Download X-Plane v6.40 crack by X-Plane
Added to site | 2003-12-31 |
Rating | 90/100 |
Votes | 6 |
xplanev6.40crackxplane.zip (5564 bytes)
name | size | compressed |
---|---|---|
howto-create-crack/ | 0 | 0 |
howto-create-crack/function.txt | 5349 | 1057 |
howto-create-crack/code.txt | 5948 | 1377 |
howto-create-crack/howto.txt | 1034 | 522 |
howto-crack.txt | 172 | 126 |
X-Plane 640 crack.exe | 5135 | 1722 |
howto-create-crack/function.txt
* Referenced by a CALL at Addresses: |:00440C99 , :00440CA9 , :0046D68F , :0046D6A0 , :004A0C50 |:004A0C61 | :0044E692 55 push ebp :0044E693 89E5 mov ebp, esp :0044E695 53 push ebx :0044E696 81ECF8010000 sub esp, 000001F8 :0044E69C 57 push edi :0044E69D B8CCCCCCCC mov eax, CCCCCCCC :0044E6A2 8D7C2404 lea edi, dword ptr [esp+04] :0044E6A6 B97E000000 mov ecx, 0000007E :0044E6AB F3 repz :0044E6AC AB stosd :0044E6AD 5F pop edi :0044E6AE 8D8508FEFFFF lea eax, dword ptr [ebp+FFFFFE08] :0044E6B4 50 push eax :0044E6B5 FF7508 push [ebp+08] :0044E6B8 6890A35400 push 0054A390 :0044E6BD E84748FEFF call 00432F09 :0044E6C2 83C40C add esp, 0000000C :0044E6C5 6A00 push 00000000 :0044E6C7 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E6CD 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E6D0 01DB add ebx, ebx :0044E6D2 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E6D9 E8675CFBFF call 00404345 :0044E6DE 8B0DF07A1108 mov ecx, dword ptr [08117AF0] :0044E6E4 69C990000000 imul ecx, 00000090 :0044E6EA 81C170000201 add ecx, 01020070 :0044E6F0 E826F4FBFF call 0040DB1B :0044E6F5 6A00 push 00000000 :0044E6F7 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E6FD 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E700 01DB add ebx, ebx :0044E702 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E709 E8375CFBFF call 00404345 :0044E70E 6A08 push 00000008 :0044E710 8D8508FEFFFF lea eax, dword ptr [ebp+FFFFFE08] :0044E716 50 push eax :0044E717 8B0DF07A1108 mov ecx, dword ptr [08117AF0] :0044E71D 69C990000000 imul ecx, 00000090 :0044E723 81C170000201 add ecx, 01020070 :0044E729 E8086DFCFF call 00415436 :0044E72E 6A04 push 00000004 :0044E730 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E736 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E739 01DB add ebx, ebx :0044E73B 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E742 E8E75DFBFF call 0040452E :0044E747 50 push eax :0044E748 E8AF5DFBFF call 004044FC :0044E74D 59 pop ecx :0044E74E 59 pop ecx :0044E74F 3C00 cmp al, 00 :0044E751 7407 je 0044E75A :0044E753 B800000000 mov eax, 00000000 :0044E758 EB76 jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0044E751(C) | :0044E75A 6A01 push 00000001 :0044E75C 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E762 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E765 01DB add ebx, ebx :0044E767 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E76E E8BB5DFBFF call 0040452E :0044E773 50 push eax :0044E774 E8835DFBFF call 004044FC :0044E779 59 pop ecx :0044E77A 59 pop ecx :0044E77B 3C00 cmp al, 00 :0044E77D 7407 je 0044E786 :0044E77F B800000000 mov eax, 00000000 :0044E784 EB4A jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0044E77D(C) | :0044E786 