View Full Version : sentinel dongel
hi gys
can u help in dongel sentinel
link dump file dmp and dng
https://mega.nz/#!gYcHHSwA!01zFOuX1uWop7BtS3ThYYK-hKuA5qwDHbcdXHfXyMss
plz help to emulate this dongel
hp3hp3
2016-10-10, 08:28 PM
what is your soft name?
hi gys
can u help in dongel sentinel
link dump file dmp and dng
https://mega.nz/#!gYcHHSwA!01zFOuX1uWop7BtS3ThYYK-hKuA5qwDHbcdXHfXyMss
plz help to emulate this dongel
hp3hp3
2016-10-10, 08:32 PM
u can use multikey for emul your dongle
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\0000120A]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Mon Oct 10 15:00:44.344 2016 by dmp2mkey v2.5.9.1"
"Name"="120A Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,00,02,03,03,03,03,\
03,03,01,02,03,03,03,03,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
01,01,01,01,01,01,01,01,\
01,00,00,01,01,01,01,01
"sntMemory"=hex:\
9B,2D,0A,12,00,00,00,00,00,00,00,00,EC,F3,00,00,\
B9,17,1A,D8,50,06,F0,F3,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,37,68,C3,D2,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
AB,05,00,00,FE,F7,FF,FF,77,7C,07,00,00,00,00,00,\
40,00,00,00,00,00,01,00,01,00,0A,00,F8,D2,06,97
hi gys
can u help in dongel sentinel
link dump file dmp and dng
https://mega.nz/#!gYcHHSwA!01zFOuX1uWop7BtS3ThYYK-hKuA5qwDHbcdXHfXyMss
plz help to emulate this dongel
thank u very much for reply
i test you
thank u very much for reply
i test you
all newest version AlAmeen software (devid=0x120a) is fire multikey. version of 2004 work ok.
second dump for the devid=0xa795 just memory holder, without any algo
@
hp3hp3
the file reg dont work >>?
(http://www.finetopix.com/member.php/15396-hp3hp3)
hp3hp3
2016-10-11, 07:52 PM
@
hp3hp3
the file reg dont work >>?
(http://www.finetopix.com/member.php/15396-hp3hp3)
upload your target
reg file is from your dump file
so should work
link emul :
https://mega.nz/#!gJtDkTCA!PGQBuYxMsJRH8KHmbiiCvIILCJJPOb-HZtET0bKbi0Q
link program
https://mega.nz/#!II0T1KSS!KDL8ugrvQnZyJJbnQsRm7xrPoRCPmd_9cqDs_we0A2w
(https://mega.nz/#!II0T1KSS!KDL8ugrvQnZyJJbnQsRm7xrPoRCPmd_9cqDs_we0A2w)
C:\Program Files\SyrianSoft\Al-Ameen70\Bin\amn32.exe
hp3hp3
2016-10-11, 11:09 PM
u sure your dongle is sspro
this file protection is like SHK dongle
C:\Program Files\SyrianSoft\Al-Ameen70\Bin\amn32.exe
u sure your dongle is sspro
this file protection is like SHK dongle
imho, sdhk in sspro mode
YAH AS SAID BFOX
THE PICTURE DONT OPEN
WHAT THE SOLVE @hp3hp3 (http://www.finetopix.com/member.php/15396-hp3hp3)
what is your soft name?
devid = 0x120a
CompanyName : SyrianSoft
FileDescription : Al-Ameen
the dongle shell passed with the multikey emulator. inside software linked api and he fire the dongle emulator...
@bfox
how i can remove the api fire from software
@bfox
if rename multikey.sys can i kill api fire
if rename multikey.sys can i kill api fire
rename not help u
you can try change the multikey reg path & name. I have successed this 3years before, i cant rember what i did.
@KJMS
You mean change rename multikey.sys
How I can change path of reg .. you mean change
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\0000120A]
To
As example
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\succeed \D\0000120A]
Please can you remember how you do it.!?
you can try change the multikey reg path & name. I have successed this 3years before, i cant rember what i did.
Please anybody answer me on this
tester
2016-10-17, 03:30 AM
For name changing you may use "Multikey setup assistant" from official site.
