Support, help and instructions for abylon CRYPTMAIL

Share page: || Newsletter: Subscribe Unsubscribe

Additional Info and Help E-mail encryption to protect against spies

Questions and answers about the software abylon CRYPTMAIL (FAQ's)

Encryption and signature of e-mails; incl. Outlook AddIn

NOTE The CRYPTMAIL plugin is ONLY for Microsoft Outlook and NOT suitable for Outlook Express or Windows Live!

1. CRYPTMAIL plugin enabled?

Check first if the plugin is activated in the abylon CRYPTMAIL settings on the CRYPTMAIL page. The activation/deactivation is done via the switch in the upper left corner!

To apply the changes, Outlook must be closed and restarted. Check if the process Outlook.exe was terminated in Windows Task-Manager. Alternatively, you can log out of Windows once.

2. You have Office (Outlook) installed as 32bit version on a 64biut Windows!

We check during the installation whether a 32bit or a 64bit Windows operating system is installed on the computer. If you have installed a 32bit Office on a 64bit operating system, our 64bit PlugIn cannot be opened in Outlook. In this case you have to download our special setup of the 32bit version of abylon CRYPTMAIL under the following link download.

3. change registry flags?

The calling convention of the Outlook plugin can be changed with the following registry entries:

  1. Close Outlook (check in the Windows Task Manager)
  2. Open the registry file Start -> Execute -> Regedit
  4. Change the value NO after YES the character string (REG_SZ) RENEW_EXPL_BUTTONS
  5. Change the value YES after NO the character string (REG_SZ) RENEW_INS_BUTTONS
  6. Restart Outlook (possibly log off Windows once)

By default, Outlook blocks potentially dangerous attachments, such as *.crt security certificates or *.exe program files. Outlook itself does not offer an option not to block individual file types of security level 1. However, you can create the following entry in the registry so that CRT certificate files are displayed. To do this, proceed as follows:

  1. Open the registry file Start -> Execute -> Regedit
  2. Create the following entry:
    Subkey for Outlook 2000 SP3 and later: Software\Microsoft\Office\9.0\Outlook\Security\
    Subkey for Outlook 2002: Software\Microsoft\Office\10.0\Outlook\Security\
    Subkey for Outlook 2003: Software\Microsoft\Office\11.0\Outlook\Security\
    Value name: Level1Remove
    Value type: REG_SZ
    Value: CRT (Separate multiple file extensions with semicolon)
  3. Restart the computer for Outlook to accept these changes.

Download of the registry patches without guarantee: Outlook 2000 SP3; Outlook 2002; Outlook 2003

NOTE Outlook locks level 1 executable files to prevent the spread of viruses and worms. There is no danger from this registry entry if you only open and install CRT certificate files from persons you know.

The modules of abylonsoft work together with the Simple-MAPI (MAPI = Mail Applications Program Interface) as interface between the application and the email program. Under certain circumstances an error may occur when sending a file (e.g. *.SME) directly with your email program. There are three reasons for this error:

  1. You do not have a MAPI-enabled email program
  2. Your email program is not registered as default email program!
  3. Your MAPI (mapi32.dll) was corrupted by installing a browser or replaced by an older version

MAPI-enabled email programs: Netscape, Outlook, Outlook Express, AOL (from version 7.0), Eudora, Pegasus Mail, Lotus Notes (from version 4.5 ???) and others!

