Download X-Plane v6.40 crack by X-Plane

Added to site2003-12-31
Rating90/100
Votes6


xplanev6.40crackxplane.zip (5564 bytes)

namesizecompressed
howto-create-crack/ 0 0
howto-create-crack/function.txt 5349 1057
howto-create-crack/code.txt 5948 1377
howto-create-crack/howto.txt 1034 522
howto-crack.txt 172 126
X-Plane 640 crack.exe 5135 1722

howto-create-crack/function.txt


* Referenced by a CALL at Addresses:
|:00440C99   , :00440CA9   , :0046D68F   , :0046D6A0   , :004A0C50   
|:004A0C61   
|
:0044E692 55                      push ebp
:0044E693 89E5                    mov ebp, esp
:0044E695 53                      push ebx
:0044E696 81ECF8010000            sub esp, 000001F8
:0044E69C 57                      push edi
:0044E69D B8CCCCCCCC              mov eax, CCCCCCCC
:0044E6A2 8D7C2404                lea edi, dword ptr [esp+04]
:0044E6A6 B97E000000              mov ecx, 0000007E
:0044E6AB F3                      repz
:0044E6AC AB                      stosd
:0044E6AD 5F                      pop edi
:0044E6AE 8D8508FEFFFF            lea eax, dword ptr [ebp+FFFFFE08]
:0044E6B4 50                      push eax
:0044E6B5 FF7508                  push [ebp+08]
:0044E6B8 6890A35400              push 0054A390
:0044E6BD E84748FEFF              call 00432F09
:0044E6C2 83C40C                  add esp, 0000000C
:0044E6C5 6A00                    push 00000000
:0044E6C7 8B1DF07A1108            mov ebx, dword ptr [08117AF0]
:0044E6CD 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E6D0 01DB                    add ebx, ebx
:0044E6D2 8B0CDD74000201          mov ecx, dword ptr [8*ebx+01020074]
:0044E6D9 E8675CFBFF              call 00404345
:0044E6DE 8B0DF07A1108            mov ecx, dword ptr [08117AF0]
:0044E6E4 69C990000000            imul ecx, 00000090
:0044E6EA 81C170000201            add ecx, 01020070
:0044E6F0 E826F4FBFF              call 0040DB1B
:0044E6F5 6A00                    push 00000000
:0044E6F7 8B1DF07A1108            mov ebx, dword ptr [08117AF0]
:0044E6FD 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E700 01DB                    add ebx, ebx
:0044E702 8B0CDD74000201          mov ecx, dword ptr [8*ebx+01020074]
:0044E709 E8375CFBFF              call 00404345
:0044E70E 6A08                    push 00000008
:0044E710 8D8508FEFFFF            lea eax, dword ptr [ebp+FFFFFE08]
:0044E716 50                      push eax
:0044E717 8B0DF07A1108            mov ecx, dword ptr [08117AF0]
:0044E71D 69C990000000            imul ecx, 00000090
:0044E723 81C170000201            add ecx, 01020070
:0044E729 E8086DFCFF              call 00415436
:0044E72E 6A04                    push 00000004
:0044E730 8B1DF07A1108            mov ebx, dword ptr [08117AF0]
:0044E736 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E739 01DB                    add ebx, ebx
:0044E73B 8B0CDD74000201          mov ecx, dword ptr [8*ebx+01020074]
:0044E742 E8E75DFBFF              call 0040452E
:0044E747 50                      push eax
:0044E748 E8AF5DFBFF              call 004044FC
:0044E74D 59                      pop ecx
:0044E74E 59                      pop ecx
:0044E74F 3C00                    cmp al, 00
:0044E751 7407                    je 0044E75A
:0044E753 B800000000              mov eax, 00000000
:0044E758 EB76                    jmp 0044E7D0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044E751(C)
|
:0044E75A 6A01                    push 00000001
:0044E75C 8B1DF07A1108            mov ebx, dword ptr [08117AF0]
:0044E762 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E765 01DB                    add ebx, ebx
:0044E767 8B0CDD74000201          mov ecx, dword ptr [8*ebx+01020074]
:0044E76E E8BB5DFBFF              call 0040452E
:0044E773 50                      push eax
:0044E774 E8835DFBFF              call 004044FC
:0044E779 59                      pop ecx
:0044E77A 59                      pop ecx
:0044E77B 3C00                    cmp al, 00
:0044E77D 7407                    je 0044E786
:0044E77F B800000000              mov eax, 00000000
:0044E784 EB4A                    jmp 0044E7D0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044E77D(C)
|
:0044E786 6A02                    push 00000002
:0044E788 8B1DF07A1108            mov ebx, dword ptr [08117AF0]
:0044E78E 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E791 01DB                    add ebx, ebx
:0044E793 8B0CDD74000201          mov ecx, dword ptr [8*ebx+01020074]
:0044E79A E88F5DFBFF              call 0040452E
:0044E79F 50                      push eax
:0044E7A0 E8575DFBFF              call 004044FC
:0044E7A5 59                      pop ecx
:0044E7A6 59                      pop ecx
:0044E7A7 3C00                    cmp al, 00
:0044E7A9 7407                    je 0044E7B2
:0044E7AB B800000000              mov eax, 00000000
:0044E7B0 EB1E                    jmp 0044E7D0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044E7A9(C)
|
:0044E7B2 8B0DF07A1108            mov ecx, dword ptr [08117AF0]
:0044E7B8 69C990000000            imul ecx, 00000090
:0044E7BE 81C170000201            add ecx, 01020070
:0044E7C4 E852F3FBFF              call 0040DB1B
:0044E7C9 B801000000              mov eax, 00000001
:0044E7CE EB00                    jmp 0044E7D0

