Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1378s -
max time network
1405s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 05:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s1-filecr.xyz/fb7669d64312c9fe?ref=bd5615a6ed2aa9b8ab21380d2c03f59f
Resource
win10v2004-20231025-en
General
-
Target
https://s1-filecr.xyz/fb7669d64312c9fe?ref=bd5615a6ed2aa9b8ab21380d2c03f59f
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\Windows\System32\Drivers\vrtaucbl.sys setup64.exe File opened for modification C:\Windows\System32\drivers\SET14B7.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET14B7.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\vrtaucbl.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\drmk.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\portcls.sys DrvInst.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation setup64.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 setup64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\SET1062.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\SET1063.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vrtaucbl.inf_amd64_d23436324a5ece62\x64\vrtaucbl.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\x64\SET1033.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\x64\vrtaucbl.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\SET1062.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vrtaucbl.inf_amd64_d23436324a5ece62\vrtaucbl.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vrtaucbl.inf_amd64_d23436324a5ece62\vrtaucbl.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\x64 DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\vrtaucbl.inf_amd64_d23436324a5ece62\vrtaucbl.PNF setup64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\x64\SET1033.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\SET1063.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\vrtaucbl.inf DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{334f4e75-5f50-1146-97f4-41e2a1d29d8a}\vrtaucbl.cat DrvInst.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files\Virtual Audio Cable\setvars.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\delete_settings.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\setregdword.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_hiding_mode.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_portcls_policy.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_restrict_kmixer_affinity.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_timer_precision_percent.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\audiorepeater.exe setup64.exe File created C:\Program Files\Virtual Audio Cable\delete_service.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\open_device_manager.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\audiorepeater_ks.exe setup64.exe File created C:\Program Files\Virtual Audio Cable\set_audiodg_instance_count_report.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\uninst.ini setup64.exe File created C:\Program Files\Virtual Audio Cable\readme.txt setup64.exe File created C:\Program Files\Virtual Audio Cable\delete_phantom.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_debug_level.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_stream_signal_level_disable.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\license.txt setup64.exe File created C:\Program Files\Virtual Audio Cable\set_packet_mode.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_source_line_types_mask.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_split_dpc_processing.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\open_audio_properties.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_cable_signal_level_disable.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_format_attribute_policy.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_port_type.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_restrict_affinity.