Download X-Plane v7.00 Beta 1 crack

Added to site2005-02-12
Rating90/100
Votes6


xplanev7.00beta1crack.zip (6702 bytes)

namesizecompressed
howto-create-crack/ 0 0
howto-create-crack/function.txt 14379 2516
howto-create-crack/code.txt 3630 1014
howto-create-crack/howto.txt 957 516
howto-crack.txt 225 143
X-Plane 700 Beta-1 crack.exe 5150 1739

howto-create-crack/function.txt

* Referenced by a CALL at Addresses:
|:0045ACC1   , :0045ACD0   , :004F01C7   , :004F01D4   , :0055880F   
|:0055881C   
|
:004AA5C0 55                      push ebp
:004AA5C1 89E5                    mov ebp, esp
:004AA5C3 8D95C4FDFFFF            lea edx, dword ptr [ebp+FFFFFDC4]
:004AA5C9 53                      push ebx
:004AA5CA 56                      push esi
:004AA5CB 57                      push edi
:004AA5CC 81EC3C020000            sub esp, 0000023C
:004AA5D2 52                      push edx
:004AA5D3 FF7508                  push [ebp+08]
:004AA5D6 68EC758600              push 008675EC
:004AA5DB E810D0F9FF              call 004475F0
:004AA5E0 8B0D74B68600            mov ecx, dword ptr [0086B674]
:004AA5E6 8D0CC9                  lea ecx, dword ptr [ecx+8*ecx]
:004AA5E9 01C9                    add ecx, ecx
:004AA5EB 8B3CCD7CB68600          mov edi, dword ptr [8*ecx+0086B67C]
:004AA5F2 83C40C                  add esp, 0000000C
:004AA5F5 C6473200                mov [edi+32], 00
:004AA5F9 837F2400                cmp dword ptr [edi+24], 00000000
:004AA5FD 7509                    jne 004AA608
:004AA5FF 0FB64732                movzx eax, byte ptr [edi+32]
:004AA603 0C01                    or al, 01
:004AA605 884732                  mov byte ptr [edi+32], al

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA5FD(C)
|
:004AA608 0FB64733                movzx eax, byte ptr [edi+33]
:004AA60C 0FB6C8                  movzx ecx, al
:004AA60F 0FB65732                movzx edx, byte ptr [edi+32]
:004AA613 0FB6C2                  movzx eax, dl
:004AA616 21C1                    and ecx, eax
:004AA618 84C9                    test cl, cl
:004AA61A 7454                    je 004AA670
:004AA61C C745DC7C698000          mov [ebp-24], 0080697C

* Possible StringData Ref from Data Obj ->"PA@"
                                  |
:004AA623 C745DC6C698000          mov [ebp-24], 0080696C

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA62A 6884698000              push 00806984
:004AA62F 8D75DC                  lea esi, dword ptr [ebp-24]
:004AA632 8D5DE0                  lea ebx, dword ptr [ebp-20]
:004AA635 E886F43300              call 007E9AC0
:004AA63A 83C001                  add eax, 00000001
:004AA63D 59                      pop ecx
:004AA63E 50                      push eax
:004AA63F E8DCFB3300              call 007EA220
:004AA644 59                      pop ecx
:004AA645 50                      push eax
:004AA646 89D9                    mov ecx, ebx
:004AA648 E8939FF5FF              call 004045E0

