CSI products 2013 license generator up to 19/07/2015
Current time: 07-19-2018, 07:06 AM
Users browsing this thread: 1 Guest(s)
Author: svero
Last Post: michaelao
Replies 53
Views 24328

CSI products 2013 license generator up to 19/07/2015
#1
This is license keyfile generator for some of CSI products. It makes legit licenses, and with use of this no crack/patch is required.

Look:
[Image: 15314298573293786532.jpg]

Supported CSI products:
[Image: 41892260269528244039.jpg]

Usage:
1. Select product.
2. Enter yout localcode (fingerprint from echoid/wechoid).
Select license expire date (WARNING!!! 1 year max).
3. Generate your license file (it took few seconds - just wait confirmation for generator).
4. Rename generated file to "lservrc" and copy to corresponding program dir.

Download:
***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************


Enjoy ;)



Reply
#2
Hope this is OK.
***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************

Reply
#3
Tutorial CSI Multi Products License Generator

Tutorial CSI Multi Products License Generator
***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************

[-] The following 29 users say Thank You to ingcivilpe for this post:
  • jferrer, tremonti, engr1900, Galileo, zrilek, blaze, malc, rezart, valinhas, VCHFCE, Visitante, cod-X, kashero, melkat, oanm2000, Adam Smith, faxel, sumiscute, XXXX123, niki102, musssa, jcbv, supasart, julioreptil, engrezi, tangosuite, maijuji, kvtasp, arceon
Reply
#4
After analysing the license generator files i found out that the so-called generator "csimp.exe" has a virus like behavior. The real generator is lsc.exe. And since there is no option for SAP2000 V14 i wrote a simple batch file that could be used instead of "csimp.exe" for generating SAP2000 V14 licenses. So copy-paste the text marked with italics in an empty text file with ".bat" extension, place that file next to "lsc.exe" and run it. (lsc.exe is part of the license generator)
Text for batch file:
Private Note:
***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************

If you encounter errors just make sure there is no "lservrc" file in the same folder with lsc.exe.
Reply
#5
[Image: info.png]
Thanks alot to LiviuM, I wrote same bat file for CSI Bridge

[Image: screen.png]
[Image: 67097346408283307716.jpg]

[Image: Download.png]

***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************


We create our Tomorrows by what we dream Today...
Reply
#6
The same for :

ETABS 9 and Safe 12.

[Image: 33266174181638941250.gif]

[Image: 74588594978331805166.gif]


***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************



RAR Password: FromCivilEA
[-] The following 33 users say Thank You to BennyP for this post:
  • kowheng, melkat, Visitante, tremonti, Diquan, rezart, shabe, pezhmankhan, engr1900, erthqkengnr™, hmwere, psycin, Dell_Brett, oanm2000, simanta, Galileo, vardan, shuvo, bhawk0, cod-X, concreteok, llbb, zrilek, bybyby, Grunf, sumiscute, Achye, niki102, jcbv, blaze, ting tsai huang, rvkumar361, engiman27
Reply
#7
Dear all,

My contribution:

***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************


with the same password
Diquan
[-] The following 9 users say Thank You to Diquan for this post:
  • phanbao, bhawk0, hmwere, zrilek, Visitante, rezart, Vakef, sumiscute, ting tsai huang
Reply
#8
Mirror
***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************

Password
***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************

stone age was not finished due to lack of stones. . . . . .tEChNOlOGY Changed
[-] The following 27 users say Thank You to usman for this post:
  • melkat, Grunf, Milkshake, oanm2000, zrilek, bybyby, julioreptil, rezart, sumiscute, onest30, blaze, Jackass, amira, maijuji, jakoben, c1366, ting tsai huang, narendra, Svetoslav, rendel_©, Safira, Visitante, mohamz, hignacio43, oreslaw, engrirfan, davegabj
Reply
#9
Someone else saw something like this or only my antivirus is so stupid to think is a virus in this contribution ?
Good luck !