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_restrict_client_affinity.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\install.log setup64.exe File created C:\Program Files\Virtual Audio Cable\vac.chm setup64.exe File opened for modification C:\Program Files\Virtual Audio Cable\uninst.ini setup64.exe File created C:\Program Files\Virtual Audio Cable\set_timer_resolution_percent.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\homepage.url setup64.exe File created C:\Program Files\Virtual Audio Cable\set_check_level.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\set_connected_source_lines_mask.cmd setup64.exe File created C:\Program Files\Virtual Audio Cable\setup64.exe setup64.exe File created C:\Program Files\Virtual Audio Cable\vcctlpan.exe setup64.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log setup64.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 42 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags setup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs setup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 1616 msedge.exe 1616 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5108 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeRestorePrivilege 4380 7zG.exe Token: 35 4380 7zG.exe Token: SeSecurityPrivilege 4380 7zG.exe Token: SeSecurityPrivilege 4380 7zG.exe Token: SeRestorePrivilege 2596 7zG.exe Token: 35 2596 7zG.exe Token: SeSecurityPrivilege 2596 7zG.exe Token: SeSecurityPrivilege 2596 7zG.exe Token: SeLoadDriverPrivilege 1704 setup64.exe Token: SeShutdownPrivilege 1704 setup64.exe Token: SeLoadDriverPrivilege 1704 setup64.exe Token: SeRestorePrivilege 3592 DrvInst.exe Token: SeBackupPrivilege 3592 DrvInst.exe Token: SeRestorePrivilege 3592 DrvInst.exe Token: SeBackupPrivilege 3592 DrvInst.exe Token: SeRestorePrivilege 3592 DrvInst.exe Token: SeBackupPrivilege 3592 DrvInst.exe Token: SeLoadDriverPrivilege 3592 DrvInst.exe Token: SeLoadDriverPrivilege 3592 DrvInst.exe Token: SeLoadDriverPrivilege 3592 DrvInst.exe Token: SeLoadDriverPrivilege 1704 setup64.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 4380 7zG.exe 2596 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1704 setup64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2112 1616 msedge.exe 86 PID 1616 wrote to memory of 2112 1616 msedge.exe 86 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 2012 1616 msedge.exe 89 PID 1616 wrote to memory of 3880 1616 msedge.exe 87 PID 1616 wrote to memory of 3880 1616 msedge.exe 87 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88 PID 1616 wrote to memory of 956 1616 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s1-filecr.xyz/fb7669d64312c9fe?ref=bd5615a6ed2aa9b8ab21380d2c03f59f1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf26a46f8,0x7ffdf26a4708,0x7ffdf26a47182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2168,15277097359404087366,7190482159816724246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2364
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\" -spe -an -ai#7zMap1500:128:7zEvent46361⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4380
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\" -spe -an -ai#7zMap31206:228:7zEvent212441⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2596
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\setup64.exe"C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\setup64.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" mmsys.cpl2⤵PID:3888
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL mmsys.cpl3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:5108
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Checks SCSI registry key(s)
PID:5028 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{7e661fa2-863e-674c-97b8-00996def8e61}\vrtaucbl.inf" "9" "4646d1453" "0000000000000140" "WinSta0\Default" "0000000000000150" "208" "c:\users\admin\downloads\virtual audio cable 4.70 [filecr]\virtual audio cable 4.70\virtual audio cable 4.70"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4720