For reg path modification you need MK sources.
For name changing you may use "Multikey setup assistant" from official site.
For reg path modification you need MK sources.
thank you for reply
what i can done
thank you for reply
what i can done
i change file name multikey by "Multikey setup assistant" but without success
how ican get on the mk source mk
alaa_982
2016-10-19, 02:28 AM
one day ago
mr hasp help me in this emu
he said use mk 18,4,2
and file reg
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\0000120A]
"Name"="Sentinel UltraPro 120A"
"Copyright"="hasp"
"Created"="Sun Dec 08 15:26:50 2013"
"DongleType"=dword:00000003
"Type"=dword:00000001
"Option"=hex:02,00,03,A2,FF,00,00,00
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,00,02,03,03,03,03,\
03,03,01,02,03,03,03,03,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
01,01,01,01,01,01,01,01,\
01,00,00,01,01,01,01,01,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
03,03,01,01,01,00,00,00
"sntMemory"=hex:\
75,35,0A,12,68,EC,00,00,68,EC,00,00,EC,F3,51,00,\
B9,17,1A,D8,50,06,F0,F3,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,37,68,C3,D2,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
AB,05,00,00,FE,F7,FF,FF,77,7C,07,00,00,00,00,00,\
40,00,00,00,00,00,01,00,01,00,01,00,0C,AE,06,97,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
06,A3,31,C4,00,0D,07,00,00,00,00,00,00,00,00,00
try this
craclab
2016-10-19, 02:47 AM
Hi friends
I also have problems to emulate Sentinel SuperPro / ultrapro
Can somebody help me..
@alaa_982
thank you for reply
i try this mk 18.4.2 with file reg but no avail :'(:'(:'(:'(:'(:'(:'(:'(
program give me key security not found :'(:'(:'(
@craclab: the usb trace log is decoded
i dumped dongel by ssprodmp >>> give me file as type bin
and use toro sentinel 2.1
link contain on
file toro
and ssp120.bin
https://mega.nz/#!pZMgXBRL!c4_ti3ECBInJ-XlCFU3A4MzBh3y0n8I3jzZ2nff5E5g
alaa_982
2016-10-20, 12:41 AM
how convert bin to reg >>???
this dump not help you. your dongle is UltraPro. NOT SuperPro
how convert bin to reg >>???
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Emulator\Sentinel\Dump\120A0000]
"sntMemory"=hex:\
9B,2D,0A,12,00,00,00,00,00,00,00,00,EC,F3,00,00,\
B9,17,1A,D8,50,06,F0,F3,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,37,68,C3,D2,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
AB,05,00,00,FE,F7,FF,FF,77,7C,07,00,00,00,00,00,\
40,00,00,00,00,00,01,00,01,00,0A,00,F8,D2,06,97
"CellType"=hex:\
01,01,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\
03,03,00,02,03,03,03,03,03,03,01,02,03,03,03,03,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
01,01,01,01,01,01,01,01,01,00,00,01,01,01,01,01
"Type"=dword:00000000
"DongleType"=dword:00000003
craclab
2016-10-20, 01:23 AM
Friend Bfox
I can not download the log_decoded
this dump not help you. your dongle is UltraPro. NOT SuperPro
@bfox
1 -how convert bin to reg
can you give me program that convert bin to reg
2 -and how you know ultra pro
3 - how i can use file toro sentinel to create file reg
you mean :
i use this reg file ultrapro for @alaa_982 but not work
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\0000120A]
"Name"="Sentinel UltraPro 120A"
"Copyright"="hasp"
"Created"="Sun Dec 08 15:26:50 2013"
"DongleType"=dword:00000003
"Type"=dword:00000001
"Option"=hex:02,00,03,A2,FF,00,00,00
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,00,02,03,03,03,03,\
03,03,01,02,03,03,03,03,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
01,01,01,01,01,01,01,01,\
01,00,00,01,01,01,01,01,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
03,03,01,01,01,00,00,00
"sntMemory"=hex:\
75,35,0A,12,68,EC,00,00,68,EC,00,00,EC,F3,51,00,\
B9,17,1A,D8,50,06,F0,F3,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,37,68,C3,D2,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
AB,05,00,00,FE,F7,FF,FF,77,7C,07,00,00,00,00,00,\
40,00,00,00,00,00,01,00,01,00,01,00,0C,AE,06,97,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
06,A3,31,C4,00,0D,07,00,00,00,00,00,00,00,00,00
1 - can you give me program that convert bin to reg
