Download X-Plane v6.40 crack by X-Plane
| Added to site | 2003-12-31 |
| Rating | 90/100 |
| Votes | 6 |
xplanev6.40crackxplane.zip (5564 bytes)
| name | size | compressed |
|---|---|---|
| howto-create-crack/ | 0 | 0 |
| howto-create-crack/function.txt | 5349 | 1057 |
| howto-create-crack/code.txt | 5948 | 1377 |
| howto-create-crack/howto.txt | 1034 | 522 |
| howto-crack.txt | 172 | 126 |
| X-Plane 640 crack.exe | 5135 | 1722 |
howto-create-crack/function.txt
* Referenced by a CALL at Addresses: |:00440C99 , :00440CA9 , :0046D68F , :0046D6A0 , :004A0C50 |:004A0C61 | :0044E692 55 push ebp :0044E693 89E5 mov ebp, esp :0044E695 53 push ebx :0044E696 81ECF8010000 sub esp, 000001F8 :0044E69C 57 push edi :0044E69D B8CCCCCCCC mov eax, CCCCCCCC :0044E6A2 8D7C2404 lea edi, dword ptr [esp+04] :0044E6A6 B97E000000 mov ecx, 0000007E :0044E6AB F3 repz :0044E6AC AB stosd :0044E6AD 5F pop edi :0044E6AE 8D8508FEFFFF lea eax, dword ptr [ebp+FFFFFE08] :0044E6B4 50 push eax :0044E6B5 FF7508 push [ebp+08] :0044E6B8 6890A35400 push 0054A390 :0044E6BD E84748FEFF call 00432F09 :0044E6C2 83C40C add esp, 0000000C :0044E6C5 6A00 push 00000000 :0044E6C7 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E6CD 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E6D0 01DB add ebx, ebx :0044E6D2 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E6D9 E8675CFBFF call 00404345 :0044E6DE 8B0DF07A1108 mov ecx, dword ptr [08117AF0] :0044E6E4 69C990000000 imul ecx, 00000090 :0044E6EA 81C170000201 add ecx, 01020070 :0044E6F0 E826F4FBFF call 0040DB1B :0044E6F5 6A00 push 00000000 :0044E6F7 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E6FD 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E700 01DB add ebx, ebx :0044E702 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E709 E8375CFBFF call 00404345 :0044E70E 6A08 push 00000008 :0044E710 8D8508FEFFFF lea eax, dword ptr [ebp+FFFFFE08] :0044E716 50 push eax :0044E717 8B0DF07A1108 mov ecx, dword ptr [08117AF0] :0044E71D 69C990000000 imul ecx, 00000090 :0044E723 81C170000201 add ecx, 01020070 :0044E729 E8086DFCFF call 00415436 :0044E72E 6A04 push 00000004 :0044E730 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E736 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E739 01DB add ebx, ebx :0044E73B 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E742 E8E75DFBFF call 0040452E :0044E747 50 push eax :0044E748 E8AF5DFBFF call 004044FC :0044E74D 59 pop ecx :0044E74E 59 pop ecx :0044E74F 3C00 cmp al, 00 :0044E751 7407 je 0044E75A :0044E753 B800000000 mov eax, 00000000 :0044E758 EB76 jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0044E751(C) | :0044E75A 6A01 push 00000001 :0044E75C 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E762 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E765 01DB add ebx, ebx :0044E767 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E76E E8BB5DFBFF call 0040452E :0044E773 50 push eax :0044E774 E8835DFBFF call 004044FC :0044E779 59 pop ecx :0044E77A 59 pop ecx :0044E77B 3C00 cmp al, 00 :0044E77D 7407 je 0044E786 :0044E77F B800000000 mov eax, 00000000 :0044E784 EB4A jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0044E77D(C) | :0044E786 6A02 push 00000002 :0044E788 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E78E 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E791 01DB add ebx, ebx :0044E793 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E79A E88F5DFBFF call 0040452E :0044E79F 50 push eax :0044E7A0 E8575DFBFF call 004044FC :0044E7A5 59 pop ecx :0044E7A6 59 pop ecx :0044E7A7 3C00 cmp al, 00 :0044E7A9 7407 je 0044E7B2 :0044E7AB B800000000 mov eax, 00000000 :0044E7B0 EB1E jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0044E7A9(C) | :0044E7B2 8B0DF07A1108 mov ecx, dword ptr [08117AF0] :0044E7B8 69C990000000 imul ecx, 00000090 :0044E7BE 81C170000201 add ecx, 01020070 :0044E7C4 E852F3FBFF call 0040DB1B :0044E7C9 B801000000 mov eax, 00000001 :0044E7CE EB00 jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:0044E758(U), :0044E784(U), :0044E7B0(U), :0044E7CE(U) | :0044E7D0 8D65FC lea esp, dword ptr [ebp-04] :0044E7D3 5B pop ebx :0044E7D4 5D pop ebp :0044E7D5 C3 ret |
howto-create-crack/code.txt
:0046D654 685BFB6000 push 0060FB5B
* Possible StringData Ref from Data Obj ->"No VERSION-6.0 CD found! X-Plane "
->"is operating in demo mode."
|
:0046D659 6885FB6000 push 0060FB85
:0046D65E 6A00 push 00000000
:0046D660 E825C4FCFF call 00439A8A
:0046D665 83C418 add esp, 00000018
:0046D668 C70568BC630001000000 mov dword ptr [0063BC68], 00000001
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046D620(C), :0046D633(C), :0046D63C(C)
|
:0046D672 833D68BC630000 cmp dword ptr [0063BC68], 00000000
:0046D679 0F849B000000 je 0046D71A
:0046D67F BA00000000 mov edx, 00000000
:0046D684 891568BC6300 mov dword ptr [0063BC68], edx
* Possible StringData Ref from Data Obj ->"FIDELITY BUILD.txt"
|
:0046D68A 68C1FB6000 push 0060FBC1
:0046D68F E8FE0FFEFF call 0044E692
:0046D694 59 pop ecx
:0046D695 898530FDFFFF mov dword ptr [ebp+FFFFFD30], eax
* Possible StringData Ref from Data Obj ->"HOW TO INSTALL VERSION 6.txt"
|
:0046D69B 68D4FB6000 push 0060FBD4
:0046D6A0 E8ED0FFEFF call 0044E692
:0046D6A5 59 pop ecx
:0046D6A6 898534FDFFFF mov dword ptr [ebp+FFFFFD34], eax
:0046D6AC BA00000000 mov edx, 00000000
:0046D6B1 31C0 xor eax, eax
:0046D6B3 83BD30FDFFFF00 cmp dword ptr [ebp+FFFFFD30], 00000000
:0046D6BA 7505 jne 0046D6C1
:0046D6BC B801000000 mov eax, 00000001
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046D6BA(C)
|
:0046D6C1 83F800 cmp eax, 00000000
:0046D6C4 741A je 0046D6E0
:0046D6C6 31C0 xor eax, eax
:0046D6C8 83BD34FDFFFF00 cmp dword ptr [ebp+FFFFFD34], 00000000
:0046D6CF 7505 jne 0046D6D6
:0046D6D1 B801000000 mov eax, 00000001
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046D6CF(C)
|
:0046D6D6 83F800 cmp eax, 00000000
:0046D6D9 7405 je 0046D6E0
:0046D6DB BA01000000 mov edx, 00000001
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046D6C4(C), :0046D6D9(C)
|
:0046D6E0 8815E4E6DD07 mov byte ptr [07DDE6E4], dl
:0046D6E6 8B8530FDFFFF mov eax, dword ptr [ebp+FFFFFD30]
:0046D6EC A394010201 mov dword ptr [01020194], eax
:0046D6F1 803DE4E6DD0700 cmp byte ptr [07DDE6E4], 00
:0046D6F8 7520 jne 0046D71A
:0046D6FA 6A0F push 0000000F
:0046D6FC 68F1FB6000 push 0060FBF1
* Possible StringData Ref from Data Obj ->"Next time put the CD in before "
->"you start X-Plane to avoid this "
->"annoyance!"
