top of page
vyacheslavnikiforo9

Atapwd Exe Download: How to Use Hiren's BootCD to Access Password Protected Disks



Atapwd.exe problems are generally seen during Ultimate Boot CD program launch, and typically caused by executable file corruption, or in some cases if the file has been accidentally or maliciously removed by malware. Ordinarily, installing a new version of the EXE file will repair the problem creating the error. In addition, if your atapwd.exe error was due to a removed malware infection, we recommend running a registry scan to clean up any invalid file path references created by the malicious program.


Please take caution in ensuring the file is placed in the correct file directory. Following these instructions carefully should resolve your atapwd.exe error, but we recommend running a brief check. To confim it's resolved, try starting up Ultimate Boot CD to see if the error can be triggered.




Atapwd Exe Download




Usually atapwd.exe errors with Ultimate Boot CD happen during startup or shutdown, while atapwd.exe related programs are running, or rarely during the OS update sequence. Keeping track of when and where your atapwd.exe error occurs is a critical piece of information in troubleshooting the problem.


ATA Passw0rd Unl0cking for all drives Page 1 of 3 [ 44 posts ] Go to page 1, 2, 3 Next Previous topic Next topic AuthorMessageinfringer Post subject: ATA Passw0rd Unl0cking for all drivesPosted: July 19th, 2010, 16:43 Joined: July 18th, 2010, 18:14Posts: 16Location: Other Side Of Your Screen------------------------------------------------------------------------------------------------Western Digital------------------------------------------------------------------------------------------------First what is known is that many Western Digital HDD can be unlocked.Method download MHDD bootable disc.Run these scripts.... To test:;script name: read md;reads md 02 on WD marwell drives;resetwaitnbsyregs = $45 $0b $00 $44 $57 $a0 $80waitnbsyregs = $d6 $01 $be $4f $c2 $a0 $b0waitnbsycheckdrqsectorsfrom = cs.binregs = $d5 $01 $bf $4f $c2 $a0 $b0waitnbsycheckdrqsectorsto = 21.binregs = $d5 $01 $bf $4f $c2 $a0 $b0waitnbsycheckdrqsectorsto = 22.bin; endOR THIS SCRIPT; rm modul id 42resetwaitnbsyregs = $57 $44 $43 $00 $00 $a0 $8awaitnbsyregs = $00 $02 $00 $00 $0F $E0 $21waitnbsycheckdrqsectorsto = 42.bin; End. You will look for a dump with info similar to this reply below:The script worked perfectly! While the ones at this page didn't work for much: Some hitches:Had to set BIOS to IDE->Enhanced -> Native, and things worked. Didn't like IDE in flat out compatibility mode, and AHCI bombed horribly. (Board is non-public Intel 975x chipset w/ very weird BIOS options for IDE/SATA)Also, after much tearing out of hair, I just got to the point of booting off CD (which sadly is PATA) and running the older MHDD off a usb flash drive (seen by system as C:, heh).The end result was that I was able to very happily remove a password on a drive; this drive I've had for a long time. No interesting data on it; just kept in case 'some day' I found a way to deal with it. (Actually, figured from what I'd read before, that at some point, I could just reformat the drive and have a spare, but this was way more fun.)For people interested, the first post is with a password (NOT the original: I set this one, and it'll be exactly obvious, especially if anyone happens to enjoy the movie reviews from spill.com (watch on youtube, less annoying than loading their site!) but even if not, it'll be absolutely obvious):Code:00000000 FA 00 00 01 0E 00 00 00 02 02 00 0F 32 0C CA FA ............2...00000010 0A 32 0A 01 41 46 05 01 00 00 20 00 64 00 00 01 .2..AF.... .d...00000020 60 02 12 00 22 00 0A 00 00 00 00 00 00 00 00 00 `..."...........00000030 00 00 00 01 E0 01 0F 0F 01 02 02 0A 01 02 00 02 ................00000040 02 06 01 00 FF FF 02 03 50 01 1E 01 01 01 04 40 ........P......@00000050 0B 00 01 00 00 00 00 05 00 00 00 00 00 FF FF 00 ................00000060 00 00 00 12 0A 12 00 00 00 05 00 00 00 00 00 1E ................00000070 00 00 00 00 00 00 00 00 00 4D 00 24 00 07 00 12 .........M.$....00000080 00 00 00 00 0E 00 00 00 00 00 00 00 01 00 00 00 ................00000090 00 00 00 07 00 01 02 0D 00 00 00 00 00 00 00 00 ................000000A0 00 01 03 00 03 01 01 01 00 00 00 00 00 00 00 00 ................000000B0 00 00 00 00 00 01 57 44 43 20 57 44 36 30 30 42 ......WDC WD600B000000C0 45 56 53 2D 32 32 52 53 54 30 20 20 20 20 20 20 EVS-22RST0 000000D0 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 000000E0 20 20 00 00 00 00 00 00 00 01 53 7C 42 7C 4C 7C ........SBL000000F0 50 4D 4D 53 48 47 43 55 52 48 56 42 4B 47 55 4A PMMSHGCURHVBKGUJ00000100 00 20 20 20 20 20 20 20 20 20 20 20 20 20 30 35 . 