6A02 push 00000002 :0044E788 8B1DF07A1108 mov ebx, dword ptr [08117AF0] :0044E78E 8D1CDB lea ebx, dword ptr [ebx+8*ebx] :0044E791 01DB add ebx, ebx :0044E793 8B0CDD74000201 mov ecx, dword ptr [8*ebx+01020074] :0044E79A E88F5DFBFF call 0040452E :0044E79F 50 push eax :0044E7A0 E8575DFBFF call 004044FC :0044E7A5 59 pop ecx :0044E7A6 59 pop ecx :0044E7A7 3C00 cmp al, 00 :0044E7A9 7407 je 0044E7B2 :0044E7AB B800000000 mov eax, 00000000 :0044E7B0 EB1E jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0044E7A9(C) | :0044E7B2 8B0DF07A1108 mov ecx, dword ptr [08117AF0] :0044E7B8 69C990000000 imul ecx, 00000090 :0044E7BE 81C170000201 add ecx, 01020070 :0044E7C4 E852F3FBFF call 0040DB1B :0044E7C9 B801000000 mov eax, 00000001 :0044E7CE EB00 jmp 0044E7D0 * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:0044E758(U), :0044E784(U), :0044E7B0(U), :0044E7CE(U) | :0044E7D0 8D65FC lea esp, dword ptr [ebp-04] :0044E7D3 5B pop ebx :0044E7D4 5D pop ebp :0044E7D5 C3 ret |
howto-create-crack/code.txt
:0046D654 685BFB6000 push 0060FB5B * Possible StringData Ref from Data Obj ->"No VERSION-6.0 CD found! X-Plane " ->"is operating in demo mode." | :0046D659 6885FB6000 push 0060FB85 :0046D65E 6A00 push 00000000 :0046D660 E825C4FCFF call 00439A8A :0046D665 83C418 add esp, 00000018 :0046D668 C70568BC630001000000 mov dword ptr [0063BC68], 00000001 * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:0046D620(C), :0046D633(C), :0046D63C(C) | :0046D672 833D68BC630000 cmp dword ptr [0063BC68], 00000000 :0046D679 0F849B000000 je 0046D71A :0046D67F BA00000000 mov edx, 00000000 :0046D684 891568BC6300 mov dword ptr [0063BC68], edx * Possible StringData Ref from Data Obj ->"FIDELITY BUILD.txt" | :0046D68A 68C1FB6000 push 0060FBC1 :0046D68F E8FE0FFEFF call 0044E692 :0046D694 59 pop ecx :0046D695 898530FDFFFF mov dword ptr [ebp+FFFFFD30], eax * Possible StringData Ref from Data Obj ->"HOW TO INSTALL VERSION 6.txt" | :0046D69B 68D4FB6000 push 0060FBD4 :0046D6A0 E8ED0FFEFF call 0044E692 :0046D6A5 59 pop ecx :0046D6A6 898534FDFFFF mov dword ptr [ebp+FFFFFD34], eax :0046D6AC BA00000000 mov edx, 00000000 :0046D6B1 31C0 xor eax, eax :0046D6B3 83BD30FDFFFF00 cmp dword ptr [ebp+FFFFFD30], 00000000 :0046D6BA 7505 jne 0046D6C1 :0046D6BC B801000000 mov eax, 00000001 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0046D6BA(C) | :0046D6C1 83F800 cmp eax, 00000000 :0046D6C4 741A je 0046D6E0 :0046D6C6 31C0 xor eax, eax :0046D6C8 83BD34FDFFFF00 cmp dword ptr [ebp+FFFFFD34], 00000000 :0046D6CF 7505 jne 0046D6D6 :0046D6D1 B801000000 mov eax, 00000001 * Referenced by a (U)nconditional or (C)onditional Jump at Address: |:0046D6CF(C) | :0046D6D6 83F800 cmp eax, 00000000 :0046D6D9 7405 je 0046D6E0 :0046D6DB BA01000000 mov edx, 00000001 * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:0046D6C4(C), :0046D6D9(C) | :0046D6E0 8815E4E6DD07 mov byte ptr [07DDE6E4], dl :0046D6E6 8B8530FDFFFF mov eax, dword ptr [ebp+FFFFFD30] :0046D6EC A394010201 mov dword ptr [01020194], eax :0046D6F1 803DE4E6DD0700 cmp byte ptr [07DDE6E4], 00 :0046D6F8 7520 jne 0046D71A :0046D6FA 6A0F push 0000000F :0046D6FC 68F1FB6000 push 0060FBF1 * Possible StringData Ref from Data Obj ->"Next time put the CD in before " ->"you start X-Plane to avoid this " ->"annoyance!" | :0046D701 68F2FB6000 push 0060FBF2 * Possible StringData Ref from Data Obj ->"I am taking you out of demo mode " ->"now!" | :0046D706 683CFC6000 push 0060FC3C * Possible StringData Ref from Data Obj ->"OK I found the CD!" | :0046D70B 6862FC6000 push 0060FC62 :0046D710 6A00 push 00000000 :0046D712 E873C3FCFF call 00439A8A :0046D717 83C418 add esp, 00000018 * Referenced by a (U)nconditional or (C)onditional Jump at Addresses: |:0046D679(C), :0046D6F8(C) | :0046D71A 803DE4E6DD0700 cmp byte ptr [07DDE6E4], 00 :0046D721 0F8498000000 je 0046D7BF :0046D727 D90590E6DD07 fld dword ptr [07DDE690] :0046D72D D81D48F56000 fcomp dword ptr [0060F548] :0046D733 DFE0 fstsw ax :0046D735 F6C445 test ah, 45 :0046D738 0F8581000000 jne 0046D7BF :0046D73E 833D60BC630000 cmp dword ptr [0063BC60], 00000000 :0046D745 7578 jne 0046D7BF :0046D747 C70560BC630001000000 mov dword ptr [0063BC60], 00000001 :0046D751 681CE05400 push 0054E01C :0046D756 6890A35400 push 0054A390 * Possible StringData Ref from Data Obj ->"I do not detect an X-Plane 6.0 " ->"or later CD in the following drive: " | :0046D75B 6875FC6000 push 0060FC75 :0046D760 E8A457FCFF call 00432F09 :0046D765 83C40C add esp, 0000000C :0046D768 681CE05400 push 0054E01C * Possible StringData Ref from Data Obj ->" so I shall now ignore your joystick " ->"input since you have not put the " ->"X-Plane 6.0 or later CD in that " ->"drive!" | :0046D76D 68B9FC6000 push 0060FCB9 :0046D772 681CE05400 push 0054E01C :0046D777 E88D57FCFF call 00432F09 :0046D77C 83C40C add esp, 0000000C :0046D77F 6A0F push 0000000F :0046D781 68F1FB6000 push 0060FBF1 * Possible StringData Ref from Data Obj ->"(If you already have an X-Plane " ->"6.0 or later CD, be sure to put " ->"it in the drive before you start " ->"the sim to avoid this message!)" | :0046D786 6826FD6000 push 0060FD26 |
howto-create-crack/howto.txt
How-to crack X-Plane 6.40 Used disassembler W32Dasm version 8.9 1) disasemble X-Plane 640.exe 2) find string "I do not detect an X-Plane 6.0" - is in the location code.txt :0046D756 3) function called from addres :0046D68F - call 0044E692 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and "00000001", if found in CD-ROM original CD. 4) is demand ensure, that the function "function.txt" always returns in register EAX "00000001". 5) return from this function is possible from this addreses 0044E758(U), :0044E784(U), :0044E7B0(U), :0044E7CE(U) In 3 first addreses is (one instruction back) mov eax,00000000 and in the last is 00000001. 6) in this 3 locations :0044E753, :0044E77F, :0044E7AB is demand this code: "B800000000 -- mov eax, 00000000" replace this new code: "B800000000 -- mov eax, 00000001" 7) In hexaeditor are this codes at there positions 4DB54, 4DB80, 4DBAC replace this "b8 00 00 00 00" herewith : "b8 01 00 00 00". thats all; |
howto-crack.txt
Copy "X-Plane 640 crack.exe" to your directory contains file "X-Plane 640.exe". Run "X-Plane 640 crack.exe". Use button "Patch". thats all; |