Usb class ff subclass ff prot ff

Author: g | 2025-04-25

★★★★☆ (4.6 / 2634 reviews)

we recommend that you close

Usb Class Ff Driver, free usb class ff driver software downloads. WinSite . Home; Search WinSite; Usb Class Ff Sm; Usb Class Ff Subclass Ff; Usb Mass Storage Class; Jdbc Driver Class;

b daman crossfire

Usb Class Ff Subclass Ff Software - Free Download Usb Class

Realtek 8192FU Linux USB无线网卡驱动原始代码来源于: Internet Archive 。点击这里:下载原文件 。原始文档里说支持Linux内核版本2.6.18 ~ 5.1。但不支持 Linux 内核5.1+以上的版本,也不支持 RHEL/CentOS > 7.0以上的版本。经过多次修改后,在原来的基础上,增加了对 Linux 内核5.2 ~ 5.19 / 6.0 ~ 6.4 的支持,以及对 RHEL/CentOS 7.x/8.x的支持。目前已测试的Linux发行版及结果:已通过:Red Hat server 7.0;CentOS 7.0~7.9/8.3/8.4/8.5;Rocky Linux 8.4/8.5/8.6/9.0;Fedora 36-1.5 / 38-1.6;Ubuntu Server 16.04/18.04/20.04/21.04/21.10/22.04;Ubuntu Desktop 18.04/20.04/22.04;linux mint 20.1;kali 2021.1;archlinux 2021.09.01/2022.06.01/2022.08.05/2022.10.01;其他未测试的,如果内核版本符合上述要求,通常情况下是可以使用的,但不能完全肯定。使用方式安装内核头文件# ubuntu、kali 用户通过以下命令安装sudo apt install -y linux-headers-$(uname -r)# Arch 用户通过以下命令安装sudo pacman -S linux-headers# centos 用户通过以下命令安装sudo yum install -y kernel-headers-$(uname -r) kernel-devel-$(uname -r)# centos 7.x/8.x 的 yum 源通常只提供对最新发行版的支持,所以像CentOS 7.8等非最新发行版就需要手动到 下载rpm文件,然后进行手动安装安装编译器:# ubuntu、kali 用户通过以下命令安装sudo apt install make gcc bc# Arch 用户通过以下命令安装sudo pacman -S make gcc bc# centos 用户通过以下命令安装sudo yum install make gcc bc elfutils-libelf-devel然后进入驱动代码目录:编译并安装:make -j$(nproc)sudo make install装载到内核模块:注意:USB网卡上的LED指示灯可能不会闪烁,但是设备这时候可以使用了。查看USB接口列表:如果出现command not found的问题就需要先安装usbutils:# ubuntu 用户通过以下命令安装sudo apt install usbutils# Arch 用户通过以下命令安装sudo pacman -S usbutils# centos 用户通过以下命令安装sudo yum install usbutils查看USB设备信息:usb-devices | grep "Vendor=0bda ProdID=f192" -B2 -A5关键信息看最后一行: Driver=rtl8192fu 则说明该设备已经跟驱动匹配上了;Driver=(none) 则说明没有找到设备对应的驱动。驱动跟设备匹配成功的情况:ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#= 0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=rtl8192fu">T: Bus=03 Lev=01 Prnt=01 Port=01 Cnt=02 Dev#= 5 Spd=480 MxCh= 0D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#= 0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=rtl8192fu驱动匹配失败的情况:ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#=0x0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)">T: Bus=01 Lev=01 Prnt=01 Port=00 Cnt=01 Dev#= 3 Spd=480 MxCh= 0D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#=0x0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)成功之后,就可以去配置无线网络了。驱动的卸载:sudo modprobe -r 8192fucd rtl8192fu/sudo make uninstall对 dkms的支持每次内核更新之后,驱动都需要手动重新编译安装,可能比较麻烦。使用dkms,可以在更新内核时自动完成驱动的编译和安装。安装内核头文件# ubuntu、kali 用户通过以下命令安装sudo apt install -y linux-headers-$(uname -r)# centos 用户通过以下命令安装sudo yum install -y kernel-headers-$(uname -r) kernel-devel-$(uname -r)# centos 7.x/8.x 的 yum 源通常只提供对最新发行版的支持,所以像CentOS 7.8等非最新发行版就需要手动到 下载rpm文件,然后进行手动安装安装编译器:# ubuntu、kali 用户通过以下命令安装sudo apt install make gcc bc# centos 用户通过以下命令安装sudo yum install make gcc bc elfutils-libelf-devel安装dkms# ubuntu、kali 用户通过以下命令安装sudo apt install build-essential dkms -y# centos 用户通过以下两条命令安装sudo yum install epel-release -ysudo yum install dkms -y使用:# 进入驱动源码目录cd rtl8192fu/# 赋予可执行权限sudo chmod a+x ./dkms-*# 使用 dkms安装驱动sudo ./dkms-install.sh# 然后将驱动装载到内核模块sudo modprobe 8192fu# 如果需要卸载驱动的话可以使用以下命令sudo modprobe -r 8192fusudo ./dkms-remove.sh