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA64D 6884698000              push 00806984
:004AA652 FF33                    push dword ptr [ebx]
:004AA654 E887F43300              call 007E9AE0
:004AA659 59                      pop ecx
:004AA65A 59                      pop ecx
:004AA65B 6820414000              push 00404120
:004AA660 56                      push esi
:004AA661 68DCBA9D07              push 079DBADC
:004AA666 E8850D3400              call 007EB3F0
:004AA66B 89C0                    mov eax, eax
:004AA66D 8D4000                  lea eax, dword ptr [eax+00]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA61A(C)
|
:004AA670 8B3D74B68600            mov edi, dword ptr [0086B674]
:004AA676 69FF90000000            imul edi, 00000090
:004AA67C 81C778B68600            add edi, 0086B678
:004AA682 8D4F0C                  lea ecx, dword ptr [edi+0C]
:004AA685 E8769EF5FF              call 00404500
:004AA68A 85C0                    test eax, eax
:004AA68C 0F8590000000            jne 004AA722
:004AA692 8B7704                  mov esi, dword ptr [edi+04]
:004AA695 0FB64E32                movzx ecx, byte ptr [esi+32]
:004AA699 80C904                  or cl, 04
:004AA69C 884E32                  mov byte ptr [esi+32], cl
:004AA69F 837E2400                cmp dword ptr [esi+24], 00000000
:004AA6A3 7509                    jne 004AA6AE
:004AA6A5 0FB64632                movzx eax, byte ptr [esi+32]
:004AA6A9 0C01                    or al, 01
:004AA6AB 884632                  mov byte ptr [esi+32], al

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA6A3(C)
|
:004AA6AE 0FB64633                movzx eax, byte ptr [esi+33]
:004AA6B2 0FB64E32                movzx ecx, byte ptr [esi+32]
:004AA6B6 0FB6D0                  movzx edx, al
:004AA6B9 0FB6C9                  movzx ecx, cl
:004AA6BC 21CA                    and edx, ecx
:004AA6BE 84D2                    test dl, dl
:004AA6C0 7460                    je 004AA722
:004AA6C2 8D85B8FDFFFF            lea eax, dword ptr [ebp+FFFFFDB8]
:004AA6C8 8945B8                  mov dword ptr [ebp-48], eax
:004AA6CB C785B8FDFFFF7C698000    mov dword ptr [ebp+FFFFFDB8], 0080697C

* Possible StringData Ref from Data Obj ->"PA@"
                                  |
:004AA6D5 C785B8FDFFFF6C698000    mov dword ptr [ebp+FFFFFDB8], 0080696C

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA6DF 6884698000              push 00806984
:004AA6E4 8D9DBCFDFFFF            lea ebx, dword ptr [ebp+FFFFFDBC]
:004AA6EA E8D1F33300              call 007E9AC0
:004AA6EF 83C001                  add eax, 00000001
:004AA6F2 59                      pop ecx
:004AA6F3 50                      push eax
:004AA6F4 E827FB3300              call 007EA220
:004AA6F9 59                      pop ecx
:004AA6FA 50                      push eax
:004AA6FB 89D9                    mov ecx, ebx
:004AA6FD E8DE9EF5FF              call 004045E0

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA702 6884698000              push 00806984
:004AA707 FF33                    push dword ptr [ebx]
:004AA709 E8D2F33300              call 007E9AE0
:004AA70E 59                      pop ecx
:004AA70F 59                      pop ecx
:004AA710 6820414000              push 00404120
:004AA715 FF75B8                  push [ebp-48]
:004AA718 68DCBA9D07              push 079DBADC
:004AA71D E8CE0C3400              call 007EB3F0

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004AA68C(C), :004AA6C0(C)
|
:004AA722 8B3574B68600            mov esi, dword ptr [0086B674]
:004AA728 8D34F6                  lea esi, dword ptr [esi+8*esi]
:004AA72B 01F6                    add esi, esi
:004AA72D 8B3CF57CB68600          mov edi, dword ptr [8*esi+0086B67C]
:004AA734 C6473200                mov [edi+32], 00
:004AA738 837F2400                cmp dword ptr [edi+24], 00000000
:004AA73C 7509                    jne 004AA747
:004AA73E 0FB64732                movzx eax, byte ptr [edi+32]
:004AA742 0C01                    or al, 01
:004AA744 884732                  mov byte ptr [edi+32], al

