Download X-Plane v7.00 Beta 3 crack

Added to site2005-02-12
Rating70/100
Votes2


xplanev7.00beta3crack.zip (6765 bytes)

namesizecompressed
howto-create-crack/ 0 0
howto-create-crack/function.txt 18663 2797
howto-create-crack/code.txt 3101 760
howto-create-crack/howto.txt 1107 568
howto-crack.txt 226 149
X-Plane 700 Beta-3 crack.exe 5135 1717

howto-create-crack/function.txt

* Referenced by a CALL at Addresses:
|:0046DC17   , :0046DC2A   , :00526001   , :00526020   , :0059FDFC   
|:0059FE19   
|
:008D5CA0 55                      push ebp
:008D5CA1 89E5                    mov ebp, esp
:008D5CA3 53                      push ebx
:008D5CA4 56                      push esi
:008D5CA5 57                      push edi
:008D5CA6 81EC54020000            sub esp, 00000254
:008D5CAC 51                      push ecx
:008D5CAD 8D7C2404                lea edi, dword ptr [esp+04]
:008D5CB1 B8CCCCCCCC              mov eax, CCCCCCCC
:008D5CB6 B995000000              mov ecx, 00000095
:008D5CBB F3                      repz
:008D5CBC AB                      stosd
:008D5CBD 59                      pop ecx
:008D5CBE 8D8500FEFFFF            lea eax, dword ptr [ebp+FFFFFE00]
:008D5CC4 50                      push eax
:008D5CC5 FF7508                  push [ebp+08]
:008D5CC8 68DCA0A100              push 00A1A0DC
:008D5CCD E8CE07B8FF              call 004564A0
:008D5CD2 83C40C                  add esp, 0000000C
:008D5CD5 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D5CDB 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:008D5CDE 01DB                    add ebx, ebx
:008D5CE0 8B1CDD78E1A100          mov ebx, dword ptr [8*ebx+00A1E178]
:008D5CE7 C6433200                mov [ebx+32], 00
:008D5CEB 837B2400                cmp dword ptr [ebx+24], 00000000
:008D5CEF 751A                    jne 008D5D0B
:008D5CF1 0FB64B32                movzx ecx, byte ptr [ebx+32]
:008D5CF5 80C901                  or cl, 01
:008D5CF8 89DA                    mov edx, ebx
:008D5CFA 83C232                  add edx, 00000032
:008D5CFD 8995E4FDFFFF            mov dword ptr [ebp+FFFFFDE4], edx
:008D5D03 8B95E4FDFFFF            mov edx, dword ptr [ebp+FFFFFDE4]
:008D5D09 880A                    mov byte ptr [edx], cl

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D5CEF(C)
|
:008D5D0B 0FB65333                movzx edx, byte ptr [ebx+33]
:008D5D0F 0FB64B32                movzx ecx, byte ptr [ebx+32]
:008D5D13 0FB6D2                  movzx edx, dl
:008D5D16 0FB6C9                  movzx ecx, cl
:008D5D19 21CA                    and edx, ecx
:008D5D1B 80FA00                  cmp dl, 00
:008D5D1E 7460                    je 008D5D80
:008D5D20 8DB5F4FDFFFF            lea esi, dword ptr [ebp+FFFFFDF4]
:008D5D26 C706CC9A9200            mov dword ptr [esi], 00929ACC
:008D5D2C C706BC9A9200            mov dword ptr [esi], 00929ABC
:008D5D32 89F3                    mov ebx, esi
:008D5D34 83C304                  add ebx, 00000004

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5D37 BF049B9200              mov edi, 00929B04
:008D5D3C 31C0                    xor eax, eax
:008D5D3E B9FFFFFFFF              mov ecx, FFFFFFFF
:008D5D43 F2                      repnz
:008D5D44 AE                      scasb
:008D5D45 B8FEFFFFFF              mov eax, FFFFFFFE
:008D5D4A 29C8                    sub eax, ecx
:008D5D4C 83C001                  add eax, 00000001
:008D5D4F 50                      push eax
:008D5D50 E85B880200              call 008FE5B0
:008D5D55 59                      pop ecx
:008D5D56 50                      push eax
:008D5D57 89D9                    mov ecx, ebx
:008D5D59 E832F2B2FF              call 00404F90
:008D5D5E 8B03                    mov eax, dword ptr [ebx]