Download lunascape browser 6.15.1.27563

Usb Class Ff Driver Software - Free Download Usb Class Ff Driver

Malware DestroyerEMCO ehf.The program is a setup application that uses the Inno Setup installer.File name:malwaredestroyersetup.exePublisher:EMCO Software Ltd. (signed by EMCO ehf.)Product:Malware Destroyer Description:Malware Destroyer Setup MD5:579ec18eed8af830371986ad94f1edacSHA-1:7bbfd06fc9d573da04dd08911e6a51e2419e6451SHA-256:997b56f30b0ef98ba01e2a4fe19f81dcb4921ca6186f21af07e0db9cc87feb89Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/23/2025 7:18:46 PM UTC (today)File size:38.5 MB (40,325,744 bytes)File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\malwaredestroyersetup.exeValid from:5/8/2009 3:00:00 AMValid to:3/11/2010 1:59:59 AMSubject:CN=EMCO ehf., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=EMCO ehf., L=Reykjavik, S=Reykjavik, C=ISIssuer:CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:289C654A61C595319AF0D0097123FF72Compilation timestamp:6/20/1992 1:22:17 AMCTPH (ssdeep):786432:Y2NW8GcBKT8uCmdhamO5uMGgxh5jQMMRn9m2PkOD687go7obrrZQkAz1EIxqLI:Y2NW8Gc/pU8mYugxEMMR9m28ODrDob3CEntry point:55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 6E, 96, FF, FF, E8, 75, A8, FF, FF, E8, A0, CA, FF, FF, E8, E7, CA, FF, FF, E8, 0E, F3, FF, FF, E8, 75, F4, FF, FF, 33, C0, 55, 68, 0B, A1, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, D4, A0, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 9B, FE, FF, FF, E8, 02, FA, FF, FF, 8D, 55, F0, 33, C0, E8, AC, D0, FF, FF, 8B, 55, F0, B8, E4, CD, 40, 00, E8, 1F, 97, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, E4, CD, 40, 00, B2, 01, B8...[+]Packer / compiler:Inno Setup v5.x - Installer MakerCode size:36.5 KB (37,376 bytes)

- FF-FF-FF - MAC or OUI address

VNC ServerRealVNC LtdThe program is a setup application that uses the Inno Setup installer. The file has been seen being downloaded from dl.cdn.chip.de and multiple other hosts.File name:vnc-5.3.1-windows.exePublisher:RealVNC Ltd (signed by RealVNC Ltd)MD5:4526ef41405dd4ac4a7ab97e8b77f106SHA-1:3aed2f22ea607a118ecc8db4cd2044ff08056e07SHA-256:4ea5a5f24ba30c6ba3ab3f2fc02bb802ab55b15b614d495b3b4fbebc61f4fc86Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/12/2025 8:25:32 AM UTC (today)File size:17.6 MB (18,406,960 bytes)Copyright:Copyright © 2002-2016 RealVNC Ltd. File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\vnc-5.3.1-windows.exeValid from:8/5/2015 1:00:00 AMValid to:10/4/2018 12:59:59 AMSubject:CN=RealVNC Ltd, O=RealVNC Ltd, L=Cambridge, S=Cambridgeshire, C=GBIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:2EB260DBC51427A731CD2519701AE3C0Compilation timestamp:6/19/1992 11:22:17 PMCTPH (ssdeep):393216:g+mmoiGdtL9EWtB31C/4ke1daLz8Y6EW/061VuR+uT8tc69854ayD1tL:g/mm9EWtBlM4ke7szz6Ts6Lfuu854a+LEntry point:55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, E8, CD, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, E8, CD...[+]Packer / compiler:Inno Setup v5.x - Installer MakerCode size:37 KB (37,888 bytes)The file vnc-5.3.1-windows.exe has been seen being distributed by the following 15 URLs.. Usb Class Ff Driver, free usb class ff driver software downloads. WinSite . Home; Search WinSite; Usb Class Ff Sm; Usb Class Ff Subclass Ff; Usb Mass Storage Class; Jdbc Driver Class;