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "11" "ROOT\{83ED7F0E-2028-4956-B0B4-39C76FDAEF1D}\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:a52522ad0c48fa1f:DevInst:4.70.0.13051:virtualaudiocable_83ed7f0e-2028-4956-b0b4-39c76fdaef1d," "4646d1453" "0000000000000170"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5db3577edacebc117bb0cbc7c737ee7bf
SHA1afdb0eeec8197e3bc4e8da603fe8c7ac3ac3ac6b
SHA2561300b129639a91a87a1d6a375a387552dc86be1fba71d1449c0e9598cbd8c3ff
SHA5126e1dd75b48998a8b52ccf14049a951b27d03e730b803c4ce519d6119c22c0cb9cdff4842d63010a1e114b86f87c626e4c7abcd0d86548433d70853fc6c71e4ac
-
Filesize
121KB
MD5b7caab470246ba9e1d6bce7ab908a913
SHA156ffa6d934ecbc358e3015eb2a940ad4348dc568
SHA2566e525aa9597152f5cb97e459efbe7f5355919cc71e0aa71facff3ed177767205
SHA512505b871702b8cb7ac6e32d75b9474cb7a3509d0f40c40907e89f76c3aa8bc83e5003ada7a0136ee7bc5ebb80b5d4af9b8eddfc0802c84e9ee09dbe9c06fcec6f
-
Filesize
52B
MD54f40e51ff184a837186557091dad4676
SHA145f0ddc2bde1ea669cb4d90fbeec0a5162985feb
SHA25688b9b45607a10c8175ebf51d230f8473372bf3cecd9a7dc704c548080f9f4f55
SHA5129d4b800fdfc7b5bc5bbab580c957fc5f4afa9a517099b11441dac8ff562f27aba3809a4a4027b54d73152677e1e713994a56640faaa11fa2e2d8ed8132bbf5a3
-
Filesize
5KB
MD50ecb9e39197f030445da144f59f39c7e
SHA193e30dd16e7944f6bf6021603c112a356b4aac59
SHA256eda173d3bc45fe1b163b99e49ca07625a5299e986f17b60a871f8f2a31e8e0ee
SHA5126738250e8a778764e63317bb5c1ce1bf26d6dee6ee90c75fd50af123dc4cceaabf204c26a6056cfb0a71a1554d7b31cf84cab56579f133f2631ed5b36c186706
-
Filesize
2KB
MD590c943bc7c44fd84b45d571d774ac8c9
SHA1c19f985fdb86fab1bc9ba93d1e24d3deb0de1822
SHA256b8dc89de733aa0d2383ae9a4b71ec51f3186d050339fe5a46b0a7ca91058f758
SHA512c67366e4cb91967b3cc2e990e6dd3afb6b131462774cf96c2183ce8dbbcafe755644806cfdd4f8f2ea33f411ebda7120cceb3332e4831dac75afb3e932b9c8bd
-
Filesize
147KB
MD5916726ff61899725b5569659f3c96e06
SHA1dce2700a2b00daaa74aa7cb7b73f0a6f6965d147
SHA256a89c0f9a69a2b79e26c7929abed3d30cf51439162680e09503797c03c8cd6700
SHA5120a254ddc6cc5183cae8ac0966acec75f4c3df3052f2d983c8d0f0bcaa5ef8985bae28d2fd93ee2c1b324f72a86cffb35c558a09c2a59de6fa48aa8dd3d2300bb
-
Filesize
6KB
MD5e1dbd0f238d4599c0c61f268829c6e05
SHA196d6386569f1844591104901c9de5385f6664a2e
SHA25610e71247b317fc5abfc98d1aaf869f84b5a1b311bbecfaf77e80cd1c73eaf3e2
SHA5120eb5bb3df8bdc5ab9222ca9a4890a0b8ae1cdc40078536442c26ea05e382e9b3aba83bdedcbb7d45177ced6e16129f2d67c8393b76458d82d4cd86e76fb4e790
-
Filesize
349KB
MD5b37a2a1b9eb3d4085996e77082c1be71
SHA1b84065665e4d657309a33ac8627483da703be73b
SHA256e3c01627006f515863c9c8e8abbe5b8d027409094b5bec0b1023cdbe317b7076
SHA51221e70f471c4f5c61aa6f5b1856309d203db8fe02051c42f309f6601ce053eefc4d1838d24fa95efc968917bcced42e1dcce3ccdae2bffcf340cdc4f11ab442cb
-
Filesize
165KB
MD538dd8d04560dfbee14c45e76564f7d67
SHA1412ae6763b9a5067a7cba23e4d3b34ea6af8f927
SHA256c4e4a3a129963fc8a69617dedb5053ff8f38902d8b35bef171aba561c110e85a
SHA51292f6539b4d7add77e6712c0e3e60d07dbca44aaa22ff73f2a00d9859fd30fe7f6019303a0198b4ab1bf7838d6c295d59a6ba1eb9fe66c70657c503be8ffcad82
-
Filesize
152B
MD5aed593b08b94f34dd8f68fd369652ac2
SHA13ce2a17e426e09c2fd9a8d2ab191fe29248f2d95
SHA2565c0cdd5dc1bccf7e3ffa8568fdd2fe35f3edc85832f3d11331aced965aaeeba7
SHA51216b34c29d8ea3793f7d4491847d2fecae2c6c9d7b7b1ec16d1367828d0a4da4cdbf912c2040bc0ca98ac32cd701355ddd16b4865629d51bae2527e1a05411137
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
181B
MD5b6ab8fd3a68d497a696bd481e4c158be
SHA1ccce8026ab4eb74cf40e7996acc800ea462684cc
SHA256ff323bc1b8cc53a226d5a3deda7187f4324786e1feefa3cee33b385f476fa8d7
SHA51259653dcc3b3f8202d9018d504e13ad6051cd7c7dc396a66cfa02265421dc59eabcc4ea542b2cfac037d3a48b1d5881524e9f8cd8da8b61d11ae85adf5d634908
-
Filesize
6KB
MD5fc3e9ecdf33b2ffb523719a256a5278b
SHA1e9cc562a744e95731c7612a3140735289df42883
SHA256580ffae9fac9153377e231fbcbbb444ac8557e1770113b157e3d57f1a2f4ebc5
SHA5129b6c451baadbe1661bb6702ca7faec77ddd213a5f8a9b37414885ba9ef9fe841c5589bad52ec89d94cce3693f22efc1adb39de6e588f9ac43ac9e9b7278970e5