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5D60 68049B9200              push 00929B04
:008D5D65 50                      push eax
:008D5D66 E875880200              call 008FE5E0
:008D5D6B 59                      pop ecx
:008D5D6C 59                      pop ecx
:008D5D6D 68B0464000              push 004046B0
:008D5D72 56                      push esi

* Possible StringData Ref from Data Obj ->"!std::exception!!std::ios_base::failure!!"
                                  |
:008D5D73 6894319900              push 00993194
:008D5D78 E8239C0200              call 008FF9A0
:008D5D7D 83C40C                  add esp, 0000000C

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D5D1E(C)
|
:008D5D80 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D5D86 69DB90000000            imul ebx, 00000090
:008D5D8C 81C374E1A100            add ebx, 00A1E174
:008D5D92 89D9                    mov ecx, ebx
:008D5D94 83C10C                  add ecx, 0000000C
:008D5D97 E864F0B2FF              call 00404E00
:008D5D9C 83F800                  cmp eax, 00000000
:008D5D9F 0F85BF000000            jne 008D5E64
:008D5DA5 8B7304                  mov esi, dword ptr [ebx+04]
:008D5DA8 0FB65632                movzx edx, byte ptr [esi+32]
:008D5DAC 80CA04                  or dl, 04
:008D5DAF 885632                  mov byte ptr [esi+32], dl
:008D5DB2 837E2400                cmp dword ptr [esi+24], 00000000
:008D5DB6 751A                    jne 008D5DD2
:008D5DB8 0FB65E32                movzx ebx, byte ptr [esi+32]
:008D5DBC 80CB01                  or bl, 01
:008D5DBF 89F2                    mov edx, esi
:008D5DC1 83C232                  add edx, 00000032
:008D5DC4 8995B8FDFFFF            mov dword ptr [ebp+FFFFFDB8], edx
:008D5DCA 8B95B8FDFFFF            mov edx, dword ptr [ebp+FFFFFDB8]
:008D5DD0 881A                    mov byte ptr [edx], bl

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D5DB6(C)
|
:008D5DD2 0FB65633                movzx edx, byte ptr [esi+33]
:008D5DD6 0FB64E32                movzx ecx, byte ptr [esi+32]
:008D5DDA 0FB6D2                  movzx edx, dl
:008D5DDD 0FB6C9                  movzx ecx, cl
:008D5DE0 21CA                    and edx, ecx
:008D5DE2 80FA00                  cmp dl, 00
:008D5DE5 747D                    je 008D5E64
:008D5DE7 8D85D4FDFFFF            lea eax, dword ptr [ebp+FFFFFDD4]
:008D5DED 8985A8FDFFFF            mov dword ptr [ebp+FFFFFDA8], eax
:008D5DF3 8B85A8FDFFFF            mov eax, dword ptr [ebp+FFFFFDA8]
:008D5DF9 C700CC9A9200            mov dword ptr [eax], 00929ACC
:008D5DFF 8B85A8FDFFFF            mov eax, dword ptr [ebp+FFFFFDA8]
:008D5E05 C700BC9A9200            mov dword ptr [eax], 00929ABC
:008D5E0B 8B9DA8FDFFFF            mov ebx, dword ptr [ebp+FFFFFDA8]
:008D5E11 83C304                  add ebx, 00000004

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5E14 BF049B9200              mov edi, 00929B04
:008D5E19 31C0                    xor eax, eax
:008D5E1B B9FFFFFFFF              mov ecx, FFFFFFFF
:008D5E20 F2                      repnz
:008D5E21 AE                      scasb
:008D5E22 B8FEFFFFFF              mov eax, FFFFFFFE
:008D5E27 29C8                    sub eax, ecx
:008D5E29 83C001                  add eax, 00000001
:008D5E2C 50                      push eax
:008D5E2D E87E870200              call 008FE5B0
:008D5E32 59                      pop ecx
:008D5E33 50                      push eax
:008D5E34 89D8                    mov eax, ebx
:008D5E36 89C1                    mov ecx, eax
:008D5E38 E853F1B2FF              call 00404F90
:008D5E3D 8B03                    mov eax, dword ptr [ebx]