FF to FF ESR Automatically with FF 115 (Win7) - PortableApps.com

Install MonitorMirekusoft LLCThis is a self-extracting archive and installer.File name:setupinstallmonitor_x64.exeDescription:Install Monitor InstallerMD5:9da9fa27758335e71a1b42220a7caf3aSHA-1:e435b070386af81a94023a4e097a405d78ed1496SHA-256:0fd0e0a095dcef3fda47406060942fdc7ebd0cec8283ab1db460870506f183c2Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/23/2025 10:26:28 AM UTC (today)File size:2.6 MB (2,688,840 bytes)Copyright:Copyright © 2011 Mirekusoft LLC. All rights reserved.Original file name:WEXTRACT.EXEFile type:Executable application (Win32 EXE)Language:English (United States)Common path:C:\users\{user}\downloads\downloads\setupinstallmonitor_x64.exeValid from:12/3/2011 12:00:00 AMValid to:12/2/2012 11:59:59 PMSubject:CN=Mirekusoft LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Mirekusoft LLC, L=Sunnyvale, S=California, C=USIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:46641A18FE3390E0A5B8514499E52D47Compilation timestamp:3/8/2011 12:46:37 PMCTPH (ssdeep):49152:FQO8aA8fKxC4CrKae92a4p8XCrevOnUgrW4dCOuuANa/SuhiCnq1:6O8ahSk4Crze92aK8XCCcU/OuTmtSEntry point:E8, 5D, 07, 00, 00, E9, 4D, FD, FF, FF, CC, CC, CC, CC, CC, 3B, 0D, C4, C2, 00, 01, 75, 03, C2, 00, 00, E9, D9, 07, 00, 00, CC, CC, CC, CC, CC, FF, 25, 7C, 12, 00, 01, CC, CC, CC, CC, CC, CC, FF, 25, 78, 12, 00, 01, CC, CC, CC, CC, CC, 8B, FF, 55, 8B, EC, 81, EC, D0, 02, 00, 00, A1, C4, C2, 00, 01, 33, C5, 89, 45, FC, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC, FD, FF, FF, 66, 8C, 95, F8, FD, FF, FF, 66, 8C, 8D, EC, FD...[+]Entropy:7.9832 (probably packed)Code size:43.5 KB (44,544 bytes)

13.B2.FF, 13.B4.FF, 13.B9.FF, 13.D3.FF, 13.E2.FF

AppandoraJunTu Software Inc.This is a self-extracting archive and installer. The file has been seen being downloaded from gsf-cf.softonic.com and multiple other hosts.Publisher:Appandora, Inc. (signed by JunTu Software Inc.)Description:Appandora Setup MD5:11fc4978b810f4c31422d6f3041b0be7SHA-1:32e8fc065b13f93eb4b969575012756c1020d91aSHA-256:1c0cf09bc44fe4a491e7d4b7bc686bbe226e20c5dfbfb815163c16b6bf1b336bScanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/15/2025 6:35:50 AM UTC (today)File size:62.5 MB (65,583,688 bytes)File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\appandora.exeValid from:3/17/2014 8:00:00 PMValid to:4/16/2016 7:59:59 PMSubject:CN=JunTu Software Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=JunTu Software Inc., L=Shenzhen, S=Guangdong, C=CNIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:63C851168E4FDCACD139BE3774EE3754Compilation timestamp:7/9/2014 3:58:13 AMCTPH (ssdeep):1572864:L3nzED4bKZ5mbSskaaZLPz0ZHDxoZ3+tXZyW5Abd84xX6K1AoT:/gZkp2ZiXZyf3AoTEntry point:55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...[+]Developed / compiled with:Microsoft Visual C++Code size:63.5 KB (65,024 bytes)The file appandora.exe has been seen being distributed by the following 5 URLs.