[Image: 85381952659962208875.gif]

A lot of pages in internet about (18660 results by google) but try to see one for example.

***************************************
Content of this section is hidden, You must be registered and activate your account to see this content. See this link to read how you can remove this limitation:

http://forum.civilea.com/thread-27464.html
***************************************


From other site:

Quote:Description:
Win32.JunkPoly.Cryp is a malicious backdoor Trojan that runs in the background and allows remote access to the compromised system. Win32.JunkPoly.Cryp contains a hacktool for attackers to break into the PC. Win32.JunkPoly.Cryp can change Windows Explorer settings to download other malicious files from external servers. Win32.JunkPoly.Cryp monitors user activities to obtain valuable personal information. Win32.JunkPoly.Cryp poses a dangerous threat to any computer or system and should be terminated immediately.

Other names:

[Image: 91839130296232624065.gif]

And this is from Microsoft site:

Technical Information (Analysis)
Virus:Win32/Virut.BM is a polymorphic file infector that targets .EXE and .SCR files. This virus also opens a backdoor by connecting to an IRC server, allowing a remote attacker to download and execute arbitrary files on the infected computer. It uses advanced techniques to hide infection.
Spreads Via…
Executable File Infection
Win32/Virut.BM disables Windows System File Protection (SFP) by injecting code into WINLOGON.EXE. The injected code patches sfc_os.dll in memory which in turn allows the virus to infect files protected by SFP.

The virus infects .EXE and .SCR files on access, hence actions such as copying or viewing files with Explorer, including on shares (with write access) will result in files being infected, and the virus spreading from machine to machine.

The virus injects its own code into a system process such as explorer.exe or winlogon.exe, and hooks low-level (NTDLL layer) Windows API calls in order to stay in memory. It hooks the following functions in each running process (NTDLL.DLL):

NtCreateFile
NtOpenFile
NtCreateProcess
NtCreateProcessEx

Thus, every time an infected process calls one of these functions, execution control is passed to the virus.

HTML File Infection
It writes code to HTML files that adds a hidden IFrame pointing to the domain 'zief.pl'. When the HTML file is opened, the browser connects to this server without the user's knowledge. The HTML page hosted at this location attempts to exploit a number of different vulnerabilities (including those affecting the user's browser and other applications) in order to run a copy of the virus. These modified HTML files are detected as Virus:HTML/Virut.BH.

The virus also modifies the local machine's hosts file, redirecting the domain 'zief.pl' to localhost (127.0.0.1) so that already-infected machines will not run the remotely-hosted copy of the virus.
Payload
Backdoor Functionality
Virut.BM connects to Internet Relay Channel (IRC) server 'irc.zief.pl' via port 80 using a particular channel. Should this fail, it instead attempts to connect to 'proxim.ircgalaxy.pl' also using port 80.

It contains functionality to download and execute arbitrary files on the affected system. This may include additional malware. The backdoor can also be used to change the host that it connects to for control.
Additional Information
Virut.BM creates the event 'Vx_5' to prevent multiple copies of itself from running simultaneously on the affected system. A minor variant may create another mutex "l0r5".
[-] The following 9 users say Thank You to BennyP for this post:
  • oanm2000, concreteok, rezart, andersen3, engr1900, marcel1983, jcbv, engrirfan, Rodmo376
Reply
#10
Avast and McAfee have reported the presence of virus in the *. EXE file in four different machines, with XP and Windows 7. I have checked just few minutes ago. BennyP reported the same... Bad
I suggest that Diquan or Shabe check the status of the file... and that medicine should not be used until someone could solve the problem with the file.
Meanwhile, I delete the file contaminated in my PCs because no antivirus software that I uses could clean up it...
[-] The following 5 users say Thank You to oanm2000 for this post:
  • concreteok, rezart, jcbv, engrirfan, htlcnn
Reply




Users browsing this thread: 1 Guest(s)