0500000110 2D 30 35 2D 32 30 30 37 00 00 00 00 00 00 00 00 -05-2007........00000120 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................00000130 00 00 00 00 00 01 07 00 53 4F 4D 45 4F 4C 45 42 ........SOMEOLEB00000140 55 4C 4C 53 48 49 54 00 00 00 00 00 00 00 00 00 ULLSHIT.........00000150 00 00 00 00 00 00 00 00 57 44 43 57 44 43 57 44 ........WDCWDCWD00000160 43 57 44 43 57 44 43 57 44 43 57 44 43 57 44 43 CWDCWDCWDCWDCWDC00000170 57 44 43 57 44 43 57 00 08 00 FE FF 00 00 00 00 WDCWDCW.........00000180 00 01 30 00 00 05 00 64 00 14 20 32 00 00 00 0F ..0....d.. 2....00000190 00 01 02 00 40 00 2C 01 32 00 20 00 55 FF 00 00 ....@.,.2. .U...000001A0 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 ................000001B0 00 00 00 00 00 00 00 00 00 00 00 00 58 58 58 58 ............XXXX000001C0 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 XXXXXXXXXXXXXXXX000001D0 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 XXXXXXXXXXXXXXXX000001E0 58 58 58 58 58 58 58 58 58 58 58 58 01 01 01 01 XXXXXXXXXXXX....000001F0 01 00 00 00 00 00 00 00 00 01 0A 00 31 00 00 01 ............1...Note byte at offset 137, now look at password cleared:Code:00000000 FA 00 00 01 0E 00 00 00 02 02 00 0F 32 0C CA FA ............2...00000010 0A 32 0A 01 41 46 05 01 00 00 20 00 64 00 00 01 .2..AF.... .d...00000020 60 02 12 00 22 00 0A 00 00 00 00 00 00 00 00 00 `..."...........00000030 00 00 00 01 E0 01 0F 0F 01 02 02 0A 01 02 00 02 ................00000040 02 06 01 00 FF FF 02 03 50 01 1E 01 01 01 04 40 ........P......@00000050 0B 00 01 00 00 00 00 05 00 00 00 00 00 FF FF 00 ................00000060 00 00 00 12 0A 12 00 00 00 05 00 00 00 00 00 1E ................00000070 00 00 00 00 00 00 00 00 00 4D 00 24 00 07 00 12 .........M.$....00000080 00 00 00 00 0E 00 00 00 00 00 00 00 01 00 00 00 ................00000090 00 00 00 07 00 01 02 0D 00 00 00 00 00 00 00 00 ................000000A0 00 01 03 00 03 01 01 01 00 00 00 00 00 00 00 00 ................000000B0 00 00 00 00 00 01 57 44 43 20 57 44 36 30 30 42 ......WDC WD600B000000C0 45 56 53 2D 32 32 52 53 54 30 20 20 20 20 20 20 EVS-22RST0 000000D0 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 000000E0 20 20 00 00 00 00 00 00 00 01 53 7C 42 7C 4C 7C ........SBL000000F0 50 4D 4D 53 48 47 43 55 52 48 56 42 4B 47 55 4A PMMSHGCURHVBKGUJ00000100 00 20 20 20 20 20 20 20 20 20 20 20 20 20 30 35 . 0500000110 2D 30 35 2D 32 30 30 37 00 00 00 00 00 00 00 00 -05-2007........00000120 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................00000130 00 00 00 00 00 01 01 00 00 00 00 00 00 00 00 00 ................00000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................00000150 00 00 00 00 00 00 00 00 57 44 43 57 44 43 57 44 ........WDCWDCWD00000160 43 57 44 43 57 44 43 57 44 43 57 44 43 57 44 43 CWDCWDCWDCWDCWDC00000170 57 44 43 57 44 43 57 00 08 00 FE FF 00 00 00 00 WDCWDCW.........00000180 00 01 30 00 00 05 00 64 00 14 20 32 00 00 00 0F ..0....d.. 2....00000190 00 01 02 00 40 00 2C 01 32 00 20 00 55 FF 00 00 ....@.,.2. .U...000001A0 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 ................000001B0 00 00 00 00 00 00 00 00 00 00 00 00 58 58 58 58 ............XXXX000001C0 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 XXXXXXXXXXXXXXXX000001D0 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 58 XXXXXXXXXXXXXXXX000001E0 58 58 58 58 58 58 58 58 58 58 58 58 01 01 01 01 XXXXXXXXXXXX....000001F0 01 00 00 00 00 00 00 00 00 01 0A 00 31 00 00 01 ............1...To make it very clear, as far as I see, the only changes, are these (first password, than unlocked):Code:00000130 00 00 00 00 00 01 07 00 53 4F 4D 45 4F 4C 45 42 ........SOMEOLEB00000140 55 4C 4C 53 48 49 54 00 00 00 00 00 00 00 00 00 ULLSHIT.........Code:00000130 00 00 00 00 00 01 01 00 00 00 00 00 00 00 00 00 ................00000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................This might be useful to someone else to do something? I wish I knew a lot more, like how to dump the whole firmware; none of the tools like marv_fl.com work when the drive's attached to SATA (on this system, anyway) and it's been too long since I did a COM file to quickly fix it. (For that system, port 0xFC00 for beginning IO, and 0xF882 (I think) for control). Would really love to know what the bytes in the feature register do in the mhdd script for this, and if there's a way of specifying reading more than a sector at a time.Anyway, this forum rules... thank you to the people here who post helpful stuff, instead of just telling people they don't need to know. For me, I didn't have to have this drive's password cleared, but it's really neat to have done so!Look at EC command - even hdd passport was not read. Software cannot work in this case, as it cannot make you a sandwitch. _mhdd.html - first movie for disbelievers - works 100%.unlock WD (WDC,MARVEL,ROYL) -> ... hdd-pamiro i was stuck with the same problem which i solve on a WDC2500bevtjust a quick list of master pwd i found on my travelsWDCWDCWDCWDCWDCWDCWDCWDCWDCWDCW 2ff7e9595c


1 view0 comments

Recent Posts

See All

Comments


bottom of page