FF Logs - Combat Analysis for FF

FastGlacierIvan MoiseevThe program is a setup application that uses the Inno Setup installer.File name:fastglacier-1-5-9.exePublisher:NetSDK Software (signed by Ivan Moiseev)Description:FastGlacier version 1.5.9 MD5:b1c60ceb0570af3381ed5ba456960b16SHA-1:8806faeacaebf3cdd502907d9e49a79417296b30SHA-256:261242467f79275b992165ef63c7bd93e0a883fa22b0c845b657b8160fa15347Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/17/2025 12:37:28 PM UTC (today)File size:1.4 MB (1,495,248 bytes)Copyright:Copyright © 2008-2012 NetSDK Software File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\fastglacier-1-5-9.exeValid from:8/21/2011 4:05:41 PMValid to:8/22/2013 6:34:59 AMSubject:[email protected], CN=Ivan Moiseev, L=Omsk, S=Omsk Oblast, C=RU, Description=490808-7yMjMUNK5iJs5B3tIssuer:CN=StartCom Class 2 Primary Intermediate Object CA, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=ILCompilation timestamp:6/19/1992 6:22:17 PMCTPH (ssdeep):24576:fQF5uMqExGN9Ro4haWs6IZfhdY1NuD44yz4JBwmmBIQB61DmFs6tkep:fqMQxYXhbYZfhdY1NmJBwHzmMVpEntry point:55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...[+]Packer / compiler:Inno Setup v5.x - Installer MakerCode size:37 KB (37,888 bytes)

Combat Analysis for FF - FF Logs

CSE HTML Validator ProfessionalAI Internet Solutions LLCThis is a setup and installation application.File name:cse-html-validator-140000pro-setup.exePublisher:AI Internet Solutions LLC (signed by AI Internet Solutions LLC)Product:CSE HTML Validator Professional Description:CSE HTML Validator Professional Setup MD5:a12d09a94e4fdcc84ab9d02aa62da163SHA-1:8fd33ee1c6cb2e01644dcfc5317784bdbc5694cdScanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/13/2025 5:16:06 PM UTC (today)File size:12.7 MB (13,271,344 bytes)Copyright:Copyright © 1997-2013 AI Internet Solutions LLC File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\Documents and Settings\{user}\My documents\downloads\cse-html-validator-140000pro-setup.exeValid from:1/2/2013 7:00:00 PMValid to:1/3/2014 6:59:59 PMSubject:CN=AI Internet Solutions LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=AI Internet Solutions LLC, L=Argyle, S=Texas, C=USIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:20E47AC9969E024E6203935CBC61E09ACompilation timestamp:1/30/2013 9:21:56 AMCTPH (ssdeep):393216:cfF8v7bbSAjKffFwZ2wYk1o6P2XqWZLvz+T:cN8nbSAjKffFwXY49et+TEntry point:55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...[+]Developed / compiled with:Microsoft Visual C++Code size:63.5 KB (65,024 bytes). Usb Class Ff Driver, free usb class ff driver software downloads. WinSite . Home; Search WinSite; Usb Class Ff Sm; Usb Class Ff Subclass Ff; Usb Mass Storage Class; Jdbc Driver Class;

