Download X-Plane v6.50 crack by X-Plane

Added to site2003-12-31
Rating80/100
Votes3


xplanev6.50crackxplane.zip (5556 bytes)

namesizecompressed
howto-create-crack/ 0 0
howto-create-crack/function.txt 5345 1060
howto-create-crack/code.txt 5966 1372
howto-create-crack/howto.txt 1029 514
howto-crack.txt 172 126
X-Plane 650 crack.exe 5135 1724

howto-create-crack/function.txt

* Referenced by a CALL at Addresses:
|:004407C7   , :004407D7   , :0046C210   , :0046C221   , :004A04D7   
|:004A04E8   
|
:0044E335 55                      push ebp
:0044E336 89E5                    mov ebp, esp
:0044E338 53                      push ebx
:0044E339 81ECF8010000            sub esp, 000001F8
:0044E33F 57                      push edi
:0044E340 B8CCCCCCCC              mov eax, CCCCCCCC
:0044E345 8D7C2404                lea edi, dword ptr [esp+04]
:0044E349 B97E000000              mov ecx, 0000007E
:0044E34E F3                      repz
:0044E34F AB                      stosd
:0044E350 5F                      pop edi
:0044E351 8D8508FEFFFF            lea eax, dword ptr [ebp+FFFFFE08]
:0044E357 50                      push eax
:0044E358 FF7508                  push [ebp+08]
:0044E35B 68C80B5500              push 00550BC8
:0044E360 E84A47FEFF              call 00432AAF
:0044E365 83C40C                  add esp, 0000000C
:0044E368 6A00                    push 00000000
:0044E36A 8B1D84FAC308            mov ebx, dword ptr [08C3FA84]
:0044E370 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E373 01DB                    add ebx, ebx
:0044E375 8B0CDD7C220101          mov ecx, dword ptr [8*ebx+0101227C]
:0044E37C E80861FBFF              call 00404489
:0044E381 8B0D84FAC308            mov ecx, dword ptr [08C3FA84]
:0044E387 69C990000000            imul ecx, 00000090
:0044E38D 81C178220101            add ecx, 01012278
:0044E393 E87EF8FBFF              call 0040DC16
:0044E398 6A00                    push 00000000
:0044E39A 8B1D84FAC308            mov ebx, dword ptr [08C3FA84]
:0044E3A0 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E3A3 01DB                    add ebx, ebx
:0044E3A5 8B0CDD7C220101          mov ecx, dword ptr [8*ebx+0101227C]
:0044E3AC E8D860FBFF              call 00404489
:0044E3B1 6A08                    push 00000008
:0044E3B3 8D8508FEFFFF            lea eax, dword ptr [ebp+FFFFFE08]
:0044E3B9 50                      push eax
:0044E3BA 8B0D84FAC308            mov ecx, dword ptr [08C3FA84]
:0044E3C0 69C990000000            imul ecx, 00000090
:0044E3C6 81C178220101            add ecx, 01012278
:0044E3CC E84B66FCFF              call 00414A1C
:0044E3D1 6A04                    push 00000004
:0044E3D3 8B1D84FAC308            mov ebx, dword ptr [08C3FA84]
:0044E3D9 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E3DC 01DB                    add ebx, ebx
:0044E3DE 8B0CDD7C220101          mov ecx, dword ptr [8*ebx+0101227C]
:0044E3E5 E88862FBFF              call 00404672
:0044E3EA 50                      push eax
:0044E3EB E85062FBFF              call 00404640
:0044E3F0 59                      pop ecx
:0044E3F1 59                      pop ecx
:0044E3F2 3C00                    cmp al, 00
:0044E3F4 7407                    je 0044E3FD
:0044E3F6 B800000000              mov eax, 00000000
:0044E3FB EB76                    jmp 0044E473

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044E3F4(C)
|
:0044E3FD 6A01                    push 00000001
:0044E3FF 8B1D84FAC308            mov ebx, dword ptr [08C3FA84]
:0044E405 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E408 01DB                    add ebx, ebx
:0044E40A 8B0CDD7C220101          mov ecx, dword ptr [8*ebx+0101227C]
:0044E411 E85C62FBFF              call 00404672
:0044E416 50                      push eax
:0044E417 E82462FBFF              call 00404640
:0044E41C 59                      pop ecx
:0044E41D 59                      pop ecx
:0044E41E 3C00                    cmp al, 00
:0044E420 7407                    je 0044E429
:0044E422 B800000000              mov eax, 00000000
:0044E427 EB4A                    jmp 0044E473