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5E3F 68049B9200              push 00929B04
:008D5E44 50                      push eax
:008D5E45 E896870200              call 008FE5E0
:008D5E4A 59                      pop ecx
:008D5E4B 59                      pop ecx
:008D5E4C 68B0464000              push 004046B0
:008D5E51 FFB5A8FDFFFF            push dword ptr [ebp+FFFFFDA8]

* Possible StringData Ref from Data Obj ->"!std::exception!!std::ios_base::failure!!"
                                  |
:008D5E57 6894319900              push 00993194
:008D5E5C E83F9B0200              call 008FF9A0
:008D5E61 83C40C                  add esp, 0000000C

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:008D5D9F(C), :008D5DE5(C)
|
:008D5E64 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D5E6A 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:008D5E6D 01DB                    add ebx, ebx
:008D5E6F 8B1CDD78E1A100          mov ebx, dword ptr [8*ebx+00A1E178]
:008D5E76 C6433200                mov [ebx+32], 00
:008D5E7A 837B2400                cmp dword ptr [ebx+24], 00000000
:008D5E7E 751A                    jne 008D5E9A
:008D5E80 0FB64B32                movzx ecx, byte ptr [ebx+32]
:008D5E84 80C901                  or cl, 01
:008D5E87 89DA                    mov edx, ebx
:008D5E89 83C232                  add edx, 00000032
:008D5E8C 8995E0FDFFFF            mov dword ptr [ebp+FFFFFDE0], edx
:008D5E92 8B95E0FDFFFF            mov edx, dword ptr [ebp+FFFFFDE0]
:008D5E98 880A                    mov byte ptr [edx], cl

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D5E7E(C)
|
:008D5E9A 0FB65333                movzx edx, byte ptr [ebx+33]
:008D5E9E 0FB64B32                movzx ecx, byte ptr [ebx+32]
:008D5EA2 0FB6D2                  movzx edx, dl
:008D5EA5 0FB6C9                  movzx ecx, cl
:008D5EA8 21CA                    and edx, ecx
:008D5EAA 80FA00                  cmp dl, 00
:008D5EAD 747D                    je 008D5F2C
:008D5EAF 8D85E8FDFFFF            lea eax, dword ptr [ebp+FFFFFDE8]
:008D5EB5 8985ACFDFFFF            mov dword ptr [ebp+FFFFFDAC], eax
:008D5EBB 8B85ACFDFFFF            mov eax, dword ptr [ebp+FFFFFDAC]
:008D5EC1 C700CC9A9200            mov dword ptr [eax], 00929ACC
:008D5EC7 8B85ACFDFFFF            mov eax, dword ptr [ebp+FFFFFDAC]
:008D5ECD C700BC9A9200            mov dword ptr [eax], 00929ABC
:008D5ED3 8B9DACFDFFFF            mov ebx, dword ptr [ebp+FFFFFDAC]
:008D5ED9 83C304                  add ebx, 00000004

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5EDC BF049B9200              mov edi, 00929B04
:008D5EE1 31C0                    xor eax, eax
:008D5EE3 B9FFFFFFFF              mov ecx, FFFFFFFF
:008D5EE8 F2                      repnz
:008D5EE9 AE                      scasb
:008D5EEA B8FEFFFFFF              mov eax, FFFFFFFE
:008D5EEF 29C8                    sub eax, ecx
:008D5EF1 83C001                  add eax, 00000001
:008D5EF4 50                      push eax
:008D5EF5 E8B6860200              call 008FE5B0
:008D5EFA 59                      pop ecx
:008D5EFB 50                      push eax
:008D5EFC 89D8                    mov eax, ebx
:008D5EFE 89C1                    mov ecx, eax
:008D5F00 E88BF0B2FF              call 00404F90
:008D5F05 8B03                    mov eax, dword ptr [ebx]