duplicate file

Usb Class Ff Subclass Ff Software - Free Download Usb Class

Jetico, Inc. UnPackJetico Inc. OyThis is a setup program which is used to install the application. The file has been seen being downloaded from www.jetico.com.File name:bctextencoder.exePublisher:Jetico, Inc. (signed by Jetico Inc. Oy)Product:Jetico, Inc. UnPackDescription:Jetico Self-Extracting Archive Utility...MD5:0b3504a61a0b418dbdb1a6176c97315eSHA-1:8424ef604ca369258290efc35799c23c25b01b34SHA-256:6310962328a52a8347515da8c04ca2c27ebbdc29c75cd3754ee0a98564481187Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/14/2025 3:16:33 AM UTC (today)File size:1.2 MB (1,294,800 bytes)Copyright:Copyright © 1999-2014Original file name:UnPack.exeFile type:Executable application (Win32 EXE)Language:English (United States)Common path:C:\users\{user}\downloads\bctextencoder.exeValid from:9/7/2012 1:00:00 AMValid to:9/9/2015 12:59:59 AMSubject:CN=Jetico Inc. Oy, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jetico Inc. Oy, L=Espoo, S=Uusimaa, C=FIIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:31C10146F5E05334B854758765316025Compilation timestamp:11/17/2014 10:04:35 AMCTPH (ssdeep):24576:Ki1TcGoBbKuPKntpU0NYnPVNcCrunZ0IFrSPXcSJgOMZoQtnqPARVEGzlF:K8TFoBbKcKA/cCrunZdFmNooKntRLbEntry point:E8, FB, 6E, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, FF, 35, 28, A2, 41, 00, 8B, 35, 04, 31, 41, 00, FF, D6, 85, C0, 74, 21, A1, 24, A2, 41, 00, 83, F8, FF, 74, 17, 50, FF, 35, 28, A2, 41, 00, FF, D6, FF, D0, 85, C0, 74, 08, 8B, 80, F8, 01, 00, 00, EB, 27, BE, 8C, 6F, 41, 00, 56, FF, 15, E0, 30, 41, 00, 85, C0, 75, 0B, 56, E8, E7, D3, FF, FF, 59, 85, C0, 74, 18, 68, 7C, 6F, 41, 00, 50, FF, 15, 44, 30, 41, 00, 85, C0, 74, 08, FF, 75, 08, FF, D0, 89, 45, 08, 8B, 45, 08, 5E, 5D, C3, 6A, 00, E8, 87...[+]Entropy:7.9406 (probably packed)Code size:71 KB (72,704 bytes)The file bctextencoder.exe has been seen being distributed by the following URL.

Usb Class Ff Driver Software - Free Download Usb Class Ff Driver

ISO2DiscTop Password Software,Inc.The program is a setup application that uses the Inno Setup installer. The file has been seen being downloaded from lon-01.lo4d.com and multiple other hosts.File name:iso2discsetup.exePublisher:Top Password Software, Inc. (signed by Top Password Software,Inc.)Description:ISO2Disc Setup MD5:f61b5c9617fc964585a715bdb625e799SHA-1:5d9c32a61684edfa477ba9d65c9502d68bc2b472SHA-256:ae7a10745fb9f14f08f7329ea00d4249ae96250314568b26c94cf730265340a6Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/22/2025 9:14:29 AM UTC (today)File size:1.7 MB (1,744,192 bytes)File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\programs\iso2discsetup.exeValid from:10/22/2014 6:00:00 PMValid to:10/22/2016 5:59:59 PMSubject:CN="Top Password Software,Inc.", OU=IT Dept, O="Top Password Software,Inc.", L=FOSHAN, S=GUANGDONG, C=CNIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:598CE18C3C88CE74F048B202DF641614Compilation timestamp:6/19/1992 4:22:17 PMCTPH (ssdeep):49152:A93g+tCGYCjF5aYLnuxb/R/Uu7pATAN6Sni:KPtLRgwuxjlnprchEntry point:55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...[+]Packer / compiler:Inno Setup v5.x - Installer MakerCode size:39.5 KB (40,448 bytes)The file iso2discsetup.exe has been seen being distributed by the following 15 URLs.. Usb Class Ff Driver, free usb class ff driver software downloads. WinSite . Home; Search WinSite; Usb Class Ff Sm; Usb Class Ff Subclass Ff; Usb Mass Storage Class; Jdbc Driver Class; N ident compatible usb/class-FF subclass00 prot-00 ; USB/class-FF subclass-00 ; usb/class-ff Si ce dernier appara t en d faut alors proc des de cette mani re: Dans