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044E420(C)
|
:0044E429 6A02                    push 00000002
:0044E42B 8B1D84FAC308            mov ebx, dword ptr [08C3FA84]
:0044E431 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:0044E434 01DB                    add ebx, ebx
:0044E436 8B0CDD7C220101          mov ecx, dword ptr [8*ebx+0101227C]
:0044E43D E83062FBFF              call 00404672
:0044E442 50                      push eax
:0044E443 E8F861FBFF              call 00404640
:0044E448 59                      pop ecx
:0044E449 59                      pop ecx
:0044E44A 3C00                    cmp al, 00
:0044E44C 7407                    je 0044E455
:0044E44E B800000000              mov eax, 00000000
:0044E453 EB1E                    jmp 0044E473

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044E44C(C)
|
:0044E455 8B0D84FAC308            mov ecx, dword ptr [08C3FA84]
:0044E45B 69C990000000            imul ecx, 00000090
:0044E461 81C178220101            add ecx, 01012278
:0044E467 E8AAF7FBFF              call 0040DC16
:0044E46C B801000000              mov eax, 00000001
:0044E471 EB00                    jmp 0044E473

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0044E3FB(U), :0044E427(U), :0044E453(U), :0044E471(U)
|
:0044E473 8D65FC                  lea esp, dword ptr [ebp-04]
:0044E476 5B                      pop ebx
:0044E477 5D                      pop ebp
:0044E478 C3                      ret





howto-create-crack/code.txt

:0046C1D5 6833766100              push 00617633

* Possible StringData Ref from Data Obj ->"No VERSION-6.0 CD found! X-Plane "
                                        ->"is operating in demo mode."
                                  |
:0046C1DA 685D766100              push 0061765D
:0046C1DF 6A00                    push 00000000
:0046C1E1 E857D4FCFF              call 0043963D
:0046C1E6 83C418                  add esp, 00000018
:0046C1E9 C705606C640001000000    mov dword ptr [00646C60], 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046C1A1(C), :0046C1B4(C), :0046C1BD(C)
|
:0046C1F3 833D606C640000          cmp dword ptr [00646C60], 00000000
:0046C1FA 0F849B000000            je 0046C29B
:0046C200 BA00000000              mov edx, 00000000
:0046C205 8915606C6400            mov dword ptr [00646C60], edx

* Possible StringData Ref from Data Obj ->"FIDELITY BUILD.txt"
                                  |
:0046C20B 6899766100              push 00617699
:0046C210 E82021FEFF              call 0044E335
:0046C215 59                      pop ecx
:0046C216 898518FDFFFF            mov dword ptr [ebp+FFFFFD18], eax

* Possible StringData Ref from Data Obj ->"HOW TO INSTALL VERSION 6.txt"
                                  |
:0046C21C 68AC766100              push 006176AC
:0046C221 E80F21FEFF              call 0044E335
:0046C226 59                      pop ecx
:0046C227 89851CFDFFFF            mov dword ptr [ebp+FFFFFD1C], eax
:0046C22D BA00000000              mov edx, 00000000
:0046C232 31C0                    xor eax, eax
:0046C234 83BD18FDFFFF00          cmp dword ptr [ebp+FFFFFD18], 00000000
:0046C23B 7505                    jne 0046C242
:0046C23D B801000000              mov eax, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046C23B(C)
|
:0046C242 83F800                  cmp eax, 00000000
:0046C245 741A                    je 0046C261
:0046C247 31C0                    xor eax, eax
:0046C249 83BD1CFDFFFF00          cmp dword ptr [ebp+FFFFFD1C], 00000000
:0046C250 7505                    jne 0046C257
:0046C252 B801000000              mov eax, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0046C250(C)
|
:0046C257 83F800                  cmp eax, 00000000
:0046C25A 7405                    je 0046C261
:0046C25C BA01000000              mov edx, 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046C245(C), :0046C25A(C)
|
:0046C261 891560781202            mov dword ptr [02127860], edx
:0046C267 8B8518FDFFFF            mov eax, dword ptr [ebp+FFFFFD18]
:0046C26D A3D425A008              mov dword ptr [08A025D4], eax
:0046C272 833D6078120200          cmp dword ptr [02127860], 00000000
:0046C279 7520                    jne 0046C29B
:0046C27B 6A0F                    push 0000000F
:0046C27D 68C9766100              push 006176C9