2 -and how you know ultra pro
3 - how i can use file toro sentinel to create file reg
1. you got result, not
2. alameen software not use superpro dongle, imho
3. ask TORO
can anyone compare between file log toro(original dongle , virtual dongel) because the program at first working ok
and after define language(program interfaCE) SHOW MESSAGE("CANOT find any security key connected to you system")
file toro original dongle
Out:> Initialize
Out:> GetVersion
Out:> FindFirstUnit DeveloperId=4618 (0x120A) -> Status=0x3
Out:> FindFirstUnit DeveloperId=0 (0x0) -> Status=0x0
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> SetUnitInfo
Out:> SetUnitInfo
Out:> Read Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B)
Out:> ExtendedRead Address=63 (0x3F) -> Status=0x0
Data=38662 (0x9706),AccessCode=1
Out:> Query Address=8 (0x8) -> Status=0x0
Response=7E232E14
Response32=237E142E
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=63 (0x3F) -> Status=0x0
Data=38662 (0x9706),AccessCode=1
Out:> Initialize
Out:> GetVersion
Out:> FindFirstUnit DeveloperId=4618 (0x120A) -> Status=0x3
Out:> FindFirstUnit DeveloperId=0 (0x0) -> Status=0x0
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Read Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B)
Out:> Query Address=0 (0x0) -> Status=0x0
Response=B9C10F2A
Response32=C1B92A0F
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=8 (0x8) -> Status=0x0
Response=D89F3BE9
Response32=9FD8E93B
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=8 (0x8) -> Status=0x0
Response=968ED468
Response32=8E9668D4
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Initialize
Out:> GetVersion
Out:> FindFirstUnit DeveloperId=4618 (0x120A) -> Status=0x3
Out:> FindFirstUnit DeveloperId=0 (0x0) -> Status=0x0
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> SetUnitInfo
Out:> SetUnitInfo
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=10 (0xA),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=54008 (0xD2F8),AccessCode=1
Out:> Read Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B)
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=10 (0xA),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=54008 (0xD2F8),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=10 (0xA),AccessCode=1
Out:> ExtendedRead Address=19 (0x13) -> Status=0x0
Data=0 (0x0),AccessCode=2
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=54008 (0xD2F8),AccessCode=1
Out:> ExtendedRead Address=32 (0x20) -> Status=0x0
Data=0 (0x0),AccessCode=0
Out:> ExtendedRead Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B),AccessCode=1
Out:> ExtendedRead Address=60 (0x3C) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=20 (0x14) -> Status=0x0
Response=0114D61A
Response32=14011AD6
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=53 (0x35) -> Status=0x0
Data=7 (0x7),AccessCode=1
Out:> Query Address=8 (0x8) -> Status=0x0
Response=5D477B96
Response32=475D967B
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=53 (0x35) -> Status=0x0
Data=7 (0x7),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> Query Address=12 (0xC) -> Status=0x0
Response=6D5E8070
Response32=5E6D7080
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=8 (0x8) -> Status=0x0
Response=5D477B96
Response32=475D967B
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=53 (0x35) -> Status=0x0
Data=7 (0x7),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> Query Address=16 (0x10) -> Status=0x0
Response=5EBFC36E
Response32=BF5E6EC3
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> Query Address=8 (0x8) -> Status=0x0
Response=5D477B96
Response32=475D967B
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=53 (0x35) -> Status=0x0
Data=7 (0x7),AccessCode=1
Out:> ExtendedRead Address=49 (0x31) -> Status=0x0
Data=0 (0x0),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> Query Address=12 (0xC) -> Status=0x0
Response=01F8ABFC
Response32=F801FCAB
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> Query Address=16 (0x10) -> Status=0x0
Response=469D63DD
Response32=9D46DD63
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7DA200E4