- FF-FF-FF - MAC or OUI address

SparkBaidu Online Network Technology (Beijing) Co.,Ltd.File name:baidu-spark-browser-43-22-1000-436-multi-win.exeDescription:Baidu BrowserMD5:d92d87f90585d36184a816d992c45f72SHA-1:df034bc45d3b7ee2dd529e92e3780e9258a5a9c7SHA-256:5cfef1760de60f0e9ae4b1cfa023d72c96b2a918c14ec03c7fe98edac3886ea2Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/15/2025 1:07:51 AM UTC (today)File size:46.1 MB (48,295,688 bytes)Product version:43.22.1000.436Copyright:Copyright (c) Baidu Inc.Original file name:SparkSetup.exeFile type:Executable application (Win32 EXE)Common path:C:\users\{user}\downloads\baidu-spark-browser-43-22-1000-436-multi-win.exeValid from:3/24/2015 9:00:00 PMValid to:3/25/2016 8:59:59 PMSubject:CN="Baidu Online Network Technology (Beijing) Co.,Ltd.", OU=Baidu security, O="Baidu Online Network Technology (Beijing) Co.,Ltd.", L=Beijing, S=Beijing, C=CNIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:5FAEE9E83F32948F3B2040AC6DF0145CCompilation timestamp:12/19/2013 5:14:07 AMCTPH (ssdeep):786432:0d1dTbYwce8HiUjBGhcZfZDKYW0zzDIwDXaQNtWbDdW0nvopAfJM8hH5zfi:YXbYw8CUIhcZE0zkwLzNqDdTIR2fiEntry point:E8, A4, 81, 00, 00, E9, 89, FE, FF, FF, 6A, 00, FF, 15, 7C, 2B, 78, 00, C3, FF, 15, 68, 2B, 78, 00, C2, 04, 00, 8B, FF, 55, 8B, EC, FF, 75, 08, FF, 35, 30, 6C, 4A, 00, FF, 15, 64, 2B, 78, 00, FF, D0, 5D, C2, 04, 00, A1, 2C, 6C, 4A, 00, C3, 8B, FF, 56, FF, 35, 30, 6C, 4A, 00, FF, 15, 64, 2B, 78, 00, 8B, F0, 85, F6, 75, 1B, FF, 35, BC, 77, 76, 00, FF, 15, 80, 2B, 78, 00, 8B, F0, 56, FF, 35, 30, 6C, 4A, 00, FF, 15, 60, 2B, 78, 00, 8B, C6, 5E, C3, 8B, FF, 55, 8B, EC, FF, 75, 0C, FF, 75, 08, FF, 35, C0, 77, 76...[+]Code size:550.5 KB (563,712 bytes)