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5F07 68049B9200              push 00929B04
:008D5F0C 50                      push eax
:008D5F0D E8CE860200              call 008FE5E0
:008D5F12 59                      pop ecx
:008D5F13 59                      pop ecx
:008D5F14 68B0464000              push 004046B0
:008D5F19 FFB5ACFDFFFF            push dword ptr [ebp+FFFFFDAC]

* Possible StringData Ref from Data Obj ->"!std::exception!!std::ios_base::failure!!"
                                  |
:008D5F1F 6894319900              push 00993194
:008D5F24 E8779A0200              call 008FF9A0
:008D5F29 83C40C                  add esp, 0000000C

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D5EAD(C)
|
:008D5F2C 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D5F32 69DB90000000            imul ebx, 00000090
:008D5F38 81C374E1A100            add ebx, 00A1E174
:008D5F3E 89D9                    mov ecx, ebx
:008D5F40 83C10C                  add ecx, 0000000C
:008D5F43 6A08                    push 00000008
:008D5F45 8D8500FEFFFF            lea eax, dword ptr [ebp+FFFFFE00]
:008D5F4B 50                      push eax
:008D5F4C E8AFE8B2FF              call 00404800
:008D5F51 83F800                  cmp eax, 00000000
:008D5F54 0F85BF000000            jne 008D6019
:008D5F5A 8B7304                  mov esi, dword ptr [ebx+04]
:008D5F5D 0FB65632                movzx edx, byte ptr [esi+32]
:008D5F61 80CA04                  or dl, 04
:008D5F64 885632                  mov byte ptr [esi+32], dl
:008D5F67 837E2400                cmp dword ptr [esi+24], 00000000
:008D5F6B 751A                    jne 008D5F87
:008D5F6D 0FB65E32                movzx ebx, byte ptr [esi+32]
:008D5F71 80CB01                  or bl, 01
:008D5F74 89F2                    mov edx, esi
:008D5F76 83C232                  add edx, 00000032
:008D5F79 8995B4FDFFFF            mov dword ptr [ebp+FFFFFDB4], edx
:008D5F7F 8B95B4FDFFFF            mov edx, dword ptr [ebp+FFFFFDB4]
:008D5F85 881A                    mov byte ptr [edx], bl

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D5F6B(C)
|
:008D5F87 0FB65633                movzx edx, byte ptr [esi+33]
:008D5F8B 0FB64E32                movzx ecx, byte ptr [esi+32]
:008D5F8F 0FB6D2                  movzx edx, dl
:008D5F92 0FB6C9                  movzx ecx, cl
:008D5F95 21CA                    and edx, ecx
:008D5F97 80FA00                  cmp dl, 00
:008D5F9A 747D                    je 008D6019
:008D5F9C 8D85C8FDFFFF            lea eax, dword ptr [ebp+FFFFFDC8]
:008D5FA2 8985A4FDFFFF            mov dword ptr [ebp+FFFFFDA4], eax
:008D5FA8 8B85A4FDFFFF            mov eax, dword ptr [ebp+FFFFFDA4]
:008D5FAE C700CC9A9200            mov dword ptr [eax], 00929ACC
:008D5FB4 8B85A4FDFFFF            mov eax, dword ptr [ebp+FFFFFDA4]
:008D5FBA C700BC9A9200            mov dword ptr [eax], 00929ABC
:008D5FC0 8B9DA4FDFFFF            mov ebx, dword ptr [ebp+FFFFFDA4]
:008D5FC6 83C304                  add ebx, 00000004

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5FC9 BF049B9200              mov edi, 00929B04
:008D5FCE 31C0                    xor eax, eax
:008D5FD0 B9FFFFFFFF              mov ecx, FFFFFFFF
:008D5FD5 F2                      repnz
:008D5FD6 AE                      scasb
:008D5FD7 B8FEFFFFFF              mov eax, FFFFFFFE
:008D5FDC 29C8                    sub eax, ecx
:008D5FDE 83C001                  add eax, 00000001
:008D5FE1 50                      push eax
:008D5FE2 E8C9850200              call 008FE5B0
:008D5FE7 59                      pop ecx
:008D5FE8 50                      push eax
:008D5FE9 89D8                    mov eax, ebx
:008D5FEB 89C1                    mov ecx, eax
:008D5FED E89EEFB2FF              call 00404F90
:008D5FF2 8B03                    mov eax, dword ptr [ebx]

