















Ok so you can still download the pipe object here (why is this not in the extension manager?): http://sites.google.com/site/mmf2stu...attredirects=0
And ive made a simple 2 event example which gets the UUID without any console windows, text files ETC. uuid-example.mfa
Hope this is some use to you.
Andy










The pipe object has been replaced with the Console object available here: https://dark-wire.com/exts/Console.zip
Also, both the Console and Pipe objects were made by Clickteam, and you can PM James to ask for the Console object to be added to the Extension Manager: https://community.clickteam.com/private.php?do=newpm&u=1
Sent from my SM-T280 using Tapatalk











I could make a basic extension that returns "wmic csproduct get UUID" although this isn't always specified on system's BIOS especially if its not an OEM system it may return FF's. but then it could always fail over to generating something using the HDD's serial numbers and NIC mac address
First though its worth using the registry object to read the MachineGuid string:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography
Although this can change with hardware changes.
The problem I had with the registry was needing admin access to read the files. It was a while back I played with it, so I may have been going about it wrong.
I used the example inuded earlier, which was a great help. The small issue is it seems sometimes wmic is in the system32/wbem directory and other times its located in the system32 directory.
My main concern is that I barely know what I'm doing with this uuid stuff. Any examples or extensions are much appreciated and I'm sure the whole community will benefit![]()

If you don't want your user to elevate administrative rights after they have installed it, then I highly recommend you do the checks post-install by launching an executable that does require elevated rights but because the installer had elevated rights, it won't require your end-user to elevate again thus rendering it already 'administrative' and you can then quickly gather an ID from the registry and write that out to a file what you can use for your app launches.
Additionally, you can use any of the hardware IDs present for uniqueness, all the hardware IDs are stored in the registry. I can't think off the top of my head right now but I know they are there, I used them a few times in various different projects for generating super-unique strings.





I think Danny has the right solution for this. However you cant get the Machine Guid from HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography because its only in the 64-bit area of the registry. You won't find this in the 32-bit area.
It is possible for 32-bit application to read from the 64-bit area, but none of the registry extensions support this :-/





Thanks alot advaith. I didn't have this version. I didn't know it was updated at all with 64-bit support. Why wasn't it showing up as outdated in the extension manager?
I tested this with trying to read the string "MachineGuid" from "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography " and it worked fine even as invoker (Didn't have to run the application as an administrator. I am logged into an administrator account so maybe it wouldn't work if I was logged in to an non-administrator account)











I know it's no longer needed but as I made a start I thought I'd just finish it. I've attached a WMI Extension I made with an example of usage attached.