01182D8B . 8B45 D0 mov eax, dword ptr [ebp-30]
01182D8E . 8945 D8 mov dword ptr [ebp-28], eax
01182D91 > 397D B8 cmp dword ptr [ebp-48], edi
01182D94 .^ 74 8F je short 01182D25
01182D96 . EB 0A jmp short 01182DA2
01182D98 > C786 FE000000 02000>mov dword ptr [esi+FE], 2
01182DA2 > 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182DA8 . E8 995A4000 call <jmp.&mfc100.#3484>
01182DAD . 397D B8 cmp dword ptr [ebp-48], edi
01182DB0 . 74 05 je short 01182DB7
01182DB2 . 897D D8 mov dword ptr [ebp-28], edi
01182DB5 . EB 09 jmp short 01182DC0
01182DB7 > 8B86 FE000000 mov eax, dword ptr [esi+FE]
01182DBD . 8945 D8 mov dword ptr [ebp-28], eax
01182DC0 > 834D FC FF or dword ptr [ebp-4], FFFFFFFF
01182DC4 . 8D8D 8CFEFFFF lea ecx, dword ptr [ebp-174]
01182DCA . E8 9767F0FF call 01089566
01182DCF . 33DB xor ebx, ebx
01182DD1 . 43 inc ebx
01182DD2 > 6A 0C push 0C ; /n = C (12.)
01182DD4 . 8D86 02010000 lea eax, dword ptr [esi+102] ; |
01182DDA . 50 push eax ; |s2
01182DDB . 8D45 E3 lea eax, dword ptr [ebp-1D] ; |
01182DDE . 50 push eax ; |s1
01182DDF . E8 3A904000 call <jmp.&MSVCR100.memcmp> ; \memcmp
01182DE4 . 83C4 0C add esp, 0C
01182DE7 . 85C0 test eax, eax
01182DE9 75 23 jnz short 01182E0E ; NOP 修改三
01182DEB . 6A 08 push 8 ; /n = 8
01182DED . 81C6 0E010000 add esi, 10E ; |
01182DF3 . 56 push esi ; |src
01182DF4 . FF75 C8 push dword ptr [ebp-38] ; |dest
01182DF7 . 897D D8 mov dword ptr [ebp-28], edi ; |
01182DFA . E8 598E4000 call <jmp.&MSVCR100.memcpy> ; \memcpy
01182DFF . 83C4 0C add esp, 0C
01182E02 . 895D D4 mov dword ptr [ebp-2C], ebx
01182E05 . EB 07 jmp short 01182E0E
01182E07 > C745 D8 04000000 mov dword ptr [ebp-28], 4
01182E0E > 397D D8 cmp dword ptr [ebp-28], edi
01182E11 7E 13 jle short 01182E26 ; jmp 修改四
01182E13 . 57 push edi
01182E14 . 57 push edi
01182E15 . FF75 D8 push dword ptr [ebp-28]
01182E18 . E8 C9C3FFFF call 0117F1E6
01182E1D . 83C4 04 add esp, 4
01182E20 . 50 push eax
01182E21 . E8 005C4000 call <jmp.&mfc100.#1982>
01182E26 > 8B45 D4 mov eax, dword ptr [ebp-2C]
01182E29 . E8 538D4000 call 0158BB81
01182E2E . C2 1000 retn 10


以上修改保存后,炒股入门,可以不连上大智慧服务器,甚至断网情况下也可以正常导入导出公式
 

标签: 联网 导入 导出 智慧 公式 修改 方法

抱歉,评论功能暂时关闭!