Comments

User4874

Realtek 8192FU Linux USB无线网卡驱动原始代码来源于: Internet Archive 。点击这里:下载原文件 。原始文档里说支持Linux内核版本2.6.18 ~ 5.1。但不支持 Linux 内核5.1+以上的版本,也不支持 RHEL/CentOS > 7.0以上的版本。经过多次修改后,在原来的基础上,增加了对 Linux 内核5.2 ~ 5.19 / 6.0 ~ 6.4 的支持,以及对 RHEL/CentOS 7.x/8.x的支持。目前已测试的Linux发行版及结果:已通过:Red Hat server 7.0;CentOS 7.0~7.9/8.3/8.4/8.5;Rocky Linux 8.4/8.5/8.6/9.0;Fedora 36-1.5 / 38-1.6;Ubuntu Server 16.04/18.04/20.04/21.04/21.10/22.04;Ubuntu Desktop 18.04/20.04/22.04;linux mint 20.1;kali 2021.1;archlinux 2021.09.01/2022.06.01/2022.08.05/2022.10.01;其他未测试的,如果内核版本符合上述要求,通常情况下是可以使用的,但不能完全肯定。使用方式安装内核头文件# ubuntu、kali 用户通过以下命令安装sudo apt install -y linux-headers-$(uname -r)# Arch 用户通过以下命令安装sudo pacman -S linux-headers# centos 用户通过以下命令安装sudo yum install -y kernel-headers-$(uname -r) kernel-devel-$(uname -r)# centos 7.x/8.x 的 yum 源通常只提供对最新发行版的支持,所以像CentOS 7.8等非最新发行版就需要手动到 下载rpm文件,然后进行手动安装安装编译器:# ubuntu、kali 用户通过以下命令安装sudo apt install make gcc bc# Arch 用户通过以下命令安装sudo pacman -S make gcc bc# centos 用户通过以下命令安装sudo yum install make gcc bc elfutils-libelf-devel然后进入驱动代码目录:编译并安装:make -j$(nproc)sudo make install装载到内核模块:注意:USB网卡上的LED指示灯可能不会闪烁,但是设备这时候可以使用了。查看USB接口列表:如果出现command not found的问题就需要先安装usbutils:# ubuntu 用户通过以下命令安装sudo apt install usbutils# Arch 用户通过以下命令安装sudo pacman -S usbutils# centos 用户通过以下命令安装sudo yum install usbutils查看USB设备信息:usb-devices | grep "Vendor=0bda ProdID=f192" -B2 -A5关键信息看最后一行: Driver=rtl8192fu 则说明该设备已经跟驱动匹配上了;Driver=(none) 则说明没有找到设备对应的驱动。驱动跟设备匹配成功的情况:ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#= 0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=rtl8192fu">T: Bus=03 Lev=01 Prnt=01 Port=01 Cnt=02 Dev#= 5 Spd=480 MxCh= 0D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#= 0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=rtl8192fu驱动匹配失败的情况:ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#=0x0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)">T: Bus=01 Lev=01 Prnt=01 Port=00 Cnt=01 Dev#= 3 Spd=480 MxCh= 0D: Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1P: Vendor=0bda ProdID=f192 Rev=02.00S: Manufacturer=RealtekS: Product=802.11n WLAN AdapterS: SerialNumber=60EE5CBDFDE9C: #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mAI: If#=0x0 Alt= 0 #EPs= 8 Cls=ff(vend.) Sub=ff Prot=ff Driver=(none)成功之后,就可以去配置无线网络了。驱动的卸载:sudo modprobe -r 8192fucd rtl8192fu/sudo make uninstall对 dkms的支持每次内核更新之后,驱动都需要手动重新编译安装,可能比较麻烦。使用dkms,可以在更新内核时自动完成驱动的编译和安装。安装内核头文件# ubuntu、kali 用户通过以下命令安装sudo apt install -y linux-headers-$(uname -r)# centos 用户通过以下命令安装sudo yum install -y kernel-headers-$(uname -r) kernel-devel-$(uname -r)# centos 7.x/8.x 的 yum 源通常只提供对最新发行版的支持,所以像CentOS 7.8等非最新发行版就需要手动到 下载rpm文件,然后进行手动安装安装编译器:# ubuntu、kali 用户通过以下命令安装sudo apt install make gcc bc# centos 用户通过以下命令安装sudo yum install make gcc bc elfutils-libelf-devel安装dkms# ubuntu、kali 用户通过以下命令安装sudo apt install build-essential dkms -y# centos 用户通过以下两条命令安装sudo yum install epel-release -ysudo yum install dkms -y使用:# 进入驱动源码目录cd rtl8192fu/# 赋予可执行权限sudo chmod a+x ./dkms-*# 使用 dkms安装驱动sudo ./dkms-install.sh# 然后将驱动装载到内核模块sudo modprobe 8192fu# 如果需要卸载驱动的话可以使用以下命令sudo modprobe -r 8192fusudo ./dkms-remove.sh

2025-04-03
User6406

Malware DestroyerEMCO ehf.The program is a setup application that uses the Inno Setup installer.File name:malwaredestroyersetup.exePublisher:EMCO Software Ltd. (signed by EMCO ehf.)Product:Malware Destroyer Description:Malware Destroyer Setup MD5:579ec18eed8af830371986ad94f1edacSHA-1:7bbfd06fc9d573da04dd08911e6a51e2419e6451SHA-256:997b56f30b0ef98ba01e2a4fe19f81dcb4921ca6186f21af07e0db9cc87feb89Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/23/2025 7:18:46 PM UTC (today)File size:38.5 MB (40,325,744 bytes)File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\malwaredestroyersetup.exeValid from:5/8/2009 3:00:00 AMValid to:3/11/2010 1:59:59 AMSubject:CN=EMCO ehf., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=EMCO ehf., L=Reykjavik, S=Reykjavik, C=ISIssuer:CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:289C654A61C595319AF0D0097123FF72Compilation timestamp:6/20/1992 1:22:17 AMCTPH (ssdeep):786432:Y2NW8GcBKT8uCmdhamO5uMGgxh5jQMMRn9m2PkOD687go7obrrZQkAz1EIxqLI:Y2NW8Gc/pU8mYugxEMMR9m28ODrDob3CEntry point:55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 6E, 96, FF, FF, E8, 75, A8, FF, FF, E8, A0, CA, FF, FF, E8, E7, CA, FF, FF, E8, 0E, F3, FF, FF, E8, 75, F4, FF, FF, 33, C0, 55, 68, 0B, A1, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, D4, A0, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 9B, FE, FF, FF, E8, 02, FA, FF, FF, 8D, 55, F0, 33, C0, E8, AC, D0, FF, FF, 8B, 55, F0, B8, E4, CD, 40, 00, E8, 1F, 97, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, E4, CD, 40, 00, B2, 01, B8...[+]Packer / compiler:Inno Setup v5.x - Installer MakerCode size:36.5 KB (37,376 bytes)

