Download X-Plane v6.25 crack

Added to site2005-02-12
Rating95/100
Votes12


xplanev6.25crack.zip (4704 bytes)

namesizecompressed
howto-create-crack/ 0 0
howto-create-crack/code.txt 1630 537
howto-create-crack/function.txt 5341 1048
howto-create-crack/howto.txt 1030 515
howto-crack.txt 172 126
X-Plane 625 crack.exe 5135 1718

howto-create-crack/code.txt

:0043B92B 753D                    jne 0043B96A
:0043B92D 68F07E5300              push 00537EF0
:0043B932 8D851C2DFFFF            lea eax, dword ptr [ebp+FFFF2D1C]
:0043B938 50                      push eax
:0043B939 E8F325FFFF              call 0042DF31
:0043B93E 59                      pop ecx
:0043B93F 59                      pop ecx

* Possible StringData Ref from Data Obj ->"FIDELITY BUILD.txt"
                                  |
:0043B940 68CA3E5300              push 00533ECA
:0043B945 E818CD0000              call 00448662
:0043B94A 59                      pop ecx
:0043B94B 83F800                  cmp eax, 00000000
:0043B94E 7510                    jne 0043B960

* Possible StringData Ref from Data Obj ->"HOW TO INSTALL VERSION 6.txt"
                                  |
:0043B950 68DD3E5300              push 00533EDD
:0043B955 E808CD0000              call 00448662
:0043B95A 59                      pop ecx
:0043B95B 83F800                  cmp eax, 00000000
:0043B95E 740A                    je 0043B96A

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0043B94E(C)
|
:0043B960 C785942CFFFF01000000    mov dword ptr [ebp+FFFF2C94], 00000001

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0043B887(U), :0043B919(C), :0043B92B(C), :0043B95E(C)
|
:0043B96A 83BD982CFFFF00          cmp dword ptr [ebp+FFFF2C98], 00000000
:0043B971 0F8415FFFFFF            je 0043B88C
:0043B977 8DBD0431FFFF            lea edi, dword ptr [ebp+FFFF3104]
:0043B97D BE6D356200              mov esi, 0062356D
:0043B982 B97D000000              mov ecx, 0000