Necessary settings:

  • Outlook or Outlook Express:
    Select the menu item Internet Options (or Properties) in Internet Explorer under Tools and select the tab Programs. There you have to select your desired email program under Email and confirm with the button OK. Alternatively you can do this in the Control Panel under Internet Options.
  • Netscape:
    Under Edit, select Settings from the menu. Under the item Mail & Discussion forums or Mail & Newsgroups activate the item Use Netscape Messenger for MAPI-based applications or Use Netscape Messanger.
    for MAPI-based applications The names and the location of the settings can vary from version to version! (Use help)
  • AOL:
    AOL supports Simple-MAPI from version 7.0 on. To activate it select the button keyword and enter in the field default settings. Then select America Online under Shortcuts for Web, E-Mail and Newsgroups.
  • Eudora:
    With Eudora you have to set up the default MAPI client by selecting Extras -> Options -> MAPI and activate the item Use Eudora as MAPI server by selecting the option Immer. Then you have to select Eudora as default mail program in Internet Explorer (see Outlook above)
    . The names and the location of the settings can vary from version to version! (Use help)
  • Notes:
    Lotus Notes seems to be a difficult business. So far we haven't found any clear information about it. Also the information about the MAPI support of the different versions is very vague. First, however, you should check in Internet Explorer (like Outlook) whether Notes is set as the default email program (Extras -> Internet Options -> Programs -> Email). If this does not help, the Notes MAPI Service Provider has to be installed. In the help you will find the exact instructions.
    In a Lotus Notes forum I read that the easiest way to set up the MAPI interface is: 1.Uninstall Notes 2. Install Microsoft Outlook or Microsoft Office 3. Install Notes! ;-))

Repair of damaged or old MAPI32.dll:

A note from Microsoft describes that running the file fixmapi.exe in the Windows system folder (e.g. c:\Windows\System32\) can fix the problems. If necessary search this file in Explorer. Unfortunately, we have no experience in how far this works and which Windows versions have this file available.

If you have set the high security level when setting up the PKCS - Certificate, this serves the security of your data. The password dialog is displayed by the operating system with every signing and decryption action, so that we from abylonsoft have no influence on it.

We regret that we cannot currently offer this option. At the moment you have to be satisfied with sending the files as an attachment with the email. But we are busy solving these problems.

abylon CRYPTMAIL is not an own email client, but works on basis of the MAPI32 - interface that is supported by most common email clients (Outlook Express, Outlook, Netscape Messenger, Eudora, Pegasus, etc.). This means that the email is stored in your default email program in the folder "Outbox".

FAQ: File Explorer / right mouse button (OLE plugin)

Questions and answers about using our software via the right mouse button in the File Explorer (OLE PlugIn).

Workaround via flag in the registry

Open the Windows registry (for instructions, see the glossar) and change under X the value REG_SZ Y from YES to NO!

This change launches the .NET framework via an alternate call.

In this case we can offer the following workarounds.

1. Check plugins

Open the settings dialog and switch to the "Explorer Plugins Settings" page. Check here whether the corresponding PlugIn is activated (check mark).

2. Disable / activate modules

Open the settings dialog and switch to the "Explorer Plugins" page. First deactivate the plugins via the traffic light icon. Then you can activate the plugins again.

3. Registration of the Plugin-DLL

Start the command line entry with administration rights (Start -> Run -> cmd.exe). Then change to the abylon program directory (with cd). Enter here the command "regsvr32 [Plugin-Dll].
". As a plugin dll, enter the following files:

- abylon BASIC: 32bit = APMBOle.DLL, 64bit = APMBOleX64.DLL
- abylon READER: 32bit = APMROle.DLL, 64bit = APMROleX64.DLL
- abylon ENTERPRISE: 32bit = APMPOle.DLL, 64bit = APMPOleX64.DLL
- abylon SHREDDER: 32bit = SAWOle.DLL, 64bit = SAWOleX64.DLL

4. Check if all registry entries are present

Open the registry editor (Start -> Run -> regedit.exe) and check if the following 10 entries exist. The menu is only displayed in the File Explorer if all values are present and there are no errors.

