Reverse Engineering Team Board

Reverse Engineering Team Board (http://www.reteam.org/board/index.php)
-   Reverse Code Engineering (http://www.reteam.org/board/forumdisplay.php?f=23)
-   -   DNG to dmp,reg converter (http://www.reteam.org/board/showthread.php?t=3383)

ektwr 01-16-2011 01:26 PM

DNG to dmp,reg converter
 
hi all,
I found this forum by searching and i will tell you my problem.
I have a DNG file which i attach here and i would like to convert it to a dmp,reg or any other format for good hasp hl emu.
I test it with edge hl2007 -ok
but now i have a 64bits PC and the 2007 emu doesnt work.
I dont want to buy the hasp hl2010 version of course.
This is my problem and thanks for any help.
http://hotfile.com/dl/97257184/b256c05/5189.dng.html
TIA

sparpacillon 01-16-2011 01:54 PM

this is the content of your dng...
Eplan Compact v5.70 International

modify a multikey dump fitting your data...

Quote:

"hlkMemory"=hex:
00,00,57,55,50,30,55,31,30,30,36,36,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
45,50,4C,41,4E,00,53,6F,66,74,77,61,72,65,00,26,\
00,53,65,72,76,69,63,65,00,47,6D,62,48,00,26,00,\
43,6F,2E,00,4B,47,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,65,B2
"Seed1"=dword:0000D5C2
"Seed2"=dword:000060DE
"Seed3"=dword:000092F4

ektwr 01-16-2011 03:17 PM

Thank you for quick reply :)
i will try it and inform the forum about results as sooner as i can.
cya!

ektwr 01-17-2011 12:15 PM

Although i try a lot, i couldn't make this prog work.
I put the code to emulator like this
Code:

REGEDIT4
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\MultiKey\Dumps\00005189]
"hlkMemory"=hex:
00,00,57,55,50,30,55,31,30,30,36,36,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
45,50,4C,41,4E,00,53,6F,66,74,77,61,72,65,00,26,\
00,53,65,72,76,69,63,65,00,47,6D,62,48,00,26,00,\
43,6F,2E,00,4B,47,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,65,B2
"Seed1"=dword:0000D5C2
"Seed2"=dword:000060DE
"Seed3"=dword:000092F4
"ID"=dword:00000000
"DongleType"=dword:00000002
"withMemory"=dword:00000001

I am newbee here but i have some basic knowledge about dong's
and i've crack some with lpt checker.
My question is: how should i know that multikey emulator works.
I check into device manager and i found it at system programs like multikey usb.
Is there any kind of monitor to check if the target programm make a query to the hasp-hl emulator?
for example glasha's brainstudio with virtual emulation can check imediately if the target program make a query to hasp-hl.
Another thought is to try cracking the edge hasp-hl 2010.
I will wait for your reply to decide what to do.
TIA !

alaska 03-25-2019 07:02 AM

hello, can someone please help me with this dng file to convert to reg?https://mega.nz/#!C8ZGyQZa!jhdoU1jZv...RoVPUbkW pIp4

BfoX 03-25-2019 11:26 AM

the dump is ciphered. you need redump your dongle/emulator with free dumper.

Freakster235 04-28-2019 04:05 AM

Hello,

can someone help me to convert a .dng file to a multikey reg?
It ist a dump from a hardlock service dongle.

Link to DNG:
http://rgho.st/8fWG4gldb

Thanks you all.

Freakster

BfoX 04-28-2019 07:50 AM

Quote:

Originally Posted by Freakster235 (Post 39331)
It ist a dump from a hardlock service dongle.

re-dump it with SpoRaw dumper. your dump is ciphered.

Freakster235 04-29-2019 04:46 AM

Hello,

here is the re-dump with SpoRaw, how can i solve it to multireg?

http://rgho.st/8hFPDmwFB

Thanks you all.

BfoX 04-29-2019 11:49 AM

Code:

REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Multikey\Dumps\00006838]
"hlkMemory"=hex:\
20,20,20,20,20,20,20,20,01,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,48,61,72,64,6C,6F,63,6B,20,57,69,74,\
68,20,4D,65,6D,6F,72,79,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20
"Seed1"=dword:00005DC4
"Seed2"=dword:00007075
"Seed3"=dword:00001ad9
;29EA
"ID"=dword:00000000
"DongleType"=dword:00000002
"withMemory"=dword:00000001

and

Code:

REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Multikey\Dumps\00006838]
"hlkMemory"=hex:\
20,20,20,20,20,20,20,20,01,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,48,61,72,64,6C,6F,63,6B,20,57,69,74,\
68,20,4D,65,6D,6F,72,79,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,\
20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20
"Seed1"=dword:000032AB
"Seed2"=dword:0000EAE0
"Seed3"=dword:00001ad9
;29EA
"ID"=dword:00000000
"DongleType"=dword:00000002
"withMemory"=dword:00000001



All times are GMT -4. The time now is 07:14 AM.

Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.