howto-create-crack/function.txt

* Referenced by a CALL at Addresses:
|:0043B945   , :0043B955   , :004685A0   , :004685B1   , :004A3B39   
|:004A3B4A   
|
:00448662 55                      push ebp
:00448663 89E5                    mov ebp, esp
:00448665 53                      push ebx
:00448666 81ECF8010000            sub esp, 000001F8
:0044866C 57                      push edi
:0044866D B8CCCCCCCC              mov eax, CCCCCCCC
:00448672 8D7C2404                lea edi, dword ptr [esp+04]
:00448676 B97E000000              mov ecx, 0000007E
:0044867B F3                      repz
:0044867C AB                      stosd
:0044867D 5F                      pop edi
:0044867E 8D8508FEFFFF            lea eax, dword ptr [ebp+FFFFFE08]
:00448684 50                      push eax
:00448685 FF7508                  push [ebp+08]
:00448688 68F07E5300              push 00537EF0
:0044868D E8DB58FEFF              call 0042DF6D
:00448692 83C40C                  add esp, 0000000C
:00448695 6A00                    push 00000000
:00448697 8B1D287FB306            mov ebx, dword ptr [06B37F28]
:0044869D 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:004486A0 01DB                    add ebx, ebx
:004486A2 8B0CDDA4CFD800          mov ecx, dword ptr [8*ebx+00D8CFA4]
:004486A9 E8EFBBFBFF              call 0040429D
:004486AE 8B0D287FB306            mov ecx, dword ptr [06B37F28]
:004486B4 69C990000000            imul ecx, 00000090
:004486BA 81C1A0CFD800            add ecx, 00D8CFA0
:004486C0 E8114BFCFF              call 0040D1D6
:004486C5 6A00                    push 00000000
:004486C7 8B1D287FB306            mov ebx, dword ptr [06B37F28]
:004486CD 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:004486D0 01DB                    add ebx, ebx
:004486D2 8B0CDDA4CFD800          mov ecx, dword ptr [8*ebx+00D8CFA4]
:004486D9 E8BFBBFBFF              call 0040429D
:004486DE 6A08                    push 00000008
:004486E0 8D8508FEFFFF            lea eax, dword ptr [ebp+FFFFFE08]
:004486E6 50                      push eax
:004486E7 8B0D287FB306            mov ecx, dword ptr [06B37F28]
:004486ED 69C990000000            imul ecx, 00000090
:004486F3 81C1A0CFD800            add ecx, 00D8CFA0
:004486F9 E89181FCFF              call 0041088F
:004486FE 6A04                    push 00000004
:00448700 8B1D287FB306            mov ebx, dword ptr [06B37F28]
:00448706 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:00448709 01DB                    add ebx, ebx
:0044870B 8B0CDDA4CFD800          mov ecx, dword ptr [8*ebx+00D8CFA4]
:00448712 E86FBDFBFF              call 00404486
:00448717 50                      push eax
:00448718 E837BDFBFF              call 00404454
:0044871D 59                      pop ecx
:0044871E 59                      pop ecx
:0044871F 3C00                    cmp al, 00
:00448721 7407                    je 0044872A
:00448723 B800000000              mov eax, 00000000
:00448728 EB76                    jmp 004487A0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00448721(C)
|
:0044872A 6A01                    push 00000001
:0044872C 8B1D287FB306            mov ebx, dword ptr [06B37F28]
:00448732 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:00448735 01DB                    add ebx, ebx
:00448737 8B0CDDA4CFD800          mov ecx, dword ptr [8*ebx+00D8CFA4]
:0044873E E843BDFBFF              call 00404486
:00448743 50                      push eax
:00448744 E80BBDFBFF              call 00404454
:00448749 59                      pop ecx
:0044874A 59                      pop ecx
:0044874B 3C00                    cmp al, 00
:0044874D 7407                    je 00448756
:0044874F B800000000              mov eax, 00000000
:00448754 EB4A                    jmp 004487A0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0044874D(C)
|
:00448756 6A02                    push 00000002
:00448758 8B1D287FB306            mov ebx, dword ptr [06B37F28]
:0044875E 8D1CDB                  lea ebx, dword ptr [ebx+8*ebx]
:00448761 01DB                    add ebx, ebx
:00448763 8B0CDDA4CFD800          mov ecx, dword ptr [8*ebx+00D8CFA4]
:0044876A E817BDFBFF              call 00404486
:0044876F 50                      push eax
:00448770 E8DFBCFBFF              call 00404454
:00448775 59                      pop ecx
:00448776 59                      pop ecx
:00448777 3C00                    cmp al, 00
:00448779 7407                    je 00448782
:0044877B B800000000              mov eax, 00000000
:00448780 EB1E                    jmp 004487A0

* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:00448779(C)
|
:00448782 8B0D287FB306            mov ecx, dword ptr [06B37F28]
:00448788 69C990000000            imul ecx, 00000090
:0044878E 81C1A0CFD800            add ecx, 00D8CFA0
:00448794 E83D4AFCFF              call 0040D1D6
:00448799 B801000000              mov eax, 00000001
:0044879E EB00                    jmp 004487A0

* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:00448728(U), :00448754(U), :00448780(U), :0044879E(U)
|
:004487A0 8D65FC                  lea esp, dword ptr [ebp-04]
:004487A3 5B                      pop ebx
:004487A4 5D                      pop ebp
:004487A5 C3                      ret




howto-create-crack/howto.txt

How-to crack X-Plane 6.25
Used disassembler W32Dasm version 8.9

1) disasemble X-Plane 625.exe
2) find string "I do not detect an X-Plane 6.0" - is in the location code.txt :0043B950
3) function called from addres :0043B945 - call 00448662 is function, that returns in register EAX "00000000", if not in the CD-ROM original CD and "00000001", if found in CD-ROM original CD.
4) is demand ensure, that the function "function.txt" always returns in register EAX "00000001".
5) return from this function is possible from this addreses :00448728(U), :00448754(U), :00448780(U), :0044879E(U). In 3 first addreses is (one instruction back) mov eax,00000000 and in the last is 00000001.
6) in this 3 locations :00448723, :0044874F, :004487B7 is demand this code: "B800000000 -- mov eax, 00000000" replace this new code: "B800000000 -- mov eax, 00000001"
7) In hexaeditor are this codes at there positions 47b23, 47b4f, 47b7b  replace this "b8 00 00 00 00" herewith : "b8 01 00 00 00".

thats all; 



howto-crack.txt

Copy "X-Plane 625 crack.exe" to your directory contains file "X-Plane 625.exe".
Run "X-Plane 625 crack.exe".
Use button "Patch".

thats all; 


# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z