1. HKEY_CLASSES_ROOT\*\ShellEx\ContextMenuHandlers\apmcrypt -> REG_SZ: ID see below
2. HKEY_CLASSES_ROOT\CLSID\{ID see below} -> REG_SZ: apmcrypt
3rd HKEY_CLASSES_ROOT\Directory\background\shellex\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}
4. HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}
5. HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}
6th HKEY_LOCAL_MACHINE\Software\Classes\*\ShellEx\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}
7. HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{ID see below} -> REG_SZ: apmcrypt
8. HKEY_LOCAL_MACHINE\Software\Classes\Directroy\background\shellex\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}
9. HKEY_LOCAL_MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}
10th HKEY_LOCAL_MACHINE\Software\Classes\Ddrive\shellex\ContextMenuHandlers\apmcrypt -> REG_SZ: {ID see below}

The following IDs must be used for the individual programs:
- abylon READER = {5fbcd2e0-73dd-11ce-993c-43aa004adb6c}
- abylon BASIC = {5fbcd2e0-73dd-11ce-993c-42aa004adb6c}
- abylon ENTERPRISE = {5fbcd2e0-73dd-11ce-993c-41aa004adb6c}
- abylon SHREDDER = {5fbcd2e0-73dd-11ce-993c-00aa004adb6c}

FAQ: Password

Information about password usage and related security issues.

For this purpose, a mouse click event was inserted programmatically from version 19.10.1 and 2020.1 on. If there are problems with this, it can be switched on or off via the registry. To do this, under HKEY_LOCAL_MACHINE\SOFTWARE\abylon\[PROGRAM NAME, e.g. ENTERPRISE]\FLAGS set the value FWACTIVATEWINDOW from YES to NO.

After the password entry the software displays the message "The entered password is wrong or the key file (certificate) does not belong to this object!". What is the reason for this?

Please check first whether the password was really entered correctly or the keyboard layout has changed.

Another possibility is that the password scrambler converts certain special characters into other characters. For this reason it is necessary in such cases to activate or deactivate the password scrambler according to the creation of the encrypted element. I.e., if the password scrambler was activated during encryption, it must also be activated during decryption.

The password scrambler must be deactivated in any case if a password or the SecureID are entered into the password field via Copy&Paste. Otherwise, the program will not recognize a keyboard entry and the password field will remain empty.

The SecureID is a so-called emergency password. If the chip card or USB stick is defective or lost, this can be entered as an alternative for decryption.
The SecureID is determined during the encryption process on the page 'Key management >SYMM-System'.
The SecureID is identical for each encrypted object (abylon KEYSAFE, abylon CRYPTDRIVE, abylon BASIC, abylon SHAREDDRIVE) and is built as follows:

# + 32 characters + . + 32 characters + # 
(characters only numbers 0-9 or letters A-F; e.g. #A54E1CB23F31464AC3B7D65F4557C1D1D. 50F4B4A9EC30705944EB12870284C419#

- Starting with version 8.3, both upper and lower case letters can be entered. In older versions the input is Case-Sensitive.
- The password scrambler should be deactivated for input!
- The SecureID should be stored in a secure place!
- The SecureIDs are different for encryption and Windows logon.

A "brute force attack" means trying out all possible character combinations of passwords. For example, the process starts with 00000001 and then continues with 00000002, 00000003, 00000004.... A password that has only 4 digits and consists only of numbers can easily be "cracked" within a few seconds. A good password should consist of at least 12 characters with lower case letters, upper case letters, numbers and special characters. In addition, no words from dictionaries, names or relevant password databases should be used. If you follow these rules, you can be sure that it will not be possible to decrypt the protected data economically in the foreseeable future.


Unfortunately / fortunately it is not possible to open protected data without the corresponding password. I.e., the software of abylonsoft offers neither a back door nor a so-called "general key". If you have lost your password, you can no longer access your stored data. 

You should remember the used passwords well and possibly write them down in a secret place. However, this should not be on the hard disk or near the computer. Alternatively, so-called password managers (such as abylon KEYSAFE) offer the possibility to store the different passwords in a secure database. In this case you only have to remember a password

An insecure password is always a date of birth, a nickname, a name in principle or any other word that is frequently used or that is in the dictionary.