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA73C(C)
|
:004AA747 0FB64733                movzx eax, byte ptr [edi+33]
:004AA74B 0FB64F32                movzx ecx, byte ptr [edi+32]
:004AA74F 0FB6D0                  movzx edx, al
:004AA752 0FB6C9                  movzx ecx, cl
:004AA755 21CA                    and edx, ecx
:004AA757 84D2                    test dl, dl
:004AA759 7455                    je 004AA7B0
:004AA75B 8D45E8                  lea eax, dword ptr [ebp-18]
:004AA75E 8945C0                  mov dword ptr [ebp-40], eax
:004AA761 C745E87C698000          mov [ebp-18], 0080697C

* Possible StringData Ref from Data Obj ->"PA@"
                                  |
:004AA768 C745E86C698000          mov [ebp-18], 0080696C

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA76F 6884698000              push 00806984
:004AA774 8D5DEC                  lea ebx, dword ptr [ebp-14]
:004AA777 E844F33300              call 007E9AC0
:004AA77C 83C001                  add eax, 00000001
:004AA77F 59                      pop ecx
:004AA780 50                      push eax
:004AA781 E89AFA3300              call 007EA220
:004AA786 59                      pop ecx
:004AA787 50                      push eax
:004AA788 89D9                    mov ecx, ebx
:004AA78A E8519EF5FF              call 004045E0

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA78F 6884698000              push 00806984
:004AA794 FF33                    push dword ptr [ebx]
:004AA796 E845F33300              call 007E9AE0
:004AA79B 59                      pop ecx
:004AA79C 59                      pop ecx
:004AA79D 6820414000              push 00404120
:004AA7A2 FF75C0                  push [ebp-40]
:004AA7A5 68DCBA9D07              push 079DBADC
:004AA7AA E8410C3400              call 007EB3F0
:004AA7AF 90                      nop

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA759(C)
|
:004AA7B0 8B3D74B68600            mov edi, dword ptr [0086B674]
:004AA7B6 69FF90000000            imul edi, 00000090
:004AA7BC 8DB5C4FDFFFF            lea esi, dword ptr [ebp+FFFFFDC4]
:004AA7C2 6A08                    push 00000008
:004AA7C4 56                      push esi
:004AA7C5 81C778B68600            add edi, 0086B678
:004AA7CB 8D4F0C                  lea ecx, dword ptr [edi+0C]
:004AA7CE E84D9AF5FF              call 00404220
:004AA7D3 85C0                    test eax, eax
:004AA7D5 0F8585000000            jne 004AA860
:004AA7DB 8B7704                  mov esi, dword ptr [edi+04]
:004AA7DE 0FB64632                movzx eax, byte ptr [esi+32]
:004AA7E2 0C04                    or al, 04
:004AA7E4 884632                  mov byte ptr [esi+32], al
:004AA7E7 837E2400                cmp dword ptr [esi+24], 00000000
:004AA7EB 750A                    jne 004AA7F7
:004AA7ED 0FB65632                movzx edx, byte ptr [esi+32]
:004AA7F1 80CA01                  or dl, 01
:004AA7F4 885632                  mov byte ptr [esi+32], dl

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA7EB(C)
|
:004AA7F7 0FB65633                movzx edx, byte ptr [esi+33]
:004AA7FB 0FB64632                movzx eax, byte ptr [esi+32]
:004AA7FF 0FB6CA                  movzx ecx, dl
:004AA802 0FB6C0                  movzx eax, al
:004AA805 21C1                    and ecx, eax
:004AA807 84C9                    test cl, cl
:004AA809 7455                    je 004AA860
:004AA80B 8D45D0                  lea eax, dword ptr [ebp-30]
:004AA80E 8945BC                  mov dword ptr [ebp-44], eax
:004AA811 C745D07C698000          mov [ebp-30], 0080697C

* Possible StringData Ref from Data Obj ->"PA@"
                                  |
:004AA818 C745D06C698000          mov [ebp-30], 0080696C