-
Filesize
5KB
MD5237d15830a6ff41a92a7b9bb5dbc44ca
SHA1bf911d38730bec6b88f45d0d9c0b4ca19cc55e55
SHA2565e63fbc5fc90265d06d9090cf64242ff1315767621da84f310330e8a28f91ebd
SHA512a866c6632887f25a77ef1692197d551f71ce6d936626e07a5a150b1965a11ca51c13f86cc381106b1045c208cc7e67ff0e0e751866e6fa11b25cf8846dfb660b
-
Filesize
6KB
MD53a6c97006324166efbc7f98bdf638385
SHA1f0585c43502b506e7f4964dcc6680795f478fe2c
SHA256800b07e925a8c9b7b82b579aa02e3219e3456c887ddf103dd60ebfdb0df102dc
SHA5123a50e3d5820ad4e51b685982b12252876213e6c85868b537604b048a3ef848a7148bba9c43d0453412835ae4feb76db07b6ebb2a7c50ad0e87a5dbfde74494bb
-
Filesize
24KB
MD5e2565e589c9c038c551766400aefc665
SHA177893bb0d295c2737e31a3f539572367c946ab27
SHA256172017da29bce2bfe0c8b4577a9b8e7a97a0585fd85697f51261f39b28877e80
SHA5125a33ce3d048f2443c5d1aee3922693decc19c4d172aff0b059b31af3b56aa5e413902f9a9634e5ee874b046ae63a0531985b0361467b62e977dcff7fc9913c4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51868096a12406d98f7fc8373afcf7214
SHA1786c69f6e39a18fe0edf3836ee36dcfcd9fabc35
SHA2560ad4832b63857123a1aa13614cc1a9120b09a67369eaa8ae17f3129aeaf1d7ec
SHA5127b0af8be6637dafe88e3f5dd07da3f3102681c97cff7b6f08595b24eed692f23b918275063cf27e713373993469aabd3a807541eccb8a4e6551b51aed9bc78cf
-
Filesize
10KB
MD542ec17743d0c558c4725960488afd4fb
SHA1150840b2d564e71615fd3b63a733ec26f544ed32
SHA25696e2275010df32ca8688d4cb91cbbd32b775b5ebc076a6f82a158fbbccd66e33
SHA512a66963aab35924103ae8f8fa69836f214d731c49765b48ef3810f88cd1f0ed28b0a444eaa56e904fe2e322848d2ff6701d5c2086f0e68bc1481e098e25230d4e
-
Filesize
12KB
MD582f8d6a4ec32e64f7b2741942c60305e
SHA10e851b637b5ae724c5ddb309e1aca0cfec6b2513
SHA25666246914e5ad4bc5e13fed91035ccbbc1ae41de64fd7a940c05e55b25bd0c544
SHA512c1881fc42520042be0ac6c3052716280a66ea68e672ff49e12c442aaa6639aee5fb7a6bdbf43274ba9cd4cefbcc886d6bfbac3f0568782e5d5eac0b6b6c40900
-
Filesize
217KB
MD51430af7b30db07c43c9e84d14a83795f
SHA148704511e5ed0df2edd9b29554cc27d310450904
SHA256819ed8b162541c55ac63ea0464d05a8c0306ee3cacf3a8584cc2f940045072cd
SHA512f2af3c48c7007ce76a778df7ef027d59af4365125070c2253dccdba2d52ce22a2056ebf95f4800cb1f94abc4a78e27fc871f9d30c88e6163b1f62dcd1c42b3e7
-
Filesize
12KB
MD582f8d6a4ec32e64f7b2741942c60305e
SHA10e851b637b5ae724c5ddb309e1aca0cfec6b2513
SHA25666246914e5ad4bc5e13fed91035ccbbc1ae41de64fd7a940c05e55b25bd0c544
SHA512c1881fc42520042be0ac6c3052716280a66ea68e672ff49e12c442aaa6639aee5fb7a6bdbf43274ba9cd4cefbcc886d6bfbac3f0568782e5d5eac0b6b6c40900
-
Filesize
2KB
MD538d141c064bcc888b1ac5ba96406731d
SHA14bfc612d714e0a77f0af0f8870f375416ba3a4ef
SHA256acb64d23035fff14f77021e859a2846b3c8a179923c9eb89dfd3f4c323267615
SHA512b8602424b3820d10afdd2ac2188d85e5eff3b95ea71bb2ae663b15a45300b31c76c7232f715d5a9197f0e4807e851e6d08d7cc8d3a408bfd53bc653a7e7dbf11
-
Filesize
2KB
MD538d141c064bcc888b1ac5ba96406731d
SHA14bfc612d714e0a77f0af0f8870f375416ba3a4ef
SHA256acb64d23035fff14f77021e859a2846b3c8a179923c9eb89dfd3f4c323267615
SHA512b8602424b3820d10afdd2ac2188d85e5eff3b95ea71bb2ae663b15a45300b31c76c7232f715d5a9197f0e4807e851e6d08d7cc8d3a408bfd53bc653a7e7dbf11
-
Filesize
217KB
MD51430af7b30db07c43c9e84d14a83795f
SHA148704511e5ed0df2edd9b29554cc27d310450904
SHA256819ed8b162541c55ac63ea0464d05a8c0306ee3cacf3a8584cc2f940045072cd
SHA512f2af3c48c7007ce76a778df7ef027d59af4365125070c2253dccdba2d52ce22a2056ebf95f4800cb1f94abc4a78e27fc871f9d30c88e6163b1f62dcd1c42b3e7
-
Filesize
1.3MB
MD5619dd5370444d7ee06e32d9a4cc1b436
SHA116520d6789f2e513514f43fc60f981919d13b133
SHA2564de73b1739dd66c4ca8401fc786249ef4bf62c221210fd7b717831f98879604f
SHA5127017fdb8ea97fe2364959bad29345f1a1fbe5d6c1558eacb73899c87d1dddc640888e8cb46e7c3ce75d3d6936e1973618bd719862c0e9743d1568f00fa9c9551
-
Filesize
1.3MB
MD5619dd5370444d7ee06e32d9a4cc1b436
SHA116520d6789f2e513514f43fc60f981919d13b133
SHA2564de73b1739dd66c4ca8401fc786249ef4bf62c221210fd7b717831f98879604f
SHA5127017fdb8ea97fe2364959bad29345f1a1fbe5d6c1558eacb73899c87d1dddc640888e8cb46e7c3ce75d3d6936e1973618bd719862c0e9743d1568f00fa9c9551