Response32=A27DE400
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=51 (0x33) -> Status=0x0
Data=65535 (0xFFFF),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=3D668085
Response32=663D8580
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> Query Address=10 (0xA) -> Status=0x0
Response=3D668085
Response32=663D8580
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=10 (0xA),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=54008 (0xD2F8),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7480A4F5
Response32=8074F5A4
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=7480A4F5
Response32=8074F5A4
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=59 (0x3B) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=60 (0x3C) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=63 (0x3F) -> Status=0x0
Data=38662 (0x9706),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=3D668085
Response32=663D8580
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> Query Address=12 (0xC) -> Status=0x0
Response=ADE60A62
Response32=E6AD620A
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Query Address=16 (0x10) -> Status=0x0
Response=80D0258C
Response32=D0808C25
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=49 (0x31) -> Status=0x0
Data=0 (0x0),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> ExtendedRead Address=56 (0x38) -> Status=0x0
Data=64 (0x40),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> ExtendedRead Address=53 (0x35) -> Status=0x0
Data=7 (0x7),AccessCode=1
Out:> ExtendedRead Address=48 (0x30) -> Status=0x0
Data=1451 (0x5AB),AccessCode=1
Out:> Read Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B)
Out:> Query Address=8 (0x8) -> Status=0x0
Response=63852363
Response32=85636323
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Read Address=0 (0x0) -> Status=0x0
Data=11675 (0x2D9B)
Out:> Query Address=0 (0x0) -> Status=0x0
Response=036C6F2A
Response32=6C032A6F
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
Out:> GetKeyType -> Status=0x0
Memory Size=0
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=10 (0xA),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=54008 (0xD2F8),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=10 (0xA),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=54008 (0xD2F8),AccessCode=1
Out:> SetUnitInfo
file toro log virtual dongle
Out:> Initialize
Out:> GetVersion
Out:> FindFirstUnit DeveloperId=4618 (0x120A) -> Status=0x3
Out:> FindFirstUnit DeveloperId=0 (0x0) -> Status=0x0
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Read Address=0 (0x0) -> Status=0x0
Data=13685 (0x3575)
Out:> Query Address=0 (0x0) -> Status=0x0
Response=B9C10F2A
Response32=C1B92A0F
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=8 (0x8) -> Status=0x0
Response=4C75FC6A
Response32=754C6AFC
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=8 (0x8) -> Status=0x0
Response=E3AF7171
Response32=AFE37171
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Initialize
Out:> GetVersion
Out:> FindFirstUnit DeveloperId=4618 (0x120A) -> Status=0x3
Out:> FindFirstUnit DeveloperId=0 (0x0) -> Status=0x0
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> SetUnitInfo
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=44556 (0xAE0C),AccessCode=1
Out:> Read Address=0 (0x0) -> Status=0x0
Data=13685 (0x3575)
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=44556 (0xAE0C),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=44556 (0xAE0C),AccessCode=1
Out:> ExtendedRead Address=19 (0x13) -> Status=0x0
Data=0 (0x0),AccessCode=2
Out:> ExtendedRead Address=32 (0x20) -> Status=0x0
Data=0 (0x0),AccessCode=0
Out:> ExtendedRead Address=60 (0x3C) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> ExtendedRead Address=52 (0x34) -> Status=0x0
Data=31863 (0x7C77),AccessCode=1
Out:> ExtendedRead Address=50 (0x32) -> Status=0x0
Data=63486 (0xF7FE),AccessCode=1
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=10 (0xA) -> Status=0x0
Response=65EE89A3
Response32=EE65A389
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> Query Address=20 (0x14) -> Status=0x0