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA81F 6884698000              push 00806984
:004AA824 8D5DD4                  lea ebx, dword ptr [ebp-2C]
:004AA827 E894F23300              call 007E9AC0
:004AA82C 83C001                  add eax, 00000001
:004AA82F 59                      pop ecx
:004AA830 50                      push eax
:004AA831 E8EAF93300              call 007EA220
:004AA836 59                      pop ecx
:004AA837 50                      push eax
:004AA838 89D9                    mov ecx, ebx
:004AA83A E8A19DF5FF              call 004045E0

* Possible StringData Ref from Data Obj ->"ios_base failure in clear"
                                  |
:004AA83F 6884698000              push 00806984
:004AA844 FF33                    push dword ptr [ebx]
:004AA846 E895F23300              call 007E9AE0
:004AA84B 59                      pop ecx
:004AA84C 59                      pop ecx
:004AA84D 6820414000              push 00404120
:004AA852 FF75BC                  push [ebp-44]
:004AA855 68DCBA9D07              push 079DBADC
:004AA85A E8910B3400              call 007EB3F0
:004AA85F 90                      nop

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004AA7D5(C), :004AA809(C)
|
:004AA860 8B1574B68600            mov edx, dword ptr [0086B674]
:004AA866 69D290000000            imul edx, 00000090
:004AA86C 8BB27CB68600            mov esi, dword ptr [edx+0086B67C]
:004AA872 0FB64E32                movzx ecx, byte ptr [esi+32]
:004AA876 0FB6C1                  movzx eax, cl
:004AA879 83E004                  and eax, 00000004
:004AA87C 84C0                    test al, al
:004AA87E 7410                    je 004AA890
:004AA880 8D65F4                  lea esp, dword ptr [ebp-0C]
:004AA883 5F                      pop edi
:004AA884 5E                      pop esi
:004AA885 31C0                    xor eax, eax
:004AA887 5B                      pop ebx
:004AA888 5D                      pop ebp
:004AA889 C3                      ret


:004AA88A 8D8000000000            lea eax, dword ptr [eax+00000000]

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA87E(C)
|
:004AA890 0FB6C1                  movzx eax, cl
:004AA893 83E001                  and eax, 00000001
:004AA896 84C0                    test al, al
:004AA898 740A                    je 004AA8A4
:004AA89A 8D65F4                  lea esp, dword ptr [ebp-0C]
:004AA89D 5F                      pop edi
:004AA89E 5E                      pop esi
:004AA89F 31C0                    xor eax, eax
:004AA8A1 5B                      pop ebx
:004AA8A2 5D                      pop ebp
:004AA8A3 C3                      ret



* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004AA898(C)
|
:004AA8A4 0FB6C1                  movzx eax, cl
:004AA8A7 83E002                  and eax, 00000002
:004AA8AA 84C0                    test al, al
:004AA8AC 740A                    je 004AA8B8
:004AA8AE 8D65F4                  lea esp, dword ptr [ebp-0C]
:004AA8B1 5F                      pop edi
:004AA8B2 5E                      pop esi
:004AA8B3 31C0                    xor eax, eax
:004AA8B5 5B                      pop ebx
:004AA8B6 5D                      pop ebp
:004AA8B7 C3                      ret




howto-create-crack/code.txt

:004F0185 6885269E07              push 079E2685

* Possible StringData Ref from Data Obj ->"No VERSION-7 CD found! X-Plane "
                                        ->"is operating in demo mode."
                                  |
:004F018A 68AF269E07              push 079E26AF
:004F018F 6A00                    push 00000000
:004F0191 C705DC98140801000000    mov dword ptr [081498DC], 00000001
:004F019B DDD8                    fstp st(0)
:004F019D E8EE37F6FF              call 00453990
:004F01A2 83C418                  add esp, 00000018
:004F01A5 C705E498140801000000    mov dword ptr [081498E4], 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004F1C99(U), :004F1CA2(U), :004F1CA9(U)
|
:004F01AF 833DE498140800          cmp dword ptr [081498E4], 00000000
:004F01B6 7461                    je 004F0219
:004F01B8 68B409E907              push 07E909B4
:004F01BD C705E498140800000000    mov dword ptr [081498E4], 00000000
:004F01C7 E8F4A3FBFF              call 004AA5C0
:004F01CC 59                      pop ecx
:004F01CD 89C6                    mov esi, eax
:004F01CF 68A80BE907              push 07E90BA8
:004F01D4 E8E7A3FBFF              call 004AA5C0
:004F01D9 85F6                    test esi, esi
:004F01DB 59                      pop ecx
:004F01DC 0F94C2                  sete dl
:004F01DF 7505                    jne 004F01E6
:004F01E1 85C0                    test eax, eax
:004F01E3 0F94C2                  sete dl