A secure password is a password consisting of several random characters, e.g. myz<_/k)),%06YLbcw3pU. It consists of special characters ( ! "§$%&/()==?´*?+#´\ß^.;:_@<>|{[]}), numbers (1234567890), uppercase letters (QWERTZUIOPÜÄÖLKJHGFDSAYXCVBNM) and lowercase letters (qwertzuiopüäölkjhgfdsayxcvbnm).

If you cannot remember such a password, you can use a trick. Although the password is not as secure as the previous one, it is still much more secure than "Otto" or "Müller". And this is how it works. Think of a long sentence that you can easily remember, such as : I live in the model city 134b. My phone number is 123456789.  Now simply take the first letters / characters from this sentence. In this case that would be? IwidM1.Mti1.?. However, you should make sure that at least some numbers and special characters are present in the sentence. In addition you must pay attention to upper and lower case.

To create a really secure password, you should use the integrated password generator. You can find it for example in abylon KEYSAFE.

FAQ: Installation

Questions and Answers about the installation of software products from abylonsoft.

Usually, with abylonsoft software, the new version can be installed over the old version. This is also the case if the setup asks in advance and offers the uninstall option. If an over-installation for any reason is not possible, so you will be pointed out during installation. In this case no other option is offered.

Yes, because during the installation the software has to make some settings for which only the administrator has rights. So log in for the installation as an administrator or contact your responsible administrator.

Possible cause of error:

  1. You have entered the registration data incorrectly! The safest way is to copy and paste the name and the registration key from the email directly into the registration dialog of our software.
  2. Each license key is created individually for each program and each version. Check whether your registration data are also intended for the version you have installed!

Updates in the same major version number are free. Updates to the next major version number are subject to an update fee. If you have any questions or problems with us you are welcome to contact us in Kontakt.

This is because when a new user is created, Windows first creates the registry and makes entries. Since our software also has to make registry entries, an operating system restart is required for proper operation.


If this error occurs, you should manually download and install the setup from the download page. All settings of the previous version will be adopted.

FAQ: General

General questions and answers about the software from abylonsoft.

This error is caused by the rights management under Windows
  • If you open a file, the error message The path is not available is displayed.
  • If you open a folder, the error message Unhandled exception in the application - The root folder cannot be retrieved is displayed.
user's root folder or the own files. This causes the above error message and is due to the Windows rights policy. As a workaround, you could adjust the NTFS permissions, for example, add the rights for administrators in the user directory.

Redist Pack for Microsoft Visual Studio 2008

Redist-Error-Message 0xc0150002

We unfortunately had to realize that Microsoft has changed something since the end of the Windows 7 support. Since that time it seems to be necessary to install a so-called Redist-Pack of Microsoft Visual Studio. This was not necessary before, but now it seems to be absolutely necessary. Please download and install the Redist-Pack of Microsoft Visual Studio 2008.

Alternatively please use our contact form for further information! Please indicate the software version and operating system.

From version 19.1 or 2020.1 the appropriate Redist-Pack is delivered with the setup.

Interaction with electromagnetic radiation

First of all, passive RFID tokens (chip cards or key fobs) need a magnetic field or high-frequency radio wave to be supplied with energy. This is usually done by the RFID card reader. The data integrity on the RFID token is not endangered by light magnetic or radio fields. The data is not likely to be erased, for example by a mobile phone, a magnet or a monitor. However, an electromagnetic interference source can lead to an impairment of the reading reliability.

Storing the RFID token in the same pocket as the mobile phone is no problem. In order not to disturb the reading process, the RFID card reader should be placed as far away from electromagnetic sources as possible! In a microwave, on the other hand, the RFID token is likely to be destroyed.

Tray-Icons are small buttons, which are displayed in the taskbar at the bottom right, next to the clock.
These icons are used to display information and call functions. In the preferences, Windows deactivates tray icons of programs so that they are not displayed for the time being. The following section describes how the settings for all or individual icons can be set.
NOTE The description is general. Depending on the program, you must select the appropriate tray icon. You can find this in the help or the FAQ's.