Response=50E7D038
Response32=E75038D0
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
Out:> GetKeyType -> Status=0x0
Memory Size=64
Out:> ExtendedRead Address=0 (0x0) -> Status=0x0
Data=13685 (0x3575),AccessCode=1
Out:> ExtendedRead Address=61 (0x3D) -> Status=0x0
Data=1 (0x1),AccessCode=1
Out:> ExtendedRead Address=62 (0x3E) -> Status=0x0
Data=44556 (0xAE0C),AccessCode=1
Out:> SetUnitInfo
Out:> GetKeyType -> Status=0x0
KeyType=7 -> ULP USB
Out:> Fn19 -> Status=0x0
Unknown Info=000000000000000000000000
and
Out:> GetKeyType -> Status=0x0
KeyType=4 -> SSP USB
What I can do? any body help me
JonhB
2016-10-21, 08:51 PM
1. Solve the problem yourself.
2. Pay for the solution.
Why you talk thus
If you don't want to help me
Maybe other person help me
If I want pay money but I want to learn
the superpro and ultrapro dongle is different, and alameen software use this. mk can't emulate ultrapro on 100 % as superpro. so you need the custom solutions. imho JonhB is right...
if i use Mkbus0.1.8.2.6 can it fix the problem ??
imho, not solve your problem
yes as bfox said the Mkbus0.1.8.2.6 cannot solve it >>>
crystalimprezav
2016-11-01, 05:38 AM
try this might work
thank u @crystalimprezav (http://www.finetopix.com/member.php/118101-crystalimprezav) for reply
can you change link download i cannot download this
try this might work
can anyone change link download
try this might work
plz anyone change link download Softpro HASP Emulator.zip (http://www.finetopix.com/attachment.php?attachmentid=39864&d=1477946276)
JonhB
2016-11-10, 04:07 AM
Your dongle is Sentinel. What are you doing with the HASP emulator? Just curious.
Your dongle is Sentinel. What are you doing with the HASP emulator? Just curious.
1. Solve the problem yourself. 2. Pay for the solution.
you dont help and criticize:confused:
i execute what his said crystalimprezav
http://www.finetopix.com/images/misc/quote_icon.png Originally Posted by crystalimprezav http://www.finetopix.com/images/buttons/viewpost-right.png (http://www.finetopix.com/showthread.php?p=254315#post254315)
try this might work
hi zeela,
sorry to late reply...use Alameen installer version (7.6.313.359) with below reg perfactly working
Note:use multikey 18.2.2 and above only support below reg.
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\0000120A]
"DongleType"=dword:00000003
"Type"=dword:00000001
"Option"=hex:02,00,03,A2,FF,00,00,00
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,00,02,03,03,03,03,\
03,03,01,02,03,03,03,03,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
01,01,01,01,01,01,01,01,\
01,00,00,01,01,01,01,01,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
03,03,01,01,01,00,00,00
"sntMemory"=hex:\
75,35,0A,12,68,EC,00,00,68,EC,00,00,EC,F3,51,00,\
B9,17,1A,D8,50,06,F0,F3,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,37,68,C3,D2,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
AB,05,00,00,FE,F7,FF,FF,77,7C,07,00,00,00,00,00,\
40,00,00,00,00,00,01,00,01,00,01,00,0C,AE,06,97,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
06,A3,31,C4,00,0D,07,00,00,00,00,00,00,00,00,00
hi zeela,
sorry to late reply...use Alameen installer version (7.6.313.359) with below reg perfactly working
Note:use multikey 18.2.2 and above only support below reg.
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\0000120A]
"DongleType"=dword:00000003
"Type"=dword:00000001
"Option"=hex:02,00,03,A2,FF,00,00,00
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,00,02,03,03,03,03,\
03,03,01,02,03,03,03,03,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
01,01,01,01,01,01,01,01,\
01,00,00,01,01,01,01,01,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,\
03,03,01,01,01,00,00,00
"sntMemory"=hex:\
75,35,0A,12,68,EC,00,00,68,EC,00,00,EC,F3,51,00,\
B9,17,1A,D8,50,06,F0,F3,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,37,68,C3,D2,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
AB,05,00,00,FE,F7,FF,FF,77,7C,07,00,00,00,00,00,\
40,00,00,00,00,00,01,00,01,00,01,00,0C,AE,06,97,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
06,A3,31,C4,00,0D,07,00,00,00,00,00,00,00,00,00
@kjms
thank you very much
the Alameen installer version (7.6.313.359) cannot get it because old
i have Alameen installer version (7.6.313.380)
@kjms
finally i found Alameen installer version (7.6.313.359)
and used multikey 18.2.4
but program work and then give
same message ("cant find any security key connected to your system") that problem on 7.6.313.380
link 7.6.313.359
https://mega.nz/#!QJFUjIAT!P0VeFdSHZHvZdY9FDXJmTADJ-bScfwhN6hRl-xjTP4A
what i can do ?.