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:008D5FF4 68049B9200              push 00929B04
:008D5FF9 50                      push eax
:008D5FFA E8E1850200              call 008FE5E0
:008D5FFF 59                      pop ecx
:008D6000 59                      pop ecx
:008D6001 68B0464000              push 004046B0
:008D6006 FFB5A4FDFFFF            push dword ptr [ebp+FFFFFDA4]

* Possible StringData Ref from Data Obj ->"!std::exception!!std::ios_base::failure!!"
                                  |
:008D600C 6894319900              push 00993194
:008D6011 E88A990200              call 008FF9A0
:008D6016 83C40C                  add esp, 0000000C

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:008D5F54(C), :008D5F9A(C)
|
:008D6019 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D601F 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:008D6022 01DB                    add ebx, ebx
:008D6024 8B14DD78E1A100          mov edx, dword ptr [8*ebx+00A1E178]
:008D602B 0FB65232                movzx edx, byte ptr [edx+32]
:008D602F 0FB6C2                  movzx eax, dl
:008D6032 83E004                  and eax, 00000004
:008D6035 3C00                    cmp al, 00
:008D6037 740D                    je 008D6046
:008D6039 B800000000              mov eax, 00000000
:008D603E 8D65F4                  lea esp, dword ptr [ebp-0C]
:008D6041 5F                      pop edi
:008D6042 5E                      pop esi
:008D6043 5B                      pop ebx
:008D6044 5D                      pop ebp
:008D6045 C3                      ret



* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D6037(C)
|
:008D6046 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D604C 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:008D604F 01DB                    add ebx, ebx
:008D6051 8B14DD78E1A100          mov edx, dword ptr [8*ebx+00A1E178]
:008D6058 0FB65232                movzx edx, byte ptr [edx+32]
:008D605C 0FB6C2                  movzx eax, dl
:008D605F 83E001                  and eax, 00000001
:008D6062 3C00                    cmp al, 00
:008D6064 740D                    je 008D6073
:008D6066 B800000000              mov eax, 00000000
:008D606B 8D65F4                  lea esp, dword ptr [ebp-0C]
:008D606E 5F                      pop edi
:008D606F 5E                      pop esi
:008D6070 5B                      pop ebx
:008D6071 5D                      pop ebp
:008D6072 C3                      ret



* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D6064(C)
|
:008D6073 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D6079 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:008D607C 01DB                    add ebx, ebx
:008D607E 8B14DD78E1A100          mov edx, dword ptr [8*ebx+00A1E178]
:008D6085 0FB65232                movzx edx, byte ptr [edx+32]
:008D6089 0FB6C2                  movzx eax, dl
:008D608C 83E002                  and eax, 00000002
:008D608F 3C00                    cmp al, 00
:008D6091 740D                    je 008D60A0
:008D6093 B800000000              mov eax, 00000000
:008D6098 8D65F4                  lea esp, dword ptr [ebp-0C]
:008D609B 5F                      pop edi
:008D609C 5E                      pop esi
:008D609D 5B                      pop ebx
:008D609E 5D                      pop ebp
:008D609F C3                      ret



* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:008D6091(C)
|
:008D60A0 8B1D64E1A100            mov ebx, dword ptr [00A1E164]
:008D60A6 69DB90000000            imul ebx, 00000090
:008D60AC 81C374E1A100            add ebx, 00A1E174
 


howto-create-crack/code.txt

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0059FD68(U)
|
:0059FDB1 83BDDCFDFFFF31          cmp dword ptr [ebp+FFFFFDDC], 00000031
:0059FDB8 7CB0                    jl 0059FD6A
:0059FDBA 6814E60008              push 0800E614

* Possible StringData Ref from Data Obj ->"FIDELITY BUILD.txt"
                                  |
:0059FDBF 68F2239700              push 009723F2
:0059FDC4 E85766EBFF              call 00456420
:0059FDC9 59                      pop ecx
:0059FDCA 59                      pop ecx
:0059FDCB 6808E80008              push 0800E808

