PDA

View Full Version : PB dump Hasp HL


Ernestine
04-16-2010, 05:50 AM
Hi all,

I've made a dump of the key with h5dmp.exe, then i've converted it (hasp.dmp + hhl_mem.dmp) with Unidump2reg 1.1b5 to vUSB HL

Of course, i changed the path of the registry to HKLM\...\multikey\dumps\ in the created reg but i can't make the software recognize the Virtual key :(
I use the 18.2.3

Could you tell me if i did something wrong.
I think that it can be emulated as i can see on others forums

Thanks for help,
Regards.

Git
04-16-2010, 07:03 AM
Carefully check the order of the the two 4 byte lumps that make up the 8 byte "password" of the key. It is easy to get them reversed so check in the Examples of multikey archive of the same version you are using.

Git

Ernestine
04-16-2010, 09:04 AM
Thanks Git for your answer, but it seems that i didn't make mistake :confused: at this place. I had a look on the password list on a site of emulation's service and it appears to be right.:(

Any idea?

gus
04-16-2010, 09:13 AM
add :

"dongletype"=dword:0000001

or use HASPHL_MULTIKEy result :

REGEDIT4
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Multik ey\Dumps\6CF96C28]
"Name"=""
"DongleType"=dword:00000001
"Created"="16/04/2010 15:13:24"
"SN"=dword:xxxxxxxx
"Type"=dword:000000EA
"Memory"=dword:00000020
"SecTable"=hex:BC,AD,FE,EF,98,89,DA,CB
"NetMemory"=hex:00,00,00,00,00,00,00,00,00,00,FF,FF
"Option"=hex:00,01,02,4A,1F,01,10,03,0A,01,0D,0D,22,00
"Data"=hex:\
8C,3C,00,00,A7,74,01,00,01,00,01,00,01,00,00,00,\
00,00,01,00,01,00,00,00,01,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,01,00,00,00,01,00,00,00,\
00,00,00,00,00,00,01,00,00,00,00,00,55,55,01,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,FF,FF,\
FF,............................................... .......,FF,FF\
57,42,50,54,01,00,00,00,70,00,00,00,00,00,21,11,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00
"ColumnMask"=dword:000000AB
"CryptInitVect"=dword:0000003C

soft ???

Ernestine
04-16-2010, 10:20 AM
Thanks gus, you were right!

I've search where i could forgot something whitout see that....
soft : s*e*e El*e*c*t*r*i*c*a*l