2025-04-16
User5715

Install MonitorMirekusoft LLCThis is a self-extracting archive and installer.File name:setupinstallmonitor_x64.exeDescription:Install Monitor InstallerMD5:9da9fa27758335e71a1b42220a7caf3aSHA-1:e435b070386af81a94023a4e097a405d78ed1496SHA-256:0fd0e0a095dcef3fda47406060942fdc7ebd0cec8283ab1db460870506f183c2Scanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/23/2025 10:26:28 AM UTC (today)File size:2.6 MB (2,688,840 bytes)Copyright:Copyright © 2011 Mirekusoft LLC. All rights reserved.Original file name:WEXTRACT.EXEFile type:Executable application (Win32 EXE)Language:English (United States)Common path:C:\users\{user}\downloads\downloads\setupinstallmonitor_x64.exeValid from:12/3/2011 12:00:00 AMValid to:12/2/2012 11:59:59 PMSubject:CN=Mirekusoft LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Mirekusoft LLC, L=Sunnyvale, S=California, C=USIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:46641A18FE3390E0A5B8514499E52D47Compilation timestamp:3/8/2011 12:46:37 PMCTPH (ssdeep):49152:FQO8aA8fKxC4CrKae92a4p8XCrevOnUgrW4dCOuuANa/SuhiCnq1:6O8ahSk4Crze92aK8XCCcU/OuTmtSEntry point:E8, 5D, 07, 00, 00, E9, 4D, FD, FF, FF, CC, CC, CC, CC, CC, 3B, 0D, C4, C2, 00, 01, 75, 03, C2, 00, 00, E9, D9, 07, 00, 00, CC, CC, CC, CC, CC, FF, 25, 7C, 12, 00, 01, CC, CC, CC, CC, CC, CC, FF, 25, 78, 12, 00, 01, CC, CC, CC, CC, CC, 8B, FF, 55, 8B, EC, 81, EC, D0, 02, 00, 00, A1, C4, C2, 00, 01, 33, C5, 89, 45, FC, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC, FD, FF, FF, 66, 8C, 95, F8, FD, FF, FF, 66, 8C, 8D, EC, FD...[+]Entropy:7.9832 (probably packed)Code size:43.5 KB (44,544 bytes)

2025-04-16
User7311

AppandoraJunTu Software Inc.This is a self-extracting archive and installer. The file has been seen being downloaded from gsf-cf.softonic.com and multiple other hosts.Publisher:Appandora, Inc. (signed by JunTu Software Inc.)Description:Appandora Setup MD5:11fc4978b810f4c31422d6f3041b0be7SHA-1:32e8fc065b13f93eb4b969575012756c1020d91aSHA-256:1c0cf09bc44fe4a491e7d4b7bc686bbe226e20c5dfbfb815163c16b6bf1b336bScanner detections:0 / 68Status:Clean (as of last analysis)Analysis date:3/15/2025 6:35:50 AM UTC (today)File size:62.5 MB (65,583,688 bytes)File type:Executable application (Win32 EXE)Language:Language NeutralCommon path:C:\users\{user}\downloads\appandora.exeValid from:3/17/2014 8:00:00 PMValid to:4/16/2016 7:59:59 PMSubject:CN=JunTu Software Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=JunTu Software Inc., L=Shenzhen, S=Guangdong, C=CNIssuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=USSerial number:63C851168E4FDCACD139BE3774EE3754Compilation timestamp:7/9/2014 3:58:13 AMCTPH (ssdeep):1572864:L3nzED4bKZ5mbSskaaZLPz0ZHDxoZ3+tXZyW5Abd84xX6K1AoT:/gZkp2ZiXZyf3AoTEntry point:55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...[+]Developed / compiled with:Microsoft Visual C++Code size:63.5 KB (65,024 bytes)The file appandora.exe has been seen being distributed by the following 5 URLs.

2025-04-09

Add Comment