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70.zip
Filesize1.3MB
MD56f5f7b10c4d8d74795c5512e05df031d
SHA111eb237685a9c4f599f09b7bc33f8c700d38b478
SHA256b423f1dc189716362e847dd17a09e6476df3e166863b663ab295aa2d8eb75026
SHA512218750e66c380a7391bd800545e0da6d280bbd609e3e11e53aa55e698cc554beb0cb3e399312ae78c4436088cc3dc1cd1c8ce6c8febbb48f102fb9e3b153d28f
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\delete_phantom.cmd
Filesize244B
MD5189d19c1ce30a19c0198e9c1d54be209
SHA1556ac673cdf83cae4d11efd0080b40311171d1fe
SHA2567dfe264d2ca361319600f6c4fbabce8f8a5edc0f103dc4c1b0436c5e37585a39
SHA512f4900ad5ba212c5117ec40429c705a1da6a2255365997bcbce17aa1bd9ed98bf1951e29ef394407e7eee6043e3e2237c7f5de806ef6edfaecabf4bb9fddde9cb
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\delete_service.cmd
Filesize632B
MD5220e73f4d596c64a6eda4ffaa4b019b8
SHA1cc784da9313f7098ff121ceac62d71a5eea408e3
SHA25651412a773c235afe1fc4d81c25fdcdbdd945cd62fdafb9c7fbfbe26a17386c12
SHA5121bbef72b265c39cfba9bf1daac77cc7884d6226c90b0d3e510328205cd638938b9809fa3a728416e708bd360e20d2ed36a2d26f7bb70127b9d33e01b17a8c611
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\delete_settings.cmd
Filesize595B
MD51e1caae380ffe7e510774a954fcd366d
SHA16ae3f69e9deda60ff8e101bd0f15ee4d91e7c355
SHA2566d27d88a3b3b34debad1f5e20994296ca5c14a48f0f3acd348bc8cff9ed99f3f
SHA512b37609abe02f54e4682cc4c7e33b767191c94723b93ddd6a419ec474708ec1445e20c59ee5b31b1442151f796efcb7db49c86bdd6a3782f1413784b6e7a4f438
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\open_audio_properties.cmd
Filesize30B
MD586b1b83e41daedf21583da7cb953b158
SHA194ccc221856286ce8b32a3d49025fc81942be129
SHA256e57726a4a11d650647ff812034c9ce76b4484f47e0ebb2ec88d4bc54c207c5d0
SHA512378cfd03df417b4cadaddae292f7559c9e545f013db1cf07174a9beedcc5cdf1df9d1d9f728a8ef045ad60beb9e39f214bd77f49aae285ab5bc9b2318d96138b
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\open_device_manager.cmd
Filesize32B
MD5ca6223f273c4176fafffd5e5fc49010f
SHA1155595f36965f0aaeee01f2a61e7fb4679fce7da
SHA256b8ef2b02f7c7714d5572f549305f9832419f226a7b29c55c4d48ec9df717828c
SHA512b9f7bba03593c06c04b9af653230fe45e976a09ccdbd7de6e9603fbeaf4c29e25b56d4b36f7a779780882bd4b8ce684f0a3f2f5973301b646c5a767c3b471981
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_audiodg_instance_count_report.cmd
Filesize429B
MD57fa47d3f7b3a11689cf7f085e3beaaf0
SHA1cbff3a22229adc26f76f3923829bc68aa77c6452
SHA256a3d53e4c0b75000f051df9938277d285fdef3d8ecb2ce8c45d2c64bcc66de528
SHA5127dee1b8725094050426750e178a7da1b451b01d4232cb21ccb0f13ed82751840a2a25e71070a0d40bc5457aca8fe88ac96fd33726e49abe563ffb806218be0f8
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_cable_signal_level_disable.cmd
Filesize428B
MD57ef6402ea23a9a7bfebe389c1f680671
SHA1c2ef8ac2fe6d50e01f28e62a2461cd0abaafa0d4
SHA2568aeec619b044fc8be6701556c5b4b0ae8228feafe9c9f324206cbd2c514e378f
SHA512da0d49190d637177f476317018b004135e15d54d9a04daddacaf5bfd0a1ab875f2ef31727716011d031c6cabf938cc009f51247760ff08eefa09692faaec10f9
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_check_level.cmd
Filesize255B
MD58c00fc7bf0dcc5b5b1b91f048667fe49
SHA17f64a6b2507e3556f266e07db2ec83bdbc8ffc2b
SHA2564081a8d8bb4ce4ad42bae4e382df484272b8d1f5a2815d5991bc080b09da8365
SHA512b356657e1c4d7e530365fc07522a2789c45594ca86d028af47f3df78f98490bd79fdfdaa8607a4e9a40e8e026d510d21ca3cab563542e136ecd53b823faf6897
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_connected_source_lines_mask.cmd
Filesize414B
MD555c197e731857607b945ed6915bdfb55
SHA1214a0a96d77edd662ebada6e337bd0abdcff5b8a
SHA2560f373731f336b33fa2be0256d989a29fa9d6c18a74d3998a5a2c0357c8aecdb4
SHA512bcb57c152e524218ba747d7497c1fd2ad9c3e4e7a70f01e22f090b09659ab6efc1fc8059f97bd8a48b451446b60d72514ef57d3ef0dfc0cebdc1e2661eff43b0
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_debug_level.cmd
Filesize255B
MD5e6a0318d754f8a65e2d7137a4be7414e
SHA1f137ae35d358408c7445fc7e763a125aec1a517f