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0044E758(U), :0044E784(U), :0044E7B0(U), :0044E7CE(U)
|
:0044E7D0 8D65FC                  lea esp, dword ptr [ebp-04]
:0044E7D3 5B                      pop ebx
:0044E7D4 5D                      pop ebp
:0044E7D5 C3                      ret






howto-create-crack/code.txt

:0046D654 685BFB6000              push 0060FB5B

* Possible StringData Ref from Data Obj ->"No VERSION-6.0 CD found! X-Plane "
                                        ->"is operating in demo mode."
                                  |
:0046D659 6885FB6000              push 0060FB85
:0046D65E 6A00                    push 00000000
:0046D660 E825C4FCFF              call 00439A8A
:0046D665 83C418                  add esp, 00000018
:0046D668 C70568BC630001000000    mov dword ptr [0063BC68], 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046D620(C), :0046D633(C), :0046D63C(C)
|
:0046D672 833D68BC630000          cmp dword ptr [0063BC68], 00000000
:0046D679 0F849B000000            je 0046D71A
:0046D67F BA00000000              mov edx, 00000000
:0046D684 891568BC6300            mov dword ptr [0063BC68], edx

* Possible StringData Ref from Data Obj ->"FIDELITY BUILD.txt"
                                  |
:0046D68A 68C1FB6000              push 0060FBC1
:0046D68F E8FE0FFEFF              call 0044E692
:0046D694 59                      pop ecx
:0046D695 898530FDFFFF            mov dword ptr [ebp+FFFFFD30], eax

* Possible StringData Ref from Data Obj ->"HOW TO INSTALL VERSION 6.txt"
                                  |
:0046D69B 68D4FB6000              push 0060FBD4
:0046D6A0 E8ED0FFEFF              call 0044E692
:0046D6A5 59                      pop ecx
:0046D6A6 898534FDFFFF            mov dword ptr [ebp+FFFFFD34], eax
:0046D6AC BA00000000              mov edx, 00000000
:0046D6B1 31C0                    xor eax, eax
:0046D6B3 83BD30FDFFFF00          cmp dword ptr [ebp+FFFFFD30], 00000000
:0046D6BA 7505                    jne 0046D6C1
:0046D6BC B801000000              mov eax, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046D6BA(C)
|
:0046D6C1 83F800                  cmp eax, 00000000
:0046D6C4 741A                    je 0046D6E0
:0046D6C6 31C0                    xor eax, eax
:0046D6C8 83BD34FDFFFF00          cmp dword ptr [ebp+FFFFFD34], 00000000
:0046D6CF 7505                    jne 0046D6D6
:0046D6D1 B801000000              mov eax, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046D6CF(C)
|
:0046D6D6 83F800                  cmp eax, 00000000
:0046D6D9 7405                    je 0046D6E0
:0046D6DB BA01000000              mov edx, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046D6C4(C), :0046D6D9(C)
|
:0046D6E0 8815E4E6DD07            mov byte ptr [07DDE6E4], dl
:0046D6E6 8B8530FDFFFF            mov eax, dword ptr [ebp+FFFFFD30]
:0046D6EC A394010201              mov dword ptr [01020194], eax
:0046D6F1 803DE4E6DD0700          cmp byte ptr [07DDE6E4], 00
:0046D6F8 7520                    jne 0046D71A
:0046D6FA 6A0F                    push 0000000F
:0046D6FC 68F1FB6000              push 0060FBF1

