熊猫四川麻将怎么玩?熊猫四川麻将是一款不错的手机麻将游戏,是消遣的一款采用民间传玩法打造后一款手机棋手牌游戏,让许多玩家不管身在何地都能与自己的朋友一起打棋,方便快捷简单!但是这个熊猫四川麻将怎么玩?下面就由小编来告诉你游戏的玩法。
某一个警察任务里, 需要到海上赌场去调查.然后开始打麻将, 很奇怪的是, 无论怎样我都只能打第一盘, 然后第二盘开始, 我就卡主不能操作了
Kyodai Mahjongg 19.00(四川省麻将)--算法分析作者:newlaos[DFCG]
软件名称: Kyodai Mahjongg 19.00(四川省麻将) 软件授权: 共享软件 注册费用: 25美元使用平台: Win95/98/NT 软件开发: http://kyodai.com/ 软件简介:非常好玩的四川省麻将游戏,支持DirectX,可改变背景音乐...制作画面精美,如果用四川方言形容----“不摆了”,爱好麻将的朋友可不要错过机会哟! 加密方式:ASPACK2.1+注册码功能限制:未注册信息提示PJ工具:TRW20001.23注册版、W32Dasm8.93黄金版,FI2.5,PE-scan3.1PJ日期:2003-03-30作者newlaos申明:只是学习,请不用于商业用途或是将本文方法制作的注册机任意传播,造成后果,本人一概不负。
1、先用FI2.5看一下主文件“kmj.exe”,加了ASPACK2.1壳,自动脱壳用PE-scan3.1很快搞定,生成UNPACK.EXE文件,再看,程序是用DELPHI编的。手动脱壳也不难,OEP在4F2858。
2、用W32Dasm8.93黄金版对UNPACK.EXE进行静态反汇编,再用串式数据参考,找到"Thanks again ! You're now registered."(很经典的句子),双击来到下面代码段。这样就找到注册码的计算部分。
3、再用TRW20001.23注册版进行动态跟踪,下断BPX 004B1807(通常在注册成功与否的前面一些下断,这样,才能找到关键部分),先输入注码名:newlaos[DFCG]假码: 78787878
..............* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B17A0(C)|:004B1807 8D55FC lea edx, dword ptr [ebp-04]:004B180A 8B8358930A00 mov eax, dword ptr [ebx+000A9358]:004B1810 8B8028030000 mov eax, dword ptr [eax+00000328]:004B1816 E8D952F9FF call 00446AF4 "Thanks again ! You're now registered." |:004B18AA BAB8194B00 mov edx, 004B19B8 Sorry, wrong password. Please ->"check out if you entered the user ->"name and password exactly as I ->"gave them to you." |:004B1906 BA281A4B00 mov edx, 004B1A28:004B190B 8B8348040000 mov eax, dword ptr [ebx+00000448]:004B1911 E826C1FCFF call 0047DA3C:004B1916 8B45EC mov eax, dword ptr [ebp-14]:004B1919 668B0DE0194B00 mov cx, word ptr [004B19E0]:004B1920 B202 mov dl, 02:004B1922 E899B3FFFF call 004ACCC0:004B1927 EB07 jmp 004B1930
* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B1801(C)|:004B1929 8BC3 mov eax, ebx:004B192B E8D4400300 call 004E5A04
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:|:004B18CB(U), :004B1901(U), :004B1927(U)|:004B1930 33C0 xor eax, eax:004B1932 5A pop edx:004B1933 59 pop ecx:004B1934 59 pop ecx:004B1935 648910 mov dword ptr fs:[eax], edx:004B1938 685F194B00 push 004B195F
* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B195D(U)|:004B193D 8D45EC lea eax, dword ptr [ebp-14]:004B1940 BA03000000 mov edx, 00000003:004B1945 E87A30F5FF call 004049C4:004B194A 8D45F8 lea eax, dword ptr [ebp-08]:004B194D BA02000000 mov edx, 00000002:004B1952 E86D30F5FF call 004049C4:004B1957 C3 ret..............
-------004B1854 call 004B34E0 --关键的CALL,F8跟进----------------------如果要正确注册,则AL返回时,不能为0:004B34E0 55 push ebp:004B34E1 8BEC mov ebp, esp:004B34E3 B91B000000 mov ecx, 0000001B
* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B34ED(C)|:004B34E8 6A00 push 00000000:004B34EA 6A00 push 00000000:004B34EC 49 dec ecx:004B34ED 75F9 jne 004B34E8:004B34EF 53 push ebx:004B34F0 56 push esi:004B34F1 8BD8 mov ebx, eax:004B34F3 33C0 xor eax, eax:004B34F5 55 push ebp:004B34F6 68BE424B00 push 004B42BE
* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B3486(C)|:004B34FB 64FF30 push dword ptr fs:[eax]:004B34FE 648920 mov dword ptr fs:[eax], esp
* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B349A(C)|:004B3501 C645FF01 mov [ebp-01], 01:004B3505 8B83BCDF0800 mov eax, dword ptr [ebx+0008DFBC]:004B350B E85017F5FF call 00404C60:004B3510 83E802 sub eax, 00000002:004B3513 7C22 jl 004B3537:004B3515 40 inc eax:004B3516 BA02000000 mov edx, 00000002
* Referenced by a (U)nconditional or (C)onditional Jump at Address:|:004B3535(C)|:004B351B 8B8BBCDF0800 mov ecx, dword ptr [ebx+0008DFBC]:004B3521 8A4C11FF mov cl, byte ptr [ecx+edx-01]