How do I open the settings for the tray icons?

To the left of the clock, there is a small white arrow pointing upwards, which can be used to display the other tray icons.

Adjust Tray-Icons

With "Customize" you can define the behavior of the tray icons. The "Info Area Symbols" window opens.
NOTE Below are alternative ways to open this window.

Information area symbols

In the settings window for info area symbols, you can define the behavior of each individual tray icon.
Select the corresponding icon and select "Show icon and notifications" as option. After that you will find the tray icon on the taskbar to the left of the clock at any time.
Alternatively, you can enable the option "Always show all icons and notifications on the taskbar". In this case, the tray icons of future programs will also be displayed directly on the taskbar.

Alternative 2 to open the notification area icon settings

Move the mouse to a free area of the taskbar and press the right mouse button. Select Properties from the menu. The dialog for customizing the info area symbols opens on the Taskbar page via the "Customize" button.

Taskbar Properties

Alternative 3 to open the notification area icon settings

As a further option, you can also open the Control Panel via the Start menu. Select "Large Icons" or "Small Icons" in the upper right corner. Now you can open the settings via the "Info Area Symbols" icon.


Because of errors in the operating system or other software, as well as the variety of the hardware used, apparently occurring errors and / or irregularities in the software of abylonsoft must not necessarily be justified in this software. This means that the interactions between our software and software / hardware from other manufacturers are so complex that they cannot be taken into account by us in all cases. Often errors / defects in other software (e.g. the operating system) also occur, which only become effective in combination with our software. These errors usually manifest themselves in a general protection violation or a system crash. For these reasons we subject our software to a very extensive test before release in order to reduce the problems and errors to a minimum.

Should you nevertheless become aware of a direct error in our software, we will correct it as soon as possible. So that we can understand the error / the problem, you should give us all the details:

  • Operating system
  • Service packs
  • Other software used
  • Whereby the error occurred
  • If the error is reproducible
  • Etc.

Please use our support form support form!

for this purpose

For more see AGB's

FAQ: Compatibility

Questions and answers for compatibility tests of our software products with special hardware.

Microsoft has disabled the automatic installation of the framework .NET 3.5 under Windows 10. This causes crashes and protection violations during the execution of the .NET 3.5 versions of abylonsoft.

How can I still activate .NET 3.5 under Windows 10?

.NET 3.5 unter Windows 10 aktivieren

As shown in the screenshot, Microsoft .NET 3.5 can be enabled via the Windows features:

  1. Open the Control Panel under Windows 10, e.g. via the Search field or the Settings icon in the Start menu.
  2. Display all system control elements and select the entry Programs and Features. This item is also displayed directly under Programs.
  3. Open the Windows features on the left.
  4. Search entry .NET Framework 3.5 (contains .NET 2.0 and 3.0) in list.
  5. If the entry Activated is, then first Deactivate (Otherwise skip this point). With Ok Windows takes over the changes, which can take some time.
  6. After or if the point is Disabled anyway, the option is activated by clicking Activated. This operation is also done with Ok.

subsequently the version .NET 3.5 of our software should also run without problems under Windows 10.

To use a removable disk (e.g. USB stick) as "key" for login and encryption or mobile use (switch "install modules on USB stick"), the following conditions must be met:

  1. The USB stick must be plugged in
  2. The USB stick must create a new drive
  3. The drive must be formatted
  4. The drive must be writable (write permissions)
  5. The drive must have enough disk space
  6. The driver must register the drive as "Removable Device"

Card reader:

Our software supports all card readers that offer the standard PC/SC interface. In addition, you have to pay attention to which smart cards are supported by the card reader. In addition to contact smart cards, there is a large variety of suppliers and different technologies available for wireless smart cards. Here the supported frequencies 125 kHz (long wave) and 13.56 MH (short wave) are to be mentioned for example.

chip cards:

  • Contacting ACOS1 or ACOS3 chip cards
  • Other contact processor smart card (on request)
  • 13.56 MH Legic ATC
  • other 13.56 MH (on request)
  • 13.56 MH Mifare Classic
  • 13.56 MH Mifare Desfire
  • 13.56 MH Mifare UX
  • 125 kHz HITAG (on request)
  • 125 kHz EM (on request)
  • other RFID cards/keyfobs (on request)

Our software can be fully tested for 30 days. You should definitely take advantage of this offer. If you have any questions about compatibility, you can also contact us with confidence approach.
On our hardware page you will also find a selection of compatible card readers and chip cards.

Support request for abylon CRYPTMAIL Encryption and signature of e-mails

3 Support requests

Avatar von TomH #139

TomH - Eintrag vom: 08.03.2020 um 15:23 Uhr 
Software-Version: sp3 - Betriebssystem: xp

Frage: no problem

You say nothing that I can see in relation to Cryptmail as to how the recipient may decrypt the mail. Must he also be using Cryptmail. Or is there interoperability with other mail encryption applications?
Is there any way to store sent or received email in the clear - i.e. unencrypted or decrypted?

Avatar of abylonsoft support #139


Hi TomH,
thank you very much for your questions.

There are two possibilities to decrypt the messages encrypted with abylon CRYPTMAIL
1. The recipient also uses the software abylon CRYPTMAIL.
2. The encrypted emails are transmitted as attachment. The email recipient can also save them on the hard disk and decrypt them with our freeware abylon READER.

To the second question:
As already written, the encrypted message is transmitted as an attachment. This can be saved or archived as a message in the email program. About the abylonsoft icons can also decrypted emails again with your own password or certificate encrypted. It is irrelevant whether these were already encrypted before or not.

Avatar von Tony #7

Tony - Eintrag vom: 28.03.2014 um 20:06 Uhr 
Software-Version: - Betriebssystem: Windows7x64

Frage: Microsft Outlook has stopped working

I use [b]Microsoft Outlook 2013[/b] for receiving and sending email me, I choose to create a new email and the moment I go to choose HYBRID-Encryption outllook the program shuts down and the image of the program is transparent and writes the following message "[i]Microsoft Outlook has stopped working - A problem caused the program to stop working correctly - Windows will close the program and notify you if a solution is available [/i]"
Thank you.

Avatar of abylonsoft support #7


Hi Tony,
our software offers a plug-in for Outlook. Unfortunately, it can lead to interactions with [b]other plugins[/b], over which we have no control. For this reason, we can not provide any help in this case.
On the other hand, we would appreciate if you [i]could inform us about the other plug-ins[/i].

Avatar von john york #5

john york - Eintrag vom: 27.03.2014 um 12:41 Uhr 
Software-Version: cryptmail - Betriebssystem: windows 7 64 bit

Frage: Can not enter key sent for activation.

Here is key sent to me.
Serial: 00EN-56264386-0011BF1156-D11V2
Keeps saying not good data. So i give up.

Avatar of abylonsoft support #5


Hi John,
thank you for your interest in our software.

All the[i] other users do not have any problems with the registration data[/i]. Please remember that the sended registration data is only valid for the version of the SharewareOnSale website.

To download from our site the registry must be purchased.

In the About dialog will be displayed if the installed version is a free cover mount. In this case, in the version number "PRV" is displayed, [b]like 11.60.PRV[/b].

Submit a support request

For general comments, please use our Comments Form!

Please enter your name or a pseudonym (alias) for the salutation!
Your email address will only be used for questions and notification and will not be saved!
Please enter the operating system you are using (incl. service pack and 32- or 64-bit platform) or "unknown"!
Please enter the version number of our software or "unknown"? The version number is displayed in the About dialog of our software.
Outline your problem in a short question!

The more detailed you describe your problem, the sooner we can help. We can only contact you if you have entered your email address correctly.
I have understood and accept the Privacy Policy.