SHA256786c6c3093ccfc265daa5bb2f6e22c37fc19ea299f3e507272b9ceeec0f97e00
SHA512d2d9497e753a0d2ac26476eec9ee25cc57ee0bc0b4bc2cec17b5f571bf3a43d1375992971b4866223ad3b8e5482c60d601976aaa83417d101058fc04a2c3f62d
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_format_attribute_policy.cmd
Filesize358B
MD572947a6be0a4934ada097480649f2cbf
SHA1eea062e01102ccd9cef0f987fa7408e62137d8cc
SHA256dff88342fbcd599e09ee767b1b905c77541c36446c61e1c28acad62a2bf388f1
SHA51220587ac2e5ab824381bace0a043eb0cd9aa87e39f32a317affa913008787514b7877af1ae5c7c84840f3e886ef0ac263f3a3e0f4ab189436b968d3aac49cd802
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_hiding_mode.cmd
Filesize653B
MD545f6ff3dae267604a6a9bced02a069c4
SHA19a53d2642620a27a120d399cac19327ca84775ca
SHA256940d6986a658b43c34521019fb9fb94b5aef487bece2260d43361f8e257c5f13
SHA512b77908556e53b98ed5fb5bb021c931cfda67dad2dc8f71e971883ba9cb9647cc2c32faab28aee9d29388ab9d80cc61186fb2a6b458dcd95f998bb7b6cfc2c6e6
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_packet_mode.cmd
Filesize673B
MD5dcf7f4ad010398b5089d1ec1d751fd00
SHA1fa3c82112c311ec9e557244261808b6b208ebaaa
SHA256442fdc3fff7b44250664714c7f837258d0cc2ff091a95accdbd89414faadee71
SHA512346db7f391d1c7b7d7338364a5f8065db1542990d6e2a63bd53bbc0e099cefea685ad13c37f5d156c0d77737fbe6e5e3a1ba6d1a631b6e846691ef9a997b0319
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_port_type.cmd
Filesize659B
MD5bd879d8caf00cd509e868c329cf1abc4
SHA16e45f87baf994621b87c4e2d59a893f523574161
SHA256e461c2ea6ab45774a3b6af76de490d5e770dc6602b814ce1b2795c23c3acfdf4
SHA512b614b026c12162c5e37fc6afaa9591213ab6978706dfa6f04a1c49a6d85d338c912cfaae124237be1f2d2bf6445f7ad608b1ea5c660873d9b8b1bceb8e1cbabe
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_portcls_policy.cmd
Filesize424B
MD5f70a560ef9947a2980d3f33904f2654a
SHA179d572b554d664c4cd985e65f7085f1170ce7f8a
SHA256e234cfafa6cb78c372200a8a0ec3e3c3b0d460bef3535c7d69e7ccee614e7ee3
SHA5123d0b780a63001cea9cbb4eb16afe1e2073d2c616d4ea8ce3bc25cde32a783822bc5f7c9317085d0c7f3f8c5f69ea32fb4fd242c8699c7903c0a2a8d791fca042
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_restrict_affinity.cmd
Filesize539B
MD5193b371b27ff0b2ea1709d60e81948f2
SHA1ee5c1efb91b8a6046a92c74b4b363fef3f31ea95
SHA256c57192dd02f0bd9d2cf7c832b56e9b7e85fcbba1ab6b274cfa1a8a9e0bdf9a51
SHA5128e7a13f71b44b3103b8d4ce0cd3c629cbaf41c27e904192c70a241e58eaf64dbbc1600bdbf9e20fd1b87d803c0ff7d81a47463864e2415e308fb9d4ee390b991
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_restrict_client_affinity.cmd
Filesize198B
MD5b1db63c59d702f207564c0f32a13a9c3
SHA1ae0d44778ea3141d817c5841b9150141ed2ab215
SHA2562e24db52eb783bd62a012b77733f59a22c397b840fc005848b7aafc85d66cddb
SHA512c70e319659361e07943d03501056696845c79b83a8f7bdbc022b5bdfafc7bef8dc0f7dd3be9bfc3fe7f6838befb973406505982cbe982d7f8933ede094c92c63
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_restrict_kmixer_affinity.cmd
Filesize198B
MD5ca8772337ccb025be5e5cf7f3bb27160
SHA1963e9a363d4953c3c503deb280c0f52e009e129f
SHA256cf84039a0d7b7ec82b3359fba2f0639cd22a4d85bcf3901c95fb6652af8f3dba
SHA512e451bcd9696a7277840e1c28b92ea7b89ae61596547cd6c92f242cd5eb6529cd83fbc6b266b0596bd821e577c95a3fe0e289ee0752e37e6769f011b6cc209a32
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_source_line_types_mask.cmd
Filesize409B
MD5b50d259be0058b06144cec159a19a197
SHA11027f8cf81d236d5b06d642672cf73a2385c858c
SHA256c9298acd405b02eec65dc570ef19d9ee1cf25244c7146e493e42fef0f83eb323
SHA512d597d2bdfc558bfa99cbd111ba979613c8e14515f113f29d120c9fc437bfcc28188690d733e8a0e4d8739bfd6d1693878784cbd8319d3284ad4cb3ee914ccc2f
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_split_dpc_processing.cmd
Filesize227B
MD597595ea744791007eaddb5632b3ea76a
SHA1e136244d1aa77a0a73b9844eba40e2260d9c838b
SHA256ec5f4b4cb49d1744ba90f4781c937259b1389b7c918f183a73ca228f52d0cc2a
SHA51228641edc6c7e4a578fab64f04f1866b5957a9cc54135cc890a2baa486b53f866a2c5075801f8d264f519eadda61f474e3cf991d7f1695f2cbd87f93728853d33
