Saludos
para los interesador he craqueado el play.exe y el play.dat que son los archivos que se usan para mostrar una nueva pagina, si hay un problema los rebiso

************************************************** ***************
Greetings
stakeholders to have cracked the play.dat play.exe and files that are used to display a new page, if there is a problem the Rebis
************************************************** *******************
Address Hex dump Command Comments
00401A8D |> \68 30924000 PUSH OFFSET play.00409230 ; ASCII "rb"
00401A92 |. 68 14924000 PUSH OFFSET play.00409214 ;
ASCII "ini/Play.dat"
00401A97 |. FF15 48734000 CALL DWORD PTR DS:[<&MSVCRT.fopen>]
00401A9D |. 68 10924000 PUSH OFFSET play.00409210 ; ASCII "w+b"
00401AA2 |. 57 PUSH EDI
00401AA3 |. 8BF0 MOV ESI,EAX
00401AA5 |. FF15 48734000 CALL DWORD PTR DS:[<&MSVCRT.fopen>]
00401AAB |. 83C4 10 ADD ESP,10
00401AAE |. 8945 F0 MOV DWORD PTR SS:[EBP-10],EAX
00401AB1 |> F646 0C 10 /TEST BYTE PTR DS:[ESI+0C],10
00401AB5 |. 56 |PUSH ESI
00401AB6 |. 75 2F |JNE SHORT 00401AE7
00401AB8 |. 6A 01 |PUSH 1
00401ABA |. 8D45 EB |LEA EAX,[EBP-15]
00401ABD |. 6A 01 |PUSH 1
00401ABF |. 50 |PUSH EAX
00401AC0 |. FF15 40734000 |CALL DWORD PTR DS:[<&MSVCRT.fread>]
00401AC6 |. 83C4 10 |ADD ESP,10
00401AC9 |. 85C0 |TEST EAX,EAX
00401ACB |.^ 7E E4 |JLE SHORT 00401AB1
00401ACD |. FF75 F0 |PUSH DWORD PTR SS:[EBP-10]
00401AD0 |. 8045 EB 00 |ADD BYTE PTR SS:[EBP-15],
0FA (Change to ADD BYTE PTR SS:[EBP-15],
0)
00401AD4 |. 8D45 EB |LEA EAX,[EBP-15]
00401AD7 |. 6A 01 |PUSH 1
00401AD9 |. 6A 01 |PUSH 1
00401ADB |. 50 |PUSH EAX
00401ADC |. FF15 3C734000 |CALL DWORD PTR DS:[<&MSVCRT.fwrite>]
00401AE2 |. 83C4 10 |ADD ESP,10
00401AE5 |.^ EB CA \JMP SHORT 00401AB1
00401AE7 |> 8B35 44734000 MOV ESI,DWORD PTR DS:[<&MSVCRT.fclose>]