Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/01/2025, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe
-
Size
92KB
-
MD5
18ee971f5207642a66e4317af8235c67
-
SHA1
4256823207334a11831bbe58df5e3141c9533e42
-
SHA256
1c0c9c133c37e7744df226c16ad3dc368e6b71fcace343f8aa257700f9a125d3
-
SHA512
1f26900f00edc618f99948f5f40912bd40d656408a516f8642a97338e700e99251c6170f2f2117e6d8012e3b6037abbfffb9eb86ea2eabb5705c70cacca4b9fc
-
SSDEEP
1536:rVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:jnxwgxgfR/DVG7wBpE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2928 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2884-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2884-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2884-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2884-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2884-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2884-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2884-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-75-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2928-588-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\zip.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ts_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libblend_plugin.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jfxmedia.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-timezone-l1-1-0.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGM.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\msvcr100.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\currency.html svchost.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-localization-l1-2-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Data.Entity.Design.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwingdi_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\picturePuzzle.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\slideShow.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libplaylist_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jaas_nt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\license.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libmft_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_mmx_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_wer.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\splashscreen.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_cdg_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libwave_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\license.html svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSFrontendENU.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsound.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.IdentityModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.Printing.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\librss_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libmotionblur_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\splashscreen.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\instrument.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libxa_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\weather.html svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msador15.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaremr.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\PresentationCore.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\WindowsFormsIntegration.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmpc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawdv_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_vc1_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libadaptive_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\msvcr100.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\libxml2.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtospdif_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libadummy_plugin.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2928 WaterMark.exe 2928 WaterMark.exe 2928 WaterMark.exe 2928 WaterMark.exe 2928 WaterMark.exe 2928 WaterMark.exe 2928 WaterMark.exe 2928 WaterMark.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe 904 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2928 WaterMark.exe Token: SeDebugPrivilege 904 svchost.exe Token: SeDebugPrivilege 2928 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe 2928 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2928 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe 30 PID 2884 wrote to memory of 2928 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe 30 PID 2884 wrote to memory of 2928 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe 30 PID 2884 wrote to memory of 2928 2884 JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe 30 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 2844 2928 WaterMark.exe 31 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 2928 wrote to memory of 904 2928 WaterMark.exe 32 PID 904 wrote to memory of 256 904 svchost.exe 1 PID 904 wrote to memory of 256 904 svchost.exe 1 PID 904 wrote to memory of 256 904 svchost.exe 1 PID 904 wrote to memory of 256 904 svchost.exe 1 PID 904 wrote to memory of 256 904 svchost.exe 1 PID 904 wrote to memory of 336 904 svchost.exe 2 PID 904 wrote to memory of 336 904 svchost.exe 2 PID 904 wrote to memory of 336 904 svchost.exe 2 PID 904 wrote to memory of 336 904 svchost.exe 2 PID 904 wrote to memory of 336 904 svchost.exe 2 PID 904 wrote to memory of 384 904 svchost.exe 3 PID 904 wrote to memory of 384 904 svchost.exe 3 PID 904 wrote to memory of 384 904 svchost.exe 3 PID 904 wrote to memory of 384 904 svchost.exe 3 PID 904 wrote to memory of 384 904 svchost.exe 3 PID 904 wrote to memory of 392 904 svchost.exe 4 PID 904 wrote to memory of 392 904 svchost.exe 4 PID 904 wrote to memory of 392 904 svchost.exe 4 PID 904 wrote to memory of 392 904 svchost.exe 4 PID 904 wrote to memory of 392 904 svchost.exe 4 PID 904 wrote to memory of 424 904 svchost.exe 5 PID 904 wrote to memory of 424 904 svchost.exe 5 PID 904 wrote to memory of 424 904 svchost.exe 5 PID 904 wrote to memory of 424 904 svchost.exe 5 PID 904 wrote to memory of 424 904 svchost.exe 5 PID 904 wrote to memory of 476 904 svchost.exe 6 PID 904 wrote to memory of 476 904 svchost.exe 6 PID 904 wrote to memory of 476 904 svchost.exe 6 PID 904 wrote to memory of 476 904 svchost.exe 6 PID 904 wrote to memory of 476 904 svchost.exe 6 PID 904 wrote to memory of 492 904 svchost.exe 7 PID 904 wrote to memory of 492 904 svchost.exe 7 PID 904 wrote to memory of 492 904 svchost.exe 7 PID 904 wrote to memory of 492 904 svchost.exe 7 PID 904 wrote to memory of 492 904 svchost.exe 7 PID 904 wrote to memory of 500 904 svchost.exe 8 PID 904 wrote to memory of 500 904 svchost.exe 8 PID 904 wrote to memory of 500 904 svchost.exe 8 PID 904 wrote to memory of 500 904 svchost.exe 8 PID 904 wrote to memory of 500 904 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:596
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:624
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1608
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1164
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:848
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2600
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:236
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:348
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1068
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:860
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1960
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1188
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_18ee971f5207642a66e4317af8235c67.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD518ee971f5207642a66e4317af8235c67
SHA14256823207334a11831bbe58df5e3141c9533e42
SHA2561c0c9c133c37e7744df226c16ad3dc368e6b71fcace343f8aa257700f9a125d3
SHA5121f26900f00edc618f99948f5f40912bd40d656408a516f8642a97338e700e99251c6170f2f2117e6d8012e3b6037abbfffb9eb86ea2eabb5705c70cacca4b9fc
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize197KB
MD5ffd6faa4d8260ee8328610775373c728
SHA1a98b0f32330b842a9a6f6dd48e9656bf9ac6c133
SHA2568fd08d1c8433fde7286df3a8990e017e346d04549ad24804d2ae235bbe766da0
SHA512f9a80d23b0e9266c762bf9693904a400c2c92a02f350feda18e6378e409474f08337e50b7160bf436bec8479424fe6efa56f6dcd55fc0863bc5fd7007a92d076
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize193KB
MD5b3c48178d17ba19e60e3f525a5148551
SHA1d8d5b1f397cbf5351ca9632c75f494a37205980f
SHA256aaa1453a5aa45433a014476873628f4dd8baf204991f48e6c1692fad51862543
SHA512496d7f3433e118f8822daa30ed51bc425deba1d79f28129373dd1be6ec3cd1cb5ad86df5ea402d5bb3443dc54cf0e789f201eec6a9243cd1833843971de3049e