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_stream_signal_level_disable.cmd
Filesize429B
MD5fe959c336f036cc9b34e7dfdd3c7e5a7
SHA177696433b42305d9ba7a0001562af31107860716
SHA256768eb1eb8e38038161a6fb984b456600a8112665877b026918d459b0ee166600
SHA5122ec3787ff951fd65d66c53fbb950c908e2714b895144abd087ab01757a6a4e1670e9798c2655a8389cb5087153b355fd28588548af9ede6336e960e23cfee3aa
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_timer_precision_percent.cmd
Filesize261B
MD510e09479a0f2ab3cbbec7efd6cea3e8d
SHA1f0809b09b29d010025c9e50baf78e608530cbebd
SHA2562a406214537089fe1b8035f24ac361dbe18d8b7ed1e620ceeedc6873bddce8eb
SHA512b587197ca864c09b755f7b496bf6e72da8612293ce88c1bf0d1f3ca9dc1fd05dca7a4348cf7da829c30ce56f9e6fe963d133c1f926815c0c88573f0ba1ee31de
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\set_timer_resolution_percent.cmd
Filesize263B
MD5607e85383cb00d5095c131ea3f803875
SHA1de474bf005049bf210431fa99780926a3e030b22
SHA2563d7c6d1a23eb9ada4c9e5f72644075b0fc47810cef78d0cc01584de6ca568b32
SHA51260db0a613e9b0b5ab3933d38cb651ec8c1a97aa58ea56b41f5224bc19ddce993c0a11a396620f1f80476acd7c908ffad45585391c4d9b1ca65c56d2effd92e9f
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\setregdword.cmd
Filesize2KB
MD50010633ed760739e88c92d72df229307
SHA1dee859eb21cc52c30bc453e298938120261eb144
SHA2563b7272ca5a5d523fc0d0080fa828d964b06e4cea6b0c18929e7b3fbf8ed71554
SHA512284c95c6983832237d7fc038c044caaddc2f446e8c61c48c9a777617e3c4d8799c4fbb4758df46ab49c24199e5ec2403a4c4cd328743e5bcbf44e0d7d1a5fa8f
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\Tools\setvars.cmd
Filesize306B
MD5869073747b866f9a36e284591a2849a0
SHA169b09b940a062d0cf8f8a9562a19acc4aba21806
SHA256f49d3bfe2a143e95d78ab6e2bd672426bdf190c90752ae44cc6f203e9cdb5797
SHA5124d9a4e963762da1376ed7cc87791877dd7cbe546d565bf294a00003ae417e36783ae00d26165936717ca12b2edfd6c7827c66b13745e1006f6965f5a398b6066
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\homepage.url
Filesize52B
MD54f40e51ff184a837186557091dad4676
SHA145f0ddc2bde1ea669cb4d90fbeec0a5162985feb
SHA25688b9b45607a10c8175ebf51d230f8473372bf3cecd9a7dc704c548080f9f4f55
SHA5129d4b800fdfc7b5bc5bbab580c957fc5f4afa9a517099b11441dac8ff562f27aba3809a4a4027b54d73152677e1e713994a56640faaa11fa2e2d8ed8132bbf5a3
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\license.txt
Filesize5KB
MD50ecb9e39197f030445da144f59f39c7e
SHA193e30dd16e7944f6bf6021603c112a356b4aac59
SHA256eda173d3bc45fe1b163b99e49ca07625a5299e986f17b60a871f8f2a31e8e0ee
SHA5126738250e8a778764e63317bb5c1ce1bf26d6dee6ee90c75fd50af123dc4cceaabf204c26a6056cfb0a71a1554d7b31cf84cab56579f133f2631ed5b36c186706
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\readme.txt
Filesize2KB
MD590c943bc7c44fd84b45d571d774ac8c9
SHA1c19f985fdb86fab1bc9ba93d1e24d3deb0de1822
SHA256b8dc89de733aa0d2383ae9a4b71ec51f3186d050339fe5a46b0a7ca91058f758
SHA512c67366e4cb91967b3cc2e990e6dd3afb6b131462774cf96c2183ce8dbbcafe755644806cfdd4f8f2ea33f411ebda7120cceb3332e4831dac75afb3e932b9c8bd
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\setup.ini
Filesize2KB
MD5f7a838d30467ed257a83e87bf73ca062
SHA1fea63e6c8fdaca96e8ead4f8b595bd34e66fde7c
SHA2560b2343f40c5117392b472eaa913d57a45f745b92d81797f3f4f41e02ba549002
SHA512d0fb147df979575d0da7c9ec4a4bce2fbadb12342e8bfb80b1e51e9849b31ef0603afb04344c46dfdd26889945518e53202749ce8d72c594649348ca4656c4f5
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\setup64.exe
Filesize147KB
MD5916726ff61899725b5569659f3c96e06
SHA1dce2700a2b00daaa74aa7cb7b73f0a6f6965d147
SHA256a89c0f9a69a2b79e26c7929abed3d30cf51439162680e09503797c03c8cd6700
SHA5120a254ddc6cc5183cae8ac0966acec75f4c3df3052f2d983c8d0f0bcaa5ef8985bae28d2fd93ee2c1b324f72a86cffb35c558a09c2a59de6fa48aa8dd3d2300bb
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\setup64.exe
Filesize147KB
MD5916726ff61899725b5569659f3c96e06
SHA1dce2700a2b00daaa74aa7cb7b73f0a6f6965d147
SHA256a89c0f9a69a2b79e26c7929abed3d30cf51439162680e09503797c03c8cd6700
SHA5120a254ddc6cc5183cae8ac0966acec75f4c3df3052f2d983c8d0f0bcaa5ef8985bae28d2fd93ee2c1b324f72a86cffb35c558a09c2a59de6fa48aa8dd3d2300bb