* Possible StringData Ref from Data Obj ->"Next time put the CD in before "
                                        ->"you start X-Plane to avoid this "
                                        ->"annoyance!"
                                  |
:0046D701 68F2FB6000              push 0060FBF2

* Possible StringData Ref from Data Obj ->"I am taking you out of demo mode "
                                        ->"now!"
                                  |
:0046D706 683CFC6000              push 0060FC3C

* Possible StringData Ref from Data Obj ->"OK I found the CD!"
                                  |
:0046D70B 6862FC6000              push 0060FC62
:0046D710 6A00                    push 00000000
:0046D712 E873C3FCFF              call 00439A8A
:0046D717 83C418                  add esp, 00000018

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046D679(C), :0046D6F8(C)
|
:0046D71A 803DE4E6DD0700          cmp byte ptr [07DDE6E4], 00
:0046D721 0F8498000000            je 0046D7BF
:0046D727 D90590E6DD07            fld dword ptr [07DDE690]
:0046D72D D81D48F56000            fcomp dword ptr [0060F548]
:0046D733 DFE0                    fstsw ax
:0046D735 F6C445                  test ah, 45
:0046D738 0F8581000000            jne 0046D7BF
:0046D73E 833D60BC630000          cmp dword ptr [0063BC60], 00000000
:0046D745 7578                    jne 0046D7BF
:0046D747 C70560BC630001000000    mov dword ptr [0063BC60], 00000001
:0046D751 681CE05400              push 0054E01C
:0046D756 6890A35400              push 0054A390

* Possible StringData Ref from Data Obj ->"I do not detect an X-Plane 6.0 "
                                        ->"or later CD in the following drive: "
                                  |
:0046D75B 6875FC6000              push 0060FC75
:0046D760 E8A457FCFF              call 00432F09
:0046D765 83C40C                  add esp, 0000000C
:0046D768 681CE05400              push 0054E01C

* Possible StringData Ref from Data Obj ->" so I shall now ignore your joystick "
                                        ->"input since you have not put the "
                                        ->"X-Plane 6.0 or later CD in that "
                                        ->"drive!"
                                  |
:0046D76D 68B9FC6000              push 0060FCB9
:0046D772 681CE05400              push 0054E01C
:0046D777 E88D57FCFF              call 00432F09
:0046D77C 83C40C                  add esp, 0000000C
:0046D77F 6A0F                    push 0000000F
:0046D781 68F1FB6000              push 0060FBF1

* Possible StringData Ref from Data Obj ->"(If you already have an X-Plane "
                                        ->"6.0 or later CD, be sure to put "
                                        ->"it in the drive before you start "
                                        ->"the sim to avoid this message!)"
                                  |
:0046D786 6826FD6000              push 0060FD26



howto-create-crack/howto.txt

How-to crack X-Plane 6.40
Used disassembler W32Dasm version 8.9

1) disasemble X-Plane 640.exe
2) find string "I do not detect an X-Plane 6.0" - is in the location code.txt :0046D756
3) function called from addres :0046D68F - call 0044E692 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and "00000001", if found in CD-ROM original CD.
4) is demand ensure, that the function "function.txt" always returns in register EAX "00000001".
5) return from this function is possible from this addreses 0044E758(U), :0044E784(U), :0044E7B0(U), :0044E7CE(U) In 3 first addreses is (one instruction back) mov eax,00000000 and in the last is 00000001.
6) in this 3 locations :0044E753, :0044E77F, :0044E7AB is demand this code: "B800000000 -- mov eax, 00000000" replace this new code: "B800000000 -- mov eax, 00000001"
7) In hexaeditor are this codes at there positions 4DB54, 4DB80, 4DBAC  replace this "b8 00 00 00 00" herewith : "b8 01 00 00 00".

thats all; 






howto-crack.txt

Copy "X-Plane 640 crack.exe" to your directory contains file "X-Plane 640.exe".
Run "X-Plane 640 crack.exe".
Use button "Patch".

thats all; 


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z