* Possible StringData Ref from Data Obj ->"Next time put the CD in before "
                                        ->"you start X-Plane to avoid this "
                                        ->"annoyance!"
                                  |
:0046C282 68CA766100              push 006176CA

* Possible StringData Ref from Data Obj ->"I am taking you out of demo mode "
                                        ->"now!"
                                  |
:0046C287 6814776100              push 00617714

* Possible StringData Ref from Data Obj ->"OK I found the CD!"
                                  |
:0046C28C 683A776100              push 0061773A
:0046C291 6A00                    push 00000000
:0046C293 E8A5D3FCFF              call 0043963D
:0046C298 83C418                  add esp, 00000018

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0046C1FA(C), :0046C279(C)
|
:0046C29B 833D6078120200          cmp dword ptr [02127860], 00000000
:0046C2A2 0F8498000000            je 0046C340
:0046C2A8 D9050C781202            fld dword ptr [0212780C]
:0046C2AE D81DF86F6100            fcomp dword ptr [00616FF8]
:0046C2B4 DFE0                    fstsw ax
:0046C2B6 F6C445                  test ah, 45
:0046C2B9 0F8581000000            jne 0046C340
:0046C2BF 833D586C640000          cmp dword ptr [00646C58], 00000000
:0046C2C6 7578                    jne 0046C340
:0046C2C8 C705586C640001000000    mov dword ptr [00646C58], 00000001
:0046C2D2 68484A5500              push 00554A48
:0046C2D7 68C80B5500              push 00550BC8

* Possible StringData Ref from Data Obj ->"I do not detect an X-Plane 6.0 "
                                        ->"or later CD in the following drive: "
                                  |
:0046C2DC 684D776100              push 0061774D
:0046C2E1 E8C967FCFF              call 00432AAF
:0046C2E6 83C40C                  add esp, 0000000C
:0046C2E9 68484A5500              push 00554A48

* Possible StringData Ref from Data Obj ->" so I shall now ignore your joystick "
                                        ->"input since you have not put the "
                                        ->"X-Plane 6.0 or later CD in that "
                                        ->"drive!"
                                  |
:0046C2EE 6891776100              push 00617791
:0046C2F3 68484A5500              push 00554A48
:0046C2F8 E8B267FCFF              call 00432AAF
:0046C2FD 83C40C                  add esp, 0000000C
:0046C300 6A0F                    push 0000000F
:0046C302 68C9766100              push 006176C9

* Possible StringData Ref from Data Obj ->"(If you already have an X-Plane "
                                        ->"6.0 or later CD, be sure to put "
                                        ->"it in the drive before you start "
                                        ->"the sim to avoid this message!)"
                                  |
:0046C307 68FE776100              push 006177FE




howto-create-crack/howto.txt

How-to crack X-Plane 6.50
Used disassembler W32Dasm version 8.9

1) disasemble X-Plane 650.exe
2) find string "I do not detect an X-Plane 6.0" - is in the location code.txt :0046C2DC
3) function called from addres :0046C210 - call 0044E335 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and "00000001", if found in CD-ROM original CD.
4) is demand ensure, that the function "function.txt" always returns in register EAX "00000001".
5) return from this function is possible from this addreses :0044E3FB(U), :0044E427(U), :0044E453(U), :0044E471(U) In 3 first addreses is (one instruction back) mov eax,00000000 and in the last is 00000001.
6) in this 3 locations :0044E3F6, :0044E422, :0044E44E is demand this code: "B800000000 -- mov eax, 00000000" replace this new code: "B801000000 -- mov eax, 00000001"
7) In hexaeditor are this codes at there positions 4D7F6, 4D822, 4D84E  replace this "b8 00 00 00 00" herewith : "b8 01 00 00 00".

thats all; 



howto-crack.txt

Copy "X-Plane 650 crack.exe" to your directory contains file "X-Plane 650.exe".
Run "X-Plane 650 crack.exe".
Use button "Patch".

thats all; 


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z