JonhB
2016-11-14, 04:40 PM
What is your OS? AFAIK, Mkey 18.2.4 x64 need license from the author.
What is your OS? AFAIK, Mkey 18.2.4 x64 need license from the author.
@JonhB
my os is
xp 32bit >>> okay
and there is Mkey 18.2.4 x64 and Mkey 18.2.4 x32 >>>
and i used Mkey 18.2.4 x32
pony1net
2016-11-22, 07:41 PM
Dear kjms, i saw, that you helped some people to find an error in their REG files for MultyKey64
I have a Sentinel SuperPro Dongle, and a created a Dump with PVA 3.3 and converted it with dmp2mkey.exe
But there still seems to be an error in in. Could you please take a look?
I deed the dump 2 times. 1 time from an old dump of the Dongle an one time from the original Dongle:
Dump from original Dongle (not working):
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\4E6D0000]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Nov 22 11:46:03.375 2016"
"Name"="4E6D Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\
01,01,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,00,01,01,01,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,01,00
"sntMemory"=hex:\
F6,16,6D,4E,00,00,00,00,DA,FE,00,00,22,A3,00,00,\
C8,F9,6B,D1,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,65,20,34,95,00,00,00,00,3C,38,4C,A5,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
C8,F9,6B,D1,1B,04,F1,AD,00,00,00,00,0A,B7,49,FB,\
00,00,00,00,00,00,00,00,00,00,E1,00,00,00,2D,00,\
06,10,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,3B,92,86,31,B5,0B,00,00,05,00,00,00
Dump from an old dump of the same Dongle (also not working):
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\4E6D0000]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Nov 22 11:00:17.977 2016"
"Name"="4E6D Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\
01,01,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,00,01,01,01,\
00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,01,00
"sntMemory"=hex:\
F6,16,6D,4E,00,00,00,00,DA,FE,00,00,22,A3,00,00,\
C8,F9,6B,D1,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,65,20,34,95,00,00,00,00,3C,38,4C,A5,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
C8,F9,6B,D1,1B,04,F1,AD,00,00,00,00,0A,B7,49,FB,\
00,00,00,00,00,00,00,00,00,00,E1,00,00,00,2D,00,\
06,10,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,86,31,00,00,00,00,05,00,00,00
Thank you very much for your time! You are making a great job. Wish i could understand, how you solve it )
grllver
2016-12-04, 09:28 AM
@zela @kjms can anyone of you upload Alameen installer version (7.6.313.359) or give a working link please ?
the version uploaded gives a fatal error on Windows 7 X64 ..
@pony1net:
you can upload the software installer for theme?
pony1net
2016-12-06, 02:17 AM
@pony1net:
you can upload the software installer for theme?
Here it is.
https://drive.google.com/open?id=0B5qcs9R46P8eQjdpUDR3NWZDWjQ
Password mk4
@pony1net:
you can upload the software installer? not dongle emulator
@kjms
finally i found Alameen installer version (7.6.313.359)
and used multikey 18.2.4
but program work and then give
same message ("cant find any security key connected to your system") that problem on 7.6.313.380
link 7.6.313.359
https://mega.nz/#!QJFUjIAT!P0VeFdSHZHvZdY9FDXJmTADJ-bScfwhN6hRl-xjTP4A
what i can do ?.
MR KJMS WHERE ARE YOU
grllver
2016-12-14, 08:10 AM
does anyone have the old version of Al-Ameen ? Al-Ameen 2000 not Al-Ameen 2004 .. it used to work super , but I lost it in the war in syria ..
maybe any luck to find it here ?
vBulletin® v4.2.5, Copyright ©2000-2024, Jelsoft Enterprises Ltd.