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:004F01DF(C)
|
:004F01E6 0FB6D2                  movzx edx, dl
:004F01E9 89158C3C3103            mov dword ptr [03313C8C], edx
:004F01EF 85D2                    test edx, edx
:004F01F1 893510FE2403            mov dword ptr [0324FE10], esi
:004F01F7 7520                    jne 004F0219
:004F01F9 6A0F                    push 0000000F
:004F01FB 68E9269E07              push 079E26E9

* Possible StringData Ref from Data Obj ->"Next time put the CD in before "
                                        ->"you start X-Plane to avoid this "
                                        ->"annoyance!"
                                  |
:004F0200 68EA269E07              push 079E26EA

* Possible StringData Ref from Data Obj ->"I am taking you out of demo mode "
                                        ->"now!"
                                  |
:004F0205 6834279E07              push 079E2734

* Possible StringData Ref from Data Obj ->"OK I found the CD!"
                                  |
:004F020A 685A279E07              push 079E275A
:004F020F 6A00                    push 00000000
:004F0211 E87A37F6FF              call 00453990
:004F0216 83C418                  add esp, 00000018

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:004F01B6(C), :004F01F7(C)
|
:004F0219 833D8C3C310300          cmp dword ptr [03313C8C], 00000000
:004F0220 0F8498000000            je 004F02BE
:004F0226 D905383C3103            fld dword ptr [03313C38]
:004F022C D81D90209E07            fcomp dword ptr [079E2090]
:004F0232 DFE0                    fstsw ax
:004F0234 F6C445                  test ah, 45
:004F0237 0F8581000000            jne 004F02BE
:004F023D 833DE098140800          cmp dword ptr [081498E0], 00000000
:004F0244 7578                    jne 004F02BE
:004F0246 686CB48600              push 0086B46C
:004F024B 68EC758600              push 008675EC

* Possible StringData Ref from Data Obj ->"I do not detect an X-Plane VERSION-7 "
                                        ->"CD in the following drive: "



howto-create-crack/howto.txt

How-to crack X-Plane 7.00 Beta-1
Used disassembler W32Dasm version 8.9

1) disasemble X-Plane 7.00 Beta-1.exe
2) find string "I do not detect an X-Plane VERSION-7" - is in the location code.txt :004F024B
3) function called from addres :004F01C7 - call 004AA5C0 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and non zero value, if found in CD-ROM original CD.
4) is demand ensure, that the function "function.txt" always returns in register EAX non zero value.
5) return from this function is possible from this addreses :004AA889, :004AA8A3, :004AA8B7. 3 instructions back is clearing eax "xor eax,eax".
6) in this 3 locations :004AA885, :004AA89F, :004AA8B3 is demand this code: "31C0 -- xor eax, eax" replace this new code: "9090 -- nop, nop"
7) In hexaeditor are this codes at there positions A9C85, A9C9F, A9CB3  replace this "31 C0" herewith : "90 90".

thats all; 






howto-crack.txt

Crack for X-Plane v7.00 Beta-1
Copy "X-Plane 700 Beta-1 crack.exe" to your directory contains file "X-Plane 700 Beta-1.exe".
Run "X-Plane 700 Beta-1 crack.exe".
Use button "Patch".

thats all; 


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z