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\vac.chm
Filesize349KB
MD5b37a2a1b9eb3d4085996e77082c1be71
SHA1b84065665e4d657309a33ac8627483da703be73b
SHA256e3c01627006f515863c9c8e8abbe5b8d027409094b5bec0b1023cdbe317b7076
SHA51221e70f471c4f5c61aa6f5b1856309d203db8fe02051c42f309f6601ce053eefc4d1838d24fa95efc968917bcced42e1dcce3ccdae2bffcf340cdc4f11ab442cb
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\vrtaucbl.inf
Filesize2KB
MD538d141c064bcc888b1ac5ba96406731d
SHA14bfc612d714e0a77f0af0f8870f375416ba3a4ef
SHA256acb64d23035fff14f77021e859a2846b3c8a179923c9eb89dfd3f4c323267615
SHA512b8602424b3820d10afdd2ac2188d85e5eff3b95ea71bb2ae663b15a45300b31c76c7232f715d5a9197f0e4807e851e6d08d7cc8d3a408bfd53bc653a7e7dbf11
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\x64\audiorepeater.exe
Filesize100KB
MD5db3577edacebc117bb0cbc7c737ee7bf
SHA1afdb0eeec8197e3bc4e8da603fe8c7ac3ac3ac6b
SHA2561300b129639a91a87a1d6a375a387552dc86be1fba71d1449c0e9598cbd8c3ff
SHA5126e1dd75b48998a8b52ccf14049a951b27d03e730b803c4ce519d6119c22c0cb9cdff4842d63010a1e114b86f87c626e4c7abcd0d86548433d70853fc6c71e4ac
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\x64\audiorepeater_ks.exe
Filesize121KB
MD5b7caab470246ba9e1d6bce7ab908a913
SHA156ffa6d934ecbc358e3015eb2a940ad4348dc568
SHA2566e525aa9597152f5cb97e459efbe7f5355919cc71e0aa71facff3ed177767205
SHA512505b871702b8cb7ac6e32d75b9474cb7a3509d0f40c40907e89f76c3aa8bc83e5003ada7a0136ee7bc5ebb80b5d4af9b8eddfc0802c84e9ee09dbe9c06fcec6f
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\x64\vcctlpan.exe
Filesize165KB
MD538dd8d04560dfbee14c45e76564f7d67
SHA1412ae6763b9a5067a7cba23e4d3b34ea6af8f927
SHA256c4e4a3a129963fc8a69617dedb5053ff8f38902d8b35bef171aba561c110e85a
SHA51292f6539b4d7add77e6712c0e3e60d07dbca44aaa22ff73f2a00d9859fd30fe7f6019303a0198b4ab1bf7838d6c295d59a6ba1eb9fe66c70657c503be8ffcad82
-
C:\Users\Admin\Downloads\Virtual Audio Cable 4.70 [FileCR]\Virtual Audio Cable 4.70\Virtual Audio Cable 4.70\x64\vrtaucbl.sys
Filesize217KB
MD51430af7b30db07c43c9e84d14a83795f
SHA148704511e5ed0df2edd9b29554cc27d310450904
SHA256819ed8b162541c55ac63ea0464d05a8c0306ee3cacf3a8584cc2f940045072cd
SHA512f2af3c48c7007ce76a778df7ef027d59af4365125070c2253dccdba2d52ce22a2056ebf95f4800cb1f94abc4a78e27fc871f9d30c88e6163b1f62dcd1c42b3e7
-
Filesize
2KB
MD538d141c064bcc888b1ac5ba96406731d
SHA14bfc612d714e0a77f0af0f8870f375416ba3a4ef
SHA256acb64d23035fff14f77021e859a2846b3c8a179923c9eb89dfd3f4c323267615
SHA512b8602424b3820d10afdd2ac2188d85e5eff3b95ea71bb2ae663b15a45300b31c76c7232f715d5a9197f0e4807e851e6d08d7cc8d3a408bfd53bc653a7e7dbf11
-
Filesize
2KB
MD538d141c064bcc888b1ac5ba96406731d
SHA14bfc612d714e0a77f0af0f8870f375416ba3a4ef
SHA256acb64d23035fff14f77021e859a2846b3c8a179923c9eb89dfd3f4c323267615
SHA512b8602424b3820d10afdd2ac2188d85e5eff3b95ea71bb2ae663b15a45300b31c76c7232f715d5a9197f0e4807e851e6d08d7cc8d3a408bfd53bc653a7e7dbf11
-
Filesize
217KB
MD51430af7b30db07c43c9e84d14a83795f
SHA148704511e5ed0df2edd9b29554cc27d310450904
SHA256819ed8b162541c55ac63ea0464d05a8c0306ee3cacf3a8584cc2f940045072cd
SHA512f2af3c48c7007ce76a778df7ef027d59af4365125070c2253dccdba2d52ce22a2056ebf95f4800cb1f94abc4a78e27fc871f9d30c88e6163b1f62dcd1c42b3e7
-
Filesize
217KB
MD51430af7b30db07c43c9e84d14a83795f
SHA148704511e5ed0df2edd9b29554cc27d310450904
SHA256819ed8b162541c55ac63ea0464d05a8c0306ee3cacf3a8584cc2f940045072cd
SHA512f2af3c48c7007ce76a778df7ef027d59af4365125070c2253dccdba2d52ce22a2056ebf95f4800cb1f94abc4a78e27fc871f9d30c88e6163b1f62dcd1c42b3e7
-
\??\c:\users\admin\downloads\virtual audio cable 4.70 [filecr]\virtual audio cable 4.70\virtual audio cable 4.70\vrtaucbl.cat
Filesize12KB
MD582f8d6a4ec32e64f7b2741942c60305e
SHA10e851b637b5ae724c5ddb309e1aca0cfec6b2513
SHA25666246914e5ad4bc5e13fed91035ccbbc1ae41de64fd7a940c05e55b25bd0c544
SHA512c1881fc42520042be0ac6c3052716280a66ea68e672ff49e12c442aaa6639aee5fb7a6bdbf43274ba9cd4cefbcc886d6bfbac3f0568782e5d5eac0b6b6c40900