Instructions how make the dump Guardant Stealth


In order to get the dump of the key, it is necessary that the Guardant key drivers are installed.


Drivers usually integrate into a distribution with a secure application and are already available in the system.


Also they can be downloaded here: Guardant_drivers

And take the key dumper here: search.rar

All utilities are laid out in the archives with the password:

Unpack the archive with the dumper and run the executable file

A window similar to the following will appear:



! Be sure to wait until the utility finishes work !


If done correctly, the dumper will create several **.bin files and one file with the **. log.
This is the dump of your key.
In addition, it is very desirable to make the log of the program with the key.



The log is done using the USBTrace utility.

The USBTrace utility can be downloaded from the link below.


All utilities are laid out in the archives with the password:

Then you need to install the USBTrace utility and be sure to register according to the description to the program.


How to get the log:


Remove the key and launch the USBTrace utility in the program menu by clicking the Capture Hot Plugged Devices button and then Start Capture.


After that, insert the key into the port!


The USBTrace interface   should begin to be filled with text data:


Then run the program itself.


Filling in the data will continue.


When the program is fully started, it is desirable to work a little in it using its important functions.


Then close the protected program.


In the USBTrace window click the Stop Capture button , thereby stopping the data capture.


After that, in the main menu, select   File -> Export Utility -> select the path to save the log


!!! Required in the format of a text document! -> Specify the Text Log (*.txt ) drop-down menu..


Enter the file name for example 1.txt and then press the Export button , thereby saving the log file.


Close USBTrace.


Here is a   brief, intuitive instruction on how to use the utility.



Video instruction:


After get all data from the key, all should be archived and sent (folder with the dump of the key and the log file taken by the 
USB Trace program) to  

And not forget send a link to the protected program.

During the day we will contact you ..



Aladdin Sentinel HASP/SRM + WBAES




Aladdin Hardlock/EYE


Feitian Rockey 2/Secure Dongle X


Feitian Rockey 4ND/HID


TDI Matrix Dongle


Marx CriptoBox Dongle


Microcosm Dinkey Dongle


Sentinel Hardware Key


Sentinel SuperPro/UltraPro


Guardant Stealth I/II


Eutron Smartkey 3






ICQ: 665105782