* Possible StringData Ref from Data Obj ->"X-System 7.00 Beta-0 For Macintosh.sit"
                                  |
:0059FDD0 6805249700              push 00972405
:0059FDD5 E84666EBFF              call 00456420
:0059FDDA 59                      pop ecx
:0059FDDB 59                      pop ecx
:0059FDDC E85FD5ECFF              call 0046D340
:0059FDE1 C785D4FDFFFF00000000    mov dword ptr [ebp+FFFFFDD4], 00000000
:0059FDEB C785D0FDFFFF00000000    mov dword ptr [ebp+FFFFFDD0], 00000000
:0059FDF5 6A01                    push 00000001
:0059FDF7 6808E80008              push 0800E808
:0059FDFC E89F5E3300              call 008D5CA0
:0059FE01 59                      pop ecx
:0059FE02 59                      pop ecx
:0059FE03 8985D4FDFFFF            mov dword ptr [ebp+FFFFFDD4], eax
:0059FE09 83BDD4FDFFFF00          cmp dword ptr [ebp+FFFFFDD4], 00000000
:0059FE10 7514                    jne 0059FE26
:0059FE12 6A01                    push 00000001
:0059FE14 6814E60008              push 0800E614
:0059FE19 E8825E3300              call 008D5CA0
:0059FE1E 59                      pop ecx
:0059FE1F 59                      pop ecx
:0059FE20 8985D0FDFFFF            mov dword ptr [ebp+FFFFFDD0], eax

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0059FE10(C)
|
:0059FE26 B200                    mov dl, 00
:0059FE28 83BDD0FDFFFF00          cmp dword ptr [ebp+FFFFFDD0], 00000000
:0059FE2F 750B                    jne 0059FE3C
:0059FE31 83BDD4FDFFFF00          cmp dword ptr [ebp+FFFFFDD4], 00000000
:0059FE38 7502                    jne 0059FE3C
:0059FE3A B201                    mov dl, 01

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0059FE2F(C), :0059FE38(C)
|
:0059FE3C 0FB6D2                  movzx edx, dl
:0059FE3F 8915302B4D03            mov dword ptr [034D2B30], edx
:0059FE45 8B85D0FDFFFF            mov eax, dword ptr [ebp+FFFFFDD0]
:0059FE4B A394EC4003              mov dword ptr [0340EC94], eax

* Possible StringData Ref from Data Obj ->"Will init gen."
                                  |
:0059FE50 682C249700              push 0097242C
:0059FE55 E8E6C1ECFF              call 0046C040
:0059FE5A 59                      pop ecx
:0059FE5B E800B4F5FF              call 004FB260

* Possible StringData Ref from Data Obj ->"Will handle general prefs."
                                  |
:0059FE60 683B249700              push 0097243B
:0059FE65 E8D6C1ECFF              call 0046C040



howto-create-crack/howto.txt

How-to crack X-Plane 7.00 Beta-3
Used disassembler W32Dasm version 8.9

1) disasemble X-Plane 700 Beta-3.exe
2) find string "FIDELITY BUILD.txt" - is in the location code.txt :0059FDBA
3) function called from addres :0059FDFC - call 008D5CA0 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and non zero value, if found in CD-ROM original CD.
4) is demand ensure, that the function "function.txt" always returns in register EAX non zero value.
5) return from this function is possible from this addreses :008D6045, :008D6072, :008D609F and more. In first time clear instruction je 008D6046 (don't jump to another test code) and always return non zero value. Replace clearing register eax  : mov eax, 00000000 <- mov eax, 00000001.
6) in this location :008D6037 is demand this code: "740D je 008D6046 , B800000000 mov eax, 00000000" replace this new code: "9090 -- nop, nop  , B801000000 mov eax, 00000001"
7) In hexaeditor is this code at there position 4D5437  replace this "74 0D B8 00" herewith : "90 90 B8 01".

thats all; 




howto-crack.txt

Copy "X-Plane 700 Beta-3 crack.exe" to your directory contains file "X-Plane 700 Beta-3.exe".
Run "X-Plane 700 Beta-3 crack.exe".
Use button "Patch".

thats all;      http://cracker.bohemian.net/


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z