|
:0046D701 68F2FB6000 push 0060FBF2
* Possible StringData Ref from Data Obj ->"I am taking you out of demo mode "
->"now!"
|
:0046D706 683CFC6000 push 0060FC3C
* Possible StringData Ref from Data Obj ->"OK I found the CD!"
|
:0046D70B 6862FC6000 push 0060FC62
:0046D710 6A00 push 00000000
:0046D712 E873C3FCFF call 00439A8A
:0046D717 83C418 add esp, 00000018
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046D679(C), :0046D6F8(C)
|
:0046D71A 803DE4E6DD0700 cmp byte ptr [07DDE6E4], 00
:0046D721 0F8498000000 je 0046D7BF
:0046D727 D90590E6DD07 fld dword ptr [07DDE690]
:0046D72D D81D48F56000 fcomp dword ptr [0060F548]
:0046D733 DFE0 fstsw ax
:0046D735 F6C445 test ah, 45
:0046D738 0F8581000000 jne 0046D7BF
:0046D73E 833D60BC630000 cmp dword ptr [0063BC60], 00000000
:0046D745 7578 jne 0046D7BF
:0046D747 C70560BC630001000000 mov dword ptr [0063BC60], 00000001
:0046D751 681CE05400 push 0054E01C
:0046D756 6890A35400 push 0054A390
* Possible StringData Ref from Data Obj ->"I do not detect an X-Plane 6.0 "
->"or later CD in the following drive: "
|
:0046D75B 6875FC6000 push 0060FC75
:0046D760 E8A457FCFF call 00432F09
:0046D765 83C40C add esp, 0000000C
:0046D768 681CE05400 push 0054E01C
* Possible StringData Ref from Data Obj ->" so I shall now ignore your joystick "
->"input since you have not put the "
->"X-Plane 6.0 or later CD in that "
->"drive!"
|
:0046D76D 68B9FC6000 push 0060FCB9
:0046D772 681CE05400 push 0054E01C
:0046D777 E88D57FCFF call 00432F09
:0046D77C 83C40C add esp, 0000000C
:0046D77F 6A0F push 0000000F
:0046D781 68F1FB6000 push 0060FBF1
* Possible StringData Ref from Data Obj ->"(If you already have an X-Plane "
->"6.0 or later CD, be sure to put "
->"it in the drive before you start "
->"the sim to avoid this message!)"
|
:0046D786 6826FD6000 push 0060FD26
|
howto-create-crack/howto.txt
How-to crack X-Plane 6.40 Used disassembler W32Dasm version 8.9 1) disasemble X-Plane 640.exe 2) find string "I do not detect an X-Plane 6.0" - is in the location code.txt :0046D756 3) function called from addres :0046D68F - call 0044E692 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and "00000001", if found in CD-ROM original CD. 4) is demand ensure, that the function "function.txt" always returns in register EAX "00000001". 5) return from this function is possible from this addreses 0044E758(U), :0044E784(U), :0044E7B0(U), :0044E7CE(U) In 3 first addreses is (one instruction back) mov eax,00000000 and in the last is 00000001. 6) in this 3 locations :0044E753, :0044E77F, :0044E7AB is demand this code: "B800000000 -- mov eax, 00000000" replace this new code: "B800000000 -- mov eax, 00000001" 7) In hexaeditor are this codes at there positions 4DB54, 4DB80, 4DBAC replace this "b8 00 00 00 00" herewith : "b8 01 00 00 00". thats all; |
howto-crack.txt
Copy "X-Plane 640 crack.exe" to your directory contains file "X-Plane 640.exe". Run "X-Plane 640 crack.exe". Use button "Patch". thats all; |